Basics of Networking
Basics of Networking
Unit – I
8 hrs
Introduction to Networks: Overview of Networking, Network communication
standards Network Topologies: Overview of Network Topologies, Basic topologies,
LAN Components: LAN Cables and connectors, LAN devices.
Unit – II
8 hrs
LAN Protocols: Lower-layer Protocols, Middle-layer Protocols, Higher-layer
Protocols,
Unit – III
8 hrs
Network Addressing - Introduction, TCP/IP Addressing scheme, IPX/SPX addressing,
NETBEUI addressing
Unit – IV
8 hrs
Introduction to WAN: Overview, WAN connectivity options, virtual private networks
Unit – V
8 hrs
WAN hardware and protocols: WAN devices, WAN Protocols
Reference Books
1 NIIT, Basics of Networking, PHI Learning Private ltd, 2010
Behrouz A. Forouzan, Data Communications and Networking, 4th Edition, Tata
2
Mcgraw Hill
Andrew S Tanenbaum, Computer Networks, 4th edition, Dorling Kindersley Pvt
3
Ltd
James Chellis, et al., MCSE: Networking Essentials Study Guide, 3 rd edition,
4
BPB
BASICS OF NETWORKING
Paper: 19BCASD23
TEACHING PLAN
UNIT- 1 8Hours
UNIT-2 8Hours
Session 09: Lower-layer Protocols, ARC net
Session 10: Ethernet
Session 11: Ethernet Communication
Session 12: Token Ring FDDI
Session 13: Middle-layer Protocols TCP/IP
Session 14: IPX/SPX, NETBEUI
Session 15: Higher-layer Protocols HTTP, FTP
Session 16: SMTP
UNIT-3 8Hours
Session 17: Introduction to TCP/IP
Session 18: IP Address Classes
Session 19: IP Sub netting
Session 20: Communication across Subnets
Session 21: Sub netting Consideration
Session 22: VLSM
Session 23: Ipv6
Session 24: IPX/SPX Addressing, NETBEUI Addressing
UNIT-4 8Hours
Session 25: Introduction to WAN, WAN connectivity options
Session 26: POTS,
Session 27: Leased Lines
Session 28: ISDN
Session 29: VSAT
Session 30: Microwave, Radio, Infrared Session 31 VPN
Session 32: VPN Protocols
UNIT-5 8Hours
Session 33: Wan Devices
Text Book:
NIIT, Basics of Networking, PHI Learning Private ltd, 2010
Reference Books:
1. Behrouz A. Forouzan, Data Communications and Networking, 4th Edition, Tata Mcgraw
Hill
2. Andrew S Tanenbaum, Computer Networks, 4th edition, Dorling Kindersley Pvt Ltd
3. James Chellis, et al., MCSE: Networking Essentials Study Guide, 3rd edition, BPB
UNIT-I
CHAPTER-1
INTRODUCTION TO NETWORKS
OVERVIEW OF NETWORKING
Human communication is a process that involves people communicating with each other.
This process involves four components: the sender of the information, the receiver of the
information, the language, and the medium through which communication is established.
Networking is a concept of connecting multiple computers so that resources, such as printers,
hard disks, and files can be shared. A typical network is depicted in Figure 1.1.
The users of these networked computers can share data and other information.
Organizations may use networks for many reasons besides the speed and reliability of data
transfer. The most obvious reason is that a network provides an improved communication link
between users, ensuring that information is available to users at the right time and the
right place. Following are some areas where networking plays a major role:
Cables: Cables are commonly used as a medium for transmitting data across networks.
The most commonly used cables are coaxial, twisted-pair, and optical fiber cables.
Network Interfacing Card (NIC): NIC is a hardware device that acts as an interface
through which a computer connects to a network. NIC is usually an expansion card on the
computer the computer with a port to plug a network cable. NIC converts the data into
electrical/optical signals and transfers them through cable from one computer to another
computer on the network. On receiving the data the NIC on the destination computer
converts the electrical signals back to data.
Repeaters: The signal transmitted can be attenuated due to some problem in the
transmission media or the distance between the two locations. Attenuation of signal
means the gradual deterioration of signal strength across long distances. A repeater is an
electronic device that receives a signal and retransmits it at a higher level or higher
power, or onto the other side of an obstruction, so that the signal can cover longer
distances. Repeaters are required in networks where the computers are apart from each
other that the signal from the source computer attenuates and does not reach the
destination computer.
Hubs: A hub is a repeater with multiple ports. Hubs can be used to connect multiple
segments of the same network and transfer data from one segment to another. In a
network a hub acts like a central point for various devices such as computers, printers and
routers. However hubs can considerably increase network traffic because they broadcast
data to devices connected on all the ports.
Switches: In a network a switch acts as a central point for various devices such as
computers, printers and routers. When the data frame is sent using a switch the data frame
carries the address of the destination with it. The data frame contains the MAC address of
the destination computer. Switches can read this MAC address and as a result data is
forwarded only to the intended computer rather than being forwarded to each computer
on the network. As a result switch reduces network traffic and therefore enhances the
network performances.
Routers: A router is a device that uses the network addresses for filtering and forwarding
information to different networks. A network address is the address of the computer on a
network. Routers store the network address of computers in different networks in a table
called routing table. In addition to the network addresses, the routing table also contains
information on the path that should be used to transmit data and any rules that have been
defined for filtering network traffic.
Bridges: A bridge is a device that filters and forwards traffic between two or more
networks.
At the physical layer, communication is direct: In below Figure device A sends a stream
of bits to device B (through intermediate nodes). At the higher layers, however, communication
must move down through the layers on device A, over to device B, and then back up through the
layers. Each layer in the sending device adds its own information to the message it receives from
the layer just above it and passes the whole package to the layer just below it. At layer I the
entire package is converted to a form that can be transmitted to the receiving device. At the
receiving machine, the message is unwrapped layer by layer, with each process receiving and
removing the data meant for it.
Network Layer
The network layer is responsible for the source-to-destination delivery of a packet,
possibly across multiple networks (links). Whereas the data link layer oversees the delivery of
the packet between two systems on the same network (links), the network layer ensures that each
packet gets from its point of origin to its final destination. If two systems are connected to the
same link, there is usually no need for a network layer. However, if the two systems are attached
to different networks (links) with connecting devices between the networks (links), there is often
a need for the network layer to accomplish source-to-destination delivery. Below Figure shows
the relationship of the network layer to the data link and transport layers.
Transport Layer
The transport layer is responsible for process-to-process delivery of the entire message. A
process is an application program running on a host. Whereas the network layer oversees source-
to-destination delivery of individual packets, it does not recognize any relationship between
those packets. It treats each one independently, as though each piece belonged to a separate
message, whether or not it does. The transport layer, on the other hand, ensures that the whole
message arrives intact and in order, overseeing both error control and flow control at the source-
to-destination level.
Session Layer
The services provided by the first three layers (physical, data link, and network) are not
sufficient for some processes. The session layer is the network dialog controller. It establishes,
maintains, and synchronizes the interaction among communicating systems.
Presentation Layer
The presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems.
Application Layer
The application layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access and
transfer, shared database management, and other types of distributed information services.
TCP/IP PROTOCOL
The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in
the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP
protocol suite was defined as having four layers: host-to-network, internet, transport, and
application. However, when TCP/IP is compared to OSI, we can say that the host-to-network
layer is equivalent to the combination of the physical and data link layers. The internet layer is
equivalent to the network layer, and the application layer is roughly doing the job of the session,
presentation, and application layers with the transport layer in TCP/IP taking care of part of the
duties of the session layer.
Application Layer
The application layer is the topmost layer in the TCP/IP reference model. This layer
provides services that help the user application to communicate with the network. All the high-
level protocols, which ·help to deliver data over the network, reside within this layer. The
protocols that are available with the application layer are as follows:
• FTP: Used to transfer files from one computer to another on a network.
• Telnet: Used to access and operate a remote computer on a network.
• SMTP: Used to transfer e-mails between mail servers on a network. The e-mail messages
can be retrieved by the e-mail client by using Post Office Protocol (POP) or Internet Mail
Access Protocol (IMAP) services.
• HTTP: Used to exchange text, audio, video, and image files over the World Wide Web
(WWW).
Transport Layer
The transport layer is responsible for reliable transfer of data from the source computer to
the destination computer. The transport layer interacts with the layers above and below the
transport layer using two core protocols, TCP and UDP. TCP is a connection-oriented protocol
that confirms the delivery of packets over the network. TCP transmits the data from the source
computer to the destination computer as a stream of characters. The destination computer
rearranges the data when it receives the data. UDP is a connectionless protocol and does not
confirm the delivery of packets over the network.
Internet Layer
The Internet layer is below the transport layer. This layer manages the connections across
networks to ensure that the transfer of data between the source and destination computers is
successful. The Internet layer accepts the data from the transport layer and passes it to the
network layer. This layer is also responsible for locating the shortest route for sending the data if
multiple routes are available. A route is a path taken by the packet to reach the destination
computer.
Chapter-2
Basics of Networking Page 21
Srinivas University BCA IInd Semester
NETWORK TOPOLOGIES
BUS TOPOLOGIES
The bus topology is economical because it uses a single coaxial cable, instead of several
cable for connecting all the computers. The bus topology uses a single length of cable and does
not use a concentrator (hub or switch); therefore, the cost is further reduced. The tradeoffs is low
speeds and any failure in the cable at any point can halt the entire network. Troubleshooting of
the network is also very troublesome since the point of failure cannot be directly pointed out.
In the bus topology, the data signals are available to all the computers along the bus.
This data signal carries the address of the destination computer. Each computer on the
network checks the destination address as the data signal that passes along the bus. The
computer in the network, whose address matches the destination address of the data
signal, makes a copy of the signal and converts it into data. The original signal still transmits
along the bus. If the signal is not absorbed or destroyed, it is reflected back onto the network.
This reflected signal interferes with the next data signal, and therefore the reflected signal
must be prevented from travelling back along the cable. To absorb such signals, a
device called terminator is attached at the ends of the bus network. Ethernet is the most
commonly used protocol in networks with bus topology. Ethernet uses Carrier Sense
Multiple Access with Collision Detection (CSMNCD) to provide media access.
RING TOPOLOGY
A ring network is a local area network (LAN) in which the nodes (workstations or other
devices) are connected in a closed loop configuration. Adjacent pairs of nodes are directly
connected. Other pairs of nodes are indirectly connected, the data passing through one or more
intermediate nodes. The ring topology may prove optimum when system requirements are
modest and workstations are at scattered points. If the workstations are reasonably close to the
vertices of a convex polygon (such as the pentagon shown in the illustration), the cost can be
lower than that of any other topology when cable routes are chosen to minimize the total length
of cable needed.
A break in the cable of a ring network may result in degraded data speed between pairs of
workstations for which the data path is increased as a result of the break. If two breaks occur and
they are not both in the same section of cable, some workstations will be cut off from some of
the others. When system reliability is a critical concern, a bus network or star network may prove
superior to a ring network. If redundancy is required, the mesh network topology may be
preferable.
The main advantage of the ring topology is that all the computers on the network
have equal access to the token. Each computer on ring network gets an opportunity to
transmit data signals because only the computer that has the token can transmit data, unlike
the Ethernet implementation where any computer can transmit data if the network is not being
utilized. The main disadvantage of the ring topology is that adding or moving devices affects
the entire network.
STAR TOPOLOGY
In the star topology, all the network devices are connected to each other through a
central concentrator forming a star-like structure. The common devices used as the central
concentrators are hubs or switches. The computers can be connected to the hub or switch using
UTP, STP, or optical fiber cables. The cost incurred to set up a star network is high compared
to a bus network since each device on the network will utilize an individual length of cable
from the concentrator to its location. Due to this layout, failure of a single device (except
the concentrator) does not halt the entire network, and troubleshooting is very easy. On the
downside, failure of the concentrator can halt the entire segment connected to it. The
concentrator at each location itself adds to the cost.
MESH TOPOLOGY
A mesh topology is a point-to-point connection where nodes are interconnected. In the
mesh topology, separate cables are used to connect individual devices on the network. This
topology is expensive because of the number of cables used in the network. The mesh
topology is of two types, full-mesh and partial-mesh.
Full-Mesh
In this topology, each device is interconnected with all the devices on the network, by a
dedicated cable. If one device fails, the data travelling along the network can be routed
through another device attached to the active device. The structure of the network is
complex because the devices in the network are interconnected.
Partial-Mesh
In this topology, each device on the network is not connected to other devices. Only
a few devices on the network are connected using the full-mesh topology, and the others
are connected to one or more devices on the network.
HYBRID TOPOLOGY
This topology is a combination of bus, star, and ring networks. In other words, this
topology combines multiple topologies to form a large topology. The hybrid topology is widely
implemented in Wide Area Networks (WANs).
Advantages:
Reliable: It has far better fault tolerance. The section where fault is found could possibly
be singled out from the rest of network and required restorative steps could be taken,
without impacting the working of rest of the network.
Effective: The most important advantage of this topology is that the weakness of the
different topologies connected are disregarded and only the strengths are taken into
consideration. For instance, ring topology has good data reliability and star topology has
high tolerance capability, so these two function quite well in hybrid star-ring topology.
Flexible: One of the key advantages of this topology is its flexibility. The topology is
created, so that it can be implemented for a variety of distinct network environment.
Hybrid Network can be created in line with the demands of the corporation and by
maximizing the available resources.
Scalable: Hybrid networks are built in a fashion which enables for easy integration of
new hardware components like additional concentration points. It’s quite simple to
extend the size of network with the addition of new elements, without disturbing existing
architecture.
Disadvantages:
Complexity: Due to the fact that different topologies connect in a hybrid topology,
managing the topology gets challenging. It’s not easy to design this type of architecture
Basics of Networking Page 27
Srinivas University BCA IInd Semester
and it’s a difficult job for designers. Configuration and installation process needs to be
very efficient.
Expensive: The network hubs needed for hybrid topology networking are costly to
purchase and maintain. The cost of this topology is higher in comparison to the other
topologies. The hubs used to connect two distinct networks are expensive. These hubs
are not the same as usual hubs since they have to be smart enough to work with different
architectures and should be able to operate even when a portion of network is down. As
hybrid architectures are usually larger in scale, they may require a lot of cables,
advanced network devices, etc.
CHAPTER-3
LAN COMPONENTS
The hardware components of a LAN are devices operating at the physical layer or the
data link layer and are responsible for transmission of electric signals from one device to
another. To transmit electric signals, the following devices are commonly used in LANs:
Cables
Repeaters
Hubs
Switches
Network Interface Cards
CABLES
Bandwidth:
Bandwidth describes the maximum data transfer rate of a network or Internet connection.
It measures how much data can be sent over a specific connection in a given amount of time. For
example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps (125 megabytes per
second). An Internet connection via cable modem may provide 25 Mbps of bandwidth. While
bandwidth is used to describe network speeds, it does not measure how fast bits of data move
from one location to another. Since data packets travel over electronic or fiber optic cables, the
speed of each bit transferred is negligible. Instead, bandwidth measures how much data can flow
through a specific connection at one time.
When visualizing bandwidth, it may help to think of a network connection as a tube and
each bit of data as a grain of sand. If you pour a large amount of sand into a skinny tube, it will
take a long time for the sand to flow through it. If you pour the same amount of sand through a
wide tube, the sand will finish flowing through the tube much faster. Similarly, a download will
finish much faster when you have a high-bandwidth connection rather than a low-bandwidth
connection.
Distance:
The bandwidth offered by a connectivity medium is limited by the distance over which
the medium needs to transmit the signal. When the distance between the devices is greater, the
bandwidth decreases because the signal needs to travel over a greater distance. A part of the
signal strength is utilized to overcome the resistance offered by the cable. Therefore, the signal
strength decreases as the length of the cable increases. Also, an increase in the distance increases
the chance of external disturbances such as Electromagnetic Interference (EMI), Radio
Frequency Interference (RFI), or physical stress. These external disturbances cause the signal to
deteriorate, and, therefore, the amount of data transferred decreases. The gradual deterioration of
signal strength across long distances is called attenuation, and the degradation of a signal due to
internal or external disturbances is called distortion.
Attenuation:
Signal attenuation is one of the most difficult problems faced by network administrators
when connecting computers and devices in a network. When a signal is transmitted across a
cable, the cable offers resistance to this transmission. This resistance consumes a part of the
signal strength, and as a result, the signal strength decreases. If the length of the cable is too
great, almost all of the signal strength is used to overcome the resistance. As a result, the
destination computer or device does not receive any data.
• Short cable lengths: The amount of resistance offered by the cable is less, and, therefore,
attenuation is reduced.
• Amplifiers: In practice, it may not be possible to use short cable lengths in a LAN. In
such cases, devices such as repeaters, active hubs, and switches are used to amplify the
attenuated signal so that the destination computer or device can receive the signal.
Distortion:
Unlike attenuation, which decreases the signal strength, distortion modifies the signal
itself. When a signal is modified, the data transmitted by the signal becomes corrupt. As a result,
the destination computer or device may not be able to interpret the signal and obtain the correct
data. Distortion usually occurs when signals from an external source such as a television
interferes with the signals being transmitted through the cable. For example, if the cable passes
through an area containing electronic devices such as televisions or air conditioners, the
electronic transmissions and fluctuations induced by the televisions or air conditioners may
interfere with the signal being transmitted through the cable. The modified signal does not
represent the actual data being transmitted and, therefore, cannot be interpreted by the
destination computer or device.
Basics of Networking Page 30
Srinivas University BCA IInd Semester
The common cable types used to connect computers and devices in a LAN are:
Coaxial cables
Twisted-pair cables
• Optical fiber cables
COAXIAL CABLES
A coaxial cable consists of two concentric conductors separated by insulation. The inner
conductor transmits electric signals, and the outer conductor acts as a ground. The entire
assembly is wrapped in a sheath of Teflon or PVC. The cross-section of a typical coaxial cable
is depicted in Figure. The conductor used in coaxial cables is copper wire. It is used for both the
inner and outer conductors. Because the signal is transmitted over the surface of the inner copper
wire, increasing the cross-section of the inner copper wire (and therefore, the entire coaxial
cable) increases the amount of signal that can be transmitted by the cable. Therefore, a thicker
coaxial cable can transmit more data than a thinner one.
TWISTED-PAIR CABLE
The pair of twisted is the simplest transmission medium. it consists of one or more pairs of
electrical son arranged spiral. This type of support is suitable for transmission both analog and
digital. Twisted pair is the ordinary copper wire that connects home and many business
computers to the telephone company. To reduce crosstalk or electromagnetic induction between
pairs of wires, two insulated copper wires are twisted around each other. Each connection on
twisted pair requires both wires. Since some telephone sets or desktop locations require multiple
connections, twisted pair is sometimes installed in two or more pairs, all within a single cable.
For some business locations, twisted pair is enclosed in a shield that functions as a ground. This
is known as shielded twisted pair (STP). Ordinary wire to the home is unshielded twisted pair
(UTP).
STP is more expensive than UTP and is generally used in networks where cables
pass closer to devices that cause high EMI . In addition, the presence of shielding
increases the resistance to the signal and, therefore, restricts the cable length and the
throughput offered by STP
UTP cables are capable of supporting different bandwidths and transmission speeds. Depending
on the bandwidth offered, the following categories of UTP cables are defined:
Category 1 (Cat-I): Cat-l supports analog voice data and is commonly used for telephone
communication. Cat-l is also used in Integrated Services Digital Network (ISDN), a
type of WAN connectivity option.
Category 2 (Cat-2): Cat-2 supports digital voice communication up to a speed of 4 Mbps.
Cat-2 cables are commonly used in IBM Token Ring networks.
Category 3 (Cat-3): The maximum data transfer rate supported by the Cat-3 is 16 Mbps.
However, Cat-3 is generally used to transmit data at 10 Mbps. Cat-3 is also represented
as base T.
Category 4(Cat-4): Cat-4 supports a maximum data transfer rate of 20 Mbps, which is
only slightly higher than that offered by Cat-3. Therefore, Cat-4 is rarely used.
Category-5 (Cat-5): Cat-5 is used for networks that require data transfer rates higher
than that supported by Cat-3. Cat 5 supports data transfer rates up to 100 Mbps and is
used with Fast Ethernet.
In addition to these category specifications, Cat-6 and Cat-7, which support higher
bandwidth and data transfer rates, have also been developed. Like Cat-5E, Cat-6 also
supports data transfer rates of up to 1,000 Mbps. However, Cat 6 works at a different frequency
range than Cat-5E. In a network, a cable may sometimes pickup a signal intended for another
cable. This is called crosstalk. Cat-6 is more resistant to crosstalk than Cat-5E.
Unlike coaxial cables and twisted-pair cables, which transmit data in the form of electric
signals, optical fiber cables transmit data in the form of light. Therefore, the data to be
transmitted is converted into light by a codec (coder and decoder) present at each end of
the fiber. The codec converts the data from the computer into light, and the light is then
transmitted across the cable with the help of either a Light Emitting Diode (LED) or an
Injection Laser Diode (ILD). At the destination computer, a decode receives the light beam
and converts it into data. If an LED is used to transmit light, the transmission is called
multimode transmission, whereas and ILD is used or single-mode transmission. These
transmissions are detailed in the following sub-topics.
Multi-Mode Transmission
A mode is defined as the' angle at which a ray of light enters the core of the optical
fiber cable. If the light enters the core at different angles, it is called multi-mode transmission.
Multi-mode transmission occurs when an LED is used as the light source. An LED is not a
concentrated light source, and, therefore, the rays of the light beam disperse after traveling a
certain distance through the fiber. However, not all the rays of the light beam disperse. The rays
in the center of the beam do not disperse whereas the rays on the circumference of the light beam
disperse and hit the cladding. This effect is similar to the dispersion of light from a flashlight or
the headlights of an automobile.
The dispersed light rays hit the cladding of the cable and are reflected back into the core.
The dispersion and reflection occurs at different angles, or modes, resulting in multi-mode
transmission. This dispersion and reflection of light rays does not affect their strength. However,
the rays on the circumference of the light beam travel a greater distance than the rays in the
center of the beam. Therefore, for a given signal, the dispersed light beams arrive later than the
un-dispersed ones, a delay which can result in slower transmission rates. Another disadvantage
of multi-mode transmission is the collision of light beams due to dispersion and reflection. These
collisions weaken the signal strength, resulting in attenuation.
Multi-mode transmission is inexpensive because the cost of LED is less than that of an
ILD. Multi-mode transmission is preferred in LANs and in networks that connect computers in a
large college or school campus, which may be spread across a few miles. The drawbacks of
multimode transmission such as delay and attenuation occur only when the distance between the
devices is more than a few miJ.es. Therefore, multi-mode transmission is not suited for WANs.
SINGLE-MODE TRANSMISSION
In single-mode transmission, an ILD is used to emit a light beam (laser) that carries data.
ILD is an extremely concentrated light source, and, therefore, the laser beams do not disperse
when traveling through the fiber. As a result, all the light beams reach the destination at the same
time. In addition, the beams do not collide, thereby preventing any attenuation of the light
signals. However, the equipment required for single-mode transmission, such as the grade of
fiber used and the ILD, are expensive. Therefore, single-mode transmission is used to connect
computers that are part of a LAN backbone or in large WANs spanning across a country or a
continent.
LAN DEVICES
A concentrator is a device with two or more ports through which computers and devices
can be connected. The following are the two main functions of a concentrator:
• To boost the signal to restore its original strength.
• To provide an interface to connect multiple computers and Devices in a network.
Imagine, for example, an office spread across three floors in a building. The length of the
cable required to connect computers on different floors may be more than the maximum
supported length. In such cases, the signal needs to be amplified. The simplest
concentrator that can be used to boost signals over long distances is a repeater.
REPEATERS
Repeaters amplify a weak signal so that the signal stays as strong as the original one. For
example, imagine a network in which two computers about 300 m apart are connected with a
UTP cable. If one computer sends a signal to the other, the signal starts attenuating, and after a
distance of 185 m, the signal strength falls to such an extent that the second computer may not
receive any signal at all. In such cases, you can use a repeater every 185 m between the
computers to boost the signal.
In addition, repeaters can also be used to connect two segments of the same network.
Segments refer to logical sections of the same network, whereas different networks means that
the networks are located in geographically different areas. For example, suppose an
organization has offices on the first and fifth floors of a building, and the computers on both
the floors are connected in the same network. In this case, the computers on the first floor
form a segment, and the computers on the fifth floor form another segment. A repeater
can be used on one of the intermediate floors to connect the segments.
HUBS
A hub is like a repeater but with multiple ports. Hubs operate at the physical layer of the
OSI reference model. Hubs can be used to connect multiple segments of the same network
and transfer data from one segment to another .Also, hubs are used to connect computers
to a server in networks that use the star topology. Therefore, it is important to determine the
type of cables in the network before you purchase a hub. you also need to determine the
number of network segments (or the number of computers to be connected so that you can
purchase a hub with the required number of ports. The type of cables used (and, therefore,
the type of ports on the hub) and the number of ports usually determine the cost of a hub.
Hubs are inexpensive devices. However, hubs can considerably increase network
traffic because they broadcast data to the devices connected on all the ports.
In Figure if Node A (in Segment1) sends data to Node D (in Segment 2), the data
reaches Port 1 of the hub. The hub then transmits the signal to all the ports, therefore, to all
computers in Segment 2. Node D in Segment 2 picks up the signal, which is then converted into
data. In the preceding example, you can see that although the signal was addressed to only one
computer in a particular segment, it is transmitted to all the computers in the segment. If there
are multiple segments connected, the signal is transmitted to all the segments, resulting in
increased network traffic. In Ethernet LANs, unnecessary network traffic increases the chances
of collisions, and degrades network performance.
SWITCHES
Like hubs, switches also connect computers in a network or different segments of
the same network. However, unlike hubs, which work at the physical layer, switches work at
the data link layer of the OSI reference model. Therefore, switches treat data in the form of
frames and not as signals, which is the case with physical layer devices like hubs. A data
frame contains information about the MAC address of the destination computer (Refer to
Topic, Network Interface Cards, for information on MAC address.) Switches can read this
MAC address and, as a result, forward the data only to the port that is associated with this
MAC address. For this purpose, switches maintain a list of MAC addresses and the port
number associated with each MAC address.
Figure shows a network in which four computers are connected using a switch. Assume
that Node A sends data to Node C. The data from Node A reaches the switch from Port 1 in
the form of a data frame. The switch then reads the destination MAC address, and from
the list of MAC addresses, the switch knows that the data is meant for Node C. As
Node C is associated with Port 3, the switch forwards the data only to Port 3. The data is
converted back into a signal and transmitted to Node C.
Depending on the requirements of the network, you can select an appropriate method of
switching. For example, if the speed of the network is the primary concern, you can select cut-
through switching. Most switches, however, have the ability to select an appropriate switching
method depending on the network conditions. Initially, the switch uses cut-through switching,
but if it finds that the number of corrupt data frames is high, it automatically selects store
and- forward switching. After some time, if the switch observes that the number of corrupt data
frames is lower, the switch reverts back to cut-through switching. This is called as auto
switching.
cable. NIC converts the data into electrical optical signals and transfers them through cables
from one computer to another on the network. On receiving the data, the NIC on the destination
computer converts the electrical signals back to data. An NIC is a hardware device that acts as an
interface through which a computer connects to a network. NICs work at both the data link and
the physical layers of the OSI reference model. At the data link layer, the NIC converts the
data packets into data frames and adds the MAC address to the data frame; at the physical
layer, it is responsible for convert in the data into signals, and transmitting them across the
communication medium. The MAC address is a unique hardware number present on the NIC and
is specified by the NIC manufacturer. MAC addresses are globally unique.
When a computer needs to send data, the NIC receives data packets from the
computer, converts them into data frames, and passes them across the cable as signals.
This role of the NIC in most PC environments can be divided into the following tasks:
• Host-to-card communication: The NIC communicates with the computer using IRQ
(Interrupt Request) and receives data present in the memory of the computer for
transmission.
• Buffering: The data received from the computer is not immediately transmitted. Instead,
all the data is buffered, or stored temporarily, on the NIC before transmission.
Buffering ensures that the NIC has the complete data packet before converting it into
frames, thus preventing incomplete data transmissions.
• Frame creation: Once the NIC has all the data that needs to be transmitted, it divides the
data into frames. A frame has three parts: header, data, and trailer. The header
contains the source and destination MAC addresses; the data part contains the
actual data being transmitted across the network; and the trailer contains error
checking information such as Cyclic Redundancy Check (CRC).
• Parallel-to-serial conversion: The NIC receives data from the computer in parallel
form. For example, a PCI card receives 32 or 64 bits simultaneously. The number of
bits depends on the motherboard bus architecture. However, the data must be
converted into serial form because LANs generally transmit data bit after bit, and
not multiple bits at a time.
• Encoding: The serial bits are converted into electrical signals for transmission across
the cable.
In addition, the NIC also needs to have an appropriate connector to access the cable. For
example, coaxial cables use BNC and DT -connectors, whereas UTP cables use RJ -45
connectors. Most NICs provide only one type of connector. However, NICs with multiple
connectors, such as one T-connector and one RJ-45 connector, are also available. NICs
are also responsible for determining the speed of the data transfer. NICs may support different
data transfer speeds, for example, 10 Mbps or 100 Mbps. Therefore, when you select an NIC,
the cables used in a network, the speed of the network, and the layer 2 protocol used in the
network must be considered.
QUESTION BANK
Basics of Networking Page 43
Srinivas University BCA IInd Semester
7. Can you Name the device used to filter and forward traffic between 2 or more
networks.
a. Switches
b. Hub
c. Bridge
d. Gateways
9. What is protocol?
a. Set of rules
b. Set of computers
c. Set of hardware’s
d. Set of software’s
11. How many layers does the OSI Reference Model have?
a. 6
b. 7
c. 5
d. 4
13. Which category of UTP cable is used to support digital voice communication upto
speed of 4 Mbps?.
a. Cat-1
b. Cat-2
c. Cat-3
d. Cat-4
15. Can you name the device used to translate communication protocols and enables 2
similar/ dissimilar LAN's.
a. Routers
b. Gateways
c. Bridges
d. Hubs
17. Can you name the protocol(s) that are available with application layer.
a. FTP
b. Telnet
c. SMPT
d. All the above
20. Coaxial cable can travel up to how many meters without amplification?
Basics of Networking Page 46
Srinivas University BCA IInd Semester
a. 500
b. 600
c. 700
d. 300
5. Can you Explain Bus topology with its advantages and disadvantages.
6. Can you Explain Star topology with its advantages and disadvantages
7. Can you Explain Ring topology with its advantages and disadvantages.
UNIT 2
In addition, some network protocols define the manner in which users access network data.
For example, if a user visits a Web site on the Internet, data is transmitted between the Web site
and the user's computer. Network protocols such as HTTP (Hyper Text Transfer Protocol) define
the manner in which the data is presented to the user.
As network protocols need to perform multiple tasks, it is practically impossible to develop a
single protocol that can manage all these tasks. Therefore, different protocols have been
developed to operate at various layers of the OSI reference model. For example, protocols at the
transport layer ensure reliable transmission of data on the network, whereas the network layer
protocols are responsible for addressing data to computers on a network. Protocols at the
application, session, and presentation layers determine the kind of data that is accessible to users
and the manner of accessing the data. Based on the layers at which the protocols operate,
network protocols are broadly classified as follows:
Lower-layer protocols
Middle-layer protocols
Higher-layer protocols
LOWER-LAYER PROTOCOLS
Lower-layer protocols operate at the physical and the data-link layers of the OSI reference
model and perform the following functions:
• Transmitting data between two devices on a network on a point-to-point basis.
• Ensuring that the data transmission between the devices on a network is error free.
When a device sends data to another device on a network, the data is converted into data
packets at the network layer and then passed on to the data-link layer. The protocol operating at
the data link layer converts these packets into frames and then reads the destination address on
the data packets. The protocol then adds the MAC address of the destination device to the data
frames and passes the frames to the physical layer. At the physical layer, the frames are
converted into signals and transmitted across the network. On reaching the destination, signals
are converted back into data frames. If the data frames are received correctly, an
acknowledgement frame may be sent to the source. If the acknowledgement frame is not
received, the source resends the data frames for a fixed number of retries, after which the
connection is timed out.
Lower-layer protocols also provide media access to the devices when they need to send data.
The media used on a network can be physical media, such as cables or wireless media, such as
infrared and radio waves. For a device to transmit data, it needs to access the transmission
medium on the network. However, there may be multiple devices that need to send data, and all
these devices may access the cable simultaneously. Media access on a network needs to be
regulated because multiple devices may transmit signals simultaneously over the cable, resulting
in a collision of signals. This collision results in corruption of signals and loss of data.
• Ethernet
• Token Ring
1. ARC net
ARC net or Attached Resource Computer Network is one of the oldest lower-layer protocols
used in LANs. ARC net was developed in the late 1970s by an organization called Data point.
Initially, ARC net used to support data transmission rates from 156 Kbps to 2.5 Mbps. Later,
however, ARC net supported speeds of up to 10 Mbps. ARC net uses the token-passing scheme
to provide media access to the devices on the network.
The frame format used by ARC net to transmit data can be broadly divided into the following
three parts:
• Header: Contains information about the source and destination nodes.
• Data: Contains information about the size of data and the actual data.
In Figure you can observe that the header consists of three components: SOH (Start of
Header), SID (Source ID), and DID (Destination ID). To a destination device, the SOH indicates
the beginning of the header. The SID contains the address of the source device, whereas the DID
contains the address of the destination device.
Data part consists of two components, Count and Data. The Count component contains
information about the size of data while the Data component contains the actual information to
be transmitted. For example, a value of 56 in the Count Field indicates that the frame contains 56
bytes of data. The destination devices use the information in the Count Field to check whether
the entire data is received.
The following are the main features of ARC net:
• ARC net supports coaxial and twisted-pair cables as well as optical-fiber cables.
• ARC net supports the star, bus, and ring topologies. Depending on the requirement of the
network, an appropriate topology can be selected, thereby optimizing cable lengths.
• ARC net uses the token passing system, which prevents collisions on the network. As a
result, there is no data loss due to collisions.
• It is extremely reliable.
• ARC Net is easy to install and troubleshoot.
• It has an excellent track record of interoperability for those using ARCNet components
from various manufacturers.
• ARC Net supports a variety of cable types including coaxial, UTP and Fiber Optics.
• It is inexpensive and built to stay that way.
ETHERNET
Ethernet is the most popular lower-layer protocol used in LANs. Ethernet was first
developed in 1972 at the Xerox Palo Alto Research Center (PARC). This version of Ethernet
supported a data transfer speed of 2.94 Mbps. There have been several enhancements to the
original version of Ethernet, and the current versions support network transmission speeds
ranging from 10 Mbps to 1,000 Mbps. Ethernet uses a technique called the Carrier Sense
Multiple Access/Collision Detection (CSMA/CD), also known as IEEE 802.3, to provide media
access to devices on the network.
A carrier is a signal containing some specific data. CSMA/CD works in the following manner:
The device that needs to send data checks the cable for any signals. This is called the
Carrier Sense.
If no carrier is found, the device accesses the medium and transmits data signals, but it is
possible that multiple devices start transmitting signals simultaneously. This is called
Multiple Access.
When multiple devices transmit signals simultaneously, a collision occurs. The device
nearest to the point of collision detects the collision and informs all the devices about the
collision, which is called Collision Detection. The devices then wait for a random period
of time before retransmitting the data.
the devices on the network about the collision. As a result, Nodes A and C wait for a random
period of time, before retransmitting the data.
From the above example, it is clear that a device in an Ethernet LAN cannot send and
receive data simultaneously. For example, when Node A transmits data, the cable carries the
signal and therefore, the other devices cannot transmit simultaneously. This type of
communication is called half-duplex communication, which means that a device on a network
can either send data or receive data, but cannot send and receive different data simultaneously.
Half-duplex communication can be extremely slow if the network contains a large
number of nodes. For example, imagine an Ethernet LAN with 150 computers. Each computer
needs to send as well as receive data from other computers or devices on the network. As there
are 150 computers on the network, the probability of the cable carrying a signal at a given point
of time is high. Therefore, the nodes need to wait for an additional time period before they can
access the cable. In addition, the increase in the number of nodes also increases the probability of
collisions. To overcome these limitations of half-duplex communication, full-duplex
communication was introduced.
In full-duplex communication, the nodes on the network can send and receive data
simultaneously. However, full-duplex communication does not use the CSMA/CD technology
for providing media access to devices. Instead, full-duplex communication is accomplished with
the help of a device that can transmit data based on the destination address. Usually, a switch is
used in full-duplex communication.
the network communicate with the switch in a similar manner, and therefore, collisions are
prevented in the entire network.
From Figure you can observe that the switch plays an important role in forwarding data
frames to their destination. All the computers on the network send data frames to the switch. The
switch checks the destination MAC addresses of these data frames and forwards them to the
corresponding ports. For example, the data for Node A is forwarded to Port 1 while the data for
Node B is forwarded to Port 2. In addition, full-duplex communication doubles the effective
throughput because sending and receiving of data takes place simultaneously. For example, a 10
Mbps UTP cable can produce an effective throughput of 20 Mbps.
ETHERNET COMMUNICATION
In Ethernet LANs, the source node sends data to all the nodes on the network and not
only to the destination node. This process is known as broadcasting. All the nodes check the
destination MAC address on the data frame. The device with the corresponding MAC address
accepts the data while the other devices ignore it.
1. Fast Ethernet
The fast Ethernet is a type of Ethernet network that can transfer data at a rate of 100 Mbps
using a twisted-pair cable or a fiber-optic cable. The older 10 Mbps Ethernet is still used, but
such networks do not provide necessary bandwidth for some network-based video applications.
Fast Ethernet is based on the proven CSMA/CD Media Access Control (MAC) protocol, and
uses existing 10BaseT cabling. Data can move from 10 Mbps to 100 Mbps without any protocol
translation or changes to the application and networking software.
When compare to a 10 mb port, a 100 Mb port is theoretically 10 times faster than the
standard port. Therefore, with a 100 Mb port more information can stream to and from your
server. This will be of great help to you if you really need to explore very high speed, but not if
you are under DDOS attack because you will find yourself running out of traffic allocation very
fast.
If you are doing standard web hosting, the bigger 100 Mbps pipe will not offer true benefit to
you because you may not even use more than 1 mbps at any given time. If you are hosting games
or streaming media, then the bigger pipe of 100 Mbps would indeed be helpful to you. With a 10
mbps pipe, you can transfer up to 1.25 Mbps, while a 100 mbps pipe, would allow you to transfer
up to 12.5 Mbps. However, if you leave your server unattended and running at full steam, a 10
Mbps pipe can consume about 3,240 GB a month and a 100 Mbps pipe can consume up to
32,400 GB a month. It would be really disgusting when you receive your bill.
2. Gigabit Ethernet
The Gigabit Ethernet is a type of Ethernet network capable of transferring data at a rate of
1000 Mbps based on a twisted-pair or fiber optic cable, and it is very popular. The type of
twisted-pair cables that support Gigabit Ethernet is Cat 5e cable, where all the four pairs of
twisted wires of the cable are used to achieve high data transfer rates. The 10 Gigabit Ethernet is
a latest generation Ethernet capable of transferring data at a rate of 10 Gbps using twisted-pair or
fiber optic cable.
3. Switch Ethernet
Multiple network devices in a LAN require network equipments such as a network switch
or hub. When using a network switch, a regular network cable is used instead of a crossover
cable. The crossover cable consists of a transmission pair at one end and a receiving pair at the
other end. The main function of a network switch is to forward data from one device to another
device on the same network. Thus a network switch performs this task efficiently as the data is
transferred from one device to another without affecting other devices on the same network. The
network switch normally supports different data transfer rates. The most common data transfer
rates include 10 Mbps – 100 Mbps for fast Ethernet, and 1000 Mbps – 10 Gbps for the latest
Ethernet. Switch Ethernet uses star topology, which is organized around a switch. The switch in
a network uses a filtering and switching mechanism similar to the one used by the gateways, in
which these techniques have been in use for a long time.
In most LAN s, speed is the primary consideration, and therefore, the disadvantages of
Ethernet are not felt. As a result, Ethernet remains the most popular protocol for LAN s. For
LAN s that requires better performance in terms of data transfer, protocols such as Token Ring
and FDDI are preferred.
TOKEN RING
Token Ring was developed by IBM in the 1970s as an alternative to Ethernet and to
overcome the disadvantages of Ethernet. Initially, Token Ring offered speeds of 4 Mbps, which
was later updated to 16 Mbps. Like ARC net, Token Ring also uses the token-passing scheme to
provide media access to the network devices. However, Token Ring manages the token access to
Step 1: Node A needs to transmit data frames P, Q, R, and S to Node D. Node A receives
the empty token anti starts transmitting the frames one after the other.
Step 2: Frame P is read by Node D, which makes a copy of the frame. In the meantime,
Node A has already transmitted frames Q and R.
Step 3: Frame P reaches Node A before it can transmit frame S. Node A releases the
token, and frame R needs to wait till Node A receives the empty token again.
The Token Ring LAN represented in Figure above uses the ring topology. However, Token
Ring LANs can support the star topology too. In fact, most Token Ring LANs are implemented
using the star topology with the help of devices called Multistation Access Units (MAUs),
which are the Token Ring equivalent of Ethernet hubs.Below Figure represents a Token Ring
LAN in which computers are connected using MAUs
the device that is releasing the token to increase the value of the Priority field to equal
its priority value. Thus, intermediate devices with lower priority cannot use this
token.
Ending delimiter: Indicates the end of the token.
Detects frames and tokens that circulate on the network more than once. This usually
happens when the device that has to accept the frames or tokens fails.
In addition to an Active Monitor, Token Ring LANs also have a Standby Monitor. The Standby
Monitor constantly checks whether the Active Monitor is functioning correctly. If it detects that
the Active Monitor has failed, the Standby Monitor performs the functions of the Active
Monitor. The Active Monitor and Standby Monitor perform fault management in a Token Ring
LAN. Fault tolerance, however, is achieved with the help of a process called beaconing.
To understand the process of beaconing, consider the Token Ring LAN shown in Figure.
Stations connect to one (or both) rings using a media interface connector (MIC). Its two fiber
ports can be either male or female, depending on the implementation. There are two different
FDDI implementations, depending on whether stations are attached to one or both rings:
deployed for network backbones as dual-attached FDDI. Single-attached stations are used
primarily to connect Ethernet LANs or individual servers to FDDI backbones.
Dual-attached stations (DAS): Connect to both rings. The A port is the point at which
the primary ring enters and the secondary ring leaves; the B port is the reverse. M ports
provide attachment points for single-attached stations. Dual-attached FDDI uses both
rings, with the secondary ring serving as a backup for the primary. Dual-attached FDDI is
used primarily for network backbones that require fault tolerance. Single-attached
stations can be connected to dual-attached FDDI backbones using a dual-attached device
called a concentrator or multiplexer.
Dual-Attached Concentrator (DAC): Connects to both the rings. The primary purpose
of DAC is to connect SASs to the primary ring. DAC is the FDDI equivalent of an
Ethernet hub.
The disadvantage of FDDI is the cost incurred in setting up an FDDI LAN. FDDI uses
optical fiber cables and DACs, which are costlier than the UTP cables and hubs or MSAUs used
by Ethernet and Token Ring. Therefore, FDDI finds limited application in LANs and is mainly
used to connect computers on a LAN backbone, where both speed and reliability are required.
MIDDLE-LAYER PROTOCOLS
Middle-layer protocols are network protocols that operate at the network and transport layers
of the OSI reference model. Middle-layer protocols are responsible for ensuring reliable transfer
of data between two devices on a network. The transport layer protocols ensure reliable delivery
of data whereas the network layer protocols are responsible for correct addressing of the data.
The common middle-layer protocols used in LANs are:
Transmission Control Protocol/Internet Protocol (TCP/IP)
Internet Group Management Protocol (IGMP): Used when a single data packet
needs to be sent to computers located in different networks.
The transport layer is responsible for ensuring reliable delivery of data from a source device to a
destination device. TCP/IP consists of the following protocols at the transport layer:
TCP: A connection-oriented protocol responsible for sequencing and acknowledgement
of the data packets. Data is broken down into multiple packets and sent to the destination.
These packets may not be sent in the actual sequence. TCP ensures that the packets are
assembled in the correct sequence before passing them on to the higher layer. In addition,
TCP requires an acknowledgement from the destination device for data that has been
sent. This ensures reliability and integrity of data during transmission.
User Datagram Protocol (UDP): A connectionless protocol that is less reliable than
TCP. UDP is used when the data transferred is sufficiently small so that it can be
accommodated in a single packet, and therefore, sequencing is not required. UDP is also
used when protocols at other layers, such as the application layer, can ensure reliable
data delivery. For example, UDP is also used in real-time applications such as transfer of
video and audio where speed of data transfer is a priority rather than reliability and
integrity of the data.
The application layer protocols provide the user with an interface to access the services of the
other layers in the TCP/IP reference model. TCP/IP contains several application layer protocols,
and newer protocols are continually being developed. The most common application layer
protocols are:
Hyper Text Transfer Protocol (HTTP): Used to transfer data and files pertaining to
Web pages on the Internet.
Simple Mail Transfer Protocol (SMTP): Used to transfer mail and attachments.
Telnet: A terminal emulation protocol that allows users to log in to remote computers.
Figure: The IPX/SPX reference model with the OSI reference model
The Medium Access and Data Link layers of the IPX/SPX reference model are
equivalents of the physical and data link layers of the OSI/ISO reference model. The Internet
layer is the equivalent of the network and transport layers, whereas the application layer
encompasses the functionality of the application, presentation, and session layers of the OSI/ISO
Basics of Networking Page 67
Srinivas University BCA IInd Semester
reference model. IPX, operating at the Internet layer, is a connectionless protocol, and is
responsible for addressing the data packets. IPX is the Novell equivalent of IP, whereas SPX is
the Novell equivalent of TCP. SPX is responsible for ensuring delivery, fragmentation, and re-
assembly of the data packets. SPX is a connection-oriented protocol, and therefore, requires
acknowledgements for each data packet transferred across the network.
At the application layer, IPX/SPX defines the following protocols:
NetWare Core Protocol (NCP): Allows NetWare users to share devices, such as
printers on the network. NCP is also responsible for sending and receiving e-mail
between two NetWare computers.
Service Advertising Protocol (SAP): Used by computers and devices on the network to
update one another about the network status. This helps the network server detect any
device failures or line failures
NetBEUI is the best performance choice for communication within a single LAN.
Because, like NetBIOS, it does not support the routing of messages to other networks, its
interface must be adapted to other protocols such as Internetwork Packet Exchange or TCP/IP. A
recommended method is to install both NetBEUI and TCP/IP in each computer and set the server
up to use NetBEUI for communication within the LAN and TCP/IP for communication beyond
the LAN.
The main advantage of NETBEUI is its speed. In fact, NETBEUI was the fastest network
layer protocol, faster than TCP/IP or IPX/SPX, at the time of its introduction. The main
disadvantage of NETBEUI is that it cannot transmit data across different networks. In addition,
speeds offered by protocols, such as TCP/IP and IPX/SPX have improved considerably since the
time of their introduction. Therefore, NETBEUI is best suited for isolated LAN segments and
finds limited use in today's LANs.
HIGHER-LAYER PROTOCOLS
Higher-layer protocols operate at the session, presentation, and application layers of the OSI
reference model. The higher-layer protocols provide users with an interface to access network
data and resources. These protocols also determine the manner in which the data is presented to
the user. The common higher-layer protocols used are:
HTTP
FTP
SMTP
An FTP server, or an FTP Web site, is a computer on which FTP is installed and contains the
files to be copied or downloaded. An FTP client is computer that downloads files from the FTP
server. An FTP client can also upload files to an FTP server. When an FTP client requests access
to an FTP server, the server authenticates the client with the help of a username and password.
The FTP client connects to an FTP server with the help of FTP client software such as Cute FTP
or WS_FTP. The Microsoft Windows family of operating systems includes a default FTP client
software, available through the MS-DOS window, to connect to FTP servers.
To access an FTP server on a computer running Windows 9x/ME/2000IXP, perform the
following steps:
1. Click Start, Run.
2. Type command, and click OK. For Windows 20001XP, type cmd, and click OK.
3. Type ftp, and press Enter. The command prompt changes to ftp, indicating that the
default FTP client software is active.
4. Type open ftp.xyz.com, and press Enter. ftp.xyz.com is the FIP URL of the website
http://www.xyz.com.umber list item 3.
You are connected to the FIP server of the Web site. You will be asked to enter the username and
password. On authenticating the username and password, you can access the files and folders
present on the Web site and download files to your computer.
computers on a network. SMTP uses the concept of servers and mailboxes to deliver e-mail
messages. For example, consider the e-mail address [email protected]. In this e-mail address,
network is the mailbox name, and itt.com is the domain name or the mail server name. A domain
is defined as a set of network resources allocated for a particular group of users. The users need
to log in to the domain and access these resources. For example, a domain may be a network
with 10 computers, 2 printers, and a scanner where one of the computers may control
permissions to access the network resources.
The computer that controls the network access permissions is called a server. Configuring
SMTP involves creating different mailboxes in the SMTP server. A network server on which
SMTP is installed and configured is called an SMTP server. For example, there may be multiple
mailboxes under itt.com, such as network1, network2, or network3. These mailboxes are
represented as network1 @itt.com, [email protected], and [email protected], respectively.
When a user sends an e-mail, it reaches the SMTP server on the domain.
The SMTP server breaks the destination e-mail address into the mailbox name and the
domain name, and delivers these messages to the SMTP server on the destination domain and
stores them separately depending on the mailbox name. Therefore, on the SMTP server, e-mails
received by network1, network2, and network 3 are stored separately. However, SMTP can send
the e-mails only as far as the SMTP server on the destination domain. In practice, however, the
mail recipients may not access their mailbox from the SMTP server directly. Instead, users may
need to configure their computers so that their mails from the mailbox on the SMTP server can
be received on their local computers. This functionality is not provided by SMTP, and protocols
such as Post Office Protocol (POP) and Internet Message Access Protocol (IMAP) are used for
this purpose.
Mailboxes present on the servers usually have limited storage space, typically I MB to 5
MB. Leaving all the e-mails on the server may take up a significant portion of the disk
space on the serve, This problem is compounded by the fact that a mail server typically
handles multiple mailboxes. These problems can be prevented by continually retrieving
mails from the server.
POP downloads the e-mails onto the local computer, and therefore, the user need not remain
connected to the mail server to read the messages. This is extremely helpful when users connect
to mail servers over the Internet (usually the ISP's mail server) because it reduces the ISP access
charges. In fact, the ability to read and modify mails without remaining connected to the Internet
is the main advantage of POP.
POP has the following disadvantages:
All the e-mail messages are downloaded onto a single computer, and therefore, a user can
access the mail from the same computer. If a need arises to access mails stored on a
different computer, it is not possible with POP.
As e-mail messages are stored in a single computer, a virus attack or a hard-disk crash
may wipe out all the messages, unless a backup is made regularly.
POP uses five default folders to handle e-mails: Inbox, Outbox, Drafts, Sent Items, and
Deleted. POP does not allow users to create any customized folders for sorting e-mail
messages on the mail server.
A user can access only one mailbox on a server at a given time. For example, imagine a
mail server, Goal.com, with two mailboxes, John and Joe. Using POP, you can access
either John's mailbox or Joe's mailbox but not both simultaneously.
IMAP always maintains a copy of the e-mail messages on the mail server, unless the user
explicitly deletes them. In addition, IMAP also allows users to synchronize the e-mails on the
mail server with the e-mails on the local computer. For example, suppose a user has downloaded
an e-mail from the mail server and modified it. Synchronizing the e-mails on the mail server and
the local computer ensures that the e-mails on the server also contain the updated information.
IMAP allows users to access e-mail messages from the mail server in any of the following
modes:
Online: The e-mail messages exist on the mail server (not downloaded to the user's
computer), and the user can access mails from a remote computer.
Offline: The user downloads the e-mail messages from the server to the local computer,
and the e-mail messages are deleted from the server.
Disconnected: The user downloads the messages from the server to the local computer.
However, a copy of the messages is retained on the server. Every time the user connects
to the server, the messages on the server are synchronized with the messages on the local
computer.
IMAP offers more flexibility than POP in managing e-mails and has the following advantages:
Allows users to access multiple mailboxes simultaneously.
IMAP is useful only if the user needs to access e-mails from multiple locations. If only a
single computer is used, the advantages of IMAP are not felt.
QUESTION BANK
8. What is the maximum number of nodes supported in a single ARC net LAN?
a. 200
b. 225
c. 255
d. 250
10. Can you illustrate a terminal emulation protocol that allows user to log in remote computers?
a. Telnet
b. SMTP
c. FTP
d. HTTP
a. 5008 bytes
b. 58 bytes
c. 508 bytes
d. 805 bytes
15. Can you illustrate the device that needs to send data checks the cable for any signals?
a. Carrier sense
b. Carrier Detection
c. Checking sense
d. None of the above
17. Can you tell the of value Priority field in Token ring?
a. 000 and 111
b. 010 and 111
c. 001 and 111
d. 011 and 111
19. Which of the following default folder POP doesn’t use to handle email?
a. Inbox
b. Important
c. Outbox
d. Drafts
21. Token ring has how many fields in access control field?
a. 4
b. 3
c. 5
d. 6
22. How many layers does IPX/SPX reference model have?
a. 7
b. 5
c. 6
d. 4
23. Which among the following is not the application layer protocol?
a. HTTP
b. FTP
c. TCP
d. SMTP
25. Medium Access layer of IPX/SPX is equivalent to which layer of OSI Reference model?
a. Physical
b. Data link
c. Network
d. Transport
1. Can you write in your own words about the lower layer protocols?
2. Can you Explain the different aspects of communication in network protocols
3. Can you write in your own words about ARC net
4. Can you write in your own words about the Ethernet communication along with its
drawbacks?
5. Can you write in your own words about the FDDI?
6. Can you write in your own words about Ethernet
7. Can you write in your own words about the FTP?
8. How would you explain the fault management and tolerance in token ring network?
UNIT 3
CHAPTER-5
TCP/IP ADDRESSING SCHEME
TCP/IP uses a 32 bit addressing scheme to identify the devices on a network. These 32
bits are divided into four octets, of eight bits each. Each of these four octets is represented in a
decimal form, and separated by a dot. For example, 198.l72.l68.10 is an IP address. This format
of representing an IP address is called the dotted-decimal format.
The two parts of an Internet address are the network address portion and the host address
portion. This allows a remote host to specify both the remote network and the host on the remote
network when sending information. By convention, a host number of 0 (zero) is used to refer to
the network itself.
Network address: This is the address of the network itself, and is used by other
networks to identify this network. Figure represents the host address and the network
address components of a typical IP address.
Figure: IP Address
198.172.168 is the network address and 10 is the host address. There may be several
computers in this network. The IP addresses of all these computers would begin with
198.172.168 but the value in the fourth octet would be unique for each of the computers. For
example, 198.172.168.11, 198.172.168.12, and 198.172.168.13 are different hosts of the same
network. However, this IP address has the limitation of not being able to address more than 256
computers on the network because one octet can only take values from between 0 and 255.
One possible solution to overcome this problem is to reduce the number of octets for
identifying the network, to two or one, and as a result, increase the number of octets for the host
address. For example, if 198.172 represents the network address and 168.10 represents the host
address, then the number of hosts per network can be increased. Similarly, if 198 represents the
network address and 172.168.10 represents the host address, the number of hosts per network
can be even higher. However, this solution would fail if the number of networks were large.
For example, if two octets are used to represent the network address, such an addressing
scheme could identify only 65536 (256*256) networks. Although 65,536 is a large number, in
the context of LANs, there are literally hundreds of thousands of networks that form the Internet.
Therefore, a compromise has to be reached between the number of octets used for the network
and host addresses. TCP/IP allows network administrators the flexibility to decide the number of
octets for the network and host addresses with the help of IP address classes.
IP ADDRESS CLASSES
IP address classes provide network administrators with the flexibility to select an IP
addressing format depending on the needs of the network. For example, on a network with 50
computers it is sufficient that only the last octet be used to represent the host address. On the
other hand, if a network has 2000 computers, then the last two octets should be used to represent
the host address. The process of determining the octets that represent the network and host
addresses is standardized with the use of IP address classes.
designing networks:
Class A: In this class, the first octet is used for the network address, and the remaining
three octets can represent a host address. Therefore, a Class A network can have up to
16,777,216 (256*256*256) devices. The first octet can take a value between 1 and 127
while the remaining octets can take values from 0 to 255. The range of Class A is from
1.0.0.0 to 127.255.255.255. For example, 10.35.4.186 and 126.254.186.99 are examples
of Class A addresses. Class A networks are used by large organizations and large ISPs
with a large number of hosts. In fact, very few organizations have networks with more
than 65,536 devices, in which case Class A is used.
Class B: Class B uses the first two octets for the network address and the last two octets
for the host address. Class B networks can have up to a maximum of 65,536 hosts. The
first octet of a Class B address can range from 128 through 191. The remaining octets,
however, can range from 0 through 255. Class B networks are also used by large
organizations and universities. In fact, most organizations do not have a network with
more than 65,536 devices, and therefore, use Class B. Class B addresses range from
128.0.0.0 to 191.255.255.255. Examples of Class B addresses are 130.59.5.34 and
168.192.220.10.
Class C: The first, second, and third octets are used to denote the network address in
Class C while the fourth octet denotes the host address. As a result, a Class C network
can accommodate only 255 hosts. The first octet of a Class C address can take a value
between 192 and 223. Class C is the most commonly used IP address class in LANs
because most LANs do not have more than 255 hosts. The range of Class C is from
192.0.0.0 to 223.255.255.255. For example, 192.168.10.20 is a Class C IP address.
Class D: Class D addresses are not provided for addressing networks. Class D addresses
are used for multicast, the process of sending the same data to the multiple computers on
a network or across different networks. Class D, in fact, is completely different from the
previous three classes. The first four bits of the first octet of a Class D address are always
1, 1, 1, and 0. The remaining three octets identify the devices on a network. The values of
1. 1· 1. and 0 for the first four bits of the octet mean that the first octet should be a
decimal value between 224 and 239. Therefore, Class D addresses range from 224.0.0.0
to 239.255.255.255. An example of a Class D IP address is 225.38.254.254.
Class E: Like Class D addresses, Class E addresses are also not available for network
addressing. In fact, Class E addresses are reserved for experimental purposes. These
addresses may be made available for normal use in the future. The first four bits of a
Class E address are 1, 1, 1, and 1. Therefore, the range of Class E addresses is between
240.0.0.0 and 255.255.255.255.
Any organization (or individual) that needs to connect to the Internet must obtain a block
of IP addresses from their local governing body that oversees Internet access, such as the
InterNIC. Depending on the size and need of the organization, the governing body allocates a
particular IP address range. However, not all organizations need to contact InterNIC for IP
addresses. InterNIC usually allocates a block of IP addresses to ISPs, which in turn allocate this
block in parts to subscribers connecting through them. For example, an ISP may obtain a Class C
address block of 199.120.35.0, and in turn, allocate the address block of 199.120.35.1-15 to one
subscriber, and 199.120.35.40-60 to another subscriber.
Moreover, the IP addresses are allocated only to those hosts that connect to the Internet, and not
all hosts on the network. For example, an organization may have a network of 200 computers.
However, only two computers, which are set up as network servers, connect to the Internet. In
such cases, the ISP allocates IP address only to these computers.
To prevent poor router performance of network routers, and to improve the network
management, networks are usually divided into subnets.
IP SUBNETTING
Subnets are an efficient method for logically dividing a network into segments, such that
the network performance is optimized. Subnets are defined as the segments of a network that use
addressing schemes different from one another but corresponding to the addressing scheme used
by the main network. Therefore, devices in one subnet cannot directly communicate with devices
in another subnet. Usually, a router is used to establish communication between subnets.
To understand the definition of a subnet, and the process of subnetting, consider a Class
C network represented by 192.168.30.0, in which 192.168.30 represents the network address,
and the value in the fourth octet would represent the host on the network. For example, the
address of a particular host in this network would be 192.168.30.4. The fourth octet in a Class C
address can take a value between 0 and 255, and therefore, this network can have up to 256
hosts. However, configuring 255 computers in a single network would significantly degrade the
performance of the network as well as the network router. Therefore, the network, 192.168.30.x
can be divided into subnets, with each subnet consisting of, say, 16 computers.
On a network without subnets, a device outside the network can identify a host with the
help of the network and host addresses. On a network with subnets, however, an additional piece
of information, called the subnet mask, is needed to identify a host. The network address helps
determine the network in which the host is located, whereas the subnet mask is responsible for
locating the subnet on the network to which the host belongs. The host address identifies the
individual host.
However, the addressing scheme used by IP has only four octets that can be used to
represent the network address or the host address depending on the IP address class. It is not
possible to include information on the subnet in the IP address itself, and therefore, the subnet
mask is a separate 32 bit address, accompanying the IP address of a device.
The default subnet mask values for Class A, Class B, and Class C IP addresses are listed
in Table
The default subnet masks are used when a network does not have any subnets. For
creating subnets, the default values are modified to obtain customized subnet masks. When
subnet masks are customized, only the octets that denote the host address are modified, and not
the octet(s) that represent the network address. For example, 255.224.0.0 is a valid subnet mask
for a Class A network but not 252.124.0.0. In fact, 252.124.0.0 is not a valid subnet mask for a
network of any IP address class.
The subnet masks and IP addresses on the network are dependent on one another because
a network that belongs to a particular IP address class can accommodate only a particular
number of devices irrespective of the number of subnets. For example, a Class B network can
have a maximum of only 65,536 devices irrespective of the number of subnets that are created.
Therefore, the subnet mask values are derived from the IP address of the network. Below
Figure represents the components of a typical IP address further divided to depict the subnet
address.
three bits may represent the subnet address and the last five bits may represent the host address.
The number of bits used by the subnet address, and the number of bits used by the host address
are determined by the subnet mask.
To understand the process of creating a subnet mask, consider the Class C IP address,
192.168.30.0, and the Class C default subnet mask in the binary form, as shown in Figure.
The subnets listed in Table 5.3 obtained by modifying the last octet of the network
193.168.30.0 can also be represented as 192.168.30.0/26, 192.168.30.64/26, 192.168.30.128/26,
and 192.168.30.192/26, respectively. The number 26 indicates that 26 bits in the subnet mask
have been utilized, instead of 24 used by the default subnet mask for Class C IP address
The subnet addresses are created for the network 192.168.30.0, and you now need to
create host addresses within each subnet. The maximum number of hosts that a subnet can have
is 2 raised to the power of 6 minus 2 (26-2, which is 62) because there are six bits that can be
used for the host address. The devices in the first subnet will have addresses between
192.168.30.1 and 192.168.30.63. Similarly, the second sub net contains devices with addresses
from 192.168.30.65 to 192.168.30.127, the third with addresses from 192.168.30.129 to
192.168.30.191, and the fourth from 192.168.30.193 to 192.168.30.255.
Figure represents the calculation performed by the router on subnet 0 to check where Node A
and Node N are part of the same subnet.
You have learned about the advantages of sub netting, and the process of creating subnets
on a network. You also learned how a subnet router determines whether the hosts on a network
are part of the same subnet or not. The following factors are to be considered before dividing a
network into subnets:
Number of subnets required: Devices on a network are usually grouped into subnets
based on a common factor. For example, suppose an organization has three departments:
Finance, Operations, and Sales. It is logical to create three subnets, one for each
department, because the computers within the departments may need to communicate more
frequently with one another than with the computers in other departments. Therefore, the number
of subnets required on the network should first be clearly defined. You have already observed
that the number of subnets required should be defined as an exponent of 2. However, 3 cannot be
expressed as an exponent of two. The closest larger power of 2 is 4 (22). Therefore, four subnets
need to be created in this scenario.
For example, imagine that in a Class C network, the number of hosts required in the
largest subnet is 32 (25). Therefore, five bits of the last octet are required for the host address,
and only three bits are available for the subnet address. As a result, the maximum possible
number of subnets on the network is 8 (23). In some cases, the administrator may need to
compromise either on the number of subnets, or on the number of hosts in the largest sub net
depending on their relative priorities. In addition, the administrator also needs to consider the
future requirement on the number of hosts in the largest subnet.
You have learned about the need to divide a network into subnets, and the advantages of
subnetting. You also learned the steps to divide a network into subnets, and the factors to be
considered for subnetting. You observed that some of the factors conflict with one another and
thereby limit the advantages offered by subnetting,
SUBNETTING LIMITATIONS
Imagine an organization having 12 departments. The largest department has 50
computers while the other departments have 10 computers each (a total of 160 computers). The
organization opts for Class C IP addressing because the number of computers is less than 255.
The organization also needs to divide the network into logical subnets to optimize network trafic.
Therefore, 12 subnets need to be created and the largest subnet should accommodate 50
computers. However, it is possible to create only 8 or 16 subnets (23 or 24). As the requirement
is 12 subnets, the administrator opts to create 16 subnets. This implies that the maximum number
of hosts per subnet is 16, whereas the requirement is 50. In addition, only 10 addresses are
utilized against the available 16 addresses in the other subnets.
The preceding example represents two major limitations of IP subnetting:
Limitation on the number of hosts that can be accommodated in a single subnet.
Wastage of host addresses in subnets.
VLSM allows administrators to create subnets of varying sizes depending on the need of
a network. To understand the concept of VLSM, consider the example of the Class C network,
198.162.30.0, discussed in the previous topic. With the help of subnetting, this network was
divided into four subnets of 64 computers each. In VLSM, you can divide the network into
subnets with varying size. Assume, for example, that the network needs to be divided into eight
subnets, but one of the subnets should be able to handle 60 hosts, which cannot be obtained by
the standard method of IP subnetting. To identify 60 hosts, six bits of the last octet are required
(26 :;: 64). As a result, the remaining two bits can be used to identify the subnet. Therefore, the
subnet address would be 192.168.30.0/26.
The network, 198.162.30.0, is a Class C network, and can handle 256 hosts, and 64 hosts
are already allocated as a part of the first subnet. The remaining 192 computers can be spread
across multiple subnets. For example, another subnet can be created to handle 32 hosts. The
subnet address would then be 192.168.60.65/27 because the values 0 to 64 in the last octet are
already part of the first subnet, and 5 bits are required to identify 32 (25) hosts. As a result, three
bits are available to represent the subnet address. You can observe that the length of the second
subnet mask is 27 bits whereas the length of the first one is 26 (therefore, the name VLSM). The
remaining hosts can be accommodated into subnets of varying sizes (defined as an exponent of
2).
2. Arrange all the segments in descending order based on the block size that is from highest
to lowest requirement.
Sales and Purchase: 120
Development: 50
Accounts: 26
Management: 5
3. The highest IP available has to be allocated to highest requirement so the sales and
purchase department gets 192.168.1.0/25 which has 126 valid addresses that can easily be
available for 120 hosts. The subnet mask used is 255.255.255.128
4. The next segment requires an IP to handle 50 hosts. The IP subnet with network number
192.168.1.128/26 is the next highest which can be assigned to 62 hosts thus fulfilling the
requirement of development department. The subnet mask used is 255.255.255.192
5. Similarly the next IP subnet 192.168.1.192/27 can fulfill the requirements of accounts
department as it has 30 valid hosts IP which can be assigned to 26 computers.The mask
used is 255.255.255.224
6. The last segment requires 5 valid hosts IP which can be fulfilled by the subnet
192.168.1.224/29 which has the mask as 255.255.255.248 is chosen as per the
requirement. The IP with the mask 255.255.255.240 could be chosen but it has 14 valid
hosts IPs and the requirement is less in comparison so the one that is comparable with the
requirement is chosen.
Benefits of VLSM
VLSM provides the ability to subnet an already subnetted network address. The benefits
that arise from this behaviour include:
Efficient use of IP addresses: IP addresses are allocated according to the host space
requirement of each subnet. IP addresses are not wasted; for example, a Class C network
Basics of Networking Page 93
Srinivas University BCA IInd Semester
of 192.168.10.0 and a mask of 255.255.255.224 (/27) allows you to have eight subnets,
each with 32 IP addresses (30 of which could be assigned to devices). What if we had a
few WAN links in our network (WAN links need only one IP address on each side, hence
a total of two IP addresses per WAN link are needed). Without VLSM that would be
impossible. With VLSM we can subnet one of the subnets, 192.168.10.32, into smaller
subnets with a mask of 255.255.255.252 (/30). This way we end up with eight subnets
with only two available hosts each that we could use on the WAN links. The /30 subnets
created are: 192.168.10.32/30, 192.168.10.36/30, 192.168.10.40/30, 192.168.10.44/30,
192.168.10.48/30, 192.168.10.52/30, 192.168.10.56/30 192.168.10.60/30.
Support for better route summarization: VLSM supports hierarchical addressing
design therefore; it can effectively support route aggregation, also called route
summarization. The latter can successfully reduce the number of routes in a routing table
by representing a range of network subnets in a single summary address. For example
subnets 192.168.10.0/24, 192.168.11.0/24 and 192.168.12.0/24 could all be summarized
into 192.168.8.0/21.
The problem would commonly occur when an organization required more than 254 host
machines and therefore would no longer fall into class C but rather class B. This means that the
organization would use a class B license even though they had far less than 65,535 hosts.
Therefore if an organization only required 2,500 hosts, they would be wasting about 63,000 hosts
by holding a class B license which would greatly decrease the availability of IPv4 addresses
unnecessarily
Unlike IP address classes, which used 8, 16, or 24 bits to represent a network address,
CIDR allows a variable number of bits to represent a network address. Therefore, CIDR provides
more flexibility in allocating IP addresses for networks than classful addressing. For example,
using CIDR, 18 bits can be used to represent the network address, -and 14 bits can be used to
represent the host address. The CIDR address also contains the information about the number of
bits used for the network address. For example, a CIDR address of 130.168.26.32/18 indicates
that the first 18 bits represent the network address, and the last 14 bits represent the host address.
This network can therefore accommodate 16,384 (214) hosts. You can observe that this IP
address cannot be categorized as Class A, Class B, or Class C.
CIDR allows allocation of IP addresses that are suited to the actual requirement of the
network. For example, imagine a network with 32 hosts. If classful IP addressing were used, the
network would need to use a Class C address, such as 198.168.30.0, and as a result, 223 IP
addresses would be wasted. On the other hand, with CIDR, only the last five bits (25= 32) are
allocated for the host addresses. Therefore, a CIDR address such as 198.168.30.160/27 can be
assigned to the network. Another network, which consists of 64 hosts, will be allocated a CIDR
address of 198.168.30.192126.
From the preceding example, you can observe that CIDR is an extension of subnetting
and VLSM to the network level. In classful addressing, 198.168.30.160127 and
192.168.30.192/26 represented subnets of the network 192.168.30.0, whereas in CIDR, the
addresses 198.168.30.160/27 and 192.168.30.192/26 represent different networks.
Rules for forming CIDR Blocks:
1. All IP addresses must be contiguous.
2. Block size must be the power of 2 (2n). If the size of the block is the power of 2, then it
will be easy to divide the Network. Finding out the Block Id is very easy if the block size
is of the power of 2.
3. First IP address of the Block must be evenly divisible by the size of the block. in simple
words, the least significant part should always start with zeroes in Host Id. Since all the
least significant bits of Host Id is zero, then we can use it as Block Id part.
To overcome this address space limitation of IPv4, IPv6 uses a 128 bit addressing
scheme. Therefore, the maximum number of hosts that can be identified at a given point of time
Basics of Networking Page 95
Srinivas University BCA IInd Semester
In addition to using a 128 bit addressing scheme, IPv6 offers the following advantages
over IPv4:
Offers built-in support to IPSec (Internet Protocol Security), a protocol used to ensure
data security in VPNs.
Unlike IPv4, which assumes that the users connect to the Internet from the same location,
IPv6 supports mobile users. Therefore, a user can use the same IP address to connect
from different locations.
Provides built-in support for auto configuration. Therefore, IPv6 compatible devices,
such as routers or computers with IPv6 installed on them can create their own IP address
using the MAC address and obtaining the network address from the network router. This
greatly reduces the work of the network administrator.
Supports anycasting. Anycasting is used to regulate traffic as well as to increase the
speed of accessing Web sites. Most Web sites have multiple copies, called mirrors,
located on different servers across the world. For example, the website
http://www.great.com may have mirrors in the United States, England, France, and Japan.
If a user accesses' the Web site from China, the request is automatically transferred to the
mirror site is Japan. This process of redirecting a user request to the nearest server is
called anycasting.
Although IPv6 offers several advantages over IPv4, and was officially released in 1999,
the migration to IPv6 from IPv4 has been slow due to the fact that the addressing schemes are
not interoperable. However, IPv6 is backward compatible with IPv4. Therefore, a network that
uses IPv6 can recognize IPv4 addresses but not vice versa. In this section, you learned the
addressing scheme used by IP. You also learned the different methods used to optimize network
traffic and utilization of host addresses. In addition, you understood the advantages of IPv6 over
IPv4.
CIDR provides numerous advantages over the “classful” addressing scheme, whether or
not subnetting is used:
Efficient Address Space Allocation:
i. Instead of allocating addresses in fixed-size blocks of low granularity, under
CIDR addresses are allocated in sizes of any binary multiple.
ii. So, a company that needs 5,000 addresses can be assigned a block of 8,190
instead of 65,534. Or, to think of it another way, the equivalent of a single Class B
network can be shared amongst 8 companies that each need 8,190 or fewer IP
addresses.
Elimination of Class Imbalances:
i. There are no more class A, B and C networks, so there is no problem with some
portions of the address space being widely used while others are neglected.
Efficient Routing Entries:
i. CIDR's multiple-level hierarchical structure allows a small number of routing
entries to represent a large number of networks.
ii. Network descriptions can be “aggregated” and represented by a single entry.
iii. Since CIDR is hierarchical, the detail of lower-level, smaller networks can be
hidden from routers that move traffic between large groups of networks.
No Separate Subnetting Method:
i. CIDR implements the concepts of subnetting within the internet itself.
ii. An organization can use the same method used on the Internet to subdivide its
internal network into subnets of arbitrary complexity without needing a separate
subnetting mechanism.
SNMP SNMP is a protocol used for SNMP does not support IPv6.
system management.
Mobility & Relatively constrained network IPv6 provides interoperability
Interoperability topologies to which move restrict and mobility capabilities which
mobility and interoperability are embedded in network
capabilities. devices.
Security Security is dependent on IPSec(Internet Protocol
applications - IPv4 was not Security) is built into the IPv6
designed with security in mind. protocol, usable with a proper
key infrastructure.
Packet size Packet size 576 bytes required, 1208 bytes required without
fragmentation optional fragmentation
Packet Allows from routers and sending Sending hosts only
fragmentation host
Packet header Does not identify packet flow for Packet head contains Flow
QoS handling which includes Label field that specifies packet
checksum options. flow for QoS handling
DNS records Address (A) records, maps Address (AAAA) records,
hostnames maps hostnames
Address Manual or via DHCP Stateless address auto-
configuration configuration using Internet
Control Message Protocol
version 6 (ICMPv6) or
DHCPv6
IP to MAC Broadcast ARP Multicast Neighbour
resolution Solicitation
Local subnet Internet Group Management Multicast Listener Discovery
Group Protocol GMP) (MLD)
management
Optional Fields Has Optional Fields Does not have optional fields.
But Extension headers are
available.
IPSec Internet Protocol Security (IPSec) Internet Protocol Security
concerning network security is (IPSec) Concerning network
optional security is mandatory
Dynamic host Clients have approach DHCS A Client does not have to
configuration (Dynamic Host Configuration approach any such server as
Server server) whenever they want to they are given permanent
connect to a network. addresses.
Mapping Uses ARP(Address Resolution Uses NDP(Neighbour
Protocol) to map to MAC address Discovery Protocol) to map to
MAC address
Combability with IPv4 address uses the dot-decimal IPv6 address is represented in
mobile devices notation. That's why it is not hexadecimal, colon- separated
suitable for mobile networks. notation. IPv6 is better suited to
mobile networks.
IPX/SPX ADDRESSING
Internetwork Packet Exchange (IPX) is the network layer protocol in
the IPX/SPX protocol suite. IPX is derived from Xerox Network Systems' IDP. It may act as
a transport layer protocol as well. The IPX/SPX protocol suite was very popular through the late
1980s into the mid-1990s because it was used by the Novell NetWare network operating system.
Because of Novell NetWare popularity, the IPX became a prominent internetworking protocol. A
big advantage of IPX was a small memory footprint of the IPX driver, which was vital
for DOS and Windows up to the version Windows 95 because of limited size of the conventional
memory. Another IPX advantage is an easy configuration of the client computers. However, IPX
does not scale well for large networks such as the Internet, and as such, IPX usage decreased as
the boom of the Internet made TCP/IP nearly universal. Computers and networks can run
multiple network protocols, so almost all IPX sites will be running TCP/IP as well to allow
Internet connectivity. It is also possible to run later Novell products without IPX, with the
beginning of full support for both IPX and TCP/IP by NetWare version 5 in late 1998.
Like TCP/IP, IPX/SPX also uses a two-level hierarchy to identify a host, the network
address, and the host address. However, IPX uses 80 bit (10 octet) addressing scheme instead of
the 32 bit addressing scheme used by IP. The first 32 bits, or 4 octets, represent the network
address, and the next 48 bits, or 6 octets, represent the host address. Moreover, IPX addresses are
denoted in hexadecimal form and not in the decimal form of IP. Therefore, the addressing
scheme used in IPX is referred to as a dotted hexadecimal notation. Figure below shows the
network address and host address components of a typical IPX address.
An IPX network address can contain up to eight hexadecimal digits. The zeroes at the
beginning of the address, however, are not included. For example, if 0084973A the address of a
network, it is represented only as 84973A. IPX reserves the following three addresses for use by
the protocol:
OxO: Represents the local network. When an IPX router receives a data packet having a
destination network address of 0, the router interprets that the source and destination
hosts are part of the same network.
OxFFFFFFF: Used by IPX routers to communicate route information between them.
When a router receives a data packet with the destination network address as
OxFFFFFFF, it forwards information on all available routes to the source router.
OxFFFFFFE: Represents the default route on a network. Whenever a host on a network
does not know the destination address for a data packet, this address is selected as the
destination address. This address is generally assigned to the network router, which then
forwards the data packets to their destinations.
An organization that wishes to use IPX addresses in its network and connect to other
networks needs to obtain a registered block of addresses from Novell. However, if the network
does not communicate with external networks, then the administrator can assign IPX addresses
for the host. IPX addressing is used in networks that run Novell NetWare, and are limited in their
application. IP is far more popular than IPX, and is commonly used in networks. In fact, Novell
has identified IP as the default protocol for its latest and future versions of Novell Netware.
IPX can be transmitted over Ethernet using one of the following 4 frame formats or
encapsulation types:
802.3 (raw) encapsulation comprises an IEEE 802.3 frame header (destination MAC,
source MAC, length) immediately followed by IPX data. It is used in legacy systems, and
can be distinguished by the first two bytes of the IPX header always containing a value of
0xFFFF, which cannot be interpreted as valid LLC Destination and Source Service Access
Points in this location of the frame.
802.2 (LLC or Novell) comprises an IEEE 802.3 frame header (destination MAC, source
MAC, length) followed by an LLC header (DSAP 0xE0, SSAP 0xE0, control 0x03)
followed by IPX data. The 0xE0 fields of the LLC header indicate "NetWare".
802.2 (SNAP) comprises an IEEE 802.3 frame header, an LLC header (DSAP 0xAA,
SSAP 0xAA, control 0x03), a SNAP header (OUI 0x000000, type 0x8137), and IPX data.
The 0xAA fields of the LLC header indicate "SNAP", and the OUI 0x000000 in the
SNAP header indicates an encapsulated EtherType.
Ethernet II encapsulation comprises an Ethernet II frame header (destination MAC, source
MAC, EtherType 0x8137) followed by IPX data.
NETBEUI ADDRESSING
Unlike IP and IPX, NETBEUI uses the names of the computers to identify them within
the network. NETBEUI supports names of up to 16 bytes (128 bits) long. NETBEUI does not
use any mechanism to identify the network itself, but only identifies the hosts within a network.
Advantages:
Netbeui has several important advantages over NetBIOS.
NetBEUI is faster than NetBIOS and uses less system resources.
NetBEUI is also easy to configure, has a relatively user friendly graphical interface, and
corrects errors that NetBIOS cannot detect.
NetBEUI is highly efficient and includes a transport layer that NetBIOS does not have.
NetBEUI is also specifically designed for use with LANs and generally performs very
well.
Disadvantages
While NetBEUI is fast and performs well on LANs, it performs poorly when used across
WANs (Wireless Area Networks).
NetBEUI is also strictly limited to the same network and cannot be routed to external
networks, even with the use of TCP/IP or other networking protocol.
NetBEUI requires each computer that is accessing it to have a unique name and does not
allow users to stream across multiple user accounts.
The main disadvantage of NETBEUI is that it cannot communicate between networks.
For example, suppose two networks, Network A and Network B, use NETBEUI for
communication. NETBEUI does not provide for storing the network name, and therefore, it is
not possible for a computer in Network B to address a computer in Network A. As a result,
NETBEUI cannot be used in a WAN, which is an interconnection of LANs. This limitation can
be overcome by installing a routable protocol, such as IP or IPX over NETBEUI. In this case,
NETBEUI would be used for communication within the network, while IP or IPX would be used
for communication between networks.
QUESTION BANK
(Questions for Application)
b. 0 to 225
c. 0 to 555
d. 0 to 525
10. What are the various classes of IP addressing in classful addressing scheme?
a. X, Y, Z, A and B
b. A, B, C, D, and E
c. M, N, G, O and P
d. A, B, C, M and N
19. 192.168.30.0 Subnet address in dotted decimal format belongs to which subnet?
a. 0
b. 1
c. 2
d. 3
Basics of Networking Page 106
Srinivas University BCA IInd Semester
20. 192.168.30.64 Subnet address in dotted decimal format belongs to which subnet?
a. 0
b. 1
c. 2
d. 3
21. 192.168.30.128 Subnet address in dotted decimal format belongs to which subnet?
a. 0
b. 1
c. 2
d. 3
22. 192.168.30.192 Subnet address in dotted decimal format belongs to which subnet?
a. 0
b. 1
c. 2
d. 3
3. How would you explain the communication across subnets are done
4. Can you give the limitation of IP address class
5. Can you illustrate the IPv6?
6. Can you illustrate the CIDR?
7. Can you illustrate the VLSM
8. Can you explain the limitation of subnetting with example
UNIT-IV
CHAPTER-6
INTRODUCTION TO WAN
OVERVIEW OF WAN
A Wide Area Network (WAN) is defined as a network that connects computers
spread across a large geographical area. WAN s may spread across a country, a continent, or
the Earth. In practice, WANs are essentially an interconnection of LANs and, therefore, WANs
extend the benefits offered by LANs across large areas. Consider the previous example of
an organization with offices in London, Chicago, and Shanghai. If a LAN is set up in London,
only the computers in the London office can share the data and resources. However, by
setting up LANs in all the three locations, and interconnecting these LAN s, the data and
resources can be shared among all the three locations. This ability to share data over
vast geographical areas is the most important benefit of WAN as illustrated by the
Internet. Internet is a WAN that is spread across the Earth.
Although WANs serve a purpose similar to that of local area networks (LANs), WANs
are structured and operated quite differently. The user of a WAN usually does not own the
communications lines that connect the remote computer systems; instead, the user subscribes to
a service through a telecommunications provider. Unlike LANs, WANs typically do not link
individual computers, but rather are used to link LANs. WANs also transmit data at slower
speeds than LANs. WANs are also structurally similar to metropolitan area networks (MANs),
but provide communications links for distances greater than 50 kilometres.
WANs have existed for decades, but new technologies, services, and applications have
developed over the years to dramatically increase their efficacy for business. WANs were
originally developed for digital leased-line services carrying only voice, rather than data. As
such, they connected the private branch exchanges (PBXs) of remote offices of the same
company. WANs are still used for voice services, but today they are used more frequently for
data and image transmission (such as video conferencing). These added applications have
spurred significant growth in WAN usage, primarily because of the surge in LAN connections
to the wider networks.
Because of the huge difference in the geographical areas covered by LAN s and
WAN s, the characteristics and implementations of LAN and WAN differ greatly. The
following are some of the important differences between LAN and WAN technologies:
Ownership: LANs are generally owned, and maintained by a single person or small
organizations. However, WANs are owned, and maintained by a large number of
individuals, or large organizations. The sheer size of WAN makes it impossible
for a single person or a small organization to maintain it.
Connectivity: The devices in a LAN are connected using coaxial cables, twisted
pair cables, or optical fiber cables. However, to connect devices, and computers in
WAN, connectivity options such as POTS, leased lines, ISDN, VSAT, Microwave, and
Infrared, are used. Although the connectivity options used in WAN may, in turn,
include coaxial, twisted pair, or optical fiber cables, the technology used to
establish the connection is different.
Hardware: In addition to cables, the hardware devices used to establish connection
in WAN are different from those used in LAN. For example, computers in a LAN are
connected by devices such as hubs, switches, and repeaters whereas devices such as
routers, bridges, and gateways are used to establish connectivity in a WAN.
Protocols: Computers in a LAN communicate among themselves using protocols
such as Ethernet, Token king, or FDDI. Computers in a WAN use protocols such as
Frame Relay, ATM, or X.25, for communication.
Speed: The speed of data transfer is high in case of LANs. For example, Ethernet can
transfer data at the rate of 10 Mbps. However, devices in a WAN communicate at
relatively lower speeds, such as 1.544 Mbps in case of leased lines because of
the distance involved and technologies used between the locations.
LAN WAN
WANs uses technologies like Frame Relay
Tend to use specific connectivity and X.25 for connectivity for the longer
technologies, like Ethernet and token. distances
LAN is a computer network that covers a WAN is a computer network that covers a
small geographic area, like a home, office, broad area. For example, any network
or group of buildings. whose communications links cross-regional
and metropolitan boundaries over a long
distance.
There is a need to set up a couple of extra In WAN networks as remote areas have to
devices on the network, so it is not very be connected, hence the set-up costs are
expensive. higher.
LAN has a higher data transfer rate. WAN has a lower data transfer rate as
compares to LAN.
Ownership of LAN is private. WAN's ownership can be private or public.
The speed of LAN is high. The speed of WAN is slower than LAN.
The propagation delay time is short in LAN. The propagation delay in WAN is
long(longer than LAN).
It offers more fault tolerance. It offers less fault tolerance in WAN.
Its design and maintenance is easy. Its design and maintenance is difficult.
The following are some of the popular connectivity options used to set up a WAN:
POTS
Leased lines
ISDN
VSAT
Microwave
Radio
Infrared
POTS
A Plain Old Telephone System or Plain Ordinary Telephone System (POTS) is
an analog technology that provides data transfer rates up to 33.6 Kbps. In POTS, the
connection among different LANs is established with the help of telephone lines. This
connection between LANs is called a circuit. The circuit is made available for the LANs for
communication and terminated when the communication ends. This process of making the
circuit available only when the LANs communicate is called circuit switching.
Circuit switching works exactly in the same manner as the telephone system for voice
communication. For example, when two LAN s communicate, a circuit is established between
them. The circuit is dedicated as long as the communication is in progress. After the
communication ends, the circuit is made available for other LAN s to communicate.
In POTS, the connection between the two LANs can either be established
directly, or over the Internet with the help of an ISP. To connect the LAN s directly,
however, Remote Access Service (RAS) should be installed on the servers of one of
the LANs. For example, if two LANs need to connect directly using POTS, the
server on one of the LAN, say LAN A, dials the telephone connected to the server on
the other LAN, say LAN B. The server on LAN B should have RAS installed to
accept the incoming call from the server on LAN A. Figure represents a direct connection
between two LANs with the help of POTS.
Consider the LAN s represented in Figure Assume that LAN A needs to send data to
LAN B. The server on LAN A dials the server on LAN B, which accepts the call, and a
connection is established between the two networks. Now, the data originating from the
server on LAN A passes through the modem where it is converted into an analog
form for transmission over the telephone line. The data in the analog form reaches the
modem on LAN B, which then converts the data back to digital from and passes it on
to the server.
POTS are an inexpensive method of establishing connection between LANs. As the
circuit between the LAN s is shared, the access charges are calculated on the basis of the
actual time for which the circuit was utilized. However, the bandwidth provided by POTS
is limited to 33.6 Kbps, which is the maximum possible data transfer rate on a telephone
line. Therefore, POTS cannot be used if the data to be transmitted between the LAN s is
high. For example, if two networks need to set up video conferencing, POTS cannot be used
because the data transmitted by the video conferencing application is high.
entire T -1 line is unaffordable, or when the bandwidth offered by the entire T -1 line is not
required.
In addition to the T -1 lines, a newer line, T -3, that offers data transfer rates of
44.736 Mbps, is also available. T -3 lines are preferred by organizations that require
extremely high data transfer rates for applications such as video conferencing, data transmitted
on a carrier network, or ERP access. However, T-3 lines run only on optical fiber, and
microwave media because coaxial cables, and twisted pair cables do not support high
signaling rate over long distances.
Leased lines offer faster data transfer rates, and are cost-effective when the data
transmitted over the networks is high, and on a continuous basis. The cost of a leased line
typically depends on the distance between the two end points, the speed of the circuit,
and the Quality of Service Leased lines are generally used by organizations that have their
business offices spread across significant geographical regions, and require high-speed
connections.
The main disadvantage with leased line is that the access charges for a line are constant,
irrespective of the actual bandwidth used. For example, the cost of a T -1 line over a distance
of five miles remains the same even if the organization uses only a bandwidth of 1 Mbps
for data transfer. To overcome this drawback of leased lines, ISDN was introduced, in
which the organization or the subscriber has to pay depending on the amount of
bandwidth used.
Additional expense:
Although pricing has decreased over time, the cost of installation, combined with the
ongoing monthly rental fees of a leased line, remain significantly higher than that of
other connection alternatives, such as ADSL or FTTC. It can be an expensive form of
data connectivity.
Longer set-up:
When installing a leased line, it can be a lengthier process. Firstly, the waiting time for
a quote can be prolonged as a communications company should want to assess what
best suits your specific requirements. The physical installation process can be complex
as it involves creating a new circuit and therefore some possible building work in
different locations. Installing an ADSL or FTTC broadband typically takes up to three
weeks as there is already an existing network in the area whereas a leased line can take
around three months to put in place.
channel whereas in Europe, the PRI consists of 30 B channels and one D channel. The B
channels transmit data at a rate of 64 Kbps while the D channel also transmits setup
and signaling information at 64 Kbps. The PRI is also represented as 23B+D or 30B+D,
as the case may be. The PRI is preferred by organizations that periodically need to transmit
large amounts of data across their networks. For example, imagine an organization has offices
in New York and Hollywood, and important updates should be transferred between
the New York and Hollywood offices every hour. In this case, an ISDN
connection is preferred over a leased line because the access charges for ISDN are
based on the actual time for which the connection is utilized. You have learned
about the features of ISDN, and the different interfaces offered by ISDN.
Working of ISDN
The basic advantage of ISDN is to facilitate the user with multiple digital channels.
These channels can operate concurrently through the same one copper wire pair.
The digital signals broadcasting transversely the telephone lines.
ISDN provides high data rate because of digital scheme which is 56kbps.
ISDN network lines are able to switch manifold devices on the single line such as
faxes, computers, cash registers credit cards readers, and many other devices. These all
devices can work together and directly be connected to a single line.
ISDN takes only 2 seconds to launch a connection while other modems take 30 to 60
second for establishment.
ISDN Disadvantages
The disadvantage of ISDN lines is that it is very costly than the other typical telephone
system.
ISDN requires specialized digital devices just like Telephone Company.
VSAT Networks
A typical VSAT network consists of three components, a central hub that is connected
to the master earth station, the satellite that transmits data across different earth stations, and
the VSAT earth stations located in different geographical area (also known as remote VSATs).
The central hub is located at the VSAT service provider’s premises, and all
communication between the VSAT earth stations passes through this central hub. The central
hub has a very large dish antenna, usually 15 to 36 feet in diameter.
Whenever one remote VSAT station wants to transmit data to another, the source
VSAT station transmits the data to the transponder on the satellite. The transponder receives
the signal, amplifies the signal, and beams the signal to the central hub. The central hub
checks the destination address of the data to ensure that the destination is valid. If the
destination address is valid, the central hub transmits the data back to the satellite. The satellite
then beams the data to the destination VSAT station.
occur at different frequency bands. The commonly used frequency bands for VSAT
communication are:
C-band
Extended C-band (also known as XC band)
Ku-band
The frequencies offered by the C band and XC band are very close to the frequencies
used by terrestrial radio waves, and therefore, their bandwidth is limited. However, Ku-band
offers a large bandwidth, and is the preferred frequency band for VSAT communications.
You have learned about the components of a VSAT network and the frequencies used for
communication in a VSAT network .The following sub topics introduce you to the network
architecture and access technologies used in VSAT networks.
VSAT stations. PAMA works in a similar manner as that of leased lines, and
therefore, the user needs to pay for the entire link irrespective of the actual duration
for which it was used.
Demand Assigned Multiple Access (DAMA):
In DAMA, the service provider offers bandwidth on receiving requests from
different VSAT stations. he connection is made available as long as the
communication is in progress, and terminated at the end of the communication. The
access charges are based on the actual time for which the VSAT link was used.
DAMA technology is preferred over PAMA because DAMA reduces communication
costs and is flexible. For example, a user need not know beforehand the duration for which a
VSAT link would be used. In addition, DAMA makes optimum use of the satellite resources,
and is therefore beneficial to the service providers too.
VSAT is the most reliable of all the wireless connectivity options. VSAT also offers
high uptime rates, typically 99 percent as compared to the uptime rates of approximately 85
percent offered by leased lines, or ISDN. In addition, VSAT offers nearly the same
bandwidth as the leased lines. The combination of reliability and high bandwidth makes VSAT
the most popular wireless connectivity option used in WANs. However, the cost of a VSAT
device as well as the charges for obtaining VSAT connectivity is high.
MICROWAVE
Microwave is a wireless technology that can be used to transmit digital information
between two computers that can be around 15kilometers apart. It is possible to use repeaters, or
amplifiers, to boost the signal strength so that computers as far as 40 kilometers, or
more, apart can communicate. In order to communicate using microwave, each computer or
network needs to have a microwave device installed. A typical microwave device consists of
the following:
Digital modem:
The digital modem receives the microwave signals, converts them into
digital signals, and passes it on to the computer, and vice versa.
Radio Frequency (RF) unit :
The RF unit converts the signal from the modem into a microwave signal, and
transmits the signal across the microwave network, and vice versa.
Antenna:
The antenna transmits and receives the microwave signals. The antennas of the
terminals must maintain a line of sight for the microwave communication to work.
RADIO
In this method, radio waves are used to wirelessly connect LANs, or computers. Radio
waves are also used only when terrestrial connectivity options are not available. The
computers, or networks, that need to communicate using radio waves should have an antenna.
The antenna converts outgoing data packets into radio waves and transmits them. The
antenna also converts the incoming radio waves into data packets and passes them on to the
network.
INFRARED
Infrared technology allows devices with infrared ports to communicate with each other,
and share data. Infrared transports data through light, which is invisible to a human eye. The
infrared light is usually in the frequency range of 1000 GHz. The networks that wish to
Advantages of infrared
The main advantage of infrared technology is its simple and extremely cheap senders
and receivers which are integrated into nearly all mobile devices available today.
No licenses are required for infrared and shielding is very simple.
PDAs, laptops, notebooks, mobile phones etc. have an infrared data association (IrDA)
interface.
Electrical devices cannot interfere with infrared transmission.
Disadvantages of Infrared
Disadvantages of infrared transmission are its low bandwidth compared to other LAN
technologies.
Limited transfer rates to 115 Kbit/s and we know that even 4 Mbit/s is not a particular
high data rate.
Their main disadvantage is that infrared is quite easily shielded.
Infrared transmission cannot penetrate walls or other obstacles.
Typically, for good transmission quality and high data rates a LOS (Line of site), i.e.
direct connection is needed.
Sales Manager of the organizing in the preceding example has traveled to Chicago on a one-
week business visit. The Sales Manager needs to access the corporate network for important
information updates. It is practically impossible to use connectivity options such as leased
lines, ISDN, VSAT, or Microwave for this purpose. In this example, one method of connecting
to the WAN is using RAS.
In order to use RAS, one of the computers in the WAN should be configured as a RAS
server. The Sales Manager can then dial into the RAS server and connect to the corporate
network. In this case, however, the cost to dial the RAS server in New York or Hollywood
would be very high, and therefore, RAS is not a cost-effective option. In this case, VPN can be
used by the Sales Manager to connect to the corporate network. In fact, VPN is a popular
option used by mobile users to connect to their corporate networks.
VPN performs the following functions to ensure that the data transmitted over a VPN is secure:
Authentication:
The VPN client requesting access to a private network is authenticated to ensure that
the client is a trusted one. Authentication is done with the help of a user name and
password. .
Encryption:
The data transmitted across the Internet is encrypted so that the packets cannot be read
by unauthorized sources.
Data integrity:
To prevent accidental loss of data packets over the Internet, VPNs employ several data
integrity checks to ensure that the data packets reach the destination correctly.
In addition to ensuring that the data packets reach the destination safely, VPN also
needs to transmit the data in the format recognized by the Internet. Internet uses the TCP/IP
protocol suite whereas the networks that wish to communicate may be using protocols,' such as
IPX/SPX or AppleTalk. When two networks using protocols other than TCP/IP communicate,
VPN encapsulates the data packets with IP so that the data can be transmitted over the Internet.
This process is called tunneling. Tunneling is achieved with the help of a VPN protocol. The
commonly used VPN protocols are detailed in the following topic.
The Advantages of using VPN
A VPN connection can be quite handy in the case of the following scenarios. Let us check out
the positive consequences of opting for a VPN service.
Access the Public Networks safely:
You may not need to use VPN if you are opting for a dedicated internet connection.
But, what if you are connecting through a public WiFi? You would want to safeguard
your privacy. The public WiFi may not be risk-free. It may have a host of public eyes
looking for your private information. Using a VPN service protects your private data.
Access to the Blocked Content:
How about a situation where you are roaming in a foreign country and trying to access
the content from your home country. If the particular site is geo-restricted, you will end
up getting error messages. An exact opposite case in point would be when you are
attempting to a resource that is geo-restricted to your country. VPN comes as a savior
in those situations. You should be able to access the content from anywhere in the
world. This can be one of the excellent options for you if you are in a country where
there is heavy censorship. In other words, a VPN gives you the online freedom that you
have always wanted. It works by changing your IP address and make you appear as if
you belong to a different country.
An Enhanced Online Security:
If online security is what you would look ahead to when browsing the internet, VPN
will help you achieve it. No matter which kind of connection are you opting for, a VPN
would be the best you would be able to go with. You tend to send a whole lot of
information on the internet. With the dangerous lifestyle that we have been leading
when it comes to the internet, you would want anyone to snoop on you. A VPN service
will encrypt your data and keep all others at bay while you are browsing the web or
sharing your personal information while using banking apps or private chats. You will
always remain anonymous, and no one will be able to have access to your data.
Save Money with VPN
Many E-Commerce websites offer differential pricing for different regions. It can be
useful when you are booking a flight or hotel in a different country. You may also use
the option of buying items from E-Commerce sites, but you may need to opt for a
different shipping address.If you want to make use of this feature of VPN services, it
would be advisable to check out a VPN service that has a considerably good number of
server locations covering almost all major parts of the globe.
It can Improve your Internet Speed
Your internet service providers may play tricks on you and restrict your speeds. If you
find your website speed is not up to the mark, you can check out with a few VPN
services to see if you can experience improved conditions. Since a VPN is used to hide
your online activity, it may help remove the restrictions placed on you by the internet
service provider. This can help you get rid of the buffering or the waiting period you
may need to go through while you are accessing your favourite content on the web.
Of course, a VPN service may be available for free. But for efficient service, it is
advisable to go with a subscription model. Opting for the free tier can indeed have the
opposite effect. Free services can sell your data to online advertisers. Beware of the
small players that are unheard of. If you want a reliable VPN service, you would need
to pay, and the subscription packages tend to be of recurring basis.
The VPN Blockers:
The tirade against the VPN services is gaining momentum these days. This may render
your VPN service useless and may make it go out of business. Popular streaming
services like Netflix attempt blocking the VPNs. This can be a huge issue if you have
already opted for a subscription plan and suddenly made to wake up one day to find the
service no longer working. However, there have been a few VPN services that stand up
to the VPN blockers and continue providing services. However, some services may not
be able to go past the powerful VPN blockers.
Reduction in internet Speed:
A VPN is aimed at encrypting your data before providing you with the connectivity.
This can result in reduced speed. Like we said before, if your service provider is
applying any restrictions on your connection, you may an increase in the rate. But, in
the case of a lack of such issues, your internet speed can decrease. That is precisely
why it is essential to opt for a VPN service that offers you better speeds while
providing the right of protection. The best way you would be able to check it out would
be to opt for a free trial plan and check the functionality of your VPN service.
A Tougher Configuration:
If you are not tech savvy enough, using your VPN service can be a little tricky. An
improper configuration can indeed land you in trouble and leak your data to the
hackers. If you are not taking proper care of your VPN set up, you may end up having
issues with your online privacy and security. IP and DNS leaks are a few issues that
you may come across. Of course, there are a few tools that can be helpful in addressing
the problems. If you are starting with the VPN service, it may be a good idea to opt for
the VPN services that offer a user-friendly configuration method.
Your VPN Connection may Drop Suddenly:
A well-known and popular VPN service may not suffer downtimes, but a host of them
tend to suffer downtimes all of a sudden. If you do not notice that your VPN service has
dropped, you will be connected without it, and your actual IP address would be visible.
Most high-end VPN services come with a Kill Switch that helps you disconnect from
the internet as soon as the connection with the server drops. If you are quite wary of
your anonymity, it would be advisable to opt for the VPN services that offer a Kill
Switch.
VPN protocols
VPN protocols are responsible for encrypting and encapsulating data packets that travel
over the Internet. The commonly used VPN protocols are:
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Internet Protocol Security (IPSec)
PPTP was developed based on the Point-to-Point Protocol (PPP), and Internet Protocol
(IP).
PPTP offers tunneling support to the most commonly used network protocols such as
TCP/IP, IPX/SPX, and NETBEUI.
PPTP works at Layer 2 of the OSI reference model.
PPTP uses the Microsoft Challenge Handshake Authentication Protocol (MSCHAP) to
authenticate user information before granting access to network resources in a VPN.
The encryption protocol used by PPTP is Microsoft Point-to-Point Encryption (MPPE).
PPTP is included in the Windows family of operating systems beginning with Windows
95.
Advantages
Compatibility with Microsoft’s Windows by Default:
The first major advantage of using PPTP is the fact that if you use a computer that
operates using Microsoft’s Windows, it supports PPTP by default. This means that you
will not experience a lot of trouble trying to install the required software and make it
run smoothly.
Ease of Use:
The second major advantage of using PPTP protocol is the fact that when you set it up,
it is much easier because the data is normally not encrypted using IPsec. This means
that you will not need to install computer certificates or a public key infrastructure to
access and use the protocol.
Cost-Effective:
The third major benefit of using this protocol is the fact that it is very cheap compared
to some options such as L2TP and others. This is because it is quite easy to install.
Actually, with basic networking knowledge, you can do it all by yourself. It has also
been discovered that the protocol does not need many certificates to run, this means you
will not need to spend money getting or creating them. The fourth advantage is the fact
that this protocol is uncomplicated and hence, easy to use.
Disadvantages
PPTP has some limitations and here are some of the most popular ones:
Low Security Standards:
To start with, PPTP is said to have poorer security compared to the other protocols.
Secondly, PPTP does not offer data integrity or data origin verification. This means that
you cannot be sure whether the data that is sent over this protocol is authentic or has
been tampered with. This significantly lowers the reliability of using the protocol
especially if your company is dealing with very sensitive information.
Lower Performance on Unstable Connections:
The other disadvantage associated with this protocol is that it normally has performance
issues when used on unstable networks. Generally, it can be termed as an acceptable
Basics of Networking Page 130
Srinivas University BCA IInd Semester
way to connect workers and share documents. However, it will not be of much help if
you have a lot of private information that you need to share.
Disadvantages
L2TP has no encryption on its own. It must be paired with IPSec for proper online
security.
L2TP and L2TP/IPSec have been allegedly weakened or cracked by the NSA – though,
that’s only according to Snowden, and there’s no hard proof to back up that claim.
Due to its double encapsulation feature, L2TP/IPSec tends to be a bit resource-intensive
and not extremely fast.
L2TP can be blocked by NAT firewalls if it’s not further configured to bypass them.
for negotiating, establishing, modification and deletion of SAs and related parameters.
It defines the procedures and packet formats for peer authentication creation and
management of SAs and techniques for key generation. It also includes mechanisms
that mitigate certain threats e.g., Denial Of Service (DOS) and anti-replay protection.
In ISAKMP, SA and key management are separate from any key exchange protocols;
so, in a sense ISAKMP is an "abstract" protocol it provides a framework for
authentication and key management and supports many actual key exchange protocols
(e.g., IKE). ISAKMP defines header and payload formats, but needs an instantiation to
a specific set of protocols. Such an instantiation is denoted as the ISAKMP Domain Of
Interpretation (DOI): an example of this for the IPsec/IKE is the IPsec DOI
IPSec can be used in two modes, transport mode and tunnel mode, In the transport
mode, the data is encrypted but not encapsulated, In the tunnel mode, the data is encrypted as
well as encapsulated, The transport mode is used when communication occurs between two
end points whereas the tunnel mode is used when either of the devices is not an endpoint, such
as a gateway. For example, if a VPN client is contacting a node in a corporate network, the
transport mode is used, whereas the tunneling mode is used when a VPN host and a VPN client
communicate with the help of a VPN gateway. The gateway manages the encryption and
encapsulation of data.
Advantages of IPSec
Network layer security:
IPSec operates at layer 3, the network layer. As a result, it has no impact on higher
network layer. In other words, one of the biggest advantage of IPSec is its transparency
to applications. The end user need not have to bother about the IPSec or its
configuration. Additionally, as it works at the network layer, IPSec allows to monitor
all the traffic that passes over the network.
Confidentiality:
Similarly, the second advantage of IPSec is that it offers confidentiality. During any
data exchange, IPSec uses public keys that helps to safely transfer confidential data. As
a result, securing the keys ensure safe data transfer. Additionally, these keys helps to
verify that the data has come from the correct host. Therefore, it becomes rather
impossible to forge the data packets.
Zero dependability on Application:
IPSec security is implemented at the network layer. Thus, it do not depend on the
applications used. IPSec only requires modification to the operating system. As a result,
IPsec-based VPNs do not need to worry about the type of application too. That’s not
the case with SSL based VPNs, where it requires modification to individual
applications. This is yet another reason for the popularity of IPSec.
Disadvantages of IPsec
Wide access range:
One of the greatest disadvantage of IPSec is its wide access range. Giving access to a
single device in IPSec-based network, can give access privileges for other devices too.
For instance, imagine that you are connecting to a corporate network from your IPSec
based home network. Here, if any of the computer in your home network has malware
in it, it can easily spread to the computers in the corporate network. Unless there are
special security mechanisms, vulnerabilities that exist at the IP layer will pass on to the
corporate network across the IPSec tunnel.
Compatibility issues:
Secondly, IPSec brings in couple of compatibility issues with software too. This
happens when software developers do not adhere to the standards of IPSec. Similarly,
when you are already on IPSec based VPN, connecting to another network will be
rather impossible due to restrictions in firewalls. Again, IPsec does not provide support
for multi-protocol and IP multicast traffic.
CPU Overhead:
Unfortunately, IPSec is well known for the high CPU usage. It requires quite a bit of
processing power to encrypt and decrypt all the data that passes through the server.
When the data packet size is small, the performance of the network diminishes due to
large overhead used by IPsec.
Broken Algorithms:
Again, security of certain algorithms used in IPSec is a concern. If, someone uses these
broken algorithms, server will be at a greater risk of hack. Luckily, there are readily
available newer and complex algorithms that overcome the known vulnerabilities.
In this section, you have understood the features of VPN. You have learned about the
advantages of VPN. You also learned about the different protocols used to implement VPN and
their features. The next chapter details the different devices such as routers and gateways that
are used to set up WANs.
QUESTION BANK
11. What is the Maximum data transfer rate limit of Switched 56?
a. 56Kbps
b. 56bps
c. 56Mbps
d. None of the above
13. Which among the following is the popular connectivity option to set up LAN?
a. POTS
b. ISDN
c. VSAT
d. All the above
15. Which among the following receives microwave signals and converts them to digital
signals?
a. Digital modem
b. Radio Frequency
c. Antenna
d. None of the above
19. Which function make sure packets cannot be read by unauthorized sources?
a. Authentication
b. Encryption
c. Decryption
d. Data Integrity
UNIT-V
CHAPTER-7
WAN HARDWARE AND PROTOCOLS
WAN Devices
In the previous chapter, you learned that WAN extends the benefits offered by LAN.
You also learned about the different connectivity options used to interconnect LANs. However,
the LANs may be using different protocols, so they may not be able to communicate. For
example, consider the example of an organization having LANs in its offices at Shanghai and
Tokyo. The LANs can connect using VPN, but the LAN in Shanghai uses Ethernet whereas
the LAN in Tokyo uses Token Ring, preventing the LANs from being able to communicate.
Similarly, a LAN that uses TCP/IP may need to communicate with another LAN that
uses IPX/SPX. In such cases, the following devices are used to interconnect LANs:
Bridges
Routers
Gateways
BRIDGES
Bridges connect two networks that use different Layer 2 protocols, and translate data
between them. Bridges use the MAC addresses stored by Layer 2 protocols to transmit data
across networks. For example, a translating bridge can be used to transmit data between one
network using Ethernet and another network using Token Ring. Bridges are also used to
divide a large network into smaller broadcast domains to reduce the network traffic
and improve the efficiency of the network.
For example, consider an organization that sells books for school students. The
organization has three departments: Finance, Marketing, and Stores. The Marketing department
is responsible for obtaining orders for the sale of books whereas the Stores department
is responsible for delivering the orders. The Finance department keeps track of the order
values generated by the Marketing department. The organization computerizes the operations
of these departments, and connects all the computers in an Ethernet LAN. The Finance
department connects to computers in the Marketing department each day at 1800 hours to
obtain the value of orders generated for that day. The Stores department also connects to
computers in the Marketing department at 1800 hours to obtain the size of orders. The
computers within each department, however, communicate frequently to maintain updated
information.
In the preceding example, since all the computers are connected to a single
network, each computer broadcasts data to all the computers, so network traffic increases.
By dividing the LAN into three smaller broadcast domains, one each for the Finance,
Marketing, and Stores departments, the network traffic can be minimized. However, the
departments need to communicate about updates at the end of each day, so the three
broadcast domains can be connected with the help of a bridge. The bridge divides a
network into separate broadcast domains and reduces the network traffic while maintaining
connectivity between all the computers. The primary use of a bridge is, however, to connect
two networks that use different Layer 2 protocols. If a bridge connects two networks that are
physically close to one another, the bridge is called a local bridge. On the contrary, a
remote bridge connects geographically dispersed networks. Figure represents local and remote
bridges.
Depending on the manner in which bridges transmit data among networks, they are divided
into Two types:
Transparent bridges
Source route bridges
Transparent Bridges
A transparent bridge stores the MAC (Media Access Control) addresses of the
nodes in both networks, and uses this information to transmit data between the networks.
Whenever a node sends a data packet, the bridge checks for its destination MAC address. The
destination MAC address may either be in the same network from which the data packet
arrived or in a different network.
If the destination MAC address is in the same network, the bridge ignores the data
packet. This process is known as filtering. However, if the destination MAC address is in a
different network, the bridge forwards the data packet to the respective network, known as
The information on MAC addresses, nodes, and ports are stored in a data table
which is initially empty. The following example illustrates the complete functioning of a
transparent bridge.
Assume that the network represented by Figure is just set up and Node A sends data
to Node D. This process involves the following steps:
1. Data sent from Node A to Node D reaches the bridge through Port 1.
2. The bridge creates an entry in the data table, associating Node A with Port 1.
3. The bridge does not know the location of Node D, so the data packet is forwarded
through both Port 1 and Port 2.
4. Node D replies back to Node A, and the data from Node D reaches the bridge through
Port 2.
5. The bridge forwards the data only to Port 1 because it knows that Node A is connected
to Port 1.
6. The bridge immediately creates another entry in the table associating Node D with
Port 2.
From this point on, any data to Node A is forwarded only to Port 1, and data
to Node D is forwarded to Port 2. Similarly, when Node A sends data to Node B, the
following steps take place:
1. Data from Node A to Node B is again forwarded to both the ports because the bridge
still does not have information on Node B.
2. Node B replies to Node A, and the data reaches the bridge through Port 1.
3. This data is not forwarded to Port 2 because the bridge has already associated Node
with Port 1.
4. The bridge also adds an entry in the data table associating Node B with Port 1.
The bridge concludes that Nodes A and B are part of the same network. From this
point on, any data from Node A to Node B (or vice versa) is filtered. The bridge keeps updating
the data table until it contains entries for all the nodes.
You have learned that the transparent bridge associates nodes to ports and
concludes that a set of nodes is part of the same network. Any data transfer between nodes
of the same network is not forwarded to the other ports. This functionality of a transparent
bridge works well even if there are multiple networks connected with multiple bridges.
However, this functionality fails when there is more than one bridged path connecting
two networks, as shown in below Figure.
1. The data from Node A reaches Port 1 as well as Port 3. Bridge 1 does not know the
location of Node I, so it forwards the data through Port 2, and associates Node A
with Port 1. Even Bridge 2 does not know the location of Node I, so it forwards
the data through Port 4, and associates Node A with Port 3.
2. The data forwarded through Port 2 reaches Port 4, and the data forwarded through Port
4 reaches Port 2. Bridges 1 and 2 still do not have information on the location of
Node I, so they forward the data received on Port 2 to Port 1, and Port 4 to Port 3.
However, the data received by Bridges 1 and 2 on Ports 2 and 4 belong to Node A.
Therefore, the data table is updated by associating Node A to Ports 2 and 4, instead of
Ports 1 and 3. Tomorrow
3. Step 1 repeats itself because the data from Port 1 reaches Port 3, and Port 3 reaches
Port 1. The data table is updated to associate Node A with Ports 1 & 3.
Steps 1-3 represent a loop. The loop continues to exist until Bridge 3 communicates
the location of Node I to Bridges 1 and 2. It can be observed that a huge amount of
unnecessary traffic occurs as a result of this loop. The loop is caused by the presence
of more than one bridge between two networks. To overcome this problem of loops,
IEEE has defined an algorithm for bridges called the Spanning Tree algorithm.
connect networks, the bridges communicate among themselves to develop a spanning tree.
You have learned about the features of a transparent bridge. Transparent bridges are
well suited to connect multiple Ethernet networks because nodes in an Ethernet LAN
broadcast the Data. Therefore, the bridge can receive the data, check for the MAC address,
and forward the data to the appropriate segment.
traffic because of the routing information generated by each source node whenever it
wishes to send data across the networks. High network traffic significantly pulls down the
network performance.
Bridges work at the data-link layer, and cannot be used across networks that
use different network layer protocols. In addition, bridges cannot select an alternate path that
the data packet should take if the original path encounters problems such as a device
failure. Also, bridges cannot be used to selectively filter network traffic. For example, a bridge
cannot be used to prevent traffic from a particular node from entering a different network.
These drawbacks are overcome by routers, as described in the following topic.
The difference between Transparent Bridge and Source Routing Bridge are as following:
Transparent bridge Source routing bridge
Transparent bridge service is Source Routing Bridge service is
connectionless. connection oriented.
In transparent bridge mechanism bridges In source routing bridge, bridges do not
automatically develop a routing table. maintain any routing information.
Transparent bridge does not support Source routing bridge can make use of
multipath routing. multiple path to same destination.
The path used by transparent bridge Source route bridge always uses the
between any two hosts may not be the optimal path.
optimal path.
Failures are handled by the transparent Host handle the failure of bridge on its
bridge on its own. own.
Transparent bridges are fully transparent to Source routing bridges are not visible to
the users. the hosts.
ROUTERS
Like bridges, routers also filter and forward information among different networks.
However, routers work at the network layer (Layer3), so they use the network addresses for
filtering and forwarding information. In addition, routers can also provide additional features
such as the ability to determine the best route for a destination and filtering information from a
particular node.
Routers store the network addresses of computers in different networks in a table,
called the routing table. In addition to the network addresses, the routing table also contains
information on the path that should be used to transmit data, and any rules that have been
defined for filtering network traffic. Whenever a router receives a data packet, it checks
for the network address of the destination. If the destination address is in a different
network than the source address, it checks the routing table for the path the packet needs
to take to reach the destination. If a route is found, the packet is forwarded to the specified
path. Otherwise the data packet is filtered. To understand how routers work, consider an
example of multiple networks connected by routers as represented in Figure.
4. Router 3 checks the destination address of the data packet against its routing table.
As the destination address of the data packet matches the network address of
Node H, the router forwards the data packet to Node H.
From the above example, it is clear that the router is not only responsible for ensuring
that the data packet reaches the correct destination but also in preventing the data packet from
being Sent to incorrect networks. Figure however, represents a very simple scenario in
which only one path exists between Node A and Node H. Consider a more complex network
represented by Figure.
ROUTING MECHANICS
When multiple paths are available to transmit data across networks, the most
appropriate path is selected either by the source node or the router. If the source node
selects the path, the process is called node-based routing. If the router determines the path, the
process is called router-based routing.
The most appropriate path is usually the lowest-cost path. The cost of a path is
determined by using metrics, such as number of hops, percentage of data loss, or the
network traffic on that route. The network administrator specifies the metrics for a route.
The lowest-cost path is the route with the least metric value. At times, however, the
network administrator may give importance to reliability in which case the most appropriate
path is the most reliable path.
Node-based Routing
In node-based routing, the source node determines the path to be taken by the data
packet to reach the destination node. This type of routing is also called source-based
routing. Before sending the data packet, the source node compares the internetwork
address of the destination node against the entries in its internal routing table to check if
the destination node is part of the same network. If the destination node is in the same
network, the source node directly sends the data to the destination.
If the destination node is outside the network, the source node sends a packet to the
destination node to trace the entire route. After obtaining the route information, the
source node provides the entire path that should be taken by the data packet to reach the
destination. In case of node- based routing, the routers perform a function similar to a bridge.
The routers do not decide the path of the data packets but forward the data packets depending
on the path information included with the packet.
As the source node needs to determine the different possible paths to the
destination, and then select a path to be taken by the data packet, this form of routing
increases network traffic. Also, this form of routing causes considerable delay in transfer of
data packets because the source node needs to first determine the complete path before
sending .the data packet. Node- based routing is generally used to troubleshoot network
problems, such as a router failure, in a network.
Router-based Routing
In this method of routing, the source node checks if the destination node is present in
the same network. If the destination is not in the same network, the source node forwards the
data packet to the default gateway of the network, which is usually a router. The router then
decides on the path to be taken by the data packet to reach the destination. The path is
decided based Routing Table
A routing table typically contains the path information for data packets to reach a
particular internetwork. In some cases, the path to reach a particular node in an internetwork
may also be available. Usually, the routing table also contains a default path, which is
used when no path information is available to reach a particular internetwork. In
addition, the following information is stored in a routing table:
Network ID: The Network ID is the network address of a particular internetwork, or a
node address of a particular internetwork. This field contains a value such as
198.162.66.0, which is the address of an internetwork or a value such as 198.162.66.4,
which is the network address of a node in a particular internetwork.
Subnet mask: The subnet mask is a 32-bit value used to distinguish one network
from another.
Gateway address: This field contains either the physical or network layer
address of the node or network to which the data packets are to be forwarded.
Interface: The interface is the port that is used to forward data packets.
Metric: The value of metric is proportional to the cost of the route. The cost of the
route is calculated considering factors such as number of hops, delay, bandwidth or
throughput, and reliability. A low metric value indicates a low-cost path, so the path
with the lowest metric value is preferable.
If the routing table of the node does not contain information to reach the destination,
the data packet is forwarded to the network gateway.
ROUTING PROTOCOLS
The routing protocol decides the contents of the routing table that are to be
advertised. For example, the routing table consists of several routes but the routing protocol
may allow advertising of new routes only. The most commonly used routing protocols are:.
RIP (Routing Information Protocol)
OSPF (Open Shortest Path First)
GATEWAYS
Gateway is a generic term used to represent devices that connect two dissimilar
networks. Gateways can be hardware devices, software running on a computer, or a
combination. Depending on the manner in which a gateway connects the networks, the
following types of gateways are defined:
Network gateways
Protocol gateways
Tunneling gateways
Network gateways connect different networks that use the same network layer protocol.
Network gateways are usually routers, which contain routes to reach nodes outside the network
to which the router is connected (refer Topic, Routers for detailed information on routers).
Protocol gateways connect networks that use different network layer protocols. For
example, a protocol gateway can transmit data between a network that uses IPX/SPX and
another network that uses TCP/IP. Protocol gateways convert the addressing format of the data
packet from the source network to match the addressing format used in the destination
network. In the preceding example, if the data originates from the IPX/SPX network, the
addressing format of the data packet is converted to TCP/IP addressing, and the data is
transmitted to the TCP/IP network.
Tunneling gateways encapsulate the data packet of the source network in a protocol that
is recognized by the destination network. For example, if the source network uses
IPX/SPX, and the destination network uses TCP/IP, the gateway encapsulates or wraps
the IPX/SPX data with TCP/IP headers and trailers so that the destination network can
recognize the data packet. The router on the destination network unwraps the data
packet to retrieve the original data, which is then transmitted to the destination node. Gateways
used in Virtual Private Networks (VPNs) are examples of tunneling gateways. Below Figure
represent a tunneling gateway transferring information between two networks.
networks using the same network layer protocol. Gateways are capable of transmitting data
across networks that use different network layers protocols. The next section details the
different types of protocols used for WAN communication.
Advantages of using a Gateway:
1. It can connect the devices of two different networks having dissimilar structures.
2. It is an intelligent device with filtering capabilities.
3. It has control over both collisions as well as a broadcast domain.
4. It uses a full-duplex mode of communication.
5. It has the fastest data transmission speed amongst all network connecting devices.
6. It can perform data translation and protocol conversion of the data packet as per the
destination network's need.
7. It can encapsulate and decapsulate the data packets.
8. It has improved security than any other network connecting device.
WAN PROTOCOLS
WAN communication is significantly different from LAN communication largely due
to the difference in the geographical area covered. In LAN s, the primary consideration when
developing a Layer 2 protocol is to maximize the speed of communication, whereas in
WANs, the primary concern is reliability. This is due to the fact that LANs are generally
closed circuits, with a lower possibility of unauthorized sources affecting the data. In
WAN s, however, the possibility of data getting corrupted, or being read by unauthorized
sources, is very high, so reliability is the primary concern. To ensure reliability of the data, the
following Layer 2 protocols are commonly used in WAN:
Point-to-Point Protocol (PPP)
X.25
Frame Relay
ATM (Asynchronous Transfer Mode)
Point-to-Point Protocol:
PPP is a protocol suite that provides connectivity between devices that use a serial
interface. The most common use of PPP is in connecting to an ISP where a computer
connects to the server of the ISP to access the Internet with the help of a serial device,
usually a modem. PPP is also used in VPNs where individual computers may need to connect
to a corporate network. PPP can also be used to dial into a Windows NT/2000 Remote Access
Service (RAS) server.
PPP supports a wide range of physical media, such as twisted pair cables, or optical
fiber cables. Although PPP was originally used to encapsulate data packets with IP so
that they can be transmitted over the Internet, PPP is now compatible with most Layer 3
protocols such as IPX/SPX and DECnet. PPP consists of the following protocols:
Link Control Protocol (LCP): LCP is used to establish the connection between
the two serial devices. LCP can also be used to configure and test the connection.
Network Control Protocols (NCPs): NCPs select a Layer 3 protocol, such as IP or
IPX, for communication between the two serial devices. NCPs allow the use of multiple
Layer 3 protocols simultaneously.
High-Level Data Link Control (HDLC): HDLC encapsulates the data being
transmitted by PPP between the two serial devices.
When a serial device needs to communicate with another serial device over PPP, it
sends an LCP frame to establish and configure the connection between the devices. After the
connection is established, NCP frames are sent to select a Layer 3 protocol that will be
used for communication. Once a network layer protocol is selected, data packets are exchanged
between the two serial devices. The connection between the devices remains active until one of
the LCP or NCP frames terminates the connection. The connection is terminated at the end
of the data transfer, or due to external activity such as a device failure, or expiration of
inactivity timer. PPP does not support connections that require high bandwidths, such
as 1 Mbps, so it finds limited application in WAN.
X.25
X.25 is a protocol suite developed by the International Telecommunication Union-
Telecommunication Standardization Section (ITU- T) for circuit-switching WAN networks.
X.25 is commonly used with Switched 56 and ISDN. X.25 defines the manner in which
connections between user devices, such as computers, and network devices, such as
routers, are established and maintained in a WAN. The devices used in an X.25 connection
can be divided into the following categories:
Data Terminal Equipment (DTE): These are devices, such as terminals, nodes in a
network, or computers. DTEs are usually located in the premises of individual
subscribers.
Data Circuit-terminating Equipment (DCE): These are devices that establish a
communication path between DTEs in different networks. Examples of DCEs include
modems and switches.
Packet-Switching Exchange (PSE): PSE is a term used to refer the equipment used by
the telecommunications carrier to transmit information across different networks.
X.25 is a very old protocol, and can be used only for circuit-switched networks. For packet-
switched networks, a newer protocol, called Frame Relay, is used.
FRAME RELAY
Frame Relay is a protocol use ‘for packet-switching networks, and is an enhancement
of the features offered by the X.25 protocol. Frame Relay is faster compared to X.25
because it uses fewer error-checking mechanisms. Unlike X.25 that uses Plain Old Telephone
System (POTS) for data transfer, Frame Relay is implemented on a more reliable media, such
as optical fiber cables, drastically reducing the number of errors. Consequently, Frame
Relay uses fewer error correction mechanisms.
Frame Relay is a connection-oriented protocol, and defines the path to be taken by
the data packet from the source node to the destination node. The connection between the
source node and the destination node is called a virtual circuit. The following subtopic
describes the role of virtual circuits in a Frame Relay protocol-based WAN.
Virtual Circuits:
Virtual circuits provide a two-way communication path between nodes. The virtual
circuits used in Frame Relay WAN are of two types:
virtual circuits to the destination. The data transfer rate depends on the network traffic in
the virtual circuits and, as a result, it is possible that any important data being transferred
across the network is delayed. In order to prevent such delays, Frame Relay uses a concept
of Committed Information Rate (CIR).
CIR is the amount of bandwidth that a Frame Relay service provider assures the
subscriber at the time of providing the connectivity. For example, if you subscribe to Frame
Relay connectivity with a CIR of 64 Kbps, the service provider assures that you will be
able to use 64 Kbps at any point of time, irrespective of the network traffic. In addition, a
Maximum Information Rate (MIR), which is the maximum bandwidth that would be
available to the user depending on the network traffic, is also specified at the time of
subscription. In practice, the actual bandwidth used depends on the data being transferred,
and varies between the CIR and MIR. In situations where the user is not certain about
the bandwidth required, it is suggested to purchase connectivity with a higher CIR.
Depending on the usage pattern over a period of time, the user can downgrade to a
lower CIR. In fact, it is possible to purchase connectivity with a CIR of 0 but the risk of
data loss is extremely high.
Frame Relay offers faster data transfer rates than X.25 but the maximum data
transfer rate is limited to 1.544 Mbps, used by at -1 line. Frame Relay circuits also suffer from
the problem of network congestion from time to time. This network congestion can result in
dropped frames and loss of important data. In addition, Frame Relay does not use any error-
checking mechanism, and therefore, it is not possible to detect lost or corrupt frames.
bytes, and contains information on the payload, virtual circuit taken by the payload, and error
checking. Also, ATM is a connection-oriented protocol, and therefore specifies the path to
reach the destination. This purpose is served by the virtual circuit information present in the
cell header. In addition, the user can also specify the network resources that should be
used by the cell to reach the destination with the help of the following ATM classes:
Constant Bit Rate (CBR): In this class, the user needs to decide on the bandwidth
required at the time of subscribing to an ATM service from a service provider.
For example, a CBR of 64 Kbps implies that the data will be transferred at a
constant rate of 64 Kbps irrespective of the actual requirement of the application or
network traffic.
Variable Bit Rate (VBR): This class allows the user to specify the peak
bandwidth requirement and the standard bandwidth requirement. The amount of
bandwidth utilized is dependent on the data to be transferred. For example, if a user has
subscribed to a peak bandwidth of 128kbps and standard bandwidth of 64 kbps, the
actual data transfer rate wil be between 64 and 128kbps depending on the data and
bandwidth availability.
Available Bit Rate (ABR): In this class, the bandwidth depends on the network
traffic. If the network traffic is low, the bandwidth available to the user increases.
If network traffic is high, the bandwidth decreases. A minimum guaranteed
bandwidth is provided but the actual bandwidth is usually more, depending on the
network traffic. For example, the user may be assured of 128 Kbps at the time
of subscription but the user may be able to transmit data at 156 Kbps provided
the network traffic is low.
Unspecified Bit Rate (UBR): There is no minimum bandwidth provided to the
user. The bandwidth depends entirely on network traffic. If network traffic is very high,
no bandwidth is allocated to the user. This class is usually used to transfer data that
can-tolerate delays.
QUESTION BANK
(Questions for Application)
3. What would you think if the destination address is in same network the bridge
ignores the data packet is called?
a. Filtering
b. Forwarding
c. Ignoring
d. None of the above
4. What would you think if the destination address is in different network the bridge
forwards the data packet is called?
a. Filtering
b. Forwarding
c. Ignoring d
d. None of the above
5. Which type of bridge specifies entire path to be taken by the data packet?
a. Source Route Bridges
b. Transparent Bridges
c. Node based Bridge
d. Translational bridge
11. Which type of gateway connect different network that use the same network layer
Protocol?
a. Network gateway
b. Protocol gateway
c. Tunneling gateway
d. All the above
12. Which type of gateway connect network that use the different network layer
Protocol?
a. Network gateway
b. Protocol gateway
c. Tunneling gateway
d. All the above
14. ATM Reference model maps with which 2 layers of OSI Reference model?
a. Layer 1 and 2
b. Layer 2 and 3
c. Layer 1 and 3
d. Layer 2 and 4
15. Which protocol is commonly used in ISDN?
a. PPP
b. X.25
c. ATM
d. Frame Relay
20. Which of the following connect 2 networks the use different layer 2 protocol and
translate data between them?
a. Bridge
b. Routers
c. Gateways
d. None of the above
21. Which among the following protocol is not under X.25 protocol?
a. PLP
b. LAPB
c. X.21 bis
d. LCP
22. Which among the following protocols is not under PPP protocol?
Basics of Networking Page 164
Srinivas University BCA IInd Semester
a. NCP
b. HDLC
c. LCP
d. LAPB
24. Which among the following class allow user to specify the peak bandwidth
requirement and standard bandwidth requirement?
a. CBR
b. VBR
c. ABR
d. UBR
PAPER: 17BCASD23
MODEL QUESTION PAPER
BASICS OF NETWORKING
1. What is protocol?
a. Set of rules
b. Set of computers
c. Set of hardware’s
d. Set of software’s
2. Can you name the device used to translate communication protocols and enables 2
similar/ dissimilar LAN's.
a. Routers
b. Gateways
c. Bridges
d. Hubs
3. Why Ethernet is popular protocol used in LAN?
a. It supports Coaxial, twisted-pair and optical-fiber Cable
b. Supports bus and star topologies
c. Costs less to set up than ARC net, Token Ring or FDDI LANs
d. All the above
4. Application layer of IPX/SPX is equivalent to which of the following layers?
a. Application, Presentation and session
b. Application and Session
c. Presentation and Session
d. None of the above
5. How is CIDR similar to?
a. Classless Inter Domain Routing
b. Classless Internal Domain Routing
c. Class full Inter Domain Routing’
d. Class full Internal Domain Routing
6. What do you think by broadcasting?
a. Sending the packet to every workstation of all the neighboring networks.
b. Sending the copy of the message packet to all the workstations of a given
network.
c. Sending a msg packet to an individual workstation.
d. Sending the copy to a specific host.
7. What is the Maximum data transfer rate limit of Switched 56?
a. 56Kbps
b. 56bps
c. 56Mbps
d. None of the above
8. IPSec can be used in how many modes?
a. 2
b. 3
c. 4
d. 5
9. What would you think if the destination address is in different network the bridge
forwards the data packet is called?
a. Filtering
b. Forwarding
c. Ignoring
d. None of the above
10. Which protocol is commonly used in ISDN?
a. PPP
b. X.25
c. ATM
d. Frame Relay
11. Which among the following protocol is not under X.25 protocol?
a. PLP
b. LAPB
c. X.21 bis
d. LCP
12. What is the other name for Extended C-band?
a. C-band
b. XC-band
c. Ku-band
d. EC-band
UNIT I
(4+4=8)
1. Can you name and explain the hardware components of networking.
2. Can you explain different layers of OSI reference model?
OR
3. Can you Explain Ring topology with its advantages and disadvantages.
4. Can you explain in your own words about optical fiber cables?
UNIT II
(4+4=8)
5. Can you Explain the different aspects of communication in network protocols
6. Analyze the working of POP protocol.
OR
7. How would you explain the fault management and tolerance in token ring network?
8. Analyze the protocols that work at TCP/IP layer
UNIT III
(4+4=8)
9. How would you explain the communication across subnets are done
10. Analyze NETBEUI Addressing with explanation
OR
UNIT IV
(4+4=8)
13. Can you differentiate between LAN and WAN
14. Analyze the working of Internet Protocol Security with example
OR
UNIT V
(4+4=8)
17. Discuss the elements of routing table
18. Can you differentiate between transparent Bridge and Source route Bridges.
OR
19. Debate on the working of Routing Information Protocol
20. How would you explain the process of data transmission in transparent Bridge when it
contains only one path between two nodes.
**************************