element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • About Us
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Code Exchange
  • Technologies
  • More
Code Exchange
Blog Back to College: Networking
  • Blog
  • Forum
  • Documents
  • Events
  • Polls
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Code Exchange to participate - click to join for free!
  • Share
  • More
  • Cancel
Group Actions
  • Group RSS
  • More
  • Cancel
Engagement
  • Author Author: phoenixcomm
  • Date Created: 7 Oct 2018 12:46 AM Date Created
  • Views 2515 views
  • Likes 3 likes
  • Comments 9 comments
  • network terminology
  • dhcp
  • fixed vs dynamic ip addressing
  • nexgen
  • ftp
  • bootp
  • 192.168.x.x
  • back to college
  • hub
  • switch.
  • tftp
  • tcp
  • nic
  • udp
  • class c private address space
Related
Recommended

Back to College: Networking

phoenixcomm
phoenixcomm
7 Oct 2018
image
image

At this point, I will digress and turn the clock back, life was good we had the Internet, Ethernet and Microsoft could not spell or supported either. At that time for Ethernet cable, you had your choice of Thick (10Base-5), Thin (10Base-2), and or CAT3 (10Base-2.3), and yes there was also Fiber (10Base-2.3FL) interfaces from Codenall Technologies and later Milan Technologies. Mostly my adapters had Thin or AUI (Attachment Unit Interface) interfaces. Now I have set up more coax based Ethernet systems so I opted for a new 802.3 spec mostly these devices used the AUI interface with some sort of adapter. No Switches only Hubs.

A Hub is a device in which traffic on one port is seen on all ports.

A Switch is a network device in which traffic appears on two ports only (uplink port, and device port)

A NIC is a Network Interface Card or Adapter.

A MAC address is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer. Today every device from your computer to your toaster has a MAC address.  An IP Datagram cannot attach at the data link layer!

Then along came NATing Routers this was very cool as now you could Translate your IP range to something private.

NAT is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.

Class C Private Space is defined as an address that will not translate across your gateway into public space. Virtually all Class C Private Space is using 192.168.1.x some are using 192.168.0.x so you have only scratched the surface as the subnet address range from 0 to 255 which is 255 x 255 or about 65 thousand addresses and each subnet will lose three-address wire, broadcast, gateway.  So in the normal world, the wire is 0,  gateway or your router is 1, and broadcast is 255.

Included were the following applications: FTP, TFTP, BootP.

FTP File Transfer Protocol. Client-Server model for transferring files of all types.

TFTP Trivial File Transfer Protocol.  is a utility for transferring files that is simpler to use than the FTP but less capable. It is used where user authentication and directory visibility are not required. TFTP uses  UDP rather than  TCP. TFTP is described formally in RFC 1350.

BootP Bootstrap Protocol that lets a network user be automatically configured (receive an IP address) and have an operating system booted (initiated) without user involvement. The BOOTP server, managed by a network administrator, automatically assigns the IP address from a pool of addresses for a certain duration of time.

Then Microsoft Introduced DHCP  with RFC 2136

DHCP Dynamic Host Configuration Protocol is a client-server protocol that automatically provides an IP host with its IP address and other related configuration information such as the subnet mask and default gateway.

With that shot, the war was on Static or Dynamic? DHCP let the average user an easy way for them to configure there own network. I have never liked DHCP myself, and don't see the need for it in a fixed network. Plus it makes the user lazy and not wish to understand the basic network terms. I look at it like this: I have 5 or 6 maybe more computers that are on the network. That does not count my IP VOIP Cisco phones. which are on there own separate network and subnet via its own NAT router. The Only thing that uses DHCP is my laptops.

here is a list of my network

    

  • Spectrum Cable 200 Mb Down
  • 192.168.1.1 Main GateWay Router  (Netgear N600)
    • Cisco 2900xl 24 port 100Mb switch.
      • Office Net Low speed
        • HP Laser 3333 connected via HP Jet Direct Adapter.
        • Netgear Gigabit Switch (Office Net)
          • Desktop  (this desk)
          • Desktop (living room desk
          • WorkBench (dual-boot - Windows / Linux) Runs the (NexGen RSS)
          • Media Player (in Stereo System)
          • Media Player (in Bedroom
          • Sun Microsystems Sunblade 1000
        • Router  (Netgear N600)
          • Astrix Phone System uses two NICs one for network traffic the other is for the Cisco Phones.
          • Office: 2 Cisco VOIP Phones 7960
          • Living Room Desk 7960, 7940 (near my recliner)
          • Bedroom 7940 with rigger off

There are other networks in the office as well such as my Nav-bus which is the second NIC in both the Sun and WorkBench Computers. This network is switched but does not get routed.

  • Sign in to reply

Top Comments

  • phoenixcomm
    phoenixcomm over 6 years ago in reply to Gough Lui +2
    Gough, Please beware that VoIP phones when they lock up can take down a network. That is why my phones are located on their own subnet and their own wire. and I have IOT but it is not included on the network…
  • Gough Lui
    Gough Lui over 6 years ago in reply to phoenixcomm +2
    VLAN may be on the same wire but all my devices sit downstream of a switch port. The absolute worst they fan do is flood that particular VLAN with garbage packets that are broadcast type which consumes…
  • Gough Lui
    Gough Lui over 6 years ago +1
    Networking has come a long way from the early days. Pre-Ethernet, there were a number of different standards - LattisNet, Token Ring and later StarLAN as well. When thin-net 10BASE2 came around, the cost…
Parents
  • Gough Lui
    Gough Lui over 6 years ago

    Networking has come a long way from the early days. Pre-Ethernet, there were a number of different standards - LattisNet, Token Ring and later StarLAN as well. When thin-net 10BASE2 came around, the cost of deploying Ethernet fell quite dramatically and really sealed the fate of others. I do remember seeing vampire taps on thick coax with AUI media attachment interfaces in some older buildings on my university campus - along with a Racal InterLAN Repeater. But many smaller areas used disjoint thin-net networks just for a few terminals (e.g. the library in my primary school). Fond days (or not) of Novell NetWare running on those.

     

    I still have some old AUI gear, hubs, 10BASE2 equipment on show on my website in case anyone wants to relive some nostalgia -

    • https://goughlui.com/2013/09/24/tech-flashback-synoptics-model-928-10base-t-aui-transciever-and-lattishub-2803/
    • https://goughlui.com/2015/11/01/tech-flashback-ethernet-10mbits-network-interface-card-collection/
    • https://goughlui.com/2013/07/28/tech-flashback-daynaport-scsilink-t/
    • https://goughlui.com/2012/11/29/tech-flashback-token-ring-network-card/
    • https://goughlui.com/2018/08/04/tech-flashback-ethernet-hubs-switches-netgear-ds104-skymaster-8320-030/

     

    BOOTP hasn't been mentioned for a while now - most of the time, remote booting has settled on PXE as the "standard" which uses TFTP to transfer the images and DHCP for configuration. There was a time when RPL was also used for remote booting.

     

    Nice to hear some guys still running static addressing - I still do that myself, especially for my servers and instruments where I don't want any address changes. The rest of the network runs DHCP - on a non-overlapping IP-range. Of course, modern people still recommend running DHCP and setting a static lease on the server - which I can do - but I've had instances where I've had to reboot a router and a device needed to renew its lease at roughly the same time resulting in broken connectivity. Static IPs are still good for limited handfuls of devices, but if you change your network architecture (i.e. new subnet for certain devices), having to manually reconfigure each can be a little annoying.

     

    I can't draw my network since it's actually extremely complicated owing to the circumstances, but I've lately become a fan of Mikrotik gear because of all the wonderful things one can do with it (for roughly the same price of a regular consumer router). I'm making active use of VLANs, multiple WANs, multiple Virtual-APs with different encryption on each, rate-limiting queues, VPN (L2TP/PPTP) etc. It will only evolve even further as I get (finally) connected to a decent WAN service - I'm living mostly off LTE (8-100Mbit/s depending on congestion) and long-range Wi-Fi (2Mbit/s backup) at the moment, otherwise it's ADSL2+ with only ~3Mbit/s speed.

    https://goughlui.com/2018/08/17/tested-vlans-in-the-home-through-dumb-switches/

     

    It's always interesting just how complicated one can make a network, but also how useful it can become now with home automation (e.g. lighting control), VoIP, surveillance, video streaming, file/print sharing being more commonly deployed even within normal houses.

     

    - Gough

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • phoenixcomm
    phoenixcomm over 6 years ago in reply to Gough Lui

    Gough,  Please beware that VoIP phones when they lock up can take down a network. That is why my phones are located on their own subnet and their own wire. and I have IOT but it is not included on the network map as I have settled on Zigbee. Yes I had a lot of older gear and was exposed to the IBM / Hughes network run over coax. loads of fun. too bad about all of the dead players and the consolidation of the vendors.

    • Cancel
    • Vote Up +2 Vote Down
    • Sign in to reply
    • More
    • Cancel
Comment
  • phoenixcomm
    phoenixcomm over 6 years ago in reply to Gough Lui

    Gough,  Please beware that VoIP phones when they lock up can take down a network. That is why my phones are located on their own subnet and their own wire. and I have IOT but it is not included on the network map as I have settled on Zigbee. Yes I had a lot of older gear and was exposed to the IBM / Hughes network run over coax. loads of fun. too bad about all of the dead players and the consolidation of the vendors.

    • Cancel
    • Vote Up +2 Vote Down
    • Sign in to reply
    • More
    • Cancel
Children
  • Gough Lui
    Gough Lui over 6 years ago in reply to phoenixcomm

    Indeed it is possible, but for my mostly ATA-based VoIP solution, the ATA's get taken down by broadcast traffic rather than the network getting taken down by the ATAs. So many ATAs with insufficient processing power to handle a call and do web-admin at the same time (for example). Voice is now so little-used at my house that I often live with just soft-phones on my mobile devices.

     

    Running a VLAN based system provides sufficient isolation - while they share bandwidth on the same cable, all ATA's are either 10/100Mbit/s and the trunk lines are 1Gbit/s ... so no chance of a congestion-based collapse of the rest of my network even if it does get locked-up producing a broadcast storm. The voice-only VLAN is separated from my main workstation VLAN, although I should probably introduce a separate IoT-stuff VLAN and VAP so as to better rate-limit and monitor the traffic. Whether a misbehaving device actually takes down a network or not really depends on what they do after they lock up - I've had crashed Raspberry Pis do the same thing occasionally because they were non-stop spewing malformed ARP packets out onto the network after a brown-out of the power supply. Luckily for me, I also still have all network activity lights in plain view so as to be able to make quick diagnoses when things go wrong.

     

    Of course, with every network, misbehaving nodes are always a source of trouble - but I've not encountered many failures of the sort. In fact, network issues are so infrequent that I've (normally) not had to reboot my router more than once or twice a year (mainly due to a critical firmware patch - I tend to avoid applying minor non-specific patches to save the wear on the NAND flash and potential downtime). This is actually a great thing - I remember in the early days I'd have to do it more often as consumer gear was so flakey and suddenly wireless radios would stop working, DHCP would go down, etc.

     

    - Gough

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • phoenixcomm
    phoenixcomm over 6 years ago in reply to Gough Lui

    no not congestion, but I have seen when a phone goes nuts lock up the entire network. that is why I believe in total isolation. when phones lock up. and they share a cable remember that a VLAN is still on a wire. and will take the system down.  have encountered this problem several times, at the last place I worked,  in fact it was random and almost a weekly event. 

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • Gough Lui
    Gough Lui over 6 years ago in reply to phoenixcomm

    VLAN may be on the same wire but all my devices sit downstream of a switch port. The absolute worst they fan do is flood that particular VLAN with garbage packets that are broadcast type which consumes all resources and causes the network to appear to go down (aka broadcast storm). Only devices attached to that VLAN would really be affected - those on other VLANs won't see the storm traffic at all, so if bandwidth is not being exhausted, you can still work away as normal.

     

    If you have per port ingress/egress limits as I have on most of my smart switches, then it is absolutely no risk as the switch will shape the traffic leaving other VLANs with enough capacity. Likewise, garbage on another VLAN will not affect it. If one tries to escape their own VLAN, this is possible as I don't filter incoming packets for VLAN tag, in which case, again, the worst a single device can do is flood the network with garbage up to its link rate (100Mbit/s), which again, will not take down the network.

     

    There is very little a single device can do that would be more disruptive than a broadcast storm. One of which would be ARP spoofing to redirect traffic at Layer 2 which can break connectivity for devices, but again, only within a particular Ethernet broadcast domain.

     

    Layer 1 faults are inherently protected against as switches and most hubs will partition off ports which emit overlength packets or have other media errors (incorrrct voltages, shorts, opens).

     

    Best thing to do when the network goes down is to sniff the traffic (e.g. with Wireshark) - then you understand what is being emitted by whom and why it takes down the network. Anything less of understanding is merely a workaround. This is why when one of my RasPis fouled up the network after a nearby lightning strike caused a poeer supply brownout, I understood exactly why the network behaved as it did and who was at fault. It could just be your VoIP devices and their flaky firmware - I've not rebooted my ATA in over 180 days and it's going just fine. There was a few isolated cases where the ATA went flaky but didn't harm the network - I traced that down to a faulty 5v plug pack.

     

    Of course, isolating the network physically is a nice way to do things if and when you can, but you lose some reconfigurability and add additional hardware into the mix. For me, cables was one of the main issues, along with cost of having N separate routers. Hence I've ended up with my complex setup, but one where I've done things like iperf3 runs on Wi-Fi on one VLAN while having separate hosts downloading over two other VLANs without seeing any major issues.

     

    - Gough

    • Cancel
    • Vote Up +2 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • phoenixcomm
    phoenixcomm over 6 years ago in reply to Gough Lui

    Gough, I hate to tell you but what the hey, I have seen this mess with my own eyes. and yes they were using Cisco 2924elxn switches (lol that I sold to them) I can't remember which phones they were. switch (b) was VoIP phones and the desktops via an interconnect cable. I believe the first switch was public for there servers. I know that all of the PCs and phones were on one network they where odd and even so if your pc was 192.168.1.10 the phone was 11.  when one of the phones when down I could take an hour or so for them to fix it. LOL

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • Gough Lui
    Gough Lui over 6 years ago in reply to phoenixcomm

    You mean the desktops were wired to the "out" port on the phones? I've deployed a number of Cisco VoIP phones (for the NSW Govt no less) that had that functionality but we have never used it. I figured "daisy chaining" like that was not a good idea - especially as the older phones only had 100Mbit/s service on the network-out port. Rightly so, if the phone goes down, the out port could be very much disconnected.

     

    Alas, I don't mind a few problems from time to time. Keeps the problem-solving part of the brain alive image. When at home, I can deal with an outage or two a year - after all, my ISP's authentication servers for PPPoE/ADSL go down equally as much - last year for about 8 hours in 2x4 hour blocks during business hours. At least when things go down, I like to try and work out why, rather than do the "tried and true" troubleshooting fix of "just reboot the unit" as that often means losing valuable evidence or information that could be used to fix/isolate the problem. I've dealt with many manufacturers, submitting bug reports - some are very lazy and don't give a stuff, but some others will spin a new firmware and that helps everyone be safer and more reliable overall.

     

    - Gough

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube