Sunteți pe pagina 1din 88

TOSHIBA

ELECTRONIC IMAGING DIVISION


NATIONAL SERVICE SCHOOL

DIGITAL CONNECTED PRODUCTS


TRAINING CLASS
K

NETWORK FUNDAMENTALS

TOSHIBA America Business Solutions


2 Musick
Irvine, California 92618

TOSHIBA

TABLE OF CONTENTS

Preface ...................................................................................................................................................... 3
Disclaimer ................................................................................................................................................. 4
I.

INTRODUCTION ............................................................................................................................5

II.

NETWORKING FUNDAMENTALS A REVIEW .................................................................................6


A. Network Functionality ...................................................................................................................... 6
B. Client/Server vs. Peer-to-Peer Networking ................................................................................ 12
C. Network Operating Systems......................................................................................................... 13
D. Selecting the Appropriate Topology ............................................................................................ 13
E. Selecting the Appropriate Media.................................................................................................. 17
F. Media Access Methods ................................................................................................................. 20
G. Network Architecture...................................................................................................................... 22
H. Selecting the Appropriate Connectivity Devices........................................................................ 28
I. Selecting the Appropriate LAN Protocol ..................................................................................... 33
J. Wide Area Networks (WAN)......................................................................................................... 43
K. Network Operating Systems Microsoft/Novell Overview ...................................................... 46
L. Network Administration ................................................................................................................. 50
M. Resolving Common Network Problems ...................................................................................... 52
N. Resolving Cable and Network Interface Card Problems.......................................................... 53
O. Resolving Printer Problems .......................................................................................................... 54

II.
A.
B.
C.
D.
E.

NETWORK PRINTING A REVIEW ..............................................................................................55


Network Print Services .................................................................................................................. 55
Novell NetWare Printing................................................................................................................ 55
Print Server Process...................................................................................................................... 56
Windows Printing ........................................................................................................................... 56
LPR/LPD Printing ........................................................................................................................... 57

IV.

CONCLUSION .........................................................................................................................58

V.

GLOSSARY................................................................................................................................59

TOSHIBA America Business Solutions

Electronic Imaging Division

Network Fundamentals
Manual

TOSHIBA

PREFACE
In order to prepare you for the Electronic Imaging Division (EID) training class,
we have developed the Digital Connected Products Training Class, Network
Fundamentals Manual (Manual). The purpose of the Manual is to provide the
student with a basic review of network printing technologies. The Manual
is intended to supplement a students course material received during their EID
training program and therefore, provide additional resources necessary to
implement and support a given TOSHIBA connected product.
The Manual is not intended to review all current state-of-practice networking
techniques, nor provide a stand-alone document addressing concepts necessary
to adequately support a LAN administrator or similar network professional. It is
understood that a student has at minimum a basic, if not intermediate
understanding of networking concepts prior to attending a TOSHIBA EID digital
product training class. Certain concepts essential to network professionals (e.g.,
fault tolerance, data backup) will be addressed in the Manual only to the extent
that the student will be aware of that concept in a networking environment
although that certain concept may not be directly applied to a TOSHIBA
connected product.
Together, the Manual, course materials, and successful completion of the
Instructor-led EID training program will provide an integral part of your
understanding TOSHIBA digital network products.

TOSHIBA America Business Solutions

Electronic Imaging Division

Network Fundamentals
Manual

TOSHIBA

DISCLAIMER
TOSHIBA America Business Solutions (TOSHIBA) makes no warranty, or representation,
either expressed or implied, with respect to this document or its content, its quality, performance,
or fitness for a particular purpose. The information is provided on an as is basis. TOSHIBA
will have neither liability nor responsibility to any person or entity with respect to any loss or
damages arising from the information contained in this document.

TOSHIBA America Business Solutions

Electronic Imaging Division

Network Fundamentals
Manual

TOSHIBA

I.

INTRODUCTION

Understanding the fundamentals of a computer network and network-printing


environment are critical if you wish to sell, implement, configure, and support
TOSHIBA digital network products. The Electronic Imaging Division (EID) of
TOSHIBA offers Instructor-led classroom training programs for each of its digital
copier products to qualified dealers and technicians. To this end, TOSHIBA
requires each student to posses minimum qualifications regarding his/her
knowledge of computer networks. A current list of acceptable certifications is
located on TOSHIBAs FYI site (www.fyi.toshiba.com) under the service/training
sections.
TOSHIBA also provides technical resources after completion of the training
course by offering telephone support through its In-Touch Center (888-8798247), Color Support Hotline (888-792-6567), and World Wide Web access to
product documentation (www.fyi.toshiba.com).
With successful completion of the Instructor-led EID training program you will
become familiar with the installation and configuration of TOSHIBA digital
connected products in a network environment and be able to support those
products with a high degree of confidence.

TOSHIBA America Business Solutions

Electronic Imaging Division

Network Fundamentals
Manual

TOSHIBA

II.

A.

NETWORKING FUNDAMENTALS A REVIEW

Network Functionality

Overview
A computer network is a physical and logical electronic data communication
system that allows the sharing of resources between multiple users and
machines. A network may be located within a geographically small area (e.g.,
within a building) known as a Local Area Network (LAN), span across large areas
(e.g., cities, states, or countries) known as a Wide Area Network (WAN), or be
connected to multiple networks such as the Internet.
Any given network (e.g., LAN, WAN) is a collection of interconnected computing
devices and peripherals. In order for a network to function, three essential
components must exist: 1) media, 2) protocol, and 3) a network service.
Although there are numerous other components, which make up a computer,
peripheral, network, or integrated system, these three components are the
essential core necessary to provide shared access on a network.
An example of commonly used media is the cable or wire (including fiber optics)
that physically connects the hardware. The most common of these types of
media is copper wire known as unshielded twisted pair (UTP). Examples of
commonly used protocols include TCP/IP, IPX/SPX, and NetBEUI. The latter
component, service, is used to provide the direction or management of network
system services and functionality. Typically a client (i.e., workstation) service is
invoked to act as a redirector or grabber of network resources, while a server
service functions as a giver of network resources.
Standardization
Within a given network environment, many different manufacturers products may
exist. In order for data transfer to be successfully accomplished over a network,
all hardware and software must work together and communicate in a common
language.
Communication between computers on a network would be a simple task if a
single manufacturer created all of the components of that network. However,
thousands of companies provide networking hardware and software products,
therefore, a common standard must exist in order for communication to be
compatible, and therefore successful.

TOSHIBA America Business Solutions

Electronic Imaging Division

Network Fundamentals
Manual

TOSHIBA
The International Standards Organization (ISO) is a worldwide organization that
promotes international standards. During the 1980s, the ISO began efforts to
develop a set of protocols that would allow multi-vendor network environments to
communicate with one another using industry standard protocols. The result of
these efforts was the development of the Open Systems Interconnection (OSI)
Model.
The OSI Model established the standards for communicating with the same peer
protocol layer running on the opposite computer (virtual connectivity) and
provides services to the layer above it, except for the Application Layer. The OSI
Model divides data communication into seven functions, or layers, which
describe how information flows from one end-user to another. Each layer
prepares information for, and communicates with the one above or below it.
Table 1 presents each layer of the OSI Model and its respective function,
associated network component and protocols/services. The table is provided in
order to present a generic overview of the OSI Model and its relationship to
network components; it is not intended to represent a specific operating system,
nor is it intended to provide a detailed completeness of all protocols or ISO
standards.

TOSHIBA America Business Solutions

Electronic Imaging Division

Network Fundamentals
Manual

TOSHIBA
Table 1.
OSI LAYER

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data Link Layer

Physical Layer

OSI Layers

FUNCTION
Provides standard services to
applications and end-user interface.
Handles general network access, and
flow control.
Translates data from Application
Layer to a format the Session Layer
can understand. Performs data
format conversion. Provides data
compression, encoding, and
encryption.
Allows two applications on different
computers to establish, use, and
terminate a connection called a
session. Synchronizes
communications between computers;
controls when users can send and
receive data.
Manages connections and provides
reliable packet delivery between
sending and receiving computers.
Breaks long messages into several
packets. Reassembles the packets
when in receiving mode. Operates in
units of messages.
Translates addresses and routes
data from one node to another.
Performs fragmentation and reassembly, packet switching, and
routing. Operates in units of packets.
Consists of 2 sublayers. Operates in
units of frames.
Logical Link Control (LLC): Defines
how data is transferred over the
media and provides data link services
to higher layers.
Media Access Control (MAC):
Defines who can use the network
when multiple computers are trying to
access it simultaneously
Defines physical hardware
connection specifications, and
electrical and wiring specifications.
Responsible for transmitting data
across a wire. Operates in units of
bits.

COMPONENT

Gateways

PROTOCOLS
SERVICES
SMB, SNMP,
SMTP, FTP, HTTP,
Telnet, LPR, LPD,
RSH
Postscript
Redirector

DHCP

TCP
UDP
NWLink
SPX

Routers

IP, ARP, RARP,


IARP, Ping, IPX,
NetBEUI, RIP

Bridges
Switches

SLIP
PPP
802.1
802.2
802.3 CSMA/CD
802.4 Token Bus
802.5 Token Ring
802.12 Demand
Priority

Hubs
Repeaters

The upper layers of the OSI model (e.g., Application Layer) are software oriented
whereas the lower layers (e.g., Physical Layer) are more hardware dependent.
TOSHIBA America Business Solutions

Electronic Imaging Division

Network Fundamentals
Manual

TOSHIBA
Most network equipment manufacturers now build their networking products in
compliance with the OSI Model.
The purpose of each layer in the OSI Model is to provide a service to the next
higher software layer. The service consists of dividing communication tasks into
smaller subtasks, which can be utilized by specific protocols at their respective
layer. Communication between one computer and another begins at the
Application Layer. Data travels down through the layers, across the wire to its
destination, and up through the layers to the receiving computers application.
There is a virtual connection between layers from one computer to another
(Figure 1).
Figure 1.

The OSI Model

Computer 1
(Sending)

Computer 2
(Receiving)

Application

Application

Presentation

Presentation

Session

Session

Transport

Transport

Network

Network

Data Link

Data Link

Physical

Physical

Network Cable/Wire

Prior to data passing from one layer down to another, messages are converted
into a more manageable unit (i.e., packet, frame, and bit [Figure 2]).
TOSHIBA America Business Solutions

Electronic Imaging Division

Network Fundamentals
Manual

TOSHIBA
Figure 2.

Data Packet

Message

Data

When the data message arrives at the next lower layer, additional information is
added to it in order to identify it on the network and insure data integrity (Figure
3). This additional information may include addressing (source/destination),
formatting, and error checking. When the packet arrives at the Physical Layer, it
is processed into bits, which are ready for physical transmission across the
media to the destination computer (Figure 4).

Figure 3.

Packet Preparation

Data

Application Header
Presentation Header
Session Header
Transport Header

Network Header
Data Link Header

Data Link Trailer (CRC)

Frame Preamble

Packet

TOSHIBA America Business Solutions

Electronic Imaging Division

10

Network Fundamentals
Manual

TOSHIBA
All packets have certain common components. These include:
Header
Source address
Destination address
Alert signal
Clock information
Reassemble sequence code for the receiving computer
Data
Data
Trailer
Error checking component (CRC)
Figure 4.

Header

Completed Data Packet

Data

Trailer

The sending computer breaks data into smaller sections, adds addressing
information (e.g., source, destination, formatting, and error-checking) to it, and
prepares the data for actual transmission to the media, and over the network.
When the bits of data arrive at the destination computer, the process is
essentially reversed; the bits will be re-assembled as they pass up the software
layers. The receiving computer takes the data off the wire, brings in the data via
a network adapter card, strips off all transmission data from the packets, copies
the data from the packet into a buffer for re-assembly, and passes the
reassembled data to the Application Layer. This sequence, although simplified in
this example, is necessary for the transmission of data from one computer to
another in a form that is understood by the receiving computer and ultimately the
end-user.
TOSHIBA America Business Solutions

Electronic Imaging Division

11

Network Fundamentals
Manual

TOSHIBA

B.

Client/Server vs. Peer-to-Peer Networking

There are three basic configurations a local area network will operate under; a
peer-to-peer network, a client/server network, or a combination of the two (i.e.,
hybrid). Given the function, there are three basic roles that a computer will
assume on a network:
Client a client will utilize, but not provide network resources,
Peer a peer can utilize, and provide network resources, and
Server a server generally provides, but does not utilize network
resources.
In a Peer-to-Peer network, there is no centralized administration, and users
typically share their resources however they deem necessary. The end-user
stores resources on his/her local machine. There are no servers in a Peer-toPeer network, and therefore the network will generally have little or no security.
Peer-to-Peer networks are organized into logical groupings called workgroups.
In a Client/Server network, a server provides access to network resources
through centralized administration and security. No computer users can access
the resources of a network unless a server has authenticated them.
Authentication occurs when a user logs onto the network from a client machine
which has an account on the network server. Server-based networks provide a
single logon procedure which allows users to connect to multiple computers and
resources.
A hybrid network is a combination of Peer-to-Peer and Client/Server
components. Computers function as clients, peers, and servers, and the network
will likely have domains and workgroups. Although most shared network
resources will be located on a server, each peer also has the ability to share
resources. Users do not have to logon to domain controllers in order to have
access to local resources.
Security Models
Share Level (Password-Protected Shares)
Share level security is a simple method that allows any user to obtain access to
any resource if the user knows the password to that specific resource. This
security model is used primarily with Peer-to-Peer networks.
User Level (Access Permissions)
Security is based on permissions granted to the user during a network logon
session. Permissions are based on the user level such as administrator, print
manager, end-user, accounting etc. This method is more secure than the share
level permissions, which grant access to resources to anyone who knows the
password to the shared resource. This method of security is generally used with
TOSHIBA America Business Solutions

Electronic Imaging Division

12

Network Fundamentals
Manual

TOSHIBA
dedicated server operating systems, which maintain an ACL (Access Control
List).

C.

Network Operating Systems

The network operating system (NOS) is a supervisory software program that


resides on the server. It controls how the network operates by defining who can
use the network and how information and resources (e.g., printers, modems, and
file servers) are shared with other workstations. Without a NOS, computing
devices would remain isolated even when physically linked. A NOS will provide a
set of protocols for accepting requests from clients and responding to those
requests. In addition, a NOS will provide a shared file system, and security
features.
Most industry standard NOSs operate as dedicated servers and are controlled by
administrators who manage system policies, permissions, profiles, and security
issues. Client computers operate redirectors, which transmit requests for
network service to a dedicated network server. Common NOSs include:

D.

Novell IntranetWare
Microsoft Windows NT Server
AppleShare
Banyan Vines
IBM OS/2 Warp Server
Sun Microsystems Solaris
Unix/Linux

Selecting the Appropriate Topology

The physical layout of a network is its topology. The term topology has two
meanings regarding network cabling. One meaning refers to a logical description
that describes how the data signal travels. For example, in Token Ring the data
logically travels in a loop or a ring. The second meaning refers to how the
physical layout of the cable appears. For example, in Token Ring, the cable
topology often physically resembles a star arrangement. Conversely, Ethernet is
logically a bus topology, and can be installed as either a physical bus or a
physical star topology.
Three prevalent types of network topologies are star, bus, and ring, and include
hybrid designs of each topology. The topology of a given network depends on
the media access method(s) it uses and type(s) of cables that are installed.
Whereas small networks with clusters of network devices tend to employ only
one topology, large networks that span a wide physical area or several floors of a
building may use a combination of topologies.
TOSHIBA America Business Solutions

Electronic Imaging Division

13

Network Fundamentals
Manual

TOSHIBA
Star
A star topology describes a physical layout where cables emanate from a central
hub and terminate at a single computer. Each cable run is a point-to-point
connection. Token Ring, Ethernet, and ArcNet are all capable of being wired into
a physical star topology. Cable breaks in a star topology usually affect only one
station, however, if the central point (e.g., hub) fails, the entire network will not
function.
Figure 5.

Star Topology

Bus
A bus topology logically can be thought of as a single cable with two distinct
ends. Ethernet is logically a bus topology, and when installed with 10Base2 or
10Base5 cable (see Section II. E), it is a physical bus as well. Physical bus
implementations allow the nodes (devices) to attach at various points along the
cable. When a device transmits onto the bus, data travels in both directions
toward the ends of the cable. Each cable end must be terminated with a resistor
in order to absorb the signal energy when it reaches the end of the cable. If a
cable is not properly terminated, each packet may reflect and collide with itself
causing errors. Cable breaks in a physical bus implementation affect all
computers attached to the bus.
Figure 6.

Bus Topology

TOSHIBA America Business Solutions

Electronic Imaging Division

14

Network Fundamentals
Manual

TOSHIBA
Ring
A ring topology circulates packets in a loop or a ring. The data on a given ring
always travels in one direction. Each device is physically part of the ring in that
the signal actually passes into then out of each device. Each device regenerates
and transmits the signal to the next device in the ring. FDDI (Fiber Distributed
Data Interface) is composed of two rings, one moves data in a clockwise
direction while the other moves data in a counter-clockwise direction. The dual
rings can keep the network operational in the event of a cable break.
Figure 7.

Ring Topology

Star-Wired Ring
The star-wired ring has essentially replaced the ring topology in practical use.
Networks based on star-wired ring topologies have nodes radiating from a wiring
center or hub. The hub acts as a logical ring with data packets traveling in
sequence from port to port. Similar to a star topology, if one node fails, the
network will continue to operate.
Figure 8.

Star-Wired Ring Topology

TOSHIBA America Business Solutions

Electronic Imaging Division

15

Network Fundamentals
Manual

TOSHIBA
Star Bus
The star bus topology links several star hubs together with bus trunks. If one
computer fails, the hub can detect the fault and isolate the computer. If a hub
fails, computers connected to it will not be able to communicate, and the bus
network will be broken into two segments.
Figure 9.

Star Bus Topology

The topology selected for a given network is based on a combination of several


issues, some of which include cost, number of users, distance between nodes,
and scalability. A summary of topology advantages and disadvantages are
presented in Table 2.
Table 2.
TOPOLOGY

Bus

Ring

Star

Topology Summary

ADVANTAGE
Simple, reliable in small networks.
Inexpensive, and easy to expand
with BNC connectors and
repeaters.

Every computer given equal


access to token; no one computer
can dominate the network. If
capacity is exceeded,
degradation is graceful rather
than a sudden failure.
Easy to modify and add new
computers. Easy to troubleshoot.
Single computer failure will not
bring down entire network.
Supports multiple cable types.

TOSHIBA America Business Solutions

Electronic Imaging Division

16

DISADVANTAGE
Difficult to troubleshoot. A cable
break along the bus will bring
down the network. Heavy
network traffic can slow a bus
considerably. Each BNC can
weaken the signal.
Failure of one node can bring
down the ring. Adding or
removing a computer from the
ring disrupts communication.
Difficult to isolate problems.
Central point failure brings down
entire network. Cost is high due
to centralizing all nodes into one
point. May require central device
to switch or rebroadcast signal.
Network Fundamentals
Manual

TOSHIBA

E.

Selecting the Appropriate Media

Cable is what physically connects network devices together, serving as the


conduit for information traveling from one computing device to another. The type
of cable utilized for a given network will be dictated in part by the network's
topology, size and media access method. Small networks may employ only a
single cable type, whereas large networks tend to use a combination of different
types of cable (e.g., copper wire, and fiber).
The three most common types of cable utilized throughout the world are twisted
pair, coaxial, and fiber. A brief discussion of each of these types of cables
follows.
Twisted Pair Cable
Twisted-pair cable is a generic term that describes many different cable styles
and specifications. Terminology associated with twisted-pair cabling originated
within the telephone company community. Cable may or may not include
shielding; UTP is unshielded twisted-pair while STP is shielded twisted-pair.
UTP wiring, carries signal 100 meters. UTP is susceptible to crosstalk, which is
signal overflow from adjacent wires.
STP wiring, carries signal 100 meters. STP has a foil or braided jacket around
wiring to help reduce crosstalk and to prevent electromagnetic interference.
Figure 10.

Twisted Pair Cable

STP

Shielding

TOSHIBA America Business Solutions

Electronic Imaging Division

17

Network Fundamentals
Manual

TOSHIBA
Table 3.
CATEGORY
1
2
3
4
5

Cable Type

MEDIA (TYPICAL)
Voice
Voice
Data
Data
Data

SPEED
N/A
4Mbps
10Mbps
16Mbps
100Mbps

The number of pairs of wires in a cable is typically specified (e.g., 4 pair or 2


pair). Typically solid conductor twisted-pair cable is installed through the walls
and ceiling.
Each in-wall cable typically terminates in a wall plate connection near the user
workspace and at a patch panel near the central hub. Twisted pair cable uses
RJ-45 connectors. Patch cables connect the workstation to the wall plate
connection; another patch cable connects the patch panel connection to a port
on the central hub. Twisted-pair cabling is manufactured to various
specifications regarding the number of twists per foot, wire gauge size, and
electrical characteristics (e.g., Category 3 or Category 5).
Coaxial Cable
Coaxial cable falls into two main categories, thick or thin. With thin cables there
are several styles, for example Ethernet uses one style while ArcNet uses
another. Characteristics such as maximum length, number of devices allowed,
and connector types also vary. Thin cable typically uses BNC (British Naval
Connectors) connectors.
The core carries the data while the braided metal near the outside provides
shielding to prevent interference from electrical noise and crosstalk.
The conducting core and the wire mesh must never come in contact with each
other. Coaxial cable is more resistant to interference and attenuation than
twisted pair cabling. Coaxial cable will transmit voice, data and video.
Figure 11.

Coaxial Cable

Outer shield
Insulation (PVC, Teflon)

Copper wire mesh or aluminum sleeve


TOSHIBA America Business Solutions

Electronic Imaging Division

18

Conducting core

Network Fundamentals
Manual

TOSHIBA
Thinnet Coaxial Cable
0.25 inches diameter
Carries signals up to 185 meters
Known as RG-58 family
50 Ohm impedance
Thicknet Coaxial Cable
0.5 inches diameter
Carries signals up to 500 meters
Known as Standard Ethernet
Generally used as a backbone
Fiber-Optic Cable
Fiber-optic cable is constructed of flexible glass and plastic. In fiber-optic cable,
the optical fibers (i.e., glass) carry digital signals in the form of modulated
pulses of light (i.e., photons). Each glass strand passes signals in only one
direction, therefore a fiber cable must consist of two strands in separate jackets;
one strand transmits data and one strand receives data.
Figure 12.

Fiber-Optic Cable

Optical Fiber (core)

Glass Clading

Fiber Optic Connector


Protective Outer Sheath
Kevlar

Fiber-optic cable is resistant to electronic interference and therefore is ideal for


environments with a considerable amount of noise (e.g., electrical interference).
Furthermore, since fiber-optic cable can transmit signals further than coaxial and
twisted-pair, more and more companies are installing it as a backbone in large
facilities and between buildings. The cost of installing and maintaining fiber-optic
cable remains too high, however, for it to be a viable network media connection
for small networks. Fiber-optic cable transmissions are not subject to electrical
interference and are extremely fast (e.g., 100Mbps- 1Gbps).
TOSHIBA America Business Solutions

Electronic Imaging Division

19

Network Fundamentals
Manual

TOSHIBA
Signal Transmission
There are two primary methods of data transmission regarding cables; baseband
and broadband.
Baseband
baseband systems use digital signaling over a single frequency
signals flow in the form of pulses of electricity or light
the entire communications channel capacity is used to transmit a single
data signal
each device on a baseband network transmits bi-directionally
some devices can transmit and receive at the same time
signals decrease in strength as they travel along the cable
repeaters are used to retransmit the signal along the cable
Broadband
transmission signal flow is unidirectional
signals are continuous and non-discrete
broadband systems use analog signaling and a wide range of frequencies
signals flow across the medium in the form of electromagnetic or optical
waves
requires amplifiers to regenerate analog signals at their original strength
can transmit in the multi-megabit and gigabit range
If sufficient total bandwidth is available, multiple analog transmission systems
such as cable television and network transmissions can be supported
simultaneously on the same cable. Since broadband transmission signal flow is
unidirectional, there must be two paths for data to flow in order for a signal to
reach all devices. A mid-split broadband system divides bandwidth into two
channels; one channel transmits data and one channel receives data.

F.

Media Access Methods

In order for computers to effectively share access with other devices over a given
medium, specific rules must be implemented to enable error-free transmission. A
media access method defines how computing devices access the network cable
and send data. Ethernet, Token Ring and LocalTalk (Apple) media access
methods are used primarily for connecting desktop machines (computers,
printers etc.) to the network, whereas FDDI, CDDI, Fast Ethernet and ATM are
used primarily for high-speed backbones, high-speed network access (e.g. file
servers) and very high-speed workgroup applications. There are two primary
approaches to media access control; 1) contention, and 2) deterministic.
Contention
Within the contention approach, there are two functional types of media access
control. Each type is used to determine if more than one node is attempting to
TOSHIBA America Business Solutions

Electronic Imaging Division

20

Network Fundamentals
Manual

TOSHIBA
access the network at the same time. They both are based on sensing signals
each computer emanates to the network cable, hence the name Carrier Sense
Multiple Access (CSMA). CSMA is used in two different capacities; collision
detection (CD), and collision avoidance (CA).
CSMA/CD uses a method where every node on a network will wait to send data
only when no other computers are heard on the cable. When a computer
detects another computer transmitting, the network adapter card assumes a
collision has occurred and it will not transmit its own data. The computer using
CSMA/CD will wait until the network is silent before sending its own data. This
method attempts to avoid data collisions caused by more than one computer
transmitting data at the same time.
CSMA/CA is similar to CSMA/CD in that each computer waits for a silent cable.
However, CSMA/CA does not check for collisions by listening for other
computers transmitting. CSMA/CA will evaluate whether the data was
successfully transmitted by waiting for an acknowledgment from the recipient. If
an acknowledgment is not received, it assumes the transmission between the
two computers will be resent, and therefore it will not send its own data. If an
acknowledgement is detected, the sending computer will assume a free line
and begin data transmission.
Deterministic
This method of media access control allows a level of certainty as to the
maximum time a computer will have to wait to gain access on the network. This
is usually accomplished by passing a token between computers on the network.
When a computer receives the token, it is allowed to transmit its data onto the
cable. After the recipient has acknowledged the arrival of data, the sending
computer will release the token, which allows other computers to capture it
(token) and transmit data.
Demand Priority
It is possible that two computers, listening to the network for silence, may
transmit data at exactly the same time. Demand Priority utilizes the hubs and
repeaters of a network, where data will be given priority if two computers transmit
data at exactly the same time. The data with the highest priority is allowed to
transmit first. If the data have the same priority, Demand Priority method allows
for the transmission of both data but alternates between small blocks from each
computer.
Although there are other media access method controls, and newer ones
currently being developed, the aforementioned methods are the most common
ways of controlling access in todays network environments. Table 4 presents a
summary of media access control methods.

TOSHIBA America Business Solutions

Electronic Imaging Division

21

Network Fundamentals
Manual

TOSHIBA
Table 4.
ACCESS METHOD

Media Access Methods (Typical)

Ethernet

ACCESS METHOD
CONTROL
CSMA/CD

Star or Bus

Fast Ethernet
Token Ring
LocalTalk
FDDI
CDDI
ATM

Demand Priority
Deterministic
CSMA/CA
Deterministic
Deterministic
Dedicated circuits

Star
Star-wired Ring
Bus
Dual ring, Star-wired ring
Star-wired ring
Star

G.

TOPOLOGY

COMMON CABLES
USED
Twisted-pair, coaxial,
fiber
Twisted-pair, fiber
Twisted-pair, fiber
Twisted-pair
Fiber
Twisted-pair
Fiber, twisted-pair

Network Architecture

The structure of a networks architecture is defined by a set of standards and


techniques necessary for designing and building network communication
systems. There are third-party proprietary architectures such as IBMs SNA
(Systems Network Architecture) and DECs DNA (Digital Network Architecture).
In addition there are open architectures such as the OSI (Open Systems
Interconnection) Model defined by the ISO.
The following provides a discussion of one of the most common network
architectures in existence today, Ethernet. In addition, a brief overview of Fast
Ethernet, Token Ring, LocalTalk, FDDI, and CDDI will be discussed.
Ethernet Overview
Ethernet is the most widely used LAN technology in use today. Approximately
80% of LANs today use Ethernet for installed network connections. The IEEE
specification 802.3 defines the Ethernet standard. The Ethernet specification
covers rules for configuring LANs, the type of media that can be used, and how
the elements should be networked together. The Ethernet protocol provides the
services called for in the Physical and Data Link Layers of the OSI reference
model.
Every Ethernet network adapter is identified by an address. This address is 48
bits long, and all manufacturers of Ethernet equipment cooperate to make sure
that this address is unique; it is different for every single Ethernet device. This
address is called the MAC (Media Access Control) address.
One element of the 802.3 specification states that Ethernet networks run at 10
million bits per second (10Mbps) or at a rate of 100 million bits per second
(100Mbps) which is commonly refereed to as Fast Ethernet. The transmission of
data at these rates is what is referred to as how fast the traffic is on the network.

TOSHIBA America Business Solutions

Electronic Imaging Division

22

Network Fundamentals
Manual

TOSHIBA
In addition to the speed of network traffic, specification 802.3 defines the access
method used by computers connected to the LAN. The specified access method
is CSMA/CD.
On an Ethernet network, a single communication environment (the ether)
propagates signals from one computer to every other computer. All computers
are free to put signals on the wire at any time. Occasionally, two computers will
send signals out at the same time. When this happens, a collision is said to
occur. The computer networking hardware is designed to detect such a collision.
When a collision occurs, both computers wait a random length of time, and then
re-send their messages.
Ethernet Wiring
Ethernet can be implemented at different data transmission speeds and over
different types of media. This portion of the 802.3 Ethernet specification
addresses the Physical Layer of the OSI reference model. There are several
different Physical Layer (e.g., media) specifications. The following list describes
the different varieties of Ethernet. Note that the first number in the name refers
to the speed in Mbps, Base refers to baseband, and the last number represents a
distance standard (or a T for twisted pair).
10BaseT
10 Mbps, baseband transmission
Maximum length of a 10BaseT segment is 100 meters (328ft)
Minimum cable length between computers is 2.5 meters
A 10BaseT LAN will serve 1,024 computers
Twisted pair cable categories 3, 4 or 5
Hub to Card/Transceiver distance 100 meters
Backbones for Hubs, Coaxial or fiber-optic to join a larger LAN
Total computers per LAN without connectivity components, 1024 by
specification
Uses RJ-45 connectors
10Base2
10 Mbps, baseband transmission
Thinnet coaxial cable (RG-58), 0.25 inches diameter
Maximum length of a 1OBase2 segment is 185 meters (607ft)
Five segments connected by four repeaters
5-4-3 Rule, three of the five segments may be populated
Maximum total network length 925 meters (3,035ft)
Minimum cable length of 0.5 meters (20 inches)
Maximum 30 computers (and repeaters) per 185 meter segment
Maximum number of computers per network without connectivity
components, 1024 by specification
Uses BNC connectors
TOSHIBA America Business Solutions

Electronic Imaging Division

23

Network Fundamentals
Manual

TOSHIBA
Because normal Ethernet limits would be too confining for a large business,
repeaters can be used to join Ethernet segments and extend the network to a
total length of 925 meters.
10Base5 - Standard Ethernet
10 Mbps, baseband transmission
Thicknet coaxial cable, 0.50 inches diameter
Maximum length of a 10Base2 segment is 500 meters
Five segments connected by four repeaters
5-4-3 Rule, three of the five segments may be populated Maximum
total network length 2,500 meters (8,200ft)
Maximum computer-to-transceiver distance 50 meters (164ft)
Minimum distance between transceivers 2.5 meters (8ft)
Maximum I 00 computers (and repeaters) per segment
5-4-3 Rule
A Thinnet network can combine as many as five cable segments connected by
four repeaters, but only three segments can have client workstations attached.
Therefore, two segments are untapped and are often referred to as inter-repeater
links; this is known as the 5-4-3 rule.
10BaseFL
Ethernet over Fiber-Optic cable. 10BaseFL (10Mbps, baseband, over fiber-optic
cable) is an Ethernet network that typically uses fiber-optic cable to connect
computers and repeaters.
The primary reason for using 10BaseFL is for long cable runs between repeaters,
such as between buildings. The maximum distance for a 1OBaseFL segment is
2,000 meters.
100VG-AnyLAN
Designed by Hewlett-Packard and combines elements of Ethernet and Token
Ring. Defined by 802.12 which specifies a standard for transmitting 802.3
Ethernet frames and 802.5 Token Ring packets. Also known as 100BaseVG, VG
and AnyLAN.
100BaseX (Fast Ethernet)
100BaseT4 (4-pair Category 3, 4, or 5 UTP)
100BaseTX (2-pair Category 5 UTP or STP)
100BaseFX (2-strand fiber optic cable)
In a 10Base2 network, a single length of coaxial cable connects the entire
network. The diagram below presents a 10Base2 configuration using Thinnet
(RG-58) cable and BNC connectors.

TOSHIBA America Business Solutions

Electronic Imaging Division

24

Network Fundamentals
Manual

TOSHIBA
Figure 13.

Thinnet Bus

Coaxial Cable

The connection at each computer is


made with a BNC T-connector.
T Connector

Connector to
Computer NIC

Coaxial Cable

The computer at the end of the wire uses


a BNC - T Connector with a terminator.
T Connector
Terminator

Connection to
Computer NIC

The electrical properties of the RG-58 cable system are critical. Proper
grounding is vital to correct data transmission. Physical damage to the cable,
such as a crimp, can bring down all communication. Missing one of the two
terminators will also prevent communication.

TOSHIBA America Business Solutions

Electronic Imaging Division

25

Network Fundamentals
Manual

TOSHIBA
10BaseT and 100BaseT Network
Both 10BaseT and 100BaseT networks are wired together using twisted pair
cable similar to the type that is used for telephone connections. In both cases,
the cable must meet rigid electrical specifications. The higher speed 100BaseT
must meet a specification called Category 5. To all outward appearances,
10BaseT and 100BaseT networks look physically identical.

Hub

Figure 14.

Twisted Pair Network

In a 10BaseT or 100BaseT network, all of the computers are wired into a single
connection point, called a hub. The hub takes the signal out of each computer
and connects that signal to all the other computers via ports. Because each
computer is connected to the hub separately, a bad cable will only affect a single
computer. The cable plugs into the hub and the computer using a RJ-45
connector, which is similar to a large telephone jack. BNC T-connectors and
terminators are not used with xBaseT network devices.

Figure 15.

RJ-45 Connector

TOSHIBA America Business Solutions

Electronic Imaging Division

26

Network Fundamentals
Manual

TOSHIBA
Table 5.
SPECIFICATION
Topology
Cable Type
Connection to Adapter
Terminator resistance (OHMS)
Max. Cable Length
Max. Segments
Max. Network Length
Max. PCs Per Segment

IEEE 802.3 Ethernet

10BASE2
Bus
RG-58 Thinnet Coax
BNC T-Connector
50
185 m
5 (using 4 repeaters) with
only 3 populated segments
925m
30 (1024 per network)

10BASET
Star Bus
Category 3, 4, 5 UTP
RJ-45
Terminator Not Used
100m
5 (using 4 repeaters) with only 3
segments populated
N/A
1 (each PC has cable to hub)

Fast Ethernet
Fast Ethernet refers to 100 Mbps Ethernet. There are two significant sources of
supporting technology regarding the implementation of this network type. One
supports 100BaseVG, a significant modification to CSMA/CD. The second,
comprised of more than 80 companies (known as the Fast Ethernet Alliance),
supports 100BaseT, which at the MAC layer, retains many of the same
characteristics as 10BaseT.
100BaseVG and 100BaseT are not compatible with each other or with existing
IEEE 802.3 Ethernet standards. They each have their own standards, IEEE
Standard 802.3u for 100BaseT, and 802.12 for 100BaseVG. Specific bridges,
routers or switches must be used to interconnect these technologies.
Token Ring
The Token Ring architecture was developed by IBM Corporation in the mid1980s and subsequently defined by the IEEE in Project 802. Since Token Ring
is IBM's preferred method for networking, it is found primarily in large IBM mini
and mainframe installations. Due to the increasing popularity of Ethernet, the
rate of growth of Token Ring networks has decreased. Token Ring networks use
a star-wired ring topology over UTP and STP wiring. A hub (referred to as a
MAU [Multi-Station Access Unit]) is at the center of the ring. Two versions of
Token Ring are available: 4 Mbps and 16 Mbps.
Token Ring networks use a token passing media access control mechanism to
circulate packets around the ring. An electronic token travels from station to
station in a single, logical direction. If the token is free, a station can attach data
to the token, change the token's status to busy, and then send the token on to
the next station. Each consecutive station then checks the destination address
of the data to see if it should process the data. If the destination address does
not match the computer viewing it, it then passes the token on. When the station
that originated the token receives it back, it removes the data from the token and
changes the token status back to free.
TOSHIBA America Business Solutions

Electronic Imaging Division

27

Network Fundamentals
Manual

TOSHIBA
LocalTalk
LocalTalk is a proprietary media access method built into Apple Macintosh
computers and LaserWriter printers. LocalTalk networks are best suited to small
networks using Macintosh computers (e.g. an independently networked
classroom). With LocalTalk, computers are set up in a bus configuration using
both UTP and STP wiring. LocalTalk transmits at only 230 Kbps or about 1/40
the rate of Ethernet. For this reason, many schools and universities are
upgrading their LocalTalk Macintosh installations to Ethernet in order to handle
larger file transfers. LocalTalk uses the CSMA/CA media access control
mechanism for transmitting data.
FDDI
The FDDI (Fiber Distributed Data Interface) media access method transfers data
at very high speeds (100Mbps) over fiber-optic cable. Like Token Ring, this
access method employs a token passing media access control mechanism to
transmit data. FDDI, however, uses a dual counter-rotating ring topology,
meaning there are two rings of cable with two tokens circulating in opposite
directions. This set-up creates a relatively fault tolerant network. Many
institutions are installing fiber-optic backbone cables to carry Ethernet signals
today and FDDI signals in the future.
CDDI
CDDI (Copper Distributed Data Interface) is an emerging technology that uses
the FDDI media access control mechanism over copper (unshielded twisted-pair)
cable. It is employed in a limited fashion to connect file servers and high
performance workstations directly to an FDDI backbone. A clear disadvantage of
CDDI is that the cost per port remains too high for it to be considered a viable
networking solution for the typical desktop computer.

H.

Selecting the Appropriate Connectivity Devices

Network Adapters
The network adapter (Network Interface Card [NIC]) is the physical link between
the computing device and the network cable. Typically, a network adapter is a
card that slides into a computing device's expansion slot, providing a connector
for attaching the network cable. A network adapter card is seated in either an
ISA (Industry Standard Architecture) 8- or 16-bit slot, or a PCI (peripheral
component interconnect) 32-bit slot.
Network adapters can also be external units or built directly onto a device's
motherboard. Network adapter cards are designed for a specific type of network,
such as Ethernet, Token Ring, or FDDI. They operate at the Physical Layer of
the OSI protocol stack.
A network adapter converts parallel bus data into serial data for transmission
over a wire.
TOSHIBA America Business Solutions

Electronic Imaging Division

28

Network Fundamentals
Manual

TOSHIBA
Before a successful data transmission can be accomplished, the sending and
receiving network adapter establish an electronic dialog and must agree on
specific criteria such as;

the maximum size of data groups to be sent,


the amount of data to be sent before a confirmation,
the time interval between sending data groups,
the time interval to wait before confirmation is sent, and
how much data each NIC can hold before it overflows.

There are several methods used to increase the transmission rate of data from
the network adapter card to the wire;

Direct Memory Access data moves directly from the network adapter
card to the CPU,
Shared Adapter Memory the computer will use the memory onboard
the network adapter,
Shared System Memory the network adapter card will use computer
memory,
Bus Mastering network adapter card takes temporary control of the
computers bus,
Buffering RAM, and
Onboard Microprocessor - the network adapter does not rely on the
CPU.
Figure 16.

Typical Network Adapter Card

Interrupt Request Lines (IRQ)


Interrupt request lines are hardware lines over which devices can send interrupts
or requests for service to the computer's central processing unit (i.e., CPU). If
the CPU is performing another task, the input, through the interrupt, allows
devices to get the attention of the processor. Generally, IRQ settings must be
specific for each device in order to avoid a conflict. Therefore, when installing a
NIC, it is important to locate a free IRQ setting (e.g., one that is not already in
TOSHIBA America Business Solutions

Electronic Imaging Division

29

Network Fundamentals
Manual

TOSHIBA
use). Most NICs are set to IRQ 5 since most computers on a network do not
have sound cards or second printers. Following is list of standard IRQ settings
typically found on most computers.
Table 6.

Common IRQ Settings

IRQ

DEVICE

Keyboard

Video (redirected IRQ 9)

Com 2, Com 4

Com 1, Com 3

Sound, LPT2, NIC

Floppy Disk Controller

LPT1

Real Time Clock (Reserved)

Redirected IRQ 2

10

Available

11

Available

12

Mouse

13

Co-Processor

14

HD Controller

15

Available

I/O Base Port Address


In addition to IRQ settings, most devices will use a small portion of upper
memory to send and receive data from the CPU. The I/O base port specifies a
channel through which information flows between the computer's hardware and
its CPU. The port appears to the CPU as an address.
Each hardware device in a system must have a unique I/O base port number
address. The port numbers are in hexadecimal format. The most common
addresses for NICs are 300 to 30F and 3l0 to 31F.
Hub (Repeater)
Hubs are also referred to as repeaters. Repeaters regenerate signals for
retransmission, and move packets from one physical media to another.
Repeaters will pass broadcast storms; they do not perform any isolation of
packets. Repeaters are used to extend the length of a network segment or to
connect different media types such as Ethernet Thicknet to Ethernet Thinnet.
Repeaters cannot connect dissimilar media access methods together. For
example, repeaters cannot connect a Token Ring segment to an Ethernet
segment. Repeaters amplify and regenerate signals to their original level and
operate at the Physical Layer of the OSI Model.
TOSHIBA America Business Solutions

Electronic Imaging Division

30

Network Fundamentals
Manual

TOSHIBA
Standard 10BaseT Hub
A standard 10BaseT hub is a typically an active (electrically powered) multi-port
repeater with RJ-45 connections. It connects multiple computers running
10BaseT cable. The hub receives a signal from one computer (from its
respective port) and sends the information to all the other connected ports. All
connected devices must be running 10BaseT cable (Cat 3, 4, or 5) and 10BaseT
network adapter cards.
100BaseT Hub (Fast Hub)
A fast hub works the similar to a 10BaseT hub, but supports network
transmission rates of 100Mbps. All connected devices must be running
100BaseT Ethernet network adapter cards, Cat 5 cable, and use RJ-45
connectors.
10/100BaseT Hub
A 10/100BaseT hub operates by combining the transmission speed capabilities
of 10- and 100 Mbps. It includes the functionality of a 10BaseT hub, a 100BaseT
hub and utilizes a switch to translate between the two transmission speeds.
Each port will switch between 10BaseT and 100BaseT as required by the device
connected to it. It does not provide the dedicated circuit of a switch, but it does
provide a lower cost way to mix 10BaseT and 100BaseT on the same network.
Note: The switch used in a 10/100BaseT hub is not to be confused with a
Switching Hub described in the following section.
Bridge
Bridges are used to segment networks; they forward packets based on address
of destination node. Bridges use RAM to build a routing table based on
hardware addresses, and will connect dissimilar network topologies such as
Ethernet and Token Ring. Bridges will forward all protocols. Bridges are similar
to repeaters in that they cannot distinguish protocols. Bridges also regenerate
signals at the packet level and over time learn the MAC address of devices
connected to network segments. As the bridge learns its environment, it begins
to isolate packets to those network segments where the destination computer
resides. Bridges forward all broadcasts to all attached segments.
Switches
Switches are hubs with bridging capabilities. Switches filter traffic through MAC
addresses. Switches are used when upgrading to 100mb Fast Ethernet. The
purpose of switching is to increase LAN performance by reducing the number of
workstations on each LAN segment. The switch itself moves frames between
ports at very high speeds so it does not introduce any delay to the network. The
best performance is achieved with one workstation per port so that there is no
contention at all when that workstation wants to transmit. The switch sets up a
port connection between the sender and receiver for the duration of the
transmission.
TOSHIBA America Business Solutions

Electronic Imaging Division

31

Network Fundamentals
Manual

TOSHIBA
A switch, or switching hub, monitors the MAC address of each device connected
to it. When a computer sends a packet to a switch, the switch examines the
MAC address of the destination computer. Rather than sending this packet to all
computers, the switch will send this packet only to the computer where it is
destined to go. A switch greatly enhances communication bandwidth in an
environment where packets are being sent between a lot of different computers.
In an environment where all packets are going to or from a single machine (e.g.
all workstations are sending to and receiving from a single file server) upgrading
to a switch will not have a great effect.
10BaseT Switch
A 10BaseT switch is essentially a multi-port repeater that operates at a maximum
10 Mbps. The difference between the repeater and the switch is based on the
capabilities of the port. The repeater will only pass on transmissions to all other
ports, while the switch will send transmissions to a specific port.
10/100BaseT Switch
A 10/100 switch is similar to a 10BaseT switch, but each port can run at either
10BaseT or 100BaseT transmission speed. Using a 10/100 switch you can take
advantage of a 100BaseT connection to your file server while keeping 10BaseT
connections to your workstations. You can also use a 10/100 switch to migrate
slowly from 10BaseT to 100BaseT.
Router
A router routes packets across multiple networks. Routers use RAM to build a
routing table based on network addresses (i.e., IP address). A router shares
status and routing information to other routers to provide better traffic
management and bypass slow network connections. Routers are slower than
bridges due to complex functions. A router strips off Data Link Layer source and
destination addresses and then recreates them for packets. Routers can
accommodate multiple active paths between LAN segments. Routers will not
forward non-routable protocols such as NetBEUI. Routers operate at the
Network Layer of the OSI Model and function by disassembling packets. Once
open, the router examines the packet for its desired destination address. The
router then decides which port to forward the packet onto. Routers perform an
excellent job of isolating network traffic and limiting broadcasts. Like bridges,
routers can also link unlike networks such as Ethernet and Token Ring.
Gateway
Gateways are highly complex devices used to link two or more networks with
different network architectures. For example, a gateway would provide
conversion and translation from Ethernet to IBM's SNA architecture when a PC
workstation on a LAN needs to access an IBM mainframe, or when connecting
Novell servers to Microsoft servers.

TOSHIBA America Business Solutions

Electronic Imaging Division

32

Network Fundamentals
Manual

TOSHIBA

I.

Selecting the Appropriate LAN Protocol

A protocol is a set of rules and conventions for sending information over the
network. These rules govern the content, format, timing, sequencing, and error
control of messages transmitted between network devices. A protocol can be
compared to a language; just as two different people might use two different
languages to communicate through the same telephone hardware, a physical
network can support more than one type of transport protocol. A network
operating system, such as Microsoft Networking, may support more than one
type of transport protocol.
Multiple protocols may be bound to a single network adapter card. For example,
a computer may utilize TCP/IP, NetBEUI, or IPX/SPX, and operate with one
network adapter. The order in which the protocol is bound determines the order
of use by the computer. For example, if IPX/SPX is bound first, IPX/SPX will be
used to attempt to make a network connection. If the connection fails, the
computer will transparently attempt to use the next protocol bound to the network
adapter card.
NetBEUI (NetBIOS Enhanced User Interface)
NetBEUI is a simple network layer transport protocol developed to support
NetBIOS networks. NetBEUI is easily installed (self-configuring, and self-tuning),
and requires low memory overhead. The disadvantages to using NetBEUI
include its inability to transmit across a router, there is no support for cross
platform applications, NetBEUI can generate more traffic than other protocols,
and it does not scale beyond small networks.
IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)
Novell NetWare servers and clients use this protocol. NWLink is the Microsoft
implementation of IPX/SPX. This protocol works well in both LAN and WAN
environments, and is routable. This protocol is usually required to access file
and print services on a Novell server. Until very recently it was the only protocol
natively supported by Novell NetWare. NetWare uses different frame types in
connection with protocol use. The frame type adhering to the standard 802.3
was used as the default in NetWare 3.11. The frame type adhering to the
standard 802.2 was the default for subsequent releases of NetWare. Not all
NetWare networks use the default frame type. If the frame type cannot be
determined, many devices can automatically detect the frame type.
TCP/IP (Transmission Control Protocol/Internet Protocol)
This protocol has become the defacto standard worldwide due to its popularity. It
works well in both LAN and WAN environments, is routable, and is supported by
many operating systems and platforms. This protocol is required to access the
Internet. Microsoft networking supports TCP/IP for Windows 95 and later clients,
and for Windows NT. Every device on a TCP/IP network must have a subnet
mask, and a unique IP address. If the device is located on a segmented
TOSHIBA America Business Solutions

Electronic Imaging Division

33

Network Fundamentals
Manual

TOSHIBA
network, a default gateway is also required. TCP/IP is supported by the latest
version of Novell NetWare (NetWare 5.0). Based on the worldwide use of
TCP/IP as a common protocol, additional discussion regarding TCP/IP is
presented in the foregoing section.

TCP/IP is a standard communication language (i.e., protocol) used


extensively throughout the world. It is the predominant protocol utilized
on the Internet and in private networks (i.e., Intranet, Extranet).

TCP and IP were developed by a Department of Defense (DoD)


research project in order to connect a number of different networks
(designed by different vendors) into a network of networks. The
project was initially successful because it provided a few basic services
everyone needed, including file transfer, electronic mail and remote
logon. In December 1968, the Advanced Research Projects Agency
(ARPA) awarded Bolt, Beranek and Bewman a contract to design and
deploy a packet switching network. The project was called ARPANET
and four nodes were in place by the end of 1969; connections to
Europe were established by 1973.

The initial host-to-host communication protocol used in ARPANET was


the Network Control Protocol (NCP). NCP soon proved to be unable
to maintain the growing network traffic load, and subsequently, TCP
and IP were proposed and implemented in 1974. These two protocols
provided a more robust suite of communications protocols. TCP and
IP have had numerous revisions with the most notable being IP version
6, which was released in December 1995. In 1983, the DoD mandated
that all of their computer systems would use the TCP/IP protocol suite
for wide area communications.

TCP/IP is not a single protocol, but rather a suite of protocols. Several


of the protocols (e.g., TCP, IP, and UDP) provide "low-level" functions
necessary for applications. Other protocols are necessary for
conducting specific tasks (e.g., transferring files between computers,
sending mail, or finding out who is logged in on another computer).
These services should be present in any implementation of TCP/IP,
except that micro-oriented implementations may not support computer
mail. These traditional applications still play an important role in
TCP/IP-based networks.

The core of the TCP/IP protocol suite consists of TCP, and IP.
Together, these two protocols compose a two-layered program. The
upper layer (Transport) consists of TCP. TCP manages the
assembling of a message or file into smaller packets that are
transmitted over the Internet and received by a TCP layer on the client
machine that reassembles the packets into the original message. The

TOSHIBA America Business Solutions

Electronic Imaging Division

34

Network Fundamentals
Manual

TOSHIBA
lower layer (Internet) consists of IP. IP manages the address portion
of each packet in connection with the destination. Each gateway
computer on the network checks this address to see where to forward
the message. Even though some packets from the same message are
routed differently than others, the packets will be reassembled at the
destination machine.

TCP/IP uses the client/server model of communication in which a


computer user (a client) requests and is provided a service (such as
sending a Web page) by another computer (a server) in the network.
TCP/IP communication is primarily point-to-point; communication is
from one point (or host computer) in the network to another point or
host computer

Many Internet users are familiar with the even higher layer application
protocols that use TCP/IP to connect to the Internet. These include;
Data Transfer Utilities (Hypertext Transfer Protocol [HTTP], File
Transfer Protocol [FTP], Trivial File Transfer Protocol [TFTP], and
Remote Copy [RCP]); Remote Execution Utilities (Telnet, Remote
Shell [RSH], and Remote Execution [REXEC]); and Printing Utilities;
(Line Printer Daemon [LPD], Line Printer Requestor [LPR], and Line
Printer Queue [LPQ]). In addition, the Simple Mail Transfer Protocol
(SMTP), and Simple Network Management Protocol (SNMP) are
included with TCP/IP. These and other protocols are often packaged
together with TCP/IP as a "suite."

Personal computer connections to the Internet are usually through the


Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol
(PPP). These protocols encapsulate the IP packets in order to deliver
them over wide areas from a dial-up phone connection. To this end,
PPP and SLIP may be considered WAN protocols while TCP/IP may
be considered a LAN protocol.

Protocols related to TCP/IP include the User Datagram Protocol


(UDP), which is used instead of TCP for special purposes. Other
protocols are used by network host computers for exchanging router
information. These include the Internet Control Message Protocol
(ICMP), the Interior Gateway Protocol (IGP), the Exterior Gateway
Protocol (EGP), and the Border Gateway Protocol (BGP).

TOSHIBA America Business Solutions

Electronic Imaging Division

35

Network Fundamentals
Manual

TOSHIBA
Figure 17.

TCP/IP Protocol Suite


Protocols
Services

OSI Model

TCP/IP
Protocol
Layers

Application
FTP
Presentation

Telnet
TFTP

SMTP

LPD
LPR
LPQ

RCP
HTTP

Session
Transport

TCP

UDP

Data Link

IGMP
Internet

IP
ARP/RARP
LAN Technologies:
Ethernet, Token
Ring, FDDI

Application

Transport
ICMP

Network

SNMP
REXE
C
RSH

WAN Technologies:
Serial Lines Frame
Relay, ATM

ARPANet

Network

Common TCP/IP Protocols by Layer


TCP/IP represents a collection of network protocols, services, and utilities that
provide services at the network and transport layers of the OSI Model. The
foregoing section presents the most common of these components organized by
the layer in which they are managed.
Application Layer:

Provides the ability of one application to communicate


with another application independent of the hardware
platform.

TELNET
runs commands interactively in a terminal emulation application
uses TCP to achieve virtual connection between client and
server
ability to transfer binary data, emulate graphics terminals,
support macros
Allows a client to appear as a terminal directly attached to the
host (terminal emulation)
Text mode, menus, and command execution
Cannot download

TOSHIBA America Business Solutions

Electronic Imaging Division

36

Network Fundamentals
Manual

TOSHIBA
FTP

File Transfer Protocol


File transfer and directory access between client and host
copies files to/from a remote host reliably over TCP
cannot execute files
user level of authentication

TFTP

Trivial File Transfer Protocol


copies files to/from a remote host quickly over UDP
does not provide directory browsing
does not use user-level authentication

SMTP
Simple Mail Transfer Protocol
mail transfer
SNMP
Simple Network Management Protocol
allows diverse network objects to participate in a global network
management architecture
network management systems can poll network entities
implementing SNMP for information
network management systems learn of problems by receiving
traps from network devices implementing SNMP
Printing Utilities
LPD
Line Printer Daemon
responds to LPR/LPQ requests
sends print job data to the print device
LPR

Line Printer Requestor


submits a print job to a LPD server

LPQ
Line Printer Queue
queries the print job list of an LPD print server

TOSHIBA America Business Solutions

Electronic Imaging Division

37

Network Fundamentals
Manual

TOSHIBA
Data Transfer Utilities
RCP
Remote Copy
copies files to/from a remote host with no authentication
Web Browsers
Microsoft Internet Explorer and Netscape
Navigator/Communicator use HTTP (Hypertext Transfer
Protocol) to transfer pages of data from a Web server
Remote Execution Utilities
REXEC
Remote Execution
starts a process on the remote host
requires user account on TCP/IP host
RSH
Remote Shell
runs commands on a remote host
requires user name in .rhosts file on UNIX host
Transport Layer:

TCP

Communication sessions between computers.


Error checking and acknowledgement.

Transmission Control Protocol


connection oriented: establishes a session before exchanging
data
reliable delivery: sequence numbers, acknowledgments
retransmits packets if error in transmission

UDP
User Data Protocol (UDP)
provides a simple but unreliable message service for
transaction-oriented services
connectionless: no session is established
does not guarantee delivery: no sequence numbers, no
acknowledgments

TOSHIBA America Business Solutions

Electronic Imaging Division

38

Network Fundamentals
Manual

TOSHIBA
Internet Layer:

Encapsulation of data into packets, routing


algorithms.

IP

Internet Protocol
connectionless: no session is established
addresses and routes packets
does not guarantee delivery: no sequence numbers, no
acknowledgments

ARP/RARP/IARP
Address Resolution Protocol/Reverse Address Resolution
Protocol/Inverse Address Resolution Protocol/
successful mapping of an IP address to a hardware address
successful mapping of a hardware address to an IP address
address resolution is the function of ARP
uses local broadcast
address mappings are stored in cache for future reference
ICMP
Internet Control Message Protocol
Messaging on behalf of IP (e.g., Destination host unreachable)
IGMP
Internet Group Management Protocol
group membership advertisement
Network Layer: Putting packets on the wire and retrieving packets from the
wire.
LAN Protocols
Ethernet, Token Ring, ARCnet, etc.
WAN Protocols: PPP, X.25, Frame Relay, etc.
IP Addressing
In order for a computer, workstation, device, or host to be identified on a network,
it must have the following: 1) a unique physical address, 2) a name, or 3) an IP
host address.
The physical address is the MAC address that is hard-wired into the network
adapter card. The MAC address is used for LAN addressing, and not
internetwork addressing. The name is either a computer name (i.e., NetBIOS
name), and/or a domain name (i.e., host name). Typically, the name provides a
recognized identification for a host on an IP network. While users typically use a
name, they must be resolved into an IP address. The resolution of an IP address
TOSHIBA America Business Solutions

Electronic Imaging Division

39

Network Fundamentals
Manual

TOSHIBA
into a NetBIOS name is accomplished by a Windows Internet Name Server
(WINS), and the resolution of an IP address into a host name is accomplished by
a Domain Name Server (DNS). The IP host address identifies a specific host on
an IP network.
An IP address is a logical, numeric 32-bit binary number that contains two pieces
of information: 1) the Network Identifier (i.e., group of computers), and 2) the
Host Identifier (i.e., specific computer on the network. An IP address uses the
dotted-decimal format similar to the foregoing example, where each period
separates each byte of the 32-bit address: 192.168.100.200
The 32-bit address is broken down into 8-bit units called octets. There are four
octets in an IP address. IP addresses are usually written in the form w.x.y.z.
Each number w,x,y and z is a number within the range 0-255 which represents
the 8 bit value for that octet. Some values, particularly for w, are reserved and
can not be assigned.
Network Numbers
Consider an IP address of the form w.x.y.z. The value of w determines the
network type of IP address.
Table 7.
VALUE OF W
1-126
128-191
192-223

Network ID

NETWORK CLASS
A
B
C

NETWORK PORTION
w
w.x
w.x.y

HOST PORTION
x.y.z
y.z
z

For example, an IP address of 34.x.y.z would be classified as a Class A address,


and 221.x.y.z would be classified as a Class C address.
Table 8.
NETWORK CLASS
A
B
C

Network Class

AVAILABLE NETWORKS
126
16,384
2,097,151

AVAILABLE HOSTS ON THE NETWORK


16,777,214
65,534
254

Unless you go through a gateway, you can only communicate with other
devices that share your network number. Every device on an IP network
must have a unique IP address. If your network is isolated, you can
choose network number any way you like. If your network is connected to
the Internet, you must obtain your network number from an IP addressing
registrar such as Network Solutions, Inc. Network Solutions, Inc., is an
organization that allocates network addresses to ensure that no two
devices have the same IP addresses.
TOSHIBA America Business Solutions

Electronic Imaging Division

40

Network Fundamentals
Manual

TOSHIBA
Subnet Masking
Subnet masks are used to subdivide an IP network. Technically, a subnet mask
does not mask portions of the 32-bit octets, but uses those certain portions to
identify local or remote networks. There are default subnet masks for each class
of networks.
Table 9.
Network Class
A
B
C

Default Subnet Mask


Value of w
1-126
128-191
192-223

Default subnet mask


255.0.0.0
255.255.0.0
255.255.255.0

Typically the default subnet masks are used for a given network unless that
network has been subdivided into additional networks, also know as subnetting.
A non-default subnet mask can identify a subnetted network. For example, a
Class B network subdivided into six subnets would now have a subnet mask of
255.255.224.0. Subnetting is used to create additional subnets (i.e., networks)
and hosts per network.

TOSHIBA America Business Solutions

Electronic Imaging Division

41

Network Fundamentals
Manual

TOSHIBA
Figure 18.

Network/Host ID

Class A Address
Network ID

Host ID

Example
124.14.211.85
Default Subnet Mask = 255.0.0.0
Network ID = 124 Host ID = 14.211.85

Class B Address
Network ID

Host ID

Example
131.14.211.85
Default Subnet Mask = 255.255.0.0
Network ID = 131.14
Host ID = 211.85

Class C Address
Network ID

Host ID

Example
206.14.211.85
Default Subnet Mask = 255.255.255.0
Network ID = 206.14.211 Host ID = 85
DHCP (Dynamic Host Configuration Protocol)
DHCP is a Session Layer protocol used to centralize IP address management on
computers that are utilizing the DHCP server service. DHCP automatically
assigns IP addresses to DHCP clients on a network. In addition, a DHCP server
TOSHIBA America Business Solutions

Electronic Imaging Division

42

Network Fundamentals
Manual

TOSHIBA
can automatically assign other components to a network client such as a subnet
mask, default gateway, DNS and WINS server address.
If a LAN administrator chooses to implement a TCP/IP network, all of the client
machines will require an IP address in order to access network resources. A
LAN administrator may choose to manually assign an IP address to each
machine or have a server (i.e., DHCP server) dynamically assign an IP address
to each client machine automatically. The latter case would be the preferred
method in a situation where there are numerous computers on a network. In
order to utilize DHCP, a DHCP server is configured with a scope (a block or
range of available IP addresses) and a machine on the network is configured as
a DHCP client (recipient of a DHCP server).
When the DHCP server and client are configured correctly, the client machine
will log onto the network (with another protocol), and request an IP address from
the DHCP server using a broadcast. The DHCP server will then issue an IP
address to the client for a specified duration (i.e., lease) determined by the LAN
administrator. After a four-step series of requesting, negotiating, assigning, and
acknowledging, the client will obtain a valid IP address. The client will then be
able to communicate over the network using TCP/IP services for the authorized
lease period.
Once a client machine has obtained a valid IP address from a DHCP server, the
client will request a renewal of that lease in two situations; 1) every time the client
logs onto the network, and 2) at one-half the duration of the lease. In both
situations, the client issues a request renewal via a directed send, rather than a
broadcast, since it now possesses a connection oriented protocol.
Gateway
Every client using an IP address on a given network requires an IP address, and
a subnet mask as minimum components for the protocol to function. A gateway
is used to forward IP packets from a host on one network, to a host on a different
network. The gateway can be connected to multiple networks (an internetwork)
and forwards the packets to the appropriate network.

J.

Wide Area Networks (WAN)

A WAN establishes a connection between two or more remote locations over


public and private data communication channels. Most WANs are a
combinations of LANs and other of communications components connected by
communication links called WAN links. WAN links can include the following;
packet-switching networks
fiber-optic cable
microwave transmitters
satellite links
cable television coaxial cable systems
TOSHIBA America Business Solutions

Electronic Imaging Division

43

Network Fundamentals
Manual

TOSHIBA
Communication between LANs will involve one of the following transmission
technologies:
analog
digital
packet switching
Digital communications include DDS, TI/T3, and switched 56. Since DDS utilizes
digital communication, it does not require modems. Instead, DDS sends data
from a bridge or router through a device called a CSU/DSU (channel service
unit/data service unit). This device converts the standard digital signals the
computer generates into the type of digital signals (bipolar) that is part of the
synchronous communications environment.
T1/T3
T- Carrier services transmit computer data and multiple voice channels over
digital trunk lines. The most common levels of T Carrier service are T1 and T3.
A T1 line supports data transmission rates of 1.544 Mbps, and a T3 line supports
data transmission rates of 45 Mbps. T1/T3 lines are dedicated lines that are
typically leased or switched.
Packet switching
The data package is broken into smaller packets and each package is tagged
with a destination address and additional identifying code. The packets are
relayed through stations in a computer network. The data paths for individual
packets depend on the best route at any given instant and use a virtual circuit logical connection between the sending computer and the receiving computer
Switched 56
Both local and long distance telephone companies offer this LAN-to-LAN digital
dial-up service that transmits data at 56 Kbps. Switched 56 is merely a circuitswitched version of a 56K bps DDS line. The advantage of switched 56 is that it
is used on demand, thereby eliminating the cost of a dedicated line. Each
computer using the service must be equipped with a CSU/DSU that can dial up
another Switched 56 site.
Copper wire will accommodate T1 and T2. However T3 requires a highfrequency medium such as microwave or fiber-optic.
X.25
X.25 is a set of protocols incorporated in a packet-switching network that uses
switches and circuits and routes data as available to provide the best routing at
any particular time. This process uses telephone lines, and is slow due to the
overhead of error checking.

TOSHIBA America Business Solutions

Electronic Imaging Division

44

Network Fundamentals
Manual

TOSHIBA
Frame Relay
Frame relay is a fast packet variable-length, digital, packet-switching technology.
The process is point-to-point and uses permanent virtual circuits (PVCs) to
transmit at Data Link Layer over a digital leased-line. This process requires
frame-relay capable routers or bridges.
ATM
An ATM (Asynchronous Transfer Mode) network is set up in a star configuration
using fiber-optic (and in some newer incarnations, twisted-pair) cables. Data
transmits at 155 Mbps and higher. A switch at the center of the star establishes
a dedicated circuit between the sending and receiving stations. ATM is ideal for
video, voice and teleconferencing applications.
ATM, however, requires new network adapters and, in most instances, fiber-optic
cable connections. Furthermore, its implementations are limited and proprietary.
Until ATM becomes more affordable and standardized, it is more cost-effective to
purchase an Ethernet switch or Fast Ethernet to increase a network's bandwidth.
ISDN
ISDN (Integrated Services Digital Network) is an all-digital, circuit switched
communications systems. There are three implementations of ISDN; Basic Rate,
Primary Rate, and Broadband-ISDN. Generically, three data channels are used;
2 for 64kbps, and 1 for 16kbps. The 64kbps channels are known as B channels
and carry voice, data or image, and the 6kbps channel (i.e., D channel) carries
signaling and link management data. ISDN uses non-dedicated dial-up service
and does not provide bandwidth on-demand as frame relay.
SONET
SONET is a synchronous optical network that provides greater than 1 gigabit per
second transmission rate.
Modems (MOdulatos/DEModulator)
Modems are electronic data communication devices that enable two systems to
communicate over publicly switched telephone networks. The sending end
modem converts computer digital signals into analog signals that can be
transmitted over the telephone lines. The receiving modem converts the analog
signal back into a digital signal that the computer can understand. There are two
fundamental types of modems, asynchronous, and synchronous.
Asynchronous communications (Async)
use common phone lines
not synchronized, no clocking device
approximately 56,000bps
error control - a parity bit which is used in an error checking and
correction scheme called parity checking
TOSHIBA America Business Solutions

Electronic Imaging Division

45

Network Fundamentals
Manual

TOSHIBA

signaling or channel speed - how fast the bits are encoded onto the
communication channel
throughputs - amount of useful information going across the
channel
v.32bis, v.42, v.42bis

Synchronous communication
relies on a timing scheme coordinated between two devices to
separate groups of bits and transmit them in blocks known as
frames
if it detects an error, re-transmits it
format data into blocks
add control info
check the info to provide error control
the primary protocols in synchronous communication are:
synchronous data link control (SDLC)
high-level data link control (HDLC)
binary synchronous communication protocol
public dial network (bisync) lines (dial-up lines) - manually dial up to
make a connection
leased (dedicated) lines - full time connection that do not go
through a series of switches, 56kbps to 45mbps

K.

Network Operating Systems Microsoft/Novell Overview

Microsoft
Microsoft networking environments are classified into two structures; Workgroups
and Domains. As previously discussed in Section II. (Networking Fundamentals
A Review), Workgroups are generally referred to as Peer-to-Peer, and
Domains are generally referred to as Client/Server networks.
Windows NT domains require users to log on with a valid username and
password. NT compares the username and password the user enters with those
in the user accounts database. If the names and passwords match, Windows NT
authenticates the user and logon is accomplished.
Windows NT can store the user accounts database locally, on the user's
computer. These locally validated accounts are called workgroup accounts,
because you can use the accounts to set up multiple NT computers in a
workgroup, or peer-to-peer, relationship. In this case, users log on to their
workgroup computers.
Alternatively, Windows NT can check usernames and passwords against an
account database located on a domain controller. For Windows NT to use a
domain controller, you must first implement the NT domain model. In this model,
TOSHIBA America Business Solutions

Electronic Imaging Division

46

Network Fundamentals
Manual

TOSHIBA
Windows NT manages the accounts database from a central point, the Primary
Domain Controller (PDC). In the domain model, the accounts are called domain
accounts, and users log on to the domain where they may have access to
domain resources.
SMB (Server Message Block)
SMB is a high level protocol (Application Layer) developed by Microsoft, Intel,
and IBM. SMB defines a series of commands necessary to transmit information
between networked computers. The SMB protocol is used in the Microsoft
Windows and OS/2 NOS environments. In addition, CIFS (Common Internet File
System), which allows file sharing between computers over the Internet, is based
on SMB. SMB is also used in the Unix/Linux NOS environment in the form of
SAMBA.
SMB utilizes a redirector service that allows a client machine to locate files on
other computers connected to the network using SMB (or SAMBA) and read,
write, open, and execute those files. Once the redirector establishes the session,
a two-way conversation occurs between the computers in which the following
types of SMB messages are exchanged:

Session Control Commands that start and end a redirector connection to


shared resources at a server,
File Messages Used by the redirector to gain access to files at a server,
Printer Messages Used by the redirector to send print jobs to shared
printers and capture information from print queues, and
Message Messages Used to allow for the exchange of messages with
other machines on the network.

Novell - Introduction to NDS


Novell networking environments use either Bindery or NetWare Directory
Services (NDS) to organize network resources. Familiarity with NDS concepts is
important when working within a Novell NetWare NDS environment.
NDS is a Directory Service. A Directory Service allows you to easily manage
your network resources. Simply put, the NDS Directory is a database of objects
that represent network resources, such as network users, servers, printers, print
queues, and applications. The NDS Directory can be described as a hierarchical
tree.
The NDS Directory is stored as a set of database files on a server. A NetWare
server stores these files on volume SYS. If no file system volumes are present,
the server stores the NDS database files in an NDS installation subdirectory.
The NDS Directory can be replicated on multiple servers.

TOSHIBA America Business Solutions

Electronic Imaging Division

47

Network Fundamentals
Manual

TOSHIBA
The NDS Tree
The NDS tree can be thought of as a distributed database that contains
directory information about objects. That is, the database contains objects
and the attributes, or properties, which describe those objects. Each NDS
tree maintains its own database of objects. Because it is a distributed
database, the database is usually contained on more than one server.
The information in an NDS tree does not describe the physical layout of
the network. It usually describes the logical organization of the business.
The NDS tree is usually organized into subtrees that reflect the different
departments and units in an organization. In turn, those subtrees contain
the resources within the different departments.
Objects in the NDS Tree
The NDS tree is made up of objects. These objects represent network
entities and are of two basic types: Leaf Objects and Container Objects.
In the tree representation, container objects can hold leaf objects and
other container objects. Container objects are Country objects,
Organization objects, or Organizational Unit objects. Leaf objects usually
represent a network resource such as a user or a printer and can hold no
other object.
Figure 19.

NDS Tree With Objects

TOSHIBA America Business Solutions

Electronic Imaging Division

48

Network Fundamentals
Manual

TOSHIBA
If TOSHIBA used the Country Organizational Unit to organize its tree by
country, the country organizational unit would be located between the root
and the Organization objects.
An object's name context is a list of these containers between the object
and [Root]. This context, or name, describes its position in the NDS tree.
Name Context
An object's name context represents its position in the NDS tree. The
context is a list of containers separated by periods. This list of containers
traces the object's path back to [Root]. NDS locates an object by its path
from [Root]. For example, alpha.sc-class.sc1. Read this name as: alpha
is in sc-class, which is in sc1.
The following table defines the different ways NDS names are presented.
Table 10.

NDS Name Types

NDS NAME
DESCRIPTION
TYPE
Complete
An object's complete name is its object name combined with its context. For
Name
example, suppose a printer's object name is lpIII, and its context is eng.sc-class.
The printer's complete name would be: lpIII.sc-class.sc1
Typeful Name Typeful names include the type of each object in the context (see below).

The object types use the definitions listed in Table 11.


Table 11.
OBJECT CLASS
Leaf objects
Organization
Organizational Unit
Country

Object Types

TYPE
Common Name
Organization
Organizational Unit
Country

ABBREVIATION
CN
O
OU
C

The typeful name uses the type abbreviation, an equals sign, and the
object's name. For example, if Alpha were a user located in the
TOSHIBA's HR department, his typeful name would be:
CN=Alpha.OU=HR.O=TOSHIBA
The context helps you or the client agent locate a network resource
without knowing its network address. NDS looks up the resource's
network name or context and resolves it to a network address for you.

TOSHIBA America Business Solutions

Electronic Imaging Division

49

Network Fundamentals
Manual

TOSHIBA
Current context
The current context is the context of the user's current workstation. For
example, the context of a workstation in the Public Relations department
could be "pr.TOSHIBA".
Note that the user's object name is included in the current context. The
current context is the location of the workstation only.
Relative Name and Periods
Relative name
NDS resolves relative names from the workstation's current context, not
from [Root]. For example, if the workstation's current context is
"pr.TOSHIBA", and the user's relative name is "joe.sales", NDS reads the
name as joe in sales in the current context ("pr.TOSHIBA."). Never use a
leading period with a relative name.
Leading and Trailing Periods
Leading and trailing periods and relative naming relate to the current
context. Use a leading period when you want to resolve the name from
[Root], regardless of the current context. For example, when NDS sees
the context ".pr.TOSHIBA." it will locate the PR container by walking the
tree from [Root]. This is also called the absolute path.
You can only use trailing periods in relative naming. For each trailing
period in a relative name, NDS resolves the name from one container
closer to [Root]. For example, if the workstation's current context is
"eng.berlin.TOSHIBA" and you wanted to access Alpha's object in the
context "hr.berlin.TOSHIBA" you could use the following string:
"Alpha.hr.". NDS detects the trailing dot and removes the "eng"
component from the default context before it appends the new context.
So, the context will correctly read as: "Alpha.hr.berlin.TOSHIBA".
Each trailing dot removes one naming component from the default
context. For example, to access Stan in sales in London, you can use the
context: "stan.sales.London..". The NDS client detects the two trailing
periods and removes two name components from the default context,
"eng.berlin.TOSHIBA" and changes the context to:
"stan.sales.London.TOSHIBA.".

L.

Network Administration
Certain concepts essential to network professionals (e.g., fault tolerance,
data backup) will be addressed in the foregoing section only to the extent
that the student will be aware of that concept in a networking environment.
These concepts do not directly apply to TOSHIBA connected products.

TOSHIBA America Business Solutions

Electronic Imaging Division

50

Network Fundamentals
Manual

TOSHIBA
Managing Network Account
Managing network accounts is the responsibility of the LAN Administrator.
The following five management areas are essential to maintaining a
secure and successful computer network;

user administration
resource management
configuration management
performance management
maintenance

Managing Network Performance


Managing network performance includes monitoring specific areas that
could degrade the performance of a network. These areas include;

bottlenecks (disk, memory, network, CPU)


one device using noticeable more CPU time than the others
view operations in both real time and recorded time for processors,
HDD, memory, network utilization, and network performance as a
whole
establish a baseline of system management
Simple Network Management Protocol (SNMP) - in a SNMP
environment, a program called agents are loaded onto each
managed device. The agents monitor network traffic and behavior
in key network components in order to gather statistical data. This
data is stored in a Management Information Base (MB).
SNMP components include: hubs, servers, interface cards, routers
and bridges

Back-Up
Every network should have a data backup policy. If the data is worth
creating, the data is worth saving. Several different methods are used to
structure a data backup policy, however, there are four fundamental types
used as a baseline for establishing the policy:

Full Backup backs up and marks selected files, whether or not


they have changed since last backup,
Copy backs up selected files without marking them as backed up,
Incremental Backup backs up and marks selected files only if
they have changes since the last backup, and
Differential Backup - backs up selected files only if they have
changed since the last backup without marking them as backed up.

TOSHIBA America Business Solutions

Electronic Imaging Division

51

Network Fundamentals
Manual

TOSHIBA
UPS
An un-interruptable power supply may be used on a network in order to
provide;

a power source to run the server for short duration,


safe shutdown of management service,
prevention of additional users from accessing the server,
alert messages to the network administrator, and
notification to users that the source power has returned.

Fault Tolerance
A hard drive is susceptible to failure and could therefore produce data
loss. Protecting a computer from hard drive failure can be accomplished
by implementing a Redundant Array of Inexpensive Disks (RAID) system.
RAID defines various techniques for combining multiple disk drives into
arrays. Upon implementation of a RAID system, the multiple drives
appear as a single drive to the system. A brief description of the most
common types of RAID follows:

M.

RAID Level 0 Data is striped across several drives, but there is no


redundancy of drives,
RAID Level 1 Data is striped into an array of drives and each
drive is mirrored to a backup drive, known as Disk Mirroring
RAID Level 2, 3, 4 Data is striped to multiple disks, and parity
information is generated and written to a unique parity disk,
RAID Level 5 Striping with parity - data is striped across multiple
drives and then its parity sum is calculated, which is also striped
across multiple drives.

Resolving Common Network Problems


Wrong IP Address
An IP address that is a duplicate or that has the wrong network portion of
the IP address will not work correctly. To view the configuration of the
client workstation, type ipconfig /all from the command prompt on a
Windows NT client, or winipcfg /all from the DOS prompt on a Windows
9x client.
Wrong Subnet Mask
If the wrong subnet mask is configured this will cause network problems
including addresses falling out of range or identified on local or remote
networks.

TOSHIBA America Business Solutions

Electronic Imaging Division

52

Network Fundamentals
Manual

TOSHIBA
Wrong Default Gateway
If the wrong default gateway is entered, you will not be able to connect to
servers on different networks. This has no affect on your ability to contact
servers on your immediate network segments.
Wrong Frame Type
Frame type mismatch can prevent successful connectivity. Set the frame
type explicitly if it is known, otherwise set the frame type to auto.
Account Locked Out
An account can be automatically locked out after several incorrect logon
attempts (with the exception of the administrator account).
Logon Restrictions
A user is not allowed to logon if they attempt to logon during restricted
hours or from a restricted workstation.

N.

Resolving Cable and Network Interface Card Problems


Open Connection on Bus
Open connections occur most often when using Thinnet because the
cable typically has many connectors and cables can be tugged as people
move or rearrange their workplace. An open bus manifests itself by
causing problems for every user on the segment. If you suspect an open
connection, go to the physical middle of the cable with two extra
terminators. Open the cable segment and terminate both ends
temporarily creating two segments. Check to see if one segment works
properly. Keep "cutting" the failed network in half until you isolate the
problem.
Improper Termination and Grounding
The short chain found on terminators is to provide grounding. Note that
only one end of the cable should be grounded. Grounding both ends can
cause ground loops, which result in intermittent, difficult-to-isolate errors.
EMI (Electromagnetic Interference)
Come from a variety of sources, such as improper cable insulation (e.g.,
running data cable too close to air conditioning units), power generators,
and even nearby radio stations. Look for recently added equipment, such
as air conditioners.
Driver Does Not Load Successfully
Drivers usually report an error if they fail to load properly. First, verify that
you have the correct driver for your model of network interface card.
Second, verify that the IRQ, Base I/O Port, Base memory, and DMA
settings are unique and are usable by the card.

TOSHIBA America Business Solutions

Electronic Imaging Division

53

Network Fundamentals
Manual

TOSHIBA

O.

Resolving Printer Problems


Port Settings
Incorrect port settings will prevent a printer from accepting and processing
print jobs.
Drivers
Print drivers must be compatible with the printer.
Novell Printers
Novell Print servers
Novell Queues
The settings for these objects must be compatible with the print device.
Microsoft TCP/IP Print Services
LPR
Port must have the correct IP address and port name and the port name is
case sensitive.

TOSHIBA America Business Solutions

Electronic Imaging Division

54

Network Fundamentals
Manual

TOSHIBA

II.

A.

NETWORK PRINTING A REVIEW

Network Print Services

Network printers are connected in a wide variety of ways. In all cases, some
means must be found to transfer the print job from the client, across the network,
and to the server that is providing the print services.
Novell NetWare uses a combination of printing objects: a Print Queue Object, a
Printer Object, and a Print Server Object. The combination of settings for these
objects determines how print services are provided to each print device.
Microsoft Windows networking provides for shared printers to be advertised as a
network resource, available to any client with the appropriate permissions to use
that resource.
The Line Printer Requestor/Line Printer Daemon (LPR/LPD) protocols are two
protocols that are part of the TCP/IP protocol suite. These protocols provide
printing services to many different types of systems that implement TCP/IP
protocol.

B.

Novell NetWare Printing

Objects
The Print Queue Object, the Printer Object, and the Print Server Object provide
the core functionality for network printing under Novell NetWare 3.x and NetWare
4.x. The objects are used in the following ways:
Print Queue A Print Queue is basically a directory on the file server. Print
jobs are stored inside the Print Queue on the file server until
they are sent to the print device.
Printer

In portions of Novell NetWare documentation, the Printer


object is described as the port driver. The printer object is
responsible for handling the details of getting data into the
printer. For example, if the printer is attached to a parallel
port, the Printer will contain the LPT port number and the
interrupt used by that LPT port. The printer object can also
contain a specification for a serial printer or some types of
network attached printers.

TOSHIBA America Business Solutions

Electronic Imaging Division

55

Network Fundamentals
Manual

TOSHIBA
Print Server The Print Server monitors the status of the Print Queue. At
regular intervals, the Print Server will interrogate the file
server to find out if there is a job in the Print Queue. If there
is a job in the Print Queue, the Print Server will remove it
from the queue and arrange for the job to be sent to the print
device, using the settings stored in the Printer object.
It is very important to distinguish between a Novell NetWare Print Server and the
generic term print server. When used generically, the term print server describes
a physical network device used to connect a printer to a network and provide
print services. When the term Print Server is used in Novell, it describes a logical
object used as a part of the software system that provides print services. There
is no corresponding term in NetWare to describe the physical device that
connects the printer to the network.

C.

Print Server Process

In addition to creating a Print Server object, there must be a print server process
running on the network. Creating the Print Server object does not start a print
server process. It is similar to creating a user. When you create a user Jsmith,
that action by itself does not log the user Jsmith into the network. But you must
create a user object for Jsmith before anything can log on to the network as
Jsmith. Similarly, creating the Print Server object does not actually start the
process of monitoring the queue and sending jobs to the printer.
A print server process can be initiated by running PSERVER.NLM at the file
server, running pserver.exe at a workstation or installing a third party application
somewhere on the network that provides this function. The actual print device
can be physically connected to the system running the server process (a local
printer) or it can be located remotely on the network (a remote printer or network
printer).

D.

Windows Printing

Installing a Windows networked printer involves installing the printer locally and
then sharing the printer using Windows Networking. Once the printer is shared,
other users can access the printer and print to it.
Installing the local printer typically involve using the Add Printer Wizard, although
some manufacturers will provide a custom installation instead. A local printer will
often be connected to a parallel port, although the manufacturer could also use a
serial, SCSI or even network connection to the printer. In Windows, the term
local printer means that the connection to the printer is managed at the local
computer. It does not mean the printer is physically attached to the local
computer.
TOSHIBA America Business Solutions

Electronic Imaging Division

56

Network Fundamentals
Manual

TOSHIBA
Once the local printer is functioning, it can be shared. In a peer-to-peer network,
the access to the shared printer can be controlled with a password. If the
network is a Domain controlled by an NT Server and the printer is attached to a
computer running Windows NT, then access to the printer is managed using
access control lists from the domain security model. Users and groups can be
given access to the printer as desired.
A computer running Windows NT and sharing a printer can also share the driver
for the printer. It can share the Windows NT driver and it can also share the
Windows 95 driver. This makes client installation easier, because the clients are
automatically provided with the driver.
Custom print devices are available that implement Windows networking. These
devices connect to the printer and share it on the network using Windows
networking. Such a printer is available on the network without dedicating a
system running Windows to the management of the printer.

E.

LPR/LPD Printing

The Line Printer Requester (LPR) and Line Printer Daemon (LPD) protocols are
part of the TCP/IP protocol suite. LPD protocol is used to provide print services
on the network and the LPR protocol is used to access network print services.
To configure the LPR protocol, several items must be set:

IP address of the LPD server or its domain name


Name of the print device on the LPD server
In some systems you may need a login name

Once this configuration is set up, the print job goes from the client running the
LPR protocol to the server providing the LPD service.
LPR clients are available on a wide variety of systems. Most systems where
TCP/IP protocol is available will have an LPR client available. LPR clients are
available for both NetWare and Windows NT. It is very common for a Windows
NT server to send print jobs to a network printer using LPR and then share that
printer using Windows Networking.

TOSHIBA America Business Solutions

Electronic Imaging Division

57

Network Fundamentals
Manual

TOSHIBA

III.

CONCLUSION

The Digital Connected Products Training Class, Network Fundamentals


Manual is intended to provide the student with a basic review of network
fundamentals, and network printing concepts. It would be prudent on the part of
the student to review this document prior to attending the Electronic Imaging
Division training program. To this end, the student should feel free to review
additional resources regarding any areas covered in this review which would
strengthen his/her knowledge of a given topic.
With successful completion of the Instructor-led EID training program and the
help of this Manual, you will become familiar with the installation and
configuration of TOSHIBA digital connected products in a variety of network
environments. In addition, you should be able to support TOSHIBA digital
network products with a high degree of confidence.

TOSHIBA America Business Solutions

Electronic Imaging Division

58

Network Fundamentals
Manual

TOSHIBA

IV.

GLOSSARY

1-2-3
The representative spreadsheet software developed by Lotus.
10Base2 (Thinnet Ethernet)
see Thinnet
10BaseT (Twisted Pair Ethernet)
Most widely used Ethernet connection; data travels at 10Mb/second.
100BaseT (Fast Ethernet)
Fastest standard Ethernet connection; data travels at 100Mb/second.
32-bit
Refers to number of bits used by an operating system to perform an operation. It is based on the
microprocessor that the OS is designed to run on.
-A Access
A database software for personal use developed by Microsoft. It can be used on the network by a group of
several users, and as the interface to use external data.
access method
Technique for moving data between main storage and input/output devices. In a Systems Network
Architecture (SNA) environment, it is the software that controls the flow of information in a network.
accessibility
The extent to which computers are easy to use and available to a wide range of users, including people
with disabilities.
adapter
Hardware installed in a PC or other computer and used to connect the computer to other hardware.
address
Identifier assigned to networks, stations and other devices so that each device can be separately designated
to receive and reply to messages.
Address Resolution Protocol (ARP)
Internet protocol that dynamically maps Internet addresses to physical (hardware) addresses on local area
networks. ARP is limited to networks that support hardware broadcast.
Advanced Program-to-Program Communications (APPC)
Part of the SNA protocol that establishes the conditions that enable programs to communicate across the
network. This capability, involving LU6.2 and its associated protocols, allows communication between two
or more processes in an SNA network without the involvement of a common host system or of terminal
emulation.
advertising
Process by which services on a network inform other devices on the network of their existence. The
NetWare network operating system (NOS) uses the Service Advertising Protocol (SAP) to do this.

TOSHIBA America Business Solutions

Electronic Imaging Division

59

Network Fundamentals
Manual

TOSHIBA
agent
The part of a networked system that performs information preparation and exchange on behalf of a software
entity.
alarm
Audible or visible warning signal that tells a network administrator that an error has occurred or there is a
critical situation on the network.
alert
Sent by management devices to management consoles to inform administrators of thresholds reached and
discrepancies on the network.
algorithm
A prescribed set of well-defined rules or processes for arriving at a solution to a problem.
American National Standards Institute (ANSI)
ANSI is responsible for the establishment of many standards, including a number of data communications
and terminal standards. ANSI is the recognized U.S. representative within CCITT and ISO. See also CCITT
recommendations and International Organization for Standardization.
analog
Data in the form of some continuously variable physical quantity. For a communications signal, a
continuously variable waveform (as opposed to discretely variable). The public telephone network was
designed to transmit voice messages in analog form. Contrast with digital.
ANSI C
The standardized C programming language.
AIAUI (Apple AUI)
Interface designed by Apple Computer, Inc. for the connection of a transceiver to a Macintosh equipped with
built-in Ethernet.
AppleShare
AppleShare is Apple Computer's networking solution. It requires a Macintosh computer as a network server
and includes both server and workstation software. It uses the AppleTalk Filing Protocol (AFP). Novell's
Macintosh connectivity solution teams NetWare for Macintosh server software with AppleShare workstation
software.
Apple Talk
A protocol for the Macintosh computer structuring a network using Ethernet or the token-ring system. It
requires network adapters, while Local Talk does not.
AppleTalk Filing Protocol (AFP)
Allows distributed file sharing across an AppleTalk network.
application
A software program or program package that makes calls to the operating system and manipulates data
files, thus allowing a user to perform a specific job (such as accounting or word processing).
application binary interface (ABI)
A specification defining the interface between an operating system and a certain hardware platform,
particularly the calls between applications and the operating system.
application interface
A set of software routines and associated conventions that permits application programmers to use that
interface as a part of any application. In general, an application interface is used to access system or
networking services that would otherwise require significant development effort to create from scratch. For
example, the ManageWise application interface lets a programmer use ManageWise file structures and
services within an application. See also application programming interface.

TOSHIBA America Business Solutions

Electronic Imaging Division

60

Network Fundamentals
Manual

TOSHIBA
Application Programming Interface (API)
A means by which an application gains access to system resources, usually for the purpose of
communication (the sending and receiving of data), data retrieval or other system services. In the specific
area of terminal emulation, an API provides for the simulation of keystrokes and for writing into and reading
from the presentation space (device buffer). It may also provide for the sending and receiving of structured
fields.
application server
A server in a client-server network which runs one or more applications that can be shared by client stations
and which also shares the data processing burden with client stations. This shared application and shared
data processing model contrasts with the model used for other servers, such as file servers, that simply
send, receive, and store files, requiring client stations to run all applications and process all data. Either
model can be most advantageous, depending on circumstances. In many circumstances the application
server model allows for faster data processing, faster throughput to client stations, greater data reliability,
and increased data security.
architecture
A terminology indicating the mechanism of computer such as what parts and what OS the computer uses,
and how their functions are related to operate the computer.
archive
To create a redundant copy of computer file data, typically to create a backup copy of that data to protect it
if the original copy is damaged or otherwise irretrievable. By some definitions, an archive is required to
contain copies of every version of a particular file. In this case, to archive means to save a copy of every
object in a file system with a
separate copy of all changes made to that file. In addition to protecting files from loss, this approach also
permits any previous version of a file to be restored, typically by date and time.
AS/400
An IBM minicomputer.
ASCII
Acronym for American Standard Code for Information Interchange, a 7-bit code that is the U.S. national
variant of IS 646.
Asynchronous Transfer Mode (ATM)
A new exchange system standardized by ITU-T for transferring multimedia data on wide area networks. It
has advantages of both the line switching and packet switching systems. It can flexibly change the transfer
speed using 53-byte cells.
asynchronous
A data transmission in which the transmission of a character or a block of characters can begin at any time
but in which the bits that represent that character or block have equal time duration. See also synchronous.
ATCON
Diagnostic tool used in Novell NetWare environments; provides information about a server or router's
AppleTalk stack, and about other AppleTalk networks on the internetwork.
attach
To access a network server; particularly to access additional servers after logging in to one server.
Attached Resource Computing Network (ARCnet)
A proprietary token-bus networking architecture developed by Datapoint Corporation in the mid-1970s.
Currently, ARCnet is widely licensed by third-party vendors and was a popular networking architecture,
especially in smaller installations. It has a bandwidth of 2.5 Mbit/s, is reliable, and supports coaxial, twisted
pair and fiber optic cable-based implementations.
Attachment Unit Interface (AUI)
Interface using a DB-1 5 plug that allows the connection of an external transceiver.

TOSHIBA America Business Solutions

Electronic Imaging Division

61

Network Fundamentals
Manual

TOSHIBA
attributes
A technique for describing access to and properties of files and directories within a filing system. For
NetWare files, attributes include Read, Write, Create, Delete and Execute Only (prevents files from being
deleted or copied). For NetWare directories, attributes include Read, Write, Create, Execute and Hidden
(hides information about the directory from file listings, preventing unauthorized access, deletion or copying).
autoauthentication
In a client-server environment, a utility that lets users access unrestricted network resources without
password verification. Only when a user attempts to access a restricted resource does the utility prompt for
a password.
autologin
In a network environment, a utility that regulates user login attempts.
automount
A graphical utility that provides an iconical tree structure to simplify the user's task of locating and using a
server, file system, or volume.
-Bbackbone network
Primary connectivity mechanism of a hierarchical, distributed network. Ensures that all systems that have
connectivity to an intermediate system on the backbone have connectivity to one another.
Backup Domain Controller (BDC)
A preliminary domain controller preparing for the case of PDC (primary domain controller)
bad block table
A list kept on a hard disk of storage locations on the disk that are damaged or physically unable to hold data
reliably. Also called "media defect list."
banding
Visible stair-stepping of shades in a gradient eliminated by true Adobe PostScript.
bandwidth
Carrying capacity of a circuit, usually measured in bits per second for digital circuits, or hertz for analog
circuits.
baseband
Network technology that uses a single carrier frequency and requires that all stations attached to a network
participate in every transmission.
basic input/output system (BIOS)
A set of programs, usually in firmware, that enables each computer's central processing unit to communicate
with printers, disks, keyboards, consoles and other attached input and output devices.
beaconing
In token-ring networks, the state that results when an error condition occurs, preventing communication until
the error condition is resolved.
Berkeley Software Distribution (BSD)
A UNIX operating system version developed at the University of California, Berkeley.
beta test
Distributed pre-release software sent to selected users and customers in order to get feedback and file
bug reports.
binary
Numbering system using only zeros and ones.

TOSHIBA America Business Solutions

Electronic Imaging Division

62

Network Fundamentals
Manual

TOSHIBA
binary file
A file that has been encrypted, encoded, or compiled, as opposed to a plain textfile.
bindery
A network database, in versions of the NetWare network operating system earlier than 4.0, that contains
definitions for entities such as users, groups, and workgroups.
bit
Binary digit; either a one or a zero.
bit/s
The rate at which data is transferred over a serial interface.
bitmap
Describes pixel oriented displays and the number of bits (which can each hold a color) included in each
pixel. 1 bit is black and white. 8 bit is gray scale and 16 or 24 bits is full color.
bitmap font
A font whose characters are represented by bitmaps or by a pattern of dots, as opposed to a TrueType
font, whose characters are represented by lines and curves. A bitmap font is generally less scaleable
and more jagged than a TrueType font.
block
Set of continuous bits or bytes that make up a definable quantity of information such as a message.
boundary
The point of interaction between systems or applications that use different character encoding.
bridge
Connects two or more network segments together so that equipment on the network can communicate.
British Naval Connector (BNC)
British Naval Connector is a twist-lock connector used to attach coax cables to computers.
broadband
Characteristic of any network that multiplexes multiple, independent network carriers on a single cable.
Allows several networks to coexist on a single cable. Traffic from one network does not interfere with traffic
from another network because conversations happen on different frequencies.
broadcast
Packet delivery service in which all nodes on a network receive a copy of any frame that is designated for
broadcast or, when used as a verb, sending the message to all nodes.
brouter
A device having functions of both a bridge and a router. It performs as a bridge or a router depending on
protocols.
buffer
Memory area or electronic register where data is stored temporarily while awaiting disposition. It
compensates for differences in data-flow rates (for example, between a terminal and its transmission line).
Also used as a data backup mechanism, holding data that may be retransmitted if an error is detected
during transmission.
burst
Method of data transfer in which information is collected and sent as a large unit in one high-speed
transmission. LAN traffic is usually considered bursty traffic because it has short intervals of intense activity
with lulls between.
bus topology
The cable in a bus topology is linear with two definite endpoints. Computers attach at various points along
the cable. Each end of the bus must be properly terminated to avoid signal reflections.
TOSHIBA America Business Solutions

Electronic Imaging Division

63

Network Fundamentals
Manual

TOSHIBA
byte
One byte equals eight bits. Byte is a standard unit of measurement for file size and is often referenced as
kilobyte, megabyte, gigabyte, terabyte.
-Ccache
High-speed memory section that holds blocks of data that the CPU is currently working on; designed to
minimize the time the CPU spends accessing memory.

calibration
Setting equipment to a standard measure to produce reliable results - essential for quality digital color
printing.
carrier wave
Signals carrying data in the broadband system.
case
The capitalized (uppercase) or non-capitalized (lowercase) form of an alphabetic character.
CCITT recommendations
The CCITT is a committee that recommends standards for communications equipment interfaces,
communications protocols, modem modulation methods and so on.
cc:Mail
An electronic mail software by Lotus.
Central Processing Unit (CPU)
Refers to the brains of a computer. On a network it is known as a node.
Challenge Handshake Authentication Protocol (CHAP)
A security protocol for user authentication for PPP circuit of the Internet.
Channel Service Unit (CSU)
Digital signal processor that performs transmit and receive filtering, signal shaping, longitudinal balance,
voltage isolation, equalization, and remote loopback testing for digital transmission. It functions as a
guaranteed safe electrical circuit, acting as a buffer between the customer's equipment and a public carrier's
wide area network. CSUs prevent malfunctioning digital service units (DSUs) or other customer premises
equipment from disabling a public carrier's transmission system. The design of a CSU must be certified by
the FCC.
character
Group of eight binary digits operated on as a unit; also called a byte or octet.
client/server
Network that is designed with centralized machines that provide connectivity of file and print sharing
services. A client is a computer connected to a shared network or server.
client
Node or workstation (computer) on a computer network that requests services from a network server. Client
stations run client software. An executing software program or set of programs through which a client
station sends a request to a server and waits for a response (for example, the NetWare Client for DOS/MS
Windows). The user end of a client-server connection.
client-server model
Data communication model that relies on distributed, intelligent interaction between network servers and
individual (client) workstations. Clients request services from servers. Servers receive client requests and
return requested data or results. Clients and servers may be any class of computer, but often the client is a
desktop computer and servers are powerful microcomputers, "workstation class" computers or
minicomputers. Data communication model in which there is (1) server software that starts execution before
communication begins and, after communication begins, continually accepts requests from and returns
TOSHIBA America Business Solutions

Electronic Imaging Division

64

Network Fundamentals
Manual

TOSHIBA
responses to clients, and (2) client software that periodically sends requests for services to the server and
accepts server responses.
client-server network
A network consisting of client nodes (workstations) which have client capabilities only and server nodes
which have (usually) server capabilities only. On a client-server network, communication and data sharing
between clients is, in most cases, arbitrated by the network servers. Each client runs client software and
each server runs a client-server operating system (see client-server operating system below). A simple
NetWare network with only one server, a file server, is a classic example of a client-server network.
client-server operating system
An operating system which runs on a server in a client-server network and which is responsible for
coordinating the use (by clients) of all resources available from that server. Server resources include
hardware such as hard disks, Random Access Memory (RAM), printers and equipment used for remote
communications, such as modems.
Resources also include logical systems such as the network file system and network directory services, and
the information (data) therein. The NetWare 3 and 4 operating systems are client-server operating systems.
clipboard
A Windows utility used as a buffer for copying and pasting text and other material.
clock speed
The speed in terms of computing power of a CPU (expressed in Megahertz)
CMYK (Cyan, Magenta, Yellow, and Black)
Colors used in four-color process printing.
coaxial
Also known as coax. This cable carries its signal on a central wire. This wire is surrounded by an
insulator and a second conductor which shields the inner conductor from unwanted electrical signals.
collision
What happens when two devices transmit data at the same time, resulting in a loss of data.
Color Rendering Dictionaries (CRDs)
Converts PostScript RGB files to the copiers CMYK space.
color separation
Separation of a color image into four process colors, cyan, magenta, yellow & black (CMYK); when layered
on an offset press or color copier, they combine to create continuous tone color.
Commission lnternationale de lEclairage CIE)
International committee that developed set of color definition standards.
common dialogs
Standard dialog boxes defined by Windows, such as Open, Save As, Print, and Find, that are used for
operations in numerous applications. Applications can call common dialog API functions directly
instead of having to supply a custom dialog template and dialog procedure.
Compact Disk-Read Only Memory (CD-ROM)
A CD-ROM is played on a computer through a CD-ROM drive. The computer runs information stored on the
CD-ROM. One CD can store 640 megabytes of data and media.
compression
A system which uses algorithms to create smaller file sizes of stored images. Lossy compression uses
averages and changes the nature of the image while Lossless compression maintains the exact structure of
the image.
configuration
The way in which a system or part of a system, such as a piece of software, is set up, based on a number of
possible choices.
TOSHIBA America Business Solutions

Electronic Imaging Division

65

Network Fundamentals
Manual

TOSHIBA
configuration management
Refers to the management of networked applications and their related user access.
console
The Windows subsystem that runs character-based applications, as opposed to applications that have a
graphical user interface (GUI).
constant
A numeric value, typically an integer, that refers to a character value, the size of a buffer, the position of
a character in a string, and so forth. It is assumed that the value does not change during the time a
program is running.
contention
One of the systems for transmission. The right to send data is given to users on a first-come-first-served
basis.
control panel
A group of Windows utilities used to edit system settings, including international preferences.
concentrator
Device with a single bus and multiple connections to computers; provides a star-wired physical layout.
connectionless
Model of interconnection in which communication takes place without first establishing a connection.
Connectionless Network Protocol (CLNP)
Open Systems Interconnection (OSI) protocol that provides the OSI Connectionless Network Service
(delivery of data). CLNP is the OSI equivalent of the NetWare IPX protocol and the Internet IP protocol.
Connectionless Transport Protocol (CLTP)
Provides end-to-end transport data addressing and error detection, but does not guarantee delivery or
provide flow control. The Open Systems Interconnection (OSI) equivalent of the User Datagram Protocol
(UDP) datagram service.
connection-oriented
Model of interconnection in which communication proceeds through three well-defined phases: connection
establishment, data transfer, and connection release.
connectivity
The ability to connect to and communicate with multiple architectures on a single network.
console
The monitor and keyboard from which you actually view and control server or host activity.
Copper Distributed Data Interface (CDDI)
The identical cable system as FDDI, except that CDDI uses twist-pair cable as a medium.
cross-platform
Portable to more than one operating system.
crosstalk
Undesired voices of people other than those using the telephone line. The same thing happens in data
transmission which causes errors. Twisted-pair cable is resistant to cross-talk.
CSMA/CA
Carrier Sense Multiple Access/Collision Avoidance is another mechanism used to determine when a
computer could transmit data. Computers CSMA/CA will evaluate whether data was successfully
transmitted by waiting for an acknowledgement from the recipient.
CSMA/CD
TOSHIBA America Business Solutions

Electronic Imaging Division

66

Network Fundamentals
Manual

TOSHIBA
Carrier Sense Multiple Access/Collision Detect is another mechanism used to determine when a computer
could transmit data. Computers must wait for a quiet line before they begin transmitting data. Then they
listen for data collisions with other computers.
-Ddata
Data is an entity that conveys meaning. Computer data is stored as a series of (electrical) charges arranged
in patterns to represent information. In other words, data refers to the form of the information (the electrical
patterns). It is not the information itself.
database
A collection of data with a given structure for accepting, storing and providing data for single or multiple
users.
data compression devices
Equipment that compresses data into a smaller number of bits, allowing more data to be transmitted per
second than the link speed otherwise allows.
Data Encryption Standard (DES)
A standard encryption technique that scrambles data into a code for transmission over a public network.
datagram
One packet of information and associated delivery information that is routed through a packet-switching
network.
data rate
Speed at which data bits are transmitted and received. Usually measured in bits per second (bit/s).
DECnet
A set of networking protocols developed by Digital Equipment Corporation and used in its VAX family of
computers to exchange messages and other data. Although DECnet is currently a proprietary protocol,
DEC is merging its protocols with OSI protocols for the upcoming DECnet Phase V. When this process is
complete, DECnet protocols should interoperate with any OSI-compliant network node.
decryption
Unscrambling or decoding of encrypted data.
dedicated
A device that has only one function. For example, a dedicated server cannot be used as a workstation.
dedicated line
Leased or private communications line.
demodulation
Process of recovering information from a previously modulated carrier frequency by converting analog
signals into digital signals.
densitometer
Device used in calibration used to measure toner density of a copier and help users control the accuracy,
quality and consistency of output.
Desktop Color Separation (DCS)
Document format which comprises four digital separation files (CMYK) with a composite preview file suitable
for display on a computer monitor or low-resolution printer.
desktop computer
A small-scale computer that fits on a desktop and that has a microprocessor system. Also called a
microcomputer or personal computer. Contrast with minicomputer and mainframe computer.

TOSHIBA America Business Solutions

Electronic Imaging Division

67

Network Fundamentals
Manual

TOSHIBA
developer
One who develops software, either for internal use or for commercial sale.
device driver
Software or firmware that translates operating system requests (such as input/output requests) into a format
that is recognizable by specific hardware, such as adapters.
dial-up line
Communications line accessible via dial-up facilities, typically the public telephone network.
digital
Representation of information using ones and zeros. It is discretely variable as opposed to continuously
variable. Data characters are coded in discrete separate, electrical pulses or signal levels. Contrast with
analog.
Digital Service Unit (DSU)
A data circuit-terminating equipment required to use ISDN. It converts the digital signals of data terminal
equipment (such as personal computers) to digital signals used on digital transmission circuits.
directory caching
NetWare feature to improve performance. In directory caching, copies of the file allocation table and the
directory entry table are written into the network server's memory. A file's location can then be read from
memory, which is faster than reading it from a disk.
directory hashing
NetWare feature to improve performance. Directory hashing is a method of indexing file locations on a disk
so the time needed to locate a file is reduced.
directory rights
Restrictions specific to a particular directory.
directory services
Network service that provides information about an entity of interest. It is similar to an electronic phone book
to help network clients find services. There are several designs, including the X.500 standard, the Domain
Name System and Novell's NetWare Directory Services.
directory structure duplication
NetWare feature that protects data from failures in network hardware. A hard disk's directory and file
allocation tables contain the address information the operating system needs to determine where to store or
retrieve data. To reduce the possibility of losing this information, the NetWare network operating system
(NOS) maintains duplicate
copies of both the directory table and the file allocation table on separate areas of the hard disk. If the
primary copy is lost or destroyed, the NetWare NOS uses the secondary copy.
directory verification
NetWare feature that protects data from failures in network hardware. Each time the server is turned on, the
NetWare network operating system performs a consistency check on duplicate sets of directory and file
allocation tables to verify that the two copies are identical.
disk array
A system of having multiple disks for parallel usage to prevent the loss of data, and accelerate the speed of
reading and writing data in hard disks.
disk duplexing
Feature that protects data from failures in network hardware. In disk duplexing, all data on one hard disk is
duplicated on a second hard disk on a separate channel. Disk writes made to the original disk are also
made to the second disk. If the original disk or channel fails, the duplicate disk takes over automatically.

TOSHIBA America Business Solutions

Electronic Imaging Division

68

Network Fundamentals
Manual

TOSHIBA
disk mirroring
Feature that protects data from failures in network hardware. In disk mirroring, all data on one hard disk is
duplicated on a second hard disk on the same channel. Disk writes to the original hard disk are also written
to the second hard disk. If the original disk fails, the duplicate disk takes over automatically.
Disk Operating System (DOS)
The disk operating system (DOS) is the software that organizes how an IBM-compatible computer reads,
writes and reacts with its disks and communicates with various input/output devices. The most common
versions are DR DOS, MS-DOS and PC DOS.
distributed application
An application that operates in a distributed computing environment, where application modules may run on
different systems.
distributed computing
A computer operating environment that may involve computers of differing architectures and data
representation formats that share data and system resources.
distributed network
A computer network on which processing is shared by many different parts of the network. Processing may
be shared by client (local) computers, file servers, print servers and application servers such as database
servers. Distributed processing enables the most efficient use of processing power because available
processors can be dynamically assigned as either general or job specific processors, depending on the type
of work to be done and the existing work load. Distributed processing also enables duplication and
distribution of key services, such as directory services, so that full services remain available regardless of
the failure of individual parts of the network.
distributed processing
A technique to enable multiple computers to cooperate in the completion of tasks, typically in a networked
environment. Each computer that contributes to the completion of the total task actually does so by
completing one or more individual subtasks independently of its peers, reporting the results from its
subtasks as they are
completed.
domain
In the Internet, a part of a naming hierarchy. Syntactically, an Internet domain name consists of a sequence
of names separated by periods. In the NetWare network operating system and OSI, it is generally used as
an administrative partition of a complex distributed system.
Domain Name System (DNS)
Distributed name/address database used on the Internet.
DOMINO
A Web server software by Lotus. It can distribute the data of Notes, and write in Notes database.
Dot Gain
Amount by which a half-tone dot grows between the film, the plate, and the press sheet - an inevitable part
of the printing process.
Dots Per Inch (DPI)
A measure of the output resolution produced by laser printers or image setters.
downtime
Time when a system or network is unavailable.
drag-and-drop function
A mouse pointer operation in which you select an object and place it in a new location. For example, to print
a document, you drag its icon to the printer icon and drop it there.

TOSHIBA America Business Solutions

Electronic Imaging Division

69

Network Fundamentals
Manual

TOSHIBA
driver
A software program that allows a computer to communicate with other equipment; the driver manipulates
hardware in order to translate data to the equipment.
dumb terminal
Simple CRT and keyboard with limited capabilities such as display and edit functions.
Dynamic Host Configuration Protocol (DHCP)
A protocol which automatically assigns an IP address to a personal computer newly connected to the
network.
Dynamic-Link Library (DLL)
A module containing functions that other programs or DLLs can call. DLLs cannot run by themselves;
they must be loaded by other programs.

-Ee-mail (electronic mail)


A method of file transfer and message sending among workstations.
Encapsulated PostScript (EPS)
File format used to transfer PostScript image information from one computer software program to another.
encoding A system of assigning numeric values to characters.
encryption
Scrambling or coding of data for security.
engine
The core of a database or of an application.
error detection
Process of determining whether one or more bits have changed from a one to a zero, or vice versa, during
transmission.
Ethernet
A network cable and access protocol scheme originally developed by DEC, Intel and Xerox. It has a
bandwidth of 10 Mbit/s and supports coaxial, twisted pair (10Base-T) and fiber optic cable implementations.
EtherTalk
AppleTalk packets encapsulated to run on Ethernet cables.
Exchange
A groupware by Microsoft. It includes the mail function, scheduler, meeting room manager for reservation,
etc.
Excel
A spreadsheet software developed by Microsoft. It was originally developed for Macintosh computers, but it
is now widely used as the spreadsheet software for Windows.
expansion cards or boards
Circuit boards that fit into internal computer expansion slots and control specific functions such as
networking sound, video and modem.
expansion slots
Slots inside the computer that allow one to expand the computers capabilities.
Extended Binary Coded Decimal Interchange Code (EBCDIC)
Eight-bit code defined by IBM. Includes values for control functions and graphics.
TOSHIBA America Business Solutions

Electronic Imaging Division

70

Network Fundamentals
Manual

TOSHIBA
-FFax Modem
A type of modem having the function to fax documents directly from personal computers that are prepared
by a word processing program, etc. It also has the function to import faxed documents to personal
computers as data.
FCONSOLE
NetWare 3 utility used to access information from the network server and fine-tune its performance. It is a
virtual console utility that allows the operator to control a server from any station on the network.
Fiber Distributed Data Interface (FDDI)
Token Ring LAN technology that is optical fiber based and supports data transfer rates up to 100 MB/sec.
fiber-optic cable
High-bandwidth transmission medium that allows data to be transmitted by modulating a light wave through
a special glass or plastic fiber.
file allocation table (FAT)
A FAT keeps track of file locations in a particular volume. The NetWare network operating system (NOS)
divides each volume into blocks and stores files on the volume in these blocks. If the file consists of one or
more blocks, the file may be stored in blocks that are not adjacent. The FAT keeps track of the block
numbers where different
parts of the file are located. To retrieve a file, the NetWare NOS searches through the FAT until it finds the
FAT entries and corresponding block numbers for the requested file.
file sharing
An important feature of networking that allows more than one user to access the same file at the same time.
File Transfer, Access, and Management (FTAM)
The Open System Interconnection (OSI) remote file service and protocol.
fire wall
Existing between Internet and a LAN to let LAN access to Internet, and intervene access from Internet to
LAN. It is realized by using a software on server machines.
firmware
Set of software instructions that are set, permanently or semi-permanently, into integrated circuitry.
flow control
A rule to regulate the transmission volume of data. It prevents from failing to receive to data on the
computer with less capacity when transmission is performed between computers of different capacities.
font
Any of numerous sets of graphical representations of characters that can be installed on a computer or
printer.
font association
The automatic pairing of a font that contains ideographs with a font that does not contain ideographs.
This allows the user to enter ideographic characters regardless of which font is selected.
frame buffer
Portion of computer memory that contains a pixel-by-pixel description of a page in digital form.
Frame Relay
The frame relay method is a protocol on the simplified data link layer. It is the method that frame control or
error detection are not performed, and these functions are to be performed by the higher ranked protocols.

TOSHIBA America Business Solutions

Electronic Imaging Division

71

Network Fundamentals
Manual

TOSHIBA
frequency
A unit which is the number of times a wave vibrates per second. Modems use two kinds of frequency, and
convert analog signals to digital signals by changing higher analog signals to 0 and lower analog signals to
1.
full-width character
In a double-byte character seta character that is represented by 2 bytes and typically has a half-width
variant.
-Ggamma
Measure of contrast affecting the midtones of an image.
gamut
Range of colors
gateway
A hardware/software package that runs on the OSI application layer and allows incompatible protocols to
communicate; includes X.25 gateways. Usually connects PCs to a host machine, such as an IBM
mainframe.
Gigabit Ethernet
Emerging Ethernet standard for increased network bandwidth to 1 Gigabit per second.
gigabyte (GB)
A unit of measure for memory or disk storage capacity. Two to the 30th power (approximately one billion)
bytes.
Graphical User Interface (GUI)
A system which can be easily operated by using mouse pointing on icons of applications, files, and
commands like Mac or Windows.
Gray Component Replacement (GCR)
Technique for replacing all the neutral tones of an image with an appropriate amount of black.
grayscale
A continuous tone image made up of a number of shades of gray.
groupware
A type of software that supports concurrent use of objects (such as documents, calendars and
spreadsheets) by multiple LAN users.
GroupWise
A groupware by Novell. The scheduler is the strong point of GroupWise.
-Hhalf-duplex communication
A method of communication that enables both the communicating points to send data but only one way at a
time.
halftone screen
Pattern of dots of different sizes used to simulate a continuous tone photograph either in color or black and
white.
half-width character
In a double-byte character set a character that is represented by one byte and typically has a full-width
variant.

TOSHIBA America Business Solutions

Electronic Imaging Division

72

Network Fundamentals
Manual

TOSHIBA
hard-coding
Putting string or character literals in the main body of code, such as .C or .H files, instead of in Windows
resource files. Basing numeric constants on the assumed length of a string.
hard disk drive
A computer device consisting of one or more disks used to store information.
hardware
Components of a computer system including monitors, hard drives, CD-ROM5, printers keyboards, a
mouse, portable hard drives, modems, etc.
Hierarchical File System (HFS)
Attached to AFP in the Macintosh operating system. It manages files and directories.
High-Level Data Link Control (HDLC)
Communications protocol defined for high-level, synchronous connections to X.25 packet networks. Similar
in almost all respects to SDLC.
High-Level Language/Application Program Interface (HLLAPI)
Application programming interface designed for use with high-level languages.
hop number
It indicates the number of the routers passed when the data transmitted from the sender to the receiver.
host
A computer that is attached to a network and provides services to another computer beyond simply storing
and forwarding information. Usually refers to mainframe and minicomputers.
hot fix
NetWare feature that protects data from failures in network hardware. When the Hot Fix feature is activated,
a small portion of a hard disk's storage space is set aside as a Hot Fix redirection area. When read-afterwrite verification determines that there is a bad data block on the disk, Hot Fix redirects data that was to be
stored in the bad block to the Hot Fix redirection area. Hot Fix marks the defective block as bad, and the
server will not attempt to store data there again.
hub
Receives and sends signals along the network between the nodes (computers) that connect to it. In a LAN,
a hub is the core of an Ethernet Star network.
hue
Main attribute of a color which distinguishes it from other colors.
hypertext
A method for storing, retrieving and presenting information based on the processing power of computers.
Allows computerized linking and almost instantaneous retrieval of information based on a dynamic index.
Hyper Text Transfer Protocol (HTTP)
A protocol used for WWW clients to communicate with servers.
-Iimage setter
Computer-controlled device used to output images at high resolution onto photographic paper or film.
Integrated Services Digital Network (ISDN)
A public telecommunication network announced by CCITT in 1980. The telephone, telegraph, telex, data,
facsimile, and videotex are integrated and transmitted as digital signals on the same network. In Japan, NTT
provides this service as INS NET.
intelligent hub
Unit combining the function of a hub with processing capabilities.
TOSHIBA America Business Solutions

Electronic Imaging Division

73

Network Fundamentals
Manual

TOSHIBA
interface
Point at which a connection is made between two elements so that they can work together.
Interior Gateway Routing Protocol (IGRP)
A protocol for routers by CiscoSystems. It uses various information called merit information when it chooses
a route.
International Organization for Standardization (ISO)
Based in Paris, this organization develops standards for international and national data communications.
Internet
Collection of networks and gateways that use the TCP/IP suite of protocols. Lowercase, it is an abbreviation
for internetwork.
Internet Control Message Protocol (ICMP)
An Internet control protocol which notices the sender regarding the conditions when the packets are not
delivered to the receiver because of trouble. It also checks whether the receiver exists or not before
transmission.
Internet Information Server (IIS)
A Web server software by Microsoft. It is attached to Windows NT.
Internet Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
Network protocol standard for use on the Novell NetWare server family of products.
Internet Packet Exchange (IPX)
A protocol of NetWare on the network layer. As NetWare once acquired the share of 70% of the market of
personal-computer-oriented NOS, it became an industry wide standard. However, as the commercial use of
the Internet has been spread, TCP/IP became more popular. NetWare is in danger of losing its position in
the market.
Internet Protocol (IP)
TCP/IP protocol for packet forwarding.
internetwork
Two or more networks connected by an internal or external router.
interoperability
Ability for devices on a heterogeneous network to transmit and share data.
Institute of Electrical and Electronic Engineers (IEEE)
Creates networking standards for cabling, electrical topology, physical topology and access schemes.
-Jjabber
Continuously sending random data (garbage). Describes a network adapter that locks up the network with
continuous transmissions.
jam signal
A signal sent to the bus from a personal computer that has transmitted frames and whose frames collide
with other frames in the CSMA/CD method.
journaling
The process of logging system activity to facilitate a fast restart when needed.
-Kkernel
The core of an operating system that is responsible for managing system resources.
TOSHIBA America Business Solutions

Electronic Imaging Division

74

Network Fundamentals
Manual

TOSHIBA
kilobits per second (kbit/s)
Unit of measure for data transfer rates; two to the 10th power (1,024) bits per second.
kilobyte (KB)
A unit of measure for memory or disk storage capacity; two to the 10th power (1,024) bytes.
kilobytes per second (kbyte/s)
One thousand twenty-four bytes per second. Unit of measure commonly used for transfer rates to and from
peripheral devices.
-LLaminate Proof (also known as Chromalin)
Off-press proofing method in which the film separations are exposed in contact with CMYK film, which is
laminated onto a backing substrate to simulate the process of a printing press.
LAN Analyzer
A tool used for analyzing performance and detecting problems of networks. They are provided both as
hardware and software. Network administrators use them as a tool of network troubleshooting.
Lines Per Inch (LPI)
Measure of the frequency of the dots on a halftone screen.
Local Talk
A protocol which connects Macintosh computers to each other.
Local Area Network (LAN)
A system that links computers together to form a network, usually with a wiring-based cabling scheme.
LANs connect personal computers and electronic office equipment, enabling users to communicate, share
resources such as data storage and printers, and access remote hosts or other networks.
logical unit (LU)
Terminal emulation program or application in an SNA network. LUs can communicate with host systems and
applications (LU Type 0, 1, 2, 3, 4 and 7) or with other LUs of the same type (LU Type 6.0, 6.1 and 6.2 only).
login script
A set of instructions that directs your workstation to perform specific actions when you log in to the network.
The network supervisor can create a system-wide login script (which is the same for all users on the
network) that instructs all workstations to perform the same actions upon login. Your individual login script
executes after the system-wide login script. It specifies your individual drive mappings.
-Mmainframe computer
A large-scale computer (such as those made by Burroughs, Control Data, IBM, Univac and others) normally
supplied complete with peripherals and software. Also called a host or CPU. Contrast with minicomputer
and desktop computer.
media
Plural of medium. Physical paths over which communications flow, such as copper wires, coaxial cable or
optical fiber.
megabit
One million bits of data. Mbps (megabits per second10mbps means that 10 million bits of data per
second are transmitted over a network).
megabits per second (Mbit/s)
Unit of measure for data transfer rates; two to the 20th power (1,048,576) bits per second.
megabyte (MB)
A unit of measure for memory or disk storage capacity; two to the 20th power (1,048,576) bytes.
TOSHIBA America Business Solutions

Electronic Imaging Division

75

Network Fundamentals
Manual

TOSHIBA
TM

Memory Multiplier
Advanced EFI technology that enables Fiery to print images utilizing half of the memory previously
required; results in reduced cost with no loss of speed, quality or resolution.
message
Logical grouping of information at the application layer.
Message Handling Service (MHS)
Novell's store-and-forward technology for sending electronic mail messages.
minicomputer
A small-scale or medium-scale computer (such as those made by Data General, DEC, Hewlett-Packard and
others) that usually services dumb terminals. Contrast with mainframe computer and desktop computer.
mixed environment
A computer environment, usually a network, in which the operating systems of different machines are
based on different character encoding.
modem
Literally modulator/demodulator. Converts digital data into analog (waveform) signals for transmission along
media that carry analog signals and converts received analog signals back into digital data for use by the
computer. With the advent of digital lines, there is a also a new kind of modem, called a digital modem, that
doesn't actually modulate or demodulate signals but is merely responsible for their transmission over digital
lines.
modulation
The process of converting digital signals into analog signals by modulating a carrier frequency.
moire
Undesirable pattern in color printing resulting from incorrect screen angles of overprinted halftones.
motherboard
Main circuit board of a computer that holds the central processing unit, memory slots for expansion, Buses
for connecting peripherals and other devices.
MS-Mail
An electronic mail software by Microsoft.
multicast
Special form of broadcast in which copies of the packet are delivered to multiple stations, but only a subset
of all possible destinations.
multiple name space support
The method that allows various workstations running different operating systems to use their own familiar
naming conventions. Different operating systems have different conventions for naming files, but with
multiple name space support, the name spaces supported on a volume are configurable so that each file on
a given volume has a name
that any workstation can recognize.
Multiple Virtual Storage (MVS)
IBM operating system for large host systems.
multiplexer
Device that allows a single communications circuit to take the place of several parallel ones; often used to
allow remote terminals to communicate with front-end processor ports over a single circuit.
Multipurpose Internet Mail Extensions (MIME)
A protocol that transfers multimedia data such as voices or animation on the Internet.

TOSHIBA America Business Solutions

Electronic Imaging Division

76

Network Fundamentals
Manual

TOSHIBA
Multi Station Access Unit (MSAU)
When a token-ring is structured, its logical topology becomes a ring type, but its physical layout is a star type
topology. The MSAU is a line concentrator used for wiring in a token-ring.
multitasking
The ability to run two or more programs (tasks) on one computer at the same time. The tasks take turns
using available I/O and CPU cycles.
multivendor network
Network comprised of components from different vendors.
-NNETADMIN
NetWare 4 text utility that enables you to create objects and assign rights and properties.
NETBIOS Extended User Interface (NetBEUI)
A program to be the interface between the network layer protocol and LAN card driver in the LAN manager.
By separating LAN card driver and network layer protocol, a LAN card can handle multiple network layer
protocols.
NetWare Access Server
PC-based application server software from Novell that enables network managers to provide remote and
LAN-based users with access to all NetWare LAN resources, including SNA and TCP/IP applications.
NetWare Administrator (NWADMIN)
Graphical NetWare 4 utility that enables you to create objects and assign rights and properties.
NetWare Core Protocol (NCP)
A standard for the transport layer or upper strata, and a protocol for utilizing core functions of NetWare such
as file servers and print servers.
NetWare Loadable Module (NLM)
An NLM is a software module that can be added to the NetWare 3 or NetWare 4 network operating system
to add functionality to a network server. NLMs can be dynamically loaded on or unloaded from the NetWare
server without having to down the server.
NetWare Network Operating System (NNOS)
The network operating system developed by Novell, Inc. The NetWare NOS is loaded on the server when
the server is booted; it controls all system resources and the way information is processed on the entire
network or internetwork.
NetWare shell
The NetWare program loaded into the memory of each workstation. It builds itself around DOS and
intercepts the workstation's network requests, rerouting them to a NetWare server.
NetWare UNIX Client (NUC)
Software that allows a UnixWare system to behave as a recognized client to NetWare software. The
NetWare network operating system provides services to UnixWare users and applications, allowing access
to remote directories, files and printers on NetWare servers as if they were local.
network
A system that sends and receives data and messages, typically over a cable. A network enables a group of
computers to communicate with each other, share peripherals (such as hard disks and printers), and access
remote hosts or other networks.
network adapter
The hardware installed in workstations and servers that enables them to communicate on a network.

TOSHIBA America Business Solutions

Electronic Imaging Division

77

Network Fundamentals
Manual

TOSHIBA
network computing
A multivendor computing environment that integrates local and wide area network technologies to provide
enterprise-wide connectivity.
Network Basic Input/Output System (NetBIOS)
A programmable entry into the network that allows systems to communicate over network hardware using a
generic networking API that can run over multiple transports or media.
Network File System (NFS)
A protocol of TCP/IP which enables users to access the HDDs connected to other computers on the
network.
Network Information Service (NIS)
A protocol which enables more than one UNIX machines to administer users or host computers.
Network News Transfer Protocol (NNTP)
A protocol for transferring news.
Network Operating System (NOS)
A software application that drives all the services of the network (i.e.: NetWare or Windows NT).
node
Device that is connected to a network and is capable of communicating with other network devices. In
NetWare, a node is considered to be an end system, such as a workstation.
noise
Unwanted changes in waveform that occur between two points in a transmission circuit.
nondedicated
A device that performs multiple simultaneous functions. For example, a nondedicated network server runs
the network functions and performs as a workstation.
NOTES
A groupware software by Lotus. It includes the e-mail function, documents manager, and workflow
manager.
Novell NetWare
Popular network server software that allows multiple workstation operating systems (Windows, Macintosh,
UNIX, etc.) to share file and print services on a Local Area Network (LAN) or Wide Area Network (WAN).
Novell Virtual Terminals (NVT)
A two-part program (one for the DOS system and one for the UnixWare Application Server) that allows DOS
clients to access applications running on the Application Server.
NT File System Windows NTFS)
A file system unique to Windows NT. It improved the weak points of FAT.
-OOffset printing
A common printing process which utilizes an intermediate black cylinder to transfer or offset a piece from a
plate to paper.
open architecture
An architecture that is compatible with hardware and software from any of many vendors.
Open Data-link Interface (ODI)
A specifications of LAN cards adopted by Novells NetWare. It specifies the part of interface between LANcard drivers and the protocols of the network layer. By separating LAN-card drivers from the protocols of the
network layer, users can choose various protocols of the network layer (IP, IPX, Apple Talk) for a LAN card.
TOSHIBA America Business Solutions

Electronic Imaging Division

78

Network Fundamentals
Manual

TOSHIBA
Open Prepress Interface (OPI)
Facility for desktop publishing networks to store high-resolution images on a fast file server and allow user to
place a low-resolution version of the image in the page layout program; file server replaces low-resolution
image sent by the workstation with the high-resolution version at print time.
Open Shortest Path First (OSPF)
A protocol for routers. It administer networks and chooses routes by using concepts of logical groups
domains and variable length subnets.
Open Systems Interconnection (OSI) reference model
A model for network communications consisting of seven layers that describe what happens when
computers communicate with one another.
Operation, Administration and Management (OA&M) package
A UnixWare menu-based interface to a suite of system administration and maintenance utilities.
operating system (OS)
Software that manages a computer system. It controls data storage, input and output to and from the
keyboard and other peripheral devices, and the execution of compatible applications.
ORACLE
A database software by ORACLE. It has different products for mainframe, workstations, personal
computers, and those dealing with various hardware and NOS.
Original Equipment Manufacturer (OEM)
Often used to refer to MS-DOS standards, such as OEM code pages.
OS/2
An operating system that uses a graphical user interface and was designed by IBM.
OSF/Motif
The Open Software Foundation's non-proprietary GUI standard; includes a window manager and a toolkit.
overprinting
Printing page elements on top of one another without creating a trap.

-Ppacket
The unit of information by which the network communicates. Each packet contains the identities of the
sending and receiving stations, error-control information, a request for services, information on how to
handle the request and any necessary data that must be transferred.
packet assembler/disassembler (PAD)
Device or program used to create packets of data for transmission over a CCITT X.25 packet data network
and to remove data from the received packets. The most common is a CCITT X.29 PAD, used for
packetizing and depacketizing asynchronous ASCII data.
packet switching
Packets are relayed across network along the best route available.
Page Description Language (PDL)
Language used to describe a page to a printer; Hewlett Packard LaserJets use PCL (Printer Control
Language), plotters have HP-GL (Hewlett Packard Graphics Language), other printers use PostScript.
PANTONE Matching System (PMS)
Proprietary system that supplies color swatches for designers and matching inks for printers; used to define
and print specific colors; industry standard for non-process color.
Parallel Transmission
A method of transmitting data by a unit of 8 bits.
TOSHIBA America Business Solutions

Electronic Imaging Division

79

Network Fundamentals
Manual

TOSHIBA
passwords
Network security feature. Supervisors of NetWare networks have the option of requiring users to use a
password when they log in to the network. If passwords are required, all users must have unique
passwords. Passwords in the NetWare network operating system(NOS) are encrypted; that is, they are
stored on the server in a format only the
server can decode.
peer-to-peer network
A network consisting of nodes (computers) which all have both client and server capabilities and on which
communication and data sharing is carried on directly between nodes, rather than being arbitrated by an
intermediary node. On a peer-to-peer network all nodes run the same peer-to-peer operating system, which
gives them both client and server capabilities. Personal NetWare is an example of a peer-to-peer network
operating
system.
performance tuning
Monitoring and analyzing the net performance of a system and adjusting its configuration to obtain optimum
performance.
Peripheral Component Interconnect (PCI)
A new standard bus for Pentium processors advocated by Intel.
phase
The wave forms of current and voltage of analog signals are displaced, reaching their peaks at different
times. This difference is denoted by the phase angle. Some modems use this phase angle to convert digital
signals to analog signals.
physical address
Data-link layer address of a network device.
ping
A tool to detect the response from the IP address designated by TCP/IP, or measure times to receive
responses. As for the NOS coping with TCP/IP, this tool is provided and used for confirming the connection
or troubleshooting.
pixel
Picture element or dot in an image. Typical monitor pixel resolutions are 640 x 480, 800 x 600, 1024 x
768.
plain text
Computer-encoded text that contains only code elements and no other formatting or structural
information, such as font size, font type, or other layout information. Plain text exchange is commonly
used between computer systems that might have no other way to exchange information.
platform
Term used as a generic reference to all possible choices for some specific part of the computing
environment. For example: desktop operating system platform (could include DOS, OS/2 and so on) or
network operating system platform (NetWare, LAN Manager, and so on).
Point to Point Protocol (PPP)
A protocol which connects LANs in remote areas in the network stratum. PPP has made WAN
communications possible between different manufacturers products.
port
For hardware, a connecting component that allows a microprocessor to communicate with a compatible
peripheral. For software, a memory address that identifies the physical circuit used to transfer information
between a microprocessor and a peripheral.
Portable Document Format (PDF)
Native file format for representing documents independent of the original application software, hardware,
and operating system used to create those documents.
TOSHIBA America Business Solutions

Electronic Imaging Division

80

Network Fundamentals
Manual

TOSHIBA
PostScript
Developed by Adobe Systems in 1985; computer language that describes appearance of text, graphical
shapes, and images on a page.
PostScript Printer Description (PPD)
PostScript files that describe all of the unique features of the printer so driver can display appropriate options
of the printer.
Primary Domain Controller (PDC)
A computer to control the domain in the Microsoft network. There must be a PDC in a domain.
print queue
A place to temporarily store the data for printing until the turn to use the print server comes. It is placed on
the hard disk of the server. The stored data can be deleted, or the order of printing can be changed.
Private Branch eXchange (PBX)
An in-house switching board system switching outside telephone lines or extension telephones.
process color
Method of printing a wide spectrum of colors by mixing combinations of four basic colors: cyan, magenta,
yellow and black.
protocol
A standard method of communication such as IPX/SPX, AppleTalk, and TCP/IP used to transfer data
between two devices.
protocol suite
A collection of networking protocols that provides the communications and services needed to enable
computers to exchange messages and other information, typically by managing physical connections,
communications services and application support.
proxy server
A proxy server is used for connecting internal networks to the Internet. It has the function to obtain
information from the Internet on behalf of internal personal computers. It also has the function to protect
unauthorized access via the Internet to internal networks.
-Qqueue
A line or list formed by items waiting for service, such as tasks waiting to be performed, stations waiting for
connection, or messages waiting for transmission.
query
Process of extracting data from a database and presenting it for use.
-RRandom Access Memory (RAM)
Short-term memory resource located in a computer. The larger amount of RAM, the larger the size of the
files that can be processed.
Raster Image Processor (RIP)
Part of an output device that rastenzes information so that it may be printed onto film or paper.
rasterization
Conversion of PDL data into a bitmap for printing or display.
real-time
An on-line computer that generates output nearly simultaneously with the corresponding inputs. Often, a
computer system whose outputs follow its inputs by only a very short delay.

TOSHIBA America Business Solutions

Electronic Imaging Division

81

Network Fundamentals
Manual

TOSHIBA
redundancy
A duplicate capacity that can be called upon when a failure occurs; having more than one path to a signal
point.
registration
Precise placement of the four printing plates on a press so each color prints in their correct relationship to all
the others; poor registration results in blurry double images or gaps between colors.
registry
A Windows file that stores user preferences, including international settings.
rendering
The way in which a character is graphically displayed.
Remote Access Server (RAS)
A computer that receives access from remote places via public circuits.
resolution
The output measurement of an image expressed in dots per inch (dpi), pixels per inch (ppi) or lines per inch
(lpi).
resource
(1) An element, such as a string, icon, bitmap, cursor, dialog, accelerator, or menu, that is included in a
Microsoft Windows resource (.RC) file. (2) Any item that needs to be translated.
resource sharing
A directory, printer, or application object that is shared on the network.
rich text
Text saved with formatting instructions that multiple applications, including compatible Microsoft
applications, can read and interpret.
rights
Rights control which directories and files a user can access and what the user is allowed to do with those
directories and files. Rights are assigned to directories and files by the network supervisor.
RIP-While-Print
Feature that enables the Fiery to begin processing new pages while current pages are printing, increasing
throughput on multi-page documents.
router
A software and hardware connection between two or more networks, usually of similar design, that permits
traffic to be routed from one network to another on the basis of the intended destinations of that traffic.
Routing Information Protocol (RIP)
A protocol on routers used in TCP/IP. At regular intervals, routers automatically exchange information
regarding newly connected nodes or damaged lines. When they receive requests for transmission, routers
choose the shortest routes between senders and receivers.
RS-232C
A serial interface protocol regulated by the Electronic Industries Association (EIA) of the US. It is often used
for connecting modems to computers.
-Sscreen angles
Renders an image properly by assuring cyan, magenta, yellow and black halftone screens are at exact
angle to one another; incorrect angles can result in an undesirable moire pattern.
script
A system of characters used to write one or several languages. Characters denote isolated sounds,
syllables, or word elements and are governed by a general set of rules for creating text, such as default
writing direction.
TOSHIBA America Business Solutions

Electronic Imaging Division

82

Network Fundamentals
Manual

TOSHIBA
Sequenced Packet Exchange (SPX)
A NetWare protocol for transport layer. This is the protocol of connection type similar to TCR
Serial Line Internet Protocol (SLIP)
A protocol for IP connection by using RS-232C.
serial transfer
A method of transferring data 1 bit at a time.
server
A computer that provides shared resources to network users.
Server-Based Network
Typically used in larger (10 or more station) networks.
Sequenced Packet Exchange (SPX)
A protocol by which two workstations or applications communicate across the network. SPX uses NetWare
IPX to deliver the messages, but SPX guarantees delivery of the messages and maintains the order of
messages on the packet stream.
server
A computer on the network capable of recognizing and responding to client requests for services. These
services can range from basic file and print services to support for complex, distributed applications. For
example, a distributed database management system can create a single logical database across multiple
servers.
Server Advertising Protocol (SAP)
SAP is a protocol for sending information regarding the existence of servers and their functions to clients
and other servers.
Service Advertising Protocol (SAP)
A NetWare feature that advertises the services available on the Applications Server.
shielded cable
Cable that has a layer of insulation to reduce electromagnetic interface.
Simple Network Management Protocol (SNMP)
A protocol that manages the host computers or gateways used in TCP/IR
Software Development Kit (SDK)
A set of tools and libraries for creating software applications for Windows operating systems.
spanning
A technique for improving I/O performance by placing frequently-used segments of a file system or database
on separate disks.
spot color
Color printed with custom ink rather than with a process color combination.
SQL Server
A relational database software for Windows NT by Microsoft.
standalone
A computer that is not connected to a network.
TM

STARR Compression
Fiery compression technology that enables true document printing and storage of RIPed files.

TOSHIBA America Business Solutions

Electronic Imaging Division

83

Network Fundamentals
Manual

TOSHIBA
star topology
One end of each cable in a star topology attaches to a central hub while the other end attaches to a single
computer. The computers can be positioned in a radial fashion with the hub located in the center, like the
spokes of a wheel.
striping
A technique for improving I/O performance by interleaving file systems or data bases across multiple disks.
Structured Query Language (SQL)
A language to operate relational databases. It is developed by IBM, and approved to be the international
standard for database language in 1987 ISO meeting. It can be used for general computers to personal
computers, and can retrieve the databases spread over different types of computers.
supervisor
The person responsible for the administration and maintenance of a network or database. A supervisor has
access rights to all volumes, directories and files.
switch
Also known as a switching hub, has the ability to direct packet traffic to its correct network destination by
reading the address information included in each packet.
switching HUB
Conventional hubs function logically in the same way as the bus-type LAN, where personal computers share
a transmission route. However, switching hubs enable each personal computer to exclusively use the
transmission route to make the most use of the 1 0-Mbps transfer speed by using a switching technology.
synchronous
During a data transmission between computers, a response is returned from the receiver after a certain time
in accordance with the data length sent by the sender. For this purpose, both sending and receiving sides
must make the starting time and ending time match. This is the synchronization, and the method of sending
data while synchronizing is called the synchronous transmission.
Synchronous Data Link Control (SDLC)
IBM-defined link-control protocol that is code-independent.
System Application Architecture (SAA)
A set of IBM-defined standards designed to provide a consistent environment for programmers and users
across a broad range of IBM equipment, including microcomputers, minicomputers and mainframes.
System Fault Tolerance (SFT)
Duplicating data on multiple storage devices so that if one storage device fails, the data is available from
another device. There are several levels of hardware and software system fault tolerance. Each level of
redundancy (duplication) decreases the possibility of data loss.
System Management Server (SMS)
A network administration system for WindowsNT developed by Microsoft.
System Network Architecture (SNA)
A type of network architecture announced by IBM in 1974. It systematized protocols for hardware and
software in order to comprehensively manage networks centering on IBMs mainframes. Its main purpose
was to control communications between mainframes and terminal units. It was the model of OSI and other
manufacturers mainframe architecture.
-TTagged Image File Format (TIFF)
Standard file format for exchange bitmapped images (usually scans) between applications.
telephony
Generic term to describe voice telecommunications.
TOSHIBA America Business Solutions

Electronic Imaging Division

84

Network Fundamentals
Manual

TOSHIBA
Telnet
Protocol in the TCP/IP suite that governs character-oriented terminal traffic.
terabyte
A unit of measure for memory or disk storage capacity; two to the 40th power (approximately one trillion)
bytes.
terminal
A device, usually equipped with a keyboard and display, capable of sending and receiving data over a
communications link.
terminal emulation
Software that allows a microcomputer to function as a dumb terminal.
terminator
A small connector which contains a resistor. Terminators attach to each end of a coax cable in a bus
topology.
text element
Smallest unit of text that can be displayed or edited.
Thicknet (10Base5)
This term describes a larger diameter (approx. 0.5.) Coax cable. This cable can carry signals farther than
thinnet coax and is typically used as a backbone.
Thinnet (10Base2)
This term describes small diameter (approx. 0.25") coax cables. Six cable styles fall into this general
designation. Ethernet uses types RG-58/U or RG-58/AU. Ethernet connection most commonly used in new
network installations because of lesser cost and ease of use versus other Ethernet connections; data travels
at 10Mb/sec.
Token Bus
A system of communication by circulating tokens. Its wiring topology is the bus type LAN.
Token Ring
Physical network connection technology developed by IBM and most commonly used in large corporations.
topology
The physical layout of network components (cable, stations, gateways, hubs and so on). There are three
basic interconnection topologies, star, ring and bus networks.
transceiver
Network component that performs both transmitting and receiving functions.
Transmission Control Protocol/Internet Protocol (TCP/IP)
A protocol suite and related applications developed for the U.S. Department of Defense in the 1970s and
1980s specifically to permit different types of computers to communicate and exchange information with one
another. TCP/IP is currently mandated as an official U.S. Department of Defense protocol and is also widely
used in the UNIX community.
trap
Overlap that prevents white spaces from appearing along the edges of adjacent colors in an image due to
slight misalignment or movement of the separations on press.
True Color Systems
Monitors that display more than 16 million colors (24 bits per pixel).
twisted-pair wiring
Two wires, usually loosely spun around each other to help cancel out any induced noise in balanced circuits.

TOSHIBA America Business Solutions

Electronic Imaging Division

85

Network Fundamentals
Manual

TOSHIBA
-UUndercolor Removal (UCR)
Process of removing CMY percentages that make up a gray element within darker colors and replacing than
with an appropriate amount of black.
uninterruptible power supply (UPS)
A backup power unit that provides continuous power even when the normal power supply is interrupted.
UNIX
Operating system developed by AT&T Bell Laboratories. Allows a computer to handle multiple users and
programs simultaneously.
UnixWare operating system (OS)
Novell's UNIX operating system for PCs.
user
Any person who attaches to a server or host.
user accounts
NetWare security feature. Each user on a NetWare network has a user account. This account determines
what name the user uses to log in to the network, the groups the user belongs to and what trustee
assignments the user has. User accounts are maintained by the network supervisor.
-VV.32
A standard for the transmission speed of 9600 bps used for modems.
V.32bis
A standard set by ITU-T for the modem with transmission speed of 14,400 bps.
V.34
A standard set by ITU-T for the modem of two-wire and full-duplex transmission with a speed of 28,800 bps.
V.42
An ITU-T standard for error correcting procedure. A program in a modem handles error correction.
V.42bis
A protocol for data compression method recommended by CCITT. It has interchangibility with MNP class 5.
value-added process (VAP)
An application that runs on top of NetWare 2 network operating systems. VAPs tie in with the network
operating system so that print servers, archive servers and database servers can provide services without
interfering with the network's normal operation.
VAX
A Digital Equipment Corporation minicomputer.
vector graphics (images)
Graphics displayed using a technology that specifies how an image is represented by using vector notation;
for example, a starting point, a length and the direction that the line to be drawn from the starting point is to
take. From a mathematical perspective, a vector graphics image is simply a collection of individual points,
lines and curves.
vertical application
An application that is specific to one area of use. For example: an accounting application or a legal
application.
Virtual Circuit
One physical line can be used as more than one logical line, making each personal computer is using a
dedicated line. TCP is a protocol for communication by establishing virtual circuits.
TOSHIBA America Business Solutions

Electronic Imaging Division

86

Network Fundamentals
Manual

TOSHIBA
Virtual Memory System (VMS)
Operating system for DEC VAXs.
Visual C++
Microsoft's object-oriented C compiler.
volume
A volume is the highest level in the NetWare directory structure, residing at the same level as a DOS root
directory. A volume represents a physical amount of hard disk storage space.
-WWhat You See Is What You Get (WYSIWYG)
Describes the idea that a printed image is visually identical to the same image when viewed on a computer
monitor.
Wide Area Network (WAN)
Multiple LAN or physical connections that span over a long distance (i.e.: across many buildings; between
cities or countries).
win32 API
The set of 32-bit functions supported by Windows.
win32s API
A subset of the Win32 API that makes it possible to create a single binary file that runs on Windows 3.1
and on all 32-bit versions of the Windows platform.
windows 95
The 32-bit successor to Windows 3.1, Microsoft's entry-level operating system.
Windows Internet Name Service (WINS)
The computers connected to the Microsoft network must be given names. When those computers
communicate extending over the router, the access between networks can be possible by exchanging the
computer names by servers.
Windows NT Server
The high-end version of Windows NT that includes additional features for servers.
workgroup
Workgroup A collection of computers (not users) that form an administrative unit and do not belong to a
domain. In a workgroup, each computer tracks its own user- and group-account information, and does not
share this information with other workgroup computers.
workgroup manager
Workgroup manager is a user classification in the NetWare 3 and NetWare 4 network operating systems.
Workgroup managers have supervisory control over any user or user group they create on the network.
workstation
Any individual personal computer that is connected to a network.
World Wide Web (WWW)
A system to distribute contents by using Internet. The receiving side receives the contents by the software
called browser. As users can distribute data regardless of hardware or operating software, it has greatly
contributed to the widespread use of Internet.
- X -- Y -- Z X.25
A CCITT standard that defines the communications protocol for access to packet-switched networks. A
standard protocol for packet switching, and a representative standard in the X series recommendations.
Packet switching circuit is the dedicated circuit for data transmission between computers. The fee is
TOSHIBA America Business Solutions

Electronic Imaging Division

87

Network Fundamentals
Manual

TOSHIBA
determined by the number of packets sent, not by the time of circuit used. A packet is a certain volume of
data, and one packet is the data of 256 bytes or 1042 bytes lengths. X.25 is the standard equal to that of
physical layer, data link layer, and network layer in OSI.
X.400
Open Systems Interconnection (OSI) standard that defines how messages are to be encoded for the
transmission of electronic mail and graphics between dissimilar computers and terminals; defines what is in
an electronic address and what the electronic envelope should look like. The X.400 standards are a subset
of, and conform to, the X.25 standard approved by the Consultative Committee for International Telegraphy
and Telephony (CCITT).
X Window System
Standard set of display-handling routines developed at MIT for UNIX workstations; they allow the creation of
hardware-independent graphical user interfaces.
zone
On a local area network such as AppleTalk, a subgroup of users within a larger group of interconnected
networks.

TOSHIBA America Business Solutions

Electronic Imaging Division

88

Network Fundamentals
Manual

S-ar putea să vă placă și