Computer Networking Bible, 3 in 1
Computer Networking Bible, 3 in 1
NETWORKING
BIBLE
3 in 1
The Complete Crash Course to Effectively Design, Implement
and Manage Networks. Including Sections on Security,
Performance and Scalability.
Rick C. Worley
© Copyright Rick C. Worley 2023 - All rights reserved.
The content contained within this book may not be reproduced, duplicated, or
transmitted without direct written permission from the author or the publisher.
Under no circumstances will any blame or legal responsibility be held against the
publisher, or author, for any damages, reparation, or monetary loss due to the
information contained within this book. Either directly or indirectly.
Legal Notice:
This book is copyright protected. This book is only for personal use. You cannot
amend, distribute, sell, use, quote, or paraphrase any part, or the content within this
book, without the consent of the author or publisher.
Disclaimer Notice:
Please note the information contained within this document is for educational and
entertainment purposes only. All effort has been executed to present accurate, up-
to-date, and reliable, complete information. No warranties of any kind are declared
or implied. Readers acknowledge that the author is not engaging in the rendering of
legal, financial, medical, or professional advice. The content within this book has
been derived from various sources. Please consult a licensed professional before
attempting any techniques outlined in this book.
By reading this document, the reader agrees that under no circumstances is the
author responsible for any losses, direct or indirect, which are incurred as a result
of the use of the information contained within this document, including, but not
limited to, — errors, omissions, or inaccuracies.
TABLE OF CONTENTS
Introduction
Conclusion
INTRODUCTION
NETWORKING MODELS
AND STANDARDS
OSI MODEL
I nOpen
1974, the International Standards Organization (ISO) developed the
Systems Interconnection reference model. Standardizing
network design and encouraging suppliers to create it were the goals of
their campaign.
Network hardware without a proprietary design. Seven layers make up
the Reference Model. The more advanced ones—layers 4 through 7—
only apply to end-to-end processes such as user application, messaging
assurance, session setup, user services, and user interface. The
"interface" layers (layers 1 through 3) are what matter for
telecommunications. The Physical Layer, Data Link Layer, and Network
Layer are these. I've attempted to clarify the OSI Reference Model in
this book by breaking down the first three levels into their respective
hardware, protocol, and topology needs. This book will serve you well
for many years because no matter how rapidly technology advances,
the early layers always serve as a reliable basis for telecommunications
networks.
What exactly does it mean when layers 1 through 3 are described as
"stable"? The functional elements of a network constructed today and
one constructed ten years ago will be similar or the same.
Additionally, you configure and troubleshoot your telephone network on
the first three layers. From the standpoint of layers 4 through 7,
however, there isn't a particularly helpful comparison between the
network of today and that of the 1990s. Higher bandwidth and faster
speeds are needed to satisfy the end-to-end function expectations of
the modern market.
The Transport Layer technology will be covered in more detail in later
chapters of this book, along with high-level explanations of the most
widely used transport protocols now in use. To help you predict how the
two will map, Table 1.1 contrasts the OSI Reference Model with what
we're referring to as the OSI Telecommunications Reference Model.
Telecommunication
Levels OSI Reference Model
Model
Level 7 Application
Level 6 Presentation
Level 5 Session
Level 4 Transport End-to-End Protocol
Level 3 Network Network
Level 2.5 Multilink
Level 2 Data Link Data Link
Level 1.5 Logical Link
Level 1 Physical Physical
Table 1.1: OSI Reference Model Vs. OSI Telecommunication Model
Layer Descriptions
Layer 1: The Physical Layer sets the physical data transfer medium's
properties for network connections and oversees keeping track of data
error rates.
Layer 1.5: For inter-station exchanges, the Logical Link sublayer
specifies a service access point and frame format.
Layer 2: The responsibility of the Data Link Layer is to ensure seamless
communication between two adjacent nodes. In case of any errors, the
Data Link Layer initiates a request for data retransmission.
Layer 2.5: For topologies and access control mechanisms, the Multilink
sublayer offers an interface between the logical links and the physical
media. By using logical links, it is possible for two communicating Data
Link Layers on different hosts to use the same standards for data flow
management, error handling, and retransmission requests.
Layer 3: The Network Layer oversees flow control and routing
operations.
Layer 4: End-to-end protocol functionalities that boost bandwidth and
data rate speeds are included in the Transport Layer.
TCP/IP MODEL
TCP/IP, which stands for Transmission Control Protocol/Internet
Protocol, is a set of communication protocols used for connecting
network devices on the internet, as well as private computer networks
such as intranets or extranets. The complete IP suite includes various
other protocols, but TCP and IP are the most widely used ones. The
TCP/IP protocol suite functions as a bridge between the routing and
switching fabric and internet applications. Its primary function is to
facilitate end-to-end communications, which involves dividing data into
packets, addressing, transferring, routing, and receiving it at the
destination. This mechanism defines how data is exchanged over the
internet and ensures that networks are dependable and can recover
from the failure of any device with minimal central management
requirements. TCP defines how programs can establish communication
paths across a network and control the message fragmentation
process, packet broadcasting, and reconfiguration of messages in the
correct order at the destination address.
ETHERNET STANDARDS
A specific media type's characteristics, operations, and implementation
are described in an Ethernet standard. There are many different media
types. A media type can offer various transmission speeds for various
implementation kinds. An implementation of a given media type is
specified by an Ethernet standard. IEEE establishes Ethernet
standards.
To further grasp the vocabulary used above, let's look at an example.
The following are the characteristics of "100BaseT": -
The number 100 denotes that this media type's typical data transfer
speed is 100 Mbps.
Base: - The word "Base" denotes that baseband technology is used by
the media for transmission.
T: - The media employs twisted-pair cabling, as indicated by the letter
"T."
Major points
An Ethernet standard's name is made up of three
components. A number appears in the first section, a word
—most often Base—in the second, and a number or set of
characters in the third.
The media's data transmission speed is specified in the first
section.
The second portion describes the media's data transmission
technology or methodology. The term "Base" refers to a
particular type of network that mandates that all network
stations use a single carrier frequency for signaling.
The third component specifies the length or kind of cable
that the media use. For instance, if the letter T appears in
this section of the standard, twisted-pair cabling is used.
Alternatively, if a standard has a number 5 in this section, it
can span a distance of 500 meters.
The characteristics and purposes of the most popular Ethernet
standards
The characteristics and features of the most popular Ethernet standards
are described in the section that follows.
10Base2
ThinNet is another name for this protocol. A coaxial cable is used. The
speed is 10 Mbps. A maximum length of 200 meters is supported.
Modern networks do not use this standard.
10Base5
ThickNet is another name for this standard. It offers 10Mbps speed and
utilizes coaxial cable as well. A maximum length of 500 meters is
supported. Additionally, contemporary networks do not employ this
norm.
10BaseT
One of the most widely used Ethernet standards in Ethernet networks is
10BaseT. Hubs and UTP (Cat3 or higher) cables are employed. Both a
logical bus topology and a physical star topology are used by hubs.
Signals are repeated and forwarded by hubs to all nodes. The 10BaseT
networks are slow and prone to collisions because of Hubs.
This standard also establishes a limit on the quantity of Hubs that may
be used in a network. This regulation states that a maximum of four
hubs may be positioned between working stations that can
communicate. This rule guarantees that every station on the network
can see a collision.
The 10BaseT standard is not used by contemporary networks because
of the sluggish data transfer speed and collision.
10BaseF
An application of 10BaseT over fiber optic cabling is 10BaseF. Even
though the fiber optic media can support significantly greater data
speeds, 10BaseF only gives 10 Mbps. The connection of two hubs as
well as the connection of hubs to workstations, is one of the 10BaseF
implementations.
The 10BaseT standard is likewise not used in contemporary networks
because of the sluggish data transfer speed and expensive wiring.
100BaseT4
To upgrade 10BaseT networks on Cat3 wire to 100 Mbps without
having to replace the wiring, 100BaseT4 was developed. Twisted pair
wiring is used with four pairs, two of which are set up for half-duplex
transmission. (Data can move in only one direction at a time). The other
two pairs are set up for simplex transmission, which means that data
always travel in just one direction on each pair.
100BaseTX
Fast Ethernet is another name for 100BaseTX. It uses 100 Mbps to
transport data. Fast Ethernet functions almost exactly like 10BaseT,
down to the fact that it uses a logical bus and a physical star
architecture. UTP cabling must be Cat5 or above to support
100BaseTX. It makes use of two of the four-wire pairs, one for data
transmission and the other for data reception.
In contemporary networks, this Ethernet protocol is primarily employed.
100BaseFX
The term "100BaseFX" refers to Fast Ethernet over fiber. Fiber optic
multimode cables are used for 100BaseFX. LEDs are used in multimode
fiber optic cables to transport data, and the cables are thick enough for
the light signals to bounce off the walls. The length of the multimode
fiber is constrained by signal dispersion.
1000BaseT
Gigabit Ethernet is yet another name for 1000BaseT. It makes use of
Cat5 or better UTP cable. All four cable pairs are utilized. It makes use
of a logical bus and a physical star topology. Additionally, there is
1000BaseF, which utilizes multimode fiber optic cable. Both full-duplex
and half-duplex data transmission modes are supported.
10GBaseT
This specification is also referred to as 10 Gigabit Ethernet. It makes
use of Cat6 or better UTP cable. The UTP cable's four pairs are all
utilized. It offers 10 Gbps bandwidth. It is only capable of full-duplex
operation.
It is typically utilized in the backbone of a network due to its high cost.
WIRELESS STANDARDS
Wi-Fi is a blanket phrase. It is precise in a sense. It describes a certain
technique you can employ to access the internet.
The Wi-Fi standards come in a wide variety. Different wireless
standards are used by your router, laptop, tablet, smartphone, and
smart home appliances to connect to the internet. Wireless standards
also evolve on a regular basis. Updates result in improved connections,
quicker internet, more simultaneous connections, etc.
The problem is that the sheer number of wireless standards and
specifications confuses most individuals. Here is a list of all Wi-Fi
standards.
Explaining Wi-Fi Standards
Your Wi-Fi network's behavior, as well as the behavior of other data
transmission networks, is governed by a set of services and protocols
known as wireless standards.
The IEEE 802.11 Wireless LAN (WLAN) & Mesh standards are the two
that you will run into the most frequently. Every few years, the IEEE
changes the 802.11 Wi-Fi standard. The most popular Wi-Fi standard at
this time is 802.11ac, although 802.11ax, also known as Wi-Fi 6 and Wi-
Fi 6E—but more on that later! —is currently being implemented, albeit
more slowly than most experts anticipated.
The generation after 802.11ax is now approaching, with IEEE 802.11be
slated to debut around 2024–2025. (Using the name Wi-Fi 7).
A Synopsis of Wireless Standards History
Not every outdated Wi-Fi standard is the same. Last of all, not yet. Here
is a brief history of Wi-Fi standards, along with information on whether
they are still in use.
NETWORK DEVICES
AND TOPOLOGIES
ROUTERS
Similar to a switch, a router directs data packets depending on their
IP addresses. Mainly a Network Layer device, the router. Routing
decisions are made by routers, which typically connect LANs and
WANs, using a routing table that is dynamically updated. The router
divides the broadcast domains of hosts that are connected through it.
SWITCHES
A switch is a data link layer device that functions as a multiport bridge
and has a buffer designed to enhance its performance and efficiency.
Its ability to accommodate more ports results in reduced traffic. The
switch may carry out error checking before forwarding data, which
makes it incredibly efficient because it only forwards good packets to
the right port and does not transmit packets with mistakes. In other
words, while the switch separates the hosts' collision domain, the
broadcast domain is left unchanged.
HUBS
A hub is essentially a multi-port repeater that joins multiple wires
originating from various branches, similar to a connector in a star
topology that connects different stations. Since hubs lack the ability to
filter data, data packets are broadcasted to all connected devices.
This implies that all hosts linked via a hub continue to share a single
collision domain. Furthermore, hubs lack the intelligence to determine
the optimal route for data packets, which leads to inefficiency and
wastage.
Types of Hubs:
1. Active Hub: These are hubs with their own power sources
that can also amplify, clean, and relay the network's
signal. It functions as a wiring center and a repeater at
the same time. The maximum distance between nodes
can be increased using these.
2. Passive Hubs: The hubs known as "passive hubs" are
those that receive power and wiring from active hubs.
These hubs cannot be utilized to increase the distance
between nodes because they just transport signals onto
the network without boosting or cleaning them.
3. Integrated Hub: It functions as an active hub and has the
ability for remote management. They also provide
network devices with adjustable data rates. Additionally, it
permits an administrator to set up each port in the hub
and watch the traffic flowing through it.
Point-to-Point
In a point-to-point network, exactly two hosts, such as computers,
switches, or servers, are connected via a single wire. Typically, the
sending end of one host is connected to the receiving end of another
host and vice versa. Even if multiple intermediate devices connect the
hosts logically, the end hosts appear directly connected and unaware
of the underlying network.
Bus Topography
All devices in a bus topology share a single communication line or
cable. However, when multiple hosts are sending data simultaneously,
Bus topology may face issues. To tackle this problem, Bus topology
employs CSMA/CD technology or assigns one host as Bus Master. It
is one of the most straightforward networking models, where one
device's failure does not affect other devices. However, if the shared
communication channel fails, all other devices could become
inoperable.
The shared channel in Bus topology has line terminators at both ends.
Data is transmitted in one direction, and the terminator cuts off the
line when the data reaches the end.
Skyline Topology
In a star topology, each host is connected through a point-to-point link
to a central component known as the hub device. This means that
both the hosts and hub are point-to-point connected. A Layer-1
device, such as a hub or repeater, a Layer-2 device, like a switch or
bridge, or a Layer-3 device, such as a router or gateway, can serve
as the hub device.
The hub acts as a single point of failure, similar to Bus topology. If the
hub fails, none of the hosts can connect to any other host. The hub is
the sole channel through which hosts can communicate with each
other. The cost of implementing a star topology is low because only
one cable is required to connect an additional host, and the
configuration is simple.
Topology of rings
In a ring topology, each host connects to two more hosts, resulting in
a circular network structure. Data passes through all intermediate
hosts if one host needs to communicate with another host that is not
nearby. One additional cable may be required to add a new host to
the current structure. However, any host failure causes the entire ring
to fail, and every link in the ring is a potential weak point.
Mesh Topology
In a mesh topology, a host is connected to one or more hosts. Hosts
may be point-to-point connected to each other or only connected to a
few hosts.
Mesh topology hosts can also act as a relay for other hosts without
direct point-to-point links. Mesh technology is available in two
varieties:
Full Mesh: Each host in the network has a point-to-point link with
every other host. Therefore, n(n-1)/2 connections are needed for
every new host. Of all network topologies, it offers the most
dependable network structure.
Partially Mesh: Not every host is connected to every other host on a
point-to-point basis. Hosts connect to one another in a random
manner. In this topology, we must give certain hosts out of all the
host's reliability.
Topology of trees
The most commonly used network structure, also known as a
hierarchical topology, is modeled on an extended Star topology and
incorporates features of bus topology.
This topology divides the network into multiple tiers or layers,
particularly in LANs. There are three types of network devices that
are used to divide the network. The lowest tier is the access layer to
which computers are linked. The distribution layer, situated between
the top and bottom layers, is the middle layer. The topmost layer is
the core layer, which serves as the network's central node and from
which all nodes branch out.
There is a point-to-point link between each neighboring host. Like the
Bus topology, the entire network is affected if the route fails. Even
though there are other points of failure. Every link acts as a potential
point of failure, and when one fails, a portion of the network becomes
inaccessible.
Chain Daisy
This architecture creates a linear connection between each host. All
hosts, with the exception of the end hosts, are connected to just two
hosts, similar to the Ring topology. This indicates that a daisy chain
has a ring topology if the end hosts are connected.
In a daisy chain topology, every link is a potential single point of
failure. The network is divided into two sections for each broken link.
For its immediate hosts, each intermediate host serves as a relay.
Hybrid Topology
A hybrid topology is a network structure that incorporates many
topologies into its design. The benefits and drawbacks of each
incorporating topology are carried over into the hybrid topology.
The topology in the image above is arbitrary and hybrid. The merging
topologies may incorporate elements of the Star, Ring, Bus, and
Daisy-chain topologies. Most WANs are connected using Dual-Ring
architecture, while the networks that are connected to them typically
use Star topology. The largest hybrid topology is best exemplified by
the Internet.
CHAPTER 3
NETWORK PROTOCOLS
AND SERVICES
Subnetting:
A network within a network is referred to as a subnetwork or subnet.
Subnets enhance the efficiency of networks by allowing network
communication to travel a shorter distance to reach its destination
without requiring additional routers.
Why is subnetting important?
The structure of IP addresses makes it relatively easy for Internet
routers to determine the correct network for routing data, as
demonstrated in the previous example. However, in a Class A
network where there may be millions of connected devices, it may
take some time for data to locate the correct device. Subnetting is
useful because it limits the use of IP addresses to a specific group of
devices.
IP addresses cannot be used to indicate which subnet an IP packet
should be directed to since they only identify the network and device
address. Routers in a network use a device called a subnet mask to
divide data into subnetworks.
What is a subnet mask?
Similar to an IP address, a subnet mask is used internally within a
network. Routers use subnet masks to direct data packets to the
appropriate destination. Subnet mask information is not included in
data packets traveling over the Internet; instead, they only contain the
destination IP address, which a router matches with a subnet.
To provide a real-world example, consider an IP packet addressed to
the IP address 192.0.2.15.
Since this IP address belongs to a Class C network, the network is
designated by the prefix "192.0.2" (or, to be more exact,
"192.0.2.0/24"). The packet is forwarded by network routers to a
host on the network denoted by "192.0.2."
A router in that network analyses its routing database once the
packet arrives there. With the help of its 255.255.255.0 subnet mask
and the device address "15" (the remaining portion of the IP address
identifies the network), it performs some binary calculations to
determine which subnet the packet should travel to. The packet
arrives at IP address 192.0.2.15 and is forwarded to the router or
switch in charge of delivering packets inside that subnet.
DNS (Domain Name System)
Remote Access
A device outside the corporate office can be safely connected via a
remote access VPN. Endpoints are these devices, which can be
computers, tablets, or smartphones.
Site to Site
A site-to-site VPN is utilized to connect corporate and branch offices
over the internet when direct network connections between them are
not feasible due to distance.
WIRELESS NETWORKING
802.11ax (Wi-Fi 6)
The 802.11ax standard, often known as Wi-Fi 6, went live in 2019
and will take the place of 802.11ac as the de facto wireless standard.
Wi-Fi 6 has a 10 Gbps maximum throughput, uses less power, is
more dependable in crowded areas, and offers greater security.
802.11aj
The China Millimeter Wave standard, which is applicable in China, is
essentially an 802.11ad rebranding for usage in specific parts of the
world. The objective is to keep 802.11ad backward compatible.
802.11ah
This standard, which was approved in May 2017, aims to reduce
energy usage while generating extended-range Wi-Fi networks that
can reach farther than normal 2.4 GHz or 5 GHz networks. Given its
lessened power requirements, it is anticipated to compete with
Bluetooth.
802.11ad
This standard, which was approved in December 2012, is incredibly
quick. But the client device needs to be close to the access point—
within 30 feet.
802.11ac (Wi-Fi 5)
Wi-Fi 802.11ac, which uses dual-band wireless technology and
supports simultaneous connections on both 2.4 GHz and 5 GHz Wi-Fi
devices, was the first Wi-Fi version to signal widespread use. With a
bandwidth rating of up to 1300 Mbps on the 5 GHz bands and up to
450 Mbps on the 2.4 GHz, 802.11ac is backward compatible with
802.11a/b/g/n. The majority of residential wireless routers adhere to
this standard.
The most expensive to implement is 802.11ac, and only high-
bandwidth applications will see performance increases.
Another name for 802.11ac is Wi-Fi 5.
802.11n
By employing several wireless signals and antennas (referred to as
MIMO technology) in place of just one, 802.11n (also referred to as
Wireless N) was created to outperform 802.11g in terms of the
amount of bandwidth it offers. In 2009, industry standards
organizations approved 802.11n, whose specs allowed for a
maximum network capacity of 600 Mbps. Due to its stronger signal,
802.11n also has a little longer range than earlier Wi-Fi protocols and
is backward compatible with 802.11a/b/g equipment.
The advantages of 802.11n include a significant increase
in bandwidth over earlier standards and widespread
support from network hardware.
The usage of several frequencies may cause interference
with neighboring 802.11b/g-based networks, and 802.11n
is more expensive to implement than 802.11g.
Wi-Fi 4 is another name for 802.11n.
802.11g
WLAN products that supported the 802.11g standard, a more recent
one, first appeared on the market in 2002 and 2003. In an effort to
improve on both 802.11a and 802.11b, 802.11g was developed. With
a maximum 54 Mbps bandwidth capacity and a 2.4 GHz frequency,
802.11g offers a longer range. Because 802.11g and 802.11b are
backward compatible, 802.11g access points can be used with
802.11b wireless network adapters and vice versa.
NETWORK DESIGN
AND PLANNING
NETWORK IMPLEMENTATION
AND MAINTENANCE
Hub
Switch
Router
Modem
Firewall
Server
For optimal network effectiveness and efficiency, each of these
devices performs a separate purpose within the network that
complements the others. Your understanding of how these devices
work will help you appreciate the value of thorough installation and
configuration procedures, as well as how a network truly works.
NETWORK TROUBLESHOOTING
How can your network settings be checked?
You can inspect details about your network settings and customize
your network interface in a command-line environment by using the
programs ipconfig (for Windows network configuration) and ipconfig
(for Linux network configuration, as well as Mac OS X and other
Linux-like environments).
You may inspect and configure the network configuration via a
centralized software interface using a network configuration manager
or APIs, making it simpler to configure, monitor, and manage your
network. The use of automation to update and change policies are
also made possible by a network configuration manager.
NETWORK SECURITY
AND MANAGEMENT
A nvirtual
administrator can control a network made up of physical and
firewalls using network security management, which is done
from a single central location. To gain a high level of insight into
network behavior, automate device configuration, enforce global
policies, view firewall traffic, generate reports, and offer a unified
administration interface for physical and virtual systems,
administrators need network security management solutions.
UNDERSTANDING NETWORK SECURITY
THREATS
We frequently gauge the success of cybersecurity by the attacks we
don't encounter, which can cause us to worry about whether we're
overlooking a network security issue. And can network security
threats be reduced before they manifest?
It's a legitimate worry. According to The Center for Strategic and
International Studies, two-thirds of internet users, including those who
work for your companies or partners, have been compromised by
cybercriminals in some form. (CSIS). Cybercrime actually costs the
world economy over $600 billion annually or close to 1% of GDP, and
by 2025, it's expected to cost $10.5 trillion USD annually.
So how can you effectively manage your network's weaknesses and
threats? This article will define network security dangers, list a few
typical threats, and explain how to spot them.
What are the main types of risks to network security?
Although there are many different kinds of network security risks,
they can be divided into four broad groups:
1. External
External threats are dangers posed to your company by entities,
people, or even uncontrollable natural calamities that could harm your
network. This is accomplished by taking advantage of a flaw,
vulnerability, or data loss that has a major negative impact on network
security and business operations.
2. Internal
These are insider threats, such as those made by unsatisfied or
insufficiently vetted employees who are working for someone else.
Sadly, internal risks are frequent in lots of firms.
3. Organized dangers
Structured threats are planned attacks carried out by hackers who
are skilled at what they do and have a specific objective in mind. For
instance, attacks that are sponsored by states fall under this heading.
4. Unorganized assaults
Unstructured attacks are poorly planned attacks, frequently carried
out by novices with no clear objective in mind.
NETWORK VIRTUALIZATION
NETWORK AUTOMATION
Exinda
Netmiko
SolarWinds Network Configuration Manager (NCM)
BeyondEdge Networks
BMC Software TrueSight Automation
VMware NSX
NetBrain
Apstra OS
Final Thoughts
NETWORK PERFORMANCE
OPTIMIZATION
I nmeasured,
order to optimize network performance, performance must be
and any necessary adjustments must be made in order
to identify bottlenecks and potential improvement areas. Your
network can give your company a competitive edge by incorporating
an iterative performance tweaking process with a data-driven
approach to analysis.
The intrinsic "optimization" feature, however, is a crucial component of
network optimization. Building a robust system that can endure any
tragedy known to man (or undiscovered) is not what network
optimization entails. Achieving a good balance between performance
and cost is necessary for enterprise network optimization. Your and
your team's lives will be miserable if you underbuild your network
systems. You've probably squandered money and over your budget if
you overbuild your network systems.
Traffic enforcement
The dropping (discarding) or demoting (reducing in priority) of
packets (or frames) that exceed a specific bandwidth and/or
burstiness limit is known as traffic policing.
WAN OPTIMIZATION
Wide area network (WAN) optimization is a group of methods for
enhancing data transfer. (WANs). According to technology research
company Gartner, the WAN optimization market had an estimated
2008 value of $1 billion and was projected to reach $4.4 billion by
2014. The WAN optimization market was valued at $1.1 billion in
2015, according to Gartner.
Throughput, bandwidth needs, latency, protocol optimization, and
congestion, as shown by dropped packets, are the most typical
indicators of TCP data-transfer efficiency (i.e., optimization). The
WAN itself can also be divided into categories based on the distances
between endpoints and the data volumes transferred. Data Center to
Data Center and Branch to Headquarters are two typical enterprise
WAN topologies. (DC2DC) "Branch" WAN links are typically more
efficient, closer, able to handle a wider range of protocols, and able
to support more simultaneous connections, smaller connections, and
connections with shorter lifespans. Business applications, including
email, content management systems, database software, and Web
distribution, employ them. "DC2DC" WAN lines, in contrast, typically
demand more bandwidth, are farther away, and only involve a small
number of connections, but those connections are larger (100 Mbit/s
to 1 Gbit/s flows) and last for a longer period of time. Replication,
backup, data migration, virtualization, and other Business
Continuity/Disaster Recovery (BC/DR) flows might all be part of the
traffic on a "DC2DC" WAN.
Optimization methods for WAN
Deduplication
Sends references rather than real data, preventing the delivery of
unnecessary data across the WAN. Benefits are gained across IP
applications by operating at the byte level.
Compression of data
Relies on more effectively described data patterns. Essentially, data
traveling via hardware-based (or virtual machine-based) WAN
acceleration appliances is compressed on-the-fly using techniques
such as ZIP, RAR, ARJ, etc.
Optimization of latency
Include Layer 3 congestion control methods, window-size scaling,
selective acknowledgments, and other TCP enhancements. Co-
location strategies are also possible, in which the application is
positioned close to the endpoint to cut down on latency.[15] In some
instances, the local WAN optimizer will respond to client requests
locally rather than sending them on to a remote server in order to
take advantage of write-behind and read-ahead methods and
decrease WAN latency.
Caching/Proxy
Data staging in local caches; reliance on user access to the same
data again.
Correction of forward errors
Reduces the requirement for retransmissions in error-prone and busy
WAN lines by providing an additional loss-recovery packet for every N
packet delivered.
Spoofing of protocols
Grouping together several requests from talkative applications. It
could also mean simplifying protocols like CIFS.
Traffic patterning
Controls the flow of data for particular purposes. Allowing network
administrators and operators to choose which apps should be
prioritized over WAN traffic. To prevent one protocol or application
from flooding or hogging a link over other protocols deemed more
vital by the business or administrator would be a typical use case for
traffic shaping. Some WAN acceleration devices can shape traffic far
more precisely than conventional network devices can, such as
simultaneously tailoring traffic according to each user and each
application.
Equalizing
depending on the data usage makes assumptions about what needs
to be given priority right now. Wide open, unrestricted Internet
connections and congested VPN tunnels are two usage scenarios for
equalizing.
limitations on connections
prevents access obstruction to peers or denial of service. Links are
most suitable for open Internet access, although they can also be
used as links.
simple rate restrictions
prevents one user from using more bandwidth than is allotted. Best
suited as a temporary first attempt to improve a WAN link or Internet
connection that is overloaded.
CHAPTER 7
NETWORK SCALABILITY
AND RESILIENCE
NETWORK SCALABILITY
NETWORK RESILIENCE
The ability to "provide and maintain an acceptable level of service in
the face of faults and challenges to normal operation" is known as
resilience in computer networking. Services may be threatened or
faced with difficulties ranging from minor setup errors to severe
natural disasters to deliberate attacks. Network resilience thus covers
a very broad spectrum of subjects. It is necessary to create
appropriate resilience measures and identify the likely risks and
obstacles for a given communication network in order to boost
resilience and safeguard the service.
As communication networks become an essential part of the
operation of critical infrastructures, the significance of network
resilience is continuously growing. The interpretation and
enhancement of network and computing resilience with applications to
critical infrastructures is the focus of contemporary initiatives. As an
illustration, one may use the delivery of services across the network,
as opposed to the network's own services, as a resilience target. The
network and any services that are operating on top of it may need to
respond in unison to this.
Error by Humans
wilful sabotage
Digital Attacks
Hardware Error
Electricity Outages/Natural Disasters
These five types are important to take into account while creating a
business continuity plan and asking how to reduce the effects of
these threats and bounce back if you are attacked. Protecting your
servers and company data is made possible by using recovery
technology, such as a BCDR solution.
Disaster recovery plans versus business continuity plans
While disaster recovery focuses on the IT or technology systems that
support company processes, business continuity entails planning for
keeping all areas of an organization operating even in the face of
disruptive occurrences.
Disaster Recovery
Before a disaster strikes, get ready.
Being ready for future disasters is essential when it comes to data
backup and disaster recovery (BDR) since it keeps your organization
operating. Not only is it crucial to have a disaster recovery plan you
can rely on, but good planning should also be one of your greatest
strengths. This includes putting the plan to the test.
But what if you neglect to test your plan, and it fails when you need it
the most? Many companies say they do not have the time or are
concerned about the impact of testing their business continuity plan
and the downtime it could cause. Testing your plan could seem
difficult and could possibly reveal some weaknesses in your backup
system. However, it's preferable to identify bugs in a low-stress
emergency situation rather than while you're under pressure to fix
them.
PART III
ADVANCED
NETWORKING
TOPICS
CHAPTER 1
CLOUD COMPUTING
AND NETWORKING
Public Cloud
The public cloud refers to a cloud computing model in which
resources, services, and applications are made available to users
over the Internet by a third-party provider. In this model, the cloud
service provider owns, manages, and maintains the physical
infrastructure, such as servers, storage, and networking equipment.
Users can access these resources on a pay-as-you-go basis, which
allows them to scale their usage according to their needs without
investing in and maintaining their own hardware. Some popular
examples of public cloud providers include Amazon Web Services
(AWS), Microsoft Azure, Google Cloud Platform, and IBM Cloud.
These providers offer a wide range of services, such as computing
power, storage, databases, machine learning, and application
development platforms, catering to the diverse needs of businesses
across various industries.
Key benefits of the public cloud include:
Private Cloud
A private cloud is a cloud computing model in which resources and
services are dedicated exclusively to a single organization or group of
organizations. Private clouds can be hosted on-premises or at a data
center owned by a third-party provider, and they are typically built
and maintained by the organization itself or by a managed services
provider.
Key benefits of the private cloud include:
Hybrid Cloud
The hybrid cloud model combines the advantages of both public and
private clouds, allowing organizations to leverage the cost-efficiency
and scalability of public cloud services while maintaining the security
and control provided by private clouds. In a hybrid cloud environment,
resources and services are integrated and managed across both
public and private cloud infrastructures.
Community Cloud
A community cloud is a cloud computing model in which resources
and services are shared among multiple organizations with similar
goals, requirements, or interests. This model is particularly beneficial
for organizations that need to comply with specific regulations,
policies, or security requirements that may not be met by public or
private cloud offerings. Community clouds can be hosted and
managed by one of the participating organizations, a third-party
provider, or a combination of both.
Network latency,
Data privacy and security, and
Network performance,
Network latency is a critical concern in cloud networking, as it can
impact the overall performance and user experience of cloud-based
applications and services. Latency refers to the time it takes for data
to travel between its source and destination, and it can be influenced
by factors such as geographical distance, network congestion, and
infrastructure limitations. To mitigate latency issues, organizations can
adopt several strategies, including the use of content delivery
networks (CDNs) to distribute data and applications closer to end-
users, optimizing application architectures for low latency, and
leveraging network optimization technologies such as WAN
acceleration.
Data privacy and security are paramount in cloud networking, as
organizations must protect sensitive information and comply with
various regulatory requirements. The shared nature of cloud
environments can introduce additional security risks and
vulnerabilities, making it essential for organizations to adopt robust
security measures. Solutions to address data privacy and security
challenges in cloud networking include encryption of data both in
transit and at rest, implementing robust access controls and
authentication mechanisms, conducting regular security audits and
vulnerability assessments, and using network security technologies
such as firewalls, intrusion detection and prevention systems, and
security information and event management (SIEM) tools.
Network performance is another crucial aspect of cloud networking,
as it directly impacts the efficiency and reliability of cloud-based
applications and services. Maintaining optimal network performance
can be challenging in cloud environments, particularly when dealing
with complex, distributed applications and fluctuating workloads. To
address network performance issues, organizations can employ
strategies such as monitoring and analyzing network traffic patterns,
implementing quality of service (QoS) policies to prioritize critical
applications and services, optimizing network configurations for
specific workloads, and leveraging network automation tools to
streamline management and maintenance tasks.
CHAPTER 2
SOFTWARE-DEFINED
NETWORKING (SDN)
SDN Controller
The SDN controller is the central element of SDN architecture, acting
as the "brain" of the network. It is responsible for managing the entire
network's control plane and making decisions regarding routing,
traffic management, and network configuration. The SDN controller
communicates with network devices using standardized protocols,
such as OpenFlow, to issue instructions and receive information about
the network's state. By centralizing control in the SDN controller,
organizations can gain a holistic view of their network, simplifying
management tasks and enabling more agile and dynamic network
operations.
Network Devices
Network devices, such as switches and routers, form the data plane
of the SDN architecture. These devices are responsible for
forwarding data packets based on the instructions provided by the
SDN controller. In an SDN environment, network devices are typically
simplified and standardized, as many of the complex decision-making
tasks traditionally performed by these devices are offloaded to the
SDN controller. This separation of the control and data planes
enables greater flexibility in network configuration and allows
organizations to rapidly adapt their networks to changing
requirements and workloads.
SDN Applications
SDN applications are software programs that interact with the SDN
controller to define and implement specific network policies and
services. These applications can range from simple network
management tools to more advanced solutions that leverage network
analytics, machine learning, and artificial intelligence to optimize
network performance, security, and reliability. By providing a
programmable interface to the network, SDN applications enable
organizations to create customized network services that align with
their unique business needs and objectives.
BENEFITS OF SDN
Increased Flexibility
One of the most significant advantages of SDN is its ability to provide
unprecedented flexibility in network configuration and management.
By decoupling the control plane from the data plane, SDN allows
organizations to adapt their networks to changing requirements and
workloads more quickly and easily. This increased flexibility enables
businesses to respond more effectively to shifting market conditions,
customer demands, and technological advancements.
Cost Savings
SDN can lead to significant cost savings for organizations by reducing
both capital and operational expenses. By utilizing software-based
network functions, businesses can minimize their reliance on
expensive, specialized hardware and streamline their network
infrastructure. Additionally, the automation and programmability
enabled by SDN can reduce the time and effort required for network
management, leading to lower operational costs.
Enhanced Security:
SDN provides organizations with improved visibility and control over
their network traffic, enabling them to detect and respond to potential
security threats more effectively. Through the centralized SDN
controller, network administrators can implement and enforce security
policies across the entire network, ensuring consistent protection
against cyber threats. Furthermore, SDN can integrate with advanced
security tools and technologies, such as intrusion detection and
prevention systems, to provide a comprehensive security framework
for modern networks.
Improved Scalability
SDN is designed to support the dynamic, distributed nature of today's
cloud-based applications and services. By leveraging programmable
interfaces and automated network functions, SDN can scale more
efficiently than traditional networking approaches, enabling
organizations to support growing workloads and user demands
without sacrificing performance or reliability.
Traffic Engineering
Traffic engineering involves the optimization of network traffic flows to
ensure efficient utilization of available resources, minimize congestion,
and improve overall network performance. SDN enables fine-grained
control over traffic routing and prioritization, allowing network
administrators to implement sophisticated traffic engineering
strategies that optimize network resource usage and minimize
latency. By leveraging the programmability and automation
capabilities of SDN, organizations can dynamically adapt their traffic
engineering policies in response to real-time network conditions and
user demands.
Security Concerns
SDN centralizes the control plane, which can create a single point of
failure and a potential target for cyber-attacks. Therefore,
organizations need to implement robust security measures to protect
the SDN controller and ensure the integrity of the control plane. Some
strategies for enhancing SDN security include strong authentication
and encryption for controller-to-switch communications, regular
vulnerability assessments and penetration testing, and network
segmentation to limit the potential impact of a security breach.
INTERNET OF THINGS
(IOT) NETWORKING
IoT Gateways
IoT gateways serve as the bridge between IoT devices and the
broader IoT ecosystem. They play a critical role in facilitating
communication, data processing, and security for connected devices.
IoT gateways perform several essential functions, including:
IoT Platforms
IoT platforms are the backbone of the IoT ecosystem, providing a
centralized environment for managing, processing, and analyzing data
from connected devices. They offer a range of tools and services that
enable organizations to build, deploy, and manage IoT applications,
as well as facilitate data storage, analytics, and integration with other
systems. Key features of IoT platforms include:
Zigbee
Zigbee is a widely-used wireless networking protocol designed
specifically for low-power, low-data-rate IoT devices. Based on the
IEEE 802.15.4 standard, Zigbee operates in the 2.4 GHz frequency
band and supports mesh networking, which allows devices to relay
messages through other devices in the network, enhancing the range
and reliability of communication. Zigbee is particularly suited for
applications such as smart homes, industrial automation, and
environmental monitoring, where devices need to operate on minimal
power consumption while maintaining reliable connectivity.
LoRaWAN
LoRaWAN (Long Range Wide Area Network) is a low-power, wide-
area networking (LPWAN) protocol designed for IoT devices that
require long-range communication and low power consumption.
LoRaWAN uses the unlicensed sub-GHz frequency bands and
employs a unique modulation technique called Chirp Spread Spectrum
(CSS), which enables communication over distances of up to 10 km in
rural areas and 2-5 km in urban environments. LoRaWAN is
particularly suited for applications such as smart agriculture, smart
cities, and remote asset monitoring, where devices need to transmit
small amounts of data over long distances while conserving battery
life.
5G and IoT
5G, the fifth generation of mobile networks, promises to revolutionize
the IoT landscape by offering ultra-reliable, low-latency
communication, massive device connectivity, and high data rates.
While 5G is not an IoT-specific protocol, it is designed to support a
wide range of IoT use cases, including mission-critical applications,
such as autonomous vehicles, industrial automation, and remote
surgery, which require real-time communication and high levels of
reliability. 5G also supports network slicing, which enables the
creation of virtual networks tailored to the specific needs of different
IoT applications, ensuring efficient resource allocation and optimized
performance.
NETWORKED
APPLICATIONS
AND SERVICES
I nservices
this chapter, we will explore various networked applications and
that form the backbone of modern computing and
communication systems. We will delve into client-server architecture,
web applications and services, distributed applications and services,
and cloud services, providing a comprehensive understanding of
these essential concepts.
CLIENT-SERVER ARCHITECTURE
Model Overview
The client-server model is a widely used architectural pattern in
networked computing systems. It consists of two main components:
the client, which is the user-facing system or software requesting
services, and the server, which is the system or software responsible
for providing the requested services. In this model, clients send
requests to servers, which process the requests and return the
appropriate responses. This approach facilitates efficient resource
utilization, centralized data management, and easy scalability.
Client-Server Communication
Communication between clients and servers is typically facilitated
using standardized protocols, which define the rules and formats for
exchanging messages and data. Some common protocols used in
client-server communication include HTTP for web applications, FTP
for file transfers, and SMTP for email. The choice of protocol
depends on the specific requirements of the application and the
nature of the services being provided.
3. Web Services
Web services are a means of communication between software
applications over the internet. They enable applications to exchange
data and request services from one another using standardized
protocols and message formats. Some common web service
paradigms include:
1. SOAP (Simple Object Access Protocol): This is an XML-
based protocol for exchanging structured information
between applications. It defines a messaging framework
that allows for the transmission of typed data and
supports various transport protocols, such as HTTP and
SMTP.
2. REST (Representational State Transfer): This is an
architectural style for building web services that
emphasize simplicity, scalability, and statelessness.
RESTful web services use standard HTTP methods (Like
POST, GET, PUT, and DELETE) to perform operations on
resources, which are identified using URIs.
3. GraphQL: This is a query language and runtime for APIs
that enables clients to request only the data they need
and receive responses in a predictable format. GraphQL
provided a more flexible alternative to traditional REST
APIs, allowing for more efficient data retrieval and
reduced over-fetching or under-fetching of data.
CLOUD SERVICES
1. Cloud-Based Applications
Cloud-based applications are software applications that are hosted
and executed in the cloud rather than on users' local devices. These
applications can be accessed through web browsers or dedicated
client software and offer several benefits, including increased
scalability, improved availability, and reduced infrastructure and
maintenance costs for users.
NETWORK
PROGRAMMING
AND APIS
Python
Java
C++
Python
Python is a versatile, high-level programming language that has
gained immense popularity due to its readability, simplicity, and
extensive library support.
Python is an interpreted language, meaning that code is executed line
by line rather than being compiled into machine code. This allows for
quicker development cycles and easier debugging. Python is also
dynamically typed, which means that the data type of a variable can
change during runtime, further increasing its flexibility.
Python is known for its easy-to-read syntax and a strong focus on
code readability. This makes the language highly accessible to both
beginners and experienced programmers alike. The language
supports multiple programming paradigms, including object-oriented,
imperative, functional, and procedural styles.
Python has a vast ecosystem of libraries and frameworks that enable
developers to work on a wide range of applications, including web
development, data analysis, machine learning, network programming,
and more. Some popular Python libraries and frameworks include:
Django
Flask
NumPy
pandas
TensorFlow
Python is widely used in network programming due to its ease of use
and extensive library support. Python's standard library includes
modules for working with sockets, allowing developers to create and
manage network connections using different protocols such as TCP
and UDP. Additionally, third-party libraries such as Twisted, Netmiko,
and NAPALM extend Python's networking capabilities, making it an
excellent choice for building network automation tools and
applications.
Java
Java is a popular, high-level, object-oriented programming language
developed by James Gosling at Sun Microsystems, which was later
acquired by Oracle Corporation.
Java is a statically-typed language, which means that the data type of
a variable must be declared explicitly and cannot change during
runtime. Java's syntax is similar to that of C and C++, making it
familiar and accessible to developers experienced in those
languages.
Java is known for its platform independence, robustness, and
performance. Its platform independence is achieved through the use
of the Java Virtual Machine (JVM), which interprets Java bytecode
and executes it on the target platform. Java's strong typing and
automatic memory management contribute to its robustness, reducing
the likelihood of runtime errors and memory leaks. Java's Just-In-
Time (JIT) compilation enables the JVM to optimize the performance
of Java applications by compiling frequently executed bytecode into
native machine code.
Java is widely used in network programming due to its extensive
standard library, which includes classes and interfaces for creating
network connections, implementing network protocols, and managing
data transmission. Java's platform independence makes it an
attractive choice for network applications that need to run on various
operating systems and hardware architectures.
Java has a large and diverse ecosystem of libraries, frameworks,
and tools that support various application domains, such as web
development, enterprise applications, mobile development, and more.
Some popular Java libraries and frameworks include:
Spring
Hibernate
JavaFX
Apache Maven
Android SDK
C++
C++ is a powerful, general-purpose programming language that is
well-suited for network programming due to its high performance and
support for low-level system programming. C++ provides the ability to
work directly with sockets and manage memory, making it a popular
choice for developing high-performance network applications and
protocols.
NETWORK MONITORING
AND ANALYTICS