Data Comms Networks Notes PDF
Data Comms Networks Notes PDF
Stand alone computers, first introduced in the late 1970s, gave users the ability to create
documents, spreadsheets, and other types of data and save them for future use. For the small
business user or home computer enthusiast, this was great. For larger companies, it became a
burden as the need to share information between offices grows. Stand alone computers were
inadequate for the following reasons:
The greater need to share information and resources then lead to an extensive research
spearheaded by the ARPANET (Advanced Research Projects Agency Network) of the United
States and other organizations to create a network linking computers and organizational units
together. The end result was the creation of protocols (a predefined set of rules that indicates
how computers or devices communicate and exchange data on the network). The evolution of
these successes led to the development of a very dominant set of protocols (or protocol suite)
called TCP/IP (Transmission Control Protocol / Internetwork Protocol). This unique group of
specifications (protocol suit) governs and facilitates the linking of computers locally and
practically all over the world.
Workstation
Computer
Server
Printer
Hub/switch
Workstation
Computer
Workstation
Computer
Scanner
1
Modern Computer Networks
Realizing the benefits and importance of data and resource sharing, many companies are now
connecting their networks from various departments and subsidiaries to each other, and
implementing management tools that can govern the entire collection. These departments or
organizational units might be geographically located on opposite sides of the world or in the
same building. Some companies and individuals link with other companies on different
continents creating a truly global network called the internet.
2
CHAPTER 2: Networking Basics
What is networking?
Networking is the interconnection of two or more independent computers together so that they
can communicate, exchange information and share resources. Computers are powerful devices
or machines. When they are connected together in a network, they become even more powerful
because the functions and tools that each computer provides can be shared with other computers.
Networks exist for one major reason: to share data and resources. Resource sharing can take
many forms: for example programs, applications, information (or data), printer, central
processing unit (CPU), hard drive, folders and files, internet connection, website or a
combination of these.
Advantages of Networking
Speed
Networks provide a very rapid method for sharing and transferring files. Without a network, files are
shared by copying them to floppy disks, then carrying or sending the disks from one computer to
another. This method of transferring files in this manner is very time-consuming.
Cost
The network version of most software programs are available at considerable savings when
compared to buying individually licensed copies. Besides monetary savings, sharing a program on a
network allows for easier upgrading of the program. The changes have to be done only once, on the
file server, instead of on all the individual workstations.
3
Resource Sharing
Sharing resources is another area in which a network exceeds stand-alone computers. Most
businesses cannot afford enough laser printers, fax machines, modems, scanners, and CD-ROM
players for each computer. However, if these similar peripherals or devices are added to a network,
they can be shared by many users.
Flexible Access
Networks allow one to access their files from computers throughout the network environment. For,
example a user (student) can save part of his or her work in a storage media such as floppy disk or
flash disk and then go to finish it at home or at work. Users can also work cooperatively through the
network.
Security
Files and programs on a network can be designated as "copy inhibit," so that you do not have to
worry about illegal copying of programs. Also, passwords can be established for specific directories
to restrict access to authorized users.
Components of a Network
A computer network comprises the following components:
• A minimum of at least 2 computers
• Cables that connect the computers to each other devices or computers, although wireless
communication is becoming more common.
• A network interface device on each computer (this is called a network interface card or NIC)
• A Switch or Hub used to switch the data from one point to another.
• Network operating system software that runs on server and client computers.
Terminology
• Voice network – a network that transmits telephone signals
• Data network – a network that transmits computer data
• Data communications – the transfer of digital or analog data using digital or analog signals
• Telecommunications – the study of telephones and the systems that transmit telephone signals
• Network management – the design, installation, and support of a network, including its hardware and
software
• Workgroup - is a collection of individuals (for example, a sales department) who share the same
resources such as files, programs and databases over the LAN.
• Protocols - a predefined set of rules that indicates how computers or devices communicate and
exchange data on the network. E.g. TCP/IP
• Topology – is the layout or map of the network
• Packet – Block of data sent over a network or communication link
• Frame – A block of data that is transmitted as a single unit. A frame is also referred to as packet or
block.
• Segment – Is a portion or part of a larger network. A segment also refers to a unit smaller than a
packet.
4
CHAPTER 3: Types of Networks
Networks can be very simple, such as a small group of computers that share information, or they
can be very complex, spanning large geographical areas. There are two major types of networks:
Local Area Network (LAN), Wide Area Network (WAN).
5
Wide Area Network
A WAN is any network that crosses metropolitan, regional, national or continental boundaries.
The Internet is the largest WAN on the planet. The Internet is a collection of networks that are
interconnected and, therefore, is technically an inter-network (or Internet for short). A WAN can
be centralized or distributed. A centralized WAN consists of a central server computer (at a
central point) to which other client computers, nodes or end systems connect. A distributed
WAN consists of many interconnected LANs in several different locations. The Internet is an
example of a distributed WAN.
6
Comparison characteristics of LAN and WAN
Half-Duplex or Full-Duplex
All network communications can be categorized as half-duplex or full-duplex. With half-duplex,
communications happen in both directions, but in only one direction at a time. When two
computers communicate using half-duplex, one computer sends a signal and the other receives;
then at some point, they switch sending and receiving roles. Full-duplex, on the other hand,
allows communication in both directions at the same time. Either stations or persons can send
and receive signals at the same time. Full-duplex communications are similar to a telephone call,
in which both people can talk at the same time.
7
CHAPTER 4: Network Elements
Host, Workstation, and Server
Networks are made up of lots of different components, but the three most common network
components are the host, workstation, and server. There are three primary components of a
network: host, workstation and server.
Workstations
A workstation is any computer on a network that is used for a specific purpose such as graphics,
computer Aided Design (CAD), software development and scientific applications. Workstations
have fast (sometimes multiple) central processing units (CPUs), large amount of memory and
disk. In the network environment, the term workstation simply refers to any computer that is
connected to the network and used by an individual to do work. It is important to distinguish
between workstations and clients. A client is any machine or device that can request resources
from the network; a workstation is a computer that can request resources. Workstations can be
clients, but not all clients are workstations. For example, a printer is a client that can request
resources from the network but it is not a workstation.
Servers
A server provides or serves resources to the clients on the network. Servers are typically
powerful computers that run the software that controls and maintains the network. This software
is known as the network operating system. Servers are often dedicated (specialized for a single
purpose).
Here are some examples of servers that are dedicated to a single task:
Server Description
File Server Holds and distributes files
Print Server Controls and manages one or more printers for the network.
Proxy Server Performs a function on behalf of other computers. (Proxy
means” on behalf of.”)
Application Server Hosts a network application
Web Server Holds and delivers web pages, files and other web content using
Hypertext Transfer Protocol (HTTP) and File Transfer Protocol.
Ftp Server Holds and delivers files using File Transfer Protocol (FTP)
Mail Server Hosts and delivers e-mail. It’s the electronic equivalent of a
post office
Fax Server Sends and receives faxes (via a special fax board) for the entire
network without the need for paper.
Remote Access Server Listens for inbound requests to connect to the network from the
outside. Provides remote users (working at home or on the
road) with connections to the network.
Telephony server Functions as a “smart” answering machine for the network. It
can also perform call center and call-routing functions.
8
Servers have the following in common:
Hardware and/or software for data integrity ( such as backup hardware and software)
The capacity to support a large number of clients
Physical resources, such as hard-drive space and memory, must be greater in a server than in a
workstation because the server needs to provide services to any clients. Also, a server should be
located in a physically secure area.
Hosts
The term host refers every other networking device. It can also refer to a workstation and server
or a stand alone pc or system on the network. A host usually has one or more IP addresses.
host host
host
Client/host
host
Network Elements
9
CHAPTER 5: Network Architecture
There are two ways to set up a network:
1. Client/server.
2. Peer-to-peer
Peer-to-Peer Network
In peer-to-peer networks, the connected computers have no centralized authority. Peer-to-peer
networks are more commonly implemented where less then ten computers are involved and
where strict security is not necessary. All computers have the same status or equal, hence the
term 'peer', and they communicate with each other on an equal footing. Files, such as word
processing or spreadsheet documents, can be shared across the network and all the computers on
the network can share devices, such as printers or scanners, which are connected to any one
computer. If a user of one computer wants access to a resource on another computer, the
security check for access rights is the responsibility of the computer holding the resource. Each
computer in a peer-to-peer network can be both a client that requests resources and a server that
provides resources.
Peer-to-peer networks present some challenges. For example, backing up company data is very
difficult. Also, it can be difficult to remember where you stored a file. Also, because security is
not centralized, users and passwords must be maintained separately on each machine.
Peer to Peer
Network
10
Client/Server Networks
A client/server network uses a network operating system designed to manage the entire network
from a centralized point or server. Clients make request to the server, and the server responds
with information or access to a resources. Client/server networks are more suitable for larger
networks. A central computer, or ' server', acts as the storage location for files and applications
shared on the network. Usually the server is a higher than average performance computer. The
server also controls the network access of the other computers which are referred to as the ' client'
computers. Typically, users will use the client computers for their work and only the network
administrator (usually a designated staff member) will have access rights to the server.
Client/server networks have some definite advantages over peer-to-peer networks. For one
thing, the network is much more organized. It is easier to find files and resources because they
are stored on the server. Also, client/server networks generally have much tighter security. All
usernames and passwords are stored in the same database (on the server). Finally, client/server
networks have better performance and can scale almost indefinitely. A client/server networks
can have tens of thousands of computers or workstations. The server holds the database of user
accounts, passwords and access rights.
File Server
Other
equipment
11
Summary comparison characteristics of Peer-to-Peer and Client/Server Networks
12
CHAPTER 6: Topology
Topology is the pictorial representation of the layout of a network. The physical topology of a
network describes the layout of the cables and workstations and the locations of all network
components. Often, physical topologies are compared to logical topologies. Logical topology
defines how the information or data flows within the network. It is important to note, however,
that a network can have one type of physical topology and a completely different logical
topology as described earlier. The cables or connections in a physical topology are referred to as
network media (or physical media).
Bus Topology
In a bus topology, each computer connects to a single continuous cable, often know as bus cable
that is terminated at both ends. A bus topology is the simplest way to create a physical network.
The cable is usually drawn in a straight line, but in reality, the piece of cable could be running
through walls, under desks or the floor and up to the ceiling.
When communicating on a network that uses a bus topology, all computers see that data on the
wire. This does not create chaos, though, because the only computer which data is addressed to
actually receives the data.
Bus topology
13
Characteristics of Bus topology
• Bus topology consists of a single linear cable called the bus cable or trunk.
• Data is sent to all computers on the trunk. Each computer examines every packet on the wire.
Only the computer which the packet is addressed to receives the messages.
• Bus is a passive topology.
• Performance degrades as more computers are added to the bus.
• Signal bounce is eliminated by a terminator at each end of the bus.
• Barrel connectors can be used to lengthen cable.
• Repeaters can be used to regenerate signals.
• It’s good for a temporary, small (fewer than 10 people) network
• Bus topology is difficult to isolate or resolve malfunctions (network failures) and if the
backbone goes down, the entire network goes down.
Star Topology
In a star topology each computer is connected to a central point by a separate cable or wireless
connection. The central point is a device such as hub, switch, or access point. Star topology is
very popular.
Although this setup uses more cables than a bus, a star topology is much more fault tolerant
(does not break down easily) than a bus topology. This means that if a failure occurs along one
of the cables connecting to the hub, only that portion of the hub is affected, not the entire
network. It also means that you can add new computers just by running a single new cable from
the computer to the hub.
14
A Star topology has the following advantages:
Total installation cost can be higher because of the larger number of cable, but prices are
constantly more and more competitive
It has a single point of failure (the hub, or other central device).
Star topology
Ring Topology
In the ring topology, each computer connects to a central ring or circle of cable. Each computer
is connected directly to two other computers in the network. Data moves down one-way path
from one computer to another. The good news about laying out cable in a ring is that the cable
design is simple. The bad news is that, as with bus topology any break, such as adding or
removing a computer, disrupts the entire network. Also, because you have to “break” the ring in
order to add another station, it is difficult to reconfigure without bringing down the whole
network. For this reason, the physical ring topology is seldom used. Note that, in the physical
ring network the ring is not a perfect circle, it could be a loop of wires running along and through
walls, under the floor and up to the ceiling.
15
Characteristics of ring topology
• Computers are connected on a single central ring or circle of cable.
• Each computer is connected directly to two other computers in the network.
• Data moves down one-way path from one computer to another.
• Each computer acts as a repeater and keeps the signal strong hence no need for repeaters on a
ring topology
• Any break such as adding or removing a computer, disrupts the entire network
• relatively easy to install
• requires minimal hardware
• No termination required since it is a ring
• It is usually seen in a Token Ring or FDDI (fiber distributed data interface) network
• Token passing is used in Token Ring networks. The token is passed from one computer to the
next, only the computer with the token can transmit. The receiving computer strips the data
from the token and sends the token back to the sending computer with an acknowledgment.
After verification, the token is regenerated.
Ring topology
16
Mesh Topology
In a mesh topology, each computer connects directly to every other computer on the network. A
path exists from each computer to every other computer in the network, resulting in the most
physical connections per node of any topology. Mesh topology is not a practical way do a
network.
Mesh topology
17
Other Topologies
Star Bus Topology
• Several star topologies linked with a linear bus.
• No single computer can take the whole network down. If a single hub fails, only the computers
and hubs connected to that hub are affected.
• Cost
• Ease of installation
• Ease of maintenance
• Cable fault tolerance
18
CHAPTER 7: Physical Media
Most network computers or devices are linked to the transmission media or central device such
as a hub by cables. These cables are called hardwired transmission media. We will look at three
types of cables:
• Twisted pair
• Coaxial
• Fiber optic
Twisted-Pair Cable
Twisted-pair cable is the typical telephone and network cables and is the most common type of
communication channel for small systems. It consists of bundles or multiple pairs of individually
insulated copper wires that are twisted together to give them strength. There are two types of
twisted-pair cables: Shielded Twisted-Pair (STP) and Unshielded Twisted-Pair. Shielded twisted-
pair (STP) cables have a metallic shield placed around the twisted pairs. Unshielded twisted-pair
(STP) cables do not have outer shielding and they are commonly used in twisted-pair Ethernet
(10Base-T, 100Base-TX, etc.), star-wired networks.
The cables are twisted because electromagnetic signals conducted on copper wires that are in
close proximity (or close to each other) causes electromagnetic interference called crosstalk.
Twisting two wires together as a pair minimizes such interference and also provides some
protection against interference from outside sources. This type is the most common today and
has the following
Advantages:
• It is relatively inexpensive and has low maintenance costs.
• It’s cheaper than other types of cabling
• It’s relatively easy to install
• Often available in existing phone system
• Well tested and easy to get
19
UTP cable is rated in several categories for example Category 5 is a four twisted wire pairs
(eight wires) and rated for 20MHz and Category 5e is a four twisted wire pairs (eight wires) and
rated for 100MHz. The diagram below shows a Cat 5e UTP Ethernet cable standard with
connectors.
Connecting UTP
You need to use an RJ (Registered Jack) connector to connect UTP cables. Most telephones
connect with an RJ-11 connector. The connector used with UTP network cable is called RJ-45.
The RJ-11 has four wires, or two pairs, and the network connector RJ-45 has four pairs, or eight
wires. You use a crimper (tool) to attach an RJ connector to a cable.
Signaling methods
The amount of cable’s available bandwidth (overall capacity, such as 10Mps) that is used by
each signal depends on whether the signaling method is baseband or broadband. With baseband,
the entire bandwidth of the cable is used for each signal (using one channel). It is typically used
with digital signaling. With broadband, on the other hand, the available bandwidth is divided
into discrete bands. Multiple signals can then be transmitted within these different bands.
Coaxial Cable
Coaxial cable (or coax) contains a center conductor, made of copper, surrounded by a plastic
jacket, with a braided shield over the jacket. A strong plastic such as polyvinyl chloride (PVC)
or fluoroethylenepropylene (FEP) is used to cover the metal shield.
Coaxial Cable
20
Advantages:
• It doesn’t burn easily (more durable)
• Support faster data rates than TP
• It doesn’t release as many toxic fumes
• Braided shielding that provides fair resistance to electronic pollution like electromagnetic
interference (EMI) and radio frequency interference (RFI).
Disadvantages
• This type of cable is more expensive that TP.
• It is bulkier and more rigid than TP
• Can be affected by strong interference
Table below shows some of the specifications for the different types of coaxial cables.
21
F-Type coaxial cable connectors
The F-Type connector is a threaded, screw-on connector. The F-Type connector uses the centre
conductor of the coaxial cable as its centre connecting point. The other conductor is the metal
body of the connector itself, which connects to the shield of the cable.
Fibre-Optic Cables
Fiber Optic cables are highly reliable communication channel. Data can be transmitted in a
fiber-optic cable at very high speeds with few or no errors. Instead of using electricity to send
data, fiber optics uses light. Fiber optic cables are made of glass fibers that are thinner than a
human hair, which guide light beams for many kilometers. Unlike wire cables that use electricity
to transmit data, fiber optic cables are not subject to interference as they use light to transmit
data.
Fiber-optic cables come in two different styles: single-mode fiber (SMF) and multimode fiber
(MMF). The difference between single-mode fibers and multimode fibers is in the number of
light rays (and thus the number of signals) they can carry. Generally, multimode fibre is used for
shorter-distance application and single-mode fiber for longer distances.
Advantages:
• Data can be transmitted in a fiber-optic cable at very high speeds with few or no errors.
• Because fibre-optic cable transmits digital signals using light impulses rather than electricity,
it is immune to Electromagnetic Interference (EMI) and Radio Frequency Interference (RFI).
• It can transmit signals or data over long distance of up to 40 kilometers.
• Very durable
Disadvantages:
• It is difficult to install (requires sophisticated tools and methods for installation)
• Extremely costly in product and service.
• Has very complex layout and design.
22
Fiber-Optic Connectors
The most common fiber-optic connectors are the straight tip (ST) and subscriber or square
connector (SC). The ST fiber-optic connector was one of the most widely used fiber-optic
connectors. It is relatively simple to use. It uses a BNC attachment mechanism similar to the
Thinnet connection mechanism, which makes connections and disconnections relatively easy.
The SC connector (sometimes known also as a square connector) is another type of fiber-optic
connector. SC connectors are latched (or locked) connectors. This latching mechanism holds
the connector in securely while in use and prevents it from just falling out. SC connectors work
with either single-mode or multimode optical fiber. SC connectors are increasingly in used but
they are not as popular as ST connectors for LAN connections.
23
Small Form Factor Fiber-Optic Connectors
One of the more popular styles of fiber-optic connectors is the small form factor (SFF) style of
connector. SFF connectors allow more fiber-optic terminations in the same amount of space
over the standard-size fiber-optic connectors described above. The two most popular are the
mechanical transfer registered jack (MT-RJ of MTRJ) and the Local connector (LC), designed
by Lucent.
Installation Logistics
How easy is the cable to work with?
Shielding
Is the area "noisy"?
Do you need plenum grade cable => more expensive
Crosstalk
Where data security is important this is a problem
Power lines, motors relays and radio transmitters cause crosstalk
24
Transmission Speed (part of the bandwidth)
• Transmission rates are measured in Mbps
• 10 Mbps is common
• 100 Mbps is becoming common
• Fiber can go well over 100 Mbps but costs and requires experts to install.
Cost
Distance costs you money
Attenuation
Different cables can only transmit so far without causing too many errors
Microwave Stations
It transmits data such as radio signals through the air rather than through wires. Microwave
stations are used primarily for transmitting data at a high speed over long distance
Satellite Stations
These are used for high volume data transmission as well as for television broadcasting and
telephone transmission. A satellite can also transmit signals to other satellites, which relay the
signals back to the sender of receivers.
25
CHAPTER 8: Wireless Networks
Wireless Local Area Networks
The term ' wireless network'refers to two or more computers communicating using standard
network rules or protocols, but without the use of cabling to connect the computers together.
Instead, the computers use wireless radio signals to send information from one computer to the
other. A wireless local area network (WLAN) consists of two key components: an access point
(also called a base station) and a wireless card. Information can be transmitted between these
two components as long as they are fairly close together (up to 100 metres indoors or 350 metres
outdoors).
A WLAN can be installed as the sole network in a school, a public building, a library, a shopping
centre, a restaurant, airports and so on. However, it can also be used to extend an existing wired
network to areas where wiring would be too difficult or too expensive to implement, or to areas
located away from the main network or main building. Wireless networks can be configured to
provide the same network functionality as wired networks, ranging from simple peer-to-peer
configurations to large-scale networks accommodating hundreds of users.
26
A WLAN has some specific advantages:
• It is easier to add or move workstations
• It is easier to provide connectivity in areas where it is difficult to lay cable
• Installation can be fast and easy and can eliminate the need to pull cable through walls and
ceilings
• Access to the network can be from anywhere in the school within range of an access point
• Portable or semi-permanent buildings can be connected using a wireless LAN
• Where laptops are used, the ‘computer suite’ can be moved from classroom to classroom on
mobile carts
• While the initial investment required for wireless LAN hardware can be similar to the cost of
wired LAN hardware, installation expenses can be significantly lower
• Where a school is located on more than one site (such as on two sides of a road), it is possible
with directional antennae, to avoid digging trenches under roads to connect the sites
• In historic buildings where traditional cabling would compromise the façade, a wireless LAN
can avoid drilling holes in walls
• Long-term cost benefits can be found in dynamic environments requiring frequent moves and
changes
• They allows the possibility of individual pupil allocation of wireless devices that move around
the school with the pupil.
27
In a wireless network, an ' access point'has a similar function to the hub in wired networks. It
broadcasts and receives signals to and from the surrounding computers via their adapter card. It
is also the point where a wireless network can be connected into an existing wired network.
The most obvious difference between wireless and wired networks, however, is that the latter
uses some form of cable to connect computers together. A wireless network does not need cable
to form a physical connection between computers.
Peer-to-Peer Configuration
This is the most basic wireless network configuration. It relies on the wireless network adapters
installed in the computers that are communicating with each other. A computer within range of
the transmitting computer can connect to it. However, if a number of computers are networked in
this way, they must remain within range of each other. Even though this configuration has no
real administration overhead, it should only be a consideration for very small installations.
28
CHAPTER 9: Network Hardware (Connectivity Devices)
Network hardware or connectivity devices are used to connect network entities or nodes
together. The following are common network hardware or connectivity devices:
NIC
The network interface card (NIC) connects or interfaces the computer to the network. It puts
data into packets and transmits the packet onto the network. It also provides the physical,
electrical, and electronic connections to the network media. A NIC is either an expansion card or
built in to the motherboard of the computer. In most cases, a NIC connects to the computer
through expansion slots, which are special slots located on a computer’s motherboard that allow
peripherals to be plugged directly into it. NIC cards generally all have one of two light emitting
diodes (LEDs) that help in diagnosing problems with their functionality. I there are two separate
LEDs, one of them may be the Link LED, which illuminates when proper connectivity to an
active network is detected. The other LED is the Activity LED. The Activity LED will tend to
flicker, indicating the transmission or receipt of data or frames to and from the network. A NIC
may be wired or wireless. A hub resides on both the Physical and Data-Link layer of the OSI
model.
NIC' s contain hardware and firmware (software routines in ROM) programming that implements
the
• Logical Link Control and
• Media Access Control
(functions of the Data Link layer of the OSI)
29
Preparing Data
• Data moves along paths in the computer called a BUS - can be 8, 16, 32 bits wide.
• On network cable, data must travel in a single bit stream in what's called a serial transmission.
• The transceiver is the component responsible for translating parallel (8, 16, 32-bit wide) into a
1 bit wide serial path.
• A unique network address or MAC address is coded into chips in the card
• card uses DMA (Direct Memory Access) where the computer assigns memory space to the
NIC
• if the the card can'
t move data fast enough, the card' s buffer RAM holds it temporarily during
transmission or reception of data
Hub
A hub is the device that connects all the computers or segments of the network together. Every
device in the network connects directly to the hub through a single cable. Any transmission
received on one port will be sent out to all the other ports in the hub. So, if one station sends it,
all the others detect it; but based on addressing in the frame, only the intended recipient listens
and receives it. Hubs are incapable of recognizing frame boundaries and data structures. A
broadcast sent out by any device on the hub will propagate to all devices connected to the hub.
Any two or more devices connected to the hub have the capacity of causing a collision with each
other. Collision is resolved by the CSMA/CD mechanism of the transmitter or sender. A hub
resides on Physical layer of the OSI model.
hub
30
Switch
A switch, like a hub, connects multiple segments of a network together. But unlike a hub that
sends out to anything it receives on one port to all the others, a switch recognizes frame
boundaries and pays attention to the destination MAC address of the incoming frame as well as
the port on which it was received. If the destination is known to be on a different port that the
port over which the frame was received, the switch will forward the frame out over only the port
on which the destination exists. Otherwise, the frame is discarded. If the location of the
destination is unknown, then the switch acts much like a hub in that it floods the frame out to
every port. A switch helps prevent data collision and reduce network congestion thereby
increases performance of the network. A switch resides on the layer 2 of the OSI model.
Switches
Repeater
A repeater extends the network segment by regenerating packets or signals from one segment to
the next. Repeaters regenerate baseband digital signals. It does not translate or filter the data
packets. Both segments being connected must use the same access method, for example
CSMA/CD Ethernet LAN segment can' t be joined to a Token Ring LAN segment. Another way
of saying this is the Logical Link Protocols must be the same in order to send a signal. On the
other hand, repeaters can move packets from one physical medium to another (having same
access method): for example a repeater can take an Ethernet packet from a Thinnet coax media
(segment) and pass it on to a fiber-optic media segment. Repeaters transmit every bit of data (no
filtering), so they can pass a packet or broadcast storm (traffic) along from one segment to the
next and back. Repeaters are used where network traffic is minimal or moderate. Repeaters
work at the Physical layer of OSI
Repeater
31
Bridge
A bridge is a network device that connects two network segments together. The primary
function of a bridge is to keep traffic separate on both sides of the bridge. Traffic is allowed to
pass through the bridge only if the transmission is intended for a station on the opposite side.
The main reasons for putting a bridge in a network are to connect two segments together and to
divide a busy network into two segments. Bridges have all the abilities of a repeater.
Additionally, bridges can take an overloaded network and split it into two networks, therefore
they can divide the network to isolate traffic or problems and reduce the traffic on both
segments. They expand the distance of a segment. They can link unlike physical media such as
twisted-pair (10Base T) and coaxial Ethernet (10Base2). Bridges can also link unlike media
access control methods, on different segments such as Ethernet and Token Ring and forward
packets between them. They don' t distinguish one protocol from the next and simply pass
protocols along the network. Bridges work at the media access control (MAC) sublayer of the
Data Link Layer of the OSI model.
Bridge
32
The advantages of bridges are:
• Increase the number of attached workstations and network segments
• Since bridges buffer frames, it is possible to interconnect different segments which use
different MAC protocols
• Since bridges work at the MAC layer, they are transparent to higher level protocols by
subdividing the LAN into smaller segments, overall reliability is increased and the network
becomes easier to maintain
• Used for non routable protocols like NetBEUI which must be bridged
• Bridges help localize network traffic by only forwarding data onto other segments as required
(unlike repeaters)
Routers
Routers determine the best path for sending data. They can make intelligent decisions about how
best to get network data to its destination based on data it receives. They don’t pass on broadcast
traffic but filter it to the local segment. Routers can switch and route packets across network
segments Routers builds a routing table which contains all known network addresses, how to
connect to other networks, possible paths between those routers, costs of sending data over those
paths. Routers work at the Network layer of OSI
Router
Characteristics of routers
• Routers don' t look at the destination computer address, they only look at the NETWORK
address and they only pass on the data if the network address is known and there is less
traffic.
• Routers REQUIRE specific addresses: they only understand network numbers which allow
them to talk to other routers and local adapter card addresses
• They only pass Packets to the network segment they are destined for.
33
• Routers don' t talk to remote computers, only to other routers
• They can segment large networks into smaller ones
• They act as a safety barrier (firewall) between segments
• They prohibit broadcast storms, because broadcasts and bad data aren' t forwarded
• Are slower than most bridges
• Routers can join dissimilar access methods: a router can route a packet from a TCP/IP Ethernet
network to a TCP/IP Token Ring network
Choosing Paths
Routers can choose the best path for the data to follow. Routers can accommodate multiple
active paths between LAN segments. To determine the best path, it takes these things into
account:
• If one path is down, the data can be forwarded over on alternative route
• Routers can listen and determine which parts of the network are busiest.
• It decides the path the data packet will follow by determining the number of hops between
internetwork segments
A Bridge
• Recognizes the address of EACH computer on it' s segment and forwards packets on the basis
of the destination address
• A bridge either recognizes the address or it doesn' t, and forwards the packet accordingly
• It forwards all broadcast messages to all ports, except to the port from which the broadcast
message came. Every computer on every segment receives this broadcast
• Bridges recognize ONE PATH between networks
A Router
• Works at the NETWORK layer and thus takes more information into account when
determining what to forward and where to forward it to.
• Routers recognize the addresses of other routers and determine which packets to forward to
which routers
• Routers can search between multiple paths and determine the best path at the moment
34
The 4 KEY pieces of information that distinguish bridges and routers
Bridges Routers
• recognize the MAC sublayer addresses • Routers recognize network addresses not
(i.e. the addresses of the network cards individual computer addresses
on its own segment)
• forwards everything it doesn' t recognize • routers filter addresses.
and • It forwards particular protocols to
• forwards all addresses it knows, but only particular addresses (other routers)
out the appropriate port • if the router doesn't recognize a
destination address, the packet is usually
discarded
• works with all protocols • only works with routable protocols
• Non-Routable = NetBEUI, DLC, LAT
35
Gateways
A gateway allows communications between dissimilar systems or environments, in order words;
it translates protocols and data between different network systems or environments. A gateway is
usually a computer running gateway software connected two different segments. For example an
Intel-based PC on one segment can both communicate and share resources with a Macintosh
computer or an SNA mainframe. Gateways are the most complex of network devices because
they perform translations at multiple layers of the OSI model. Use gateways when different
environments need to communicate. One common use for gateways is to translate between
personal computers and mainframes. Gateways work at the Application to Transport layer.
Characteristics of Gateways
• They make communication possible between different architectures and environments.
• They perform protocol AND data conversion / translation.
• They take the data from one environment, strip it, and re-package it in the protocol stack from
the destination system
• They repackage and convert data going from one environment to another so that each
environment can understand the other environment' s data
• gateway links two systems don't use the same
o Protocols e.g. from IPX/SPX to TCP/IP
o Data formatting from structure e.g. From ASCII to EBCDIC
o Languages e.g. from English to French
o Architecture e.g. from Microsoft to Mac
• Gateways are task specific in that they are dedicated to a specific type of conversion: e.g.
"Windows NT Server -> SNA Server Gateway"
• Usually one computer is designated as the gateway computer. This adds a lot of traffic to that
segment
Disadvantages of Gateways
• They slow things down because of the work they do
• They are expensive
• They difficult to configure
Other Devices
In addition to these network connectivity devices, there are several devices that, while may not
be directly connected to a network, participate in moving network data:
• Modems
• ISDN terminal adapters
• Wireless access points
• CSU/DSU’s
• Transceivers (media converters)
• Firewalls
36
Modems
A modem is a device that modulates digital data onto an analog carrier for transmission over an
analog medium and then demodulates from the analog carrier to a digital signal again at the
receiving end. The term modem is actually an acronym that stands for Modulator/DEModulator.
Data in a computer is formatted as digital signals or on-off electronic pulses. Because telephone
lines were designed to transmit the human voice, they format data as analogue signals or
electronic waves. For communication between computers to take place over a telephone line, the
digital signal must be converted to an analogue signal before it can be transmitted. After its
journey over the telephone lines, the analogue signal must then be reconverted back to a digital
signal so that the receiving computer can use it. The process of converting digital signals to
analogue signals is called modulation: while the process of reconverting the analogue signals
back to a digital signal is called demodulation. The device that accomplishes both of these
processes is a modern, short for Modulator-Demodulator.
Traditional (POTS)
Most modems you find in computers today fall into the category of traditional modems. These
modems convert the signals from your computer into signals that travel over the plain old
telephone service (POTS) lines. The majority of modems that exist today are POTS modems,
mainly because PC manufacturers normally include one with a computer.
DSL
Digital subscriber line (DSL) is quickly replacing traditional modems because it offers higher
data rates for reasonable cost. In addition, you can make regular phone calls while online. DSL
uses higher frequencies (above 3200Hz) that regular voice phone calls use, which provides
greater bandwidth (up to several megabits per second) than regular POTS modems provide while
still allowing the standard voice frequency range to travel at its normal frequency to remain
compatible with traditional POTS phones and devices. DSL “modems” are the devices that
allow the network signals to pass over phone lines at these higher frequencies.
Most often, when you sign up for DSL service, the company you sign up with will send you a
DSL modem for free or for a very low cost. This modem is usually an external modem
(although internal DSL modems are available), and it usually has both a phone lone and an
Ethernet connection. You must connect the phone line to a wall jack and the Ethernet
connection to your computer (you must have an Ethernet NIC in your computer in order to
connect to the DSL modem). Alternatively, a router, hub, or switch may be connected to the
Ethernet port of the DSL modem, increasing the options available for the Ethernet network.
37
Cable
Another high-speed Internet access technology that is seeing widespread use is cable modem
access. Cable modems connect an individual PC or network to the Internet using your cable
television cable. The cable TV companies use their existing cable infrastructure to deliver data
service on unused frequency bands.
The cable modem itself is a fairly simple device. It has standard coax connector on the back as
well as an Ethernet port. You can connect one PC to cable modem (the PC will need to have an
Ethernet NIC installed), or you can connect the modem to multiple PCs on the network (using a
hub or switch). A router may also be used to enhance the Ethernet network’s capability.
One of the most popular use for wireless access points is to provide Internet access in public
areas, like libraries, coffee shops, hotels, and airports. WAPs are easy to set up; most often, you
just need to plug them in to a wired network and power them up to get them to work.
Firewalls
A firewall protects LAN resources from attackers or hackers on the Internet. Similarly, it can
prevent computers on the network from accessing various services on the Internet. It can be used
to filter packets based on rules that the network administrator sets. These rules state what kinds
of information can flow into and out of a network’s connection to the Internet.
Firewalls can be either stand-alone computer running the firewall software or can be set up in
software on a server or router. Either way, the firewall will have at least two network
connections: one to the Internet (known as the ‘public’ side), and one to the network (known as
the ‘private’ side).
38
CHAPTER 10: STANDARD BODIES
The challenges involved in internetwork management tasks are made easier by adapting
networking standards. The organizations that create networking standards provide forum for
discussion and turn informal discussion into formal specifications. They also publicize
standardized specifications.
Some of the best known standards organizations are the International Organization for
Standardization (ISO), the American National Standards Institute (ANSI), the International
Telecommunication Union (ITU) and the Electronic Industries Association (EIA).
39
CHAPTER 11: INTRODUCTION TO THE OSI MODEL
When networks first came into existence, computers could communicate only with computers
from the same manufacturer or vendor. For example, a network component or device (such as
NIC) designed by IBM (International Business Machines Inc.) could only work with another
device or computer made by IBM. The OSI Models was developed by International
Organization for Standards to promote interoperability by creating a guideline for network data
transmission between computers and components that have different hardware manufacturers
and dissimilar operating systems (software) and protocols. Interoperability is the capability of
two or more hardware devices or two or more softwares to work harmoniously together. The
OSI model consists of layers. These layers provide a way of dividing any computer network into
independent modules from the lowest layer (physical) to the highest layer (application). Each
layer performs a specific function and then passes on the result to another layer
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer
Note:
You can use mnemonics to help you remember the order of the OSI model layers: APSTNDP
(from top to bottom). The most popular mnemonic for this arrangement is All People Seem To
Need Data Processing. A reverse mnemonic (from Physical to Application, bottom to top)
People Do Need To Send Packets Away. (Good advice, don’t you think?)
40
The layered approach
A reference model like the OSI model is a conceptual blue print of how communication should
take place. It addresses all the processes required for effective communication and divides these
processes into logical grouping called layers. When a communication system is designed in this
manner, it is known as layered architecture (or model). OSI model is a standard layered
architecture that provides a framework for creating and implementing networking standards,
devices and inter-networking schemes
The OSI model is hierarchical (made up of different levels from lower to higher levels), and the
same benefits and advantages can apply to any layered model. The primary purpose all such
models, especially the OSI model, is to allow different manufacturers network devices to
interoperate (work harmoniously together).
The following network devices operate at all seven layers of the OSI model:
• Network management stations (NMSs)
• Web and application servers
• Gateways (not default gateways)
• Network hosts
The Application Layer: The Application layer, the top layer of the OSI model, does not refer to
applications or programs such as word processors, but rather to a set of tools or services that an
application can use to accomplish a task such as word processor application requesting a file
transfer. The application layer interfaces the actual application programs with the application
layer protocols. This means that Microsoft word, for example, does not reside at the Application
layer but instead interfaces with the Application layer protocols or services such FTP (File
transfer protocol). This layer is responsible for defining how interactions occur between network
services (applications) and the network. Services that function at the Application layer include,
file, print and messaging services. Additionally the application layer describes how applications
(or programs) interact with the network operating system, including database management,
electronic mail and terminal emulation programs. It may also support error recovery.
41
Presentation layer
The Presentation layer is responsible for the formatting, conversion and formatting of data being
passed up to Application layer. In this layer, data is converted, for example, from ASCII
standard to Unicode or EBCDIC standard. (ASCII and EBCDIC are two different standards of
representing characters. It is the presentation layer that is responsible for recognizing file types
in an incoming data stream and performing any massaging to the data to make a file presentable
to the Application layer protocol. Tasks like data compression, decompression, encryption, and
decryption are associated with the Presentation layer
Session Layer
The Session layer defines how two computers establish, synchronize, maintain, and end a
session. It is responsible for setting up, managing and then terminating sessions between
Presentation layer components (or entities). This layer also provides communication control
between devices or nodes. The session layer keeps different applications’ data separate.
Practical functions such as security authentication, connection ID establishment, data transfer,
acknowledgements, and connection release take place here.
Transport Layer
The Transport layer is responsible for checking that the data was delivered error-free. It also
segments and reassembles data from upper-layer applications into a data stream. This means, it
divides or segments a message or packet that is too long into smaller packets or segments and it
could also take a series of short packets (or segments) and combine them into one longer packet.
These smaller or combined packets must later be correctly reassembled. This is accomplished
through packet sequencing (usually by appending a number to each of the packets or segment).
This layer also handles logical address/name resolution. Additionally, the transport layer can
send an acknowledgement that it got the data packet. (ACK is short for acknowledgement). The
transport layer is responsible for the majority of error and flow control in network
communications. It also provides end-to-end data transport services and can establish a logical
connection between the sending host and destination host on an internetwork. The transport
layer is also responsible for providing mechanisms for multiplexing (put together onto the same
data stream) upper-layer applications and establishing session. The Transport layer can be
connectionless of connection-oriented.
Connectionless: Is a communication model in which the source and destination addresses are
included inside each packet so that a direct connection between sender and receiver (or an
established session between nodes) is not required. In a connectionless service, data packets may
not reach their destination in the same order in which they were sent. UDP is a connectionless
protocol (service)
42
The Network Layer
The Network Layer manages device addressing, tracks the location of devices on the network,
and determines the best way to route (or move) data. This means that the Network Layer must
transport data (or traffic) between devices that are on different network segments. The Network
layer is responsible for logical addressing and translating logical addresses into physical
addresses. One major function of the Network layer is prioritizing data. Not all data is of equal
importance hence the most essential data is dealt with first. This prioritization is known as
quality of service (QoS). The network layer also controls congestion, routes data from source to
destination. Routers are the main devices that work at the network layer.
Two types of packets are used at the Network layer: data and route updates:
Data packets: Used to transport user dada through and internetwork.
Route Update packets: Used to update neighboring routers about the network connected to all
routers within the internetwork.
Media Access Control (MAC): Defines how packets are places on the transmission media. If
there is traffic, then “first come/first serve” rule is applied. The MAC also manages line
discipline, error notification, ordered delivery of frames, and flow control.
Logical Link Control: Responsible for identifying network layer protocols and then
encapsulating them. An LLC header tells the Data Link Layer what to do with a packet once a
frame is received. The LLC can also provide flow control and sequencing of control bits.
Device: Switch, Bridge
43
Summary: OSI Model.
• International Standards Organization (ISO) specifications for network architecture called the
Open Systems Interconnect or OSI model.
• Seven layered model, higher layers have more complex tasks.
• Each layer provides services for the next higher layer.
• Each layer communicates logically with its associated layer on the other computer.
• Packets are sent from one layer to another in the order of the layers, from top to bottom on the
sending computer and then in reverse order on the receiving computer.
44
Session • allows two applications running on NetBIOS Gateway
"syncs and sessions" different computers to establish, maintain Names Pipes
and end a connection called a session
across the network Mail Slots
• responsible for name recognition and RPC
security (identification) so only the
designated parties can participate in the
session
• provides synchronization services by
planning check points in the data stream
=> if session fails, only data after the
most recent checkpoint need be
transmitted
• Implements dialog control between
communicating processes
• manages who can transmit data at a
certain time and for how long
• Examples are interactive login and file
transfer connections, the session would
connect and re-connect if there was an
interruption; recognize names in sessions
and register names in history
TCP, ARP, RARP; Gateway
Transport • Responsible for packet creation
packets; flow • provides an additional connection level SPX Advanced Cable
control & error- below the session layer NWLink Tester
handling
• ensure that packets are delivered error- NetBIOS / NetBEUI Brouter
free, in sequence with no loss or
duplication. ATP
• divides streams of data into chunks or
packets; the transport layer of the
receiving computer reassembles the
message from packets
• Unpacks, reassembles and sends receipts
of messages at the receiving end.
• "train" is a good analogy => the data is
divided into identical units
• provides error-checking to guarantee
error-free data delivery, with on losses or
duplications
• provides acknowledgment of successful
transmissions; requests retransmission if
some packets don’t arrive error-free
• Provides flow control, error handling, and
solves transmission problems.
45
IP; ARP; RARP, Brouter
Network • responsible for providing:
ICMP; RIP; OSFP; Router
addressing; routing o addressing messages and translating
logical addresses and names into physical IGMP; Frame Relay Device
addresses(e.g. computer name to MAC IPX
address) ATM Switch
NWLink Advanced Cable
NetBEUI Tester
o determining routes from the source to the
destination computer OSI
o managing network problems and traffic DDP
such as packet switching, data congestion DECnet
and routing and controlling the congestion
of data.
• if router can’t send data frame as large as
the source computer sends, the network
layer compensates by breaking the data
into smaller units. At the receiving end,
the network layer reassembles the data
• think of this layer stamping the addresses
on each train car
Logical Link Bridge
Data Link • turns packets into raw bits 100101 and at
the receiving end turns bits into packets. Control Switch
data frames to bits
• handles data frames between the Network • error correction and ISDN Router
flow control
and Physical layers
• manages link control Intelligent Hub
• the receiving end packages raw data bits and defines SAPs
from the Physical layer into data frames NIC
for delivery to the Network layer 802.1 OSI Model
Advanced Cable
802.2 Logical Link Tester
• responsible for providing error-free Control
transmission of frames to other computer
via the Physical Layer Media Access
• this layer defines the methods used to
Control
transmit and receive data on the network. • communicates with the
It consists of the wiring, the devices use to adapter card
connect the NIC to the wiring, the • controls the type of
signaling involved to transmit / receive media being used:
data and the ability to detect signaling 802.3 CSMA/CD
errors on the network media (Ethernet)
802.4 Token Bus
(ARCnet)
802.5 Token Ring
802.12 Demand Priority
IEEE 802 Repeater
Physical • transmits unstructured raw bit stream over
a physical cable (or media) IEEE 802.2 Multiplexer
hardware; raw bit
stream • defines cables, adapter cards, and physical ISO 2110 Hubs
46
aspects ISDN • Passive
• relates electrical, optical, mechanical and • Active
functional interfaces to the cables
TDR
• defines NIC attachments to hardware, and
how cable is attached to the NIC Oscilloscope
• defines techniques to transfer bit stream to Amplifier
cable
• Defines data encoding and bit
synchronization.
47
CHAPTER 12: Media-Access Methods
A media access method or scheme is a set of rules that directs the data (signals) sent over the
network transmission media (cables). The methods provide an operating process that all
computers (and hosts) must adhere to so that data is transferred completely and accurately. As
you know from traffic rules that regulate vehicle traffic, controlling the direction of traffic flow
is not enough to keep the streets safe.
For example, at a busy intersection traffic light and stops signs keep vehicles from being in the
same place at the same time. Being in the same place at the same time causes vehicles to collide.
Similarly, being on a network transmission media at the same time causes electronic signals to
collide. Therefore, a media access scheme or method (a set of rules for network traffic control)
needs to be in place to control when network devices are allowed to transmit data signals.
If network devices operate without a media access scheme, devices transmit whenever they are
ready. Sometimes they transmit at the same time. Signals combine and become damaged to the
point that the signal data is lost. This is called collision, and it destroys effective network
communications. You cannot operate a network unless you can eliminate the effects of collision.
There are three primary methods that LANs employ to access the physical network medium:
• Contention
• Token passing
• Polling
Contention-Based Schemes
Ethernet systems use a contention-bases access method known as CSMA/CD, short for Carrier
Sense Multiple Access / Collision Detection. Though this seems a lot of words, the meaning is
quite simple. Carrier Sense means that each device checks the LAN before it starts transmitting
to see if some other device is using the media. If another signal (containing a "carrier") was
present, then the device attempting to send would wait until the LAN is clear. Then it transmits
its data. The collision detection part means that each workstation listens to make sure that only
one signal is present on the LAN. In the event there are two then obviously the data from one
device has collided with that of another. Once a workstation detects a collision, it sends out a
series of 1 bits alerting the rest of the network. At that point everyone stops transmitting and each
workstation waits a random amount of time before attempting to transmit again. The delay time
is regulated by a random number generator on-board each Ethernet card.
48
The major advantage of contention systems is that devices may transmit whenever they like just
as long as the LAN is free. Consequently the overhead of devices waiting on the opportunity is
generally low. Since any device can participate at almost any time, no attempt is made to
prioritize LAN access in any way.
However, as traffic increases in a contention system, collisions can become excessive, severely
impacting the overall performance of the network. The capacity of the LAN may be far
underutilized in this event. The other major disadvantage is that contention systems do not
follow an easily predictable pattern of performance degradation as traffic increases.
In summary, contention-based schemes handle average network traffic conditions very well but
lose performance when network traffic gets heavier and so more collisions occur.
Token Passing
This technology is used for token ring systems. A token is a special message that temporarily
gives access control to the device holding the token. Passing the token around distributes access
control among the network’s devices.
In token passing schemes, a small signal called a token regularly visits each device. The token
gives permission for the device to transmit if it needs to. If a transfer of data is needed, the
device receives a set amount of time to broadcast its data. When it is done, the machine then
retransmits the token to another machine giving that recipient permission to transmit, and so the
system continues. This mechanism ensures opportunity for all devices to gain access to the LAN.
Because of its predictable behavior, token scheme LANs offer the advantage of priorities, where
a certain group of devices may have enhanced access to the LAN if warranted.
Token-passing schemes do not allow contention. One token exists on the media as devices take
turns using the media. Under average network traffic condition, token-passing is slower than
contention-bases access schemes, but is performs better under heavy traffic conditions.
49
Polling Schemes
Polling is a means by which a central controlling device may regulate the opportunity for
machines to transfer data on the LAN. In effect, several devices attached to a controller unit are
individually given permission to access the LAN. This technology is often employed in LANs
associated with mainframes and minicomputers. The device that controls the access of other
units is called a "controller" or a "primary" device. The units themselves are referred to as
"secondaries". This controller device queries the secondary devices in a predetermined order to
determine whether they have information to transmit. If a unit has something to transmit, the
controller gives the device the permission to transmit. The secondary then has exclusive use of
the network to transfer data for a set period of time. When that time expires or if the device is
through transmitting, the controller routes a request for transmit to the next secondary device in
line.
Terminal A
Controller
Terminal B Device
Terminal C
This access scheme is similar to a classroom in which the teacher goes from students to student
in a predetermined order. The teacher asks each student to speak for a present amount of time
and then moves on to the next student. The teacher is the primary and the students are the
secondaries in this example.
50
CHAPTER 13: Data Transmission
There are numerous tasks involved when data from an application on one computer is
transmitted through a network and into an application on another computer. Data from one
application is transmitted through a network and into another application. Data and control
information can be transmitted through networks in a variety of forms, including frames, packets,
datagrams, segments and messages. Each form is associated with a particular OSI model layer.
The transport layer (Layer 4), multiplexes the data from multiple applications into the same
traffic stream, provides end-to-end transport between two hosts and optionally provides a variety
of reliable transport mechanisms. An example of a Layer 4 implementation is Transmission
Control Protocol (TCP).
The network layer (Layer 3), provides routing and related functions that enable multiple data
links to be combined into an internetwork. It also defines node addressing. An example of a
Layer 3 implementation is Internet Protocol (IP).
The data link layer (Layer 2), organizes the data for transporting across the physical network.
The Institute of Electrical and Electronic Engineers (IEEE) has subdivided the data link layer
into two sublayers, which are Logical Link Control (LLC) and Media Access Control (MAC),
discussed in chapter 11.
The physical layer ( Layer 1), defines the physical links and specifications that enable stations
on the network to communicate with each other. It also allows hosts to communicate across a
shared physical media. Layer 1 defines characteristics such as voltage levels and physical data
rates.
In order for messages to transmit between two devices over an internetwork, they must move
through the OSI model layers on the sending and receiving computers. Each layer adds
instructions or control information to the original message.
51
When the source of information and its destination are located within the data link layer, or
Layer 2, the unit of transmission is called a frame. Frames are the data link layer header and
trailer encapsulated with any OSI upper layer data requiring transmission. A frame includes in
its data portion the information unit passed to it by Layer 3, which is the network layer. The
format of the header and trailer depends on the type of network, for example Ethernet, to which
the device is connected.
When the source and destination of information are within the network layer, the unit of
information is called a packet. Packets are the network layer header and trailer encapsulated
with any upper layer data requiring transmission.
A connectionless network service is an OSI network layer service that does not require a circuit
to be established before data is transmitted. A packet used in a connectionless network service is
referred to as a datagram.
A segment is a protocol data unit within the transport layer. It is constructed in the same way as
packets and frames. A message is an information unit that can be used in the transport layer as
well as the upper layers but typically is used in the application layer. A cell is an information
unit of a fixed size whose source and destination are data link layer components. Cells are
common in switched environments such as ATM. A cell is composed of a header and payload. A
payload is the portion of a frame that contains the upper layer information.
The header contains control information intended for the destination data link layer and is
typically five bytes long. The payload contains upper-layer data that is encapsulated in the cell
header and is typically 48 bytes long. The length of the header and payload fields are exactly the
same for each cell.
Signal Transmission
52
CHAPTER 14: Network Operating Systems (NOS)
Network Operating System (NOS) is an operating system that includes special functions for
connecting computers and devices into a local-area network (LAN) or an Inter-networking. A
network operating system (NOS) controls a network and its message (e.g. packet) traffic and
queues, controls access by multiple users to network resources such as files, and provides for
certain administrative functions, including security. Network operating systems (NOS) typically
are used to run computers that act as servers. They provide the capabilities required for network
operation. Network operating systems are also designed for client computers and provide
functions so the distinction between network operating systems and stand alone client operating
systems is not always obvious. Some examples of popular NOSs for DOS and Windows systems
include Novell NetWare, Windows NT and 2000, Sun Solaris and IBM OS/2. The Cisco IOS
(Internet Operating System) is also a network operating system with a focus on the
internetworking capabilities of network devices.
Artisoft'
s LANtastic, Banyan VINES, Novell' s NetWare, and Microsoft's LAN Manager are
examples of network operating systems. In addition, some multi-purpose operating systems, such
as Windows NT and Digital' s OpenVMS come with capabilities that enable them to be described
as a network operating system.
Features
Some of the features of Network Operating System are:
• Provide basic operating system features such as support for processors, protocols, automatic
hardware detection and support multi-processing of applications
• Security features such as authentication, authorization, logon restrictions and access control
• Provide name and directory services
• Provide file, print, web services, back-up and replication services
• Support Internetworking such as routing and WAN ports
• User management and support for logon and logoff, remote access; system management,
administration and auditing tools with graphic interfaces
• Clustering capabilities; fault tolerant and high availability systems
Functions of NOS
A network operating system provides:
• Features to enable file, print, application, database and resource sharing
• The ability to manage network name directory
• Account or user administration services for users
• Security management services
• Drivers for installed components
• Network services such as printing and so on
• Facility for backing up data and other housekeeping aspects of a network
Note:
A NOS is not the same as the networking tools provided by some existing OSs, for instance
Windows XP. An NOS is an OS that has been specifically written to keep networks running at
optimal performance.
53
CHAPTER 15: Network Protocols & Services
Protocols are predefined set of rules and standards that indicates how computers or devices
communicate and exchange data on the network. Protocols help computers and network devices
understand each other and hold ‘conversations’.
There are four basic protocol groups for communication over a network medium:
The name Telnet comes from “telephone network,” which is how most Telnet sessions used to
occur.
54
Trivial File Transfer Protocol (TFTP)
The Trivial File Transfer Protocol (TFTP) is the stripped-down, stock version of FTP, but it’s
the protocol of choice if you know exactly what you want and where to find it. It doesn’t give
you the abundance of functions that FTP does, though. TFTP has no directory-browsing abilities;
it can do nothing but send and receive files. This compact little protocol also skimps in the data
department, sending much smaller blocks of data than FTP, and there’s no authentication as with
FTP, so it’s insecure. Few sites support it because of the inherent security risks.
55
Bootstrap Protocol (BootP)
BootP stands for Bootstrap Protocol. When a diskless workstation is powered on, it broadcasts a
BootP request on the network. A BootP server hears the request and looks up the client’s MAC
address in its BootP file. If it finds an appropriate entry, it responds by telling the machine its IP
address and the file—usually via the TFTP protocol—it should boot from. BootP is used by a
diskless machine to learn the following:
• Its own IP address
• The IP address and host name of a server machine
• The boot filename of a file that is to be loaded into memory and executed at boot-up
BootP is an old program that isn’t used anymore, right? Wrong: BootP is still around, but now
we just call it the Dynamic Host Configuration Protocol, which you will learn about in the next
section.
56
The Host-to-Host Layer Protocols
The Host-to-Host layer’s main purpose is to shield the upper-layer applications from the
complexities of the network. This layer says to the upper layer, “Just give me your data stream,
with any instructions, and I’ll begin the process of getting your information ready to send.” The
following sections describe the two protocols at this layer:
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
UDP provides two services not provided by the IP layer. It provides port numbers to help
distinguish different user requests and, optionally, a checksum capability to verify that the data
arrived intact.
57
The Internet Layer Protocols
There are two main reasons for the Internet layer’s existence: routing, and providing a single
network interface to the upper layers. None of the upper- or lower-layer protocols have any
functions relating to routing. The complex and important task of routing is the job of the Internet
layer. The Internet layer’s second job is to provide a single network interface to the upper-layer
protocols. Without this layer, application programmers would need to write “hooks” into every
one of their applications for each different
Network Access protocol. This would not only be a pain in the neck, but it would lead to
different versions of each application—one for Ethernet, another one for Token Ring, and so on.
To prevent this, IP provides one single network interface for the upper-layer protocols. That
accomplished, it’s then the job of IP and the various Network Access protocols to get along and
work together. All network roads don’t lead to Rome—they lead to IP. And all the other
protocols at this layer, as well as all those at the upper layers, use it. Never forget that. All paths
through the model go through IP. The following sections describe the protocols at the Internet
layer. These are the protocols that work at the Internet layer:
• Internet Protocol (IP)
• Address Resolution Protocol (ARP)
• Reverse Address Resolution Protocol (RARP)
58
Address Resolution Protocol (ARP)
The Address Resolution Protocol (ARP) finds the hardware address of a host from a known IP
address. Here’s how it works: When IP has a datagram to send, it must inform a Network Access
protocol, such as Ethernet or Token Ring, of the destination’s hardware address on the local
network. (It has already been informed by upper-layer protocols of the destination’s IP address.)
If IP doesn’t find the destination host’s hardware address in the ARP cache, it uses ARP to find
this information. As IP’s detective, ARP interrogates the local network by sending out a
broadcast asking the machine with the specified IP address to reply with its hardware address. In
other words, ARP translates the software (IP) address into a hardware address—for example, the
destination machine’s Ethernet board address—and from it, deduces its whereabouts. This
hardware address is technically referred to as the media access control (MAC) address or
physical address. Figure 3.8 shows how an ARP might look to a local network.
59
CHAPTER 16: LAN Technologies
Ethernet Networks
Ethernet is the most widely-installed local area network (LAN) technology. Ethernet is a
popular network technology that uses logical bus topology and can be laid out in either a
physical bus or physical star topology. An Ethernet LAN typically uses coaxial cable or special
grades of twisted pair wires. Ethernet is also used in wireless LANs. The most commonly
installed Ethernet systems are called 10BASE-T and provide transmission speeds up to 10 Mbps.
Fast Ethernet or 100BASE-T provides transmission speeds up to 100 megabits per second and is
typically used for LAN backbone systems, supporting workstations with 10BASE-T cards.
Gigabit Ethernet provides an even higher level of backbone support at 1000 megabits per second
(1 gigabit or 1 billion bits per second). 10-Gigabit Ethernet provides up to 10 billion bits per
second
Ethernet uses a contention-bases access scheme. Ethernet moves messages around the network
in packets of information that include the source station address, the destination station address,
the type of data that must be moved, and the data itself. To send a packet, a device on the
network must first listen to see if any other device is using the cable. When the cable appears to
be clear of traffic, the device sends it packets. If two devices are trying to transmit over the cable
at the same time, the packets might physically collide with each other on the wire. The result can
be damaged and unreliable packets. Ethernet expects some if these collisions and handles them
by employing CSMA/CD media access scheme.
When a collision occurs, a signal is sent to ensure that the collision has been detected around the
network. The devices competing for the cable’s bandwidth retransmit, but they delay their
retransmission by a random amount of time to ensure that collisions are eliminated. When
devices become aware of a packet on the wire, they check to make sure the packet is not a
fragment of a packet that has been damaged by a collision. If it is a whole packet, the devices
check the addresses. A packet addressed to a device is checked for integrity by the device before
it is processed.
The station then sends the token out on the ring. As the now busy token is passed to each active
station around the ring, each station checks to see which station the token is intended for. If a
station is not the recipient of the token, it re-sends the token along the ring. If a station is the
recipient, it copies the data that the source station added to the token.
Then it adds data to the token to indicate that it has recognized the address and copied the data.
It then sends the altered token out to the ring.
60
The token continues around the rind until it reaches the source station. When the source sees that
the data has been received and copied, it generates a new free token, which it passes to the next
active station on the rind. Only One token is allowed to be on a ring at a time.
The token scheme can also be used with bus topology LANs.
FDDI
FDDI (Fiber Distributed Data Interface) is a set of ANSI and ISO standards for data transmission
on fiber optic lines in a local area network (LAN) that can extend in range up to 200 km (124
miles). The FDDI protocol is based on the Token Ring protocol. In addition to being large
geographically, an FDDI local area network can support thousands of users. FDDI is frequently
used on the backbone for a wide area network (WAN).
An FDDI network contains two token rings, one for possible backup in case the primary ring
fails. The primary ring offers up to 100 Mbps capacity. If the secondary ring is not needed for
backup, it can also carry data, extending capacity to 200 Mbps. The single ring can extend the
maximum distance; a dual ring can extend 100 km (62 miles).
ARCNET
ARCNET is a widely-installed local area network (LAN) technology that uses a token-bus
scheme for managing line sharing among the workstations and other devices connected on the
LAN. The LAN server continuously circulates empty message frames on a bus (a line in which
every message goes through every device on the line and a device uses only those with its
address). When a device wants to send a message, it inserts a "token" (this can be as simple as
setting a token bit to 1) in an empty frame in which it also inserts the message. When the
destination device or LAN server reads the message, it resets the token to 0 so that the frame can
be reused by any other device. The scheme is very efficient when traffic increases since all
devices are afforded the same opportunity to use the shared network.
61
ARCNET can use coaxial cable or fiber optic lines. ARCNET is one of four major LAN
technologies, which also include Ethernet, Token Ring and FDDI.
When something is virtual it appears to be real, but it is not. A virtual LAN, or VLAN, appears
to be one large network. It is actually a collection of multiple networks. While these networks
are physically connected, logically they are separate. The protocol of each can be different. A
switch can control and regulate traffic of a number of networks (creating a virtual LAN), but it
cannot connect a user on one VLAN with a user on another. A router is required for that kind of
connection.
A switched virtual LAN is a broadcast domain connecting a group of LANs at wire speed.
Ethernet switches have evolved from creating VLANs based on port assignment. They can now
create VLANs based on MAC addressing and network addressing. This enables VLANs to be
divided into closed logical user groups, called subnets, determined by administrative controls.
An Ethernet VLAN can be established through software, allowing a network administrator to
group a number of switch ports into a high bandwidth, low-latency switched workgroup. For
network management identification purposes, each virtual LAN gets a unique network number.
VLANs function on a bridge architecture, switching and transmitting data by media access
control (MAC) source and destination addresses. Traffic between virtual LANs is filtered,
secured and managed by a router at the software level, separate from the virtual LAN switching
logic.
62
CHAPTER 17: WAN Technologies
WANs often use transmission facilities provided by common carriers, such as telephone
companies, to link remote locations, even across continents. WANs may utilize a variety of
technologies to provide your enterprise with an internetworking solution for a variety of
communication needs.
Wan Devices
WAN devices can include WAN switches, access servers, modems, Channel Service Units and
Data Service Units (CSU/DSUs), ISDN terminal adapters, routers, ATM switches and
multiplexers.
Communications between computers rely heavily on the public telephone system. Newer
telephone line technologies have improved the standard of communications between networks
considerably. The following is a brief description of some of the technologies that are available:
PSTN
The PSTN or Public Switched Telephone Network refers to the original public telephone
network. From a communications perspective it was slow and unreliable. Some of the exchanges
on a PSTN may still make use of mechanical switches to route telephone calls. These add
additional noise to the line. When lines are noisy, signals have to be resent repeatedly between
the source and the destination. The PSTN makes use of analogue technology. Analogue
technology uses continuously variable signals. An example of an analogue signal is ordinary
speech. Newer digital technologies make use of pulses of fixed magnitude and duration. In order
to improve connections, it is possible to have an analogue leased line. This is a dedicated
permanent telephone connection between two computers using the PSTN. In order to connect a
computer to a telephone network, you need a modem. This is an abbreviation for modulator-
demodulator. The function of the modem is to convert the digital signals from the computer into
an analogue form suitable for transmission on the PSTN
ISDN
ISDN or Integrated Services Digital Network is a technological development that is able to
make use of the existing PSTN cabling to transmit digital signals. Technically ISDN is an
international standard for the transmission of data, voice and video or normal voice or digital
telephone lines. ISDN supports rates of up to 64Kbps. An ISDN connection consists of two lines
which can be used independently or together to give a combined rate of 128Kbps.
If you wish to connect a computer to an ISDN line you need a special ISDN modem. This is a
different type of modem to the one used with an analogue line. Its purpose, however, is the same,
to convert the digital signals of the computer into a form suitable for transmission on an ISDN
line. It is possible to get a dedicated connection between two computers using ISDN. This is
called a diginet connection. The older telephone systems make use of electrical currents
transmitted through copper cabling. As electric signals are subject to interference, they are not
the ideal method of transmitting data. Newer telephone systems make use of fibre optic cable. In
fibre optic technology, light is transmitted along the cable. As light signals are not subject to the
63
same interference problems as electrical signals, fibre optic is a far more efficient and reliable
system.
ADSL
ADSL or Asymmetric Digital Subscriber Lines allow the transmission of high speed digital data over
ordinary telephone lines using a modulation technology called DMT or Discrete MultiTone. ADSL
delivers high bandwidth over existing twisted-pair copper telephone lines, also called
Asymmetric Digital Subscriber Loop. ADSL supports speeds in the range of 1.5 to 9Mbps in the
downstream direction (from the network to the subscriber) and supports upstream (from the
network to the subscriber) speeds in the range of 16 Kbps to 640 Kbps; hence, the term
asymmetric.
ATM
Asynchronous transfer mode (ATM) digital service is a method for transmitting voice, video, and data
over high speed WANS. ATM offers a high-bandwidth, efficient means for transferring multimedia
content, data, and voice over phone lines. ATM uses continuous bursts of fixed-length packets
called cells to transmit data. The basic cell consists of 53 bytes, 5 of which are used for control
functions and 48 for data. A cell is analogous to a packet or frame, except that an ATM cell is
always fixed in length, whereas a frame’s length can vary.
ATM is designed to switch these small cells through an ATM network very quickly. It does this
by setting up a virtual connection between the source and destination nodes; the cells may go
through multiple switching points before ultimately arriving at their final destination. The cells
may also arrive out of order, so the receiving system may have to reassemble and correctly order
the cells. ATM is a connection-oriented service, and two kinds of connections are possible:
• Permanent virtual circuits (PVCs), in which connections are created manually
• Switched virtual circuits (SVCs), in which connections are made automatically
Data rates are scalable and start as low as 1.5Mps, with speeds of 25Mbps,51Mbps, 100Mbps,
155Mbps, and higher. The common speeds of ATM networks today are 51.84Mbps and
155.52Mbps. Both of these speeds can be used over either copper or fibre-optic cabling. An
ATM with a speed of 622.08Msps is also becoming common but is currently used exclusively
over fibre-optic cable. ATM supports very high speeds because it is designed to be implemented
by hardware rather than software; faster processing speeds are therefore possible.
Microwave
It is a method of radio transmission that uses high-frequency waves (in the range of 1 to 30
gigahertz) for line-of-sight broadband communications. It requires a repeater station every 20
miles or so because of the curvature of the earth. Microwaves are used for satellite
communications, for communications between two buildings in a metropolitan area, and across
large open areas such as lakes and rivers where laying a cable may be impractical.
64
Data Transfer Rates
Data is tranmitted in bits of 1s or 0s. The speed of a data transfer is measured by the number of
bits that can be transferred each second or bps (bits per second). This is also sometimes called
the baud rate or bandwidth.
To put these figures in perspective, the maximum theoretically attainable speed with an analogue
line is 56kbps. This figure is very seldom attained and the reality is usually substantially lower.
ISDN lines operate at 64 kbps and higher.
65
CHAPTER 18: The Internet
What is Internet?
The Internet consists of many interconnected networks. Networks are connected to one another
by special-purpose computers or servers called routers. packet-switched
How it works?
Every computer which is connected to the Internet has a unique identifier called IP Address.
When data is to be delivered across the Internet, it is first converted into small units called
packets. A packet consists of two parts: a header and a payload. The header contains the IP
address of the packet's destination. When a packet is sent into the Internet, it passes through a
local network to the first router (sometimes called a gateway). This router examines the packet' s
destination address and decides which router, of all those it is directly connected to, it should
forward the packet onto for its next transmission (or hop). The process is repeated at the next
router, and so on, until the packet reaches its destination device or computer. Internet Protocol
(IP) defines how the processes works, the format of packets, how routers behave, and so on.
66
Functionality of the Internet
The internet has over a million computers attached to it, from which arises the need of a proper
addressing system for communication. This system of addressing is called the Internet Protocol
(IP) Addressing system. Each computer on the network is called a workstation or host, and has a
name called host name and a number called IP Address. The IP addressing system uses:
ABBREVIATION REPRESENTS
edu Educational institutions
mil Military sites
gov Government departments
net Networking organization
com Commercial organization
int International organization
org Professional societies
ac Academic institution
The letter addressing system also uses country codes comprising two letters. Examples of
country codes are in for India, ca for Canada, bw for Botswana, au for Australia etc. This letter
addressing system is called Domain Naming System (DNS).
The internet being a packet switching network, data is transmitted by converting it into small
packets. The software or protocol that is responsible for making the internet function efficiently
is TCP/IP, which stands for Transmission Control Protocol / Internet Protocol.
67
located on different servers. The user can use the browser software like internet explorer,
Mozilla Firefox or Netscape navigator to navigate the web. A browser is software which helps
the user navigate the World Wide Web. The web is a graphic medium with most web pages
having some amount of images. The term home page commonly refers to the index page of any
organization or information source. From home page, the user can have links that take the user
to further levels of information within the same or different topic or links to other homes pages.
Common Terminologies
Some commonly used terminologies related to WWW are:
• Browser: is client software that allows the user to display and interact with a hypertext
document.
• Web server: It is a program that responds to requests from web browsers to retrieve resources.
! It is also used to refer to the computer that runs the server program
• Home page: is the first hypertext document displayed when the user follows a link to the web
server.
• Hypertext Markup Language (HTML): is the encoding scheme used to create a Web document.
• Hypertext Transfer Protocol (HTTP): is the protocol used on the Web to transfer hypertext
documents. It internet
• Uniform Resource Locator (URL): is a web addressing scheme that spells out the exact
location of an internet resource. When the user clicks on a link, the browser reads the link to
the document. The information about the link is provided to the browser by the URL. Any
link from one document to another is always implemented by using a URL. A URL contains
information about the location of the document. A URL may point to another HTML
document or an image. A typical URL would be as follows:
COMPONENT DESCRIPTION
http scheme: type of data to which the URL points
www The World Wide Web
vci.bw host.domain: refers to the server on which the data is stored
home/course path/dataname: refers to the location on the server where the
data is stored
68
An illustration of services provided by the Internet and when to use them is given table below.
OPTION DESCRIPTION
FTP Get a file from another system on the internet
FTP Send a file to another system on the internet
Telnet View files in a directory in a system on another network
E-mail Corresponds or communicate with a particular person on the internet.
Newsgroup Correspond or communicate with a group of people interested in a similar topic
WWW Read multimedia documents on the internet
Gopher Search for everything about a specific topic on the internet.
Dedicated access
A dedicated connection allows the User’s computer to remain connected to the internet 24 hours
a day, for example ADSL internet access. Dedicated access is a direct link to the Internet.
Routers pass on the data to internet backbones. A router is used to transmit data from one
network to another. Backbones are high speed phone lines that move data to and from mid-level
servers. These servers pass on the data to local networks as shown below.
Dial Up Access
IP Accounts
When the user needs to access the Internet through a service provider, the user can have two
kinds of accounts – SLPIS accounts and PPP accounts, collectively known as IP accounts. A
service provider has direct access to the internet and provides internet services to other users.
The service provider assigns addresses to the users.
69
SLIP strands for Serial Line Internet Protocol, and PPP stands for Point-to Point Protocol. Both
SLIP and PPP connections are similar to a dedicated line, though PPP connections are faster that
SLIP connections. With an IP address, the computer appears to be a node on the network like a
dedicated account. The software that the user uses on the machine is downloadable on the user’s
machine and not on the service provider.
Shell Accounts
With a shell account, the user access the Internet for a fixed number of hours and is required to
pay monthly or an annual tariff for the services rendered, depending in the service provider. A
shell account holder can only view text and not graphics. With this kind if a system, the
computer is not actually a part of the Internet, and hence the user does not have any IP address.
Requirements
To connect to the internet, the user needs a computer with communication software such as
Telix, Procom Plus, PCPlus or Speed Touch to access the service provider and browser software
such as internet explorer, Mozilla Firefox or Netscape navigator. Refer to practical manual for
more details.
70