0% found this document useful (0 votes)
37 views

Module - Physical Design

This document provides an instructional module for a course on network design and management. It discusses protocols and physical design, including switching protocols, routing protocols, cable technologies, and device selection. The module aims to help students select the right switching and routing protocols for network designs based on customer needs. It provides an overview of the OSI model and describes several important network protocols, including TCP/IP, FTP, and PPP.

Uploaded by

jackblack
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Module - Physical Design

This document provides an instructional module for a course on network design and management. It discusses protocols and physical design, including switching protocols, routing protocols, cable technologies, and device selection. The module aims to help students select the right switching and routing protocols for network designs based on customer needs. It provides an overview of the OSI model and describes several important network protocols, including TCP/IP, FTP, and PPP.

Uploaded by

jackblack
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Republic of the Philippines

NUEVA VIZCAYA STATE UNIVERSITY


Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023

College: Industrial Technology


Campus: Bambang, Nueva Vizcaya

DEGREE PROGRAM BSINTE COURSE NO. ITT1-3


SPECIALIZATION Network COURSE TITLE Network Design and Management
YEAR LEVEL BSINTE 3 TIME FRAME 9 hrs WK NO. 1-3 IM NO. 01

I. UNIT TITLE/CHAPTER TITLE


PROTOCOLS & PHYSICAL DESIGN

II. LESSON TITLE


1. Switching Protocols
2. Routing Protocols
3. Cable Technologies
4. Device Selection

III. LESSON OVERVIEW

In this chapter, we discussed some of the larger issues associated with routing
and switching. When building networks, it is important to understand general concepts
such as static, default, and dynamic routing. As networks grow and complexity, skills that
become important include the ability to develop sound topology decisions and evaluate
routing protocols. VLANs, trunks, installation of routes, and looped architectures were also
covered. The best network administrators not only understand the commands to use, but
the reasons for the commands and how network decisions are made.

IV. DESIRED LEARNING OUTCOMES

The goal of this chapter is to help you select the right switching and routing
protocols for your network design customer. The selections you make will depend on
your customer’s business and technical goals. To help you select the right protocols for
your customer, this chapter covers the following attributes of switching and routing
protocols:
■ Network traffic characteristics
■ Bandwidth, memory, and CPU usage
■ The approximate number of peer routers or switches supported
■ The capability to quickly adapt to changes in an internetwork
■ The capability to authenticate route updates for security reasons
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023

V. LESSON CONTENT

Network Protocols are a set of rules governing exchange of information in an easy, reliable
and secure way. Before we discuss the most common protocols used to transmit and receive data
over a network, we need to understand how a network is logically organized or designed. The
most popular model used to establish open communication between two systems is the Open
Systems Interface (OSI) model proposed by ISO.

OSI Model
OSI model is not a network architecture because it does not specify the exact services and
protocols for each layer. It simply tells what each layer should do by defining its input and output
data. It is up to network architects to implement the layers according to their needs and resources
available.
These are the seven layers of the OSI model −
• Physical layer −It is the first layer that physically connects the two systems that
need to communicate. It transmits data in bits and manages simplex or duplex
transmission by modem. It also manages Network Interface Card’s hardware
interface to the network, like cabling, cable terminators, topography, voltage levels,
etc.
• Data link layer − It is the firmware layer of Network Interface Card. It assembles
datagrams into frames and adds start and stop flags to each frame. It also resolves
problems caused by damaged, lost or duplicate frames.
• Network layer − It is concerned with routing, switching and controlling flow of
information between the workstations. It also breaks down transport layer
datagrams into smaller datagrams.
• Transport layer − Till the session layer, file is in its own form. Transport layer
breaks it down into data frames, provides error checking at network segment level
and prevents a fast host from overrunning a slower one. Transport layer isolates
the upper layers from network hardware.
• Session layer − This layer is responsible for establishing a session between two
workstations that want to exchange data.
• Presentation layer − This layer is concerned with correct representation of data,
i.e. syntax and semantics of information. It controls file level security and is also
responsible for converting data to network standards.
• Application layer − It is the topmost layer of the network that is responsible for
sending application requests by the user to the lower levels. Typical applications
include file transfer, E-mail, remote logon, data entry, etc.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023

It is not necessary for every network to have all the layers. For example, network layer is not there
in broadcast networks.
When a system wants to share data with another workstation or send a request over the network,
it is received by the application layer. Data then proceeds to lower layers after processing till it
reaches the physical layer.
At the physical layer, the data is actually transferred and received by the physical layer of the
destination workstation. There, the data proceeds to upper layers after processing till it reaches
application layer.
At the application layer, data or request is shared with the workstation. So each layer has opposite
functions for source and destination workstations. For example, data link layer of the source
workstation adds start and stop flags to the frames but the same layer of the destination
workstation will remove the start and stop flags from the frames.
Let us now see some of the protocols used by different layers to accomplish user requests.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023

TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is a set of layered
protocols used for communication over the Internet. The communication model of this suite is
client-server model. A computer that sends a request is the client and a computer to which the
request is sent is the server.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023

TCP/IP has four layers −


• Application layer − Application layer protocols like HTTP and FTP are used.
• Transport layer − Data is transmitted in form of datagrams using the Transmission
Control Protocol (TCP). TCP is responsible for breaking up data at the client side
and then reassembling it on the server side.
• Network layer − Network layer connection is established using Internet Protocol
(IP) at the network layer. Every machine connected to the Internet is assigned an
address called IP address by the protocol to easily identify source and destination
machines.
• Data link layer − Actual data transmission in bits occurs at the data link layer using
the destination address provided by network layer.
TCP/IP is widely used in many communication networks other than the Internet.

FTP
As we have seen, the need for network came up primarily to facilitate sharing of files between
researchers. And to this day, file transfer remains one of the most used facilities. The protocol
that handles these requests is File Transfer Protocol or FTP.

Using FTP to transfer files is helpful in these ways −


• Easily transfers files between two different networks
• Can resume file transfer sessions even if connection is dropped, if protocol is
configure appropriately
• Enables collaboration between geographically separated teams
PPP
Point to Point Protocol or PPP is a data link layer protocol that enables transmission of TCP/IP
traffic over serial connection, like telephone line.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023

To do this, PPP defines these three things −


• A framing method to clearly define end of one frame and start of another,
incorporating errors detection as well.
• Link control protocol (LCP) for bringing communication lines up, authenticating and
bringing them down when no longer needed.
• Network control protocol (NCP) for each network layer protocol supported by other
networks.
Using PPP, home users can avail Internet connection over telephone lines.

How Network Protocols Work


Network protocols take large-scale processes and break them down into small, specific
tasks or functions. This occurs at every level of the network, and each function must cooperate at
each level to complete the larger task at hand. The term protocol suite refers to a set of smaller
network protocols working in conjunction with each other.

Network protocols are typically created according to industry standard by various networking or
information technology organizations.

The following groups have defined and published different network protocols:

• The Institute of Electrical and Electronics Engineers (IEEE)


• The Internet Engineering Task Force (IETF)
• The International Organization for Standardization (ISO)
• The International Telecommunications Union (ITU)
• The World Wide Web Consortium (W3C)
While network protocol models generally work in similar ways, each protocol is unique and
operates in the specific way detailed by the organization that created it.

Who Uses Network Protocols?


• Network protocols aren’t only relevant to certified network specialists or IT professionals.
Billions of people use network protocols daily, whether they know it or not.

• Every time you use the internet, you leverage network protocols. Though you may not
know how network protocols work or how frequently you encounter them, they are
necessary for using the internet or digital communications in any capacity.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023

List of Network Protocols


There are thousands of different network protocols, but they all perform one of three primary
actions:

• Communication
• Network management
• Security

Each type is necessary to use network devices swiftly and safely, and they work together to
facilitate that usage.

Communication
Communication protocols allow different network devices to communicate with each other. They
are used in both analog and digital communications and can be used for important processes,
ranging from transferring files between devices to accessing the internet.
Common types of communication protocols include the following:

• Automation: These protocols are used to automate different processes in both


commercial and personal settings, such as in smart buildings, cloud technology or
self-driving vehicles.
• Instant messaging: Instantaneous, text-based communications on smartphones
and computers occur because of a number of different instant messaging network
protocols.
• Routing: Routing protocols permit communication between routers and other
network devices. There are also routing protocols specifically for ad hoc networks.
• Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and
computers — work due to a variety of different Bluetooth protocols.
• File transfer: If you have ever moved files from one device to another, either via a
physical or digital medium, you’ve used file transfer protocols (FTP).
• Internet Protocol: Internet Protocol (IP) allows data to be sent between devices via the
internet. The internet could not operate as it currently does without IP.

Network Management
Network management protocols define and describe the various procedures needed to effectively
operate a computer network. These protocols affect various devices on a single network —
including computers, routers and servers — to ensure each one, and the network, perform
optimally.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023

The functions of network management protocols include the following:

• Connection: These protocols establish and maintain stable connections between


different devices on the same network.
• Link aggregation: Link aggregation protocols allow you to combine multiple network
connections into one link between two devices. This works to increase the strength
of the connection and helps sustain the connection should one of the links fail.
• Troubleshooting: Troubleshooting protocols allow network administrators to identify
errors affecting the network, evaluate the quality of the network connection, and
determine how administrators can fix any issues.

Security
Security protocols, also called cryptographic protocols, work to ensure that the network and the
data sent over it are protected from unauthorized users.
Common functions of security network protocols include the following:

• Encryption: Encryption protocols protect data and secure areas by requiring users to
input a secret key or password in order to access that information.
• Entity Authentication: Entity authentication protocols create a system that requires
different devices or users on a network to verify their identity before accessing secure
areas.
• Transportation: Transportation security protocols protect data while it is transported
from one network device to another.

Network Protocol Example


Whether you know it or not, you’ve absolutely encountered network protocols when using
electronic devices – and some of them are readily identifiable.
Here are a few examples of the most commonly used network protocols:

• Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data is
transmitted over the internet and determines how web servers and browsers should
respond to commands. This protocol (or its secure counterpart, HTTPS) appears at
the beginning of various URLs or web addresses online.
• Secure Socket Shell (SSH): This protocol provides secure access to a computer,
even if it’s on an unsecured network. SSH is particularly useful for network
administrators who need to manage different systems remotely.
• Short Message Service (SMS): This communications protocol was created to send
and receive text messages over cellular networks. SMS refers exclusively to text-
based messages. Pictures, videos or other media require Multimedia Messaging
Service (MMS), an extension of the SMS protocol.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023

Network protocols do not simply define how devices and processes work; they define how devices
and processes work together. Without these predetermined conventions and rules, the internet
would lack the necessary infrastructure it needs to be functional and useable. Network protocols
are the foundation of modern communications, without which the digital world could not stand.

You might also like