Module - Physical Design
Module - Physical Design
In this chapter, we discussed some of the larger issues associated with routing
and switching. When building networks, it is important to understand general concepts
such as static, default, and dynamic routing. As networks grow and complexity, skills that
become important include the ability to develop sound topology decisions and evaluate
routing protocols. VLANs, trunks, installation of routes, and looped architectures were also
covered. The best network administrators not only understand the commands to use, but
the reasons for the commands and how network decisions are made.
The goal of this chapter is to help you select the right switching and routing
protocols for your network design customer. The selections you make will depend on
your customer’s business and technical goals. To help you select the right protocols for
your customer, this chapter covers the following attributes of switching and routing
protocols:
■ Network traffic characteristics
■ Bandwidth, memory, and CPU usage
■ The approximate number of peer routers or switches supported
■ The capability to quickly adapt to changes in an internetwork
■ The capability to authenticate route updates for security reasons
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023
V. LESSON CONTENT
Network Protocols are a set of rules governing exchange of information in an easy, reliable
and secure way. Before we discuss the most common protocols used to transmit and receive data
over a network, we need to understand how a network is logically organized or designed. The
most popular model used to establish open communication between two systems is the Open
Systems Interface (OSI) model proposed by ISO.
OSI Model
OSI model is not a network architecture because it does not specify the exact services and
protocols for each layer. It simply tells what each layer should do by defining its input and output
data. It is up to network architects to implement the layers according to their needs and resources
available.
These are the seven layers of the OSI model −
• Physical layer −It is the first layer that physically connects the two systems that
need to communicate. It transmits data in bits and manages simplex or duplex
transmission by modem. It also manages Network Interface Card’s hardware
interface to the network, like cabling, cable terminators, topography, voltage levels,
etc.
• Data link layer − It is the firmware layer of Network Interface Card. It assembles
datagrams into frames and adds start and stop flags to each frame. It also resolves
problems caused by damaged, lost or duplicate frames.
• Network layer − It is concerned with routing, switching and controlling flow of
information between the workstations. It also breaks down transport layer
datagrams into smaller datagrams.
• Transport layer − Till the session layer, file is in its own form. Transport layer
breaks it down into data frames, provides error checking at network segment level
and prevents a fast host from overrunning a slower one. Transport layer isolates
the upper layers from network hardware.
• Session layer − This layer is responsible for establishing a session between two
workstations that want to exchange data.
• Presentation layer − This layer is concerned with correct representation of data,
i.e. syntax and semantics of information. It controls file level security and is also
responsible for converting data to network standards.
• Application layer − It is the topmost layer of the network that is responsible for
sending application requests by the user to the lower levels. Typical applications
include file transfer, E-mail, remote logon, data entry, etc.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023
It is not necessary for every network to have all the layers. For example, network layer is not there
in broadcast networks.
When a system wants to share data with another workstation or send a request over the network,
it is received by the application layer. Data then proceeds to lower layers after processing till it
reaches the physical layer.
At the physical layer, the data is actually transferred and received by the physical layer of the
destination workstation. There, the data proceeds to upper layers after processing till it reaches
application layer.
At the application layer, data or request is shared with the workstation. So each layer has opposite
functions for source and destination workstations. For example, data link layer of the source
workstation adds start and stop flags to the frames but the same layer of the destination
workstation will remove the start and stop flags from the frames.
Let us now see some of the protocols used by different layers to accomplish user requests.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023
TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is a set of layered
protocols used for communication over the Internet. The communication model of this suite is
client-server model. A computer that sends a request is the client and a computer to which the
request is sent is the server.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023
FTP
As we have seen, the need for network came up primarily to facilitate sharing of files between
researchers. And to this day, file transfer remains one of the most used facilities. The protocol
that handles these requests is File Transfer Protocol or FTP.
Network protocols are typically created according to industry standard by various networking or
information technology organizations.
The following groups have defined and published different network protocols:
• Every time you use the internet, you leverage network protocols. Though you may not
know how network protocols work or how frequently you encounter them, they are
necessary for using the internet or digital communications in any capacity.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023
• Communication
• Network management
• Security
Each type is necessary to use network devices swiftly and safely, and they work together to
facilitate that usage.
Communication
Communication protocols allow different network devices to communicate with each other. They
are used in both analog and digital communications and can be used for important processes,
ranging from transferring files between devices to accessing the internet.
Common types of communication protocols include the following:
Network Management
Network management protocols define and describe the various procedures needed to effectively
operate a computer network. These protocols affect various devices on a single network —
including computers, routers and servers — to ensure each one, and the network, perform
optimally.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023
Security
Security protocols, also called cryptographic protocols, work to ensure that the network and the
data sent over it are protected from unauthorized users.
Common functions of security network protocols include the following:
• Encryption: Encryption protocols protect data and secure areas by requiring users to
input a secret key or password in order to access that information.
• Entity Authentication: Entity authentication protocols create a system that requires
different devices or users on a network to verify their identity before accessing secure
areas.
• Transportation: Transportation security protocols protect data while it is transported
from one network device to another.
• Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data is
transmitted over the internet and determines how web servers and browsers should
respond to commands. This protocol (or its secure counterpart, HTTPS) appears at
the beginning of various URLs or web addresses online.
• Secure Socket Shell (SSH): This protocol provides secure access to a computer,
even if it’s on an unsecured network. SSH is particularly useful for network
administrators who need to manage different systems remotely.
• Short Message Service (SMS): This communications protocol was created to send
and receive text messages over cellular networks. SMS refers exclusively to text-
based messages. Pictures, videos or other media require Multimedia Messaging
Service (MMS), an extension of the SMS protocol.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITT1-3-1ST-2022-2023
Network protocols do not simply define how devices and processes work; they define how devices
and processes work together. Without these predetermined conventions and rules, the internet
would lack the necessary infrastructure it needs to be functional and useable. Network protocols
are the foundation of modern communications, without which the digital world could not stand.