Computer Networking
Computer Networking
Where at least one process in one device is able to send/receive data to/from at least one process
residing in a remote device, then the two devices are said to be in a network.
Using a network, people can communicate efficiently and easily via email, instant
messaging, chat rooms, telephone, video telephone calls, and video conferencing.
In a network environment, authorized users may access data and information stored on
other computers on the network. The capability of providing access to data and
information on shared storage devices is an important feature of many networks.
Share network and computing resources.
In a networked environment, each computer on a network may access and use resources
provided by devices on the network, such as printing a document on a shared network
printer.
Distributed computing uses computing resources across a network to accomplish tasks.
Computers can be managed centrally - with the same software installed on each one
Time - it is much faster to install an application once on a network - and copy it across the
network to every workstation
Security - the Network Manager can allocate usernames and passwords to all users to try to
prevent unauthorized access
It is easy and convenient to monitor users - for example websites visited or documents printed -
this can be done using software running on the server
If something goes wrong with the file server the whole network is unable to operate
The technical skills needed to manage a network are much higher than working on a stand-alone
computer
It would take a long time to install software applications on each computer - one at a time!
It can be frustrating to print to a printer in another room - and then find after a long trek - that
there is no paper in the printer!
Users may use too much bandwidth - for example when listening to music files or watching
In September 1940 George Stibitz used a teletype machine to send instructions for a problem set
from his Model at Dartmouth College in New Hampshire to his Complex Number Calculator in
New York and received results back by the same means. Linking output systems like teletypes to
computers was an interest at the Advanced Research Projects Agency (ARPA) when, in 1962,
J.C.R. Licklider was hired and developed a working group he called the "Intergalactic Network",
a precursor to the ARPANet. Throughout the 1960s Leonard Kleinrock, Paul Baran and Donald
Davies independently conceptualized and developed network systems which used datagrams or
packet information technology that could be used in a network between computer systems. In
1969 the University of California at Los Angeles, SRI (in Stanford), University of California at
Santa Barbara, and the University of Utah were connected as the beginning of the ARPANet
network using 50 Kbit/s circuits. Commercial services using X.25 were deployed in 1972, and
later used as an underlying infrastructure for expanding TCP/IP networks. Now a day‘s computer
networks are the core of modern communication. All modern aspects of the Public Switched
Telephone Network (PSTN) are computer-controlled, and telephony increasingly runs over the
Internet Protocol, although not necessarily the public Internet. The scope of communication has
increased significantly in the past decade and this boom in communications would not have been
possible without the progressively advancing computer network
If you have a printer attached to your computer, you can share it with anyone on the same
network. It doesn't matter what type of printer it is, as long as the printer is installed on your
computer and directly attached with a universal serial bus (USB) cable or other type of printer
cable. Whoever you choose to share the printer with will be able to use it to print, provided they
can locate your computer on the network.
Consider, for example, the desire to communicate using words, pictures, and sounds. Each of
these messages can be sent across a data or information network by first converting them into
binary digits, or bits. These bits are then encoded into a signal that can be transmitted over the
appropriate medium.
The term network in this course will refer to data or information networks capable of carrying
many different types of communications, including traditional computer data, interactive voice,
video, and entertainment products.
Current wired LANs are most likely to be based on Ethernet technology, although new standards
like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial
cables, phone lines and power lines).
Other Type
•Wireless LANs and WANs(WLAN & WWAN) are the wireless equivalent of the LAN and
WAN. Using a communications channel that combines many types of media such as telephone
lines, cables, and air waves.
A network topology is the layout of the interconnections of the nodes of a computer network.
Physical topology refers to the physical organization of a network.
IV.1Star topology
• All of the stations in a star topology are connected to a central unit called a hub.
The hub offers a common connection for all stations on the network. Each station has its own
direct cable connection to the hub.
In most cases, this means more cable is required than for a bus topology. However, this makes
adding or moving computers a relatively easy task; simply plug them into a cable outlet on the
wall.
If a cable is cut, it only affects the computer that was attached to it. This eliminates the single
point of failure problem associated with the bus topology. (Unless, of course, the hub itself goes
down.)
Star topologies are normally implemented using twisted pair cable, specifically unshielded
twisted pair (UTP). The star topology is probably the most common form of network topology
currently in use.
A bus topology connects each computer (node) to a single segment trunk (Backbone).
– A ‘trunk‘ is a communication line, typically coaxial cable, that is referred to as the
‘bus.‘ The signal travels from one end of the bus to the other.
– A terminator is required at each end to absorb the signal so it does not reflect back across
the bus.
IV.3Ring topology
A ring topology consists of a set of stations connected serially by cable. In other words, it‘s a
• Note that while this topology functions logically as ring, it is physically wired as a star.
The central connector is not called a hub but a Multistation Access Unit or MAU.
(Don‘t confuse a Token Ring MAU with a ‗Media Adapter Unit‘ which is actually a
transceiver.)
• Under the ring concept, a signal is transferred sequentially via a "token" from one station
to the next. When a station wants to transmit, it "grabs" the token, attaches data and an
address to it, and then sends it around the ring. The token travels along the ring until it
reaches the destination address. The receiving computer acknowledges receipt with a
return message to the sender. The sender then releases the token for use by another
computer.
• Each station on the ring has equal access but only one station can talk at a time.
• In contrast to the ‗passive‘ topology of the bus, the ring employs an ‗active’ topology.
Each station repeats or ‘boosts‘ the signal before passing it on to the next station.
• Rings are normally implemented using twisted pair or fiber-optic cable
Also called mesh topology or a mesh network, mesh is a network topology in which devices are
connected with many redundant interconnections between network nodes. In a true mesh
topology every node has a connection to every other node in the network.
There are two types of mesh topologies: full mesh and partial mesh.
Partially mesh topology is the type of network topology in which some of the nodes of the
network are connected to more than one other node in the network with a point-to-point link.
This makes it possible to take advantage of some of the redundancy that is provided by a
physical fully connected mesh topology without the expense and complexity required for a
connection between every node in the network.
Note: In most practical networks that are based upon the partially connected mesh topology, all
of the data that is transmitted between nodes in the network takes the shortest path between
nodes, except in the case of a failure or break in one of the links, in which case the data takes an
alternative path to the destination. This requires that the nodes of the network possess some type
of logical 'routing' algorithm to determine the correct path to use at any particular time.
Full mesh topology occurs when every node has a circuit connecting it to every other node in a
network.
Full mesh is very expensive to implement but yields the greatest amount of redundancy, so in
the event that one of those nodes fails, network traffic can be directed to any of the other nodes.
Full mesh is usually reserved for backbone networks.
The arrangement of the network nodes is such that it is possible to transmit data from one node
to many other nodes at the same time.
The arrangement wherein every network node is connected to every other node of the network,
many of the connections serve no major purpose. This leads to the redundancy of many of the
network connections.
Types of cables
Types of cables used for LANs include twisted pair, coaxial cables, fiber optic cables and Patch
cable.
Two basic types of twisted-pair cable exist: unshielded twisted pair (UTP) and shielded twisted
pair (STP).
UTP cable is a four-pair wire medium used in a variety of networks. It consists of copper wires
that have been twisted into matching pair. The individual pair is not protected with additional
protection from interference. Each copper wire is insulated, and the groups of twisted pair have a
sheathing holding them together, but no additional insulation is provided.
UTP cable often is installed using a Registered Jack 45 (RJ-45) connector. The
RJ-45 is an eight-wire connector used commonly to connect computers onto a local-area network
(LAN), especially Ethernets.
STP cable combines the techniques of shielding, cancellation, and wire twisting.
The following summarizes the features of STP cable:
Speed and throughput—10 to 100 Mbps
Average cost per node—Moderately expensive
Media and connector size—Medium to large
Maximum cable length—100 m (short)
When comparing UTP and STP, keep the following points in mind:
The speed of both types of cable is usually satisfactory for local-area distances.
These are the least-expensive media for data communication. UTP is less expensive than
STP.
Because most buildings are already wired with UTP, many transmission standards are
adapted to use it, to avoid costly rewiring with an alternative cable type.
a. Straight cable
- Computer to switch/hub
- Connect two switches/hubs with one of the switch/hub using an uplink port and the other one
using normal port.
b. Crossover cable
A crossover cable is used to connect computing devices together directly. It is a cable to connect
two devices of the same type: two host or two switches to each other.
V.1.2 Coaxial
• A coaxial cable or coax, is a cable which consists of an inner conductor wire surrounded by
insulation, called the dielectric.
Coaxial cabling is the primary type of cabling used by the cable television industry and is also
widely used for computer networks.
Although more expensive than standard telephone wire, it is much less susceptible to
interference and can carry much more data.
Category Use
RG-59 Cable TV
BNC
Definition
Fiber-optic cable is a networking medium capable of conducting modulated light transmission.
Many extremely thin strands of glass or plastic bound together in a sheathing which transmits
signals with light beams. It can be used for voice, data, and video.
That technology uses glass (or plastic) threads (fibers) to transmit data. A fiber optic cable
consists of a bundle of glass threads, each of which is capable of transmitting messages
modulated onto light waves.
Fiber optics has several advantages over traditional metal communications lines:
Fiber optic cables have a much greater bandwidth than metal cables. This means
that they can carry more data
Fiber optic cables are less susceptible than metal cables to interference
Fiber optic cables are much thinner and lighter than metal wires
Data can be transmitted digitally (the natural form for computer data) rather than
analogically.
The main disadvantage of fiber optics is that the cables are expensive to install. In addition, they
are more fragile than wire and are difficult to split.
Fiber optics is a particularly popular technology for local-area networks. In addition, telephone
companies are steadily replacing traditional telephone lines with fiber optic cables. In the future,
almost all communications will employ fiber optics.
Fiber Types
Two types of fiber-optic cable exist:
• Single-mode—Single-mode fiber cable allows only one mode (or wavelength) of light to
propagate through the fiber. It is capable of higher bandwidth and greater distances than
multimode, and it is often used for campus backbones. This type of fiber uses lasers as the light-
generating method. Single-mode cable is much more expensive than multimode cable. Its
maximum cable length is more than 10 km.
Type Mode
Fiber construction
The light-guiding parts of an optical fiber are called the core and the cladding. The core is
usually very pure glass with a high index of refraction. When a cladding layer of glass or plastic
with a low index of refraction surrounds the core glass, light can be trapped in the fiber core.
This process is called total internal reflection. It allows the optical fiber to act like a light pipe,
guiding light for tremendous distances, even around bends.
Fiber optic is not susceptible to EMI, and it is capable of higher data rates than any of the other
types of networking media. Fiber-optic cable does not carry electrical impulses as other forms of
networking media that use copper wire do. Instead, signals that represent bits are converted into
beams of light.
Features of fiber-optible
The following summarizes the features of fiber-optic cables:
Speed and throughput—More than 1 Gbps
Average cost per node—Expensive
Media and connector size—Small
Maximum cable length—More than 10 km for single mode; up to 2 km for multimode
Definitions
-A Serial cable is a cable which is connected to the serial/COM port on the computer.
-A serial cable is a cable that can be used to transfer information between two devices
using serial communication. The form of connectors depends on the particular serial port used. A
cable wired for connecting two data terminal equipment directly is known as a null modemcable.
-In computing, a serial port is a serial communication physical interface through which
information transfers in or out one bit at a time (in contrast to a parallel port).
Wireless communication uses radio frequencies (RF) or infrared (IR) waves to transmit data
between devices on a LAN. For wireless LANs, a key component is the wireless hub, or access
point, used for signal distribution.
To receive the signals from the access point, a PC or laptop must install a wireless adapter card
(wireless NIC).
Some common applications of wireless data communication include the following:
• Accessing the Internet using a cellular phone
• Establishing a home or business Internet connection over satellite
• Beaming data between two hand-held computing devices
• Using a wireless keyboard and mouse for the PC.
Advantages and disadvantages of wireless LAN
Convenience - The wireless nature of such networks allows users to access network
resources from nearly any convenient location within their primary networking
environment (home or office). With the increasing saturation of laptop-style computers,
this is particularly relevant.
Mobility - With the emergence of public wireless networks, users can access the internet
even outside their normal work environment. Most chain coffee shops, for example, offer
their customers a wireless connection to the internet at little or no cost.
Productivity - Users connected to a wireless network can maintain a nearly constant
affiliation with their desired network as they move from place to place. For a business,
this implies that an employee can potentially be more productive as his or her work can
be accomplished from any convenient location.
Deployment - Initial setup of an infrastructure-based wireless network requires little
more than a single access point. Wired networks, on the other hand, have the additional
cost and complexity of actual physical cables being run to numerous locations (which can
even be impossible for hard-to-reach locations within a building).
Expandability - Wireless networks can serve a suddenly-increased number of clients
with the existing equipment. In a wired network, additional clients would require
additional wiring.
Wireless LANs – Wireless local area network use a high-frequency radio technology similar to
digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum
technology to enable communication between multiple devices in a limited area. An example of
open-standards wireless radio-wave technology is IEEE 802.11.
V.2.1.1 Infrared
Infrared signals are used for short-range wireless communication in a closed area (not more
than 10 meters) using line-of-sight propagation. The line-of-sight propagation limits the physical
positioning of communicating devices. This technology is used to connect various computing
devices such as handheld computers. They can transfer files and other digital data bidirectional.
Computer infrared adapters both transmit and receive data through ports on the rear or side of a
device.
Unlike WIFI and Bluetooth technologies, infrared network signals cannot penetrate walls or
other obstructions and work only in the direct line of sight.
Working Principle
An infrared connection is communication between an infrared receiver and emitter. The infrared
emitter sends pulses of infrared light to the receiver. Infrared light is used because it has less
problems with interference than other types of light in the visible spectrum. Usually, there are
only two devices in the connection, but the system still needs a computer name and a common
protocol. The computer name is needed in case there are multiple devices in the range of the
connection. This way, the right devices can be selected for the connection. The use of the
protocol has to be explained with the way the devices recognize the infrared signal. A chip inside
the device analyses the infrared pulses that come in to detect any patterns. If a pattern is
Performance
- The directed transmission is safe, while it uses a short range direct line of sight signal which is
not diffused.
- The infrared technology has been available for a long time, which means that the technology is
well developed and that there is a lot of knowledge.
- The connection is restricted to a small range, with a maximum area depending on the used
equipment. (0.3 meters for directed signals and up to five meters for diffused infrared)
- The signal can be of bad quality or can be interrupted due to a wrong angle, distance, noise,
heat or light waves.
V.2.1.2 Bluetooth
Bluetooth is a proprietary open wireless technology standard for exchanging data
over short distances (using short wavelength radio transmissions in the ISM band
from 2400-2480 MHz) from fixed and mobile devices, creating personal area
networks (PANS) with high levels of security. It has been created by telecoms
vendor Ericsson in 1994. It was originally conceived as a wireless alternative to
RS-232 data cables. It can connect several devices, overcoming problems of synchronization.
Examples of use:
Uses
A Wi-Fi-enabled device can connect to the Internet when within range of a wireless network
connected to the Internet.
Advantages
Wi-Fi allows cheaper deployment of local area networks (LANs). Also spaces where cables
cannot be run, such as outdoor areas and historical buildings, can host wireless LANs.
Manufacturers are building wireless network adapters into most laptops. The price of chipsets for
Wi-Fi continues to drop, making it an economical networking option included in even more
devices.
Products designated as "Wi-Fi Certified" by the Wi-Fi Alliance are backwards compatible.
Unlike mobile phones, any standard Wi-Fi device will work anywhere in the world.
The current version of Wi-Fi Protected Access encryption (WPA2) as of 2010 is widely
considered secure, provided users employ a strong passphrase. New protocols for quality-of-
service (WMM) make Wi-Fi more suitable for latency-sensitive applications (such as voice and
video); and power saving mechanisms (WMM Power Save) improve battery operation.
Disadvantage
Due to reach requirements for wireless LAN applications, Wi-Fi has fairly high power
consumption compared to some other standards.
Range
Wi-Fi networks have limited range. A typical wireless access point using 802.11b or 802.11g
with a stock antenna might have a range of 32 m indoors and 95 m outdoors. IEEE 802.11n,
however, can exceed that range by more than two times. Range also varies with frequency band.
Wi-Fi in the 2.4 GHz frequency block has slightly better range than Wi-Fi in the 5 GHz
frequency block which is used by 802.11a. On wireless routers with detachable antennas, it is
possible to improve range by fitting upgraded antennas which have higher gain. Outdoor ranges
can be improved to many kilometers through the use of high gain directional antennas at the
router and remote device(s). In general, the maximum amount of power that a Wi-Fi device can
transmit is limited by local regulations, such as FCC Part 15 in the US.
Bluetooth and Infrared are types of serial connections, like USB (universal serial bus).
This means that these two types of communication are made primarily to exchange data between
two devices directly. One device sends and the other receives.
Infrared works by sending data as infrared light. In order for this to work the two infrared ports
must be in optical line of sight. This is best accomplished by having the two ports face each other
at close range (about 4 inches).
Bluetooth works by using radio frequency (RF) waves to exchange data. This is faster than
infrared and easier to connect as the ports do not need to be as close to one another or in line of
sight.
Wi-fi also uses RF waves to exchange data; however wi-fi has a larger range than Bluetooth.
Additionally wi-fi is a system that is primarily designed for network and internet communication.
This means that a wi-fi connection connects you to a wireless access point (most often a router)
that routes and connects you to other devices (often more than one) such as the internet.
1 Main difference
The main difference between the two technologies is that Bluetooth devices communicate one-
on-one with each other, whereas Wi-Fi devices communicate with any other device through a
wireless router.
3 Usage Differences
Bluetooth is generally used for transmitting audio, such as from your cell phone to your wireless
earpiece. Wi-Fi is generally used for transmitting Internet signals from your cable or DSL
modem to and from your computer.
2 History
WiFi has been available longer to the general public than Bluetooth.
Microwave system uses very high frequency radio signals to transmit data through space. The
transmitter and receiver of a microwave system should be in line-of-sight because the radio
signal cannot bend. With microwave very long distance transmission is not possible. In order to
overcome the problem of line of sight and power amplification of weak signal, repeaters are used
at intervals of 25 to 30 kilometers between the transmitting and receiving end.
Line of sight is used in microwave communication systems which to transmit information from
one place to another without interruption, and have clear reproduction at the receiver.
Microwaves are widely used for point-to-point communications because their small wavelength
allows conveniently-sized antennas to direct them in narrow beams, which can be pointed
directly at the receiving antenna. This allows nearby microwave equipment to use the same
frequencies without interfering with each other, as lower frequency radio waves do. Microwaves
are limited to line of sight propagation. Their disadvantages are that they cannot pass around hills
or mountains as lower frequency radio waves can.
V.4.1 Satellite
• Communications satellites are relay stations that receive signals from one earth station and
rebroadcast them to another
The satellites are stationed in space, typically 35,400 km (22,000 mi) (for geosynchronous
satellites) above the equator. These Earth-orbiting systems are capable of receiving and relaying
voice, data, and TV signals.
Terrestrial microwave – Terrestrial microwaves use Earth-based transmitter and receiver. The
equipment looks similar to satellite dishes. Terrestrial microwaves use low-gigahertz range,
which limits all communications to line-of-sight. Path between relay stations spaced approx,
48 km (30 mi) apart.
Bands
In the client-server scheme, a central server handles all security and file transactions; in peer-to-
peer networks, each machine shares its own resources and handles its own security.
P2P networks can be set up in the home, a business or over the Internet. Each network type
requires all computers in the network to use the same or a compatible program to connect to each
other and access files and other resources found on the other computer. P2P networks can be
used for sharing content such as audio, video, data or anything in digital format.
P2P is a distributed application architecture that partitions tasks or workloads among peers. Peers
are equally privileged participants in the application. Each computer in the network is referred to
as a node. The owner of each computer on a P2P network would set aside a portion of its
resources - such as processing power, disk storage or network bandwidth -to be made directly
available to other network participant, without the need for central coordination by servers or
stable hosts
Advantages and disadvantages of peer to peer network
Advantages (Why) Disadvantages (Why)
Peer to Peer Networks are easy and simple to If you have not connected the computers
set up and only require a Hub or a Switch to together properly then there can be problems
connect all the computers together. accessing certain files.
You can access any file on the computer as long It doesn‘t always work if you have many
as it is set to shared folder. computers and works better with 2 – 8
computers.
The requirements for a Peer to Peer Network Security is not good and you can set passwords
are that you have a 10 Base T Ethernet cable for files that you don‘t want people to access
and an Ethernet hub/ switch. This is rather but apart from that the security is pretty poor.
cheap than having a server.
The architecture of the lay out (How It
Connects) is simple.
If one computer fails to work all the other
computers connected to it continue to work.
Servers typically store files and databases including more complex applications like Web sites.
Servers‘ devices often feature higher-powered central processors, more memory, and larger disk
drives than clients.
While working Network clients make requests to a server by sending messages, and servers
respond to their clients by acting on each request and returning results. One server generally
supports numerous clients, and multiple servers can be networked together in a pool to handle
the increased processing load as the number of clients grows.
Network servers typically are configured with additional processing, memory and storage
capacity to handle the load of servicing clients. Common types of network servers include:
Web servers
proxy servers
FTP servers
online Game servers
Numerous systems use this client / server networking model including Web sites and email
services. An alternative model, peer-to-peer networking enables all computers to act as either a
server or client as needed.
For instance, a peer-to-peer network has no central server. Each workstation on the network
shares its files equally with the others. There‘s no central storage or authentication of users.
Conversely, there are separate dedicated servers and clients in a client/server network. Through
client workstations, users can access most files, which are generally stored on the server. The
server will determine which users can access the files on the network.
Peer-to-peer networks should be installed in homes or in very small businesses where employees
interact regularly. They are inexpensive to set up (comparatively speaking); however, they offer
almost no security. On the other hand, client/server networks can become as big as you need
them to be. Some support millions of users and offer elaborate security measures. As you can
imagine, client/server networks can become very expensive.
Apart from the physical communications media themselves as described above, networks
comprise additional basic hardware building blocks interconnecting their terminals, such as
network interface cards (NICs), hubs, bridges, switches, and routers.
A network card, network adapter, or NIC (network interface card) is a piece of computer
hardware designed to allow computers to physically access a networking medium. It provides a
low-level addressing system through the use of MAC addresses.
Each Ethernet network interface has a unique MAC address which is usually stored in a small
memory device on the card, allowing any device to connect to the network without creating an
address conflict. Ethernet MAC addresses are composed of six octets. Uniqueness is maintained
by the IEEE, which manages the Ethernet address space by assigning 3-octet prefixes to
equipment manufacturers. The list of prefixes is publicly available. Each manufacturer is then
obliged to both use only their assigned prefix(es) and to uniquely set the 3-octet suffix of every
Ethernet interface they produce.
VII.1.2 Repeaters
Repeaters require a small amount of time to regenerate the signal. This can cause a propagation
delay which can affect network communication when there are several repeaters in a row. Many
network architectures limit the number of repeaters that can be used in a row (e.g. Ethernet's 5-4-
3 rule).
VII.1.3 Hub
A hub can be defined as a network device used to connect segments of a LAN. A hub contains
multiple ports. When a packet arrives at one port, it is copied to the other ports so that all
segments of the LAN can see all packets.
1. A passive hub serves simply as a conduit for the data, enabling it to go from one device
(or segment) to another.
2. Intelligent hubs include additional features that enable an administrator to monitor the
traffic passing through the hub and to configure each port in the hub. Intelligent hubs are
also called manageable hubs.
3. A third type of hub, called a switching hub, actually reads the destination address of each
packet and then forwards the packet to the correct port.
Today, repeaters and hubs have been made mostly obsolete by switches (see below).
VII.1.4 Bridges
Connects different LANs or LAN segments, two or more networks, using the same access
method, with the same protocol, at the media control portions of the data link layer.
A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI
model.
Bridges broadcast to all ports except the port on which the broadcast was received.
However, bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which
MAC addresses are reachable through specific ports. Once the bridge associates a port and an
address, it will send traffic for that address to that port only.
Bridges learn the association of ports and addresses by examining the source address of frames
that it sees on various ports. Once a frame arrives through a port, its source address is stored and
VII.1.5 Switches
A switch is a device which link network segments, forward and filter frames between segments
A network switch is a device that forwards and filters OSI layer 2 datagrams (chunks of data
communication) between ports (connected cables) based on the MAC addresses in the packets.
A switch is distinct from a hub in that it only forwards the frames to the ports involved in the
communication rather than all ports connected.
A switch breaks the collision domain but represents itself as a broadcast domain.
Some switches are capable of routing based on Layer 3 addressing or additional logical levels;
these are called multi-layer switches.
The term switch is used loosely in marketing to encompass devices including routers and
bridges, as well as devices that may distribute traffic on load or by application content (e.g., a
Web URL identifier).
VII.1.6 Routers
1. A router is a network device that connect networks having the same or different access
methods and media.
2. A router is an inter-networking device that forwards packets between networks by
processing information found in the data gram or packet (Internet protocol information
from Layer 3 of the O S I Model). In many situations, this information is processed in
conjunction with the routing table (also known as forwarding table).
A router operates at the network level of the OSI model and features more sophisticated
addressing software than bridges. Can determine preferred paths.
Routers use routing tables to determine what interface to forward packets (this can include the
"null" also known as the "black hole" interface because data can go into it, however, no further
processing is done for said data).
VII.1.7 Firewalls
A firewall is an important aspect of a network with respect to security. It typically rejects access
requests from unsafe sources while allowing actions from recognized ones. The vital role
firewalls play in network security grows in parallel with the constant increase in 'cyber' attacks
for the purpose of stealing/corrupting data, planting viruses, etc.
VII.1.8 Gateway
Operates at or above the OSI transport layer and links LANs or networks that use different
architectures and use dissimilar protocols. Enable communications between two different types
of networked systems.
There are benefits to using a layered model to describe network protocols and operations. Using
a layered model:
Assists in protocol design, because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above and below.
Fosters competition because products from different vendors can work together.
Prevents technology or capability changes in one layer from affecting other layers above
and below.
A protocol model provides a model that closely matches the structure of a particular protocol
suite. The hierarchical set of related protocols in a suite typically represents all the functionality
required to interface the human network with the data network. The TCP/IP model is a protocol
model because it describes the functions that occur at each layer of protocols within the TCP/IP
suite.
A reference model provides a common reference for maintaining consistency within all types of
network protocols and services. A reference model is not intended to be an implementation
specification or to provide a sufficient level of detail to define precisely the services of the
network architecture. The primary purpose of a reference model is to aid in clearer understanding
of the functions and process involved.
The Open Systems Interconnection (OSI) model is the most widely known internetwork
reference model. It is used for data network design, operation specifications, and
troubleshooting.
Although the TCP/IP and OSI models are the primary models used when discussing network
functionality, designers of network protocols, services, or devices can create their own models to
represent their products. Ultimately, designers are required to communicate to the industry by
relating their product or service to either the OSI model or the TCP/IP model, or to both.
The OSI Reference Model represented an early attempt to get all of the various hardware and
software manufacturers to agree on a framework for developing various networking
technologies.
In the late 1970s, two projects began independently, with the same goal: to define a unifying
standard for the architecture of networking systems. One was administered by the International
Organization for Standardization (ISO), while the other was undertaken by the International
Telegraph and Telephone Consultative Committee, or CCITT(the abbreviation is from the
French version of the name). These two international standards bodies each developed a
document that defined similar networking models.
In 1983, these two documents were merged together to form a standard called The Basic
Reference Model for Open Systems Interconnection. That's a mouthful, so the standard is usually
referred to as the Open Systems Interconnection Reference Model, the OSI Reference Model, or
even just the OSI Model. It was published in 1984 by both the ISO, as standard ISO 7498.
7. Application Layer
6. Presentation Layer
5. Session Layer
4. Transport Layer
3. Network Layer
2. Data Link Layer
1. Physical Layer
To remember them, a convenient aid for remembering the OSI layer names is to use the first
letter of each word in the phrase:
All People Seem To Need Data Processing
This is the layer at which programs are identified; user authentication and privacy are
implemented. It supports application and end-user processes. Communication partners are
identified, quality of service is identified, user authentication and privacy are considered, and any
constraints on data syntax are identified. Everything at this layer is application-specific. This
layer provides application services for file transfers, e-mail, and
other network software services. Telnet and FTP are applications that exist entirely in the
application level.
Summary:
• The top layer of the OSI model
• Provides a set of interfaces for sending and receiving applications to gain access to and
use network services, such as: networked file transfer, message handling and database
query processing
This is a layer, usually part of an operating system that converts incoming and outgoing data
from one presentation format to another(translating data from application to network format, and
vice versa). The presentation layer works to transform data into the form that the application
Summary:
Summary:
Summary:
• Manages the transmission of data across a network
• Manages the flow of data between parties by segmenting long data streams into smaller
data chunks (based on allowed ―packet‖ size for a given transmission medium)
Summary:
• Handles addressing messages for delivery, as well as translating logical network
addresses and names into their physical counterparts
• Responsible for deciding how to route transmissions between computers
• This layer also handles the decisions needed to get data from one point to the next point
along a network path
• This layer also handles packet switching and network congestion control
This layer provides error control and synchronization for the physical level. At this layer, data
packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and
management and handles errors in the physical layer, flow control and frame synchronization.
The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and
the Logical Link Control (LLC) layer. The MAC sub layer control show a computer on the
network gains access to the data and permission to transmit it. The LLC layer controls
frame synchronization, flow control and error checking.
Summary:
• Handles special data frames (packets) between the Network layer and the Physical layer
• At the receiving end, this layer packages raw data from the physical layer into data
frames for delivery to the Network layer
• At the sending end this layer handles conversion of data into raw formats that can be
handled by the Physical Layer
Summary:
• Converts bits into electronic signals for outgoing messages
• Converts electronic signals into bits for incoming messages
• This layer manages the interface between the the computer and the network medium
(coax, twisted pair, etc.)
• This layer tells the driver software for the MAU (media attachment unit, ex. network
interface cards (NICs, modems, etc.)) what needs to be sent across the medium
• The bottom layer of the OSI model
Most protocol models describe a vendor-specific protocol stack. However, since the TCP/IP
model is an open standard, one company does not control the definition of the model. The
definitions of the standard and the TCP/IP protocols are discussed in a public forum and defined
in a publicly-available set of documents. These documents are called Requests for Comments
(RFCs). They contain both the formal specification of data communications protocols and
resources that describe the use of the protocols.
The RFCs also contain technical and organizational documents about the Internet, including the
technical specifications and policy documents produced by the Internet Engineering Task Force
(IETF).
The TCP/IP model describes the functionality of the protocols that make up the TCP/IP protocol
suite. These protocols, which are implemented on both the sending and receiving hosts, interact
to provide end-to-end delivery of applications over a network.
The protocols that make up the TCP/IP protocol suite can be described in terms of the OSI
reference model. In the OSI model, the Network Access layer and the Application layer of the
TCP/IP model are further divided to describe discreet functions that need to occur at these layers.
At the Network Access Layer, the TCP/IP protocol suite does not specify which protocols to use
when transmitting over a physical medium; it only describes the handoff from the Internet Layer
to the physical network protocols. The OSI Layers 1 and 2 discuss the necessary procedures to
access the media and the physical means to send data over a network.
The key parallels between the two network models occur at the OSI model Layers 3 and 4. OSI
Model Layer 3, the Network layer, almost universally is used to discuss and document the range
of processes that occur in all data networks to address and route messages through an
internetwork. The Internet Protocol (IP) is the TCP/IP suite protocol that includes the
functionality described at Layer 3.
Layer 4, the Transport layer of the OSI model, is often used to describe general services or
functions that manage individual conversations between source and destination hosts. These
functions include acknowledgement, error recovery, and sequencing. At this layer, the TCP/IP
protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) provide the
necessary functionality.
The TCP/IP Application layer includes a number of protocols that provide specific functionality
to a variety of end user applications. The OSI model Layers 5, 6 and 7 are used as references for
application software developers and vendors to produce products that need to access networks
for communications.
Security means Freedom from danger, fear or ensuring safety. Measures adopted to prevent the
authorized use, misuse modification or denial of use of knowledge or facts, data or capabilities.
Network security is an issue of great significance today where a single problem can change the
fate of companies and organization. A single layer of security cannot ensure good security.
Effective security is achieved by the combination of all security disciplines. Computer security is
critical in almost any technology-driven industry which operates on computer systems.
Computer security can also be referred to as computer safety. The issues of computer based
systems and addressing their countless vulnerabilities are an integral part of maintaining an
operational industry. The prominent security technologies and product categories used today are
anti-virus software, firewalls, smart cards, biometrics, intrusion detection, policy management,
vulnerability scanning, encryption etc.
Cryptography is ―The science of protecting data‖ & Network Security ―keeping information
private and Secure from unauthorized Users‖. This paper gives the Fundamental Requirements
In the field of networking, the area of network security[20] consists of the provisions and policies
adopted by the network administrator to prevent and monitor unauthorized access, misuse,
modification, or denial of the computer network and network-accessible resources. Network
security is the authorization of access to data in a network, which is controlled by the network
administrator. Users are assigned an ID and password that allows them access to information and
programs within their authority. Network Security covers a variety of computer networks, both
public and private that are used in everyday jobs conducting transactions and communications
among businesses, government agencies and individuals.
Protocols define the details of how the message is transmitted, and delivered. This includes
issues of:
Message format
Message size
Timing
Encapsulation
Encoding
Standard message pattern Many of the concepts and rules that make human communication
reliable and understandable also apply to computer communication.
The size restrictions of frames require the source host to break a long message into individual
pieces that meet both the minimum and maximum size requirements. Each piece is encapsulated
in a separate frame with the address information, and is sent over the network. At the receiving
host, the messages are de-encapsulated and put back together to be processed and interpreted.
a. Flow Control
In network communication, a sending host can transmit messages at a faster rate than the
destination host can receive and process. Source and destination hosts use flow control to
negotiate correct timing for successful communication.
b. Response Timeout
Hosts on the network also have rules that specify how long to wait for responses and what action
to take if a response timeout occurs.
There are also times when the sender of a message needs to be sure that the message is delivered
successfully to the destination. In these cases, it is necessary for the recipient to return an
acknowledgement to the sender. If no acknowledgement is required, the message pattern is
referred to as unacknowledged.
A one-to-one message pattern is referred to as a unicast, meaning that there is only a single
destination for the message.
If all hosts on the network need to receive the message at the same time, a broadcast is used.
Broadcasting represents a one-to-all message pattern. Additionally, hosts have requirements for
acknowledged versus unacknowledged messages.
As networks became more widespread, standards were developed that defined rules by which
network equipment from different vendors operated. Standards are beneficial to networking in
many ways:
Facilitate design
Simplify product development
Promote competition
Provide consistent interconnections
Facilitate training
There is no official local networking standard protocol, but over time, one technology, Ethernet,
has become more common than the others. It has become a de facto standard.
2. A protocol is a set of rules which allow defining the communication mode between two
entities, software or material.
3. A Network protocol is a set of rules that lead communication between two computers.
Communication is the process or means by which information is sent from one place to the other.
OSI model
SNA (Systems Network Architecture) of IBM Company.
Etc…
In general protocols roles allow insuring that data is sent and received in proper format to the
destination. There is no unique protocol but a set of protocols which serve communication
purpose. Here are some roles of protocols:
4. Message protocols SMTP (Simple Mail Transfer Protocol), POP (Post office
Protocol) and IMAP (Internet Message Access Protocol)
SMTP: plays role of sending and receiving e-mail but it is limited to the ability of queuing
messages at the receiving end.
X.1. Definition
An IP address is a logical address for a network adapter. The IP address uniquely identifies
computers on a TCP/IP network.
Each device on a network must be uniquely defined. At the Network layer, the packets of the
communication need to be identified with the source and destination addresses of the two end
systems. With IPv4, this means that each packet has a 32-bit source address and a 32-bit
destination address in the Layer 3 header.
These addresses are used in the data network as binary patterns. Inside the devices, digital logic
is applied for their interpretation. For us in the human network, a string of 32 bits is difficult to
interpret and even more difficult to remember. Therefore, we represent IPv4 addresses using
dotted decimal format.
An IP address can be private - for use on a local area network (LAN) - or public - for use on the
Internet or other wide area network (WAN).
Internet Protocol (IP) technology was developed in the 1970s to support some of the first
research computer networks. Today, IP has become a worldwide standard for home and business
networking as well. Our network routers, Web browsers, email programs, instant messaging
software - all rely on IP or other network protocols layered on top of IP.
Two versions of IP technology exist today. Essentially all home computer networks use IP
version 4 (IPv4), but an increasing number of educational and research institutions have adopted
the next generation IP version 6 (IPv6).
For each IPv4 address, some portion of the high-order bits represents the network address. At
Layer 3, we define a network as a group of hosts that have identical bit patterns in the network
address portion of their addresses.
Although all 32 bits define the IPv4 host address, we have a variable number of bits that are
called the host portion of the address. The number of bits used in this host portion determines the
number of hosts that we can have within the network.
is written in dotted decimal as 10.0.0.1 Because each byte contains 8 bits, each octet in an IP
address ranges in value from a minimum of 0 to a maximum of 255. Therefore, the full range of
IP addresses is from0.0.0.0 through 255.255.255.255. That represents a total of 4,294,967,296
possible IP addresses.
hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh
In this full notation, pairs of IPv6 bytes are separated by a colon and each byte in turns is
represented as a pair of hexadecimal numbers, like in the following example:
E3D7:0000:0000:0000:51F4:9BC8:C0A8:6420
As shown above, IPv6 addresses commonly contain many bytes with a zero value.Shorthand
notation in IPv6 removes these values from the text representation (though the bytes are still
present in the actual network address) as follows:
E3D7::51F4:9BC8:C0A8:6420
Finally, many IPv6 addresses are extensions of IPv4 addresses. In these cases, the rightmost four
bytes of an IPv6 address (the rightmost two byte pairs) may be rewritten in the IPv4 notation.
Converting the above example to mixed notation yields
E3D7::51F4:9BC8:192.168.100.32
IPv6 addresses may be written in any of the full, shorthand or mixed notation illustrated above.
Within the address range of each IPv4 network, we have three types of addresses:
A. Network Address
The network address is a standard way to refer to a network. For example, we could refer to the
network shown in the figure as "the 10.0.0.0 network." This is a much more convenient and
descriptive way to refer to the network than using a term like "the first network." All hosts in the
10.0.0.0 network will have the same network bits.
Within the IPv4 address range of a network, the lowest address is reserved for the network
address. This address has a 0 for each host bit in the host portion of the address.
The IPv4 broadcast address is a special address for each network that allows communication to
all the hosts in that network. To send data to all hosts in a network, a host can send a single
packet that is addressed to the broadcast address of the network.
The broadcast address uses the highest address in the network range. This is the address in which
the bits in the host portion are all 1s. For the network 10.0.0.0 with 24 network bits, the
broadcast address would be 10.0.0.255. This address is also referred to as the directed broadcast.
C. Host Addresses
As described previously, every end device requires a unique address to deliver a packet to that
host. In IPv4 addresses, we assign the values between the network address and the broadcast
address to the devices in that network.
An important question is: How do we know how many bits represent the network portion and
how many bits represent the host portion? When we express an IPv4 network address, we add a
prefix length to the network address. The prefix length is the number of bits in the address that
gives us the network portion. For example, in 172.16.4.0 /24, the /24 is the prefix length - it tells
us that the first 24 bits are the network address. This leaves the remaining 8 bits, the last octet, as
the host portion. Later in this chapter, we will learn more about another entity that is used to
specify the network portion of an IPv4 address to the network devices. It is called the subnet
mask. The subnet mask consists of 32 bits, just as the address does, and uses 1s and 0s to indicate
which bits of the address are network bits and which bits are host bits.
Networks are not always assigned a /24 prefix. Depending on the number of hosts on the
network, the prefix assigned may be different. Having a different prefix number changes the host
range and broadcast address for each network.
At this point, you may be wondering: How do we calculate these addresses? This calculation
process requires us to look at these addresses in binary.
In the example network divisions, we need to look at the octet of the address where the prefix
divides the network portion from the host portion. In all of these examples, it is the last octet.
While this is common, the prefix can also divide any of the octets.
To get started understanding this process of determining the address assignments, let's break
some examples down into binary.
See the figure for an example of the address assignment for the 172.16.20.0 /25 network.
In the first box, we see the representation of the network address. With a 25 bit prefix, the last 7
bits are host bits. To represent the network address, all of these host bits are '0'. This makes the
last octet of the address 0. This makes the network address 172.16.20.0 /25.
In the second box, we see the calculation of the lowest host address. This is always one greater
than the network address. In this case, the last of the seven host bits becomes a '1'. With the
lowest bit of host address set to a 1, the lowest host address is 172.16.20.1.
The third box shows the calculation of the broadcast address of the network. Therefore, all seven
host bits used in this network are all '1s'. From the calculation, we get 127 in the last octet. This
gives us a broadcast address of 172.16.20.127.
The fourth box presents the calculation of the highest host address. The highest host address for a
network is always one less than the broadcast. This means the lowest host bit is a '0' and all other
host bits as '1s'. As seen, this makes the highest host address in this network 172.16.20.126.
Although for this example we expanded all of the octets, we only need to examine the content of
the divided octet.
In an IPv4 network, the hosts can communicate one of three different ways:
Unicast - the process of sending a packet from one host to an individual host
Broadcast - the process of sending a packet from one host to all hosts in the network
Multicast - the process of sending a packet from one host to a selected group of hosts
These three types of communication are used for different purposes in the data networks. In all
three cases, the IPv4 address of the originating host is placed in the packet header as the source
address.
A. Unicast Traffic
Unicast communication is used for the normal host-to-host communication in both a client/server
and a peer-to-peer network. Unicast packets use the host address of the destination device as the
destination address and can be routed through an internetwork. Broadcast and multicast,
however, use special addresses as the destination address. Using these special addresses,
broadcasts are generally restricted to the local network. The scope of multicast traffic also may
be limited to the local network or routed through an internetwork.
B. Broadcast Transmission
Broadcast transmission is used for the location of special services/devices for which the address
is not known or when a host needs to provide information to all the hosts on the network.
C. Multicast Transmission
Multicast transmission is designed to conserve the bandwidth of the IPv4 network. It reduces
traffic by allowing a host to send a single packet to a selected set of hosts. To reach multiple
destination hosts using unicast communication, a source host would need to send an individual
packet addressed to each host. With multicast, the source host can send a single packet that can
reach thousands of destination hosts.
Expressed in dotted decimal format, the IPv4 address range is 0.0.0.0 to 255.255.255.255. As
you have already seen, not all of these addresses can be used as host addresses for unicast
communication.
Although most IPv4 host addresses are public addresses designated for use in networks that are
accessible on the Internet, there are blocks of addresses that are used in networks that require
limited or no Internet access. These addresses are called private addresses.
A. Private Addresses
Private space address blocks, as shown in the figure, are set aside for use in private networks.
The use of these addresses need not be unique among outside networks. Hosts that do not require
access to the Internet at large may make unrestricted use of private addresses. However, the
internal networks still must design network address schemes to ensure that the hosts in the
private networks use IP addresses that are unique within their networking environment.
With services to translate private addresses to public addresses, hosts on a privately addressed
network can have access to resources across the Internet. These services, called Network
Address Translation (NAT), can be implemented on a device at the edge of the private network.
NAT allows the hosts in the network to "borrow" a public address for communicating to outside
networks. While there are some limitations and performance issues with NAT, clients for most
applications can access services over the Internet without noticeable problems.
B. Public Addresses
The vast majority of the addresses in the IPv4 unicast host range are public addresses. These
addresses are designed to be used in the hosts that are publicly accessible from the Internet. Even
within these address blocks, there are many addresses that are designated for other special
purposes.
There are certain addresses that cannot be assigned to hosts for various reasons. There are also
special addresses that can be assigned to hosts but with restrictions on how those hosts can
interact within the network.
As explained earlier, within each network the first and last addresses cannot be assigned to hosts.
These are the network address and the broadcast address, respectively.
B. Default Route
Also presented earlier, we represent the IPv4 default route as 0.0.0.0. The default route is used as
a "catch all" route when a more specific route is not available. The use of this address also
reserves all addresses in the 0.0.0.0 - 0.255.255.255 (0.0.0.0 /8) address block.
C. Loopback
One such reserved address is the IPv4 loopback address 127.0.0.1. The loopback is a special
address that hosts use to direct traffic to themselves. The loopback address creates a shortcut
method for TCP/IP applications and services that run on the same device to communicate with
one another. By using the loopback address instead of the assigned IPv4 host address, two
services on the same host can bypass the lower layers of the TCP/IP stack. You can also ping the
loopback address to test the configuration of TCP/IP on the local host.
Although only the single 127.0.0.1 address is used, addresses 127.0.0.0 to 127.255.255.255 are
reserved. Any address within this block will loop back within the local host. No address within
this block should ever appear on any network.
IPv4 addresses in the address block 169.254.0.0 to 169.254.255.255 (169.254.0.0 /16) are
designated as link-local addresses. These addresses can be automatically assigned to the local
host by the operating system in environments where no IP configuration is available. These
might be used in a small peer-to-peer network or for a host that could not automatically obtain an
address from a Dynamic Host Configuration Protocol (DHCP) server.
Communication using IPv4 link-local addresses is only suitable for communication with other
devices connected to the same network, as shown in the figure. A host must not send a packet
with an IPv4 link-local destination address to any router for forwarding and should set the IPv4
TTL for these packets to 1.
Link-local addresses do not provide services outside of the local network. However, many
client/server and peer-to-peer applications will work properly with IPv4 link-local addresses.
E. TEST-NET Addresses
The address block 192.0.2.0 to 192.0.2.255 (192.0.2.0 /24) is set aside for teaching and learning
purposes. These addresses can be used in documentation and network examples. Unlike the
experimental addresses, network devices will accept these addresses in their configurations. You
may often find these addresses used with the domain names example.com or example.net in
RFCs, vendor, and protocol documentation. Addresses within this block should not appear on the
Internet.
The unicast address classes A, B, and C defined specifically-sized networks as well as specific
address blocks for these networks, as shown in the figure. A company or organization was
assigned an entire class A, class B, or class C address block. This use of address space is referred
to as class-full addressing.
The allocation of these addresses inside the networks should be planned and documented for the
purpose of:
With a static assignment, the network administrator must manually configure the network
information for a host. At a minimum, this includes entering
the host IP address,
subnet mask,
default gateway.
Static addresses have some advantages over dynamic addresses. For instance, they are useful for
printers, servers, and other networking devices that need to be accessible to clients on the
network. If hosts normally access a server at a particular IP address, it would cause problems if
that address changed. Additionally, static assignment of addressing information can provide
S6 CEL COMPUTER NETWORKING Page 74
increased control of network resources. However, it can be time-consuming to enter the
information on each host.
When using static IP addressing, it is necessary to maintain an accurate list of the IP address
assigned to each device. These are permanent addresses and are not normally reused.
Because of the challenges associated with static address management, end user devices often
have addresses dynamically assigned, using Dynamic Host Configuration Protocol (DHCP).
DHCP enables the automatic assignment of addressing information such as IP address, subnet
mask, default gateway, and other configuration information. The configuration of the DHCP
server requires that a block of addresses, called an address pool, be defined to be assigned to the
DHCP clients on a network. Addresses assigned to this pool should be planned so that they
exclude any addresses used for the other types of devices.
DHCP is generally the preferred method of assigning IP addresses to hosts on large networks
because it reduces the burden on network support staff and virtually eliminates entry errors.
Another benefit of DHCP is that an address is not permanently assigned to a host but is only
"leased" for a period of time. If the host is powered down or taken off the network, the address is
returned to the pool for reuse. This feature is especially helpful for mobile users that come and
go on a network.
Internet Assigned Numbers Authority (IANA) (http://www.iana.net) is the master holder of the
IP addresses. The IP multicast addresses are obtained directly from IANA. Until the mid-1990s,
all IPv4 address space was managed directly by the IANA. At that time, the remaining IPv4
address space was allocated to various other registries to manage for particular purposes or for
regional areas. These registration companies are called Regional Internet Registries (RIRs).
When a RIR requires more IP addresses for allocation or assignment within its region, the IANA
allocates IPv6 addresses to the RIRs according to their established needs.
RIPE NCC (Reseaux IP Europeans) - Europe, the Middle East, and Central Asia
http://www.ripe.net
X.8. ISPs
In a sense, the ISP loans or rents these addresses to the organization. If we choose to move our
Internet connectivity to another ISP, the new ISP will provide us with addresses from the address
blocks that have been provided to them, and our previous ISP returns the blocks loaned to us to
their allocation to be loaned to another customer.
B. ISP Services
To get access to the services of the Internet, we have to connect our data network to the Internet
using an Internet Service Provider (ISP).
Tier 1
At the top of the ISP hierarchy are Tier 1 ISPs. These ISPs are large national or international
ISPs that are directly connected to the Internet backbone. The customers of Tier 1 ISPs are either
lower-tiered ISPs or large companies and organizations. Because they are at the top of Internet
connectivity, they engineer highly reliable connections and services. Among the technologies
used to support this reliability are multiple connections to the Internet backbone.
The primary advantages for customers of Tier 1 ISPs are reliability and speed. Because these
customers are only one connection away from the Internet, there are fewer opportunities for
failures or traffic bottlenecks. The drawback for Tier 1 ISP customers is its high cost.
Tier 2
Tier 2 ISPs acquire their Internet service from Tier 1 ISPs. Tier 2 ISPs generally focus on
business customers. Tier 2 ISPs usually offer more services than the other two tiers of ISPs.
These tier 2 ISPs tend to have the IT resources to operate their own services such as DNS, e-mail
servers, and web servers. Other services that Tier 2 ISPs may offer include website development
and maintenance, e-commerce/e-business, and VoIP.
The primary disadvantage of Tier 2 ISPs, as compared to Tier 1 ISPs, is slower Internet access.
Because Tier 2 ISPs are at least one more connection away from the Internet backbone, they also
tend to have lower reliability than Tier 1 ISPs.
Tier 3
Tier 3 ISPs purchase their Internet service from Tier 2 ISPs. The focus of these ISPs is the retail
and home markets in a specific locale. Tier 3 customers typically do not need many of the
services required by Tier 2 customers. Their primary need is connectivity and support.
These customers often have little or no computer or network expertise. Tier 3 ISPs often bundle
Internet connectivity as a part of network and computer service contracts for their customers.
While they may have reduced bandwidth and less reliability than Tier 1 and Tier 2 providers,
they are often good choices for small to medium size companies.
Creating expanded addressing capabilities was the initial motivation for developing this new
protocol. Other issues were also considered during the development of IPv6, such as:
The prefix and the subnet mask are different ways of representing the same thing - the network
portion of an address.
The subnet mask is configured on a host in conjunction with the IPv4 address to define the
network portion of that address.
00000000 = 0
10000000 = 128
11000000 = 192
11100000 = 224
11110000 = 240
11111000 = 248
11111100 = 252
11111110 = 254
11111111 = 255
Class-full subnetting
Subnetting allows for creating multiple logical networks from a single address block. Since we
use a router to connect these networks together, each interface on a router must have a unique
network ID. Every node on that link is on the same network.
We create the subnets by using one or more of the host bits as network bits. This is done by
extending the mask to borrow some of the bits from the host portion of the address to create
additional network bits. The more host bits used, the more subnets that can be defined. For each
bit borrowed, we double the number of subnetworks available. For example, if we borrow 1 bit,
we can define 2 subnets. If we borrow 2 bits, we can have 4 subnets. However, with each bit we
borrow, fewer host addresses are available per subnet.
2^1 = 2 subnets
To calculate the number of hosts per network, we use the formula of 2^n - 2 where n = the
number of bits left for hosts.
Applying this formula, (2^7 - 2 = 126) shows that each of these subnets can have 126 hosts.
For each subnet, examine the last octet in binary. The values in these octets for the two networks
are:
Subnet 1: 00000000 = 0
Next, consider an internetwork that requires three subnets. See the figure.
Again we start with the same 192.168.1.0 /24 address block. Borrowing a single bit would only
provide two subnets. To provide more networks, we change the subnet mask to 255.255.255.192
and borrow two bits. This will provide four subnets.
2^2 = 4 subnets
To calculate the number of hosts, begin by examining the last octet. Notice these subnets.
Subnet 0: 0 = 00000000
Subnet 1: 64 = 01000000
Consider this example with five LANs and a WAN for a total of 6 networks. See the figure.
To accommodate 6 networks, subnet 192.168.1.0 /24 into address blocks using the formula:
2^3 = 8
To get at least 6 subnets, borrow three host bits. A subnet mask of 255.255.255.224 provides the
three additional network bits.
To calculate the number of hosts, begin by examining the last octet. Notice these subnets.
0 = 00000000
64 = 01000000
96 = 01100000
128 = 10000000
160 = 10100000
192 = 11000000
224 = 11100000
See the figure for the addressing scheme for these networks.
Some networks, such as point-to-point WAN links, only require a maximum of two hosts. Other
networks, such as a user LAN in a large building or department, may need to accommodate
hundreds of hosts. Network administrators need to devise the internetwork addressing scheme to
accommodate the maximum number of hosts for each network. The number of hosts in each
division should allow for growth in the number of hosts.
Consider the example of a corporate internetwork that needs to accommodate 800 hosts in its
four locations.
We subnet our network to overcome issues with location, size, and control. In designing the
addressing, we consider the factors for grouping the hosts that we discussed previously:
Each WAN link is a network. We create subnets for the WAN that interconnect different
geographic locations. When connecting the different locations, we use a router to account for the
hardware differences between the LANs and the WAN.
Although hosts in a common geographic location typically comprise a single block of addresses,
we may need to subnet this block to form additional networks at each location. We need to create
sub-networks at the different locations that have hosts for common user needs. We may also
have other groups of users that require many network resources, or we may have many users that
require their own sub-network. Additionally, we may have sub-networks for special hosts such
as servers. Each of these factors needs to be considered in the network count.
We also have to consider any special security or administrative ownership needs that require
additional networks.
One useful tool in this address planning process is a network diagram. A diagram allows us to
see the networks and make a more accurate count.
To accommodate 800 hosts in the company's four locations, we use binary arithmetic to allocate
a /22 block (2^10-2=1022).
This process begins by allocating network addresses for locations of special networks. We start
with the locations that require the most hosts and work down to the point-to-point links. This
process ensures that large enough blocks of addresses are made available to accommodate the
hosts and networks for these locations.
When making the divisions and assignment of available subnets, make sure that there are
adequately-sized address blocks available for the larger demands. Also, plan carefully to ensure
that the address blocks assigned to the subnet do not overlap.
Example
In Figure 1, we will look at addressing from another view. We will consider subnetting based on
the number of hosts, including router interfaces and WAN connections. This scenario has the
following requirements:
When creating an appropriate addressing scheme, always begin with the largest requirement. In
this case, the AtlantaHQ, with 58 users, has the largest requirement. Starting with 192.168.15.0,
we will need 6 host bits to accommodate the requirement of 58 hosts, this allows 2 additional bits
for the network portion. The prefix for this network would be /26 and a subnet mask of
255.255.255.192.
The steps for implementing this subnetting scheme are described here.
The first step shows a network-planning chart. The second step in the figure shows the entry for
the AtlantaHQ. This entry is the results of calculating a subnet from the original 192.168.15.0
/24 block to accommodate the largest LAN, the AtlantaHQ LAN with 58 hosts. Doing this
required borrowing an additional 2 host bits, to use a /26 bit mask.
By comparison, the following scheme shows how 192.168.15.0 would be subnetted using fixed
block addressing to provide large enough address blocks:
Subnet 0: 192.168.15.0 /26 host address range 1 to 62
The fixed blocks would allow only four subnets and therefore not allow enough address blocks
for the majority of the subnets in this internetwork. Instead of continuing to use the next
available subnet, we need to ensure we make the size of each subnet consistent with the host
requirements. Using an addressing scheme directly correlated to the host requirements requires
the use of a different method of subnetting.
In the third step, we look at the requirements for the next largest subnet. This is the PerthHQ
LAN, requiring 26 host addresses including the router interface. We should begin with next
available address of 192.168.15.64 to create an address block for this subnet. By borrowing one
more bit, we are able to meet the needs of PerthHQ while limiting the wasted addresses. The
borrowed bit gives us a /27 mask with the following address range:
The fourth and fifth steps provide the addressing for the next largest subnets: SydneyHQ and
CorpusHQ LANs. In these two steps, each LAN has the same need for 10 host addresses. This
subnetting requires us to borrow another bit, to extend the mask to /28. Starting with address
192.168.15.96, we get the following address blocks:
These blocks provide 14 addresses for the hosts and router interfaces on each LAN.
The last three steps show subnetting for the WAN links. With these point-to-point WAN links
only two addresses are required. To meet the requirement, we borrow 2 more bits to use a /30
mask. Using the next available addresses, we get the following address blocks:
The server that manages this dynamically assigned IP addresses is called Dynamic Host
Configuration Protocol (DHCP) server.
In these arrangements the workstations are called DHCP clients. The DHCP software resides
both in the server and the workstation.
Several packets are sent between a DHCP server and a client machine:
X.13.1 Lease
Lease a period of IP address validity, this period is set for the network resources optimization.
When a client finds that its IP lease is over, it may asks the server to extend its lease period.
Start > Control panel > Network and internet connection > Network connection > Right click
on Local area network > properties>Select Internet protocol (TCP/IP)> properties>Use the
following DNS server addresses.
Note: The ARPANET was developed by Advanced Research Projects Agency (ARPA) of the
United States Department of Defense. The ARPANET was the world's first operational packet
switching network and the predecessor of today's Internet.
Routers have many of the same hardware and software components that are found in other
computers including:
CPU
RAM
ROM
Operating System
S6 CEL COMPUTER NETWORKING Page 92
X.15.2 Role of the Router
The router is a special-purpose computer that plays a key role in the operation of any data
network. Routers are primarily responsible for interconnecting networks by:
Routers perform packet forwarding by learning about remote networks and maintaining routing
information. The router is the junction or intersection that connects multiple IP networks. The
routers primary forwarding decision is based on Layer 3 information, the destination IP address.
The router's routing table is used to find the best match between the destination IP of a packet
and a network address in the routing table. The routing table will ultimately determine the exit
interface to forward the packet and the router will encapsulate that packet in the appropriated
data link frame for that outgoing interface.
CPU
The CPU executes operating system instructions, such as system initialization, routing functions,
and switching functions.
RAM
RAM stores the instructions and data needed to be executed by the CPU. RAM is used to store
these components:
Operating System: The Cisco IOS (Internetwork Operating System) is copied into RAM
during boot up.
Running Configuration File: This is the configuration file that stores the configuration
commands that the router IOS is currently using. With few exceptions, all commands
configured on the router are stored in the running configuration file, known as running-
config.
IP Routing Table: This file stores information about directly connected and remote
networks. It is used to determine the best path to forward the packet.
RAM is volatile memory and loses its content when the router is powered down or restarted.
However, the router also contains permanent storage areas, such as ROM, flash and NVRAM.
ROM
Flash Memory
Flash memory is nonvolatile computer memory that can be electrically stored and erased. Flash
is used as permanent storage for the operating system, Cisco IOS. In most models of Cisco
routers, the IOS is permanently stored in flash memory and copied into RAM during the bootup
process, where it is then executed by the CPU. Some older models of Cisco routers run the IOS
directly from flash. Flash consists of SIMMs or PCMCIA cards, which can be upgraded to
increase the amount of flash memory.
Flash memory does not lose its contents when the router loses power or is restarted.
NVRAM
NVRAM (Nonvolatile RAM) does not lose its information when power is turned off. This is in
contrast to the most common forms of RAM, such as DRAM, that requires continual power to
maintain its information. NVRAM is used by the Cisco IOS as permanent storage for the startup
configuration file (startup-config). All configuration changes are stored in the running-config file
in RAM, and with few exceptions, are implemented immediately by the IOS. To save those
changes in case the router is restarted or loses power, the running-config must be copied to
NVRAM, where it is stored as the startup-config file. NVRAM retains its contents even when
the router reloads or is powered off.
It is more important for a networking professional to understand the function of the main internal
components of a router than the exact location of those components inside a specific router. The
internal physical architecture will differ from model to model.
Routers have physical connectors that are used to manage the router. These connectors are
known as management ports.
Unlike Ethernet and serial interfaces, management ports are not used for packet forwarding.
The most common management port is the console port. The console port is used to connect a
terminal, or most often a PC running terminal emulator software, to configure the router without
the need for network access to that router. The console port must be used during initial
configuration of the router.
Another management port is the auxiliary port. Not all routers have auxiliary ports. At times the
auxiliary port can be used in ways similar to a console port. It can also be used to attach a
modem.
The term interface on Cisco routers refers to a physical connector on the router whose main
purpose is to receive and forward packets.
The router in the figure has four interfaces. Each interface has a Layer 3 IP address and subnet
mask that configures it for a different network. The Ethernet interfaces also have Layer 2
Ethernet MAC addresses.
There are several ways to access the CLI environment. The most usual methods are:
Console
Telnet or SSH
AUX port
The CLI uses a hierarchical structure for the modes. In order from top to bottom, the major
modes are:
Each mode is used to accomplish particular tasks and has a specific set of commands that are
available when in that mode.
When using the CLI, the mode is identified by the command-line prompt that is unique to that
mode. The prompt is composed of the words and symbols on the line to the left of the entry area.
The word prompt is used because the system is prompting you to make an entry.
By default, every prompt begins with the device name. Following the name, the remainder of the
prompt indicates the mode. For example, the default prompt for the global configuration mode
on a router would be:
As commands are used and modes are changed, the prompt changes to reflect the current
context, as shown in the figure.
Primary Modes
Each mode has similar commands. However, the privileged EXEC mode has a higher level of
authority in what it allows to be executed.
The user executive mode, or user EXEC for short, has limited capabilities but is useful for some
basic operations. The user EXEC mode is at the top of the modal hierarchical structure. This
mode is the first entrance into the CLI of an IOS router.
The user EXEC mode allows only a limited number of basic monitoring commands. This is often
referred to as view-only mode.
The user EXEC mode is identified by the CLI prompt that ends with the > symbol. This is an
example that shows the > symbol in the prompt:
Switch>
Router>
The execution of configuration and management commands requires that the network
administrator use the privileged EXEC mode, or a specific mode further down the hierarchy.
Switch#
Router#
The enable and disable commands are used to change the CLI between the user EXEC mode and
the privileged EXEC mode, respectively.
In order to access the privileged EXEC mode, use the enable command. The privileged EXEC
mode is sometimes called the enable mode.
Router>enable
This command is executed without the need for an argument or keyword. Once <Enter> is
pressed, the router prompt changes to:
Router#
The # at the end of the prompt indicates that the router is now in privileged EXEC mode.
For example:
Router>enable
Password:
Router#
The disable command is used to return from the privileged EXEC to the user EXEC mode.
For example:
Router#disable
Router>
Each IOS command has specific format or syntax and is executed at the appropriate prompt. The
general syntax for a command is the command followed by any appropriate keywords and
arguments.
The primary configuration mode is called global configuration or global config. From global
config, CLI configuration changes are made that affect the operation of the device as a whole.
We also use the global config mode as a precursor to accessing specific configuration modes.
The following CLI command is used to take the device from privileged EXEC mode to the
global configuration mode and to allow entry of configuration commands from a terminal:
Router#configure terminal
Once the command is executed, the prompt changes to show that the router is in global
configuration mode.
Router(config)#
From the privileged EXEC mode, access the global configuration mode by entering the configure
terminal command:
Router#configure terminal
Router(config)#
Router(config)#hostname AtlantaHQ
AtlantaHQ(config)#
Notice that the hostname appears in the prompt. To exit global mode, use the exit command.
AtlantaHQ(config)# no hostname
Physically limiting access to network devices with closets and locked racks is a good practice;
however, passwords are the primary defense against unauthorized access to network devices.
Every device should have locally configured passwords to limit access.
To erase the startup configuration file use erase NVRAM:startup-config or erase startup-config
at the privileged EXEC mode prompt:
Router#erase startup-config
Once the command is issued, the router will prompt you for confirmation:
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
By default, interfaces are disabled. To enable an interface, enter the no shutdown command from
the interface configuration mode. If an interface needs to be disabled for maintenance or
troubleshooting, use the shutdown command.
Serial interfaces require a clock signal to control the timing of the communications. In most
environments, a DCE device such as a CSU/DSU will provide the clock. By default, Cisco
routers are DTE devices, but they can be configured as DCE devices.
-When you try to connect to a web server, the browser sent the request to the cache server.
-Cache server (or proxy) verify if the page is not already stored on the disk of your computer, in
case it is there it send directly to your computer in other case it asks the page to the web server.
-The web server sent the requested page and the cache server does the copy and stores it for the
future request.
-In 30% cases, the objects you load are delivered immediately because they exist on the cache
server thus you gain time because pages are available quickly.
-It reduces the bandwidth you use on the internet because it allows you to access many pages.
-In the window which come find connection the click on configure,
http://www.univ-tln.fr/services/cri/cache.pac
Summarized steps :
Ping tool verify the IP connectivity of a computer using the TCP/IP protocol in sending
messages. It counts in milliseconds (ms) the necessary time for packets to go the server and
come back to the client.
This tool is used to solve connectivity, access and name resolution problems. The less the time in
milliseconds is short the more is the speed of receiving and sending packets.
Example :
Ping www.yahoo.fr
Tracert tool not only allow to know the time used to send a packet to the serving and having it
back, includes also the time it used from one node to another till it reaches the destination and
come back.
Stop a service
Net stop name-of-a-service
Pause a service
Net pause name-of-a-service
Continue a service
Net continue name-of-a-service
Whois is a network tool that provide information about the owner of any second-level domain
name who has registered it with Verisign (Verisign is a company which manages database which
determine the interpretation of internet domain like .com and .net).
Whois can also be used to find out whether a domain name is available or has already been
taken.
Nslookup tool is a network tool which responds by default with the primary IP address
associated with a domain specified. To query the primary address of about.com, for
example:\>about.com
Address: 67.215.65.132
- An intranet is a private computer network that uses Internet Protocol technology to securely
share any part of an organization's information or network operating system within that
organization.
- An extranet is a computer network that allows controlled access from the outside, for specific
business or educational purposes. An extranet can be viewed as an extension of a company's
intranet that is extended to users outside the company, usually partners, vendors, and suppliers.
XII.1.1 Internet
The Internet is a worldwide collection of computer networks, cooperating with each other to
exchange data using a common software standard. Through telephone wires and satellite links,
Internet users can share information in a variety of forms.
- connect easily through ordinary personal computers and local phone numbers;
- exchange electronic mail (E-mail) with friends and colleagues with accounts on the Internet;
- post information for others to access, and update it frequently;
- access multimedia information that includes sound, photographic images and even video; and
- access diverse perspectives from around the world.
The Internet began as ARPAnet, a U.S. Department of Defense project to create a nationwide
computer network that would continue to function even if a large portion of it were destroyed in
a nuclear war or natural disaster. The nature of the Internet changed abruptly in 1992, when the
U.S. government began pulling out of network management, and commercial entities offered
Internet access to the general public for the first time.
Text documents, graphics files (digitized photographs and artwork), files that contain digitized
sound and video.
Services
USENET newsgroups (Interactive forums), for posting and responding to public "bulletin
board" messages.
Gopher, a method of searching for various text-based Internet resources (largely obsolete).
Internet Relay Chat (IRC), a system for sending public and private messages to other users in
"real time"—that is, your message appears on the recipient's screen as soon as you type it.
CU-SeeMe, a videoconferencing system that allows users to send and receive sound and pictures
simultaneously over the Internet.
Download of software,
Chats in which you and other users type (and, in some cases, speak) messages that are received
by the chat participants instantly,
XII.1.2 Intranet
An intranet is a private computer network that uses Internet Protocol technology to securely
share any part of an organization's information or network operating system within that
organization.
Use of intranet
Intranets are being used to deliver tools and applications, e.g., collaboration (to facilitate working
in groups and teleconferencing), sales and customer relationship management tools, project
management etc., to advance productivity.
Benefits
Workers productivity: Intranets can help users to locate and view information faster and
improve the services provided to the users.
Business operations and management: Intranets are also being used as a platform for
developing and deploying applications to support business operations and decisions across the
internetworked enterprise.
S6 CEL COMPUTER NETWORKING Page 110
Cost-effective: Users can view information and data via web-browser rather than maintaining
physical documents such as procedure manuals, internal phone list and requisition forms. This
can potentially save the business money on printing, duplicating documents
Enhance collaboration: Information is easily accessible by all authorized users, which enables
teamwork.
Cross-platform capability: Standards-compliant web browsers are available for Windows, Mac,
and UNIX.
Promote common corporate culture: Every user has the ability to view the same information
within the Intranet.
Immediate updates: When dealing with the public in any capacity, laws, specifications, and
parameters can change. Intranets make it possible to provide your audience with "live" changes
so they are kept up-to-date, which can limit a company's liability.
XII.1.3 Extranet
An extranet is a computer network that allows controlled access from the outside, for specific
business or educational purposes. An extranet can be viewed as an extension of a company's
intranet that is extended to users outside the company, usually partners, vendors, and suppliers.
Advantages
Provide or access services provided by one company to a group of other companies, such as an
online banking application managed by one company on behalf of affiliated banks
Disadvantages
Extranets can be expensive to implement and maintain within an organization (e.g., hardware,
software, employee training costs), if hosted internally rather than by an application service
provider.
2). The Internet, extranets, and intranets all rely on the same TCP/IP technologies.
However, they are different in terms of the levels of access they allow to various users inside and
outside the organization and the size of the network.
an extranet expands that access by allowing non-members such as suppliers and customers to use
company resources.
The difference between the Internet and extranets is that while the extranet allows limited access
to non-members of an organization, the Internet generally allows everyone to access all network
resources.
Both need a user ID & password to control access to the whole system.
An Intranet is owned by a single group while an Extranet extends to users outside the group
Before you create an Internet connection, check with your ISP to verify the required connection
settings. A connection to your ISP may require one or more of the following settings:
With Network Connections, connecting to the Internet is easy. For example, to create a dial-up
connection, you can use the following components to gain access to the Internet:
There are five types of network: LAN, Virtual Private Network, Direct connections, Incoming
connections and dial-up connections.
An Internet service provider (ISP) is a company that provides Internet access. There are Internet
service providers around the world. To connect to the Internet, you dial a phone number and log
on to the remote system. Once connected, you have access to the Internet and any other services,
such as e-mail, that are provided by the ISP. Fees usually apply for commercial ISPs. ISP present
in Rwanda: MTN, TIGO, AIRTEL, New Artel.
Dial-up is an analog connection because data is sent over an analog, public telephone network.
The modem converts received analog data to digital and vice versa. Because dial-up access uses
normal telephone lines the quality of the connection is not always good and data rates are
limited.
Type Explanation
28.8 or 56
The most common way to connect to the Internet, internal modems plug into a
kilobits per
PCI slot inside a computer. External modems plug into a serial, parallel, or USB
second (Kbps)
port on a computer.
modem
Note:
If the network that you are adding provides a network key automatically, make sure that
the key is provided for me automatically check box is selected.
If the wireless network that you are adding does not have an access point or a router,
select this is a computer-to-computer (ad hoc) network; wireless access points are not
used check box.
For the network authentication method, we recommend that you choose Open. When the
open method is combined with a wired equivalent privacy (WEP) network key, all network
traffic is encrypted. If you choose Shared, a network key is still required, and even if you use
a WEP network key, network traffic is not encrypted, which makes your network more
vulnerable to intrusions.
XIII.5 DSL
Digital Subscriber Line (DSL) is a family of technologies that provides digital data transmission
over the wires of a local telephone network.
This technology enables telephone companies to offer broadband service without major network
rewiring and can be implemented quickly and profitably, especially because it stands to benefit
both the consumer (with faster data rates) and the service providers (with new revenues from old
cables). Here‘s how it works. Nearly all existing telephone lines can carry frequencies up to 1
MHz. But analog telephone service only requires a maximum frequency of 3.3 KHz, leaving a
large amount of the bandwidth unused. xDSL makes use of this otherwise wasted space by
piggybacking high-speed data traffic onto the unused bandwidth.
By filtering the frequencies at each end of this wide-open range (4 KHz to 2.2 MHz) and
isolating them from the voice-bandwidth channel, the local telco can transport both traditional
S6 CEL COMPUTER NETWORKING Page 115
telephone signals and high-speed DSL signals over the same old four-wire telephone line that
already links your home or business to their central office (CO).
XIII.6.1 OC3
Short for Optical Carrier, level 3 it is used to specify the speed of fiber optic networks
conforming to the SONET standard. OC3 is typically used as a fiber optic backbone for large
networks with large voice, data, video, and traffic needs.
XIII.6.2 Satellite
Internet over Satellite (IoS) allows a user to access the Internet via a satellite that orbits the earth.
A satellite is placed at a static point above the earth's surface, in a fixed position. Because of the
enormous distances signals must travel from the earth up to the satellite and back again, IoS is
slightly slower than high-speed terrestrial connections over copper or fiber optic cables.
Typical Internet over Satellite connection speeds (standard IP services) average around 492 up to
512 Kbps.
Windows Server is a network manager that can function like a domain controller. It uses the
controls of DHCP, DNS, and Active Directory to manage the network from the software side.
In this course we will use windows server 2003. Microsoft's Server 2003 is an operating system
that functions in various capacities, Domain controller, DNS server, DHCP server, and Active
Directory server. Each of these server operations helps manage the network that server 2003 is
responsible for.
A Domain Controller is a computer that manages the network in several ways. The computer
domain presents a collection of computers that are governed and controlled by the Domain
Controller, a central server. This server has certain responsibilities to make sure the network is
operating properly.
Domain controller differ from the Workgroup network on that a workgroup is a peer-to-peer type
of network that has no central computer that acts like a network manager. Each computer can
interact with the others provided that they are on the same subnet. If so, they can share files or
network devices like printers.
One of the functions of the Domain Controller is that network names and the IP addresses are
resolved properly. Instead of using IP addresses there is a use of name resolution, the IP address
is associated with a computer. That is what the DNS server routinely does.
The DHCP server performs leasing operations. It takes a group of IP addresses that have been
created for the network and hands them out to computers that are joining the network. They are
leased because, normally, the handout lasts 72 hours, and then it expires. However, it is typically
renewed, so the same computer will receive the same IP address.
The other items that a DHCP server provides are the gateway, the subnet mask, and the IP
address that belongs to the current DNS server, even if it belongs to the Domain Controller itself.
The gateway is a route to another network or to the DNS server. The subnet mask is a binary set
of numbers that helps define what network the IP address belongs to.
The administration tasks performed by the active directory include creating, deleting, modifying,
moving, and setting permissions on objects stored in the directory.
These objects include organizational units, users, contacts, groups, computers, printers, and
shared file objects.
The Active Directory tool is used for a variety of different management functions.
One function is to define who enters the network, both as a user or as a computer. Users are
given login names and passwords and memberships to certain groups, like the administrators
group. Computers are controlled with the DHCP server.
Another function involves Organizational Units. These are units where individuals are put into to
control what they can and cannot access.
With users divided in groups there is a need of control. For instance, a user might be a part of the
IT department group, but not part of the Accounting department group. In this matter, the active
directory will specify the security towards the network by controlling when a user can have
access to the network. He will have an account created on him, login name and password.
S6 CEL COMPUTER NETWORKING Page 117
XIV.3 Permissions
Permissions are controls that make the network manageable in terms of the users, and computers,
and the security privileges that are presented. It controls who can access the network, when, and
what privileges are available.
One way is security. That means that users can only access the network if they have permission
through a login and password account.
Another way is through computer control. This means that only certain devices can be part of the
computer network. Adding a computer to the network means that controls on it come by way of
the domain controller.