Documente Academic
Documente Profesional
Documente Cultură
reliability of the materials, products, methods, and/or services people use every day. Standards address
a range of issues, including but not limited to various protocols that help ensure product functionality
and compatibility, facilitate interoperability and support consumer safety and public health.
Standards are necessary in almost every business and public service entity. For example, before 1904,
fire hose couplings in the United States were not standard, which meant a fire department in one
community could not help in another community. The transmission of electric current was not
standardized until the end of the nineteenth century, so customers had to choose between Thomas
Edison’s direct current (DC) and George Westinghouse’s alternating current (AC).
The primary reason for standards is to ensure that hardware and software produced by different
vendors can work together. Without networking standards, it would be difficult—if not impossible—to
develop networks that easily share information. Standards also mean that customers are not locked into
one vendor. They can buy hardware and software from any vendor whose equipment meets the
standard. In this way, standards help to promote more competition and hold down prices. The use of
standards makes it much easier to develop software and hardware that link different networks because
software and hardware can be developed one layer at a time.
Standardization is the process of developing, promoting and possibly mandating standards-based and
compatible technologies and processes within a given industry.
Standards for technologies can mandate the quality and consistency of technologies and ensure their
compatibility, interoperability and safety. Standards organizations such as ANSI(American National
Standards Institute), IEEE(Institute of Electrical and Electronics Engineers) and IETF (Internet Engineering
Task Force) exist to promote standardization and endorse official standards (also known as de
jure standards) for given applications.
A lack of standardization often manifests in large numbers of incompatible proprietary formats for a
given technology and for technologies that must interoperate. That all-too-common situation hinders the
adoption and advancement of the technology and industry.
The burgeoning Internet of Things (IoT) is a current case in point. The main purpose of the IoT is enabling
almost any object imaginable to be connected and to transmit data over the Internet. Although that
scenario is increasingly becoming realized, incompatible formats and market fragmentation are slowing
adoption.
Standard Organizations
IEEE stands for the "Institute of Electrical and Electronics Engineers". The association is chartered under
this full legal name. IEEE's membership has long been composed of engineers and scientists. Allied
professionals who are members include computer scientists, software developers, information
technology professionals, physicists, and medical doctors, in addition to IEEE's electrical and electronics
engineering core. For this reason the organization no longer goes by the full name, except on legal
business documents, and is referred to simply as IEEE. The IEEE is dedicated to advancing technological
innovation and excellence. It has about 430,000 members in about 160 countries, slightly less than half
of whom reside in the United States.
ANSI (American National Standards Institute)
American National Standards Institute (ANSI) serves as administrator and coordinator of the United
States private-sector voluntary standardization system. ANSI was founded in 1918 by five engineering
societies and three governmental agencies, and is a private, nonprofit membership organization. ANSI
ensures each foot-long ruler is accurate in its dimensions, for instance, essentially using a ruler to
measure a ruler. ANSI ensures that each inch on the ruler is in fact 1 inch, and that the foot-long ruler is
in fact made up of 12 of these inches.
ANSI, like the ITU, regulates telecommunications standards; unlike the ITU, however, ANSI regulates
standards in North America, whereas the ITU regulates standards in Europe. For example, ANSI regulates
the T1 telecommunications standard, whereas the ITU regulates the E1telecommunications standard in
Europe.
Abbreviated EIA, a trade association representing the U.S. high technology community. It began in 1924
as the Radio Manufacturers Association. The EIA sponsors a number of activities on behalf of its
members, including conferences and trade shows. In addition, it has been responsible for developing
some important standards, such as the RS-232, RS-422 and RS-423 standards for connecting serial
devices.
Engineering Committees:
Abbreviation IETF[2]
Formation January 16, 1986; 32 years ago
Website ietf.org
The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in
particular the standards that comprise the Internet protocol suite (TCP/IP). It is an open standards
organization, with no formal membership or membership requirements. All participants and managers
are volunteers, though their work is usually funded by their employers or sponsors.
The IETF started out as an activity supported by the U.S. federal government, but since 1993 it has
operated as a standards development function under the auspices of the Internet Society, an
international membership-based non-profit organization.
The Internet Society (ISOC) is an American non-profit organization founded in 1992 to provide
leadership in Internet-related standards, education, access, and policy. Its mission is "to promote the
open development, evolution and use of the Internet for the benefit of all people throughout the
world".
The Internet Engineering Steering Group (IESG) is a body composed of the Internet Engineering Task
Force (IETF) chair and area directors. It provides the final technical review of Internet standards and is
responsible for day-to-day management of the IETF. It receives appeals of the decisions of the working
groups, and the IESG makes the decision to progress documents in the standards track.
The Internet Architecture Board (IAB) is "a committee of the Internet Engineering Task Force (IETF) and
an advisory body of the Internet Society (ISOC). Its responsibilities include architectural oversight of IETF
activities, Internet Standards Process oversight and appeal, and the appointment of the Request for
Comments (RFC) Editor. The IAB is also responsible for the management of the IETF protocol parameter
registries."
Network Classifications
Local area network (LAN) communications networkused to interconnect multiple computers and other
devices. Its distribution is limited to a building or a range of 200 meters without using a repeater. Are
mostly used to connect personal computers andworkstations in the home, offices, factories, etc.. This
means that users can share resources or devices that are connected to other equipment such as printers,
faxes, file sharing, etc...
Campus Area Network (CAN): CAN is a collection of geographically dispersed LANs within
a campus(university, government offices, factories, etc..)belonging to the same entity in a limited area in
kilometers. CAN A commonly used technologies such as FDDI, wireless, Gigabit Ethernet, and so on.
Metropolitan Area Network (MAN): A MAN is a collection of LANs or CANs dispersed in a city NACs
(tens of kilometers). A MAN used technologies such as ATM, Frame Relay, xDSL (Digital Subscriber
Line), WDM (Wavelength Division Modulation), ISDN, E1/T1, PPP, etc. for connectivity through media
such as copper, fiber optic, and microwave.
Wide Area Network (WAN): WAN is a collection of geographically dispersed LANs to hundreds
of kilometers apart. A network device called a router is able to connect LANs to a
WAN.Technologies commonly used ATM(Asynchronous Transfer Mode), FrameRelay, X.25, T1/E1,
GSM, TDMA, CDMA, xDSL, PPP, etc. for connectivity through media such as fiber optics, microwave,
cellular, satellite, etc..
Storage Area Network (SAN): A network designed to connect servers, arrays (arrays) discs
and supporting libraries. It is mainly based on iSCSIor fiber technology. Its function is to
connect quickly, securely and reliably various storage elements that comprise it.
A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a
less secure network, such as the internet. VPN technology was developed as a way to allow remote
users and branch offices to securely access corporate applications and other resources.
Types of VPN
1. Remote Access VPN
Remote access VPN allows a user to connect to a private network and access its services and resources
remotely. The connection between the user and the private network happens through the Internet
and the connection is secure and private.
A Site-to-Site VPN is also called as Router-to-Router VPN and is mostly used in the corporates.
Companies, with offices in different geographical locations, use Site-to-site VPN to connect the
network of one office location to the network at another office location.
It's basically the physical and logical design which refers to the software, hardware, protocols and the
media of transmission of data. Simply put, it refers to how computers are organized and how tasks are
allocated among these computers. The two types of widely used network architectures are peer-to-
peer aka P2Pand client/server aka tiered.
Peer-to-Peer Architecture
In a peer-to-peer network, tasks are allocated to every device on the network. Furthermore, there is no
real hierarchy in this network, all computers are considered equal and all have the same abilities to use
the resources available on this network. Instead of having a central server which would act as the shared
drive, each computer thats connected to this network would act as the server for the files stored on
Client/Server Architecture
In a client/server network, a centralized, really powerful computer(server) acts as a hub in which other
computers or workstations(clients) can connect to. This server is the heart of the system, which manages
and provides resources to any client that requests them.
A multipoint connection is a communication channel between two or more clients of the network,
where all data sent by one client is received by all other clients. A point-to-point connection is a special
case of a multipoint connection involving only two clients.
The Open System Interconnection (OSI) model defines a networking framework to implement protocols
in seven layers. Use this handy guide to compare the different layers of the OSI model and understand
how they interact with each other.
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Communication partners are
identified, quality of service is identified, user authentication and privacy are considered, and any
constraints on datasyntax are identified. Everything at this layer is application-specific. This layer
provides application services for file transfers, e-mail, and
other network software services. Telnet and FTP are applications that exist entirely in the application
level. Tiered application architectures are part of this layer.
Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by
translating from application to network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This layer formats and encrypts data
to be sent across a network, providing freedom from compatibility problems. It is sometimes called the
syntax layer.
Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets
up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at
each end. It deals with session and connection coordination.
Transport (Layer 4)
OSI Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known as virtual circuits, for
transmitting data from node to node. Routing and forwarding are functions of this layer, as well
as addressing,internetworking, error handling, congestion control and packet sequencing.
At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes transmission
protocolknowledge and management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer
and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network
gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow
control and error checking.
Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame
Relay.
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal — through
the network at the electrical and mechanical level. It provides the hardware means of sending and
receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232,
and ATM are protocols with physical layer components.