Computer Network Fundamentals
Computer Network Fundamentals
to
Computer Networking
Sulojan Vipul
Bsc(Hons) In Computing
1.0 Objectives
1.1 Introduction
1.2 Client Server Model
1.3 Types of Networks
1.3.1 Local Area Network
1.3.2 Metropolitan Area Network
1.3.3 Wide Area Network
1.3.4 Wireless Network
1.3.5 Internet Works
1.4 Summary
1.5 Check your Progress - Answers
1.6 Questions for Self – Study
1.7 Suggested Readings
1.0 OBJECTIVES
1.1 INTRODUCTION
Each of the past three centuries has been dominated by a single technology.
People were doing lot of paper work in organizations because, lack of advance
systems which will help them in their day today work. The 18th century was the time of
the great mechanical systems accompanying the Industrial revolution. Computer
industry has made spectacular progress in short time. During the first two decades of
their existence. Computer systems were highly centralized, usually within the single
large room. A medium size company or university might have had one or two
computers, white large institutions had at most few dozen. The idea that within 20
years equally powerful computers smaller than postage stamps would be mass-
produced by the millions was pure science fiction.
The merging of computers and communications has had a profound influence
on the way computer systems are organized. The old model of single computer
serving all of the organization computational need has been replaced by one which
the-large no of separate but interconnected computers do the fob. These systems are
called has computer network.
A network is a group of two of more computer systems sharing services and
interacting in some manner. This interaction is, accomplished through a shared
communication link, with the shared components being data. Put simply a network is a
In the client server model communication generally takes the form of a request
Message from the client to server asking for some work to be done. The server then
does the work and sends back the reply. Usually there are many clients using a small
no. of servers.
Network Fundamentals / 2
c. Define Client
……………………………………..……………………………….…………..…………
……………………………………..……………………………….…………..…………
d. Define Server
……………………………………..……………………………….…………..…………
……………………………………..……………………………….…………..…………
2) Fill in the blanks.
1. A Network is a group of two or more computer system sharing ……….
2. In client server model users are called as ………………..
3) Match the following
1. Network a. Response
2. Client b. Group of computers
3. Server c. Request
Transmission Media / 3
1.3.3 Wide Area Network (WAN)
A wide area network spans a large geographical area, often a country or
continent. It multiplies multiple connected LANs; that can be separated by any
geographical distance. A LAN at the corporate headquarters in Indianapolis can be
connected to a LAN at field office in Chicago and to another field office LAN in St.
Louis to form a single Wide Area Network.
In most WANs the network contains numerous cables or telephone lines, each
one connection a pair of routers. If two routers that do not share a cable nevertheless
and wish to communicate, they must do it indirectly. On personal computers we are
using modem to communicate indirectly with other computer.
For e.g. on Aircraft single router will maintain a radio link with some other
router on ground, changing routers as it flies along this configuration is just a traditional
LAN, except that its connection to the outside world happens to be a radio link instead
of a hardwired line.
Network Fundamentals / 4
c. Explain Wide area network?
……………………………………..……………………………….…………..…………
……………………………………..……………………………….…………..…………
2) File in the blanks
1. LAN run at speed of …………………. Mbps
2. …………………………… is basically a bigger version of LAN
3. Internetworks are form when no. of network connected through
…………..……………… and ………………………..
1.4 SUMMARY
In this chapter we have studied the old model of single computer serving all of
the organization's computational need has been replaced by one in which the large no
of separate but interconnected computers do the job. These systems are called as
computer network. A network is a group of two or more computer systems sharing
services and interacting in some manner.
In the end Computer network are mainly divided into Local Area Network,
Metropolitan area network, wide area network, wireless networks, Internetworks.
Transmission Media / 5
1.6 QUESTIONS FOR SELF – STUDY
Writes Notes on (Draw diagrams when necessary)
1. Types of networks
2. Client Server Model
3. Internetworks
Network Fundamentals / 6
NOTES
Transmission Media / 7
NOTES
Network Fundamentals / 8
Chapter 2
2.0 Objectives
2.1 Introduction
2.2 Organizational Computational Models
2.2.1 Centralize Computing
2.2.2 Distributed Computing
2.2.3 Collaborative Computing
2.3 Difference between Centralize,
Distributed and Collaborative Computing
2.4 Networking models
2.4.1 Peer to Peer
2.4.2 Server Based
2.5 Network Services
2.6 Transmission Media and Protocol
2.7 Summary
2.8 Check your Progress - Answers
2.9 Questions for Self – Study
2.10 Suggested Readings
2.0 OBJECTIVES
2.1 INTRODUCTION
Early chapter, we have seen that the types of network i.e. LAN, or WAN are
establish for sharing data, to provide services, to allow for administration and security
and to reduce equipment cost.
To achieve this centralized, Distributed and collaborative systems are use for
computing of data.
Actual Network implementation can be done by using peer-to-peer, or server
based networks.
Your Network can provide services like File, Print, Application and database etc.
Transmission media is a path way network entities use to contact each other.
Computer transmission media includes cables and wireless technologies that allow
network devices to contact each other. To reduce their design complexity most
networks are organized as a series of layers or levels.
The Rules and conventions used in this convention are collectively known as
layer protocol. Basically a protocol is an agreement between the communicating
parties on how communication is to proceed.
A set of layers and protocol is called as Network architecture. A list of protocol
used by a certain system, one protocol per layer is called as protocol.
Application Logic
Network Server
Network Fundamentals / 10
Demerits of centralize system
* Mainframe computers are very expensive to buy, lease, maintain and use.
• The imitation is that both the application arid database live within the same
machine process thereby offering no way to truly partition the application logic
beyond the physical limitations of the mainframe.
Taking into account the demerits of centralize system and distributed system
architecture, collaborative computing architecture made its advent.
2.4.1 Peer-to-Peer
In a Peer-to-Peer network you take the machine currently in existence, install
networking cards in them, and connect them through some type of cabling. Each
machine is known as Peer and can participate in the sharing of files or resources. No
server is required, so there is no additional cost for a dedicated machine, but there is
also no real security.
Peer-to-Peer networks require an operating system that can understand
networking and function in this (Peer-to-Peer) way. Microsoft Windows 95, Microsoft
Windows 98, Windows NT server and Windows NT workstation can all function in Peer
to-Peer environment.
If file and print sharing has been enabled on a Windows 95 system, for
example, you can create a share by selecting a folder and choosing to share it. By
default, no password is associated with it but you can choose to assign one that a user
must know in order to access the resource. Access permission can be Read-Only, Full
or depend on password this is known as share level security. Access is gained when
a user supplies the correct password to access the share.-
Peer-to-Peer networking works in small environments. If you grow beyond
approximately 10 machines, the administrative overhead of establishing shares,
coupled with the lack of tight security, creates a nightmare.
Advantages of peer-to-peer network
• Server is not required
• No additional cost for dedicated-machine
Disadvantages of peer-to peer network
• Provides share level security
• Can work in small environments only.
1. Domain
……………………………………..……………………………………..…………
……………………………………..……………………………………..…………
2. Workgroup
……………………………………..……………………………………..…………
……………………………………..……………………………………..…………
2) Fill in the blanks.
1. Server based network provides ……………………… security
2. Protocol is an agreement between ……………………..
Network Fundamentals / 14
A. File Servers
File servers store files on the network for clients to access. In so doing they provide a
central location where a number of users can find the same data. All users can see the
same information at same time with help of file server, they also provide a central point
for backup operations and simplify the work. In this way as every file is on serve and
server provides user level security the data is kept safe.
B. Print server
Print servers, as name implies, offer printing services to clients. A single print server
offers access to one or more printers to uses the term file and print server generically
to mean any server that offers file services, print services or both.
C. Application Server
An application server can run all or some of an application for a client. Not only does it
hold data in the file server, but also it has the application needed to process the data.
After all or some of the processing is complete at the server, the results are
downloaded to the client.
To compare the three, the file and print servers offers a storage location for
the clients. They therefore benefit greatly from large hard drives. Although RAM is
important the processor is not so important, an application server on other hand
requires fast processor to run the application and get the results to the client. RAM is
also important to the application server, while the size of the hard drive is usually not
(within reason)
2.7 SUMMARY
Network Fundamentals / 16
communication more difficult, if not impossible.
A set of layers and protocol is called as network architecture. A list of potocols
used by a certain system, one protocol per layer is called as, protocol.
Source : nptel.iitm.ac.in(E-book)
1. Centralize computing-: all networking done at one central location. In this all
input / output interfaces are connected to central machine. The method
provides excellent security and central administration as both data and
application logic resides on central machine. On other hand centralize
machine is very costly to buy. As central machine has to respond every node
speed of this system is low.
2.3
1)
1. Domain- domain is nothing but the server on the network in order to have user
level security. With the user level security, permissions are based on how the
User logged ort and was authenticated by the server.
Network Fundamentals / 18
NOTES
Network Fundamentals / 20
Chapter 3
Transmission Media
3.0 Objectives
3.1 Introduction
3.2 Characteristics of Transmission Media
3.2.1 Bandwidth
3.2.2 Multiplexing
3.2.3 Attenuation
3.2.4 EMI
3.3 Cable Media
3.3.1 Coaxial Cable
3.3.2 Twisted-Pair
3.3.3 Fiber Optic Cable
3.4 Wireless Media
3.4.1 Radio Frequency
3.4.2 Microwave
3.4.3 Infrared Light
3.5 Summary
3.6 Check Your Progress - Answers
3.7 Questions for Self – Study
3.8 Suggested Reading
3.0 OBJECTIVES
3.1 INTRODUCTION
Present day computer use electronic currents, radio waves, microwaves or
light spectrum energy from electromagnetic spectrum to transmit signals.
Computers use electronic voltage pulses or electromagnetic waves (EM) to send
signals for the following reasons
• They are available in form of electric currents.
• They can be altered by semiconductor materials
• They can be used to represent at least two discrete states (binary / Digital). The
physical path through which the electrical voltages and EM waves travel is called
Transmission Media. In other words transmission media make possible the
transmission of the electronic signals from one computer to another computer. It
is through the transmission media that networked computers signal each other.
Computer networks rely upon the ability of transmission medium to
Transmission Media / 21
accommodate, a range of electric voltages or EM waves. Different media are
used to transmit the signals, depending on the frequency of EM waveform .
The following table gives the frequency range for each portion of EM
spectrum.
3.2.1 Bandwidth
In computer networking, the term bandwidth is refers to as the measure of the
capacity of a medium to transmit 'data. A medium that has a high capacity, has high
bandwidth, whereas a medium that has limited capacity has low bandwidth. Bandwidth
can be best- understood by comparing it to its hose. If half-inch garden hose can carry
water from a trickle up two gallons per minute, that hose can be said to have a
bandwidth gallon's per minute. A four-inch fire hose, however, might have a bandwidth
that exceeds 100 gallons per minute.
Data transmission rates are frequently stated in terms of bits that can be
transmitted per second. An Ethernet LAN theoretically can transmit 10 - million bits per
second and has a bandwidth of 10 megabits per second (Mbps).
The bandwidth that a cable can accommodate is determined in part by the
cable's length. A short cable generally can accommodate greater bandwidth than a
longer cable, which is one reason why all cable designs specify maximum length for
cable runs. Beyond those limits, the highest-frequency signals can deteriorate, and
errors begin to occur in data signals.
Network Fundamentals / 22
The two ways to allocate the capacity of transmission media are with
baseband and broadband transmissions. Baseband devotes the entire capacity of the
medium to one communication channel. Broadband lets two or more communication
channels share the bandwidth of the communication medium. Baseband is the most
common mode of operation. Most LANs function in baseband mode, for Sample
baseband signaling can be accomplished with both analog digital signals.
Although you might not realize it, you have a great deal of experience with
broadband transmission. Consider for example, that the TV cable coming into your
house from an antenna or cable provider is a broadband medium. Many television
signals, can share the bandwidth of cable because each signal is modulated using a
separately assigned frequency. You can use the television tuner to choose the channel
you want to watch by selecting its frequency; This technique of dividing bandwidth into
frequency band is called as frequency division multiplexing (FDM) and works only with
analog signals. Another technique, called time division multiplexing (TDM), also
supports digital signals.
3.2.2 Multiplexing
Multiplexing is a technique that allows broadband media to support multiple
data channels. Multiplexing makes sense only under a number of circumstances :
1. When media bandwidth is costly. A high-speed leased line, such as a T1 or T3,
is expensive to lease. If the leased line has sufficient bandwidth, multiplexing
can allow the same line to carry mainframe, LAN, voice, videoconferencing, and
various other data types.
2. When bandwidth is idle. Many organizations have installed fiber optic cable that
is used only to partial capacity. With the proper equipment, a single fiber can
support hundreds of megabits- or even a gigabit or more of data.
3. When large amounts of data must be transmitted through low capacity channels.
Multiplexing techniques can divided the original data stream into several lower-
bandwidth channels, each of which can be transmitted through a lower capacity
medium. The signals can then be recombined at the receiving end.
Baseband Broadband
Transmission Media / 23
Time Division Multiplexing- (TDM)
Time Division Multiplexing divides a channel into time slots that are allocated
to the data streams to be transmitted, as shown in diagram below. If the sender and
receiver agree on the time-slot assignments, the receiver can easily recover and
reconstruct the original data streams.
Time Division Multiplexing transmits the multiplexed signals in baseband
mode. Interestingly, this process makes it possible to multiplex a TDM multiplexed
signal one of the data channels on an FDM system. Conventional TOM equipment
utilizes fixed time-divisions and allocated time to a channel, regardless of that
channel’s level of activity. If the channel is not busy, its time slot not being fully utilized.
Because the time divisions are programmed into the configurations of the
multiplexors, this technique; often is referred to as Synchronous Time Division
Multiplexing. If using the capacity of data medium more efficiently is important, amore
sophisticated technique, Statistical Time Division Multiplexing, can be used. A stat-
mux uses the time slot technique but allocates time slots based on the traffic
demandrpn the individual channels. As shown in figure. Notice that Channel B is
allocated more time slots than Channel A and channel C is allocated the fewest time
slots. Channel D is idle, so no slots are allocated to it. To make this procedure to work,
the data transmitted for each time slot includes a control field that identifies the
channel to which the data in the time slot should be
assigned.
3.2.3 Attenuation
Attenuation is a measure of how much a signal weakens as it travels through a
medium. This chapter doesn't discuss attenuation in formal terms, but it does address
the impact of attenuation on performance. Or Attenuation is a contributing factor to
explain why cable designs must specify limits in the lengths of cable runs. When signal
strength fall below certain limits, the electronic equipment that receives the signal can
Network Fundamentals / 24
experience difficulty isolating the original signal from the noise present in all electronic
transmissions. The effect is exactly like trying to tune in distant radio signals. Even if
you can lock on to the signal on your radio, the required sound generally still contains
more noise than the sound from local radio station.
Transmission Media / 25
3.3.1 Coaxial Cables
Coaxial cables were the first cable types used in LANs. Coaxial cable gets its
name because two conductors share a common axis. The cable is most frequently
referred as coax. It has better shielding than twisted pair, so it can span longer
distances at higher speed two kinds of co-axial cable are widely used.
1. 50-ohm cable (Base band coaxial cables / Thinnet) is commonly used for digital
transmission.
2. 75-ohm cable (Broad band coaxial cables / thicknet) is commonly used for
analog transmission.
This distinction is based on historical, rather than technical, factors (e.g.- early
dipole antennas had an impedance of 300 ohms, as it was easy to built 4:1 impedance
matching transformers)
The components of the co-axial cable are as follows:
• A central conductor, although usually solid copper wire, this sometimes is also
made of standard wire.
• An outer conductor forms a tube surrounding the central conductor. This
conductor can consist of braided wires, metallic foil or both. The outer conductor,
frequency called the shield, servers as a ground and also protects the inner
conductor from EMI.
• An insulation layer keeps the outer conductor spaced evenly from the inner
conductor.
• A plastic encasement (jacket) protects the cable from damage.
The construction and shielding of the co-axial cable give it a good combination
of high bandwidth and excellent noise immunity. The possible bandwidth depends on
the cable length.
Thinnet cable can reliably transmit a signal for 185 meters (about 610 feet).
Although it's called 10Base2 to give the impression that it can run 200 meters, this is
Network Fundamentals / 26
erroneous. It should really be called 10Base 1.85.
Co-axial Characteristics
You should be familiar with the installation cost. Bandwidth and EMI cost,
bandwidth and EMI resistance characteristics of coaxial cable.
A. Installation
The Ethernet cabling shown in the figure is an example of Thinnet, which uses
RG-58 cable. Devices are connected to the cable by means of T. connectors. Cables
are used to provide connections between T-Connectors. One characteristic of this type
of cabling is that a special connector, called terminator, must terminate the ends of
cable run. The terminator contains a resistor that is-matched to the characteristics of
the cable. The resister prevents signals that reach the end of the cable from bouncing
back and causing interference.
Co-axial cable is reasonably easy to install because it is robust and difficult to
damage. In addition, connectors can be installed with inexpensive tools and a bit of
practice. The device -to-device cabling approach can be difficult to reconfigure,
however, when new devices cannot installed near an existing cabling path.
Transmission Media / 27
The co-axial cable used for Thinnet fall at the low end of the cost spectrum,
whereas Thicknet is among the more costly options.
Bandwidth -
LANs that employ coaxial cable typically have a bandwidth between 8.5 mbps
and 10 Mbps. Thicker co-axial cables offer higher bandwidth, and the potential
bandwidth of co-axial is much higher than 10 Mbps. Current LAN technologies,
however don’t take advantage of take of this potential.
EMI characteristic
All copper media are sensitive to EMI, although the shield in coax makes the
cable fairly resistant, Coaxial cables, however, do radiate a portion of their signal, and
electronic eavesdropping equipment can detect this radiated signal.
Network Fundamentals / 28
Two types of twisted-pair cable are used in LANs :
• Shielded
• Unshielded
Capacity
STP cable has a therotical capacity of 500 Mbps, although few
implementations exceed 153 Mbps with 100 meters cable runs. The most common
data rate for STP cable is 16 Mbps, which is the top data rate for token Ring networks.
Attenuation
All varieties of twisted-pair cable have attenuation characteristics that limit the
length pf cable runs to a few hundred teeters, although a 100-flfteter limit is most
common.
EMI characteristics
The shield in STP cable results in good EMI characteristic for copper cable,
comparable to the EMI characteristic of coaxial cable. This is one reason STP might
be preferred to unshielded twisted-pair cable in some situations. As with all copper
cables. STP is sensitive to interference and vulnerable to electronic eavesdropping.
Transmission Media / 29
A Shielded Twisted-Pair Cable
Network Fundamentals / 30
stringent than for data-grade cabling.
Installation
UTP cable is easy to install. Some specialized equipment might be required,
but the equipment is low in cost and can be mastered with a bit of practice. Properly
designed UTP cabling systems easily can be reconfigured to meet changing
requirements.
As noted earlier, however, Category 5 cable has stricter installation
requirements than lower categories of UTP. Special training is recommended for
dealing with Category 5 UTP.
Capacity
The data- rates possible with UTP have increase from 1 Mbps; pat 4 and 16 Mbps, to
the point where 100 Mbps data rate are now common,
Attenuation
UTP cable share similar attenuation characteristics with other copper cables.
UTP cable runs are limited to a few hundred meters, with 100 meters as the most
frequent limit.
EMI Characteristics
Because DTP cable lacks a, shield, it is more sensitive to EMI than coaxial or
STP cables. The latest technology makes it possible to use UTP in the vast majority of
situation, provided that reasonable care is taken to avoid electrically noisy devices
such as motors and fluorescent lights. Nevertheless, UTP might not be suitable for
noisy environments such as factories. Cross talk between nearby unshielded pairs
limits the maximum length of cable runs.
Transmission Media / 31
3.3.3 Fiber-Optic cable
In almost every way, fiber-optic cable is the ideal cable for data transmission.
Not only does this type of cable accommodate extremely high bandwidth's, but it also
presents no problems with EMI and supports durable cables an cable runs as long as
several kilometers. The two disadvantages of fiber-optic, however, are cost difficulty of
installation.
The center conductor of a fiber-optic cable is a fiber that consists of highly
refined glass or plastic designed to transmit light signals with little loss. A glass core
supports a longer cabling distance, but a plastic core is typically easier to work with.
The fiber is coated with a cladding that reflected signals back into the fiber to reduce
signal loss. A plastic sheath protects the fiber. See Figure
Optical fibers are much smaller and more lightweight than copper wires.
Therefore, large fiber optic cables carry more conductors than similar sized copper
cables. There are two types of optical fibers. 1. Multimode fiber 2. Single mode fiber
The following table shows the comparison between single mode and
multimode fibers
Light pulses are generated by Light pulses are generated by light emitted
3
injection Laser diode (ILDs) diodes (LEDs)
Fiber optic cable doesn't transmit electrical signals. Instead, the data signals
must be converted into light signals. Light sources include lasers and light-emitting
diodes (LEDs). LEDs are inexpensive but produce a fairly poor quality of light suitable
for less-stringent application. The end of the cable that receives the light signal must
convert the signal back to an electrical form. Several types of solid-state components
can perform this service.
One of the significant difficulties of installing fiber-optic cable arises when two
cables must be joined. The small cores of the two cables (some are as small as 8.3
microns) must be lined up with extreme precision to prevent excessive signal loss.
As with all cable types, fiber-optic cable has their share of advantages and
disadvantages.
Cost
The cost of the cable and connector has fallen significantly in recent years.
However, the electronic devices required are significantly more expensive than
comparable devices for copper cable. Fiber-optic cable is also the most expensive
cable type to install.
Installation
Greater skill is required to install fiber-optic cable than to install most copper
cables. However, improved tools and techniques have reduced the training required.
Still, fiber-optic cable requires greater care, because the cable must be treated fairly
gently during installation. Every cable has a minimum bend radius, for example, and
fibers are damaged if the cables are bent too sharply. It is also important not to stretch
the cable during installation.
Capacity
Fiber-optic cable can support high data fates (as high as 200,000 Mbps), even
with long cable runs. Although UTP runs cable are limited to less than 100 meters with
TOO Mbps data rates, fiber optic cable can transmit 100 Mbps signals for several
kilometers.
Transmission Media / 33
Attenuation
Attenuation in fiber-optic cables is much lower than in copper cables. Fiber-
optic cables can carry signals for several kilometers.
EMI Characteristics
Because fiber-optic cable doesn’t use electrical signals to transmit data, they
are totally immune to electromagnetic interference. These cables are also immune to a
variety of electrical effects that must be taken into account when designing copper
cabling systems.
Because the signals in fiber-optic cable are not electrical in nature, they cant
be detected by the electronic eavesdropping equipment that detects electromagnetic
radiation. Therefore, fiber-optic cable is the perfect choice for high-security networks.
Advantages of Fiber optic cable
• Supports very high bandwidth- from 100 Mbps to >2Gbps
• Very low alteration
• Immune to EMI or eavesdropping
Disadvantages
• Very expensive cables
• More complex to install
• High precision required for connections
Network Fundamentals / 34
• Extended local networks
A wireless connection serves as a backbone between two LANs, For instance, a
company with office networks in two nearby but separate buildings could connect
those networks using a wireless bridge.
• Mobile computing
A mobile machine connects to the home network using cellular or satellite technology.
Wireless networks are especially useful in the following situations :
1. Spaces where cabling would be impossible or incontinent. These includes open
lobbies, inaccessible parts of buildings, older buildings, historical buildings where
renovation is prohibited, and outdoor installations.
2. People who move around a lot within their work environment Network
administrators, for instance, must trouble shoot a large office networks.
3. Temporary installations. These situations include any temporary department set
up for a specific purpose that soon will be torn down or relocated.
4. People who travel outside of the work environment and need instantaneous
access to to network resources.
Wireless media transmits and receives EM (electromagnetic signals without an
electrical or optical conductor. Thus earth’s atmosphere provides the physical data
path for most wireless transmissions. Followings are some transmission medias, which
normally used for wireless transmissions.
Radio wave
Microwave
Infrared light
Transmission Media / 35
Typical radio frequency equipment
Radio frequency waves can be broadcast in all directions. Typical antennas
include omni directional towers, random length wire, half wave dipole and beam (such
as yagi). Global systems use short wave, which propagates beyond the horizon and
local systems are use nearly line-of-sight VHF or UHF.
Frequency range
Radio frequency operates within the entree RF range. Computer networks
typically use the higher GHz ranges because they offer higher transmission rates.
Cost
Depending upon the combination of transceiver and antenna used, radio
frequency systems are moderately priced compared to other wireless media.
Ease of installation
Ease of installation is also dependant upon the combination of transceiver and
antenna used. Most systems are easily installed with pre-configured antenna and other
equipment. Low power single-frequency systems are simple to install compared to
high-power, single frequency systems.
Bandwidth
Single frequency radio systems offer transmission rate ranging from 1 Mbps to
10Mbps. Spread spectrum radio which uses multiple frequencies simultaneously) offer
transmission rates ranging from 2 to 6 Mbps.
Attenuation
Attenuation of all RF ranges are dependent upon frequency and power of the
signal. Because low-power, single frequency devices normally operate at very low
power, they usually suffer from relatively high attenuation. The, high power, single
frequency devices sustain the signal and resist attenuation much better that low-power
devices.
Advantages
• No intervening ground facilities are required between stations.
Network Fundamentals / 36
• Directional equipment is not needed.
• Stations can be stationary or mobile; even on aircraft or marine vessels.
• Radio is accessible to users thought the world
• Radio transceivers are inexpensive.
Disadvantages
• AH RF transmission devices may require frequency licensing.
• Only low bandwidths are offered (between 1 Mbps to 10 Mbps)
• Highly susceptible to external interference and jamming.
• Except spread spectrum radio, al single-frequency radio devices are susceptible
to eavesdropping.
3.4.2 Microwave
Microwave data communication system is' exit in two forms:
• Terrestrial (earth-based) systems
• Satellite systems
Functionally both terrestrial and satellite systems use the same frequencies (
in the range of 1 GHz to 300 GHz) and are similar, but the capabilities of each are
somewhat different.
Frequency range
Terrestrial microwave system usually operate in the low GHz range, typically
between 4 to 6-GHz and 21 to 23 GHz
Costs
Equipment costs are most dependant upon the operating signal strength and
frequency. Short-distance systems, used within hundreds of meters of .distance, are
relatively inexpensive. Long-distance systems, used at kilometers of distance, may be
quite expensive. Terrestrial microwave systems may be leased from service providers
to reduce the initial fixed costs.
Ease of installation
Line-of sight systems are difficult to install because they require very exacting
adjustments often made by trial error, to ensur proper alignment. Since Terrestrial
microwaves typically operate in licensed frequencies, installations, require expensive
and time-consuming licensing procedures.
Bandwidth
Typical data rates for a single-frequency range between 1 to 10 Mbps.
Attenuation
Attenuation varies with the signal frequency and antenna size. Higher
Transmission Media / 37
frequency microwaves are attached more by rain and fog over long distances, but
across short distances attenuation is not much.
Advantages
• Potentially much less expensive than digging trenches etc.
• High bandwidths are possible
Disadvantages
• Require government licensing and approved equipment
• Susceptible to external interference, jamming and eavesdropping
• Installation is complex when direct line-of-sight is not available
Satellite microwave
Like Terrestrial microwave, satellite microwave systems use low GHz
frequency range microwaves. However, they are beamed line-of-sight between
directional parabolic antennas located on earth and geo-synchronous orbiting
satellites. A basic satellite network installation includes a network connectivity device
called VSAT (very small Aperture Terminal), which is attached to a parabolic antenna
(popularly known as satellite disk) of 2-meter diameter approximately, by means of
cable media. The dish antenna reflects signals generated by transponder to a satellite.
The beauty of satellite microwave communication is that it requires the same
time and expense whether two VSAT station are away from each other, 10 or 10000
kilometers. In case of one top transmission a signal has to travel about 72000
kilometers of distance. While in case of two hop transmission, a signal has to travel
about 1,44,000 kilometers of distance. Due to this long travel in space satellite
transmissions are subject to propagation delay of how a second to 5 seconds.
However they can provide a signal to the most remote and undeveloped areas on the
globe.
Advantages
• Propagation delay and communication cost are independent of distance
between sending and receiving stations.
• High bandwidths possible
• No intervening ground facilities are require between transmission points even
between continents.
• Earth stations can be fixed positions or relatively mobile, even on aircraft or
marine vessels.
• Satellite communication supports narrow or wide beam paths, so transmission
can be relatively selected or broad-based.
Disadvantages
• Susceptible to external interference, jamming, and eavesdropping.
• Require high precision. Complex equipments cost can be reduced by hiring
services from satellite service providers.
• Propagation delay of 1 to 5 seconds
• Apart from one time installation cost, organizations may have to very high annual
operation charges to the satellite service providers.
Network Fundamentals / 38
Check your progress - 3.4.1 & 3.4.2
1. What is wireless media?
…………………….…………………….……………….…………….…………….……
…………………….…………………….……………………..……….…………………
2. Explain the advantages and disadvantages of satellite transmission?
…………………….…………………….…………………….…………………………
…………………….…………………….…………………………….…………………
3. What is a frequency range for Terrestrial system?
…………………….…………………….…………………………….…………..………
…………………….…………………….…………………..………….…………………
4. Explain the following characteristics of radio frequency waves?
Frequency range……………….……………………..……….…………………….
Bandwidth……………….………………………….….…………………………….
Attenuation……………….…………………………….…………………………….
Point to point
Because infrared waves may be cheaply and easily Segregated, pure beams
may be focused tightly and directed at specific targets. This strategy reduces the
effects of attenuation and possibility of eavesdropping. Remote control device to
operate TV is file best example of point-to-point infrared system:
Advantages
• Mass production makes interface relatively
• High transmission rates possible, but current technology support bandwidth up
to 16Mbps.
• Resists eavesdropping.
Disadvantages
• Requires strict line-of-sight paths and exact positioning.
• Susceptible to high intensity light and atmospheric conditions.
Transmission Media / 39
Advantages
• Mass manufacturing makes some interface devices relatively inexpensive
• Does not require exact positioning and is ideal for locally mobile devices
Disadvantages
• Lower transmission rates than point to point infrared systems.
• Susceptible to high intensity light and atmospheric conditions.
• Highly susceptible to eavesdropping.
3.5 SUMMARY
Source : www.scribd.com(Link)
3.1 – 3.2
1. The physical path through which the electrical voltages and EM waves travel is
called Transmission Media. Or transmission media make possible the
transmission of the electronic signals from one computer to another computer.
2. Each type of transmission media has special characteristics that make it suitable
for a specific type of service.
• capacity (bandwidth)
• Ease of installation
• Attenuation
• Immunity from electromagnetic interference (EMI)
• Cost
3. Time Division Multiplexing divides a channel into time slots that are allocated to
the data streams to be transmitted. If the sender and receiver agree oh the time-
slot assignments, the receiver can easily recover and reconstruct the original
Network Fundamentals / 40
data streams. Time Division Multiplexing transmits the multiplexed signals in
baseband mode.
4. Attenuation is a measure of how much a signal weakens as it travels through a
medium. ;
5. Transmission media make possible the transmission of the electronic signals from
one computer to another computer. Through transmission media networked
computer signals each other. Computer networks relay upon the ability of
transmission medium to accommodate a range of electric voltage or EM waves.
6. Electromagnetic interference consists of outside electromagnetic noise that
distorts the signal in medium.
3.3.1
1. Difference between broadband and baseband coaxial cable-: Baseband is thin,
light and flexible cabling medium,; which is inexpensive and easy to install.
Broadband cables are thicker in diameter and harder to work with. This carries
more signals for greater distance then baseband cables. Because of its greater
size, it is also more expensive than baseband cable. It can be installed safely
outside, running from building to building.
2. The components of the co-axial cable are as follows-:
• A central conductor, Although usually solid copper wire, this sometimes is made
of standard, wire
• An outer conductor forms a tube surrounding the central conductor. This
conductor can consist of braided wires, metallic foil or both. The outer conductor,
frequency called the shield, servers as a ground and also protects the inner
conductor from EMI.
• An insulation layer keeps the outer conductor spaced evenly from the inner
conductor.
• A plastic encasement (jacket) protects the cable from damage.
3. Two types of connectors are commonly used with coaxial cable. The most
common is the BNC connector mainly used for thinnet cabling. In contrast
thicknet uses N-Connectors, which screw on instead of using a twist lock.
3.3.2
Capacity of UTP cables - The data rates possible with UTP have increase
from 1 Mbps; pat 4 and 16 Mbps, to the point where 100 Mbps data rate age now
common.
Capacity of STP cables-: STP cable has a theoretical capacity of 500 Mbps,
although few implementations exceed 155 Mbps with 100 meters cable runs. .The
most common data rate for STP cable is 16 Mbps, which is the top data rate for Token
Ring networks.
2. Advantages of UTP cable
• Relatively inexpensive
• Easily installed, managed, and reconfigured
• Basic technology and standards are matured and stable
3.3.3
1. Loose configuration incorporates a space between the fiber sheath and the outer
plastic encasement; this space is filled with gel or other material. Whereas |n
Transmission Media / 41
Tight configuration contains strength, wires between the conductor and the outer
plastic encasement.
2. Advantages of fiber optic cable-:
• Supports very high bandwidth - from 100 Mbps to > 2Gbps
• Very low attenuation
• Immune to BMI or eavesdropping
Disadvantages
• Very expensive cables
• More complex to install
• High precision required for connections
3.4.3 & 3.4.2
1. People who need to be online all the time, for these mobile users twisted pair co-
axial cable are of no use. For them networks are developed without cables are
called as wireless media. It transmits and receives EM signals without an
electrical or optical conductor. Earth's atmosphere provides the physical data
path for most wireless transmission.
2. Advantages of satellite transmission
• Propagation delay and communication cost are independent of distance between
sending and receiving stations
• High bandwidths possible
• No intervening ground facilities are require between transmission points even
between continents.
• Earth stations can be fixed positions or relatively mobile, even on aircraft or
marine vessels.
• Satellite communication supports narrow or wide beam paths, so transmission
can be relatively select or broad-based.
Disadvantages
• Susceptible to external interference, jamming and eavesdropping.
• Require high precision. Complex equipments cost can be reduced by hiring
services from satellite service providers.
• Propagation delay of 1 to 5 seconds
3. Terrestrial microwave system usually operates in the low GHz range, typically
between 4 to 6 GH and 2t to 23 GHz.
4. Characteristics for radio-frequency waves
• Frequency range-: Radio frequency operates within the entice RF range.
Computer networks typically use the higher GHz ranges because they offer
higher transmission rates.
• Bandwidth -: Single frequency radio systems offer transmission rate ranging
from 1 Mbps to 1 0 Mbps Spread spectrum radio (which uses multiple
frequencies simultaneously) offer transmission rates ranging
• Attenuation-: Attenuation of all RF ranges are dependent upon frequency and
power of the signal. Because low-power, single frequency devices normally
operate at very low power, they usually suffer from relatively high attenuation.
The high power, single-frequency devices sustain the signal and resist
attenuation much better that low-power devices.
Network Fundamentals / 42
3.7 QUESTIONS FOR SELF – STUDY
1. Define computer networking transmission media?
2. Explain attenuation?
3. What is distance limit for UTP cables?
4. Write note on
• EMI for transmission
• Fiber optic cable
• Coaxial cables
• Wireless media
5. Explain TDM and FDM with Help of figure?
6. Differentiate between STP and UTP cables?
7. Explain co-axial cable with their characteristics?
8.. How bandwidth affects to transmission media?
9. Explain the advantages of twisted pair cable?
10. Write note satellite communication?
Transmission Media / 43
NOTES
Network Fundamentals / 44
Chapter 4
5.0 Objectives
5.1 Introduction
4.2 OSI Module - At a Glance
4.3 Network Connectivity Devices
4.3.1 Modem
4.3.2 Repeaters
4.3.3 Hubs
4.3.4 Multiplexers
4.3.5 Bridges
4.3.6 Switches
4.3.7 Routers
4.3.8 Brouters
4.3.9 Gateways
4.4 Summary
4.5 Check Your Progress - Answers
4.6 Questions for Self – Study
4.7 Suggested Readings
4.0 OBJECTIVES
4.1 INTRODUCTION
In this chapter OSI module provide set of standard rules for networking.
Model contains 7 layers, each layer performs different task. The first layer is
physical layer. It uses the bit and signals to communicate. The second layer is data
link layer. It is responsible for the creation and interpretation of different frame types
based on a actual physical network being used. The Network layer is third layer and is
mostly associated with the movement of data by means of addressing and routing. The
fourth layer is the transport layer, it is primarily responsible for guaranteeing of packet
transmitted by the network layer. Session layer is the fifth layer, it is responsible for
managing connecting between two machines during the course of communication
between them. Presentation layer is primarily concerned with the conversion of data
formats, in the form of packets, from one machine to another. The seventh layer of the
OSI model is application layer. It acts as the arbiter or translator between user’s
applications and the network.
The interfaces and devices that are used to connect computing devices and
transmission media are called connectivity hardware or network connecting devices.
Network connectivity hardware connects individual devices to a single network, for eg
a pc or printer would use network connectively devices to connect to UTP or some
other that we are going to study in particular section of your book.
Data Link Error checking, manages link control, communication with cards
1. Physical layer
The first layer is the physical layer. It uses the bits and signals to communicate.
This is the only layer that is truly connected to the network in the sense that it is
the only layer concerned with how to interpret the voltage on the wire- the 1s and
Os. This layer is responsible for understanding the electrical rules associated
with devices and for determining what kind of medium is actually being used
(cables, wires, connectors, and other mechanical distinctions.)
It is important to note that while the OSI model doesn't define the media used,
the physical layer is concerned with all aspects with all aspects of transmitting
and receiving bits on the network.
2. Data link Layer
The second layer is data link layer. It is responsible for the creation and
interpretation of different frame types based on the actual physical network being
used. This layer is also responsible for interpreting what it receives from the
physical layer. Using low – level error detection and correction algorithms to
determine when information needs to be re-sent. Network protocols including the
TCP /IP protocol suite, don't define physical standards at the physical or data-
link layer, but instead are written to make use of any standards that may
currently be in use.
3. The Network layer
The third layer of OSI model is the Network layer. It is mostly associated with the
movement of data by moans of addressing and routing. It directs the flow of data
from a source to a destination, despite the fact that the machine might not be
connected to the same physical wire or segment, by finding a path or route from
a machine to another. It is necessary; this layer can break data into smaller
chunks for transmission. This is sometimes necessary while transferring data
from one type of physical network to another network. This layer is also
responsible for reassembling those smaller into the original data after the data
has reach edits destination.
To restate : The network layer involves communication with devices on logically
separate networks connected to form internet works can be large and can be
constructed of different types of networks, the network layer utilizes routing
algorithms that can be used to guide packets from their source to their
destination network.
Network Fundamentals / 46
A key element of the network layer is that each network in the internetwork is
assigned a network address and they are used to route packets constitute the
topics of address and switching.
4. The Transport layer
The fourth layer is the transport layer. It is primarily responsible for guaranteeing
delivery of packets transmitted by the network layer, although it doesn't always
have to do so. Depending on the protocol being used, delivery of the packets
may or may not be guaranteed. When the transport layer is responsible for
guaranteeing the delivery of packets, it does so through various means of error
control, including verification of sequence members for packets and other-
protocol-dependant mechanism.
5. The session layer
The fifth layer is session layer-it is responsible for managing connections
between two machines during the course of communication between- them. This
layer determines whether it has received all information for the session and
whether it can stop receiving or transmitting data packets. This layer also has
built-in error correction and recovery methods.
6. The presentation layer
The sixth layer Is the Presentation layer. it is primarily concerned with the
conversion of data formats, in the form of packets, from one, machine to
another. One common example is the sending of data from a machine that uses
the ASCII format for characters to a, machine that uses the, EBCDIC format for
characters, typically of IBM mainframes.
The presentation layer is responsible for picking up differences such as these
and translating them to compatible formats. Both EBCDIC and ASCII are
standards for translating characters to hexadecimal code. Letters, numbers; and
symbols in one format which must be translated when communicating with
machines using a different format. This is the responsibility of the presentation
layer.
7. The Application layer
The seventh layer of the QSI model is the application layer. It acts as the arbiter
or translator between user's application and the network. Applications that want
to utilise the network to transfer messages must be written to conform to
networking APIs supported by machine’s networking components, such as
windows sockets and NetBIOS. After the application makes an API call, the
application layer determines which machine it wants to communicate with,
whether a session should be set up between the communicating machines, and
whether the delivery pf packets needs to be guaranteed.
Passing the data down to the next layer implies that the lower needs to
perform some services for the higher layer. To perform these services, the lower layer
adds some information in a header or trailer. For example, the transport layer hands
over its data and header to the network layer. The network layer adds header with the
correct destination network layer address so that the packet can be delivered to the
other computer.
From each layer's perspective, the bits after that layer's header are considered
to be data. For example, Layer 4 considers the Layer 5, 6, and 7 headers, along with
original user data, to be one large data field.
Network Fundamentals / 48
After the application creates data, the software and hardware implementing
each layer perform their work, adding the appropriate leader and trailer. The physical
layer can use the media to send a signal for physical transmission as shown in step 2.
Upon receipt (step 3) Host B begins the adjacent layer interactions on host-B.
The right side of above figure shows an arrow pointing next to the computer (step 4)
signifying that the received data is being processed as it goes up the protocol stack.
The following sequence outlines of basics of processing at each layer and shows how
each lower layer provides a Service to the next higher layer. Consider the receipt of
data by the host Son right side of the figure.
Step 1- The physical layer ensures bit synchronisation and places the received finery
pattern into the buffer. It notifies the data link layer that a frame has been
received after decoding the incoming signal into a bit stream. Thus physical
layer has provided delivery of a stream of bits across the medium.
Step 2- The data link layer examines the frame check sequence (PCS) in the trailer
to determine whether errors occurred in transmission (error detection). If an
error has occurred, the frame is discarded. 'The data link addresses are
examined so that host B can decide whether to process the data further. If
the data is addressed to host B, the data between the layer 2 header and
trailer, is given to the layer 3 software. Layer 2 has delivered the data across
that link.
Step 3- The network layer destination address is examined. If the address is host B's
address, processing continues and the data, after the layer-3 header, is
given to the transport layer software. Layer 3 is provided a service of end-to-
end delivery.
Step-4- If error recovery was an option chosen for the transport layer, the counters
identifying this piece of; data .are encoded in the layer-4 header along with
acknowledgement information (error recovery). After error recovery and
reordering of the incoming data, the data is given to the session layer.
Step 5- The session layer can be used to ensure that a series of messages is
completed. After the session layer ensures that all flows are completed, it
passes the data, after the layer-5 header, to the layer-6 software.
Step 6- The presentation layer defines and manipulates data formats. For example,
if the data is binary instead of character data, the header denotes that fact.
The receiver does not attempt to convert the data using the default ASCII
character set of host B after the data formats have been converted, the data,
after the Layer-6 header, is then passed to the Layer-7 software.
Step 7- The application layer processes the final header and then can examine the
true end-user data. This header signifies agreement to operating parameters
by the application on Host A and Host B. The Reader typically is sent and
received at application initialization time only. For example, for file transfer,
the size of the file to be transferred and the file formats used would be
communicated (application parameters) at the initialization time.
4.3.2 Repeaters
When an electrical signal is sent across a medium, It fades along the distance
(known as attenuation) as a result of resistance from the medium itself. Naturally the
Network Fundamentals / 50
longer the distance that it travelled, the more the signal fades. Eventually tie signal
fades to a, point where the receiving station cannot recognise the original message (Or
has trouble doing so).
In short each transmission medium can be used for a certain distance.
However you can exceed the physical medium's maximum effective distance by using
an amplification, device called as Repeater. It works at OSI physical layer. A repeater
operas at the physical layer of the OSI model and takes a signal from one LAN and
sends it to another LAN- reconditioning and retiming it in the process. The
reconditioning usually amplifies and boosts the signal's power. If the signal has
travelled a distance it is weak, and so on, the amplification can also be done on noise
receivers.
The repeaters job is simple: it detects the signal, amplifies and retimes it, and
sends it through all the ports except the one on which the signal was seen. It is
important to note that since the repeater has no real knowledge of the data it is
carrying, no error checking is performed. Therefore any error are passed from one
segment to the next without any ability to stop it. Many networks limit the number of
repeaters between the transmitting and receiving stations. On other side, by not
performing any filtering, the -repeater does not slow down the network's speed or
performance. The signal has travelled a distance is weak, and so on, the amplification
can also be done on noise received.
Pros Cons
Allow you to extend the network over Have no knowledge of addressing or data
large distances. types.
Do not affect the speed of network Can't ease network congestion problems
Can connect network segments of Limit the number of repeaters that can be
different media. used.
4.3.4 Multiplexers
Multiplexer combines two or more separate signals onto one high-speed
transmission media. It is also known as mux, and is often used to allow remote
terminals to communicate with front-end processor ports over a single line. It works at
OSI physical layer.
4.3.5 Bridges
Bridges connects two separate networks to form a logical one by operating at
the data link layer of the OSI model. Bridges rely on MAC addresses for their
operation. Unlike repeaters, bridges examine the packet's destination address before
forwarding it to other segments. A bridge extends the maximum distance of your
network by connecting separate network segments, and selectively pass signals from
one medium segment to another.
Bridges isolate the media access mechanisms of the LANs to which they are
connected. If a packet has a destination address on the same network segment as the
source of the signal, the bridge ignore the signal. If the destination address is different
from the source address network segment, the bridge sends the message along in a
fashion similar to what a repeater would. Since bridges are selective about which data
packets can be transferred, they are useful in solving traffic bottlenecks it must be
noted, however that bridges do not reduce traffic caused by broadcast packets or
broadcast storms.
Although they are effective for a small number of LANs, bridges lose many of
their benefits as the number of LANs grows. Bridges only operates at the data link
layer, and the best source routing information is a component of the network layer.
Bridges offer following advantages over hubs :
1. Divide a large network segment into smaller segments and hence reduce data
traffic and improves network performance.
Network Fundamentals / 52
2. Filter local data traffic by not allowing them to cross other network segments
hence reducing overall network traffic.
3. Provide exclusive bandwidth (10 Mbps) to each node connected to a port on a
bridge as opposed to shared bandwidth provided by hubs.
4. Can be used to connect network segments of dissimilar media.
Pro Cons
Can act as a repeater and extend Slower than repeaters due to the need to
distance examine addresses
Easy to install, load, and configure Can't perform effective balancing on larger
networks
Can restrict flow and ease congestion More expensive than repeaters
Useful for protocols that can't be routed Can’t prevent broadcast storms
Have good cost – to – performance ration Certain application might not run on bridge
networks.
4.3.6 Switches
As a response growing network demands, devices known as switches were
introduced to the market in 1991. A switch is a big brother of bridge. The switch is
nothing but a large multiport bridge. The switch operates at layer 2 of the OSI model
just like a bridge that MAC addresses to determine where to forward the packet. The
main differences between switches and bridges, are the strength and speed offered by
the switches. Bridges can have maximum 16 ports while switches can offer hundreds
of ports, each port offering exclusive bandwidth of 10 or 100 Mbps.
Switches can perform following functions.
• Address learning.
• Filtering and forwarding
• Loop Avoidance
Check your progress. - 4.3.3 to 4.3.6
4.3.7 Routers
Routers are the most complicated of the three devices so far, operating at the
network layer of the OSI model. While bridges are limited to examine data packets
MAC addresses, routers go beyond this and-can examine the network address-which
has routing information encoded in it. Routers can use this information to make
Network Connectivity Devices / 53
intelligent decisions about routes and paths.
In the simplest form routers like bridges-can be used to connect network
segments. Whereas bridges only know to forward what they don't recognised, routers
are aware of multiple paths that lead to a destination address and know which path is
best.
Each network segment is assigned a specific address and is then referred to
as a sub network or subnet. Each node on the network is then assigned an address.
Every data packet sent contains the destination network address and node address.
The optimum path can then be determined by looking at infernal routing table.
One of the biggest differences Between brides and routers is the ability to
identify where data is going, the router must initialize and maintain the routing table
and determine the next hop in the packet’s journey, a router is expected to be able to
identify the address and only send packets for which it has a network address. If a
machine address isn't found in the routing table, the packet is discarded.
To get at the network layer and find the information it needs, the router must
first strip off the Data Link Layer. After it finds the information, it repackages the data
packets. A key advantage of routers comes into play during this operation: Since the
data is unpacked and repacked, there wan opportunity transform the data to the data
frame needed for a particular architecture.
Routers are normally responsible for performing the following functions :
• Route selection -
A router is maintaining the information in its routing table about how to reach
remote networks. It will then make routing decisions based on that information
• Logical addressing-
A device that operates at layer 3 requires some form of logical addressing.
These addresses will be used to determine route selection.
• Segmentation-
• No broadcasts
Because router operates at Layer 3 of the OSI mode), no Layer 2 broadcasts wiII be
forwarded through a router.
• Manageability
Routers have a better knowledge of the network topology than bridges and switches
do and have the ability to support more protocols than bridges and switches
• Increased bandwidth
By segmenting your networks with routers, your nodes/ hosts will have more access
bandwidth
• Packet fragmentation and reassembling
Routers provide, packet fragmentation / reassembly functions, as well as better
Security.
Pros Cons
Can perform more functions than bridges Considerably more difficult to install than
Bridge
Network Fundamentals / 54
Can manage load balancing and sharing Work only with routable protocols
Can be used to control broadcast storms Static routing can cause problems
Can choose the best path and make Much slower than bridges or repeaters due
dynamic changes to additional functions.
4.3.8 Brouters
Bridges can perform limited functions but can work with all protocols. Routers
on the other hand, perform more complex functions but can work with only certain
protocols. Brouters come into play as a combination of the best features of the two. If a
routable packet is received, the brouter routes the data to the appropriate destination.
If a no routable protocol sends data, however the brouter bridges the data based on
the hardware address. In order to perform both functions, the brouter must contain
both a routing table and a bridging table. As a result it operates at both the Network
arid Data Link Layer. Brouters are more expensive and complex than bridges and
routers.
4.3.9 Gateways
Gateways are often lumped into discussion about bridging and routing, when
in fact the-service they perform is similar but different by one major factor: with a
gateway, data is translated between two different data formats or network
architectures.
Gateways perform much higher-level translations than any other component
and thus work at the Application layer of the OSI module. When packets arrive at a
gateway, all the information is stripped off the data until it reaches the layer where it
can translate the information-using the format needed for the destination
Pros Cons
4.4 SUMMARY
In this chapter we have studied OSI module that provides set of standard rules
for networking. Model contains 7 layers each layer performs different task.
The first layer is the physical layer. It uses the bits and signals to
communicate. This is the only layer that is truly connected to the network in the sense
that it is the only layer concerned with how to interpret the voltage on the wire the 1s
and 0s. This layer is responsible for understanding the electrical rules associated with
devices and for determining what king of medium is actually being used.
The second layer is data link layer. It is responsible for the creation and
interpretation of different frame types based on the actual physical network being
used. This layer is also responsible for interpreting what it receives from the physical
layer. Using low-level error detection and correction algorithms to determine when
information needs to be re-sent.
Network layer is mostly associated with the movement of data by means of
addressing and routing. It directs the flow of data from a source to a destination,
Passive hub
Active hub
Intelligent hub
2. Bridges always acts on OSI-Data Link Layer.
3. Bridges offer following advantages over hubs.
1. Divide a large network segment into smaller segments and hence reduce data
traffic and improves network performance.
2 Filter local data traffic by not allowing them to cross other network segments
hence reducing overall network traffic.
3. Provide exclusive bandwidth (10 Mbps) to each node connected to a port on a
bridge as opposed to shared bandwidth provided by hubs.
4. Can be used to connect network segments of dissimilar media.
Network Fundamentals / 56
4.6 QUESTIONS FOR SELF – STUDY
Network Fundamentals / 58
Chapter 5
5.0 Objectives
5.1 Introduction
5.2 OSI Physical Layer
5.3 Connection Types Used in Computer Networks
5.3.1 Point-to Point Connections
5.3.2 Multipoint Connections
5.4 Common Physical Topologies
5.4.1 Bus Topology
5.4.2 Ring Topology
5.4.3 Star Topology
5.4.4 Mesh Topology
5.4.5 Cellular Topology
5.5 Digital and Analog Signaling
5.5.1 Digital Signaling
5.5.2 Analog Signaling
5.6 Bandwidth
5.7 Summary
5.8 Check Your Progress - Answers
5.9 Questions for Self – Study
5.10 Suggested Readings
5.0 OBJECTIVES
5.1 INTRODUCTION
OSI model is the reference model for computer networking; it contains seven
layers in all. The OSI layers are broadly categorized into upper layers and lower
layers. The upper layers of the OSI model are:
Application
Presentation
Session
The information technology organizations who are involved in designing and
developing network operating systems and services to applications are mainly
concerned with the protocols defined at OSI upper layers. For example, Microsoft and
Novell who developed network services and related applications are mostly concerned
with protocols defined at application, presentation and session layers of the OSI
model.
OSI Model - Physical Layer / 59
The lower layers of OSl model are:
• Transport
• Network
• Data link
• Physical
The lower layers are oriented more towards the flow of data from end to end
through the network. The organizations like Cisco, Intel, Nortel, 3com-who are involved
in manufacturing of active networking components devices like hubs, bridges,
switches, and routers- are more concerned with the lower four layers of the OSI model.
Network Fundamentals / 60
Point-to-point connections
Multipoint connections
Advantages
1. Uses established standards
2. Relatively easy to install
3. Requires less media than other topologies
Disadvantages
1. Moderately difficult to reconfigure
2. Since a bus topology is based on a single cable, troubleshooting is relatively
difficult.
3. All units affected by media failure
Network Fundamentals / 62
5.4.2 Ring topology
Ring topologies are wired in a circle. Each node is connected to its neighbors
or either side, and date, passes around the ring in one direction only. Each device
incorporates a receiver and a transmitter and servers as a repeater that passes the
Signal to the next device in the ring. Because the signal is regenerated at each device,
signal degeneration is low.
Ring topologies are ideally suited for token passing access methods. The
token gets passed around the ring, and only the node that holds the token can transmit
data. Ring physical topologies are quite rare.
Advantages
• Because each device incorporates a repeater, you can easily find cable faults.
• Dual loop rings can be very fault tolerant.
Disadvantages
• More difficult to install and reconfigure than bus topology
• Faults in single loop system^ affect all devices on the network
• Because the ring requires a closed loop, more media is required than with bus
networks.
Ring topology
Advantages
• Star topologies are relatively easy to reconfigure.
• Because all data in a star network goes through a central point where it can be
collected, stars are easy to troubleshoot.
• Media faults are automatically isolated to the failed segment.
Disadvantages
• Star topologies require more cable than most other topologies
• Moderately difficult to install
• Hub failures can disable
Mesh Topology
Hybrid Mesh
Network Fundamentals / 64
Advantages
• Mesh topologies are easy to troublesh are because each medium link is independent
of all other.
• Mesh topologies resist media failure better than other topologies.
Disadvantages
• Mesh networks are relatively difficult to install because each device must be linked
directly to all other devices.
• Mesh topologies are difficult to reconfigure.
Cellular Topology
1. What is topology?
………………………………………………….……………….……………………
…………………………….…………………………………….……………………
2. Explain cellular topology?
…………………………………..…………………………….……………………
………………………………..……………………………….……………………
3. What are the advantages of star topology?
………………………………..……………………………….……………………
…………………………………..…………………………….……………………
Network Fundamentals / 66
Waves are measured using one or moore of the following three
characteristics:
• Amplitude
• Frequency
• Phase
Amplitude
You can consider the amplitude of a wave as the signal strength compard to
some reference value (measured in volts). Analog signals are based upon amplitude /
strength shifts, which vary constantly from positive to negative value. Amplitude is
commonly expressed in
• Volts when measuring electrical potential
• Amps when measuring electrical current
• Watts when measuring electrical power
• Decibels when measuring the ratio, between the power of two signals
Frequency
The frequency of a wave is the time it takes for a wave to compete one cycle.
In other words, if a signal takes one second to make a transition from high amplitude to
low and back to high, the frequency of fie wave is one second. Frequency is typically
measured in hertz (Hz), or cycles per second.
Phase
The phased a signal refers to the relative state of the wave when timing
began,
Bit Synchronization
Data bits ate encoded on this analog or digital signal by changing the state of
specific Signal characteristic. Th6 receiver interprets the signals by taking a
measurement of the characteristic. Therefore the receiver must know the correct time
to measure and decode the signal and extract the correct data bits.
The control of measurement timing clocks can be called bit synchronization.
There are two type of bit synchronization.
1. Asynchronous
2. Synchronous
All data transmissions require some type of synchronization.
Baseband systems use the transmission medium's entire capacity for a single channel.
Baseband networks can use either analog or digital signaling, but digital is much more
common. A baseband connection sends signals without modulation over twisted-pair,
coaxial, or fiber optic cable. Multiple signals can be sent over the same baseband
connection by using a technology called TDM. Usually baseband signals can be more
reliably interpreted and regenerated than broadband signals.
2. Broadband.
Broadband systems used the transmission media’s capacity to proves, multiple
channels. Multiple channels are created by dividing the medium's bandwidth by using
a technology FDM. Each channel is protected from the others by guard channels.
small bands of unused frequency placed in between the data channels. Using analog
signals, broadband networks can directly support multiple simultaneous conversations.
5.7 SUMMARY
Network Fundamentals / 68
2. The OSI-Physical layer is concerned with transmitting raw bits over a
communication channel.
3. A multipoint connection is a link between three or more devices. Multipoint
connections link multiple devices in the bus, star, and cellular topologies.
5.4.1 to 5.4.4
1. A topology defines the arrangement of nodes, cables, and connectivity devices
the make up the network.
2. A cellular topology combines wireless point-to-point and multipoint strategies to
divide a geographic area into the cells. Each cell represents the portion of the
total connection operates. Devices within the cell or hub. Hubs are
interconnected to route vide the complete network infrastructure.
3. Advantage of Star Topology
* Star topologies are relatively easy to reconfigure.
* Because all data in a star network goes through a central point where it can be
collected, stars are easy to troubleshoot.
Network Fundamentals / 70
Chapter 6
6.0 Objectives
6.1 Introduction
6.2 Functions of Data Link Layer
6.3 Media Access Control
6.3.1 Logical Topology
6.3.2 Media Access
6.3.3 Addressing
6.4 Logical Link Control
6.5 Summary
6.6 Check Your Progress - Answers
6.7 Questions for Self – Study
6.8 Suggested Readings
6.0 OBJECTIVES
6.1 INTRODUCTION
The second layer is the Data Link layer. It is responsible for the creation and
interpretation of different frame types based on the actual physical network being
used. For instance, Ethernet and Token-ring networks support different and numerous
frame types, and the Data link layer must understand the difference between them.
The layer is also responsible for interpreting what it receives from the physical layer,
using low level error detection and correction algorithms to determine when
information need to be re-sent.
MAC sub layer controls the way transmitters share a signal transmission
channel it includes following topics.
1. Logical topology
2. Media access
3. Addressing
Network entities transmit data depending upon the network's logical topology.
Physical topology discussed earlier is the structure of media or data path. In some
special cases, a physical network topology will not reflect the way the network
Operates. The actual signal path is called a logical topology.
A good example of disparate physical and logical topologies is an IBM Token-
Ring Network. Token-Ring LANs often use copper 'cable arranged in a star topology
with a hub at center. The hub does not repeat incoming signals to all other attached
devices, as in normal star topology.
The hub's circuitry distributes incoming signal to the next device in a
predetermined logical ring. Therefore the physical topology employed is a star, while
the logical topology is a ring. To determine the logical topology of the network, you
must understand how signals are received on your network:
• In logical bus topologies, every signal received by all devices.
• In logical ring topologies, each device only receives signals that have been
specifically sent to it.
Network Fundamentals / 72
6.3.2 Media Access
Logical topologies use specific rules that control when network entities are
allowed to transmit data signals. The control process is called media access. If access
rules are not observed, and devices transmit whenever they are, ready, sometimes
they may transmit at the same time, and that creates a collision. The collision destroys
effective communications. You cannot operate a network unless you can control or
eliminate, the effects of collisions. The mechanism of controlling collision is called
arbitration. The following media access methods describe rules that govern when
network devices are allowed to transmit:
• Contention
• Token-passing
• Polling
1) Contention
Contention systems are based on the philosophy that media access should be
allowed on a first-come, First-served (FIFO) basis. In other words, each network
device contends for control of the media.
Ethernet uses the carrier sense multiple access collision detect (CSMA/CD)
Protocols or algorithm for arbitration. The basic algorithm for using an Ethernet when
there is data to be sent consists of the following steps:
Step1 Listen to find out whether a frame is currently being received.
Step 2 If no other frame is on Ethernet, send.
Step 3 If another frame is on Ethernet, wait and then listen again.
Step 4 While sending, if a collision occurs, stop, wait, and again listen.
CSMA/CD protocols are quite popular. DEC’s Ethernet version 2, Local Talk,
and IEEE 802.3 are examples of CSMA/CD protocols.
Advantages
• Software is relatively very simple and produces very little overhead.
• Immediate and complete control over media, as long as no other network device
has access.
• At low traffic levels, actual data through put is usually very high.
Disadvantages
• Access times are not predictable (called probabilistic).
• Priorities cannot be used to give faster access to some devices.
• Collisions increase geometrically with the addition of new devices.
2) Token-passing
With Token Ring, a totally different mechanism is used. A free-token frame
rotates around the ring while no devices has data to send. When sending, a
device claims the free token, which really means changing bits in the 802.3
headers to signify "token busy" state. The data is then placed onto the ring after
the Token Ring header.
Advantages
Network Fundamentals / 74
• Device software parameters need to be adjusted each time a device is added to
or taken off the media.
• Some Token Rings require an additional central controller for fault detections
and recovery.
3) Polling
Advantages
a. Centralises channel access for greater network control
b. Maximum and minimum access times and rates on the channel are predictable
and fixed (called deterministic).
c. Priorities can be assigned to assure faster access.
d. Allows complete use of the media's capacity eliminating collisions.
Disadvantages
a. Delays, while other devices are being polled; may be unacceptable for some
application.
b. Uses a lot of bandwidth sending notices and acknowledgements or listening for
messages.
c. Involves more overheads than the other media access methods.
IEEE 802.3 Defines a network derived from the Ethernet network originally
developed by Digital, Intel, and Xerox, this standard defines
characteristics related to the MAC sub layer of the data link layer and the
OSI physical layer.
IEEE 802.4 Describes a network with a bus physical topology that controls media
access with a token mechanism. This standards was designed to meet
the needs of industrial automation system but has gained little
popularity. Both baseband and broadband configurations are available.
IEEE 802.6 The standard describes a MAN standard called Distributed Queue Dual
Bus. Much more than a data network technology. This suited to data,
voice, and video transmission.
IEEE 802.7 Represents the Broadband Technical Advisory group
IEEE 802.8 Represents the Fibre-Optic Technical Advisory group
IEEE 802.9 Integrated voice/ Data Networks
IEEE 802.10 Standards defines network security
IEEE 802.11 Is a standard for wireless LANs
IEEE 802.12 Demand priority Access LAN, 100 BaseVG any LAN
6.3.3 Addressing
With Ethernet and Token Ring, the addresses are very similar. Each uses
Media Access Control (MAC) addresses
The Logical Link Control (LLC) sub layer of Data Link Layer establishes and
maintains the link for transmitting data frames from one device to the next. It includes
the following topics.
• Transmission synchronization
• Connection services
Network Fundamentals / 76
The following three strategies are common form of flow control:
• Static window flow control
• Dynamic wind
• Guaranteed rate flow control
Static window flow control
Static window flow control protocols can use one window size. At a given point
of time it can handle definite number of frames depending upon the window size. If the
sending application has sent out all frames, it must wait until one of the assigned
numbers is acknowledge before it can send out another frame.
Dynamic window flow control
At times, it would be more efficient to allow network devices to adjust the
window: size, this is referred to as dynamic, floating, or sliding window flow control.
The number of permissible outstanding frames varies according to current status of the
receiver. When the receiver's buffer exceeds a specific level, it sends out a choke
packet. This notify sender to slow down. After complying with the choke packet, the
sending application slowly increases the transmission rate until another choke packet
is sent. In this way, the window size is constantly adjusted up or down.
Guaranteed rate flow control
Guaranteed rate flow control is set up before data transmissions are sent. The
sending and receiving applications agree upon an acceptable transmission rate for the
entire conversation, and this rate is guaranteed for as long as the conversions lasts.
Error Detection
LLC-level error detection simply refers to the process of learning whether bit
errors occurred during the transmission of the frame. To do this, most data link
includes a frame check sequence (PCS) or cyclical redundancy check (CRC) field in
the data link trailer. This field contains a value that is the result of mathematical
formula applied to the data in the frame. The PCS Value calculated and sent by the
sender should match the value calculated by the receiver.
Error detection does not imply recovery. Most data links, including 802.5
Token Ring and 802.2 Ethernet, do not provide error recovery. In these two cases,
however an option in the 802.2 protocols LLC type 2 does perform error recovery.
Answer in brief.
1. What is isochronous transmission?
…………………………………………………………………………………………
…………………………………………………………………………………………
2. What is a difference between synchronous and asynchronous transmission?
…………………………………………………………………………………………
…………………………………………………………………………………………
3. Explain the functions of connection services?
…………………………………………………………………………………………
…………………………………………………………………………………………
4. What is flow control?
…………………………………………………………………………………………
…………………………………………………………………………………………
The second OSI layer is the Data Link layer. It is responsible for the creation and
interpretation of different frame types based on the actual physical network being
used. The layer is also responsible for interpreting what it receives from the
physical layer, using low level error detection and correction algorithms to
determine when information need to be re-sent.
The layer is also responsible for interpreting what it receives from the physical
layer, using low level error detection and correction algorithms to determine when
information need to be re-sent.
Data Link layer are normally split between the following two sub layers. Media
Access Control (MAC) and Logical Link Control (LLC)
6.1 to 6.3.1
1. OSI-Data Link Layer is mainly responsible for the creation and interpretation of
different frame types based on the actual physical network being used. In
addition to this, the layer is also responsible for interpreting what it receives from
the physical layer, using low level error ejection and correction algorithms to
determine when information need to be re-sent.
2. The following are the basic functions of Data Link Layer:
• Arbitration- determines when it is appropriate to use physical medium.
• Addressing- ensures that the correct recipient(s) receives and processes the
data that is sent.
• Error detection- determines whether the data made the trip across the medium
successfully. Identifying the encapsulated data (frame identification)- Determines
the type of header that follows the data link header.
3. The following network connectivity devices are normally associated with the OSI
Data Link layer:
• Bridges
• Switches
• Intelligent Hubs
• Network interface boards.
4. Logical topology- the actual signal path is called a logical topology.
6.3.2 to 6.3.3
1. Disadvantages of contention-
• Access times are not predictable (called Probabilistic).
• Priorities cannot be used to give faster access to some devices.
• Collisions increase geometrically with the addition of new devices
2. Sometimes devices transmit at same time, and that creates collision, which
destroys effective communication. The mechanism of controlling collision is
called as arbitration.
3. 'Polling' method of media access provides a centralise administration.
4. Standards for IEEE 802.4 protocol-
• It describes a network with a bus physical topology that controls media
access with a token mechanism
Network Fundamentals / 78
• Both baseband and broadband configurations are available
6.4 & 6.5
1. Isochronous transmissions methods use a constant fixed-frequency transmission
clock to create set time slots. A clock signal is generated by a designated
network device and is passed to all other devices on the network.
2. Difference between synchronous and Asynchronous transmission-
• Asynchronous transmission methods rely upon the transmitting and
receiving devices to maintain their own internal clock.
• In asynchronous transmission, the two devices use similar timing but do not
synchronize their clocks.
• Synchronous transmission methods require that the communicating devices
take responsibility for providing a transmission (or framing) clock.
• These transmissions resist timing errors much better than asynchronous,
because both the transmitter and receiver use same clock.
3. Connection services perform the following functions
• Control the amount of data transferred from one computer to the next
• Detect transmission errors and request retransmissions
4. Flow control is a set of rules to regulate how much data can be transmitted within a
specified time.
Network Fundamentals / 80
Chapter 7
7.0 Objectives
7.1 Introduction
7.2 Difference between Data Link and
Network
7.3 OSI Network Layer Functions
7.3.1 Routing
7.3.2 Addressing
7.3.3 Switching
7.4 Introduction to OSI-Transport Layer
7.5 OSI Transport Layer Functions
7.5.1 Error Recovery
7.5.2 Flow Control
7.6 Summary
7.7 Check Your Progress – Answers
7.8 Questions for Self – Study
7.9 Suggested Readings
7.0 OBJECTIVES
7.1 INTRODUCTION
In this chapter we are learning third and fourth layer of OSI model
The Network layer is concerned with getting packets from the source all the way
to the destination. Getting to the destination may require making many hops at
intermediate routes along the way. This function clearly contrasts with that of the data
link layer, which has the move goal of just moving frames from one end of wise to the
other. Thus network layer is the lowest layer that deals with end – to – end
transmission.
The difference between DLL and Network layer are explained. The primary
objective of the network layer is to move data to specific network locating. This
appears similar to what the data link layer accomplishes through physical device
addressing. Data link layer addressing operates on a single network. The network
layer describes method for moving informal between multiple independent networks,
called internetworks.
Data link layer addressing delivers data to all devices attached to single network
and relies upon the receiving devices to determine whether the data was meant for it.
OSI Reference Model- Network and Transport Layer / 81
This layer choose a specific route through an internetwork and avoid sending data to
uninvolved network. This layer does this through switching, addressing and routing
layer algorithms. This layer is also responsible for ensuring correct data routers
through an internetwork of dissimilar networks.
The network layer is concerned with getting packets from the source all the
way the destination may require making many hops at way. This function clearly
contrasts with that of the data modest goal of just moving frames from one end of wire
to yhe other. Thus the network layer is the lowest layer that deals with end-to-end
transmission.
To achieve its goal the network layer must know about the topology of the
communication subnet (i.e the set of all routers) and choose appropriate paths through
it. It must also take care to choose routes to avoid overloading some of the
communication lines and routers while leaving others idle. Finally when the source and
destination are in different networks, it is up to the network layer to deal with this
differences and solve the problems that results from them.
As discussed above, the primary objective of the network layer is to move data
to specific network locations. This appears similar to what the Data Link layer
accomplishes through physical device addressing. However, data link layer addressing
operates on a single network. The network layer describes methods for moving
information between multiple independent networks, called internetworks.
Data link layer addressing delivers data to all devices attached to a single
network relies upon the receiving devices to determine whether the data was meant for
it. In contrast, the network layer choose a specific route through an internetwork and
avoid sending data to uninvolved networks. The network layer does this through
switching, network layer addressing, and routing layer algorithms. The network layer is
also responsible for ensuring correct data routes through an internetwork of dissimilar
networks.
Step 1 - Sending the data from the source computer to some nearby router.
Network Fundamentals / 82
Step 2- Delivering the data from the, router pear the source to a router near the
destination.
Step 3- Delivering the data from the router near the destination to the end
destination computer.
1) Sending data to a nearby router
The creator of the data, who is also the sender of the data, decides to send data
to a device in another group. A mechanism must be in place so that the sender
knows of some router on a common data link with the sender to ensure that data
can be send to that router.
The sender sends the data link frame across the medium to the nearby router
(Layer 2) addressing in the data link header to ensure that the nearby router
receives the frame.
2) Routing Data Across the Network
To route the data packet across the network. A router uses the routing table for a
particular network layer protocol type which is nothing more than a list of network
layer address groupings. These groupings vary based on the network layer
protocol type. The router compares the destination network layer address in the
packet to the entries in the routing table in memory, and a match is made. This
matching entry in the routing table tells this router where to forward the packet
next.
Any intervening routers repeat the same process. The destination network layer
(Layer 3) address in the packet identifies the group in which the destination
resides. The routing table is searched for a matching entry, which tells this router
where to forward the next packet. Eventually, the packet is delivered to the
router connected to the network or subnet of the destination host.
3) Delivering data to the end destination
When the packet arrives at a router sharing a data link with the true destination,
the route and the destination of the packet (end device) are in the same L3
grouping.
The final router can forward the data directly to the destination (end device). As
usual, a new data link header & trailer are created before a frame (which
contains the packet that made the trip across the entire network) can be sent on
to the media. This matches the final step (step 3), as shown in the figure.
The two important concepts in routing are Route selection and Route discovery,
which have been briefly explained in following paragraph.
Route selection
Route selection is the ability to determine which route will be the most efficient
to use to forward data to its final destination. Cost is the number assigned to a link, or
route, to give it a relative priority. In the area of cost, the link with the least assigned
cost is the first to be selected. One-way of determining cost is the number of hops,
which is the number of routers that data packet must pass through to reach the
destination network. A factor in cost determination can also be time, sometimes
calculated in the form of ticks, which are a time period of 1/18 of a second.
Route discovery
Route discovery is performed by a routing protocol, of which there are two
types:
Distance vector and link-state. Each type of routing protocol handles route
discovery in a, different way. Routing information protocols (RTP – 1, TRP – 2) and
interior Gateway Routing Protocol (1GRP) are the examples of distance vector
protocols, while Open Shortest Path first (OSPF) is an example of link state protocol.
OSI Reference Model- Network and Transport Layer / 83
7.1 to 7.3.1 Check your Progress.
A) Answer in brief
1. What is the purpose of Network layer?
…………………………………………………………………………………
…………………………………………………………………………………
2. What is the difference between data link layer and network layer transmission?
…………………………………………………………………………………
…………………………………………………………………………………
3. Explain the second step in routing?
…………………………………………………………………………………
…………………………………………………………………………………
4. What is route selection?
…………………………………………………………………………………
…………………………………………………………………………………
B) Fill in the Blanks
1) …………………….., ……………………… and ……………………… are three
major functions of network layer
2) ……………………. Is ability to determine which route is more efficient to forward
data to its final destination.
3) Route discovery is performed by a ………………………..
7.3.2 Addressing
One key feature of network layer addresses in that they were designed to
allow logical grouping of addresses. In TCP/IP, this group is called a network or a
subnet. In IPX. It is called a network. In AppleTalk, the grouping is called a cable
range.
Network layer addresses are also grouped based on physical location in a
network. The rules differ for some network layer protocols, but the grouping concept is
identical for IP, IPX, and AppleTalk. In each of these network layer protocols, all
devices with addresses in the same group cannot be separated from each other by a
router that is configured to route that protocol, respectively.
A is best exemplified in TCP/IP The most fundamental element of the Internet
protocol is the address space that IP uses. Each machine on a network is given a
unique 32-bit address called as Internet address or IP address. Addresses are divided
into five categories, called classes. There are currently A, B, C, D and E classes of
addresses.
The unique addresses given to a machine if derived from the class A, B, or C
addresses. Class D addresses are used for combining machines into one functional
group, and class E addresses are considered experimental and are not currently
available. For now, the most important concept to understand is that each machine
requires a unique address and that IP is responsible for maintaining, utilizing, and
manipulating it to provide communication between two machines. The whole concept
behind uniquely identifying machines is to be able to send data to one machine and
one machine only, even in the event that the IP stack has to broadcast at the physical
layer, the form of packets from the Transport layer, from either TCP or UDP, and
Network Fundamentals / 84
sends out data in what are commonly referred to as datagrams. The size of a
datagram depends on the type of network that is being used, such as token ring or
Ethernet. If a packet has too much data to be transmitted in one datagram, it is broken
into pieces and transmitted through several datagrams. Each of these datagrams then
has to be reassembled by TCP or UDP.
Most network layer (layer 3) addressing schemes were created with following
goals :
• The address space should be large enough to accommodate the largest network
with a selected layer-3 addressing protocol.
• The address should allow for unique assignment so that little or no chance of
address supplication exists.
• The address structure should have some grouping implied so that many
addresses are considered to be in the same group.
• In some cases, dynamic addresses assignment is desired.
Each layer-3 address structure contains at least two parts. One or (more) part
at beginning of the address, which identifies the grouping. The other or (last) part of
the address acts as a logical group.
7.3.3 Switching
• Circuit Switching -
Circuit Switching establishes a path that remains fixed for/the duration of the
connection. It's similar to telephone switching equipment. In the telephone world,
switching equipment establishes a route between your telephone In the Midwest and a
telephone in New York and maintains that .connection for duration of your call. The
next time you call, the same path may or may not be used.
The advantages of circuit switching include the use of dedicated paths and a
well-defined bandwidth. The disadvantages include the establishment of each
connection (which can be time-consuming) and the inability of other traffic to share the
dedicated media path. The latter can lead to inefficiently utilized bandwidth. Due to the
need to have excess (or rather a surplus of) bandwidth, this technology tends to be
expensive when compared to other options.
• Message Switching
In the message switching the complete message is sent from one switch to the
The advantages of message switching are that it can use relatively low cost
devices, data channels are shared among communicating devices, priorities can be
assigned to manage traffic, and bandwidth is used rather efficiently. The disadvantage
is that it is completely unacceptable for real time application.
• Packet Switching
When most administrators think of adding switches to their network, they think
of packet switches. Here, messages are divided into smaller packets, each containing
source and destination address information. They can be routed through the
internetwork independently. Packet is restricted to the point where the entire packet
can remain in the memory of the switching devices, and there is no need to temporarily
store the data anywhere. For this reason, packet switching routes the data through the
network much more rapidly and efficiently than is possible with message switching.
There are many types of packet switches. The most common are datagram
and virtual circuit. When datagram packet switching, each switch node decides which
network bypass busy segments and take other steps to speed packets through the
internetwork making datagram packet switching ideally suited for LANs.
Two important functions performed by recovery and flow control. The following
subsections cover these two functions in detail
As mentioned in the above figure, the data is numbered, as shown with the
numbers 1,2, and 3 these numbers are placed into header used by that particular
protocol; for example, the TCP header contains similar numbering fields. When PC2
sends his next packet to PC1; PC2 acknowledges that all three packets were received
by setting his acknowledgment field to 4. The number 4 refers to the next data to be
received, which is called forward acknowledgement. That means that the
acknowledgement number in the header identifies the next data that is to be received,
not the last one received. In the following figure, the concept of error recovery is
explained.
In the above figure, PC1 sent three packets numbered 1,2,and 3. But it seems
that there is some error in transmitting packet #2, so PC2 is asking for retransmitting of
packet #2 again. This is indicated by the acknowledgment packet (R=2) sent by
PC2.PC1- got now, two choices. PC1 could sent packet numbered 2 and 3 again, or
PC1 could send packet #2 and wait, hoping that pC2's next acknowledgment will say
R=4 indicating that PG2 just got packet #2 and already had packet from earlier
transmission.
Finally error recovery typically uses two sets of counter one to counter data in
one direction, one to count data in opposite direction. So when PC2 acknowledged
field in the header, the header would also have a number sent field that identifies the
date in the PG2 packet.
Network Fundamentals / 88
Check your Progress - 7.4 & 7.5.1
1. What is purpose of Transport Layer?
…………………………………….………………………………………..…….……
…………………………………….…………………………………….……………
2. Define – connection – oriented protocol connectionless protocol.
…………………………………….…………………………………….…………….
…………………………………….…………………………………….…………….
3. Explain the two important functions of transport layer?
…………………………………….…………………………………….…………….
…………………………………….…………………………………….……………
Row control is the process of controlling the rate at which a computer sends a
data. Depending on the particular protocol both the sender and the receiver of the data
(as well as intermediate routers, bridges, or switches) might participate in tile process
of controlling the flow from sender receiver.
Flow control is needed because data is discarded when congestion occurs
sender of data might be sending the data faster than the receiver can receive the data,
so the sender might be sending the data faster than the intermediate switching devices
(switches and routers) can forward the data, also causing discards. Packet can be lost
due to transmission error as well. This happens in every network- temporarily or
regularly. The receiving computer can have insufficient buffer space to receive the next
incoming frame, or possibly the CPU is too busy to process the incoming frame.
Flow control attempts to reduce unnecessary discarding of data. Without flow
control; some PDUs are discarded. With flow control, the sender can be slowed down
enough that the original PDU. Flow-control protocols do not prevent the loss of data
due to congestion; these protocols simply reduce the amount of lost data, which in turn
reduces the amount of retransmitted traffic, which hopefully reduces overall
congestion.
The following three methods of flow control are discussed in detail in this
subsection:
• Buffering • Congestion avoidance • Windowing
Buffering
Buffering simply means that the computers reserve enough buffer space that
bursts of incoming data can be held until processed. No attempt is made to actually
slow down the transmission rate of the sender of the data.
Congestion Avoidance
Congestion avoidance is the second method of flow control covered here. The
computer receiving the data notices that its buffers are filling. This causes either a
separate PDU, or field in header, to be sent toward the sender, signaling the sender to
stop transmitting
A preferred method might be to get the sender to simplify slow down instead of
stopping altogether. This method would still be considered congestion avoidance, but
instead of signaling the sender to stop, the signal would mean to slow down. One
example is the TCCP/1P Internet Control Message Protocol (ICMP) message "Source
Quench". This message is sent by the receiver or some intermediate router to sloe the
sender. The sender can slow down gradually until" Source Quench" messages are no
longer received.
Windowing
Network Fundamentals / 90
in this example, the sender has a window of three frames. After the receiver
acknowledges the receipt of frame 1, frame 4 can be sent. After a time lapse, the
acknowledgement for frames 2 and 3 are received, which is signified by the frame sent
by the recent, which the acknowledgement field equal to 4. so, the sender is free b
send two more frames-frames 5 and 6-before another acknowledgement is received.
The following table summarizes the flow control methods and provides examples of
each type.
7.6 SUMMARY
The network layer is concerned with getting packets from the source all the way
to the destination. Thus the network layer is the lowest OSI Network Layer
functions
The fourth layer is the Transport layer. It is primarily responsible for guaranteeing
delivery of packets transmitted by Network layer.
7.1-7.3.1
1)
1) Routing, Addressing & Switching
2) Route Selection
3) Routing Protocol
2)
1. The main purpose of network layer is concerned with getting packets from the
source all the way to the destination. Getting to the destination may require
making many hops at intermediate routers along the way.
2. Difference between Data Link later and Network layer transmission.
The primary objective of the network layer is to move data to specific network
locations. The layer describes methods for moving information between multiple
independent networks (Internetworks). Data link layer use Addressing for it's
functioning whereas Network layer uses Switching methods for it's functioning.
3. The second step in routing deals with delivering data from the router source to a
router near the destination.
4. Route' selection is the ability to determine which route will be the most efficient
to use to forward data to its final destination.
7.3.2 & 7.3.3
1. Internet Address-: Each machine on a network is- given a unique 32-bit
address called as Internet address or IP address.
2. Classes- IP addresses are divided in to five categories, called as Network
classes.
3. Switching-: Switching is the method of moving data through a network where
multiple redundant paths exist between the source and destination.
4. Circuit Switching-: Circuit Switching establishes a dedicated path arid well-
defined bandwidth, Which remains fixed for the duration of the connection.
7.4 & 7.5.1
1. Transport layer is primarily responsible for guaranteeing delivery of packet
transmitted by the Network layer. The layer is designed to hide the
characteristics of the computer network structure from the upper-layer process.
It organizes-higher-level messages into segments and reliably delivers
segments to session, or higher layer processes.
The transport layer often compensates for lack of reliable, or connection
oriented, connection services in the lower layers. Transport layer protocol
implementations can usually confirm or deny data delivery.
Network Fundamentals / 92
NOTES
Network Fundamentals / 94
Chapter 8
8.0 OBJECTIVES
8.1 INTRODUCTION
Network Fundamentals / 96
Simplex communications benefits and consideration:
Benefits Considerations
No channel contention
Using half - duplex dialog, each device can both transmit and receive, but only
one device can transmitting at a time. The channel's full bandwidth is available to the
transmitting device (which cannot receive while is transmitting.) Use of the channel by
one device is limited by use of the other devices. Eg- Citizen's band radio and may
LAN data transmissions use half-duplex channels. Police wireless communication
equipments
Benefits Considerations
Requires only one channel for both Only one unit can transmit at a time.
transmission and reception.
Benefits Considerations
Both ends can transmit at the Hardware mom expensive relative to, simplex and
same time half-duplex
In the OSl reference model the sixth layer is the Presentation Layer, this layer
performs certain functions that are often requested sufficiently to warrant finding a
general solution for them. Rather than letting each user solve the problems. In
particular, unlike all the lower layers, which are just interested in moving bits reliably
from here to there, the presentation layer is concerned with the syntax and-'semantics
of the information transmitted.
The layer is primarily concerned with the conversion of data formats, in the
form of packets, from one machine to another. The Presentation layer is responsible
for picking up differences such as these and translating them to compatible formats.
The typical example of presentation service is encoding data in a standard
agreed way. Most user programmes do not exchange random binary bit strings. They
exchange things such as people's names, dates, amount of money and invoices.
These items are represented as character strings, integers, floating point numbers,
and data structures composed of several simpler items. Different computers have
different- codes for representing character strings (e.g. ASCII and Unicode)integers
and so on; In order to make it possible for computers with different representations to
communicate, the data structures to be exchanged can be defined in an abstract way,
along with standard encoding to be used " on the wire". The presentation layer
manages this abstract data1 structures and converts from the representations used
inside the computer to the network standard representation and back.
The seventh and last layer of OSI model is the Application Layer .it acts as the
arbiter or translator between users application and the network It contains a variety of
protocols that are commonly needed. For example, there are hundreds of incompatible
terminal types in the world. Consider the plight of a full screen editor that is supposed
to work over a network with many different terminal types, each with different screen
layouts, escape sequence for inserting and deleting text, moving the cursors, etc.
One way to solve this problem is to define an abstract Network virtual terminal
that editors and other programs can be written to deal with. To handle each terminal
type, a piece of software must be written to map the functions of the network virtual
terminal onto the real terminal. For example when the editor moves the virtual
terminal's cursor to the upper left-hand comer of the screen, this software must issue
Another Application layer function is file transfer. Different files systems have
different file naming conventions, different ways of representing text lines, and so on.
Transferring a file between two different systems requires handling these and other
incompatibilities. This work too, the application layer, as do electronic mail, remote job
entry, directory lookup, and various other general-purpose and special-purpose
facilities.
8.7 SUMMARY
The seventh and last layer of OSI model is the Application Layer.
It acts as the arbiter or translator between users application and
the network. It contains a variety of protocols that are commonly
needed.
8.1 to 8.3.2
TCP/IP Fundamentals
9.0 Objectives
9.1 Introduction
9.2 Purpose of Layers (TCP/IP Model)
9.3 Network Classes
9.4 Dynamic Host Configuration Protocol (DHCP)
9.5 Domain Name System
9.5.1 Structure of DNS
9.5.2 DNS Domains
9.6 Windows Internet Name Service
9.7 IP Address
9.8 Subnet Mask
9.9 Summary
9.10 Check Your Progress – Answers
9.11 Questions for Self – Study
9.12 Suggested Readings
9.0 OBJECTIVES
9.1 INTRODUCTION
OSI TCP/IP
Application Application
Presentation
Session Application
Transport Transport
Networking internet
Data Link Network interface
TCP/IP maps to four layer architectural model. This model is called the
Internet protocol suite and is broken into the network interface, Internet, Transport, and
Application layers. Each of these layers corresponds to one or more layers of the OSI
model. The Network Interface layer corresponds^\o the Physical and Date Link layers.
The Internet layer corresponds to Network layer. The transport layer corresponds to
the transport and application layer corresponds to the Session, Presentation, and
Application layer.
The Network Interface layer is responsible for communicating directly with the
network. The Internet layer is primarily concerned with the routing and delivery of
packets through the Internet protocol (IP). All protocols in transport layer must use IP
to send data.
The transport layer maps to the Transport Layer of OSl model and is
responsible for providing communication between machines for applications.
The Application layer of the Internet Protocol Suite is responsible for all the
activities that occur in the session, presentation an application layer of the OSI model.
Numerous protocols have been written for use in this layer, including HTTP, Simple
Network Management Protocol SNMP File Transfer Protocol (FTP) etc.
Default Mask Class A The mask used for class A network when no subnetting
The value is 255.0.0.0
Default Class B The mask used for class B network when no subnetting is used.
Mask The value is 255.255.0.0
Default Class C Mask The mask used for class A network when no subnetting is used.
The value is 255.255.255.0
Class E : Multicast
Research
Class A address has only 8 network bits (1 byte) and 24 bits (3 bytes) in the
host field. Therefore, few Class A networks, each consisting of many hosts, exist.
There are more Class B and Class C networks, each with fewer hosts. This scheme
allows addresses to be assigned based on the size of network. This address design
was based on assumption that there would be many more small networks than large
networks in the world.
Characteristics of Class A, B and C addresses
The first bit is 0. The first two bits are 10. The first three bits are 110.
When installing the TCP/IP protocol, you have, the choice of installing and using
several different services that work in conjunction with it. You may want or need to
install the following services.
The Internet Information Server provides you the ability to share information to
any type of computer that can use the TCP/IP protocol. IIS 3 includes FTP and WWW
servers
Without the ability to find another computer on the network, you would never
be able to communicate .The WINS server provides a centralised method of name
management that is both flexible and dynamic in Microsoft only network.
When the WINS server provides the capability to find the NETBIOS names,
the DNS server will work with host names to enable you to integrate your systems into
the Internet or to resolve hosts on the Internet.
The configuration of Microsoft TCP/IP involves knowing the correct values for
several fields for each TCP/IP host and entering them manually. At the minimum, the
host IP address and the subnet mask need to be configured. In most cases, other
parameter such as WINS and DHCP server addresses also need to be configured on
each host. DHCP relives the need for manual configuration and provides a method of
configuring and reconfiguring all the TCP/IP related parameters. It is critical that the
correct TCP/IP address is configured on each host.
The use of Microsoft's DHCP server greatly reduces the administrative overhead of
managing TCP/IP client computers by eliminating the needs to manually configure
clients. The DHCP server also allows for greater flexibility and mobility of clients on a
TGP/IP network without administrator intervention. If used correctly DHCP can
eliminate nearly all the problems associated with TCP/IP. The administrator enters the
valid IP addresses or ranges of IP addresses (called a scope) in the DHCP server
database, which then assigns the IP addresses to the DHCP client hosts.
In it's early days, the Internet was a small network established by the
Department of Defence for research purposes. This network linked computers at
HOSTS files and allows room for future-defined types. Because the database
is distributed, it can support a much larger database that can store in single HOSTS
file.
Some hostname systems, like NetBIOS names, use a flat database. With a flat
database, all names exist at the same level, so there cannot be any duplicate names.
These names are like Social Security numbers: every participant in the Social Security
program must have a unique number, so it must be an identification system to
distinguish all the individuals in the security. DNS names are located in hierarchical
paths, like a directory structure. In a network using DNS, you can have more than one
server with the same name, as long as each is located in a different path.
The Internet Network Information Center Controls the top-level domains. These have
names such as "com", "edu", ‘Gov’, "org" etc.
Net Networks
You can also enable non-WINS clients to use a WINS server to resolve
NetBIOS names by installing a WINS proxy agent. By definition, a non-WINS client
cannot directly communicate with a WINS server to resolve a name. The non-WINS
client resolves names by restoring to a b-node broadcast. If you install a WINS proxy
agent, the proxy agents' forwards any broadcasts for name resolution to the WINS
server. The proxy agent must be located on the same subnet as non-WINS clients so
that proxy agent receives the Broadcast for name resolution.
You must place a WINNS proxy agent on each subnet where non-WINS
clients are located so that those clients have access to the WINS server.
9.7 IP ADDRESS
A TCP/IP address has two or possibly three components that uniquely identify
the computer the address assigned to. At the very least, the IP address specifies the
network address and host address of the computer. Also, if you are subnetting (using
part of the host address to specify a subnet address), the third part of the address
If a local client the incorrect host (143.168.3.9), the message never reaches its
intended destination. The message is either routed (if the local client sends the it to
what should have been the address, 133.168.3.9). If the message is routed, the
routed, the client for whom it was intended cannot receive the message because it is
on the same segment of the network as the local client. If the message is not routed,
the message still does not reach the incorrect client because the IP address for the
destination host (133.168.3.9) does not match the address as configured on the
incorrect client (143.168.3.9).
If a local client tries to send a message to 33.5.8.4, the message does not
reach the client. If the local client uses the address as configured, the message is
routed, which is not the correct solution because the destination host is local. If the
local client sends the message to what should have been the IP address, 33.5.8.4
does not receive the message because the lP address is not configured correctly. The
last component of an IP address that can cause communication problems in the host
address.
The subnet mask specifies which portion of the IP address specifies the
network address and which portion of the address specifies the host address. Also, the
subnet mask can be used to take part of what would have been the host address and
use it to further divide the network into subnet. If the subnet mask is not configured
correctly, yours client may not be able to communication at all, or you may see partial
communication problems.
The following figure shows a subnet on a TCI/IP network. It uses a Class B network
address of 130.13.x.x. The third octet is used in this case for subnetting, however, so
all the clients in the figure should be on subnet 4, as indicated by the common address
138.13,3.x. Unfortunately, the subnet mask entered for one client is 255.255.0.0.
When this client tries to communicate with other hosts on the same subnet, it should
be able to contact them because the subnet mask indicates they are on the same
subnet, which is correct. If the client tries to contact a host on another subnet such as
138.13.3.x, however the client fails.
In this case, the subnet mask still interprets the destination host to be on the
same subnet and the message is never routed. Because the destination host is on
another subnet, the message never reaches the intended destination.
The subnet mask is used to determine whether the host is local or remote, so
the client with the incorrect subnet mask can receive incoming messages. When the
client tries to return communications, however, the message is not routed if the source
host is on the same network but on a different subnet. So in actuality, the client really
can establish communications with only one side of the conversation. Contact with
hosts outside the local network still works because those contacts are routed.
The following figure shows a subnet mask that masks too many bits. In this
case, the subnet mask, is 255:255.255.0. The network designers had Intended the
subnet mask to be 255.255.240.0, however, with 4 bits of the third octet used for the
subnet and 4 bits as part of the host address. If the incorrect client tries to send a
message to a local host and third octet is the same, the message is not routed and
therefore reaches the local client, if the local client has an address that differs in the
last 4 bits<of the third octet, however, the message is routed and never reaches its
destination. If the incorrect client tries to send a message to another client on another
subnet, the message is routed because the third octet is different.
1.NetBEUI
2. NWLink
Default Class A Mask- The mask used for Class A network when no sub
netting is used. The value is 255.0.0.0
Default Class B Mask- The mask used for class B network when no
subnetting is used. The value is 255.255.0.0
Default Class C Mask- The mask used for Class A network when no
subnetting is used. The value is 255:255.255.0
9.1 – 9.2
1. Advantages of TCP/IP protocol
• An industry-standard protocol
• As set of utilities for connecting similar operating systems
• A scalable. Cross-platform client-server architecture
• Access to the Internet
2. Following layers are included in the TCP/IP model-
• Application ,
• Transport
• Internet
• Network interface
9.3 – 9.5
1. IP address-: Each machine on a network is given a unique 32-bit address called
as IP address.
2. Characteristics of Class A-
• The first bit is 0.
• Class A networks ranges from 1.0*0.0 to 126.0.0,0
• Total 127 networks can possible with class A
• Number of possible values in the Host portion: are 16777,216
3. Following services we can install with TCP/IP protocol.
• Internet Information Server (US)
• Dynamic Host Configuration Protocol (DHCP
• Windows Internet Name Service
• Domain naming service.
4. DHCP is "Dynamic Host Configuration Protocol" which Provides automatic
configuration of remote hosts, making management of a TCP/IP environment
easy.
5. DNS is "Domain Name System" which resolves hostnames in IP addresses in a
TCP/IP environment.
Windows XP
10.0 Objectives
10.1 Introduction
10.2 Multitasking
10.0 OBJECTIVES
10.1 INTRODUCTION
10.2 MULTITASKING
Windows XP / 117
New Features and Improvements
Automatic Updates
Windows XP Professional includes an Automatic Updates (AU) feature. AU is
a proactive service that allows users with administrative privileges to automatically
download and install critical operating system updates, such as security fixes and
patches. Because the installation might require you to restart your computer, you are
notified before the installation takes place and given the opportunity to postpone the
download operation. Updates are downloaded in the background so that you can
continue to work during downloading.
AU uses the Windows Update control to scan the system and decide which
updates apply to a particular computer. AU uses its innovative bandwidth-throttling
technology for downloads. Bandwidth throttling uses only idle bandwidth so that
downloads do not interfere with or slow down other network activity, such as Internet
browsing. Only one administrative user at a time can run the AU client.
Copying Files and Folders to a CD
Windows XP Professional enables users to save information such as photos
and software to a compact disc (CD) without using third-party software. Because CD-
recordable (CD-R) and CD-rewritable (CD-RW) drives are now inexpensive options on
computers, this feature enhances the standard conveniences that Windows offers to
users.
Users can select a folder of images from a digital camera, drag it to the CD-R
icon, and then create a CD. They can also transfer files more easily to a CD instead of
copying them to a smaller capacity floppy disk.
This feature also provides options for original equipment manufacturers
(OEMs) and independent software vendors (ISVs). OEMs can create branded
applications that generate emergency boot CDs instead of emergency boot floppy
disks, and ISVs can offer a "burn to CD" option on their Windows versions.
To copy files or folders to a CD follow these steps:
1. Insert a blank, writable CD into the CD recorder. You must have a blank, writable
CD and a CD-ROM drive that has the capability of writing CDs to use this
feature.
2. Click Start, right-click My Computer and select the files and folders you want to
write to the CD.
3. Under File And Folder Tasks, click Copy This File, Copy This Folder, or Copy
The Selected Items.
4. In the Copy Items dialog box, click the CD recording drive and then click Copy.
5. In My Computer, click the CD recording drive and then under CD Writing Tasks,
click Write These Files To The CD.
Standard CDs hold 650 MB of information. High-density CDs hold at least 700
MB of information. You must have enough space on your hard drive to temporarily
hold the files you want to copy to the CD or the operation will fail.
Figure The Desktop Items dialog box 4. Under Desktop Cleanup, click Clean
Desktop Now to run the Desktop Cleanup Wizard now.
Windows XP / 119
Start Menu
The Start menu has been redesigned for easier access to important and
frequently used tasks. In addition to prominent Internet and e-mail links, the new Start
menu lists the programs that you use most frequently. Windows XP Professional
continually updates this list based on your usage of programs. It adds programs that
you are using and removes programs from the list that you have not been using.
Windows XP Professional does not remove the programs from your computer, just
from this list. The Start menu also lists important user folders such as My Documents,
My Pictures, and My Music.
To customize the Start menu follow these steps:
1. Right-click Start and then click Properties.
2. Click the Start Menu tab. The Start Menu tab lets you choose between the
Windows XP Professional Start menu and the Classic Start menu used in earlier
versions of Windows.
3. Click Customize. The Customize Start Menu dialog box has two tabs: General
and Advanced. The General tab allows you to select an icon size for programs,
configure the amount of frequently used programs you want displayed on the
Start menu, and select the Internet and e-mail items shown on the Start menu.
The Advanced tab, shown in Figure 1.3, allows you to configure Start menu
settings, items, and recent documents.
Figure The Advanced tab of the Customize Start Menu dialog box
Workgroups
A Windows XP Professional workgroup is a logical grouping of networked
computers that share resources, such as files and printers. A workgroup is also called
a peer-to-peer network because all computers in the workgroup can share resources
as equals (peers) without a dedicated server.
Windows XP / 123
Figure An example of a Windows XP Professional workgroup
1. It is simple to design and implement. It does not require the extensive planning
and administration that a domain requires.
2. It is a convenient networking environment for a limited number of computers in
close proximity. However, a workgroup becomes impractical in environments
with more than 10 computers.
Domains
A domain is a logical grouping of network computers that share a central
directory database (see Figure 1.11). A directory database contains user accounts and
security information for the domain. This database is known as the directory and is the
database portion of Active Directory service, the Windows 2000 directory service.
File Systems
After you create the installation partition, Setup prompts you to select the file
system with which to format the partition. Like Microsoft Windows NT 4 and Microsoft
Network Fundamentals / 124
Windows 2000 Professional, Windows XP Professional supports the NT file system
(NTFS) and file allocation table (FAT). Both Windows 2000 Professional and Windows
XP Professional support FAT32. Figure 2.1 summarizes some of the features of these
file systems.
Domain
You can designate only a computer running one of the Microsoft Windows
2000 Server products as a domain controller. If all computers on the network are
running Windows XP Professional, the only type of network available is a workgroup.
Windows XP / 129
The computer restarts, and the Setup Wizard displays the Welcome To
Microsoft Windows page.
If your computer attempts to reboot from the CD-ROM, remove the CD-ROM
and then restart the computer.
1. Click Next to continue .The Setup Wizard displays the Will This Computer
Connect To The Internet Directly, Or Through A Network page.
2. If you would like to connect to the Internet at this time, select the appropriate
connection method, and then click Next. The Setup Wizard displays the Ready
To Activate Windows page.
At some point you will have to activate Windows XP Professional. However, it is
not necessary to activate it while you complete this training kit. 3. Click Yes,
Activate Windows Over The Internet Now, and then click Next. The Setup
Wizard displays The Ready To Register With Microsoft page.
4. Click Yes, I'd Like To Register With Microsoft Now, and then click Next. The
Setup Wizard displays the Collecting Registration Information page.
5. Fill in the appropriate text boxes. The Setup Wizard displays the Ready To Send
Information page.
6. Click Next. The Setup Wizard displays the Do You Want To Set Up Internet
Access Now page.
Internet access is not required for this training kit. If you want to connect to the
Internet at this time, click Yes Help Me Connect To The Internet, click Next and
follow the instructions on your screen.
7. Click No, Not At This Time, and then click Next. The Setup Wizard displays the
Who Will Use This Computer page. Your name should already be entered.
8. Type Fred for the second user, and then click Next. The Setup Wizard displays
the Thank You page.
9. Read the page and then click Finish.
10. To log on, select Fred (or the account name created for you during setup).You
have completed your installation of Windows XP Professional and logged on as
an administrator.
The Windows XP Professional Boot Process
Files Used in the Boot Process
TABLE below shows files Used in the Windows XP Professional Boot Process
File Location
Hal.dll systemroot\System32
If you set up a Microsoft or Novell network client, you can share your
documents-and any printers attached to your computer-with other people on the
network. To use file and print sharing, you must first choose which of two types of
access you want to give other users.
• Share level control is default access setting. It lets you require a password for
each shared resource.
• User-level control lets you specify who has access to each shared resource, but
it doesn't let you require a password.
Windows XP / 133
3. On the sharing tab, click shared as.
4. In share name, type a name for printer. In comment you can type brief
component description of the printer
5. Clicks add.
6. In the add users dialog box, click the names of the people to whom you want to
grant permissions.
7. Click full access.
10.6 SUMMARY
Source : http://etutorials.org
10.1
Fill in the blanks
1] 32 bit or 64 bit
2] Kernel and User
3] 2 CPUs.
4] 4GB
5] Home
10.2
1] False
2] True
3] True
4] True
5] False
Windows XP / 135
NOTES
Wireless Networks
11.0 Objectives
11.1 Introduction
11.2 Working of Wireless Networks
11.3 Examples of Wi-Fi devices
11.4 Wireless Standards
11.5 Advantages and Disadvantages
of Wireless Networks
11.6 Wireless Security
11.7 Example of Wireless Networks
11.8 Summary
11.9 Check your Progress – Answers
11.10 Questions for Self – Study
11.11 Suggested Readings
11.0 OBJECTIVES
11.1 INTRODUCTION
Wi-Fi is a brand originally licensed by the Wi-Fi alliance to describe the
underlying technology of wireless Local Area Networks (WLAN) based on IEEE 802.11
specifications. Wi-Fi was intended to be used for mobile computing devices, such as
Laptops in LANs, but is now often used for increasingly more applications including
Internet Access, gaming, and basic connectivity of consumer electronics such as
televisions and DVD players.
A person with a Wi-Fi device such as computer, telephone or personal digital
assistant (PDA) can connect to the internet when in proximity of an access point. The
region covered by one or several access points is called a hot spot. Hot spots can be
range from a single room to many square miles of overlapping hot spots.
Wireless Networks uses radio waves as its carrier. (RF 2.4 GHz to 5 GHz).
Wi-Fi stands for Wireless Fidelity.
The typical Wi-Fi setup contains one or more Access points (APs) and one or
more clients. A AP broadcasts its SSID (Service Set Identifier, Network Name) via
packets that called beacons, which are broadcasted every 100 ms. The beacons are
transmitted at 1 Mb/s and are relatively short and therefore are not of influence on
performance. Since 1Mb/s is the lowest rate of Wi-Fi it assures that the client who
receives the beacon can communicate at at least 1Mb/s . Based on the settings (e.g.
the SSID) , the client may decide whether to connect to an AP. Also the firmware
running on the client Wi-Fi is of influence. Say two APs of the same SSID are in the
Wi-Fi uses spectrum near 2.4 GHz, which is a standardized and unlicensed by
international agreement.
Wireless Capabilities :-
1] It provides temporary connections to and existing cable (Wired) networks.
2] Provides backup (redundant) to an existing wired networks.
3] Extend the networks beyond the limits of copper or even fiber optic cables.
Usage of Wireless Networks:-
1] Busy areas such as lobbies, and reception areas.
2] For people who are constantly on move such as doctors in hospitals, in isolated
areas.
3] Buildings or departments where physical settings changes frequently.
3] Structures such as historical buildings where cabling would be difficult.
General description
Net Bit
Release Op. Gross Bit Max Indoor Max Outdoor
Throughput Rare
date Frequency Rate (max.) Range Range
(max.)
The 802.11a standard uses the same data link layer protocol and frame format
as the original standard, but an OFDM based air interface (physical layer). It operates
in the 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction
code, which yields realistic net achievable throughput in the mid-20 Mbit/s . Since the
2.4 GHz band is heavily used to the point of being crowded, using the relatively un-
used 5 GHz band gives 802.11a a significant advantage. However, this high carrier
frequency also brings a disadvantage: the effective overall range of 802.11a is less
than that of 802.11b/g. In theory, 802.11a signals are absorbed more readily by walls
and other solid objects in their path due to their smaller wavelength and, as a result,
cannot penetrate as far as those of 802.11b. In practice, 802.11b typically has a higher
range at low speeds (802.11b will reduce speed to 5 Mbit/s or even 1 Mbit/s at low
signal strengths). However, at higher speeds, 802.11a often has the same or greater
range due to less interference.
802.11b
~150 ~300
October
2.4 GHz ~5 Mbit/s 11 Mbit/s 11 Mbit/s feet/45 feet/90
1999
meters meters
802.11b has a maximum raw data rate of 11 Mbit/s and uses the same media
access method defined in the original standard. 802.11b products appeared on the
market in early 2000, since 802.11b is a direct extension of the modulation technique
defined in the original standard. The dramatic increase in throughput of 802.11b
(compared to the original standard) along with simultaneous substantial price
reductions led to the rapid acceptance of 802.11b as the definitive wireless LAN
technology.
802.11b devices suffer interference from other products operating in the
2.4 GHz band. Devices operating in the 2.4 GHz range include: microwave ovens,
Bluetooth devices, baby monitors and cordless telephones.
802.11g
~150 ~300
June
2.4 GHz ~22 Mbit/s 54 Mbit/s 128 Mbit/s feet/45 feet/90
2003
meters meters
In June 2003, a third modulation standard was ratified: 802.11g. This works in
the 2.4 GHz band (like 802.11b), but uses the same OFDM based transmission
scheme as 802.11a. It operates at a maximum physical layer bit rate of 54 Mbit/s
exclusive of forward error correction codes, or about 22 Mbit/s average throughput.
802.11g hardware is fully backwards compatible with 802.11b hardware and therefore
Network Fundamentals / 140
is encumbered with legacy issues that reduce throughput when compared to 802.11a
by ~21%.
802.11n
802.11n is a recent amendment which improves upon the previous 802.11
standards by adding multiple –input multiple –output (MIMO) and many other newer
features. The IEEE has approved the amendment and it was published in October
2009. Prior to the final ratification, enterprises were already migrating to 802.11n
networks based on the Wi-Fi Alliance’s certification of products conforming to a 2007
draft of the 802.11n proposal.
Modes of Operations
Peer to Peer or Ad-Hoc Mode
This is a method for wireless devices to directly communicate with each other.
Operating in ad-hoc mode allows wireless devices within range of each other to
discover and communicate in peer to peer fashion without involving central access
points.
This is typically used by two PCs to connect to one another so that one can
share the other’s internet connection for example as well as for wireless mesh
networks.
The WPA protocol implements the majority of the IEEE802.11i standard, and
was intended as an intermediate measure to take the place of WEP while 802.11i was
prepared. Specifically, the Temporal Key Integrity Protocol (TKIP), was brought into
WPA. TKIP could be implemented on pre-WPA Wireless Network Interface Cards that
began shipping as far back as 1999 through firmware upgrades. Because the changes
required fewer modifications on the client than on the Wireless Access Point, most pre-
2003 APs could not be upgraded to support WPA with TKIP. Researchers have since
discovered a flaw in TKIP that relied on older weaknesses to retrieve the key stream
from short packets to use for re-injection and spoofing
Here is a simple explanation of how it works. Let say you have two computers
each equipped with wireless adapter and you have set up wireless router. When the
computer send out the data, the binary data will be encoded to RF (Radio Frequency)
and transmitted via wireless router. The receiving computer will then decode the signal
back to binary data. It doesn’t matter that you are using broadband cable/DSL modem
to access internet, both ways will work with wireless network. The area covered by
wireless devices is called as hotspot. The two main components are wireless router or
access point and wireless clients. If you have not setup any wired network, then just
get a wireless router and attach it to cable/DSL modem. You then setup wireless client
by adding a wireless card to each computer and form a simple wireless network. You
can also cable connect computer (Wired Computer) directly to router if there are switch
ports available.
11.8 SUMMARY
Source : http://centralupload.com(Link)
11.2
1] 802.11 2] 54Mbps 3] 11Mbps 4] 54Mbps
5] 600Mbps
6] Peer to Peer Mode and Infrastructure Mode
7] Wired Equivalent Privacy 8] WPA