INTRODUCTION TO NETWORKINGterm Two
INTRODUCTION TO NETWORKINGterm Two
INTRODUCTION TO NETWORKING
source : www.computersource.com
Local Area Network
A computer network spanned inside a building and operated under single administrative
system is generally termed as Local Area Network (LAN). Usually, LAN covers an
organization offices, schools, colleges or universities. Number of systems connected in
LAN may vary from as least as two to as much as 16 million LAN provides a useful way
of sharing the resources between end users. The resources such as printers, file servers,
scanners, and internet are easily sharable among computers.
Figure 5.1 Local Area Network
source : www.computersource.com
LANs are composed of inexpensive networking and routing equipment. It may contains
local servers serving file storage and other locally shared applications. It mostly operates
on private IP addresses and does not involve heavy routing. LAN works under its own
local domain and controlled centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed
LAN technology and uses Star topology, while Token-ring is rarely seen. LAN can be
wired, wireless, or in both forms at once.
Metropolitan Area Network
The Metropolitan Area Network (MAN) generally expands throughout a city such as
cable TV network. It can be in the form of Ethernet, Token-ring, ATM, or Fiber
Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables its users to
expand their Local Area Networks. For example, MAN can help an organization to
connect all of its offices in a city.
Figure 5.2 Metro Area Network
source : www.computersource.com
Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between
Local Area Network and Wide Area Network. MAN provides uplink for LANs to WANs
or internet.
source : www.computersource.com
WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM),
Frame Relay, and Synchronous Optical Network (SONET). WAN may be managed by
multiple administration.
Internetwork
A network of networks is called an internetwork, or simply the internet. It is the largest
network in existence on this planet. The internet hugely connects all WANs and it can
have connection to LANs and Home networks. Internet uses TCP/IP protocol suite and
uses IP as its addressing protocol. Present day, Internet is widely implemented using
IPv4. Because of shortage of address spaces, it is gradually migrating from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of information
worldwide. It uses WWW, FTP, email services, audio, and video streaming etc. At huge
level, internet works on Client-Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect various
continents, fibers are laid under sea known to us as submarine communication cable.
Internet is widely deployed on World Wide Web services using HTML linked pages and
is accessible by client software known as Web Browsers. When a user requests a page
using some web browser located on some Web Server anywhere in the world, the Web
Server responds with the proper HTML page. The communication delay is very low.
Internet is serving many proposes and is involved in many aspects of life. Some of them
are:
Web sites
E-mail
Instant Messaging
Blogging
Social Media
Marketing
Networking
Resource Sharing
Audio and Video Streaming
Classification of Computer Networks
Computer networks are classified based on various factors. They include:
Geographical span
Inter-connectivity
Administration
Architecture
Geographical Span
Geographically a network can be seen in one of the following categories:
It may be spanned across your table, among Bluetooth enabled devices, Ranging
not more than few meters.
It may be spanned across a whole building, including intermediate devices to
connect all floors.
It may be spanned across a whole city.
It may be spanned across multiple cities or provinces.
It may be one network covering whole world.
Inter-Connectivity
Components of a network can be connected to each other differently in some fashion.
Every single device can be connected to every other device on network, making
the network mesh.
All devices can be connected to a single medium but geographically disconnected,
creating a bus-like structure.
Each device is connected to its left and right peers only, creating linear structure.
devices connected together with a single device, creating star-like structure.
All devices connected arbitrarily using all previous ways to connect each other,
resulting in a hybrid structure.
Administration
From an administrator’s point of view, a network can be private network which belongs
to a single autonomous (self-governing) system and cannot be accessed outside its
physical or logical domain. A network can be public, which is accessed by all.
Network Architecture
Computer networks can be discriminated into various types such as Client-Server, peer-
to-peer or hybrid, depending upon its architecture.
There can be one or more systems acting as Server. Other being Client, requests the
Server to serve requests. Server takes and processes request on behalf of Clients.
Two systems can be connected Point-to-Point, or in back-to-back fashion. They both
reside at the same level and called peers.
There can be hybrid network which involves network architecture of both the above
types.
SAQ 1
Introduction
Network engineering is a complicated task, which involves software, firmware, chip level
engineering, hardware, and electric pulses. To ease network engineering, the whole
networking concept is divided into multiple layers. Each layer is involved in some
particular task and is independent of all other layers. But as a whole, almost all
networking tasks depend on all of these layers. Layers share data between them and they
depend on each other only to take input and send output.
By now you understand the concept of an internetwork. Now the OSI model will help
you see just how an internetwork operates by using a layered architecture.
The International Organization for Standardization (ISO) created the OSI model as the
first major attempt to internetwork various vendor-specific networks, the ultimate goal
being that these different vendor networks could work together in harmony. This model
consists of seven layers. Although it is not widely used today, the terminology is
prevalent in the networking community. The OSI model may also be helpful when
troubleshooting a network issue. First of all, it is important to know the name of each
layer and its corresponding layer number. This will help you remember where the layers
reside in the OSI model. You may also hear the layers referred to by number, so knowing
them will also help in that respect. The diagram below provides a list of all seven layers.
source : www.cisco.com
In general, each layer communicates with the adjacent layers on the OSI model and the
corresponding layer on another system. For example, the Presentation layer
communicates with the Application layer, the Session layer, and also with the
Presentation layer of another connected system.
Application Layer
Layer 7 provides an interface between a host’s communication software and any
necessary external applications (such as email, file transfers, and terminal emulation).
This layer can also evaluate what resources are necessary to communicate between two
devices and determine their availability. Layer 7 also provides the following
functionality:
Synchronization of client/server applications
Error control and data integrity between applications
System-independent processes to a host
SAQ 1
Presentation Layer
Layer 6 presents data to the Application layer and acts as a data format translator. Format
translation is necessary to ensure that the data can be read by applications. Layer 6 also
handles the structuring of data and negotiating data transfer syntax to Layer 7. Processes
involved include Translation, data encryption, decryption, compression, and
decompression. Layer 6 protocols include the following:
Presentation layer implementations are not typically associated with a particular protocol
stack. The standards for video and graphics are examples. Some well-known standards
for video include QuickTime and Motion Picture Experts Group (MPEG). QuickTime is
an Apple Computer specification for video and audio it manages audio and video
applications, and MPEG is a standard for video compression and coding. Among the
well-known graphic image formats are Graphics Interchange Format (GIF), Joint
Photographic Experts Group (JPEG), and Tagged Image File Format (TIFF). GIF and
JPEG are compression and coding standards for graphic images, and TIFF is a standard
coding format for graphic images.
Session Layer
Layer 5 is primarily concerned with dialog control among devices. This layer determines
the beginning, middle, and end of a session or conversation that occurs between
applications. In this way, the Session layer acts as an intermediary for those applications.
Some of the Session layer protocols and their functionality are as follows :
Lower Layers
The lower layers of the OSI model focus on data transport, which can be achieved via a
router,
switch, or a physical wire.
4 Transport
3 Network
2 Data Link
1 Physical
Transport Layer
Layer 4 is responsible for end-to-end connections and data delivery between two hosts.
The ability to segment and reassemble data is a key functionality of this layer. For
example, when one system is sending data to another system, that data can be segmented
into smaller data blocks and transmitted across the network. The receiving system can
then reassemble the segmented data blocks at the Transport layer. Transmissions occur
via logical connectivity between the sender and destination. Layer 4 provides transparent
data transfer by hiding details of the transmission from the upper layers.
Layer 4 also provides the following functionality:
Fault detection
Error recovery
Establishing, maintaining, and tearing down virtual circuits
The Transport layer can provide reliable networking via acknowledgments, sequencing,
and flow control.
Acknowledgments—Delivered segments are acknowledged to the sender. If they are
not acknowledged, the sender will retransmit.
Sequencing—Data segments are sequenced into their original order when they arrive
at the destination.
Flow Control—Provides buffer controls that prevent packet flooding to the
destination host. Buffers store bursts of data for processing when the transmission is
complete. Layer 4 protocols include the following:
1. Transmission Control Protocol (TCP)
2. User Datagram Protocol (UDP)
3. Sequenced Packet Exchange (SPX)—A reliable communications protocol created
by
Novell NetWare
Network Layer
Layer 3 is where the best path determination is made for packet delivery across the
network. Routed protocols such as IP are used to determine logical addressing, which can
identify the destination of a packet or datagram. The most common network device found
at the Network layer is a router; however, Layer 3 switches may also be implemented. A
router at the Network layer follows these general steps to ensure proper data transport:
1. The router checks the destination IP address of the incoming packet on the router
interface.
2. Packets destined for that router are processed, whereas packets destined for another
router must be looked up in the routing table.
3. The router determines an exit interface based on the routing table and sends the
packet to the interface for framing and forwarding. If there is no route in the routing
table, the packet is dropped by the router.
Based on this chart, you can see how information is encapsulated as it travels down
through the various layers. The correct order for data encapsulation is data, segment,
packet, frame, and bit.
SAQ 1
TCP/IP Model
The TCP/IP model, also known as the Department of Defence (DoD) model, was created
by the DoD when they developed the TCP/IP protocol suite. Their goal was to provide
reliable networking and data integrity in the event of a disaster. This model is prevalent in
the current networking community.
Internet uses TCP/IP protocol suite, also known as Internet suite. This defines Internet
Model which contains four layered architecture. OSI Model is general communication
model but Internet Model is what the internet uses for all its communication. The internet
is independent of its underlying network architecture so is its Model. This model has the
following layers:
Figure 13. TCP/IP Model
source : www.compteck.com
Essentially the TCP/IP model has many similarities to the OSI model. Table 1.8 lists the
layers of the OSI model in the left column and the related layers of the TCP/IP model in
the right.
Application Layer
This layer combines functionalities of the three top layers of the OSI model and may also
be called the Process/Application layer. Also, some of the most popular applications
(email, file transport, and so on) interface with this layer to communicate with other
applications on the network.
If you’ll remember, the description of the Application layer of the OSI model included a
list of application protocols and their primary functions.
Transport Layer
The Transport layer corresponds with the Transport layer of the OSI model and is also
known as the Host-to-Host layer. Not only is this layer responsible for reliable data
delivery, but it can also make certain that data arrives in the proper order. These protocols
are TCP and UDP. The following sections cover each protocol and its related
applications.
TCP
TCP is a reliable connection-oriented protocol. TCP uses acknowledgments, sequencing,
and flow control to ensure reliability (please refer back to the “Transport Layer” section
of the OSI model for definitions of these terms). A TCP segment contains fields for the
Sequence, Acknowledgment, and Windowing numbers. These fields help make sure that
datagrams arrive undamaged. This is considered to be reliable delivery. TCP uses
Positive Acknowledgment and Retransmission (PAR):
The source device begins a timer when a segment is sent and retransmits if the
timer runs out before an acknowledgment is received.
The source device keeps track of segments that are sent and requires an
acknowledgment for each segment.
The destination device acknowledges when a segment is received by sending a
packet to the source that iterates the next sequence number it is looking for from
the source.
Table 13.1
Source Port Destination Port
Sequence Number
Acknowledgement Number
Miscellaneous Flags Window (Flow Control)
Checksum Urgent
Options
Flow control via TCP includes windowing. Windowing is a method for traffic congestion
control where a window is determined by the receiving system to limit the number of
data segments (bytes) that can be sent by the source device without an acknowledgment
from the recipient. The size of a window determines the number of unacknowledged data
segments allowed by the receiving system. Window sizes vary and can change
throughout the duration of a connection. Increasing a window size enables more data
segments to be transmitted to the recipient before acknowledgment, whereas decreasing
the window size allows for fewer data segments to be transmitted before an
acknowledgment is sent.
As mentioned at the beginning of this section, TCP is a connection-oriented protocol.
When a source device is ready to transmit data, it sets up a Connection-Oriented
Communication session with the intended recipient. This is a call setup or a three-way
handshake. When the data is successfully transmitted, a call termination occurs to
disconnect the virtual circuit.
The three-way handshake includes the following steps:
1. A “connection agreement” segment is sent to the recipient asking to synchronize
systems. This step is associated with the term SYN packet.
2. The second and third segments acknowledge the request to connect and determine
the rules of engagement. Sequencing synchronization is requested of the receiving
device. A two-way connection is established. This step is associated with the term
SYN-ACK packet.
3. A final segment is sent as an acknowledgement that the rules have been accepted
and a connection has been formed. This step is associated with the term ACK
packet.
Both TCP and UDP use port numbers. Public applications are assigned port numbers
below 256. Numbers 256-1023 are allocated to companies. Numbers above 1023 are
dynamically assigned by an application. Access lists can use port numbers to filter traffic.
Table 1.10 lists applications that use TCP.
UDP is the other protocol that is used at the Transport layer of the TCP/IP model.
UDP
UDP is much simpler than TCP because it is a connectionless protocol. UDP headers
contain only the source and destination ports, a length field, and a checksum. Because of
the lack of a sequence, acknowledgment, and windowing field, UDP cannot guarantee
delivery. Because there are no delivery guarantees, UDP is considered unreliable. With
this protocol, it is up to the application to provide reliability.
A UDP segment header is shown below.
Source Port Destination Port
Length Checksum
Internet Layer
The Internet layer corresponds with the Network layer of the OSI model. The following
protocols relate to the logical transmission of packets:
IP
ICMP
ARP, RARP, and Proxy ARP
IP
IP uses logical or virtual addressing to get a packet from a source to its destination. IP
addresses are used by routers to make forwarding decisions. Some key characteristics of
IP addresses include the following:
1. Addresses are allocated by the Internet Assigned Numbers Authority (IANA).
2. IPv4 IP addresses are 32 bits, divided into four octets (8 bits each). An example
of an
IP address in dotted decimal format would be 172.16.122.204.
3. The minimum value (per octet) is 0 and the maximum value is 255.
4. IPv6, which is the future of IP addresses, is 128 bits.
ICMP
Internet Control Messaging Protocol is used by ping and traceroute utilities. Ping (Packet
Internet Groper) enables you to validate that an IP address exists and can accept requests.
The following transmissions are used by the Ping utility:
1. Ping sends an echo request packet to receive the echo response.
2. Routers send Destination Unreachable messages when they can’t reach the
destination network and they are forced to drop the packet. The router that drops
the packet sends the ICMP DU message.
The following is an example of a successful ping test run from a computer command
prompt:
C:\Documents and Settings>ping 10.0.0.1
Pinging 10.0.0.1 with 32 bytes of data:
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Reply from 10.1.1.1: bytes=32 time<1ms TTL=255
Ping statistics for 10.0.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
The following is an example of an unsuccessful ping test run from a computer command
prompt:
C:\Documents and Settings>ping 10.0.0.2
Pinging 10.0.0.2 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 10.0.0.2:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss)
SAQ 1