Computer Networking Fundamentals Chapter 2
Computer Networking Fundamentals Chapter 2
Networking Fundamentals
1
2.1 Network
communications
2
THE OSI MODEL
AWAL
PULANG
SUPAYA
TEKSI
NAIK
DOLLAH
PAK
*Pak Darwisy Naik Tangga Sekat2 Pahtu Apa
4
*Pak Din Naik Teksi Salam Pergi Astaka
Data travel down the layer in the sending device….
and up the layers in the receiving device.
CABLE
HOST A HOST B
5
The OSI Network Model Standard
The OSI network model layers are arranged here from the lower levels starting with
the physical (hardware) to the higher levels.
• Physical Layer - The actual hardware.
• Data Link Layer - Data transfer method (802x ethernet). Puts data in frames and ensures error free transmission.
Also controls the timing of the network transmission. Adds frame type, address, and error control information.
IEEE divided this layer into the two following sublayers.
– Logical Link control (LLC) - Maintains the Link between two computers by establishing Service Access Points
(SAPs) which are a series of interface points. IEEE 802.2.
– Media Access Control (MAC) - Used to coordinate the sending of data between computers. The 802.3, 4, 5,
and 12 standards apply to this layer. If you hear someone talking about the MAC address of a network card,
they are referring to the hardware address of the card.
• Network Layer - IP network protocol. Routes messages using the best path available.
• Transport Layer - TCP, UDP. Ensures properly sequenced and error free transmission.
• Session Layer - The user's interface to the network. Determines when the session is begun or opened, how long
it is used, and when it is closed. Controls the transmission of data during the session. Supports security and
name lookup enabling computers to locate each other.
• Presentation Layer - ASCII or EBCDEC data syntax. Makes the type of data transparent to the layers around it.
Used to translate date to computer specific format such as byte ordering. It may include compression. It
prepares the data, either for the network or the application depending on the direction it is going.
• Application Layer - Provides services software applications need. Provides the ability for user applications to
interact with the network.
6
7
LAYER 7 : APPLICATION LAYER
• Does not contain any of the application, such as a word
processor or Internet Explorer.
• It provides services to facilitate the communication
between software application and lower network
services.
• Protocols:
1. FTP (File Transfer Protocol): used for uploading
and downloading files from and to FTP server.
2. SMTP (Simple Mail Transfer Protocol): send
and received e-mail from e-mail server.
3. HTTP (Hypertext Transfer Protocol): use by web
browser to send/receive information.
8
LAYER 6 : PRESENTATION LAYER
9
LAYER 6 : PRESENTATION LAYER
• Data and text can be formatted as ASCII files, EBCDIC
files or can even be Encrypted.
• Sound may become a Midi file.
• Video files can be formatted as MPEG video files or
QuickTime files.
• Graphics and visual images can be formatted as PICT,
TIFF, JPEG, or even GIF files.
10
LAYER 5 : SESSION LAYER
Menubuhkan, menyenggarakan dan menamatkan
• Establish, maintain and terminates the
communication between two computer over
a network.
• This layer is primarily concerned with coordinating
applications as they interact on different hosts.
• Protocols: Apple talk, NetBIOS
11
LAYER 4 : TRANSPORT LAYER
• Manipulate data and prepare it for delivery
(transport) through the network.
• Transport layer protocols break large data unit
received from Session layer into smaller units called
segments. This process is known as segmentation.
• Segmentation helps in data transmission efficiency.
• It also establishes the end-to-end connection, from
your host to another host.
12
LAYER 4 : TRANSPORT LAYER continue…..
• Protocols:
TCP (Transmission Control Protocol)
UDP (User Datagram Protocol)
13
LAYER 3 : NETWORK LAYER
• Determine the path for data from the source to the
destination computer.
• It manage switching and routing of data packets based on
network addresses.
• Protocols:
IP (Internet Protocol)
IPX (Internet Protocol Exchange)
• Network layer protocols provide two important functions:
logical addressing and routing.
14
LAYER 2 : DATA LINK LAYER
• This layer is where the network packets are translated into
raw bits (00110101) to be transmitted on the physical layer.
• This is also a layer that uses the most basic addressing
scheme, MAC Addresses.
• Protocols:
CSMA (Carrier-Sense Multiple Access)
TOKEN RING
FRAME RELAY
MAC ADDRESS
ETHERNET
WIFI
15
LAYER 1 : PHYSICAL LAYER
• Is the physical connection between network
devices.
• Cables, connections, hubs , switch, Router and
Network Interface Cards (NIC) operate at this
layer.
• Protocols:
IEEE 802
ISDN
(Integrated Services
Digital Network)
16
What basically happens when data passes from Host A to Host B ?
Host A Host B
Datuk
Din
Demam
Sangat
Panas
Farid
Bantu
1. The Application, Presentation and Session layer take user input and
converts it into data.
2. The Transport layer adds a segment header converting the data into
segments.
3. The Network layer adds a network header and converts the segments into
packets.
4. The Data Link layer adds a frame header and frame trails converting the
packets into frames.
5. The MAC sublayer layer converts the frames into a bits which the Physical
layer can put on the wire.
17
This whole process of moving data from host A to host B is
known as DATA ENCAPSULATION
– the data is being wrapped in the appropriate
protocol header so it can be properly received.
18
DATA ENCAPSULATION
Let’s say we compose an email that we wish to send from host A to host B.
Now, the computer translates the numbers into ASCII and then
into binary (1s and 0s).
19
At the network layer, a network header is added to
the data.
20
The packet from the network layer is then passed
to the data link layer where a frame header and a
frame trailer are added thus creating a data link
frame.
21
Finally, the physical layer provides a service to the
data link layer.
This service includes encoding the data link frame
into a pattern of 1s and 0s for transmission on the
medium (usually a wire).
22
Example of how the OSI Layers work using
an e-mail sent from the computer on the left.
E-mail sent from JULIANA: E-mail received from JULIANA:
Meet me at JJ 7:00 for Meet me at JJ 7.00 for
breaking fast. breaking fast.
JULIANA
JULIANA
Make sure all data is sent Make sure all data has arrived
TRANSPORT
intact. intact.
layer 4
Keep track of how many hops; Keep track of how many hops;
NETWORK
open shortest path First; layer 3 opened the shortest path First;
Go to IP address 255.65.0.123 Went to IP address 255.65.0.123
Is the initial connection set up? Put data The initial connection set up. Decoded
into frames according to X standard. DATA LINK data in frame according to X standard.
layer 2
Send as electrical signal over the network Receive electrical signal over the
cable at X voltage, and X Mbps. PHYSICAL network cable at X voltage, and X Mbps.
layer 1 23
Data Packets
• A small chunk of data transmitted over the Internet.
• A packet is a formatted unit of data carried by a packet mode computer
network.
• A packet consists of two kinds of data: control information and user data.
• The control information provides data the network needs to deliver the
user data, for example: source and destination addresses, error detection
codes like checksums, and sequencing information
JULIANA AINUL
The Internet
24
Frame
• A frame is a data packet on the Layer 2 of the
OSI model.
OSI MODEL
LAYER PROTOCOLS DEVICE
3 NETWORK LAYER IP/ IPX Router, Switch
Routes data to different LANs
and WANs based on network
address.
2 DATA LINK LAYER CSMA/CD, Token Switch , Bridge, NIC
Transmits packet from node to Ring, ARP
node based on address
1 PHYSICAL LAYER IEEE 802, ISDN Cable, Repeater,
Electrical signal and cabling. Hub, Amplifier
27
2 Type of addressing covered by OSI
model
• Addressing is a system for assigning unique
identification numbers to devices on a
network.
• Each node has two types of address, which is
i. Internet Protocol (IP) address [logical/network
address]
ii. Media Acess Control (MAC) address [physical
address]
28
2 Type of addressing covered by OSI model
29
Recognize IPv6 addressing
• IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the
long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to
replace IPv4.
• IPv6 addresses have a size of 128 bits.
30
2.2 Local Wired Network
31
MAC address of a host using
ipconfig/all command (1)
• MAC, Media Access Control, address is a globally unique
identifier assigned to network devices, and therefore it is
often referred to as hardware or physical address.
33
2.2.1
MAC address of a host using
ipconfig/all command
• Practical Work!!
• Folow step-by-step to get MAC address of a host
• Objective
- Determine the MAC address of a Windows XP
computer on an Ethernet network using the ipconfig /
all command.
- Access to the Run command.
34
MAC address of a host using
ipconfig/all command
• Step 1: Open a Windows command prompt
window
a. From the Windows XP desktop, click Start then
Run.
b. Type cmd in the Run dialogue box then click
OK.A Windows command prompt window
opens.
35
MAC address of a host using
ipconfig/all command
• Step 2: Use the ipconfig /all command
a. Enter the ipconfig /all command at the
command prompt.
b. Press Enter. (Typical results are shown in the
following figure, but your computer will display
different information.)
36
MAC address of a host using ipconfig/all command
37
MAC address of a host using ipconfig/all command
38
MAC address of a host using
ipconfig/all command
Summary - How to Find a MAC Address
• The list below summarizes options to find a
computer's MAC address:
a. Windows: ipconfig /all, or winipcfg
b. Linux and some Unix: ifconfig -a
c. Mac with Open Transport: TCP/IP Control Panel
- Info or User Mode/Advanced
d. Mac with MacTCP: TCP/IP Control Panel -
Ethernet icon
39
2.2.3
• For example, the Data Link Layer, between the hardware and the
internetworking protocols (Internet Protocol) in a computer
networking system.
40
2.2.4
41
2.3 Basic concept of internet
connection
42
INTERNET
The Internet is a system of
linked networks that are
worldwide in scope and
facilitate data
communication services
such as remote login, file
transfer, electronic mail,
the World Wide Web and
newsgroups.
43
INTRANET
An intranet is a private network ,
available only within that organization.
44
Internet
The Internet is a network of networks that connects
users in every country in the world that allow the
users at any computer to get information from any
other computer if they have permission. (Internet adalah
rangkaian kepada rangkaian yang menghubungkan pengguna dalam setiap negara di dunia
yang membolehkan pengguna di mana-mana komputer untuk mendapatkan maklumat dari
komputer lain jika mereka memiliki kebenaran)
45
Internet…Cont…
46
Internet Service Provider
An ISP is a company that provides the connections
and support to access the Internet. It can also
provide additional services such as Email and web
hosting. (ISP adalah perusahaan yang menyediakan Sambungan dan sokongan untuk
mengakses Internet. ia juga dapat memberikan perkhidmatan tambahan seperti e-mel dan
web hosting)
47
ISPs
ISP Interconnection allows traffic originating at a
source connected to one ISP’s network to reach a
destination connected to another ISP’s network,
around the block or around the world. (ISP Interconnection
membolehkan trafik yang berasal pada sumber yang disambungkan ke rangkaian pertama
ISP menjangkau/disambungkan kepada rangkaian ISP lain, di blok berhampiran atau di
seluruh dunia)
48
ISPs
49
Relationship between ISP & Internet
Individual computers and local networks connect to
the ISP at a Point of Presence (POP). A POP is the
connection point between the ISP's network and the
particular geographical region that the POP is
servicing. (komputer tunggal dan rangkaian tempatan disambungkan ke ISP di Point
of Presence (POP). POP adalah titik Sambungan antara rangkaian ISP dan wilayah
perkhidmatan POP)
50
Relationship between ISP & Internet
51
Option of connections to the ISP
Example of ISP ISP in Malaysia
– AOL (America On-Line) – Celcom
– Earthlink – Maxis
– Time Warner Cable – Digi
– Verizon – P1
– Jaring – WiMax
– Streamyx – UMobile
52
Type of connections provided by ISP
53
Type of connections provided by ISP
• Dial-up Internet access is a form of Internet access that uses the facilities of
the public switched telephone network (PSTN) to establish a dialled
connection to an Internet service provider (ISP) via telephone lines.
• Digital Subscriber Line (DSL) is a family of technologies that provides digital
data transmission over the wires of a local telephone network
• Cable modem is a type of network bridge and modem that provides bi-
directional data communication via radio frequency channels on a HFC and
RFoG infrastructure
• Leased line
Service available from most telephone companies. Provides high-speed
connection over dedicated digital data lines. The most common example of a
leased line is a T1 (E1). Primarily for a business-class service.
• Satellite
Service available from Internet dish satellite companies. Provides medium
speeds via satellite. Satellite may be the only choice faster than dial-up in
some rural areas.
54
Type of connections provided by ISP
55
ISP levels of service
Home service is normally less expensive than
business services, and generally provides scaled-
down services such as slower connection speed,
reduced web space storage, and fewer email
accounts. (perkhidmatan Home biasanya lebih murah berbanding perkhidmatan
perniagaan, dan umumnya memberikan tahap perkhidmatan yang kurang seperti kelajuan
Sambungan lebih lambat, mengurangkan ruangan simpanan web, dan akaun email yang
sedikit)
56
FE Dis 2014:types of the service provided by ISP
57
The Internet of Things (IoT)
What is IoT?
59
Information Security
Office of Budget and Finance
Education – Partnership – Solutions
Where is IoT?
It’s everywhere!
60
Education – Partnership – Solutions
Smart Appliances
Wearable
Tech
Healthcare 61
Sensors in even the holy cow!
65
The relationship between IoT and Internet
66
The relationship between IoT and Internet
68
Network Service
• Network services are the foundation of a
networked computing environment.
• Generally network services are installed on one
or more servers to provide shared resources to
client computers.
• Network services are configured on corporate
LAN’s to ensure security and user friendly
operation.
• They help the LAN run smoothly and efficiently.
69
Domain Name Service (DNS)
• The Domain Name System (DNS) is a hierarchical
naming system for computers, services, or any
resource connected to the Internet or a private
network.
73
Ping command, a browser and nslookup
• ping command
– sample of ping command:
74
Ping command, a browser and nslookup
• browser
– A network browser is a tool used to browse a
computer network.
75
Ping command, a browser and nslookup
• nslookup
– nslookup is a computer program used in Windows
and Unix to query Domain Name System (DNS)
servers to find DNS details, including IP addresses
of a particular computer, MX records for a domain
and the NS servers of a domain.
78
DNS in LAN
• Corporate LANs use network services such as
DNS to give names to IP and MAC addresses
and DHCP to ensure that everyone on the
network has a valid IP address.
79
The relationship between domain
names (DNS) and IP addresses
• DNS translates Internet domain and host names to IP
addresses.
• DNS automatically converts the names we type in our
web browser address bar to the IP addresses of web
servers hosting those sites.
• Hierarchical method of associating domain names with
IP addresses
– Refers to Application layer service that accomplishes
association and organized system of computers and
databases making association possible
– Relies on many computers around world
• Domain names must be registered with an Internet
naming authority that works on behalf of ICANN
80
Email Protocol in client and server
• SMTP
• POP3
• IMAP4
81
Email Protocol in client and server
• SMTP
– Simple Mail Transfer Protocol (SMTP) is an Internet
standard for electronic mail (e-mail) transmission
across Internet Protocol (IP) networks.
– SMTP was first defined in RFC 821 and last updated
by RFC 5321 which includes the extended SMTP
(ESMTP) additions, and is the protocol in widespread
use today.
– SMTP is specified for outgoing mail transport and
uses TCP port 25.
82
continued.....
84
continued.....
85
Email Protocol in client and server
• IMAP4
– The Internet Message Access Protocol (IMAP) is one
of the two most prevalent Internet standard
protocols for e-mail retrieval, the other being the
Post Office Protocol (POP).
– Virtually all modern e-mail clients and mail servers
support both protocols as a means of transferring e-
mail messages from a server
86
2.5 Apply email client server
87
Practical Activities
• Configure an email client to access an email
server
88
2.6 Apply Addressing Schemes
for TCP/IP suite
89
TCP/IP addressing
Exp: 207.142.131.236
90
TCP/IP addressing
91
2.4.1
92
Addressing Scheme For TCP/IP suite (2)
The Internet Protocol Suite, like many protocol suites, is
constructed as a set of layers. Each layer solves a set of
problems involving the transmission of data. In particular, the
layers define the operational scope of the protocols within.
Upper layers are logically closer to the user and deal with
more abstract data, relying on lower layer protocols to
translate data into forms that can eventually be physically
transmitted.
94
Dotted Decimals (2)
• An IPv4 address is divided into two parts: network and host address.
• The network address determines how many of the 32 bits are used for the
network address, and remaining bits for the host address. The host address
can further divided into subnetwork and host number.
96
Class A first bit must start with 0.
Class B 2 initial bit must start with 10.
Class C 3 initial bit must start with 110.
Class D 4 initial bit must start with 1110.
Class E 4 initial bit must start with 1111.
97
Class A
The first bit must be 0 refers to the eight bits in ‘w’.
So, the bits starting from 00000000 to 01111111. (Bit
yang pertama mesti 0 merujuk kepada 8 bit pada w. Maka nilai bit bermula dari 00000000
sehingga 01111111)
Exp:1.10.134.8, 13.233.222.32
98
Class B
Exp: 155.76.76.8
99
Class C
Exp: 200.56.17.8
100
Class D
Exp: 230.76.76.8
101
Class E
Exp: 243.76.76.8
102
TCP/IP Classes…Cont…
103
TCP/IP addressing…Cont…
104
1. Decimal To Binary Conversion
105
Binary
• A binary code is any system of representing text or
computer processor instructions by the use of the binary
number system's two-binary digits "0" and "1".
Example:
5310 => 53 / 2 = 26 balance 1
26 / 2 = 13 balance 0
13 / 2 = 6 balance 1
6 / 2 = 3 balance 0
3 / 2 = 1 balance 1
1 / 2 = 0 balance 1
= 1101012 (6 bit)
= 001101012 (8 bit)
107
2. Binary To Decimal Conversion
108
1. Binary To Decimal Conversion…Cont…
Example:
a) 1110012 (6 bit)
⇒ (1x25) + (1x24) + (1x23) + (0x22) + (0x21) + (1x20)
⇒ 32 + 16 + 8 + 0 + 0 + 1
⇒ 5710
b) 000110102 (8 bit)
⇒ 24 + 2 3 + 2 1
⇒ 16 + 8 + 2
⇒ 2610
109
EXERCISE
Binary to decimal
– 00011011.00100001.00101010.00001111
– 00000110.00010101.00001110.00001010
– 00001100.00011000.00000001.00111000
Jawapan:
27.33.42.15
6.21.14.10
12.24.1.56
110
EXERCISE
Decimal to binary
– 56.78.100.121
– 127.3.44.8
– 192.168.67.10
Jawapan:
00111000.01001110.01100100.01111001
01111111.00000011.00101100.00001000
11000000.10101000.01000011.00001010
111
Dotted Decimal Notation
112
Dotted Decimal Notation
113
Dotted Decimal Notation
114
Subnet Mask
Subnet is a calculation mechanism that used in the
network system for breaking the network into classes
of IP addresses for security purposes and distribution
of working groups. (SUBNET ialah satu mekanisma pengiraan yang digunakan
dalam sistem rangkaian bagi memecahkan rangkaian dalam kelas-kelas IP address bagi
tujuan keselamatan dan pembahagian kumpulan-kumpulan kerja)
IP class A 255.0.0.0
IP class B 255.255.0.0
IP class C 255.255.255.0
115
FE Dis 2014: define
116
Public & Private IP Address
Private
– Private internal addresses are not routed on the Internet
and no traffic cannot be sent to them from the Internet,
they only supposed to work within the local network.
– Private addresses include IP addresses from the following
subnets:
• Range from 10.0.0.0 to 10.255.255.255 — a 10.0.0.0 network
with a 255.0.0.0 or an /8 (8-bit) mask
• Range from 172.16.0.0 to 172.31.255.255 — a 172.16.0.0
network with a 255.240.0.0 (or a 12-bit) mask
• A 192.168.0.0 to 192.168.255.255 range, which is a 192.168.0.0
network masked by 255.255.0.0 or /16
• A special range 100.64.0.0 to 100.127.255.255 with a
255.192.0.0 or /10 network mask; this subnet is recommended
according to rfc6598 for use as an address pool for CGN (Carrier-
Grade NAT).
• Reference: https://help.keenetic.com/hc/en-us/articles/213965789-What-is-the-difference-between-a-public-and-private-IP-
address- 117
118
Form of IP Addressing
Unicast
– It normally refers to a single sender or a single receiver, and
can be used for both sending and receiving. (Biasanya merujuk pada satu
penghantar atau penerima tunggal, dan boleh digunakan untuk kedua-dua menghantar dan menerima)
120
Figure : Illustration of Broadcast
Form of IP Addressing…Cont…
Multicast
– A multicast address is associated with a group of
interested receivers. (Alamat Multicast adalah berkaitan dengan sekumpulan
penerima)
121
Figure : Illustration of Multicast
How IP Addresses are obtained
Static
– IP address manually assigned to a device. (Alamat IP ditentukan
secara manual kepada peranti)
Dynamic
– IP address automatically assigned by server when host
boots. (Alamat IP ditentukan secara automatik oleh server apabila hos dibootkan)
– derived automatically from a range of addresses. (diturunkan
secara automatik dari julat alamat)
122
2.4.4
TCP/IP addressing…Cont…
123
Current IP information of a workstation
STEP 1: Go to Start > All Programs > Accessories >
Command Prompt. This opens the Command Prompt.
124
Current IP information of a workstation
STEP 2: In the Command Prompt window, type
"ipconfig" and press Enter. This will bring up your IP
address, DNS address, and other information about
your internet connection.
STEP 3: Find your IP address among the information
provided.
125
Construct IP address to workstations and
printer in LAN.
• practical
126
DHCP
DHCP, Dynamic Host Configuration Protocol, is a
communications protocol that dynamically assigns
unique IP addresses to network devices.
128
DHCP (3)
129
Reasons to Use DHCP
Saves time spent assigning IP addresses
Prevents accidental duplicate IP addresses
Allows users to move devices (like laptops) without
having to change their TCP/IP configuration
130
DHCP Leasing Process
Device borrows (leases) IP address
Devices use IP address temporarily
Lease time
Determine when client obtains IP address at log
on
User may force lease termination