Notes in Computer Networking
Notes in Computer Networking
The internet is a worldwide collection of interconnected Popular services for home users and small offices
LANs and WANs. include broadband cable. Broadband digital
subscriber line (DSL), wireless WANs, and mobile The Converging Network
services.
Before converged networks, an organization
Organizations need faster connection to support
would have been separately cabled for telephone, video,
IP phones, video conferencing, and data center
and data. Each of these networks would use different
storages.
technologies to carry the signal.
Business-class interconnections are usually
provided by service providers (SP) and may Each of these technologies would use a different set of
include: rules and standards.
Business DSL
Leased Lines [Reliable Network]
Metro Ethernet Network Architecture
Home and Small Office Internet Connections Network Architecture refers to the technologies
that support the infrastructure that moves data across the
Connection
Cable High bandwidth, always on, internet network.
offered by cable television service There are four basic characteristics that the
providers. underlying architecture need to address to meet user
DSL High bandwidth, always on, internet
expectations:
connection that runs over a telephone
line. Fault Tolerance
Cellular Uses a cell phone network to connect Scalability
to the internet. Quality of Service (QoS)
Satellite Major benefit to rural areas without Security
internet providers.
Dial-up An inexpensive, low bandwidth option Fault Tolerance
Telephone using a modem
A fault tolerant network limits the impact of a
failure by limiting the number of affected devices.
Business Internet Connections Multiple paths re required for fault tolerance.
Several new networking trends that effect Cloud Computing allows us to store personal files
organizations and consumers: or backup our data on servers over the internet.
Bring Your Own Device (BYOD) Applications can also be accessed using the Cloud.
Online collaboration Allows businesses to deliver to an device
Video communications anywhere in the world.
Cloud computing
Cloud computing is made possible by data centers.
Bring Your Own Device
Smaller companies that can’t afford their own
Bring Your Own Device (BYOD) allows users to use data centers, lease server and storage services
their own devices giving them more opportunities and from larger data center organizations in the cloud.
greater flexibility.
Four Types of Clouds: [Network Security]
In addition to DSL and cable, wireless is another Network security components for home or small office
option used to connect homes and small businesses to the network:
internet. Antivirus and antispyware software should be
More commonly found in rural environments, a installed on end devices.
Wireless Internet Service Provider (WISP) is an ISP Firewall filtering used to block unauthorized
that connects subscribers to designated access access to the network.
points for hotspots. Larger networks have additional security requirements:
Wireless broadband is another solution for
households and small businesses. Dedicated firewall system
Uses the same cellular technology used by Access control lists (ACL)
a smartphone. Intrusion prevention systems (IPS)
An antenna is installed outside an Virtual private networks (VPN)
household providing wireless or wired The study of network security starts with a clear
connectivity for devices in the household. understanding of the underlying switching and routing
infrastructure.
TOPIC 3: Protocols and Models the message source to destination over one or more
networks.
[Communication Fundamentals] - 3.1.2
[Message Size] - 3.1.8
Three Elements of Communication Methods:
Another rule of communication is message size. When
1. Message source (sender) - Message sources are
people communicate with each other, the messages that
people, or electronic devices, that need to send a
they send are usually broken into smaller parts or
message to other individuals or devices.
sentences.
2. Message Destination (receiver) - The destination
receives the message and interprets it. [Message Timing] - 3.1.9
3. Channel - This consists of the media that provides
Message timing is also very important in network
the pathway over which the message travels from
communications. Message timing includes the following:
source to destination.
Flow Control – it is the process of managing the
[Communication Protocols] - 3.1.3
rate of data transmission. Flow control defines
Protocols are rules that govern messages, whether by how much information can be sent and the speed
face-to-face communication or over the network. at which it can be delivered.
Response Timeout - If a person asks a question
[Network Protocol Requirements] - 3.1.5
and does not hear a response within an
Common Computer Protocols: acceptable amount of time, the person assumes
that no answer is coming and reacts accordingly.
Message Encoding
Access Method - This determines when someone
Message Formatting and Encapsulation can send a message.
Message Size
Message Timing [Message Delivery Options] - 3.1.10
Message Delivery Options
A message can be delivered in different ways.
[Message Encoding] - 3.1.6
Three Types of Data Communication:
Encoding is the process of converting information into
1. Unicast - information is being transmitted to a
another acceptable form, for transmission. Decoding
single end device.
reverses this process to interpret the information.
2. Multicast – information is being transmitted to
[Message Formatting and Encapsulation] - 3.1.7 one or more end devices.
3. Broadcast – information is being transmitted to all
When a message is sent from source to destination, it end devices.
must use a specific format or structure. Message formats
depend on the type of message and the channel that is [Protocols] - 3.2.1
used to deliver the message.
Protocol Type Description
The process of placing one message format (the letter)
Network Communications Protocols- Protocols enable
inside another message format (the envelope) is called
two or more devices to communicate over one or more
encapsulation. De-encapsulation occurs when the process
networks. The Ethernet family of technologies involves a
is reversed by the recipient and the letter is removed from
variety of protocols such as IP, Transmission Control
the envelope.
Protocol (TCP), HyperText Transfer Protocol (HTTP), and
Internet Protocol (IP) is a protocol with a similar function many more.
to the envelope example.
Network Security Protocols- Protocols secure data to
In the figure, the fields of the Internet Protocol version 6 provide authentication, data integrity, and data
(IPv6) packet identify the source of the packet and its encryption. Examples of secure protocols include Secure
destination. IP is responsible for sending a message from Shell (SSH), Secure Sockets Layer (SSL), and Transport
Layer Security (TLS).
Routing Protocols- Protocols enable routers to exchange Detection data became corrupted during
route information, compare path information, and then to transmission. Various protocols that
select the best path to the destination network. Examples provide error detection include
of routing protocols include Open Shortest Path First Ethernet, IPv4, IPv6, and TCP.
(OSPF) and Border Gateway Protocol (BGP). Application This function contains information used
Interface for process-to-process communications
Service Discovery Protocols- Protocols are used for the between network applications. For
automatic detection of devices or services. Examples of example, when accessing a web page,
service discovery protocols include Dynamic Host HTTP or HTTPS protocols are used to
Configuration Protocol (DHCP) which discovers services for communicate between the client and
IP address allocation, and Domain Name System (DNS) server web processes.
which is used to perform name-to-IP address translation.
Network communication protocols are responsible for a A message sent over a computer network typically
variety of functions necessary for network requires the use of several protocols, each one with its
communications between end devices. own functions and format. The figure shows some
common network protocols that are used when a device
sends a request to a web server for its web page.
Function Description
Addressing This identifies the sender and the
intended receiver of the message using
a defined addressing scheme. Examples
of protocols that provide addressing
include Ethernet, IPv4, and IPv6.
Reliability This function provides guaranteed
delivery mechanisms in case messages
are lost or corrupted in transit. TCP
provides guaranteed delivery.
Flow This function ensures that data flows at
control an efficient rate between two
communicating devices. TCP provides
flow control services.
Sequencing This function uniquely labels each
transmitted segment of data. The
receiving device uses the sequencing
information to reassemble the
information correctly. This is useful if
the data segments are lost, delayed or
received out-of-order. TCP provides
sequencing services.
Error This function is used to determine if
[Network Protocol Suites]- 3.3.1
Application Layer
Name System
Host Config
Web and Web Service ICMPv6 - ICMP for IPv6. Similar functionality to
ICMPv4 but is used for IPv6 packets.
HTTP - Hypertext Transfer Protocol. A set of
rules for exchanging text, graphic images, ICMPv6 ND - ICMPv6 Neighbor Discovery.
sound, video, and other multimedia files on the Includes four protocol messages that are used
World Wide Web. for address resolution and duplicate address
detection.
HTTPS - HTTP Secure. A secure form of HTTP
that encrypts the data that is exchanged over Routing Protocols
the World Wide Web. OSPF - Open Shortest Path First. Link-state
REST - Representational State Transfer. A web routing protocol that uses a hierarchical design
service that uses application programming based on areas. OSPF is an open standard
interfaces (APIs) and HTTP requests to create interior routing protocol.
web applications.
EIGRP - EIGRP -
Enhanced Interior
Gateway Routing
Protocol. An open
standard routing
protocol developed
by Cisco that uses a
composite metric
based on
bandwidth, delay,
load and reliability.
These standard organizations include the following: Providing a common language to describe
networking functions and capabilities
Institute of Electrical and Electronics
Engineers (IEEE, pronounced “I-triple-E”) -
Organization of electrical engineering and
electronics dedicated to advancing
technological innovation and creating standards
in a wide area of industries including power and
energy, healthcare, telecommunications, and
networking. Important IEEE networking
standards include 802.3 Ethernet and 802.11
WLAN standard. Search the internet for other
IEEE network standards.
5 – Session- The session layer provides services to the The definitions of the standard and the TCP/IP protocols
presentation layer to organize its dialogue and to are discussed in a public forum and defined in a publicly
manage data exchange. available set of IETF RFCs. An RFC is authored by
networking engineers and sent to other IETF members
4 – Transport- The transport layer defines services to
for comments.
segment, transfer, and reassemble the data for
individual communications between the end devices. [OSI and TCP/IP Model Comparison]- 3.5.4
3 – Network- The network layer provides services to The protocols that make up the TCP/IP protocol suite
exchange the individual pieces of data over the network can also be described in terms of the OSI reference
between identified end devices. model. In the OSI model, the network access layer and
the application layer of the TCP/IP model are further
2 - Data Link- The data link layer protocols describe
divided to describe discrete functions that must occur at
methods for exchanging data frames between devices
these layers.
over a common media
At the network access layer, the TCP/IP protocol suite
1 – Physical- The physical layer protocols describe the
does not specify which protocols to use when
mechanical, electrical, functional, and procedural means
transmitting over a physical medium; it only describes
to activate, maintain, and de-activate physical
the handoff from the internet layer to the physical
connections for a bit transmission to and from a
network protocols. OSI Layers 1 and 2 discuss the
network device.
necessary procedures to access the media and the
Note: Whereas the TCP/IP model layers are referred to physical means to send data over a network.
only by name, the seven OSI model layers are more
often referred to by number rather than by name. For
instance, the physical layer is referred to as Layer 1 of
the OSI model, data link layer is Layer2, and so on.
As you just learned, it is necessary to segment Network portion (IPv4) or Prefix (IPv6) - The left-most
messages in a network. But those segmented part of the address that indicates the network in
messages will not go anywhere if they are not which the IP address is a member. All devices on the
addressed properly. This topic gives an overview of same network will have the same network portion of
network addresses. You will also get the chance to use the address.
the Wireshark tool, which will help you to ‘view’
Host portion (IPv4) or Interface ID (IPv6) - The
network traffic.
remaining part of the address that identifies a specific
The network and data link layers are responsible for device on the network. This portion is unique for each
delivering the data from the source device to the device or interface on the network.
destination device. As shown in the figure, protocols
Note: The subnet mask (IPv4) or prefix-length (IPv6) is
at both layers contain a source and destination
used to identify the network portion of an IP address
address, but their addresses have different purposes:
from the host portion.
Network layer source and destination addresses -
[Devices on the Same Network]- 3.7.3
Responsible for delivering the IP packet from the
original source to the final destination, which may be Source IPv4 address - The IPv4 address of the sending
on the same network or a remote network. device, the client computer PC1: 192.168.1.110.
Data link layer source and destination addresses - Destination IPv4 address - The IPv4 address of the
Responsible for delivering the data link frame from receiving device, FTP server: 192.168.1.9.
one network interface card (NIC) to another NIC on
the same network. [Role of the Data Link Layer Addresses: Same IP
Network]- 3.7.4
The IP packet contains two IP addresses: The frame with the encapsulated IP packet can now
be transmitted from PC1 directly to the FTP server.
Source IP address - The IP address of the sending
device, which is the original source of the packet.
CHAPTER 5- NUMBER SYSTEM
[Binary and IPv4 Addresses]- 5.1.1 octets. Next apply the binary positional value to the
first octet binary number and calculate accordingly.
IPv4 addresses begin as binary, a series of only 1s and
0s. These are difficult to manage, so network Positional 128 64 32 16 8 4 2 1
administrators must convert them to decimal. This Value
topic shows you a few ways to do this. Binary 1 1 0 0 0 0 0 0
Number
Binary is a numbering system that consists of the (11000000)
digits 0 and 1 called bits. In contrast, the decimal Calculate 128 64 32 16 8 4 2 1
numbering system consists of 10 digits consisting of Add Them 128 + +0 +0 + + + +0
the digits 0 – 9. Up... 64 0 0 0
Result 192
Binary is important for us to understand because
hosts, servers, and network devices use binary
addressing. Specifically, they use binary IPv4 Next convert the second octet of 10101000 as shown
addresses, as shown in the figure, to identify each in the table. The resulting decimal value is 168, and it
other. goes into the second octet.
Performs error detection and rejects any corrupt Router interfaces encapsulate the packet into the
frame. appropriate frame. A suitable media access control
method is used to access each link. In any given
exchange of network layer packets, there may be
[IEEE 802 LAN/MAN Data Link Sublayers]-6.1.2 numerous data link layers and media transitions.
IEEE 802 LAN/MAN standards are specific to Ethernet At each hop along the path, a router performs the
LANs, wireless LANs (WLAN), wireless personal area following Layer 2 functions:
networks (WPAN) and other types of local and
Accepts a frame from a medium
metropolitan area networks. The IEEE 802 LAN/MAN
De-encapsulates the frame
data link layer consists of the following two sublayers:
Re-encapsulates the packet into a new frame
Logical Link Control (LLC) - This IEEE 802.2 sublayer Forwards the new frame appropriate to the
communicates between the networking software at medium of that segment of the physical
the upper layers and the device hardware at the lower network.
layers. It places information in the frame that
[Data Link Layer Standards]-6.1.4
identifies which network layer protocol is being used
for the frame. This information allows multiple Layer 3 Data link layer protocols are generally not defined by
protocols, such as IPv4 and IPv6, to use the same Request for Comments (RFCs), unlike the protocols of
network interface and media. the upper layers of the TCP/IP suite. The Internet
Engineering Task Force (IETF) maintains the functional
Media Access Control (MAC) – Implements this
protocols and services for the TCP/IP protocol suite in
sublayer (IEEE 802.3, 802.11, or 802.15) in hardware.
the upper layers, but they do not define the functions
It is responsible for data encapsulation and media
and operation of the TCP/IP network access layer.
access control. It provides data link layer addressing
and it is integrated with various physical layer Engineering organizations that define open standards
technologies. and protocols that apply to the network access layer
(i.e., the OSI physical and data link layers) include the
The LLC sublayer takes the network protocol data,
following:
which is typically an IPv4 or IPv6 packet, and adds
Layer 2 control information to help deliver the packet Institute of Electrical and Electronics
to the destination node. Engineers (IEEE)
International Telecommunication Union (ITU)
The MAC sublayer controls the NIC and other
hardware that is responsible for sending and receiving International Organization for Standardization
data on the wired or wireless LAN/MAN medium. (ISO)
American National Standards Institute (ANSI)
[Physical and Logical Topologies]- 6.2.1 Bus - All end systems are chained to each other and
terminated in some form on each end. Infrastructure
There are two types of topologies used when
devices such as switches are not required to
describing LAN and WAN networks:
interconnect the end devices. Legacy Ethernet
Physical topology – Identifies the physical connections networks were often bus topologies using coax cables
and how end devices and intermediary devices (i.e, because it was inexpensive and easy to set up.
routers, switches, and wireless access points) are
Ring - End systems are connected to their respective
interconnected. The topology may also include
neighbor forming a ring. The ring does not need to be
specific device location such as room number and
terminated, unlike in the bus topology. Legacy Fiber
location on the equipment rack. Physical topologies
Distributed Data Interface (FDDI) and Token Ring
are usually point-to-point or star.
networks used ring topologies.
Logical topology - Refers to the way a network
[Half and Full Duplex Communication]- 6.2.5
transfers frames from one node to the next. This
topology identifies virtual connections using device Half-duplex communication
interfaces and Layer 3 IP addressing schemes.
Both devices can transmit and receive on the media
[Point-to-Point WAN Topology]- 6.2.3 but cannot do so simultaneously. WLANs and legacy
bus topologies with Ethernet hubs use the half-duplex
Physical point-to-point topologies directly connect two
mode. Half-duplex allows only one device to send or
nodes, as shown in the figure. In this arrangement,
receive at a time on the shared medium. Click play in
two nodes do not have to share the media with other
the figure to see the animation showing half-duplex
hosts. Additionally, when using a serial
communication.
communications protocol such as Point-to-Point
Protocol (PPP), a node does not have to make any [Access Control Methods]- 6.2.6
determination about whether an incoming frame is
Ethernet LANs and WLANs are examples of
destined for it or another node. Therefore, the logical
multiaccess networks. A multiaccess network is a
data link protocols can be very simple, as all frames on
network that can have two or more end devices
the media can only travel to or from the two nodes.
attempting to access the network simultaneously.
The node places the frames on the media at one end
and those frames are taken from the media by the
node at the other end of the point-to-point circuit.
Some multiaccess networks require rules to govern
[LAN Topologies]- 6.2.4 how devices share the physical media. There are two
basic access control methods for shared media:
In multiaccess LANs, end devices (i.e., nodes) are
interconnected using star or extended star topologies, Contention-based access
as shown in the figure. In this type of topology, end Controlled access
devices are connected to a central intermediary Contention-based access
device, in this case, an Ethernet switch. An extended
star extends this topology by interconnecting multiple In contention-based multiaccess networks, all nodes
Ethernet switches. The star and extended topologies are operating in half-duplex, competing for the use of
are easy to install, very scalable (easy to add and the medium. However, only one device can send at a
remove end devices), and easy to troubleshoot. Early time. Therefore, there is a process if more than one
star topologies interconnected end devices using device transmits at the same time. Examples of
Ethernet hubs. contention-based access methods include the
following:
At times there may be only two devices connected on
the Ethernet LAN. An example is two interconnected Carrier sense multiple access with collision detection
routers. This would be an example of Ethernet used (CSMA/CD) used on legacy bus-topology Ethernet
on a point-to-point topology. LANs
Legacy LAN Topologies Carrier sense multiple access with collision avoidance
(CSMA/CA) used on Wireless LANs
Early Ethernet and legacy Token Ring LAN technologies
included two other types of topologies: Controlled access
In a controlled-based multiaccess network, each node
has its own time to use the medium. These
deterministic types of legacy networks are inefficient
because a device must wait its turn to access the
medium. Examples of multiaccess networks that use
controlled access include the following: