Network Basics 1r
Network Basics 1r
)A
m
ity
U
ni
ve
r
Network Basics
si
ty
O
nl
in
e
e
in
© Amity University Press
nl
No parts of this publication may be reproduced, stored in a retrieval system or transmitted
in any form or by any means, electronic, mechanical, photocopying, recording or otherwise
without the prior permission of the publisher.
O
Advisory Committee
ty
Chairman : Ms. Monica Agarwal
Members : Prof. Arun Bisaria
si
Dr. Priya Mary Mathew
Prof. Aindril De
r
Mr. Alok Awtans
ve
Dr. Coral J Barboza
Dr. Monica Rose
Mr. Sachit Paliwal
ni
Published by Amity University Press for exclusive use of Amity Directorate of Distance and Online Education,
Amity University, Noida-201313
Contents
e
Page No.
in
Module - I 01
1.1 Exporing Network
1.1.1 Introduction
nl
1.1.2 Network Evolution
1.1.3 Communicating in a Network-Centric World
1.1.4 The Network as a Platform
O
1.2 Types of Network
1.2.1 Converged Networks
1.2.2 LANs, WANs,MAN and the Internet
ty
1.2.3 Network Architectures and Network Expension
1.2.4 Types of Network Topologies
1.3 Network Operating System Configuration
si
1.3.1 Network Operating System and its type
1.3.2 Network Operating System Configuration
1.3.3 Configuring a Network Operating System : IOS Bootcamp
r
1.3.4 Device configuration and access control
ve
1.3.5 Address Schemes
1.3.6 IOS Bootcamp
Case Study
ni
e
2.3.3 Data transmission Mode
2.3.4 Digital Transmission
in
Module - III: Application Layer and Transport Layer 131
3.1 Application Layer Protocols
nl
3.1.1 Introduction
3.1.2 Client-Server Model
3.1.3 File Transfer Protocol(FTP)
O
3.1.4 E-mail Protocol (SMTP)
3.1.5 Domain Name System (DNS)
3.1.6 Hyper Text Transfer Protocol (HTTP)/(HTTPS)
ty
3.1.7 World Wide Web (WWW)
3.1.8 Streaming Audio and Video
3.1.9 Application Protocol Intercation with End-User Application
si
3.1.10 Application Layer Services
3.2 Transport Layer Protocols
3..2.1 Introduction-TCP/IP Layers
3.2.2 End Point Identification
r
ve
3.2.3 Well-known Port Numbers
3.2.4 Message Oriented Interfaces
3.2.5 Connection Less Protocol - UDP
ni
e
4.2.4 Flooding
4.2.5 Distance Vector Algorithm
in
4.2.6 Hierarichical Algirithm
4.2.7 Router Configuration
4.3 Congestion Control
nl
4.3.1 Approaches to Congestion Control
4.3.2 Traffic-aware Routing
O
4.3.3 Admission Control
4.3.4 Load Shedding
4.4 Internetworking and Internet Protocol
4.4.1 How Network Connected
ty
4.4.2 Tunneling
4.4.3 Internetwork Routing
4.4.4 Packet Fragmentation
si
4.4.5 IP Version 4 Protocol
4.4.6 IPV4 Network Addesses
4.4.7 IP Version 6 Protocol
4.4.8 IPV6 Network Addesses
r
ve
4.4.9 Intrenet Control Protocols
4.4.10 Internet Multicasting
4.5 Subnetting
4.5.1 Subnetting IP Networks
ni
e
5.2.7 Multiple Access Protocols
5.2.8 ALOHA
in
5.2.9 Collision Free Protocol
5.2.10 Wireless LAN Protocol
5.3 Physical Layer
nl
5.3.1 Ethernet Physical Layer
5.3.2 Ethernet MAC Sublayer Protocol
O
5.3.3 Ethernet Performance
5.3.4 Address Resolution Protocol
5.3.5 LAN Topologies
5.4 Data Link Layer Switiches
ty
5.4.1 Bridges
5.4.2 Routers and Switches
5.4.3 Gateways
si
5.4.4 Repeaters
5.4.5 Hubs
5.5
5.4.6 Virtual LAN
Network Expension and Security
r
ve
5.5.1 Creation and Grow of Network
5.5.2 Devices in a Small Network
5.5.3 Network Security
ni
Module - I
Notes
e
Structure:
in
1.1 Exporing Network
1.1.1 Introduction
nl
1.1.2 Network Evolution
1.1.3 Communicating in a Network-Centric World
O
1.1.4 The Network as a Platform
1.2 Types of Network
1.2.1 Converged Networks
ty
1.2.2 LANs, WANs,MAN and the Internet
1.2.3 Network Architectures and Network Expension
1.2.4 Types of Network Topologies
si
1.3 Network Operating System Configuration
1.3.1 Network Operating System and its type
1.3.2 Network Operating System Configuration
r
ve
1.3.3 Configuring a Network Operating System : IOS Bootcamp
1.3.4 Device configuration and access control
1.3.5 Address Schemes
ni
e
Objectivess
in
At the end of this unit, you will be able to:
nl
●● Differentiate between different types of computer networks
●● Understand the different application of networks
O
●● Compare the different network topologies
Introduction
A computer network is a collection of networked devices that can interact using a
ty
set of common protocols (called protocols). These devices interact in order to share
resources and services (such as files and printers).
si
Here’s an example of a network with two machines linked together:
r
ve
The two PCs in the above example are connected through a cable. This tiny
network may be used to send and receive data between these two PCs alone.
What if we wish to increase the size of our network? Then, to link more than two
ni
All of the devices on the network are now able to communicate with one another.
(c
In this unit, we’ll go through hubs and switches in further detail. For the time
being, just remember that these devices function as a hub to which all of the PCs are
connected.
1.1.1 Introduction
Notes
e
in
nl
O
ty
si
A network is a collection of computers, servers, mainframes, network devices,
peripherals, and other devices that are linked together to share data. The Internet, for
r
example, is a network that links millions of individuals all over the world. An example of
ve
a home network with many PCs and other network devices is shown to the right.
Examples:
1. Desktop computers, mainframes, laptops, and servers.
ni
2. Repeaters
3. Firewalls
U
between linked devices. On the graph, devices are represented as vertices, while their
relationships are represented as edges. It specifies how many connections each device
has, in what sequence they are connected, and in what hierarchy they are connected.
Bus topology, mesh topology, ring topology, star topology, tree topology, and hybrid
topology are examples of common network configurations.
(c
Notes
e
in
nl
O
ty
si
Public networks, which are frequently provided by adjacent companies and other
publicly accessible sites, are a simple method to connect to the Internet.
Some networks don’t require a password to login, but you must first log in using
your web browser before you can access the Internet.
ni
All public networks are insecure compared to your own network. The URLs you
U
visit can be eavesdropped even if the websites you visit utilise encryption. As a result,
if you can do it elsewhere, you should not send private or sensitive information over
a public Wi-Fi network. We highly advise you not to connect any of your devices to a
public network that does not need a password.
ity
Benefits of a Network
1. The benefits of a network outnumber the drawbacks. Many businesses nowadays
would not be able to function without the use of a network. The benefits of a network
m
that are connected to a network can be shared by all users. A few instances of
network hardware that can be shared are shown below.
4. NAS (network-attached storage) is a type of storage that can store and access large
Notes
e
volumes of data.
5. All network users can print to the same printer with a network printer.
in
6. Supercomputers, render farms, and more powerful computers can accomplish
complicated tasks that would take a single computer longer to complete.
7. Share software - Software may be shared with the right software licence.
nl
8. Money transfer - When a person or business is linked to a secure network, they
may digitally transfer money between banks and users. A network, for example, may
allow a corporation to handle employees’ payroll as well as send their salary to their
O
bank accounts.
ty
Although a network has numerous benefits (as indicated above), it also has certain
drawbacks. The downsides of a network are listed below.
Malware and Viruses - Networks make it simple for network members to share
si
information. Unfortunately, this also implies that viruses and malware may propagate
more easily over a network of computers.
Networks are complicated and setting up and operating one for a business or
organisation necessitates a great deal of experience or qualification.
ni
constantly changing. Innovators will utilise the Internet as a starting point for their efforts
in the next stage of human evolution, developing new goods and services that are
particularly built to take use of the network’s potential. Modelling exercises have been
added to the Networking Academy curriculum! They may be found at the start and end
m
of each chapter.
Globally Networked
)A
Today’s Networking
The usage of networks has become an everyday event for the majority of people.
The availability of these networks has changed how we communicate with one another.
Amity Directorate of Distance & Online Education
6 Network Basics
e
The urge to engage with people is second only to our need to survive among all
the needs for human existence. Our dependency on oxygen, water, food, and shelter is
in
virtually as crucial to us as communication.
Communication strategies change and evolve all the time. Whereas we used to be
confined to face-to-face encounters, technological advancements have vastly expanded
nl
our communication capabilities. Every new discovery has strengthened and expanded
our ability to interact and communicate with others, from cave art to the printing press to
radio and television. Technology in the Past and Present
O
Consider a world where the Internet does not exist. Google, Whatsapp, Instant
Messaging, YouTube, Facebook, Wikipedia, internet gaming, Netflix, iTunes, and rapid
access to current information are no longer available. There will be no more pricing
ty
comparison websites, no more buying online to avoid queues, and no more searching
for phone numbers and map instructions to numerous locations with the touch of a
mouse. What would our life be like if we didn’t have all of this? Just 15 to 20 years
ago, it was the world we lived in. Data networks, on the other hand, have progressively
si
expanded and been reused through time to improve the quality of life for people all
around the world.
r
During the course of a day, the resources accessible on the Internet can assist you.
ve
ni
U
ity
m
)A
The Internet of Objects (IoE) connects people, processes, data, and things to make
networked relationships more useful and meaningful. It transforms data into actions that
provide people, organisations, and governments greater skills, richer experiences, and
unparalleled economic opportunities.
(c
What do you believe we’ll be able to achieve with the network as a platform in the
future?
Amity Directorate of Distance & Online Education
Network Basics 7
e
The most significant change agents in the world today are advancements in
networking technology. They are assisting in the creation of a society in which national
in
boundaries, geographic distances, and physical limits are less significant and present
less and fewer barriers.
The way people engage socially, commercially, politically, and personally has
nl
altered as a result of the Internet. The instantaneous nature of Internet communication
supports the formation of worldwide communities. Global communities allow people
to communicate socially regardless of their location or time zone. The development of
O
online communities for the sharing of information and ideas has the potential to boost
productivity.
The influence of the Internet and networks on individuals and companies is the
ty
focus of the human network.
si
Networks and the Internet have altered every aspect of our lives, including how we
study, interact, work, and even play.
learning techniques.
Access to high-quality education is no longer limited to pupils who reside near the
location where it is provided. Distance learning through the internet has broken down
geographical borders and increased student opportunities. The delivery of online
(e-learning) courses across a network is now possible. These courses can include
m
data (text, links), speech, and video that students can access at any time and from any
location. Students can collaborate with the teacher, other students in the class, or even
students from other countries using online discussion groups and message boards.
)A
e
Networks break down geographical and time-zone barriers, allowing us to contact
with people all over the world.
in
The Way we Communicate is Changing
The Internet’s globalisation has ushered in new modes of communication that
nl
enable anyone to generate content that is accessible to a worldwide audience.
Instant Messaging (IM) and texting are two examples of communication methods.
Both instant messaging and texting allow two or more individuals to communicate in
O
real time. File transmission is a function that many instant messaging and texting apps
include. Additional capabilities, such as audio and video communication, can be added
to IM apps.
ty
Use of Social Media: People and groups utilise social media to produce and share
user-generated content with friends, family, peers, and the rest of the world.
si
that are shared. Individuals linked to a shared system can communicate with one
another regardless of their location or time zone, sometimes through real-time
interactive video. They can share text and graphics and collaborate on papers across
r
the network. Organizations can move rapidly to exchange information and achieve
goals when collaboration tools are constantly available. Persons in rural regions may
ve
participate on an equal footing with people in the heart of huge population centres,
thanks to the widespread diffusion of data networks.
Wikis are collaboratively edited and viewed web pages that may be edited and
seen by a group of individuals. A wiki is a communal production, but a blog is more
of an individual, personal journal. As a result, it may be subjected to more thorough
ity
Wikis, like blogs, may be built in phases and by anybody, without the support of
a large corporation. Wikipedia has grown into a comprehensive resource—an online
encyclopaedia—of subjects that have been contributed by the public. Individuals and
m
private groups can also create their own wikis to collect information on a certain topic.
Wikis are widely used as an internal collaboration tool in many firms. People from many
walks of life may engage in wikis and contribute their own opinions and information to a
)A
people may download it and listen to it on their PCs, laptops, or other mobile devices.
P2P file sharing has grown in popularity as media files, such as music and video
Notes
e
files, have been more widely digitised. Not everyone is a fan of peer-to-peer (P2P) file
sharing. Many people are worried about breaking copyrighted content restrictions.
in
What additional websites or technologies do you use to express yourself?
nl
Regardless of the employee’s geographic location, networks enable rapid,
dependable access to corporate resources.
O
The Way We Work is Changing
Data networks were first used by corporations to record and handle financial
information, consumer information, and employee payroll systems on an internal level.
ty
Peer-to-peer (P2P) file sharing allows users to exchange files without needing to
store and download them from a central server. The user just instals the P2P software
and joins the P2P network. This allows the user to find and exchange files with other
P2P network users.
si
Email, video, messaging, and phone are just a few of the information services that
may be transmitted through these corporate networks.
r
The acceptance of using networks to deliver efficient and cost-effective staff
ve
training is growing. Online learning alternatives may reduce time-consuming and
expensive travel while yet ensuring that all staff are fully prepared to do their duties
safely and efficiently.
ni
1. An Overview
We’ve arrived at a key juncture in the application of technology to expand and
empower our human network. The Internet’s globalisation has happened quicker than
ity
anybody could have predicted. To stay up with the expansion of this global network,
the way people connect socially, commercially, politically, and personally is constantly
changing.
Innovators will utilise the Internet as a starting point for their efforts in the next
m
stage of human evolution, developing new goods and services that are particularly built
to take use of the network’s potential.
The capabilities of the linked networks that make up the Internet will play an
)A
increasingly important role in the success of these initiatives as developers push the
boundaries of what is feasible.
This chapter introduces the data network platform on which our social and
professional connections are becoming more reliant. The content gives the foundation
(c
for learning about the services, technologies, and difficulties that network professionals
face while designing, building, and maintaining modern networks.
This chapter will teach you how to: - Explain how networks affect our daily lives.
Notes
e
- Explain the importance of data networking in the human network.
- Recognize the essential components of any data network.
in
- Recognize the benefits and drawbacks that converged networks present.
- Describe the following network design characteristics: fault tolerance, scalability,
nl
quality of service, and security.
- Set up and utilise IRC clients as well as a Wikiserver.
O
Network Advancing Our Way of Life
The urge to engage with others rates only behind our need to survive among all of
the requirements for human existence. We rely on communication almost as much as
we rely on air, water, food, and shelter.
ty
We employ a variety of strategies to convey ideas and information, and these
methods are continually changing and evolving. Whereas the human network used to
si
be restricted to face-to-face interactions, technological advancements have continued
to expand the extent of our communications. Each new advancement, from the
printing press to television, has increased and enriched human communication. The
establishment and connectivity of resilient data networks, as with every improvement in
communication technology. r
ve
Early data networks were only capable of transmitting character-based data
between linked computers. Voice, video streams, text, and graphics are all carried
across current networks between a variety of devices. Separate and different channels
of communication have merged onto a single platform. This platform gives users access
ni
to a variety of new and alternative communication ways that allow them to communicate
with one another nearly instantly.
U
Global Community
Notes
e
Technology is possibly the most important change agent in the world today, as it
aids in the creation of a society in which national borders, geographic distances, and
in
physical restrictions become less relevant and present ever-diminishing barriers. The
establishment of online communities for the sharing of ideas and information has
the potential to boost global productivity. As the Internet links people and allows for
nl
unrestricted communication, it provides a platform for running businesses, responding
to emergencies, informing individuals, and advancing education, research, and
governance.
O
Data Network Provides Service
It’s amazing how fast the Internet has become a part of our daily lives. The millions
of users who make the network a cherished and intimate part of their life are unaware of
ty
the network’s complicated integration of technological gadgets and media.
Data networks, which were originally used to carry information from one company
to another, have been repurposed to improve people’s quality of life all around the
si
world. During the course of a day, the Internet’s resources can assist you with:
r
Find the least crowded route to your location by combining weather and traffic
footage from the webcam.
ve
Check your bank account balance and pay bills online.
At a lunchtime Internet café, you may send and receive e-mail or make an Internet
phone call.
ni
Obtain health and nutritional advice from specialists across the world, and then
post to a forum to share related health or treatment information.
U
Post and share your photos, videos, and experiences with your friends and the rest
of the world.
ity
Many Internet applications would have been unthinkable just a few years ago.
Consider one person’s experience with self-publishing a home music video:
The Internet’s emergence and widespread usage have brought in new modes
of communication that enable anyone to generate content that is accessible to a
worldwide audience.
)A
Internet Relay Chat (IRC) systems, now includes file transmission, audio, and video
communication. IM delivers a written record of the exchange, similar to e-mail. IM
communications, on the other hand, are received promptly, although e-mail messages
Amity Directorate of Distance & Online Education
12 Network Basics
are occasionally delayed. Real-time communication is the term for the method of
Notes
e
communication used by Instant Messaging.
Weblogs (Blogs)
in
Weblogs (Blogs) are easy-to-update and-edit web sites. Unlike commercial
websites, which are designed by experienced communications specialists, blogs
allow anybody with no technical expertise of web design to convey their opinions to
nl
a worldwide audience. There are blogs on practically every topic imaginable, and
communities typically emerge around well-known bloggers.
O
Wikis
Wikis are collaboratively edited and viewed web pages that may be edited and
seen by a group of individuals. A wiki is a communal production, but a blog is more
ty
of an individual, personal journal. As a result, it may be subjected to a more thorough
review and editing process. Wikis, like blogs, may be built in phases and by anybody,
without the support of a large corporation. Wikipedia, a public wiki, is growing into a
comprehensive resource - an online encyclopaedia - of user-contributed subjects.
si
Individuals and private groups can also create their own wikis to collect information on
a certain topic. Wikis are widely used as an internal collaboration tool in many firms.
People from many walks of life may engage in wikis and contribute their own opinions
r
and information to a shared resource thanks to the worldwide Internet.
ve
Podcasting
Podcasting is an audio-based media that first allowed individuals to record audio
and convert it for use with iPods, Apple’s tiny, portable music player. It’s not new
ni
to be able to record audio and store it to a computer file. Podcasting, on the other
hand, allows users to broadcast their recordings to a large audience. The audio file is
uploaded to a website (or a blog or a wiki) so that others may download it and listen to it
U
Collaboration Software
Collaboration technologies allow users to collaborate on materials that are shared.
ity
Individuals linked to a shared system can communicate with one another, share text
and graphics, and collaborate on projects without regard to their physical location or
time zone. Organizations can move rapidly to exchange information and achieve
goals when collaboration tools are constantly available. Persons in rural regions may
m
participate on an equal footing with people in the heart of huge population centres
because to the widespread diffusion of data networks.
content in a variety of media. Interactive tasks, evaluations, and feedback are all
included in the learning resources.
Online learning experiences, or e-learning, are courses that are offered via network
Notes
e
or Internet resources. The availability of e-learning courseware has greatly increased
the number of resources available to students. The textbook and the teacher are the
two primary sources of knowledge from which the student can receive information in
in
traditional learning techniques. Both in terms of presenting structure and timing, these
two sources are restricted. Online classes, on the other hand, can include speech, data,
and video and are accessible to students at any time and from any location. In order to
nl
improve their learning experience, students can follow links to various sources and topic
specialists.
Students can collaborate with the teacher, other students in the class, or even
O
students from around the world using online discussion groups and message boards.
Blended courses mix instructor-led classrooms and online courseware to give students
the best of both worlds.
ty
Access to high-quality education is no longer limited to pupils who reside near
the location where it is provided. Distance learning through the internet has broken
down geographical borders and increased student opportunities. Students can use
si
online resources including e-mail, bulletin/discussion boards, chat rooms, and instant
messaging to engage with the teacher and other students. Outside of the courseware,
links allow access to learning resources. Blended e-learning combines the advantages
r
of computer-based training with those of instructor-led instruction. Students may study
at their own speed and ability level while still having access to an instructor and other
ve
live resources while working online.
consumer information, and employee payroll systems internally at first. Many other
forms of information services, such as e-mail, video, messaging, and telephone, have
been sent through these commercial networks.
U
Intranets, or private networks used by a single firm, allow employees and branch
sites throughout the world to interact and trade. Extranets, or extended internetworks,
are created by businesses to give suppliers, vendors, and consumers restricted access
ity
to corporate data in order to verify order status, inventories, and component lists.
the capacity to enjoy and share a variety of recreational activities regardless of location.
It is now feasible to interactively explore areas that we could only dream of seeing in the
past, as well as preview actual destinations before taking a journey. Details and images
from these trips may be shared with the public on the internet.
)A
Communication
Notes
e
In our daily lives, communication takes numerous forms and occurs in a variety of
settings. Whether we’re conversing on the internet or taking part in a job interview, we
in
have distinct expectations. Expected actions and styles vary depending on the scenario.
nl
We set rules or agreements to govern the discourse before we start talking to one
other. In order for the message to be delivered and interpreted correctly, certain rules,
or protocols, must be followed. The following are some of the protocols that govern
O
effective human communication:
ty
photograph)
- Usual grammatical and lexical constructs
- Timeliness and speed of delivery
si
- Requirements for confirmation or acknowledgement
The rules of communication might change depending on the situation. A
r
confirmation that a communication has been received and comprehended is required if
it provides a significant information or notion. Less significant communications may not
ve
necessitate the recipient’s acknowledgment.
These basics are shared by network communications methods and human talks.
Some norms can be assumed since many of our human communication protocols
ni
are implicit or engrained in our cultures. It is vital to be considerably more precise about
how communication takes place and how it is evaluated effective while constructing
data networks.
U
2. Communication Effectiveness
When the meaning of the message recognised by the recipient matches the
ity
communication.
- The number of other messages being sent over the same communication network
Notes
e
at the same time.
- The amount of time set aside for effective communication.
in
Internal Constraints
Internal variables that obstruct network communication have to do with the
nl
message’s content. The intricacy and relevance of different sorts of communications
may differ. Complex communications are frequently more difficult to comprehend than
clear and succinct statements. Important communications require extra attention to
ensure that they are delivered and comprehended.
O
Internal elements impacting network communication success include: - the
message’s size; - the message’s complexity; - the message’s significance.
ty
At various places in the network, large communications may be stopped or
delayed.
si
The network has evolved into a platform for reliably, efficiently, and securely
delivering a wide range of services to end users.
television networks. Previously, each of these services required its own specialised
network, complete with separate communication routes and technology to transmit a
specific communication signal. To guarantee good communication, each service has its
own set of norms and standards.
U
Take, for example, a major school in the early 1990s. Classrooms were wired
for the public address system, the telephone system, a video network for televisions,
a data network, and maybe a security network back then. As seen in Figure, these
ity
different networks were dissimilar, which meant they couldn’t interact with one another.
to a variety of devices through the same communication channel and network topology,
as indicated in the diagram.
)A
(c
Notes
e
in
nl
O
ty
Figure: Converged network diagram
r si
ve
ni
U
ity
m
This platform gives users access to a variety of new and alternative communication
ways that allow them to communicate with one another nearly instantly.
There are still multiple points of contact and specialised devices in a converged
network, such as personal computers, phones, TVs, and tablet computers, but there is
(c
a single network architecture. The same set of rules, agreements, and implementation
standards apply to this network architecture.
Future-oriented Planning
Notes
e
As illustrated in Figure, the initial phase in constructing the intelligent information
network is the convergence of various types of communications networks into a single
in
platform. This is the stage of network evolution that we are now at. The next step will
be to combine not just the many types of communications into a single network, but
also the programmes that create, transmit, and protect the messages onto integrated
nl
network devices.
Not only will voice and video be sent over the same network, but the machines that
handle telephone switching and video broadcasting will also route messages over the
O
network.
ty
r si
ve
ni
U
The speed with which fascinating new convergent network applications are being
ity
developed can be linked to the Internet’s fast growth and expansion. With just around
10 billion of the 1.5 trillion items on the planet already linked, the IoE has enormous
potential to connect the disconnected. This growth has resulted in a larger audience for
every message, product, or service that may be provided.
m
The underlying mechanisms and procedures that underlie this rapid expansion
have resulted in a network architecture that is both adaptable and expandable.
As networks evolve, we’re learning that the underlying architectures must handle
Notes
e
four key features, as depicted, in order to fulfil user expectations: a. Fault tolerance, b.
Scalability, c. Quality of service (QoS) and d. Security
in
nl
O
ty
r si
ve
ni
to it at all times. This necessitates the use of a fault-tolerant network design. A fault-
tolerant network minimises the impact of a breakdown by affecting the fewest number
of devices possible. It’s also designed to allow for speedy recovery in the event of a
failure. Multiple pathways between the source and destination of a message are
)A
receiving the call were determined using this method (the destination). For the length
Notes
e
of the phone conversation, a temporary route, or circuit, was constructed. The call was
dropped if any connection or device in the circuit failed. To reconnect, a fresh call with a
new circuit has to be established. This is referred to as a circuit-switched process, and it
in
is demonstrated.
nl
O
ty
r si
ve
Figure: Circuit switching network
Existing circuit connections are prioritised above new circuit requests in many
ni
many circuits that can be formed, you can get a warning saying that all circuits are busy
and that you can’t make a call.
Circuit-switched technology was not ideal for the Internet because of the cost of
ity
creating numerous other channels with adequate capacity to sustain a high number
of simultaneous circuits, as well as the technologies required to dynamically re-create
dropped circuits in the case of a failure.
technology.
(c
Notes
e
in
nl
O
ty
si
Figure: Packet-Switched Network
r
Networks with Packet Switching
ve
Early Internet designers looked into packet-switched networks in their pursuit
for a more fault-tolerant network. A single message can be split down into numerous
message blocks in this network, with each message block including addressing
information to indicate the originating location and eventual destination. These message
ni
chunks, known as packets, may be transmitted via the network using this embedded
information and reassembled into the original message when they arrive at their
destination, as shown.
U
The content of individual packets is usually unknown to the devices inside the
network. Only the end destination’s address is revealed. IP addresses, which may be
rendered in dotted-decimal notation, such as 10.10.10.10, are commonly used to refer
to these addresses. Each packet is sent from one site to another separately. A routing
ity
choice is taken at each point as to which path should be used to forward the packet
to its eventual destination. This would be the equivalent of sending 10 postcards to a
buddy with a long message. The recipient’s address is printed on each postcard.
The routing function can dynamically determine the next best accessible path if a
m
previously utilised path is no longer available. The few packets that may be lost can be
retransmitted to the destination over an alternative path since the messages are sent in
fragments rather than as a single complete transmission. In many circumstances, the
)A
target device is completely ignorant that there has been a failure or rerouting. If one of
the postcards is lost along the route, only that postcard has to be delivered again, using
our postcard example.
circuit from end to end. Any part of a message can be sent over the network using any
accessible path. Packets carrying fragments of messages from many sources can also
transit the network at the same time. The Internet has become a fault-tolerant mode
e
having to intervene. In our mail example, our postcard will share transportation with
other postcards, mails, and packages as it goes through the postal system. One of the
postcards, for example, may be placed on an aeroplane alongside a variety of other
in
packages.
Despite the fact that packet-switched connectionless networks are the fundamental
nl
foundation for today’s Internet, a connection-oriented system such as the circuit-
switched telephone system has certain advantages. The quality and consistency
of messages conveyed over a connection-oriented network can be assured since
resources at multiple switching sites are allocated to supplying a restricted number of
O
circuits. Another advantage is that the service provider can charge network users for the
amount of time the connection is operational. A core concept of the telecommunications
service sector is the ability to charge consumers for active network connections.
ty
Networks that are scalable
A network must not only be fault resistant, but also expand to accommodate
additional users and services.
si
Scalability
r
Every week, thousands of new consumers and service providers join the Internet.
The Internet must be scalable in order to accommodate such fast expansion. A scalable
ve
network can swiftly grow to handle additional users and applications while maintaining
the performance of the service currently being supplied to existing users. The Internet’s
structure is seen in Figure.
ni
U
ity
m
)A
(c
Figure: Scalability
Amity Directorate of Distance & Online Education
22 Network Basics
The fact that the Internet can expand at its current rate without severely affecting
Notes
e
individual user performance is due to the architecture of the protocols and underlying
technology on which it is based. For addressing, naming, and connecting services,
the Internet has a hierarchical layered structure. As a result, network traffic meant
in
for local or regional services no longer has to pass via a central distribution point.
Common services can be copied across regions, diverting traffic away from higher-level
backbone networks.
nl
Although very scalable, the existing Internet infrastructure may not always be
able to keep up with the rate of user demand. To keep up with the growing number of
Internet applications and services, new protocols and addressing structures are being
O
developed.
ty
As more Internet applications and services are introduced, it becomes clear
that a system is needed to handle the many types of traffic that converged networks
experience.
si
Quality of Service
Quality of service (QoS) is becoming increasingly important in today’s networks.
r
New applications accessible to users through internetworks, such as phone and live
video broadcasts (as illustrated in Figure), raise consumer expectations for service
ve
quality. Have you ever attempted to view a video with many stops and breaks?
Networks must deliver services that are predictable, quantifiable, and, in certain
cases, guaranteed. The packet-switched network design does not ensure that all
ni
packets that make up a message will arrive on time, in the right order, or even at all.
U
ity
m
)A
(c
Networks also require techniques to deal with overburdened traffic. The data-
Notes
e
carrying capability of a network is measured by its bandwidth. To put it another way,
how much data can be delivered in a given length of time? The amount of bits that can
be sent in a single second, or bits per second, is the unit of measurement for network
in
bandwidth (bps). When several communications are attempted across the network at
the same time, the demand for network capacity may exceed the available bandwidth,
resulting in network congestion. The network simply has more data to send than the
nl
communication channel’s bandwidth can handle.
When the amount of packets is larger than the network’s capacity to carry them,
devices queue, or hold, the packets in memory until resources become available to
O
send them. As new packets cannot be transferred before previous packets have been
processed, queuing packets creates delays. The memory queues will fill up and packets
will be discarded if the number of packets queued continues to grow.
ty
The secret to a successful end-to-end application quality solution is achieving the
needed QoS by regulating the latency and packet loss parameters on a network. This
may be performed in a number of ways, one of which is categorization. As illustrated
si
in Figure, we employ a mix of communication parameters and the relative significance
provided to the application to construct QoS classifications of data. We then apply the
same criteria to all data within the same categorization. Time-sensitive communication,
r
such as voice transmissions, is categorised differently from communication that can
withstand delays, such as file transfers.
ve
ni
U
ity
m
)A
Figure: QoS
3. Increase the priority of production control or business transaction data for the
Notes
e
organisation.
4. Unwanted communication: Reduce the importance of unwanted communication,
in
such as peer-to-peer file sharing or live entertainment.
nl
As more users and services join the network, it becomes increasingly vital to take
steps to guarantee that information access is tightly regulated.
Security
O
The Internet has progressed from a closely restricted network of educational and
government institutions to a broadly accessible medium for commercial and personal
communication. As a result, the network’s security needs have altered. Network
ty
infrastructure, services, and data on network-attached devices are important personal
and company assets. Compromise of these assets’ integrity might have catastrophic
implications, such as
si
1. Network disruptions that prohibit conversations and transactions from taking place,
resulting in lost revenue.
2. Theft and utilisation of intellectual property (research ideas, patents, or inventions)
by a rival r
ve
3. Without the users’ agreement, personal or private information is hacked or made
public.
4. Loss of personal or business cash due to misdirection
ni
There are three major prerequisites for achieving network security goals, as
depicted in Figure:
(c
Keeping things private: Data confidentiality means that data may only be accessed
and read by the intended and authorised recipients—individuals, processes, or devices.
This is achieved by implementing a robust user authentication system, requiring users to
Amity Directorate of Distance & Online Education
Network Basics 25
e
also includes encrypting data so that only the intended receiver may read it.
in
that data has not been tampered with during transmission from source to destination.
nl
measures to ensure that the packet has not altered during transmission.
O
and server antivirus software, can help assure system stability and the capacity to detect,
repel, and respond to such threats. These dangers can be mitigated by constructing
completely redundant network infrastructures with minimal single points of failure.
ty
r si
ve
ni
U
resources.
4. In a network modification or up gradation of the software or data is done at a
_________only.
5. The computer that communicates with each other are called_________.
(c
e
1. Nodes and servers have the same function.
2. Wi-Fi stands for wireless fidelity.
in
3. Network cards are used to physically attach a computer to a network.
4. WAN stands for Wide Ares networks.
nl
5. In Client Server network, there is no central server.
6. Extranet refers to a computer network restricted to an organization.
O
Summary
●● A computer network is made up of two or more autonomous computers that are
linked (connected) together in order to: (files, printers, modems, fax machines).
ty
◌◌ Distribute application software such as Microsoft Office.
◌◌ Make electronic communication possible.
◌◌ Boost productivity
si
●● Computers on a network may be connected by cables, telephone lines, radio
waves, satellites, and other means.
●● r
A computer network contains the network operating system in the client and server
machines, the cables that connect the computers, and any supporting hardware
ve
devices.
●● Computer networks are often classed as follows based on their structure and
location:
ni
◌◌ Local Area Network (LAN): A LAN is a network that spans a relatively limited
area, such as a single building or school.
◌◌ Metropolitan Area Network (MAN): A MAN is a sort of computer network that is
U
●● The following additional criteria are also used to classify distinct types of networks:
◌◌ Topology: The graphical layout of computer systems in a network is known as
topology. A bus, star, ring, and mesh are examples of common topologies.
◌◌ Protocol: A protocol is a collection of rules that computers on a network use
m
Activity
1. Prepare an illustrative PowerPoint Presentation for Network-Centric World.
(c
2. Talk to a friend working in IT sector. Gather the problems he encounters in his Network.
e
1. Explain the difference between Client/Server and Peer-to-peer architecture.
2. Write briefly about the areas where networks are used?
in
3. Differentiate between Broadcast and point-to-point networks.
4. List the important aspects that should be kept in mind while designing a network?
nl
Glossary
●● PPP: Point-to-Point connection is a protocol which is used as a communication
O
link between two devices.
●● LAN: Local Area Network is designed for small areas such as an office, group of
building or a factory.
ty
●● WAN: Wide Area Network is used for the network that covers large distance such
as cover states of a country
●● MAN: Metropolitan Area Network uses the similar technology as LAN. It is
si
designed to extend over the entire city.
Further Readings:
1. r
Computer Networks, Andrew S. Tenenbaum, PHI, New Delhi.
ve
2. Data and Computer Communication, William Stalling, PHI, New Delhi.
1. PAN
2. Communication
U
3. Data
4. Single Point
5. Node
ity
6. Wireless Networking
7. LAN and MAN
1. False
2. True
)A
3. True
4. True
5. False
6. False
(c
e
Objectivess
in
In this unit, you will be able to study:
nl
●● Distinguish between different types of networks, and
●● Understand what is OSI model and TCP reference model and functions of each
layer.
O
Introduction
A computer network is a collection of two or more networked computer systems
ty
that share resources and files via common connection protocols. A computer network
connection can be established using either cable or wireless media. Hardware and
software are used to link computers and tools in any network.
si
A computer network, also known as a data network, is a telecommunications
network that allows computers to exchange data. Data communications refers to the
transmission of digital data between two or more computers, and a computer network,
r
also known as a data network, is a telecommunications network that allows computers
ve
to exchange data. Cable or wireless media is used to make a physical link between
networked computing devices. The Internet is the most well-known computer network.
ni
U
ity
m
A computer network was designed to transmit solely data traffic in the early days of
networking. With the invention of VOIP (Voice-Over-IP) technology, computer networks
had to be constructed to transport voice traffic as well. A Converged network is one that
transports both data and voice traffic over a single network fabric.
Computer networks have existed for decades, connecting computers, servers, and
(c
printers to increase the efficiency and effectiveness of enterprises. If you need to print
a huge document, you must first log into the network and select the location where your
e
A convergent network is the next step in computer networking, allowing users
to share not just data but also speech and video through the Internet protocol (IP). A
in
converged network can be thought of as a “super network.” A converged network
is utilised instead of traditional phone lines, lowering or eliminating long-distance
expenditures, which is a significant benefit to any firm.
nl
Prerequisites
Broadband
O
As converged network transfers a lot of data, a big broadband connection is
required to manage a high volume of transactions. You don’t want to be in a position
where a video can’t be shown at a meeting because there are too many individuals
utilising voice/phone services.
ty
Tools
Businesses must invest in software and technology that can manage not just the
si
convergent network needs, but also control and maintain proper data flow using tools
like QoS (Quality of Service) systems. You want to receive the tools that will assist
your IT personnel in quickly diagnosing and resolving network issues. These systems
r
may be constructed using “html” since the network employs Internet protocol, reducing
ve
training time.
Architecture
If your organisation lacks an expert, you should employ an IT consulting firm with
ni
the skills and knowledge to execute the job effectively, including developing a long-term
architecture for your company.
A converged network is a data network that may be utilised by both IT and non-IT
devices.
ity
It’s a good idea to invest in a converged network architecture that provides for
)A
A converged network is a data network that may be used by IT and non-IT devices
simultaneously.
These devices are separated from one another via software. Many systems use
(c
the same data cabling but utilise different network switches in a converged network.
system), or simply a convergent network are all terms used to describe a building
Notes
e
services data network.
Data cabling, data outlets, patch leads, and a network switch are used to connect
in
a device to a network. The network switch may deliver power to a device in addition to
transferring bits of data, eliminating the requirement for an electrical outlet. There are a
variety of ways to provide power over data cable, but one of the most frequent is termed
nl
Power over Ethernet (PoE).
Building services devices are increasingly not only IP devices, but also IP devices
that employ PoE. The following are some examples of these devices:
O
1. Clocks
2. Intercoms
3. Solenoid valves for lighting
ty
4. Cameras that record
5. Controllers for door locks
si
6. Telephones
7. Readers for electronic point of sale
8. r
Boxes with variable air volume controls
ve
9. Access points for Wi-Fi
Contractors have discovered that as more and more building services equipment
become IP devices, they must now offer a data network for their systems.
ni
Each building service can have its own network, and this is what happens on many
projects. The building control system has its own network, which the controls contractor
instals, commissions, and maintains. The security contractor is in charge of the security
network. The electrical contractor is in charge of the energy monitoring and metering
U
network. The elevator firm is in charge of the elevator control and management
network, and so on.
However, there are several disadvantages to this strategy. There may be overlap or
ity
4. It’s possible that hubs will be utilised instead of network switches, which might have
an impact on data delivery.
5. Multiple networks in the building may utilise the same addressing system, generating
confusion.
(c
The industry was able to handle both data and voice traffic on the same network
devices as network gear improved in performance and capability (routers, switches,
etc). This is known as a Converged Network, which is a single network fabric capable of
Notes
e
carrying both voice and data traffic:
in
nl
O
ty
si
Figure: Converged network
r
To graphically show the distinct IP networks, it employs two separate switches and
ve
two router interfaces for Data and Voice traffic. However, using VLANs, the same result
may be achieved with just one switch and one router interface:
The following are some of the reasons why a converged network is superior to
multiple separate networks:
U
1. A converged network saves money on capital costs since it uses a single infrastructure
rather than many infrastructures.
2. As just a single network needs to be maintained, operational costs are minimised
because only one contractor can be hired.
ity
6. It’s possible that the data cabling installation doesn’t follow best practises or meet
industry standards.
7. The network switches can be deployed regardless of ventilation, upgradeability, or
power quality protection.
(c
e
Computers may connect and interact with one another across any media via
the network. The three basic types of networks are LAN, MAN, and WAN, which are
in
intended to function over a certain region. There are some parallels and differences
between them. One of the most significant distinctions is the geographical region they
cover, with LAN covering the smallest, MAN covering a bigger area than LAN, and WAN
covering the biggest of all.
nl
There are numerous additional kinds of computer networks, such as:
O
2. SAN (Storage Area Network)
3. VPN (Virtual Private Network)
4. EPN (Enterprise Private Network)
ty
To enable a network to supply services and resources, several distinct components
are necessary. These numerous components work together to guarantee that resources
are distributed to people who need them in a timely way.
si
1. LAN
The LAN acronym stands for ‘Local Area Network.’ It links the computers by
r
spanning the local region within 10m to 1.5 km, as the name implies. LAN is found in
local sites such as workplaces, colleges, schools, groupings of buildings, and corporate
ve
organisations since it spans a limited local region.
One individual or a small organisation manages and uses this network. By linking
devices such as printers, scanners, projectors, and other storage components, this
network is utilised for resource sharing, data storage, and document printing.
ni
TCP/IP is the most prevalent protocol that is used in this network (LAN, WAN, and
MAN). The LAN is commonly connected by Ethernet cables and Wi-Fi, as well as Token
Ring and Fiber Distributed Data Interface, or FDDI.
U
Sharing your internet connection with someone else is also an example of LAN
sharing. Only two computers are required to form the smallest LAN.
LAN transmission rates range from 4Mbps to 16Mbps, with a maximum speed of
ity
100 Mbps. We may use any form of network topology that matches the needs of the
network, such as a bus or ring topology, to connect the hosts in a LAN.
m
)A
(c
Figure: LAN
We can connect up to 1000 PCs to a LAN. Wire connections are utilised in the
Notes
e
majority of LANs. However, it is currently also utilised without a cable, in wireless
communications. The high speed, cheap costs, and security of this network are all
pluses.
in
LAN Features
1. LAN Network Capacity: A LAN’s network capacity is restricted to a single room and
nl
small geographical regions such as residences, small businesses, and offices.
2. The LAN offers the benefit of fast data transfer speeds.
O
3. As backup files are kept on a server, file transmission and recovery are easier to
manage in a LAN network.
4. It has no link to the outside world, ensuring privacy.
ty
5. The LAN network is a privately owned network that is not controlled by any
government agencies.
6. The network stretches from 1 metre to 1.5 kilometre.
si
Advantages of LAN
LAN Resource Sharing Benefits: Unlimited data sharing between PCs and printers
through Wi-Fi or ethernet cable; this saves money. r
ve
Sharing Software Applications: Using the same software over the network rather
than purchasing separately licenced software saves money for each customer.
can be avoided.
Internet Sharing: A local area network (LAN) allows all users connected to the
ity
LANs are commonly used as a local network for exchanging data at home as well
as on-campus at colleges and schools. In the same way, LAN is utilised as an intranet
for businesses via wifi.
m
Disadvantages of LAN
Although LANs save money in the long run by pooling computer resources, the
)A
Software installation, wire configuration, wifi router hardware issues, and cable
malfunctions all demand the services of a LAN administrator.
Server Load: If the server isn’t up to par, it won’t be able to handle a large number
(c
Hackers can get access to the system, putting the system at danger of
Notes
e
vulnerability. Viruses and malware, on the other hand, can infiltrate a LAN and do harm
to everyone connected.
in
Covers a Small Area: A local area network (LAN) only covers a small area, such as
a house, an office, a building, or a group of surrounding buildings.
nl
2. The Man
The MAN acronym stands for ‘Metropolitan Area Network.’ The WAN is a more
advanced form of the LAN network that is commonly used in cities and other areas to
O
send data at fast speeds over a distance of 5-60 km.
ty
Two or more local area networks are linked in this MAN network. The backbone
line, which is commonly built by optical fibre and twisted pair cables to enhance data
transmission speed, is referred to as that bridge.
si
This network connects the city’s most important colleges, schools, government
buildings, and corporate groups. As a result, we may define a MAN network as a
collection of LANs.
r
Cable TV in the heart of a city is the finest illustration of a MAN since its cable runs
ve
across the city and the user accesses the service through the cable network.
ni
U
ity
m
Figure: MAN
)A
A MAN is a person who works for a large corporation. It links to a separate branch
through this branch. When such networks are utilised on a college campus, it is referred
to as a CAN (campus area network).
single cable. In MAN, communication protocols like as RS-232, X-25, Frame Relay, and
ATM are commonly used.
e
1. MAN has a larger network reach than LAN but is smaller than WAN.
2. It has substantial geographical boundaries, such as a town or a city.
in
3. The pace of data transfer is modest.
4. It might be owned by public or private entities.
nl
5. The network stretches from 5 to 60 kilometres.
Advantages of MAN
O
1. MAN is utilised in a city’s many government agencies, police stations, and private
businesses. Officers and workers may easily interact with one another, as well as
across departments and branches, to swiftly send essential data and messages
through this network without the need for an Internet connection.
ty
2. As a result, it allows for resource sharing over a greater distance in the city than LAN
networks.
si
3. MAN uses fibre optic cable to deliver high-speed communication.
4. This allows WANs more access and provides a robust backbone for huge networks.
5. It serves a number of towns and cities, allowing for excellent interconnection across
wide regions at a reasonable cost. r
ve
6. The MAN’s dual bus allows data to be sent in both directions at the same time.
MAN’s Disadvantages
1. More cables are required by MAN to link connections from one location to another.
ni
2. The longer the cable, the higher the cost of creating the MAN will be.
3. Anyone may hack the network from such a long distance. As security cannot be
U
espionage.
3. WAN
WAN stands for ‘Wide Area Network.’ A wide area network (WAN) is used to link
computers that are not physically close to one another. It’s a grouping of multiple LANs
m
The geographical peripheral of a WAN network is more vast than that of a LAN,
WAN, or MAN network, such as a network of systems extending over a whole city,
)A
This network communicates in the same way as LANs and MANs do. The majority
of wide area networks (WANs) are public networks, such as phone lines and satellites,
telephone systems, or leased lines.
(c
In most WANs, fibre optic cable is employed as the transmission medium. This
network utilises the OSI Reference Model’s physical, data-link, and network layers.
Frame Relay, X-25, Integrated Services Digital Network, or ISDN, and Point-to-
Notes
e
Point Protocol, or PPP, are some of the most widely used WAN protocols today.
The Internet is an example of the world’s largest WAN. People can connect from
in
one location to other computers or users all over the world via the Internet. A public
broadcasting system is in charge of putting it into action.
nl
O
ty
r si
Figure: WAN
ve
WAN’s Characteristics Include:
1. It’s often utilised in mobile and landline phone apps for voice and data.
ni
2. This single network allows a big number of people to interact with one another.
3. Its data transfer speed varies from sluggish to extremely fast.
4. A WAN’s network range or coverage area is much larger, therefore we can get more
U
1. Long-distance firms and corporations can join on a single network since it spans a
vast geographic region.
2. Connected workstations can share software and resources.
3. Messages may be delivered extremely quickly to another user on the system; the
m
transmission rate is quite high even when sending huge files larger than 10 MB.
4. The data is available to everyone on the network. This eliminates the issue of some
users having older versions of information than others.
)A
7. WAN networks are used by airlines and railways to purchase tickets from anywhere
Notes
e
in the country. This is done because client nodes are spread across the country and
are connected to a single network via a centralised server.
in
WAN’s Disadvantages
1. To prevent anonymous hackers from compromising the data and disturbing the
network, a strong firewall is required.
nl
2. Setting up a network is costly, time-consuming, and difficult. The costlier a system is,
the more thorough it is.
O
3. The full-time maintenance of connections necessitates the appointment of technicians
and managers.
4. There is a need to invest a lot of money on security.
ty
Intranets, Extranets, and the Internet
Most people need to communicate with a resource on a network other than their
home, college, or organization’s local network. This is accomplished through the use of
si
the Internet.
The Internet
r
The Internet is a network of interconnected networks that spans the globe
ve
(internetworks or internet for short). Consider the Internet in terms of a network of
interconnected LANs and WANs.
ni
U
ity
m
)A
Some of the LAN instances are linked together through a wide area network
(c
(WAN). The WANs are then linked together. All of the many methods we link networks
are represented by the red WAN connection lines. Copper lines, fibre optic cables, and
wireless communications can all be used to link WANs (not shown).
Amity Directorate of Distance & Online Education
38 Network Basics
There is no one or group that owns the Internet. The adoption of consistent and
Notes
e
widely recognised technologies and standards, as well as the collaboration of numerous
network management organisations, are required to ensure successful communication
across this heterogeneous infrastructure.
in
Leased lines are reserved circuits in the service provider’s network that connect
geographically isolated workplaces for private voice and/or data networking. Typically,
nl
circuits are hired on a monthly or annual basis. They may be rather costly.
Ethernet WANs expand LAN access technology to the wide area network. In a
subsequent chapter, you’ll learn about Ethernet, which is a LAN technology. Ethernet’s
O
advantages are now being extended over the WAN.
ty
the same upload and download speeds.
Satellite - Satellite service, like small office and home office users, can provide a
connection when a wired connection is unavailable.
si
The type of connection available depends on your location and the service
provider’s availability.
r
1.2.3 Network Architectures and Network Expansion
ve
The physical and logical design of the software, hardware, protocols, and medium
for data transfer is referred to as computer network architecture. Simply, it refers to how
computers are arranged, and duties are assigned to them.
ni
The following are the two types of network architectures that are used:
1. Client/Server network
2. Peer-to-Peer network
U
ity
m
A peer-to-peer network is one in which all computers are connected and have the
same privileges and obligations for data processing.
Each computer is given special rights in order to share resources, however this
might cause issues if the computer with the resource is down.
Amity Directorate of Distance & Online Education
Network Basics 39
Notes
e
in
nl
O
ty
si
Benefits of a Peer-to-Peer Network: It is less expensive since it does not require a
dedicated server. r
ve
If one computer fails, the remaining computers will continue to function.
It’s simple to set up and maintain because each computer runs independently.
is no centralised system. As a result, it can’t back up the data because it’s different in
different places.
access resources such as music, videos, and other media from a central computer, or
server.
All other computers in the network are referred to as clients, while the central
controller is referred to as a server.
m
All key functions, such as security and network administration, are performed by a
server.
)A
A server connects all of the clients and allows them to interact with one another.
For example, if client 1 wishes to communicate some data to client 2, it must first obtain
permission from the server.
(c
To begin communication with client 2, the server delivers the answer to client 1.
Notes
e
in
nl
O
Client/Server Network Benefits:
The centralised system is housed in a Client/Server network. As a result, we can
ty
easily back up the data.
si
As a single server manages the shared resources in a Client/Server network,
security is improved.
r
It also improves the pace with which resources are shared.
ve
Client/Server Network Disadvantages: Client/Server networks are expensive since
they require a server with a lot of memory.
Network Expansion
ni
New Trends
When you consider how the Internet has impacted so many aspects of people’s
lives, it’s hard to think that it’s only been around for approximately 20 years for
U
most people. It has completely changed the way people and businesses interact.
Organizations and small businesses, for example, depended heavily on print marketing
to make consumers aware of their products before the Internet became so readily
ity
Most businesses have a website where clients may learn more about their
m
products, read customer reviews, and place orders straight from the internet.
Businesses and social networking sites collaborate to promote products and services.
Bloggers collaborate with companies to promote and support products and services.
The majority of this product placement is aimed at potential customers rather than the
)A
general public.
e
Collaboration through the internet
in
Cloud computing is a type of computing that uses the
These trends are intertwined and will continue to feed off one another in the years
nl
ahead. These tendencies will be discussed in further depth in the following sections.
However, keep in mind that new trends are created and designed every day. What
do you imagine the Internet will look like in ten years? How about 20 years?
O
BYOD (Bring Your Own Device)
The notion of connecting any device to any material in any form is a big global
ty
trend that is requiring considerable changes in how devices are utilised in commercial
IT systems. Bring Your Own Device (BYOD) is the term for this movement (BYOD).
si
employee who needed access to the business network. These gadgets were usually
pricey and regarded as work equipment. Employees should expect to have access
to some of the most modern technologies for personal usage as consumer gadgets
become more affordable. r
ve
Laptops, netbooks, tablets, cellphones, and e-readers are examples of personal
tools. BYOD refers to the flexibility that end users have to use their own devices to
access information and communicate over the corporate network. These can be
employer-purchased gadgets, employee-purchased devices, or a combination of
ni
the two. BYOD refers to any device, regardless of ownership, that is used anywhere.
Employees benefit from more flexibility and productivity as a result of enhanced
connectivity to the business network via mobile and remote access.
U
BYOD is a powerful trend that has or will have an impact on every IT business.
When setting up a BYOD environment, there are a lot of things to think about.
features like integrated phone, video, instant messaging, conferencing, and application
sharing.
and applications must be able to provide quality of service. Any solution must take into
account not just the person who is using their own device, but also the people and apps
with whom they are interacting.
In a BYOD context, security is a crucial factor, thus any solution must be a highly
Notes
e
secure mobile solution. Mobile and remote-access devices are rarely subjected to the
same level of inspection and supervision as company-provided desktop and laptop
PCs.
in
As a result, when employees connect with these devices, suitable security and
user controls must be implemented to secure business data. The scope of those
nl
regulations may differ depending on the level of BYOD access desired by an enterprise.
O
agreements must be included in each of these deployments, outlining the usage of
personal devices on business networks, regulations for how and what such devices can
access, and procedures for dealing with lost or stolen devices.
ty
Online Collaboration
Considerations
One of humanity’s greatest achievements has been the capacity to work together
si
to tackle a common challenge. When we all work together, great things can happen.
However, putting a collaborative plan in place is not always simple, and there might be
several obstacles to overcome.
r
End users have high expectations for application performance to be consistent
ve
across time, place, and device. Users also expect collaboration capabilities regardless
of service provider, which means they want such capabilities whether they’re using
collaboration tools on a corporate-managed network or connecting via their mobile
device.
ni
control the performance of collaboration tools. Finally, to guarantee that business data
stays safe, a firm must examine security needs for collaboration and develop proper-
use regulations.
ity
Video Communication
m
The usage of video is another networking trend that is crucial in the communication
and cooperation endeavour. Video conferencing and person-to-person video calling
are already proving to be extremely effective for sales operations and conducting
)A
business remotely, both locally and worldwide. Businesses are now adopting video to
revolutionise essential business operations in order to gain a competitive edge, save
costs, and minimise environmental impact, especially by eliminating the need for travel.
The trend of video in communication is seen in the graph.
(c
Notes
e
in
nl
O
ty
Figure: The trend of video in communication
si
This shift is being driven by both consumers and corporations. As firms expand
across geographical and cultural borders, video is becoming a critical prerequisite for
r
efficient cooperation. Video viewers today expect to be able to watch any material, on
any device, at any time.
ve
Businesses are beginning to see the value of video in enhancing the human
network. The proliferation of media, as well as the various applications for which
it is being placed, is pushing the need to include audio and video into a variety of
ni
communication formats. The audio conference and the video conference will coexist.
Desktop video will be integrated into collaboration solutions meant to connect remote
staff, bringing teams closer together.
U
Cloud Computing
The utilisation of computer resources (hardware and software) offered as a service
through a network is known as cloud computing. A firm pays a service charge to the
ity
cloud provider in exchange for using the cloud’s hardware and software.
must communicate with the cloud using software, such as a web browser, and the
cloud’s network will handle the rest.
and keep data is cloud computing. Cloud computing is a method of reducing expenses
and improving corporate operations by utilising cloud-based services. Cloud computing
refers to any subscription-based or pay-per-use service delivered in real time via the
Internet that expands IT capabilities without needing additional infrastructure, people
training, or software licence. These services are on-demand and cost-effectively
(c
e
capital expenditures to continuous operating costs. It also enables enterprise IT to
share cloud solution assets and give dynamic, on-demand service delivery to the whole
organisation.
in
The following are some of the possible advantages of cloud computing:
1. Organizational flexibility: Using a web browser, users may access information at any
nl
time and from any location.
2. Agility and quick deployment: The IT department can concentrate on providing tools
to mine, analyse, and exchange data and knowledge from databases, files, and
O
people.
3. Refocus IT resources: Hardware and application cost savings can be put to better
use elsewhere.
ty
4. New business models may be created since applications and resources are readily
available, allowing organisations to respond swiftly to client requirements. This aids
them in developing strategies to encourage innovation while potentially breaking into
si
new markets.
hosts linked to the network medium through a wire in the first scenario. This is the
topology of a bus.
The term “physical topology” refers to the spatial layout of devices, such as cables,
m
device placement, and their arrangement on the workstation. In other terms, it is a Local
Area Network configuration (LAN). It has a direct influence on the network’s capability.
)A
A direct point-to-point link between two computers and peripheral devices is the
(c
most basic network structure. As the communication channel is not shared in this
topology, the devices monopolise it, and no mechanism for device identification is
required. It might be one of three kinds: Simple: unidirectional signal flow, half-duplex:
Notes
e
bidirectional but not at the same time, fullduplex: bidirectional but not at the same time.
in
nl
O
ty
si
Figure: Network Topology Diagram
the entire network is brought to a halt, whereas single computer faults may be resolved
without disrupting the entire network. Linear Bus Topology is used when there are just
two nodes, or endpoints.
U
This topology is very inexpensive and simple to set up because no additional gear
is necessary, and the amount of wire required is minimal. Coax cable is long-lasting
and performs well in tough environments. It’s simple to upgrade the network; all that’s
ity
Star Topology
m
Among all of the topologies, star topology is one of the most popular. All
computers, switches, MAUs (Multi Station Access Units), and repeaters are connected
to the central switch, also known as the network’s root, through a dedicated connection
)A
(see figure). When a signal has to be sent from one computer to another, it first goes
to the central switch, which then broadcasts it to all peripheral devices. Coaxial cable,
optical fibre, or twisted pairs can all be used to create a star topology.
The main advantage of the Star topology is that it is relatively simple to set up;
(c
all that is required is a point-to-point connection between the central unit and the
peripherals to set up the network.
It’s simple to add and remove derives from the topology, and it’s done
Notes
e
without disrupting the rest of the network or causing shutdowns. This also makes
troubleshooting a breeze in the event of a breakdown. Until and unless they are non-
central, failures are fairly easy to control. It has a high tolerance and provides great
in
performance with fewer nodes. The network’s speed is mostly determined by the
capacity of the central hub and the performance of the cables. Packets becoming
caught in between are quite rare on our network.
nl
As of the additional cabling in the centre, this high-performance network costs a lot
of money to set up.
O
Table: Network Topology-Performance Metrics
ty
Expansion Moderate Easy Difficult Easy
Ease of Installation Difficult Easy Difficult Easy
Security High High Low High
si
Response Time Low Moderate High Low
Ease of Fault Finding Difficult Easy Moderate Easy
Reliability High High Low High
Ring Topology
r
ve
Each computer is connected to another device in Ring Topology, and the last one
is connected to the first to form a complete loop. On both sides, every WorkStation is
linked. Repeaters are used to convey data from one computer to the other on the other
ni
end of the ring. Although the ring topology is unidirectional, two rings are frequently
used for bidirectional communication or as a backup in the event of a breakdown.
Tokens are used to transport data in a sequential bit-by-bit way. Token Passing:
U
Every packet of data delivered contains a token, which is a unique address assigned
by the source. Computers in between the source and the destination use these tokens
to determine if the data is intended for them or whether they must send it on. This
continues until the package arrives at its destination.
ity
of data security. This architecture ensures that all computers have equitable access to
all resources. MAUs and Network cards are used.
As every communication passes via each computer, this architecture is slower than
)A
star topology. Troubleshooting the issues is complex, because it can’t be done without
causing network disruption. It makes use of MAUs and network cards, which are more
costly than Ethernet or a hub.
Mesh Topology
(c
Mesh topology is created by connecting each and every network device with
a point-to-point link. It’s a completely linked architecture that’s reliable but not
adaptable, and it’s often employed in wide-area networks. There are two common data
Notes
e
transmission methods:
Routing: Using the table of functioning channels to find the shortest path between
in
source and destination, accounting for broken links and reconfigured failures.
Flooding: In flooding, data from a source is sent to all network nodes; it is more
reliable than routing, but it adds to the network’s burden. As each node is linked
nl
to the others, each carrier carries its own load, ensuring a high level of security
and anonymity. In this topology, locating the fault is a breeze. As there are so many
connections, installation costs are considerable, and setup is challenging.
O
Hybrid Topology
Hybrid topology is the mixture of two or more basic topologies, as the name
ty
suggests. It discusses the advantages and disadvantages of various topologies. WANs
are often connected in a twin ring and star configuration. This architecture is created
in such a way that it optimises the network based on its usage pattern, such as Mesh
can be utilised at the top level of topology and extended through bus to minimise the
si
number of nodes.
This collection of topologies contributes to the creation of a hybrid with quick fault
r
detection and debugging, scalability, network flexibility, and dependability. However, this
results in a more complicated design and more installation effort.
ve
It can occasionally raise costs because to the requirement for a hub that can
function with many architectures. It will need a big, expensive infrastructure, as well as
cooling and cabling.
ni
Tree Topology
Tree topology, also known as hierarchical topology, is a type of hybrid topology
U
that combines Star and Bus topologies. It has hierarchical tiers with a root node or core
level. Between the successive layers of topology, there is a point-to-point relationship.
There should be at least three layers in a tree topology. The number of devices in
the network has no effect on the branching factor. There are one less point-to-point
ity
connections than hardware parts. When comparing the performance of nodes, those
closest to the root outperform those further away.
When compared to other topologies, this one is the most popular. It has the
advantage of allowing individual segments to be connected point to point. This topology
m
is a little tricky to set up, and the dependability is dependent on the backbone line.
Topologies define the network’s physical and logical views. They might be similar or
dissimilar. The topology of a network influences the kind of functions it can do and the
)A
quality of communication it can provide. It is not required that logical topology be linked
to a particular topology.
Cost, expansion, security, bandwidth capacity, delay or data flow efficiency, fault
finding ease, and other factors all influence topology selection. When compared to other
topologies, this one is the most popular. It has the advantage of allowing individual
(c
segments to be connected point to point. This topology is a little tricky to set up, and
the dependability is dependent on the backbone line. Topologies define the network’s
physical and logical views. They might be similar or dissimilar. The topology of a
Notes
e
network influences the kind of functions it can do and the quality of communication it
can provide. It is not required that logical topology be linked to a particular topology.
in
Cost, expansion, security, bandwidth capacity, delay or data flow efficiency, fault
finding ease, and other factors all influence topology selection.
nl
Check your Understanding
Fill in the blanks:
O
2. Network used in school is an example of_______network.
3. ________is a computer network created for an individual person.
4. ___________system allows us to talk to any person in the world at any time.
ty
5. A computer network enables two or more computers to share _____and hardware
resources.
si
Summary
●● In its most basic form, data transfer can occur between two devices that are
r
directly linked by some type of communication media. However, connecting two
devices directly point to point is impractical. This is because of the following
ve
factors:
i) The gadgets are a long distance apart.
(ii) There is a collection of devices, each of which may need to connect to others at
ni
different times.
●● The solution is to link each gadget to a communication network.
●● Computer networks are a collection of interconnected autonomous systems that
U
Network Classification
●● LAN (Local Area Network) • MAN (Metropolitan Area Network) • WAN (Wide Area
m
Network) (WAN).
Local Area Network (LAN) A local region network (LAN) is a smaller, privately
owned network with a maximum spread of 10 kilometres that provides local connection
)A
within a building or a limited geographical area. LANs differ from other types of
networks in three ways: I size, (ii) transmission technology, and (iii) topology.
As a result, there are several LAN standards, such as IEEE standards 802 x.
as being fewer than 50 kilometres in length and providing regional connectivity often
within a limited geographical area. It is intended to cover an entire city.
e
There is no distance restriction with a Wide Area Network. The subnet in most
WANs is made up of two separate components. Transmission lines, sometimes known
in
as circuits, channels, or connections, as well as switching and routing devices (switches
& routers). Transmission lines are used to transfer data between devices, whereas
routers link two or more transmission lines.
nl
A WAN allows for the long-distance transmission of data, voice, image, and video
information across enormous geographical areas, which may include a nation, a
continent, or even the whole world.
O
Activity
1. Prepare an illustrative PowerPoint Presentation for Types of Network.
2. Gather information on different companies and mention which networks they use
ty
and what is their core purpose of using it.
si
1. What are various types of networks?
2. Write briefly about the areas where networks are used?
3. Differentiate between Broadcast and point-to-point networks.
4. r
What is the difference between broadcasting and Multicasting?
ve
Glossary
1. PPP: Point-to-Point connection is a protocol which is used as a communication link
between two devices.
ni
2. LAN: Local Area Network is designed for small areas such as an office, group of
building or a factory.
3. WAN: Wide Area Network is used for the network that covers large distance such as
U
Further Readings:
1. Computer Networks, Andrew S. Tenenbaum, PHI, New Delhi.
2. Data and Computer Communication, William Stalling, PHI, New Delhi.
m
5. Data
e
Objectives
in
At the end of this unit, you will be able to:
nl
●● Configure a Dynamic Host Control Protocol
●● Understand and configure a Domain Name System
O
Introduction
Throughout its life cycle, every device on the network is subjected to Network
Configuration Management. It includes device detection, inventory management,
ty
configuration backup, monitoring configuration changes and compliance, tracking user
activity, and troubleshooting through the use of suitable network operations.
Let’s have a look at some of the most important network configuration management
si
features.
1. NOS manages resource sharing and performs a variety of additional tasks thanks to
r
its client/server design.
ve
2. Some are built-in, while others must be customised during installation.
3. NOS components differ depending on the NOS version and kind.
4. Servers and Network Operating Systems
ni
5. Networks make use of servers that are more powerful than the bare minimum.
6. Choosing the best server hardware
U
Client-Server Communication
Redirector for the logon process intercepts requests and decides where they
(c
should be handled.
e
Communication between a Windows XP client and a Windows Server 2008 CIFS
(Common Internet File System) server
in
SMB (Server Message Block) is an older protocol with widespread support that
allows any client type to authenticate and access resources.
nl
Middleware
Translates requests and answers between the client and the server in a three-tier
architecture.
O
Middleware is used in a client/server scenario.
ty
Client receives access to NOS services and resources after NOS client
authentication. Administrators account Most privileged user account Unlimited privileges
to server, domain resources, and objects
si
On UNIX or Linux systems, Root is created by default.
across a network, unlike operating systems such as Windows, which are designed for
single users to handle one machine. To keep the network working smoothly, the network
operating system works as a director.
The software that allows many computers to connect, share information, and
m
Novell NetWare was the first network operating system, launched in 1983.
Following Netware, various network operating systems such as Banyan VINES and
Microsoft Windows NT were launched. Windows 2000, Microsoft Windows XP, Sun
Solaris, and Linux are examples of different network operating systems. A group of
(c
e
1. It lets many computers to connect so that data, files, and hardware devices may be
shared.
in
2. Provide fundamental operating system capabilities such processor support, protocol
support, automated hardware identification, and application multi-processing
support.
nl
3. Authentication, login limitations, and access control are examples of security
features.
4. Name and directory services are provided.
O
5. File, print, online, and backup services are all available.
6. Internetworking features such as routing, and WAN ports are supported.
ty
7. System management, administration, and auditing tools with graphical interfaces;
user management and support for logon and logoff; remote access
8. It’s capable of clustering.
si
9. It also includes basic network administration features such as user access.
10. It also gives priority to printing tasks that are waiting in the network queue.
r
11. When new hardware is added to the system, it is detected.
ve
Network Operating System Characteristics
The support component is the first characteristic of network operating systems:
The numerous processors, software, and hardware devices that make up a network
ni
are supported by network operating systems. The systems assist users in connecting
to the network, as well as processing requests for particular documents and hardware
utilisation. Users can also request protocols from NOSs, such as Transmission Control
Protocol/Internet Protocol (TCP/IP) and others.
U
network, the NOS prevents them and reports the intrusion attempt in its log files. The
NOS also monitors software and hardware instals to prevent users from installing
unlicensed applications or equipment.
The user setup component is the third characteristic of network operating systems:
m
network operating systems generate user accounts and manage users logging in and
out of the network. The systems also control which file and directory services a certain
user has access to, as well as who may access the network remotely and how the
)A
The printing and file services component is the fourth characteristic of network
operating systems: Network operating systems, like other operating systems, are
responsible for all printing, storage, backup, and duplicating services for machines and
(c
Access to the Internet, local-area (LAN) and wide-area networks (WAN), port
routing, and intranet web services are all controlled by the systems. NOS quickly filters
Amity Directorate of Distance & Online Education
Network Basics 53
documents and files as they pass via the printing/file services. Documents and data can
Notes
e
be sent over the network by many users for printing, backup, and other purposes.
The email component is the fifth and final feature of network operating systems:
in
Electronic mail, often known as email, is managed by a NOS for the whole network,
including users who access the NOS remotely and over the Internet. The NOS prevents
SPAM and other harmful emails from being sent or received, as well as allowing users
nl
to create additional email accounts.
O
1. Highly reliable centralised servers.
2. Servers are used to tackle security problems.
3. The system can readily accommodate new technologies and hardware upgrades.
ty
4. Remote server access is accessible from a variety of places and platforms.
si
1. Servers are expensive.
2. For most procedures, the user must rely on a central site.
3. Regular maintenance and upgrades are necessary.
r
ve
1.3.2 Network Operating System Configuration
you may install the NOS software on the server computer in one of many methods.
These options are described in the sections below.
U
NOS on a machine that already has a previous version installed, you might be better off
doing a full installation in some instances. Here are the options:
When you install the NOS on a brand-new server, you’re doing a full installation,
which includes installing the operating system and configuring it with default settings.
m
Install the new server operating system alongside the previous operating system
via a multiboot installation. You may pick the operating system to use when you restart
the machine.
)A
Warning
Although multiboot installation may appear to be a smart idea, it is risky. I
recommend avoiding the multiboot option unless you have a compelling reason to do
so. See the adjoining sidebar “Giving multiboot the boot” for additional information on
(c
multiboot configurations.
e
must execute either a full installation, which removes the current Windows operating
system, or a repair installation, which replaces the existing Windows operating system.
in
If you’re installing the NOS on a server machine that already has a server
operating system, you may do an upgrade installation, which replaces the old operating
system with the new one while keeping as much of the old operating system’s settings
nl
as feasible.
A full installation can also be done on a machine that already has an operating
system installed. If that’s the case, you have two choices:
O
Delete the previously installed operating system.
ty
The NOS is normally installed from the distribution discs on the server’s CD-ROM
drive. However, if the server machine already has network connection, you can install
the operating system from a shared drive on another computer. You may either copy the
si
full contents of the distribution disc into a shared hard drive or utilise a shared CD-ROM
drive.
If you insist on installing two or more operating systems on a network server, make
sure each one has its own partition on the disc. Despite the fact that most network
operating systems allow you to install two (or more) operating systems on a single
partition, this is not a good idea. To support two operating systems on a single partition,
U
the operating systems must engage in a dangerous shell game with crucial system files,
shifting or renaming them each time the machine is restarted. Things can, unfortunately,
go awry. For example, if lightning strikes and the power goes out just as the NOS is
ity
rearranging the starting files, you can end up with a server that won’t boot to any of its
partitions.
Installing each operating system onto its own partition is the ideal approach to
set up a multiboot machine. Then, when you start the computer, you may use a boot
m
For this strategy to operate, the server machine must have network connectivity. If
the server already has an operating system installed, it is likely to have network access.
)A
If not, you can use a disc with basic network capabilities to start the machine.
If you’re intending to install the NOS on many servers, transfer the distribution CD
to a shared hard drive first to save time. That’s because the network is faster than even
the quickest CD-ROM drives. Installations that are automated and can be done from
(c
afar.
If you find yourself in the painful position of having to install a NOS on several
servers, there are a few strategies you may take to speed up the process:
Amity Directorate of Distance & Online Education
Network Basics 55
Automated setup: Allows you to construct a setup script that answers all of the
Notes
e
installation program’s inquiries. You may start the automatic setup after you’ve created
the script, then leave and return when the installation is complete.
in
As writing the setup script is time consuming, automated setup is only practical if
you have a large number of servers to install.
nl
3. Multiple Boot Options
If more than one operating system is required on a single machine, this option can
be set to allow the usage of several operating systems. Each operating system will
O
be installed on its own partition afterwards. As a result, prior to installing a multi-boot
system, there must be partition preparation.
There are a few things to consider when installing the operating system, including:
– The partition’s structure that will be used. The creation of separate partitions for
ty
system and data is one method for securing data on a computer. As a result of this
separation, the system may be improved without compromising the data.
si
Identifying the File System Type
The file system is a file management system that the operating system uses
to handle the data on the hard disc. At this time, a variety of file systems have been
r
established. FAT16/32, NTFS, HPFS, ext2, ext3, and ext4 are some of the most
ve
commonly used file systems. There may be many file systems in a single operating
system. Ubuntu, for example, can handle practically every file system that exists today.
Each file system has its own set of disadvantages and benefits.
ni
Operating Systems
U
The operating system is depicted on this page as three concentric rings. The
following are the labels for the circles:
The outer circle has a label on it. Shell: The user interface that allows people to
ity
instruct the computer to perform specified tasks. These requests may be made using
either the CLI or the GUI.
Kernel: Manages how hardware resources are used to satisfy software needs and
communicates between the hardware and software of a computer in the middle circle.
m
The inner circle is labelled Hardware, which refers to the physical components of a
computer, as well as the underlying electronics.
)A
Purpose
PC operating systems (Windows 8 and OS X) include technological features that
allow you to accomplish things like:
1. Utilise a mouse
(c
Router or switch:
Notes
e
1. Configure interfaces
2. Activate the routing and switching features
in
A default IOS is installed on all networking devices. Upgrades to the IOS version or
feature set are possible.
nl
Cisco IOS Location:
1. Cisco IOS is saved in Flash memory.
O
2. Non-volatile storage that is not lost when the power is turned off.
3. Changes or overwrites can be made as needed.
4. Can be used to save several IOS versions.
ty
5. The IOS was transferred from the flash memory to the volatile RAM.
6. The IOS that may be utilised is determined by the amount of flash and RAM memory
available.
si
In the first column, the following nine situations are listed:
Your boss hands you a unique cable and instructs you to setup the switch with it.
ni
You connect to the IOS via a network connection through another intermediate
device.
U
You’re on vacation and need to verify the status of one of your routers. Your hotel
analogue phone is your sole means of communication.
You phone your boss to inform him that you are unable to connect to your router in
another city over the internet. He gives you the information you need to use a telephone
connection to go to the switch.
m
A device’s password has been updated. No one knows what the new password is,
so you’ll have to reset it.
connection.
1. Console
(c
2. Telnet/SSH
3. AUX
e
Access control is the selective limitation of access to a location or other resources
in the domains of information security and physical security. After permitting SSH
in
or Telnet access, one of the most critical things to configure on any Cisco equipment
is to limit who is authorised to access it. Having the password on a line is the most
basic stage, however if telnet is used for communication, all of the passwords may be
nl
communicated in clear text across a wire. It implies that if someone sniffed a line while
you were telneting into the router, they could be able to see your password and so get
access to that equipment.
O
Management plane protection and password encryption are discussed in the
sections below.
ty
VTY, or virtual teletype, is a command line interface that is formed in the router and
may be used to connect to a daemon using Telnet, a network protocol that is commonly
used in local area networks. Users must enter a valid password to connect to the VTY.
si
This VTY employs a set of CLI command operations based on the three categories of
tasks that the CLI may perform: moving, editing, and advanced. There are three limited
interface mode instructions in the VTY interface, such as
1. r
VTY other: Include modes like TFTP, which stands for “trivial file transfer protocol.”
ve
2. VTY Enable: This option allows you to read and write to the command line interface.
3. VTY View: It provides read-only access to the interface.
The VTY line is the router’s virtual terminal line, which is primarily used to regulate
ni
inbound telnet connection. It is virtual in the sense that they are the software’s function.
It is not accompanied by any hardware. It may also be used to connect to a router and
do configuration checks or status adjustments. The majority of routers contain five VTY
U
ports, numbered 0 to 4. It means that you may have nearly five network administrators
setting a router at the same time. Even so, it is feasible to construct a large number of
VTY lines.
ity
An auxiliary port is the AUX line. Although, these days, not all routers include an
AUX port. The AUX port will only be used to access a router if you are locked out of a
console port.
A console port is represented by the CTY line type. It will display in a router
m
configuration as line con 0 and in the output of a show line command as the cty on
any router. This console port is mostly used for accessing the local system through a
console terminal. The CTY port is used to setup a router when it is brand new and does
not yet have an IP address configured.
)A
A console port is a serial port, therefore use the rolling cable to connect from a
serial port on the computer to a console port, and use the DB9 to RJ45 adaptors to
connect from a serial port on the computer to a console port.
Use the command line console in configuration mode to get to the console
(c
configuration mode. To reset a console configuration mode parameter to its default values,
such as line console and no line console, use this form of the line console command.
The password authentication can be specified for each of the aforementioned line
Notes
e
types. This line can alternatively be set to use a single password for all users or a single
password for each user.
in
The authentication server may also be used to give authentication or the user
specific password can be specified locally on a router.
The following are the most helpful and straightforward line configuration variants on
nl
the Cisco router:
O
Router (config) # line con 0
ty
Example
Router (config) # line vty 0 4
si
Router (config-line) # password my713!CiscoRouter (USE
A STRONG PASSWORD)
r
Router (config-line) # logging synchronous
ve
Router (config-line) # exec-timeout 60 0
If the problem persists, remember to use the command clear line to clear the
connection on the router line.
U
Check that the commands are typed correctly in the router’s configuration. The
show running-config command is used to view a router’s current configuration. Simply
log off a terminal and log back in using the set password to access a router to test the
configuration.
m
IOS software allows you to limit which interfaces the network management packet
can access the device over. The network operator can also designate one or more
router interfaces as management interfaces using the MPP capability. Only these
management interfaces are authorised to send and receive device management
communications. No interface other than the allocated management interface can
(c
Restricting management packets to the chosen interface gives you more control
Notes
e
over the device’s management and increases its security. It has advantages such as
increased data packet speed on the nonmanagemnet interface, network scalability, the
need for an access control list to restrict access to a device, and management packet
in
flood on the routing and switching interface is avoided from reaching the CPU.
The management plane is a logical channel for all traffic relevant to routing
nl
platform administration. The device is managed via its network connection using the
management plane.
Telnet, SNMP, secure HTTP, SSH, BEEP, FTP, and Telnet are just a few of the
O
protocols that are processed on a management plane.
ty
management interface remains available at all times.
si
To configure the device that you added to an existing device or network on the
network.
It enables the privileged EXEC mode in the first step. If prompted, enter your
password. r
ve
for example, Router>enable
interface.
Ex:
Router (config-cp-host)#
m
Management-interface
snmp
Ctrl z Router(config-cp-host)#
(c
Step 6: It shows details about a management interface, such as the amount of lost
and processed packets, the protocol enabled on the interface, and the interface type.
This is the interface for which you would want to see information. The protocol name is
the protocol for which you would want to access information, and the protocol specifies
Notes
e
that the protocol is indicated. Interface, protocol, and protocol name are optional in this
case.
in
Ex: Router# show management
nl
For checking the setup, the command display management - interface is quite
handy.
O
Password Encryption
The password encryption protects the content by limiting access to those who have
been given a password. There was no need for a licence for password encryption.
ty
It’s crucial to understand AES password encryptions and master encryption keys
when it comes to password encryption. You may also activate strong and reversible
si
128-bit encryption here. Type-6 encryption is often known as AES password encryption.
Advanced Encryption Standard (AES) is an advanced encryption standard. Enable the
advanced encryption standard option and set the master encryption keys, which are
also used to decode and encrypt the password, to begin employing type-6 encryption.
r
ve
Unless the type-6 password encryption is disabled, all freshly created and existing
plain text passwords for the supported programmes are saved in type-6 encrypted
forms after activating the AES password encryptions and configuring the master key.
The NX-OS may also be configured to convert all existing weakly encrypted passwords
to type-6 encrypted passwords.
ni
TACACS+ and RADIUS are applications that can employ the AES password
U
encryption function.
Users with administrative privileges can only change the AES password encryption
feature, as well as the accompanying decryption or encryption commands as well as
ity
master keys.
Disable the functionality of AES password encryptions, destroy a master key, and
decode all type 6 passwords before downgrading from Cisco NX-OS 5.2 to a previous
edition.
m
Enable the AES password encryption capability without the master keys, however
encryption will not begin until the master is accessible in the system.
)A
If a master key is deleted, type 6 encryption is disabled, and all type 6 encrypted
passwords are rendered unreadable; otherwise, a new master key is reconfigured.
(c
AES password encryptions have the following features: Master key is disabled
Notes
e
since it isn’t set up correctly.
in
Enable the AES function and configure the master keys for type 6 encryption.
nl
The Internet’s Addressing Scheme
In a computer network, an addressing scheme is explicitly required for
O
communication. Packets are routed from one point to another using an addressing
scheme. Each of the three tiers of the TCP/IP protocol stack model, 2, 3, and 4, outputs
a header, as shown in Figure. Host 1 connects with host 2 over a network of seven
ty
nodes, R1 through R7, and a payload of data contained in a frame by the link layer
header, the network layer header, and the transport layer header is carried across a link
in this diagram. Each source or destination is given an address as identification for the
matching pr inside either of these three headers.
r si
ve
ni
U
ity
Layer 2 (link layer) address. Media Access Control (MAC) address is a 6-byte
(48-bit) field that is represented as a 6-field hexadecimal number, such as 89-A1-33-
2B-C3-84, with each field being two bytes long. Every networking device’s input or
)A
output has an interface to its linked link, and each interface has its own MAC address.
At the link level, a MAC address is only known locally. It’s fair to presume that no two
interfaces have the same MAC address in most cases. As shown in the diagram, a
link layer header comprises the MAC addresses of both the source and destination
interfaces.
(c
The address of the network layer (layer 3) Internet Protocol (IP) address is
a 4-byte (32-bit) field that is represented by a 4-field dot-separated number, such
as 192.2.32.83, with each field being one byte long. In order to be identified in a
Notes
e
conversation, every entity in a network must have an IP address. At the network level,
an IP address might be known globally. As shown in the diagram, a network layer
header comprises the IP addresses of both the source and destination nodes.
in
The address of the transport layer (layer 4) A port number is a 2-byte (16-bit)
field that is represented by a 16-bit number, such as 4,892. In a transmission, the port
nl
numbers indicate the ports of the two end hosts.
As a single host can execute many network apps at once, each application must
be recognised by another host connecting with the targeted application. For example,
O
to uniquely identify an application process operating on destination host 2, source host
1 in Figure 1.1 requires a port number for communication. As shown in the diagram, a
transport layer header comprises the port numbers of a source and destination host. A
transport-layer “port,” which acts as the end-point application identification in a host, is a
ty
conceptual port rather than an actual or physical one.
IP Addressing Scheme
si
The IP header comprises 32 bits dedicated to addressing a specific network
device. A device’s IP address is a unique identifier that may be used to locate it on
the Internet. The address structure is separated into the network ID and the host ID to
r
make the system scalable. The network ID identifies the device’s network, whereas the
host ID identifies the device itself. This means that every device on the same network
ve
has the same network ID. The IP address is further separated into classes A, B, C, D
(multicast), and E (reserved) based on the bit placement assigned to the network ID
and the host ID, as illustrated in Figure.
ni
U
ity
m
)A
Take a look at the lengths of the appropriate fields for each class in this diagram:
(c
1. Class A begins with a zero, followed by a network ID of 7 bits and a host ID of 24 bits.
2. Class B begins with a ten, followed by a network ID of 14 bits and a host ID of 16 bits.
Amity Directorate of Distance & Online Education
Network Basics 63
3. Class C begins with 110, followed by a network ID of 21 bits and an 8-bit host ID.
Notes
e
4. Class D begins with 1110 and ends with 28 bits. Class D is solely used for multicast
addressing, which consists of a number of hosts forming a multicast group, each of
in
which requires its own multicast address. Multicast approaches and routing are the
focus of Chapter 6.
5. Class E begins with 1111 and ends with 28 bits. Only network experiments are
nl
allowed in Class E.
The IP address is written in dot-decimal format for convenience of usage. The
address is broken down into four bytes separated by a dot. An IP address with 32 bits of
O
all 0s, for example, can be represented by the dot-decimal form 0.0.0.0, where each 0
represents 00000000 in logic bit notation.
The “number of available network addresses” and the “number of available host
ty
addresses per network” have already been reduced by two in this table. The size of the
network ID field in class A, for example, is shown in the table as N = 7, yet the number
of accessible network addresses is listed as 2N – 2 = 128-2=126.
si
Example. 10001000 11100101 11001001 00010000 is the IP address of a host.
Determine the IP address’s class and decimal equivalent.
Different subnet ID and host ID values can be used depending on the network
)A
size. As a result, the outside world would not be plagued by a lack of fresh network
addresses. A subnet mask—logic AND function—is used to calculate the subnetting
number. A field of all 0s for the host ID and a field of all 1s for the remaining field make
up the subnet mask.
(c
Solution. The answer is depicted in detail in the figure. When the IP address
Notes
e
is masked by 255.255.255.128, the result is 150.100.14.128. The IP address
150.100.14.163 is obviously a class B address. The lowest 16 bits of a class B address
are used for the subnet and host fields. We can see that the maximum number of hosts
in
is 27 = 128 after applying the mask.
nl
O
ty
si
Figure: A subnet and masking example
r
Example. A packet with the destination IP address 190.155.16.16 is received by a
ve
router connected to a network. 190.155.0.0 is the IP address assigned to the network.
Assume the network contains two subnets with addresses of 190.155.16.0 and
190.155.15.0, respectively, and that both subnet ID fields are 8 bits long. Demonstrate
the intricacies of packet routing.
ni
Solution. The router selects which subnet the packet should be routed to when
it gets it, as follows: The target IP address is 190.155.16.16, and the router’s subnet
mask is 255.255.255.0, yielding 190.155.16.0. The router consults its routing database
U
to find the subnet that corresponds to 190.155.16.0, which is subnet 2. When the
packet arrives at subnet 2, the router decides that the destination is in its own subnet
and forwards it to its intended destination.
ity
addresses inside the space will be used, and hence some addresses may be wasted.
This condition is rigid and would exhaust the available IP address space. As a result,
the classful addressing scheme, which includes classes A, B, C, D, and E, uses the
address space inefficiently.
)A
choose a 21-bit network ID, with the first 20 bits of each being identical. This indicates
that one organization’s address space overlaps with that of another.
The use of CIDR has resulted in a large boost in router speed and a significant
Notes
e
reduction in the size of routing tables. A pair of network IP addresses and the mask
are listed in the routing table of a router that uses the CIDR address space. A CIDR
approach known as supernetting allows a single routing record to represent a collection
in
of neighbouring addresses. The routing table may have two entries with the same prefix
due to the usage of a variable-length prefix. The router uses the longest-prefix-match
approach to pick between the two entries when routing a packet that matches both of
nl
these entries.
O
ty
r si
ve
Figure: CIDR routing
Example. Assume that router R1 receives a packet with the destination IP address
205.101.0.1, as illustrated in Figure. Determine the packet’s final destination.
ni
Due to a lengthier match, link L1, with its 21-bit prefix, is picked, as seen at the bottom
of this image. The packet is finally routed to N3, the destination network, over this link.
iOS developers have touched millions of people since the iPhone’s introduction.
Start by enrolling in one of these bootcamps. iOS bootcamps educate students the
technologies and languages they’ll need to create iPhone apps that can be sold on
the App Store. Objective-C, Swift, XCode, and other technologies are among them.
m
temporarily store the items needed to install Windows, eliminating the requirement for a
USB drive. Check the “Learn more” section of the Apple Support article Install Windows
Notes
e
10 on your Mac with Boot Camp Assistant to see if you require an external USB drive.
in
If your Mac doesn’t require an external USB drive, see Install Windows on a Newer
Mac using Bootcamp.
nl
Set macOS as the default operating system.
After installing Windows, you can choose between macOS and Windows as your
preferred operating system. When you power on or restart your Mac, you want to utilise
O
the default operating system.
Choose Apple menu > System Preferences, then Startup Disk on macOS.
Click the lock, then enter in an administrator name and password before clicking
ty
Unlock.
Choose the starting disc with the operating system you wish to use as the default.
si
Click Restart if you wish to use the default operating system right now.
The default operating system is used the next time you switch on or restart your
Mac.
r
In Windows, open the Boot Camp Control Panel.
ve
Click the display hidden icons arrow on the right side of the taskbar in Windows on
your Mac.
Select Boot Camp Control Panel from the Boot Camp icon.
ni
Click the display hidden icons arrow on the right side of the taskbar in Windows on
your Mac.
Apple website has Support articles that may be of use in troubleshooting Boot
Camp on an Intel-based Mac:
If Boot Camp Assistant says your USB drive couldn’t be created or there isn’t
enough space on it, or if Boot Camp Assistant says your disc can’t be partitioned,
)A
e
Boot Camp Assistant may be used to install Windows 10 on an Intel-based Mac.
in
systems. Determine the “Learn more” section of the Apple Support article Install
Windows 10 on your Mac using Boot Camp Assistant to see if your Mac utilises this
approach. If your Mac is an older model that requires an external USB drive, Install
nl
Windows on an Older Mac Using Boot Camp for instructions.
O
1. The Apple keyboard, mouse, and trackpad that comes with your computer. Use a
USB keyboard and mouse if they aren’t accessible.
2. On a disc image (ISO file) or other installation media, a full-installation 64-bit version
ty
of Windows 10.
3. Microsoft offers a Windows 10 Disc Image (ISO File) for download.
4. On your starting drive, there is plenty free storage space. See the Apple Support
si
Article for details on the required quantity of free space. With Boot Camp Assistant,
you can install Windows 10 on your Mac.
Before you start, make sure you have everything you need.
r
ve
Make a backup of crucial files before installing Windows.
You may back up your files using Time Machine or any other technique. Back up
your files with Time Machine and Ways to back up or secure your files are also good
places to start.
ni
2. Log in as an administrator on your Mac, close any active programmes, and then log
out any other users.
3. Install all available macOS updates by going to Apple menu > System Preferences >
Software Update.
m
4. If your Mac restarts after applying an update, go back to Software Update and install
any remaining updates.
)A
proceeding.
3. The overall amount of disc space available on the machine is verified. To create
room for Boot Camp, older Time Machine snapshots and cached iCloud data are
Amity Directorate of Distance & Online Education
68 Network Basics
erased. It’s possible that this procedure will take a long time to finish (you can click
Notes
e
the Stop button to skip this process).
4. Choose the Windows ISO image if you only have one internal disc, then choose the
in
partition size by sliding the separator between the macOS and Windows partitions,
then click Install.
5. It’s important to note that you won’t be able to resize the partition afterwards.
nl
6. If your computer has numerous internal drives, use the onscreen instructions to
choose and prepare the disc you wish to install Windows on, as well as the Windows
ISO image.
O
7. You may build an extra partition for Windows if you choose your starting disc. Drag
the boundary between the macOS and Windows partitions to set the partition size.
8. If you choose an APFS-formatted drive, you have the option of creating a separate
ty
partition for Windows or erasing the entire disc and creating a partition for Windows.
If you want to make a new partition, slide the separator between the macOS and
Windows partitions to choose the partition size.
si
9. You can delete the entire drive and create a partition for Windows if you use a non-
APFS-formatted disc.
10. If Boot Camp is already installed on the disc you choose, you can choose to uninstall
it. r
ve
Step 3: Set up Windows.
1. Follow the onscreen instructions in the Windows setup.
2. When the installation is complete, your Mac will restart in Windows mode.
ni
1. Boot Camp drivers that support your Mac hardware begin to install once Windows is
installed.
2. Note: You must manually install the support software if it does not install automatically.
ity
See the Apple Support article for more. After utilising Boot Camp Assistant, if the
Boot Camp installer does not open.
3. Follow the onscreen instructions in the Windows Boot Camp installation.
m
4. Important: In any of the installer dialogues, do not click the Cancel button.
5. If you see a notice saying the programme, you’re downloading failed Windows Logo
testing, click Continue Anyway.
)A
6. You don’t have to answer to installer dialogues that occur for a few seconds during
installation, but if one asks you to install device software, click Install.
7. If nothing appears to be occurring, you may need to react to a hidden window. Look
through the open windows.
(c
9. Follow the instructions for any further installers that appear once your Mac has
Notes
e
restarted.
in
Fill in the blanks:
nl
2. In _____________ based network, resources are located on a central server or a
group of server.
3. ___________ is used by Macintosh computers to communicate over a network.
O
4. In centralized network, each terminal other than server acts as a ___________
device.
5. ___________ layer take a raw transmission facility & transform it in to line.
ty
Summary
●● A computer network promotes interpersonal communications, permits file
si
sharing, and allows for the sharing of network and computational resources,
among other things. To accomplish so, different network services that support the
aforementioned network applications must be configured.
●● r
Network Configuration: Network configuration and setup of numerous services in
ve
any business is a difficult operation. Configuring multiple network services such as
DHCP, DNS, Web Service, Email, and so on to operate various applications that
need to be accessed through network is a difficult task.
●● The unit covers several fundamental and vital network services that are necessary
ni
in every company so that various applications may be executed and accessible via
an organisational network.
U
Activity
1. How to configure Samba server.
2. List and draw the components required to configure BIND.
ity
Glossary
●● Access control list: It can contain those hosts, domains or IP addresses that one
wants to group together and apply the same level of access to DNS server. C acl
records to group those addresses, and then indicate what domain information the
(c
●● Listen-on ports: By default, name server accepts only name server requests that
Notes
e
come to port 53 on name server. You can add more port numbers if you want your
name server to accept name-service queries on different ports.
in
●● Authentication: This is to verify the identities of hosts that are requesting services
from DNS server, can use keys for authentication and authorization. (the key and
trusted-keys statements are used for authentication.)
nl
●● Caching name server: It simply caches the information it receives about the
locations of hosts and domains. It holds information that it obtains from other
authoritative servers and reuses that information until the information expires.
O
●● Forwarding name server: It is essentially a caching name server but is useful in
cases where computers lie behind a firewall and in which only one computer can
make DNS queries outside that firewall on behalf of all the internal computers.
ty
Further Readings:
1. Computer Networks by Andrew S Tanenbaum, Fifth Edition
2. SA2, Redhat System Administration I & II, Student Workbook
si
3. Cisco Certified Network Associate Study Guide, Seventh Edition by Todd
Lammle
4. r
Redhat Enterprise Linux System Administration
ve
Check your Understanding-Answers
Fill in the blanks:
1. Receiver
ni
2. Server
3. Apple talk
U
4. input/output
5. Data link
ity
m
)A
(c
e
Structure:
in
2.1 Introduction to Network Protocols and Communication \
1.1.1 Introduction
nl
1.1.2 Data Communication
1.1.3 Overview of Network Protocols
O
1.1.4 Protocols and Standards
1.1.5 Introduction to Ethernet
1.1.6 Internet History
ty
1.1.7 Introduction to Ethernet
1.1.8 Protocol Layering
2.2 Reference Models
si
2.2.1 OSI Reference Model
2.2.2 Characteristics of OSI Model
2.2.3 OSI Protocols r
ve
2.2.4 TCP/IP Reference Model
2.2.5 TCP/IP Protocols
2.2.6 Difference between OSI and TCP/IP Protocols
ni
2.3.1 Introdution
2.3.2 Serial vs Parallel Transmission
2.3.3 Data transmission Mode
ity
e
Communication
in
Objectives
At the end of this unit, you will be able to:
nl
●● Have a reasonable understanding of the IP protocol architecture
●● Describe the operation of IP protocol and its header format
O
●● Understand the role and meaning of IP addressing and classes
●● Describe and understand how to use subnet addressing
●● Understand the simple routing protocols.
ty
Introduction
A protocol is a formal specification that describes the processes that must be
si
followed while transmitting or receiving data in the networking and communications
field. Protocols establish the network’s format, timing, sequencing, and error checking.
In plain English, this implies that if two or more devices, such as computers, wish
r
to connect, they’ll require a common “Protocol,” which is a collection of rules that tells
ve
them how and when to interact.
The way this “definition” happens in computer land is through RFCs (Requests
For Comments), where the IETF (a group of lifeless engineers) creates new standards
and protocols, which the major vendors (IBM, Cisco, Microsoft, Novell) then follow and
ni
implement in their products in order to make more money and try to take over the world!
There are thousands of protocols available, and it would be difficult to include them
all here. Instead, we’ve listed some of the more common protocols so you can learn
U
The most common TCP/IP protocols are shown in the table below. You may use
the OSI model to discover which layer each of these protocols belongs to.
ity
The protocols examined on Firewall are listed below. cx: Internet Protocol (IP),
TCP, ICMP, DNS, UDP, FTP, TFTP, RIP, Ethernet, OSPF
2.1.1 Introduction
m
The module introduces the concept of computer networks and the protocols that
are commonly used in today’s networks, namely the TCP/IP suite and a few additional
)A
supporting protocols. The lesson follows the traditional method of describing network
components known as layers one by one. However, it also delves into a few cutting-
edge networking technologies such as packet categorisation, MPLS (Multi-Protocol
Label Switching), IoT (Internet of Things), and SDN (Software Defined Networks),
among others. Packet categorisation and SDN also provide insight on how traffic
(c
e
devices across a transmission channel, such as a computer network. This procedure
necessitates the use of a communication system comprised of both hardware and
software. The transmitter and receiver devices, as well as the intermediary devices
in
through which the data goes, are all part of the hardware. The software element
includes rules that describe what should be conveyed, how it should be sent, and
when it should be communicated. It’s also referred to as a Protocol. The parts that
nl
follow discuss the fundamental qualities that are necessary for the efficient operation
of the data communication process, followed by the components that make up a data
communications system.
O
Characteristics
The following four key factors determine the efficacy of any data transmission
system:
ty
1. Data delivery: Data must be supplied to the relevant user and destination.
2. Accuracy: The data should be sent precisely and without any mistakes via the
si
communication mechanism. During transmission, data may get damaged, reducing
the accuracy of the data given.
3. Timeliness: Audio and video data must be supplied without delay in a timely way; this
is known as real-time data transmission. r
ve
4. Jitter: This is the time difference between packet arrivals. The timeliness of data being
transferred may be harmed by uneven jitter.
1. Your message
The information to be sent by the sender to the receiver is referred to as a message.
U
2. The sender
Any device capable of transferring data is referred to as the transmitter (message).
3. Receiver A receiver is a device to which the transmitter wishes to transfer data
ity
(message).
4. Medium of Transmission
It’s the route that the communication takes to go from sender to recipient. It can be
wired or wireless, and both have several variants.
m
5. Protocol A protocol is a set of rules that the sender and receiver agree on in order to
transfer data. A protocol is a collection of rules that control the transmission of data.
In data communications, without a protocol, the communicating entities are like two
)A
Representation of Data
Data is a collection of unprocessed facts that is used to derive information. Data
(c
may be represented in a number of different ways. The following are some examples of
data types used in communications:
1. Text The text consists of a blend of upper- and lower-case alphabets. It is saved as
Notes
e
a bit pattern. ASCII and Unicode are the most widely used encoding systems.
2. Quantities Numbers are made up of digits ranging from 0 to 9. It is saved as a bit
in
pattern.
The most common encoding systems are ASCII and Unicode
3. Images The phrase “a picture is worth a thousand words” is well-known. Images are
nl
digitally saved in computers.
O
Humans are the only species on the planet who can communicate with one
another via the use of language. Humans, on the other hand, take this gift to a
whole new level. Distance, time, and a person’s physical presence no longer matter
ty
in communication since people have developed a communication system that allows
them to communicate or exchange data such as photographs, videos, text, and files
with their loved ones at any time and from anywhere. Communication is described as a
process in which more than one computer exchanges data, instructions, and resources
si
with one another. To put it another way, communication is the process or act of sending
or receiving data. A computer network is defined as a collection of computers that work
together to solve a problem.
r
ve
Data Communication Components
The following components make up a communication system:
to another. It might be a text file, audio file, video file, or other type of file.
A set of rules (protocol): When someone gives data (the sender), it must also be
intelligible by the recipient; otherwise, the data is useless. Rupali, for example, sends
m
a message to Nutan. It’s a pointless debate if Rupali writes in Hindi and Nutan doesn’t
comprehend Hindi.
)A
(c
Notes
e
in
nl
O
Figure: Communication medium
As a result, every computer linked to the internet follows a set of rules (protocols),
which are as follows:
ty
TCP (Transmission Control Protocol) is a protocol that allows you to send and
receive data over the internet. It’s in charge of breaking down communications into
packets on the source computer and putting them back together at the destination or
si
receiver computer.
It also ensures that the packets contain information about the message’s source,
destination, and the order in which the message data should be reassembled, as well
r
as ensuring that the message was transmitted successfully to the specified destination.
ve
Internet Protocol (IP): Have you ever wondered how computers figure out which
packet belongs to which device? What happens if your father receives the message
you sent to your friend? That’s right, it’s terrifying. Well! IP is in charge of managing the
target computer’s address so that each packet is sent to the correct location.
ni
from one device to another. There are three forms of data communication:
data, and both devices employ their whole transmission capacity. For instance, Internet
of Things, data entry with a keyboard, music listing with a speaker, and so on.
When one device sends data, the other just receives data, and vice versa.
Consider the walkie-talkie.
)A
Channels of Communication
(c
a connection that transmits data between two or more devices. The communication
Notes
e
media may be divided into two categories.
in
2. Media transmission - unguided
1. Guided Media: In this transmission medium, a physical link is established between
two or more computers or devices using wires or cables, and then data is conveyed in
nl
the form of signals utilising these links. Types of guided media transmission include:
Twisted pair cable: This is the most popular type of communication line. Two
O
identical wires are wrapped together in a double helix in a twisted-pair cable. Crosstalk
is reduced by twisting the wire. It’s the leakage of a signal from one wire to another,
which can cause signal corruption and network faults. Internal crosstalk and external
kinds of signal interference are both protected by the twisting.
ty
Twisted Pair Cable Types:
Unshielded Twisted Pair (UTP): This type of cable is frequently used in computers
si
and telephones. As there is no exterior shielding, it does not provide protection against
external interference. It is less expensive than STP.
Shielded Twisted Pair (STP): The shield provides more protection against
r
crosstalk. It shields against external interference thanks to shielding. In comparison to
ve
UTP, it is heavier and more expensive.
Coaxial Cable: A solid wire core is surrounded by one or more foil or wire shields in
coaxial cable.
ni
The signal is carried via the inner core of the coaxial cable, while the outside
shield serves as a ground. It is frequently utilised for television transmissions and is
also employed in building security systems by major organisations. When compared to
twisted pair, this cable transmits data better but is more costly.
U
Core: The portion that allows light to pass through is the core. It’s usually made out
of glass or plastic.
m
Cladding: This is the material that covers the core and reflects light back to it.
Microwave: Microwave transmission eliminates the need for wires. Radio and
television signals are analogous to microwave signals. It’s a type of long-distance
communication system.
Amity Directorate of Distance & Online Education
Network Basics 77
e
are parabolic antennas built on towers in microwave transmission to deliver a beam to
another antenna. The larger the range, the higher the tower.
in
Radio wave: A radio wave transmission is when communication is conducted out via
radio frequencies. It allows you to move about. It is made up of two parts: a transmitter
and a receiver. Antennas are used by both to transmit and receive radio signals.
nl
Infrared communication: It is a form of short-range communication that may flow
through any object. It’s commonly found in TV remotes, wireless mice, and other
electronic devices.
O
2.1.3 Overview of Network Protocols
A network protocol is a collection of rules that govern how data is exchanged
ty
between devices connected to the same network. In essence, it enables linked devices
to interact with one another despite variations in internal operations, structure, or
design. Network protocols are responsible for allowing you to interact with individuals all
over the globe, and they play an important part in modern digital communications.
si
As of established rules integrated into devices’ software and hardware, network
protocols enable devices to engage with one other in the same way that speaking the
r
same language facilitates communication between two humans.
ve
Without network protocols, neither local area networks (LANs) nor wide area
networks (WANs) could function as they do today.
Large-scale activities are broken down into tiny, particular jobs or functions using
network protocols. This happens at every level of the network, and each function must
work together to achieve the greater goal at hand at each level. The phrase protocol
U
Different network protocols have been defined and published by the following
organisations:
2. The Internet Engineering Task Force (IETF) is a group of people who work (IETF)
3. The International Organisation for Standardisation (ISO) is a non-profit organisation
)A
dedicated to (ISO)
4. The International Telecommunication Union (ITU) is a non-profit organisation that
promotes (ITU)
5. The World Wide Web Consortium (W3C) is a non-profit organisation (W3C)
(c
While network protocol concepts are typically similar, each protocol is distinct and
Notes
e
runs according to the instructions provided by the organisation that designed it.
in
Certified network specialists and IT professionals aren’t the only ones who need
to know about network protocols. Whether they realise it or not, billions of individuals
utilise network protocols on a regular basis.
nl
You utilise network protocols every time you access the internet. Though you may
not understand how network protocols function or how often you come across them,
O
they are required for any use of the internet or digital communications.
ty
do one of three things:
Communication
si
Security in network management
Each kind is required to utilise network devices quickly and safely, and they
collaborate to make this possible.
r
ve
Communication
Different network devices can interact with each other thanks to communication
protocols. They are utilised in both analogue and digital communications and may be
used for a variety of tasks, including file transfers between devices and internet access.
ni
business and personal contexts, such as smart buildings, cloud computing, and self-
driving cars.
2. Messages sent instantly: A variety of instant messaging network protocols enable
text-based conversations on cell phones and computers in real time.
ity
3. Routing protocols allow routers and other network devices to communicate with one
another. There are also particular routing protocols for ad hoc networks.
4. Bluetooth: Bluetooth devices, such as headsets, smartphones, and laptops, need a
m
6. Internet Protocol (IP) is a protocol that allows data to be exchanged across the
internet between devices. Without IP, the internet would not function as it does now.
Network Management
(c
order to guarantee that each one, as well as the network as a whole, performs at its
Notes
e
best.
in
1. These protocols create and maintain reliable connections between devices on the
same network.
nl
2. Link aggregation technologies allow several network connections to be combined
into a single link between two devices.
3. This boosts the connection’s strength and ensures that it stays connected even if
O
one of the links fails.
4. Troubleshooting: Troubleshooting protocols enable network administrators to
discover network faults, assess the network connection’s quality, and determine how
to resolve any difficulties.
ty
Security
Security protocols, often known as cryptographic protocols, strive to keep
si
unwanted users out of the network and the data transferred across it.
The following are some of the most common functions of security network
protocols:
r
ve
1. Encryption: Encryption techniques safeguard data and secure areas by forcing users
to provide a secret key or password to get access to them.
2. Entity Authentication: Entity authentication methods provide a system in which
various devices or users on a network must validate their identity before gaining
ni
The following are some of the most regularly used network protocols.
1. HTTP (Hypertext Transfer Protocol) is an Internet Protocol that specifies how data
is delivered over the internet and how web servers and browsers should respond
m
to requests. This protocol (or its secure equivalent, HTTPS) is found at the start of
many URLs and web addresses on the internet.
2. SSH (Secure Socket Shell): This protocol allows you to access a computer securely,
)A
even if it’s connected to an insecure network. SSH is especially helpful for network
managers who need to handle several systems from a distance.
3. SMS (Short Message Service) is a text messaging technology that was developed to
send and receive text messages over cellular networks. SMS stands for text-based
(c
Network protocols govern how devices and processes interact with one another, not only
Notes
e
how they operate alone. Without these set standards and regulations, the internet would be
devoid of the infrastructure it requires to function and be used. The digital world could not exist
without network protocols, which constitute the bedrock of modern communications.
in
2.1.4 Protocols and Standards
nl
Protocol: Some rules and processes should be agreed upon at the sending
and receiving ends of the system in order for communication between devices to be
successful. Protocols are the names given to such regulations and processes. For
O
different sorts of communication, multiple protocols are employed. Protocols are
depicted as a collection of rules in the figure above. As a result, without a protocol,
communication between the sender and the receiver is impossible.
Standards are a collection of criteria for data transmission that are required for
ty
the flow of data between devices. It is critical to adhere to standards established by
organisations such as IEEE, ISO, and ANSI, among others.
si
1. De Facto Standard.
2. De Jure Standard.
r
Standard in Practice: “By Fact” or “By Convention” is the meaning of the term “De
ve
Facto.”
These are standards that have not been certified by any organisation but have
been adopted as standards due to their widespread application. Furthermore,
ni
For example, Apple and Google are two corporations that have formed their own
set of regulations for their own goods. They also employ some of the same production
U
De Jure Standard: “By Law” or “By Regulations” is the meaning of the term “De
Jure.”
ity
As a result, these are the standards that have been authorised by official bodies
such as ANSI, ISO, IEEE, and others. These are the standards that must be followed if
they are necessary or required.
For example, all data transmission standard protocols such as SMTP, TCP, IP, and
m
Ethernet has proven to be a relatively affordable, moderately fast, and widely used
LAN (local area network) technology for decades.
)A
which was based on their work, was developed in 1980. Ethernet standards describe
low-level data transfer methods as well as the technical specifics that manufacturers
must know in order to construct Ethernet cards and connections.
Amity Directorate of Distance & Online Education
Network Basics 81
e
Consumers may now rely on off-the-shelf Ethernet goods to perform as expected and to
communicate with one another.
in
nl
O
ty
Ethernet Technology
si
10 megabits per second data transmissions are supported via traditional Ethernet
(Mbps). As network performance requirements grew, the industry developed new
Ethernet standards for Fast Ethernet and Gigabit Ethernet.
r
Fast Ethernet boosts regular Ethernet speeds to 100 Mbps, while Gigabit
ve
Ethernet boosts speeds to 1,000 Mbps. 10 Gigabit Ethernet (10,000 Mbps) networks
are presently powering the networks of some enterprises, data centres, and Internet2
entities, despite the fact that they aren’t available to the typical consumer.
5 (CAT5 cable) is the most widely used Ethernet cable, and it supports both standard
and Fast Ethernet. Gigabit Ethernet is supported by Category 5e (CAT5e) and Category
6 (CAT6) cables.
U
Plug an Ethernet cable into the gadget’s Ethernet port to connect it to a computer
(or other network device). Dongles, such as USB-to-Ethernet adapters, can be used to
connect devices that don’t have Ethernet connectivity. Ethernet cables employ RJ-45
connections, which are similar to those used on standard telephones.
ity
Ethernet’s Types
10Base5, often known as Thicknet, was the initial version of Ethernet technology.
Until 10Base2 Thinnet was introduced in the 1980s, the industry utilised Thicknet.
m
Thinnet has a smaller (5 millimetres vs. 10 millimetres) and more flexible cable than
Thicknet, making it easier to wire office buildings for Ethernet.
10Base-T cables use unshielded twisted pair (UTP) wire rather than coaxial, it has
better electrical qualities than Thicknet or Thinnet. In comparison to fibre optic cable,
10Base-T is much more cost-effective.
fibre optic networks and 10Broad36 for broadband cabling, are less well-known.
Fast Ethernet technology evolved in the mid-1990s, achieving its design aims of
Notes
e
improving standard Ethernet performance while avoiding the need to fully re-cable
existing Ethernet networks.
in
There are two types of fast Ethernet:
nl
100Base-FX is an acronym that stands for “100Base-FX (using fibre optic cable)
O
(100Base-T2 cabling modified to include two additional wire pairs).
Gigabit Ethernet
While Fast Ethernet increased the speed of standard Ethernet from 10 to 100
ty
megabits per second, Gigabit Ethernet surpasses Fast Ethernet by providing 1,000
megabits per second (1 Gigabit). Gigabit Ethernet was designed to travel through
optical and copper cable, but it is also supported by the 1000Base-T standard.
si
1000Base-T employs Category 5 cabling, which is equivalent to 100 Mbps Ethernet, but
it needs the installation of extra wire pairs to achieve gigabit speeds.
r
Ethernet Protocols and Topologies
ve
A bus topology is used in traditional Ethernet, which means that all devices or
hosts on the network share the same communication connection. Each device has
an Ethernet address, often known as MAC address. Ethernet addresses are used by
sending devices to designate the intended recipients of messages.
ni
Frames are the units of data delivered via Ethernet. A header, data section, and
footer with a total length of no more than 1,518 bytes make up an Ethernet frame. Both
the intended receiver and the sender’s addresses are included in the Ethernet header.
U
Data sent via Ethernet is disseminated to all devices on the network automatically.
Each Ethernet device checks each frame to see whether it was meant for it by
comparing the Ethernet address to the address in the frame header, and then reads or
ity
discards the frame as necessary. This feature is included into the hardware of network
adapters.
Devices that wish to transmit over an Ethernet network run a preliminary check
to see whether the medium is accessible and if a transmission is currently in process.
m
The transmitting device broadcasts onto the cable if Ethernet is available. However, it’s
feasible that two devices will execute this test at roughly the same time and broadcast
at the same time.
)A
adapter.
Ethernet protocol for broadcasting, listening, and detecting collisions. Some later
Notes
e
Ethernet versions do not use CSMA/CD. Instead, they employ the full-duplex Ethernet
protocol, which allows for simultaneous sending and receiving between two points
without the need for listening.
in
More Information about Ethernet Devices
The reach of Ethernet cables is restricted, and small spans (as little as 100
nl
metres) are insufficient to support medium and large network deployments. In Ethernet
networking, a repeater connects numerous cables and enables for longer distances to
be covered. A bridge device connects an Ethernet network to another form of network,
O
such as a wireless network. An Ethernet hub is a common form of repeater equipment.
Switches and routers are two more devices that are sometimes mistaken with hubs.
ty
adapters are incorporated into computers and game consoles.
Conclusion
si
Ethernet is one of the most important internet technologies. Despite its age,
Ethernet is still used to power many of the world’s local area networks, and it is
constantly improving to meet future high-performance networking requirements.
To the younger generations who have grown up under its influence, the answer
may appear simple, but defining it is not. The Internet, often known as the Globe Wide
(c
contains a wide range of material, ranging from top-secret military and research files to
Notes
e
the week’s most popular and viral video.
Everyone has access to this huge repository, and each computer contributes to the
in
ever-growing treasure mine of knowledge.
nl
for new services like internet phone and internet television. The communication
of information has been exponentially increased, and as a result, the interchange
of knowledge has resulted in a rise in the standard of living for many individuals
O
throughout the world.
The structure of the internet is what intrigues me the most. In terms of policy, it has
no centralised governance, either technologically or legally.
ty
The Internet’s History
In the 1960s, research into what was then known as packet switching gave birth to
si
the Internet. The hardware solution to the problem, i.e., the circuitry, was deemed to be
a better and faster means of transferring data than packet switching. The United States
Military’s development of ARPANET relied heavily on packet switching technology. The
ARPANET, sometimes known as the internet, was the first known network of networked
r
computers. This technique was used to relay sensitive information between military
ve
units.
This data sharing system was then made available to educational institutions
in the United States, allowing them to connect to the government’s supercomputer
at 56 kbit/s, 1.5 Mbit/s, and 45 Mbit/s, respectively. Com In the late 1980s, internet
ni
service providers began to emerge, and by 1995, the internet had been completely
commercialised in the United States.
U
telephone lines, infrared beams, and satellites all connect these interlinked computers.
The two primary types of computers networks are listed below.
A local area network (LAN) is a group of two or more linked laptops, computers, or
phones that share information in a small geographic area. A network of computers at
m
A wide area network (WAN) is made up of two or more interconnected local area
networks. These networks are more distant than a LAN’s systems. Telephone lines or
)A
The present internet population is estimated to be over 3.4 billion people, with Asia
accounting for 48.1 percent and North America accounting for 10%. With 3.4 billion
users, the internet has tremendous power and significance in today’s world.
(c
e
the internet’s convenience and inventiveness. People are in touch with each other in
greater numbers than ever before. Its destiny is now inextricably linked to the future of
our race. It has grown so important that it is woven into the very fabric of our society.
in
2.1.7 Protocol Layering
nl
Protocol layering is a strategy for simplifying networking designs by splitting them
into functional levels and assigning protocols to accomplish the tasks of each tier.
O
ty
r
Figure: Protocol layering
si
ve
Separating the duties of data delivery and connection management into different
layers, and hence separate protocols, is typical. As a result, one protocol is meant to
transport data, while another protocol, placed on top of the first, manages connections.
The data distribution protocol is straightforward and does not take into account
ni
connection management. As it does not have to deal with data transmission, the
connection management protocol is likewise extremely basic.
U
Simple protocols with a few well-defined duties are the result of protocol stacking.
The protocols can then be put together to form a functional whole. For certain purposes,
individual protocols can be deleted or replaced as needed.
The OSI Seven Layer Model and the Internet’s initial DoD model are the two most
ity
important layered protocol architectures. The current Internet is a hybrid of the two
paradigms.
The DARPA Internetwork Project, which eventually blossomed into the Internet,
used the Department of Defense Four-Layer Model in the 1970s. Although the OSI
Seven Layer Approach is rightfully favoured for new designs, the basic Internet
)A
From bottom to top, the four levels of the DoD model are:
1. The Network Access Layer is in charge of transmitting data over the hardware medium
currently in use. Depending on the type of physical network, several protocols are
(c
Notes
e
in
nl
O
Figure: DoD Four-Layer Model
ty
2. The Internet Layer is in charge of transporting data through a network of physical
networks that connect a source and destination equipment.
si
3. Routing protocols, as well as the IP Protocol, the Internet’s foundational protocol, are
most closely related with this layer.
4. Connection rendezvous, flow control, retransmission of lost data, and other basic
r
data flow management are all handled by the Host-to-Host Layer. The most essential
ve
elements of this layer are the mutually exclusive TCP and UDP protocols.
5. Protocols that implement user-level tasks such as mail delivery, file transfer, and
remote login are found under the Process Layer.
ni
abstract networking model (the Basic Reference Model, or seven-layer model) and a
set of specific protocols make up the OSI. The standard documents that explain OSI
are available for purchase and are not currently available on the internet.
ity
The abstract model, as specified in OSI 7498 and its subsequent addenda, has
affected Internet protocol development more than any other part of OSI. A networking
system is separated into layers in this paradigm. One or more entities implement each
layer’s functionality.
m
Each object only interacts with the layer underneath it directly and offers services
for the layer above it to utilise. Protocols allow an entity on one host to communicate
with a corresponding entity on another host at the same layer.
)A
(c
Notes
e
in
nl
O
Figure: OSI Seven-Layer Model
ty
The OSI Basic Reference Model has seven levels (from bottom to top):
si
mediums, as well as the electrical properties and interpretation of the signals that
are transmitted. This layer, for example, specifies the size of Ethernet coaxial cable,
the kind of BNC connector used, and the manner of termination.
2. r
The Data Link Layer (DLL) specifies the logical arrangement of data bits sent across
ve
a certain media. For example, the framing, addressing, and checksumming of
Ethernet packets are all defined by this layer.
3. The Network Layer shows how data may be sent between any two nodes in a
network through a series of exchanges through various data channels. This layer,
ni
delivery.
5. The Session Layer organises data sequences that are bigger than the packets
handled by the lower levels. In a remote procedure call, for example, this layer
ity
7. The Application Layer outlines how actual work is accomplished. This layer, for
example, would handle file system activities.
The original Internet protocol specifications established a four-level model, and
)A
protocols built around it (such as TCP) have a hard time fitting into the seven-layer
paradigm. The seven-layer model is used in the majority of recent designs.
\begin{soapbox}
The OSI Basic Reference Model has significantly more popularity than the OSI
(c
deemed efficient. European supremacy aided in the protection of their X.25 investments
Notes
e
(CONS is basically X.25 for datagram networks). Perhaps most crucially, X.25 data
networks were never as popular as the Internet, which has a long history of providing
free, downloadable protocol specifications and has been hesitant to adopt another
in
another networking scheme in which you had to pay to figure out how things operate.
Why should we care about that? The most serious flaw with OSI is that it does not
nl
provide anything novel. Its role as an “international standard” is the most compelling
argument for its deployment, although we already have a de facto worldwide standard
in the form of the Internet. Although OSI protocols will continue to exist, the concept of
networking reflected by its layered model will be the most important contribution.
O
If there’s one thing the Internet community should be concerned about, it’s the
risk of the IETF becoming another ISO: a large, overgrown standards organisation run
by committees, churning out thousands of pages of nonsense, and dominated by big
ty
business players more interested in protecting their investments than improving the
state of art.
\end{soapbox}
si
Advantages & Disadvantages of Protocol Layering
Advantages-The following are some of the benefits of layered protocols:
r
ve
1. As a result of protocols that operate at a certain layer having described information
that they work with and a defined interface to the layers above and below, it aids in
protocol style.
2. As items from several suppliers will work together, Foster’s competition will be fierce.
ni
application can’t figure out where a problem is or what the issue is in a complex
network.
3. The higher-level layers cannot control all aspects of the lower layers, so they cannot
)A
e
Fill in the blanks:
in
may transmit and receive data but not at the same time.
2. ____________ technologies allow several network connections to be combined into
a single link between two devices.
nl
3. Security protocols, often known as __________ protocols, strive to keep unwanted
users out of the network and the data transferred across it.
O
4. __________ is an Internet Protocol that specifies how data is delivered over the
internet and how web servers and browsers should respond to requests.
5. Standards are a collection of criteria for ___________ that are required for the flow
of data between devices.
ty
Summary
●● Computing protocols define rules for communication among processes within
si
a computer. Communication protocols define rules for communication among
computers connected to the same or different networks.
●●
r
Computing protocols are concerned with storage, retrieval and processing
functions of information management.
ve
1) Communication protocols are concerned with acquisition, transmission and
distribution functions of information management.
2) Examples of signalling from our daily life: i) A bus conductor’s whistle to stop
ni
and start the bus ii) Flagging of a sport event like running race iii) Indicator
lights in cars iv) Caller tunes in mobile phones.
3) Small Messaging Service is a connectionless service. One prepares a message
U
Activity
1. Gather all day-to-day life examples of the protocols you know.
m
Glossary
Notes
e
●● Data delivery: Data must be supplied to the relevant user and destination.
●● Accuracy: The data should be sent precisely and without any mistakes via
in
the communication mechanism. During transmission, data may get damaged,
reducing the accuracy of the data given.
●● Timeliness: Audio and video data must be supplied without delay in a timely way;
nl
this is known as real-time data transmission.
●● Jitter: This is the time difference between packet arrivals. The timeliness of data
being transferred may be harmed by uneven jitter.
O
●● Message: A message is a piece of information that is intended to be passed from
one person to another. It might be a text file, audio file, video file, or other type of
file.
ty
●● Sender: A sender is basically a device that transmits data. It might be a computer,
smartphone, laptop, video camera, or workstation, among other things.
●● Receiver: The term “receiver” refers to a device that receives communications. It
si
might be a computer, a phone, a workstation, or something else entirely.
●● Communication Channels / Transmission Medium: The medium that connects two
r
or more workstations is known as a communication channel. Workstations can be
linked via wired or wireless connections.
ve
●● Protocol: Simply known as a set of rules. When someone gives data (the sender),
it must also be intelligible by the recipient; otherwise, the data is useless. Rupali,
for example, sends a message to Nutan. It’s a pointless debate if Rupali writes in
ni
Further Readings:
U
1. Half-duplex communication
2. Link aggregation
3. cryptographic
4. HTTP (Hypertext Transfer Protocol)
(c
5. data transmission
e
Objectives
in
At the end of this unit, you will be able to:
nl
●● Functions of each layer of OSI model
●● Understanding of TCP/IP model and its four Layers
O
●● Detail Description of protocol used in each layer
●● Similarities of OSI and TCP/IP
Introduction
ty
Reference models in computer networks provide a conceptual foundation for
standardising communication between diverse networks.
si
The OSI Model and the TCP/IP Protocol Suite are two common reference models.
OSI Model
r
The International Standards Organisation (ISO) created the OSI (Open System
ve
Interconnection). It provides a layered networking architecture that conceptualises how
diverse systems should communicate. It is made up of seven layers that are all related.
Physical layer, data connection layer, network layer, transport layer, session layer,
presentation layer, and application layer are the seven levels of the OSI Model. The
ni
be used for both public and private networks and can communicate via the internet.
Notes
e
As shown in the diagram, the four levels are application layer, transport layer,
internet layer, and network access layer.
in
nl
O
Figure: TCP/IP Protocol Suite
ty
2.2.1 OSI Reference Model
Open System Interconnection (OSI) is a reference model that specifies how
information from one computer’s software application passes across a physical media
si
to another computer’s software application.
The OSI is made up of seven levels, each of which serves a different network
function.
r
ve
The International Organisation for Standardisation (ISO) established the OSI
model in 1984, and it is currently used as an architectural paradigm for inter-computer
communications.
The OSI model breaks down the process into seven smaller, more achievable
ni
The OSI model is split into two levels: upper and lower layers.
The OSI model’s top layer mostly deals with application-related difficulties, which
ity
are exclusively implemented in software. The application layer is the one that is closest
to the user. The software applications are interacted with by both the end user and the
application layer. The layer directly above another is referred to as an upper layer.
The OSI model’s lowest layer deals with data transmission difficulties. Hardware
m
and software are used to implement the data connection and physical layers. The
physical layer is the OSI model’s lowest layer, and it’s the one nearest to the physical
media. The physical layer is primarily in charge of putting data on the physical media.
)A
(c
Notes
e
in
nl
Figure: OSI Reference Model
O
OSI Layers and Their Functions
There are seven levels in the OSI model. Each layer has a distinct purpose. The
following is a list of seven layers:
ty
1. Physical Layer
2. Data-Link Layer
si
3. Network Layer
4. Transport Layer
5. Session Layer r
ve
6. Presentation Layer
7. Application Layer
ni
U
ity
m
Notes
e
in
nl
O
ty
Figure: Physical layer functions
Physical Layer
si
1. The physical layer’s primary duty is to transport individual bits from one node to
another.
2. It is the OSI model’s lowest layer.
3.
r
The physical link is established, maintained, and deactivated by it.
ve
4. It defines network interface mechanical, electrical, and procedural standards.
1. Line Configuration: This specifies how two or more devices can be physically
linked.
ni
Data-Link Layer
ity
m
)A
(c
This layer is in charge of ensuring that data frames are sent without errors.
e
It allows two or more devices to communicate reliably and efficiently.
in
It is divided into two layers:
nl
Layer of Logical Link Control
1. It is in charge of transmitting packets to the Network layer of the receiving device.
2. It extracts the network layer protocol’s address from the header.
O
3. It also regulates the flow of information.
ty
1. A Media Access Control Layer connects the Logical Link Control layer to the physical
layer of the network.
2. It is used to send and receive packets via a network.
si
The Data-link Layer’s Functions
1. Framing: The data connection layer converts the raw bit stream from the physical
r
into packets known as frames. The header and trailer are added to the frame by the
ve
Data link layer. The hardware destination and source addresses are included in the
frame header.
2. Physical Addressing: The Data Link Layer adds a destination address to the frame’s
header. The frame is sent to the specified destination address in the header.
ni
particular time.
Network Layer
It’s a layer 3 that handles device addressing and keeps track of where devices are
on the network.
m
Routers are layer 3 devices that offer routing services inside an internetwork. They
are specified at this layer and are utilised to deliver these services.
Network layer protocols are the protocols that are used to route network traffic. IP
(c
Notes
e
in
nl
O
ty
Figure: Network layer
si
Network Layer Functions:
1. Internetworking: The network layer’s primary job is internetworking. It establishes a
r
logical link between many devices.
ve
2. Addressing: The source and destination addresses are added to the frame header
by a network layer. On the internet, addressing is used to identify the device.
3. Routing: Routing is a significant component of the network layer that identifies the
best optimum path from the source to the destination among many paths.
ni
4. Packetizing: The packets from the higher layer are received by a Network Layer,
which turns them into packets. Packetizing is the term for this procedure. The internet
protocol is responsible for this (IP).
U
Transport Layer
The Transport layer is a Layer 4 that guarantees that messages are sent in the
ity
It gets data from the higher layer and turns it into segments, which are smaller
units.
m
Notes
e
in
nl
O
ty
Figure: Transport Layer
si
Service-point addressing: As computers execute several programmes at the
same time, data must be sent from source to destination not just from one machine
to another, but also from one process to another. The transport layer inserts a header
r
with the service-point address, also known as a port address. The network layer’s job is
ve
to send data from one computer to another, while the transport layer’s job is to get the
information to the right process.
Reassembly and segmentation: When the transport layer gets a message from the
higher layer, it separates it into numerous segments and assigns a sequence number
ni
to each segment, which uniquely identifies it. The transport layer reassembles the
message based on its sequence numbers after it has arrived at its destination.
Controlling the connection: Two services are provided by the transport layer. There
U
Flow control is likewise provided by the transport layer, however it is done end-to-
m
Error control is also the responsibility of the transport layer. Error control is carried
out from beginning to finish, rather than across a single connection. The sender transit
)A
layer ensures that the message arrives at its intended location without mistake.
(c
Session Layer
Notes
e
in
nl
O
ty
si
In the OSI model, it is a layer 3.
Presentation Layer
ity
m
)A
(c
The syntax and semantics of the information transferred between the two systems
are the primary concerns of the Presentation layer.
e
This layer is a component of the operating system that transforms data between
different display formats.
in
The syntax layer is another name for the presentation layer.
nl
Translation: Information is sent between two systems in the form of character
strings, integers, and so on. Different computers employ different encoding methods,
and the presentation layer is in charge of ensuring compatibility between them.
O
It translates data from a sender-dependent format to a common format, which it
then converts back to a sender-dependent format at the receiving end.
ty
of changing information sent by the sender into a different format and sending the
resultant message through the network.
si
of bits that must be transferred. In multimedia such as text, music, and video, data
compression is critical.
Application Layer r
ve
ni
U
ity
It deals with concerns like network transparency, resource allocation, and so on.
FTAM stands for file transfer, access, and management. A user can access files
(c
on a distant computer, recover files from a computer, and manage files on a remote
computer using an application layer.
Email services are provided via an application layer that allows for email forwarding
Notes
e
and storage.
in
Seven Layers in the OSI Model: Characteristics
nl
In the OSI Model, the first layer is the physical layer.
O
It is concerned with sending raw pieces of data through a physical media.
ty
1s and 0s are used to represent data. Light pulses, electric voltages, and radio
frequencies are used to represent this.
si
Signaling is handled by all devices at this layer.
This layer includes Ethernet cables, token ring networks, pin-outs, cable kinds, and
connectors, among other things.
r
ve
ni
U
ity
The OSI model’s data connection layer contains the following characteristics:
Media access control allows data to be moved from one device to another across a
connection.
)A
It manages the flow of bits and packets between data segments. The outcome is
referred to as frames. They contain material that is organised in a logical fashion.
e
devices.
The Data Link Layer is further broken down into two parts. Media Access Control
in
(MAC) and Logical Link Control (LLC) are the terms used to describe them.
nl
O
ty
Figure: Data link layer
si
3. The OSI Model’s Network Layer
The OSI model’s network layer contains the following characteristics:
Establishing pathways for the transit of data packets between network devices is
the responsibility of this role. r
ve
Direction of travel.
Routing.
ni
Switching packets.
Controlling traffic.
ity
e
The following are the properties of the transport layer in the OSI model:
in
component. This layer fragments and reassembles messages. It also manages the
trustworthiness of any particular connection.
nl
Data delivery is guaranteed.
O
Detection and recovery of errors.
The most prevalent transport protocols used at this tier are TCP and UDP.
ty
r si
ve
Figure: Transport layer
ni
Determines whether full or half duplex messages are exchanged during a session.
m
)A
(c
e
The OSI model’s presentation layer contains the following characteristics:
in
Compression of data.
nl
Translation of data.
O
Conversion of protocols.
ty
r si
ve
ni
It serves as a link between the computer’s software and the network protocol. It
delivers services that are required to keep the apps running.
This layer offers an interface for FTP, email, and telnet applications.
The following are some of the most often used protocols in this layer:
m
Simple Mail Transfer Protocol (SMTP) is a protocol for sending and (SMTP).
)A
Notes
e
in
nl
O
Figure: Application layer
ty
2.2.3 OSI Protocols
si
The OSI model serves as a guideline for creating network protocols. The protocols
utilised in each layer of the OSI model will be discussed in this chapter. When creating
a protocol using the OSI model, the first question to consider is which OSI layer will
r
give service to the new protocol. The functionality and network needs will determine
which layers are used. For example, suppose you wish to create a network protocol
ve
that simply requires IP packet routing capability. The new protocol will be above the OSI
model’s Network layer, and if connection-oriented message delivery is required, it will
be above the OSI model’s Transport layer.
ni
The following is a list of protocols and the OSI layer to which they belong.
DHCP stands for Dynamic Host Configuration Protocol. The TCP/IP protocol is
used in a real-world implementation of DHCP. The Dynamic Host Control Protocol is
the entire name. When the network connection is established. To function in a computer
network, a computer need an IP address. As a DHCP client, the machine that connects
ity
to the computer network. It makes a request to the server for the IP address. You may
have seen this while setting the IP address for a Windows machine’s Ethernet or LAN
device. In this situation, the internet router serves as a DHCP server.
ARP OSI layer: Address Resolution Protocol (ARP) is an OSI layer. It converts an
m
IP address to the Ethernet card’s MAC address. In the OSI model, ARP is the data link
layer protocol.
DNS OSI layer: This is a domain name system. It’s a protocol for the application
)A
layer.
ICMP OSI layer: It functions as an IP layer user. ICMP uses the IP layer protocol to
send protocol messages to the distant end. This is an application layer protocol since it
delivers a service to the end-user.
(c
UDP OSI layer: UDP (Universal Datagram Protocol) is a transport layer protocol.
This is a datagram protocol that does not need the establishment of a connection.
Although unreliable, it is useful for real-time distribution. It’s a protocol for the transport
Notes
e
layer.
Another example of a layer four (transport layer) protocol is the TCP OSI model. It
in
is a protocol that is based on TCP OSI: relationships.
OSI model and SS7: SS7 has a lot of layers. The table below shows the mapping
of SS7 protocol layers to the OSI model.
nl
SS7 Layers OSI Layers
MTP1 Physical Layer
O
MTP2 Data Link Layer
MTP3 Network Layer
SCCP Transport Layer
TACP, ISUP Session Layer and PResentation Layer
ty
MAP, INAP, Camel Application Layer
si
OSI layer and Telnet:
Telnet is an OSI model application layer protocol. It’s used for remote computer
r
network activities. The telnet protocol messages are transported via TCP/IP.
ve
SIP and OSI Layers:
In a VoIP network, Sip is a session initiation protocol. This is part of the OSI
application layer.
ni
makes advantage of the data link layer’s functions while also providing services to the
transport layer. SCTP, TCP, UDP, and other transport layer protocols are examples.
Host-to- The lowest layer, the network layer, is responsible for the physical
)A
conveyance of data. TCP/IP does not specify any protocol, although it does support all
of the common protocols.
The Internet Layer establishes the mechanisms for logical data transfer over a
network.
(c
The Internet Protocol (IP) is the principal protocol in this layer, and it is backed by
the protocols ICMP, RARP, IGMP, and ARP.
The Transport Layer is in charge of ensuring that data is delivered without errors
Notes
e
from beginning to end. Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP) are the protocols discussed here (UDP).
in
The uppermost layer, the application layer, defines the interface between host
programmes and transport layer services. Telnet, HTTP, DNS, FTP, SMTP, and other
high-level protocols are included in this layer.
nl
The layers and procedures in each layer are depicted in the diagram below.
O
ty
r si
ve
1. Network Access Layer — In the OSI model, this layer is a mix of the Data Link Layer
ni
and the Physical Layer. It looks for hardware addressing, and the protocols at this
layer enable data to be physically sent.
We recently discussed how ARP is an Internet layer protocol, but there is some
U
2. Internet Layer — This layer performs the same duties as the Network layer of the
OSI model. It specifies the protocols that are in charge of logical data transfer across
the whole network. The following are the key protocols found at this layer:
IP – stands for Internet Protocol, and it is in charge of sending packets from a source
m
The Internet Control Message Protocol (ICMP) is an acronym for Internet Control
Message Protocol. It is responsible for supplying hosts with information about
network faults and is contained within IP datagrams.
Address Resolution Protocol (ARP) is an acronym for Address Resolution Protocol.
(c
Its job is to determine a host’s hardware address from a known IP address. Reverse
ARP, Proxy ARP, Gratuitous ARP, and Inverse ARP are the four forms of ARP.
3. Host-to-Host Layer — This layer is similar to the OSI model’s transport layer. It is in
Notes
e
charge of end-to-end communication and error-free data transfer. It protects upper-
layer applications from data complexity. The following are the two primary protocols
found in this layer:
in
Transmission Control Protocol (TCP) — This protocol is notable for ensuring error-
free and reliable communication between end systems. It does data segmentation
nl
and sequencing. It also features an acknowledgement function and uses a flow
control method to govern data flow. It is a very effective protocol, but because of
these qualities, it has a lot of overhead. Increased overhead translates to higher
costs.
O
User Datagram Protocol (UDP) — On the other side, it lacks these capabilities. If
your application does not require dependable transmission, this is the protocol to use
because it is relatively cost-effective. UDP is a connectionless protocol, unlike TCP,
ty
which is a connection-oriented protocol.
4. Application Layer - This layer is responsible for the functions of the OSI model’s top
three layers: Application, Presentation, and Session Layer. It’s in charge of node-to-
si
node communication and user interface requirements. HTTP, HTTPS, FTP, TFTP,
Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, and LPD are some
of the protocols found in this layer. For further information on these protocols, see
r
Protocols in the Application Layer. Protocols not included in the linked article include:
ve
Hypertext transfer protocol (HTTP) and Hypertext transfer protocol (HTTPS) - HTTP
stands for Hypertext transfer protocol. The World Wide Web makes use of it to
coordinate communication between web browsers and servers. HTTPS (Hypertext
Transfer Protocol Secure) is a secure version of HTTP.
ni
Secure Shell (SSH) is an acronym for Secure Shell. It’s a terminal emulator programme
that works similarly to Telnet. The ability to maintain an encrypted connection is one
of the reasons SSH is recommended. It establishes a secure connection using a
U
TCP/IP connection.
Network Time Protocol (NTP) - NTP stands for Network Time Protocol. It’s utilised to
synchronise all of our computers’ clocks to a single common time source. It comes in
handy in circumstances such as bank transactions. Consider the following scenario
ity
in the absence of NTP. Consider a transaction in which your computer sees the time
at 2:30 p.m., but the server records it as 2:28 p.m. If the server is out of sync, it might
crash catastrophically.
m
receiving host to interpret the message, each computer engaged in the transmission
must obey certain principles. The TCP/IP protocol suite may be broken down into layers
(or levels).
The levels of the TCP/IP protocol are depicted in this diagram. Application Layer,
(c
Transport Layer, Network Layer, Network Interface Layer, and Hardware are listed in
order from top to bottom.
Notes
e
in
nl
Figure: TCP/IP suite protocols
TCP/IP is a protocol that specifies how data is sent from a sender to a receiver.
O
Application programmes first transmit messages or data streams to one of the
Internet Transport Layer Protocols, such as the User Datagram Protocol (UDP) or the
Transmission Control Protocol (TCP) (TCP). These protocols take the data from the
application, break it down into packets, add a destination address, and then send the
ty
packets to the next protocol layer, the Internet Network layer.
The Internet Network layer encapsulates the packet in an Internet Protocol (IP)
datagram, adds the datagram header and trailer, determines where to deliver the
si
datagram (directly to a destination or via a gateway), and transfers the datagram to the
Network Interface layer.
r
The Network Interface layer receives IP datagrams and sends them as frames
across network devices such as Ethernet or Token-Ring.
ve
ni
U
ity
m
)A
This diagram depicts the flow of data from the Sender to the Host through the TCP/
IP protocol levels.
(c
Frames received by a host go backwards through the protocol levels. Until the data
reaches the application layer, each layer removes the matching header information.
Notes
e
in
nl
O
ty
Figure: Information is sent from the host to the application.
si
This diagram depicts the flow of data from the Host to the Sender through the TCP/
IP protocol levels.
r
The Network Interface layer receives frames (in this case, an Ethernet adapter).
ve
The datagram is sent up to the Network layer after the Network Interface layer removes
the Ethernet header. The Internet Protocol pulls the IP header from the packet and
sends it up to the Transport layer in the Network layer. TCP (in this example) takes out
the TCP header and delivers the data up to the Application layer in the Transport layer.
ni
On a network, hosts send and receive data at the same time. Figure depicts a host
in more detail as it communicates.
U
ity
m
)A
(c
Data is seen flowing in both directions across the TCP/IP layers in this diagram.
Notes
e
Version 6 of the Internet Protocol (IP)
in
IP version 6 (IPv6 or IPng) is the next generation of the Internet Protocol (IP). It
was created as a natural progression from IP version 4. (IPv4).
Tracing packets
nl
Packet tracing is the process of determining a packet’s journey through the layers
to its destination.
O
Packet headers for network interfaces
Packet headers are connected to outgoing data at the Network Interface layer.
ty
Protocols at the network level of the Internet
Machine-to-machine communication is handled through Internet network-level
protocols.
si
Transport-Level Protocols on the Internet
Application programmes can connect with one another using the TCP/IP transport-
level protocols. r
ve
Application-Level Protocols over the Internet
At the application software level, TCP/IP implements higher-level Internet protocols.
ni
Numbers Assigned
Well-known numbers are allocated to Internet versions, networks, ports, protocols,
and protocol choices for interoperability with the general network environment.
U
Machines, networks, operating systems, protocols, services, and terminals have all
been given well-known names.
e
Connectionless Network Layers exist.
The OSI model is a foundation upon In certain ways, the TCP/IP paradigm is
in
which networks are constructed. It is an implementation of the OSI model.
commonly used as a guiding tool.
The OSI model's network layer offers both In the TCP/IP paradigm, the Network
nl
connection-oriented and connectionless layer offers connectionless service.
services.
The OSI model has a challenge in fitting Any protocol does not suit the TCP/IP
protocols into it. paradigm.
O
The OSI model hides protocols, which It is difficult to replace a protocol in TCP/
may be readily altered as technology IP.
evolves.
ty
The OSI model explicitly specifies Services, interfaces, and protocols are
services, interfaces, and protocols, as not explicitly separated in TCP/IP. It's also
well as the differences between them. It is protocol specific.
protocol agnostic.
si
It is made up of seven layers. It is made up of four layers.
4. __________ are standards for communication formats and processes that allow
machines and application programmes to communicate with each other.
U
5. The Network Interface layer receives __________ and sends them as frames across
network devices such as Ethernet or Token-Ring.
Summary
ity
Activity
1. Draw OSI & TCP/IP Layer Protocols and make a concept map with its important
functions.
(c
e
2. What is TCP/IP Layer Protocol? Write the advantages.
3. Describe OSI Model.
in
4. What do you understand on simple routing protocols? Describe briefly.
Glossary
nl
●● Open System Interconnection (OSI) is a reference model that specifies how
information from one computer’s software application passes across a physical
media to another computer’s software application.
O
●● Framing: The data connection layer converts the raw bit stream from the physical
into packets known as frames. The header and trailer are added to the frame by
the Data link layer. The hardware destination and source addresses are included
in the frame header.
ty
●● Physical Addressing: The Data Link Layer adds a destination address to the
frame’s header. The frame is sent to the specified destination address in the
header.
si
●● Connectionless: A service or protocol that commences information transfer without
establishing a connection with the destination
●● Addressing: The source and destination addresses are added to the frame header
r
by a network layer. On the internet, addressing is used to identify the device.
ve
●● Routing: Routing is a significant component of the network layer that identifies the
best optimum path from the source to the destination among many paths.
●● Packetizing: The packets from the higher layer are received by a Network Layer,
which turns them into packets. Packetizing is the term for this procedure. The
ni
Further Readings:
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
2. Achyut S. Godbole, Web Technoligies TATA McGrawHill, 2003.
3. Berhouz Forouzan, TCP/IP Protocol Suite, 3rd edition, TATA McGraw Hill,
m
2006.
4. Protocols
5. IP datagrams
Amity Directorate of Distance & Online Education
Network Basics 113
e
Objectives
in
At the end of this unit, you will be able to:
nl
●● Describe time and frequency - domain concepts
●● Compare difference between analog and digital signal
O
●● Know type of transmission impairments
●● Understand transmission media.
Data transmission is the process of sending digital or analogue data to one or
ty
more devices across a communication channel. It allows devices to communicate and
transmit data in a variety of contexts, including point-to-point, point-to-multipoint, and
multipoint-to-multipoint.
si
Although data transmission can be analogue or digital, it is most commonly used
to deliver and receive digital data. As a result, data transfer is also known as digital
communications or digital transmission.
r
It’s used when a device wants to send a data item or file to one or more recipients.
ve
The digital data arrives in the form of digital bit streams from the source device.
For transmission to the destination device, these data streams are positioned over
a communication channel. A baseband or passband signal can be sent forth.
ni
Data transmission can also be done internally, between various portions of the
same device, in addition to outward communication. Data transmission is the process of
transmitting data from a random-access memory (RAM) or a hard drive to a processor.
U
2.3.1 Introduction
The direction of information flow between two communication devices is defined
by the Data Transmission mode. It’s also known as Directional Mode or Data
ity
The Physical Layer of the Open System Interconnection (OSI) Layer Model is
dedicated to data transmission in the network. It primarily determines the direction in
m
which data must travel in order to reach the reception system or node.
So, in this chapter, we’ll look at several data transmission modalities based on the
)A
direction of transmission, synchronisation between the transmitter and receiver, and the
quantity of bits delivered at the same time.
1. Simplex
2. Half-Duplex
3. Full duplex
Notes
e
Based on the synchronisation between the transmitter and the receiver, data
transmission modalities may be divided into two categories:
in
1. Synchronous
2. Asynchronous
nl
Based on the amount of bits delivered concurrently through the network, data
transmission modalities may be divided into two categories:
1. Serial
O
2. Parallel
Let’s take a look at each of the many data transmission modalities in a computer
network one by one.
ty
According to the direction of information exchange:
1. Simplex
si
Simplex is a data transmission mode in which data can only travel in one direction,
resulting in unidirectional communication. A transmitter can only send data in this mode
and cannot receive it. A receiver, on the other hand, can only receive data and not
transmit it. r
ve
This transmission method isn’t as common as others since it doesn’t allow for two-
way contact between the sender and recipient. It’s mostly utilised in the business world,
such as in sales that don’t demand a response. It’s analogous to driving down a one-
way street.
ni
For example, radio and television transmissions, keyboards and mouse, and so on.
U
As data goes solely in one way, it has the least or no data traffic difficulties.
There is no means for sending information back to the sender (No mechanism for
acknowledgement).
(c
2. Half-Duplex
Half-duplex data transmission allows data to travel in both ways but only in one
direction at a time. Semi-Duplex is another name for it. To put it another way, each
Amity Directorate of Distance & Online Education
Network Basics 115
station may send and receive data, but not at the same time. When one device is
Notes
e
sending, the other is only capable of receiving, and vice versa.
Each direction can use the complete capacity of the channel in this sort of
in
transmission method. Data can be transferred in both directions over transmission lines,
but only in one direction at a time.
nl
requirement for simultaneous communication in both directions.
O
ty
Figure: Half-Duplex
It may be used to detect errors when the sender fails to send or the receiver fails
to receive data correctly. The data must be re-transmitted by the receiver in such
si
instances.
r
The benefits of adopting a half-duplex transmission method are as follows:
ve
It allows for the most efficient utilisation of the communication channel.
Due to the fact that only one way communication is available at a time,
U
3. Full-Duplex System
Full-duplex data transmission allows information to travel in both directions at the
ity
When compared to half-duplex mode, full-duplex mode has twice the bandwidth.
The channel’s capacity is split between the two communication routes. When
m
Consider a telephone network in which both parties may talk and listen to each
)A
Figure: Full-Duplex
e
Both directions of two-way communication can be carried out at the same time.
It’s the quickest way for gadgets to communicate with one other.
in
The downsides of employing a half-duplex transmission method are as follows:
The communication channel’s capacity is split into two halves. Furthermore, there
nl
is no specialised data transfer channel.
As there are two different pathways for two connecting devices, it has inefficient
channel bandwidth use.
O
The following is based on the synchronisation of the transmitter and receiver:
Synchronised
ty
The synchronous transmission mode is a method of communication in which bits
are transferred one after the other without any pauses or start/stop bits.
si
The transmitter and receiver are both timed by the same system clock.
Synchronisation is done in this manner.
As the bits are transmitted sequentially with no space between each character in
synchronous mode, it is required to provide certain synchronisation components with
the message; this is referred to as “Character-Level Synchronisation.”
U
If there are two bytes of data, for example (10001101, 11001011), it will be
transferred in synchronous mode as in the figure:
ity
Figure Synchronous
m
It is really costly.
2. Asynchronous
Notes
e
The asynchronous transmission mode is a type of communication in which the
message contains a start and stop bit. The start and stop bits ensure that data from the
in
sender to the receiver is appropriately delivered.
The start bit is usually ‘0,’ whereas the end bit is usually ‘1.’
nl
The term asynchronous refers to asynchronous behaviour at the byte level,
although the bits remain synchronised. Each character has a consistent and
coordinated timing between them.
O
Data bits can be transferred at any point in time in an asynchronous style of
communication. Only one data byte may be transferred at a time, and messages are
delivered at unpredictable intervals.
ty
This transmission technique is suitable for data delivery over short distances.
If there are two bytes of data, for example (10001101, 11001011), it will be
delivered in asynchronous mode as shown in the diagram:
r si
ve
ni
Figure: Asynchronous
1. As of the gaps between separate blocks of data, data transmission may be slower.
2. According to the quantity of bits transferred in a network at the same time:
m
1. Serial
Serial data transmission mode is a method in which data bits are transferred one
)A
Figure: Serial
For communication, it only requires a single transmission line. The data bits are
Notes
e
received in synchrony with each other. As a result, synchronising the transmitter and
receiver is a difficulty.
in
The system requires many clock cycles to convey the data stream in serial data
transmission. The data integrity is preserved in this mode because the data bits are
transmitted in a precise order, one after the other.
nl
This kind of transmission is suitable for long-distance data transfer or when the
amount of data being delivered is modest. Data transmission between two computers,
for example, utilising serial ports.
O
The following are some of the benefits of employing serial transmission mode:
ty
2. There are fewer cables, and the complexity is reduced.
3. It is a cost-effective solution.
The downsides of employing a serial communication method are as follows:
si
Due to a single transmission channel, data transfer is sluggish.
2. Parallel
r
The parallel data transmission mode sends data bits one at a time in a parallel
ve
fashion. To put it another way, there is a simultaneous transmission of n-bits.
ni
U
ity
m
Figure: Parallel
data must be transferred in a short length of time, this style of transmission is utilised. It
is mostly used for communication over short distances.
We need n-transmission lines for n-bits. As a result, the network becomes more
complicated, yet the transmission speed remains high. If two or more transmission
(c
lines are too near together, there is a risk of data interference, which will degrade signal
quality.
e
The advantages of employing a parallel transmission mode are as follows:
in
2. As of the n-transmission channel, data transmission speed is very fast.
3. The following are some of the drawbacks of adopting parallel transmission:
nl
4. It needs additional transmission channels, making it inefficient.
5. Interference in data bits, as well as visual conferencing, is a problem.
O
As a result, after learning about the various transmission modes, we can infer that
the following factors must be considered when choosing a data transmission mode:
ty
2. The length of time it lasts.
3. Installation Costs and Ease
4. The ability to withstand adverse environmental circumstances.
si
2.3.2 Serial vs Parallel Transmission
r
The method data is sent is the major distinction between serial and parallel
ve
transmission. It is sequential in serial transmission, but it is simultaneous in parallel
transmission. Data is conveyed digitally using bits in the computer world. Data is
transferred consecutively via serial transmission, with each bit sent one after the other
over a single cable. Data is conveyed in parallel when numerous bits are supplied at
the same time over multiple wires in parallel transmission. Serial transmission provides
ni
greater advantages than parallel transmission for a variety of reasons, which we will
explore below. As a result, serial transmission is now employed in the majority of
interfaces, such as USB, PCI Express and SATA.
U
order. Let’s say we have a byte of data to send via a serial communication channel:
“10101010.” Bit by bit, one after the other, it transmits. The number “1” is sent first,
followed by “0,” “1,” and so on. As a result, only one data line/wire is required for
transmission, which is advantageous in terms of cost. Serial transmission is used
in many transmission methods nowadays because it offers various advantages. One
m
In that situation, the clock speed can be adjusted to a very high level, resulting in
)A
a high baud rate. As of the same reason, serial transmission may be used over great
distances without difficulty. Furthermore, because there are no nearby parallel lines, the
signal is not influenced by problems like cross talk and interference from adjoining lines,
which may occur in parallel transmission.
(c
Notes
e
in
nl
O
ty
Figure: This figure is showing a serial transmission cable
The most frequently used interface in the computer industry today, USB (Universal
si
Serial Bus), is also serial. Serial communication is also used in Ethernet, which we
utilise to link networks. SATA (Serial Advanced Technology Attachment) is a serial
interface that is used to connect hard drives and optical disc readers. Firewire, RS-485,
r
I2C, SPI (Serial Peripheral Interface), and MIDI are examples of other well-known serial
ve
communication systems (Musical Instrument Digital Interface). Furthermore, PS/2,
which was used to link mice and keyboards, was a serial protocol. Most crucially, PCI
Express, which is used to connect current graphics cards to PCs, uses a serial mode.
ni
of eight independent lines or wires. Consider the data byte “10101010” that we wish
to send through parallel transmission. The first line sends “1,” the second line sends
“0,” and so on, all at the same time. Each line simultaneously delivers the bit that
corresponds to it. The drawback is that many cables are required, which increases the
ity
cost. Furthermore, because more pins are required, the ports and slots become bigger,
making it unsuitable for tiny, embedded devices.
The first thought that springs to mind when discussing parallel transmission is
that it should be quicker because several bits are delivered at the same time. Although
m
this is true in theory, parallel transmission is actually slower than serial transmission
for practical reasons. The reason for this is that before the next data set is delivered,
all parallel data bits must be received at the receiver’s end. However, the signal on
)A
separate cables might take different times, and so not all bits are received at the same
time, necessitating a waiting interval for synchronisation. As a result, the clock speed
cannot be adjusted as much as it can in serial transmission, resulting in the slow speed
of parallel transmission.
between adjoining cables degrade the signals. Parallel transmission is utilised for
short distances for these reasons. The printer port, commonly known as IEEE 1284, is
the most well-known parallel transmission. This is the port that’s also referred to as a
Notes
e
parallel port. This was utilised by printers, but it is no longer frequently used. Previously,
PATA was used to link hard drives and optical disc readers to the PC (Parallel Advanced
Technology Attachment). These ports, as we all know, are no longer in use, having
in
been supplanted by serial transmission methods.
nl
O
ty
si
Figure: IEEE 1284 Cable
SCSI (Small Computer System Interface) and GPIB (General Purpose Interface
r
Bus) are two more parallel transmission interfaces utilised in the industry.
ve
However, it is critical to understand that the computer’s quickest bus, the front side
bus, which connects the CPU and RAM, is a parallel transmission.
2. Serial transmission requires just one cable, but parallel transmission requires several
wires.
3. Serial buses are often smaller than parallel buses due to the lower number of pins.
ity
4. Parallel transmission lines, on the other hand, encounter interference and cross talk
concerns owing to adjoining lines, but serial transmission lines do not.
5. By boosting the clock rate to extremely high levels, serial transmission may be made
much quicker. However, with parallel transmission, the clock rate must be set slower
m
in order to synchronise the entire receipt of all bits, hence parallel transmission is
often slower than serial transmission.
6. Parallel transmission lines cannot transport data over great distances, however
)A
In today’s computer sector, serial transmission is far more common than parallel
transmission. The reason for this is because serial transmission can send data over a
great distance at a very low cost. The main distinction is that serial transmission sends
Amity Directorate of Distance & Online Education
122 Network Basics
just one bit at a time, whereas parallel transmission sends many bits at the same time.
Notes
e
As a result, serial transmission only requires one wire, but parallel transmission need
numerous lines. Serial transmission is used in devices such as USB, Ethernet, SATA,
and PCI Express. Parallel transmission is no longer extensively utilised; however, it was
in
once used in printer ports and PATA.
nl
Transmission mode refers to the method or procedure by which data is sent from
one device to another. This technique of data transfer is sometimes referred to as
O
“communication mode.”
As a result, we may say that data is sent from one device to another using a
transmission mechanism. The transmission mode determines which direction data
must travel in order to reach the receiving system or node. In the physical layer, the
ty
transmission mode is defined.
si
1) Simplex mode
2) Half duplex mode
3) Full duplex mode
r
ve
ni
U
Simplex
All data flow in simplex communication is unidirectional.
ity
A simplex communication channel delivers and receives data in just one direction.
On a connection, only one of the two devices can send, while the other can only
receive.
m
A radio station, for example, normally delivers information to the listeners in one way
but never gets a signal from them. Other monitors, keyboards, and a television station
)A
2. It means that the station may use the whole bandwidth of the communication channel,
Notes
e
allowing for more data to be transferred at once and avoiding traffic congestion.
Simplex mode has one disadvantage: bidirectional communication is not possible.
in
As a result, two devices cannot connect utilising the simplex method of transmission.
means There is no device-to-device communication.
nl
Data can be readmitted in both ways on a signal carrier in half duplex mode, but
not at the same time. This permits the sender and receiver to speak with one another,
O
but they must first wait for the other. As information may travel in both directions, half
duplex can have a greater performance output than a simplex channel. It is actually a
simplex channel whose transmission direction can be altered at some time.
ty
may be used to switch on the transmitter while also turning off the receiver.
si
Figure: Half duplex transmission mode
When one device sends data, the other must wait for it.
Due to the fact that only one way communication is available at a time,
U
because there are two communication lines connecting them, persons on both ends
of a conversation may talk and be heard at the same time. As a result, employing full
duplex mode can considerably improve communication efficiency.
e
1. At the same time, both stations can send and receive data.
2. It is the quickest form of device communication.
in
Disadvantages of Full duplex:
1. The communication channel’s capacity is split into two halves. There is also no
nl
specialised data transfer route.
2. As there are two different pathways for two connecting devices, it has inefficient
channel bandwidth use.
O
2.3.4 Digital Transmission
Analog and digital storage are two methods for storing data or information. The
ty
data must be in distinct digital form for a computer to utilise it. Signals, like data, can
have both analogue and digital forms. Data must first be transformed to digital form
before it can be transmitted digitally.
si
Conversion from Digital to Digital
This section describes how to transform digital data into digital signals. There
r
are two ways to do it: line coding and block coding. Line coding is required for all
communications, but block coding is optional.
ve
Line Coding
Line Coding is the process of transforming digital data into digital signals. Binary
ni
data is the most common type of digital data. Internally, it is represented (stored) as a
succession of 1s and 0s.
U
ity
Discrete signal, which represents digital data, denotes a digital signal. There are
three different types of line coding schemes:
)A
(c
e
Unipolar encoding techniques encode data with a single voltage level. In this
scenario, high voltage is delivered to represent binary 1 while no voltage is transmitted
in
to represent binary 0. As there is no rest condition, it is also known as Unipolar-Non-
return-to-zero. It either represents 1 or 0.
nl
O
ty
Figure: Unipolar encoding
Polar Encoding
si
Polar Encoding is a type of coding that is used.
Multiple voltage levels are used to represent binary information in the polar
encoding system. There are four types of polar encodings:
r
Non-Return to Zero in the Polar Regions (Polar NRZ)
ve
To represent binary values, it requires two separate voltage levels. In general,
positive voltage equals 1 and negative voltage equals 0. It’s also NRZ because to the
lack of a rest period.
ni
The NRZ system is divided into two parts: NRZ-L and NRZ-I.
U
ity
m
)A
When a different bit is detected, NRZ-L changes voltage level, whereas NRZ-I
(c
e
The problem with NRZ is that if the sender and receiver’s clocks are not synced,
the receiver cannot determine when a bit finished and when the next bit begins.
in
nl
O
Figure: Return to Zero (RZ)
ty
Positive voltage is used to indicate 1, negative voltage is used to represent 0 and
zero voltage is used to represent none. Signals change between bits, not during them.
si
Manchester
RZ and NRZ-L are combined in this encoding technique. The duration of a bit is
split into two parts. When a different bit is met, it changes phase and transits in the
midst of the bit. r
ve
Differential Manchester
RZ and NRZ-I are combined in this encoding technique. It likewise transits in the
centre of the bit, but only when 1 is encountered does it change phase.
ni
Redundant bits are utilised to guarantee that the received data frame is accurate.
In even-parity, for example, one parity bit is inserted to make the frame’s count of 1s
even. The initial number of bits is raised in this way. It’s known as Block Coding.
e
Where n > m, an m-bit block is replaced by an n-bit block. Three phases are
involved in block coding: division, substitution, and combination.
in
It is then line coded for transmission when block coding is completed.
nl
Microphones produce analogue speech, while cameras provide analogue video,
both of which are processed as analogue data. Analog to digital conversion is required
to transport this analogue data via digital impulses.
O
Digital data is discrete, but analogue data is a continuous stream of data in the wave
form. Pulse Code Modulation is used to transform analogue waves into digital data (PCM).
ty
si
Figure: Sampling
r
One of the most often utilised methods for converting analogue data to digital form
ve
is PCM. There are three steps to it:
Figure: Quantisation
Every T interval, the analogue signal is sampled. The rate at which an analogue
ity
signal is sampled is the most essential element in sampling. The sample rate must be
at least two times the signal’s maximum frequency, according to the Nyquist Theorem.
Encoding
m
Figure: Encoding
Amity Directorate of Distance & Online Education
128 Network Basics
Each estimated value is then transformed into binary format during encoding.
Notes
e
Transmission Modes
in
How data is sent between two computers is determined by the transmission method.
Binary data in the form of 1s and 0s may be sent in two ways: parallel and serial.
Parallel Transmission
nl
O
ty
si
Figure: Parallel Transmission
The binary bits are grouped into fixed-length groups. With the same number of
r
data lines, the transmitter and receiver are linked in parallel. Both computers can tell
the difference between high and low order data lines. On all lines, the sender sends
ve
all the bits at the same time. A whole group of bits (data frame) is transferred in one go
because the data lines are equal to the number of bits in a group or data frame. Parallel
transmission has the advantage of fast speed, but the downside is the cost of wires,
which is proportional to the number of bits delivered in parallel.
ni
Serial Transmission
Bits are sent one after the other in a queue in serial transmission. Only one
U
the receiver in identifying the start and end of data bits. Every data byte, for example,
is prefixed with a 0 and one or more 1s are appended at the end. A gap may exist
between two continuous data-frames (bytes).
sends data bits without keeping a space between bytes (8-bits). Several bytes can be
Notes
e
included in a single burst of data bits. As a result, time becomes extremely essential.
The receiver is responsible for recognising and separating bits into bytes. Synchronous
transmission offers the advantage of fast speed and does not have the overhead of
in
additional header and footer bits compared to that of asynchronous transmission.
nl
Fill in the blanks:
O
2. Bytes are transferred as _________ in a continuous stream of bits in the Synchronous
method of data transmission.
3. The asynchronous transmission mode is a type of communication in which the
ty
message contains a ________ bit.
4. Serial data transmission mode is a method in which data bits are transferred one
after the other via the transmission channel in a _____________ order.
si
5. ___________ is the simultaneous transmission of parallel data bits.
Summary
●● r
Transmissions can take place across guided or unguided medium, and they can
ve
be simplex, half duplex, or full duplex.
●● Simplex data/signals are transmitted in one way by a station, i.e., by the sender;
half duplex data/signals can be communicated in one direction at a time; and full
duplex data/signals can be broadcast in both directions.
ni
●● The time domain and frequency domain concepts are concerned with
electromagnetic signals and components at distinct frequencies in the spectrum.
●● The notion of analogue and digital transmission is concerned with data signalling
U
and transmission, which can be analogue data, i.e., a signal that occupies the
same spectrum as digital data, and digital data that is encoded using a modem to
generate an analogue signal.
ity
●● The third kind of transmission is digital, which employs bit stream. Magnetic media
are used in transmission and are one of the most prevalent ways to physically
store data on tapes, floppy discs, and hard drives.
●● Twisted pairs are utilised for both analogue and digital transmission. Twisted pair
m
can be cat 3, cat 5, or both. They are both UTP cables. Base band cable is used
for longer distances at fast speeds.
●● Typically, 50 ohm and 75 ohm are utilised. Broadband Coaxial cable is anything
)A
Activity
1. Draw the directions of transmission flows in different types of Data Transmission.
2. Let’s say we have a byte of data to send via a serial communication channel:
Notes
e
“10101010.” Write the order of transmission.
in
1. What is Analog data transmission?
2. Explain the use of repeaters with respect to data transmission.
nl
3. What is the difference between data rate and bandwidth?
4. Write a short note on Frequency Domain Concepts.
O
5. What is parallel transmission, and how does it work?
Glossary
●● Open System Interconnection (OSI) is a reference model that specifies how
ty
information from one computer’s software application passes across a physical
media to another computer’s software application.
●● Framing: The data connection layer converts the raw bit stream from the physical
si
into packets known as frames. The header and trailer are added to the frame by
the Data link layer. The hardware destination and source addresses are included
in the frame header.
●● r
Data transmission: It is the process of sending digital or analogue data to one or
ve
more devices across a communication channel.
●● Simplex: It is a data transmission mode in which data can only travel in one
direction, resulting in unidirectional communication.
ni
●● Half-duplex Data Transmission: It allows data to travel in both ways but only in one
direction at a time.
●● Full-duplex Data Transmission: Full-duplex data transmission allows information to
U
Further Readings:
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
ity
2. blocks
3. start and stop
4. sequential
(c
5. Parallel transmission
e
Structure:
in
3.1 Application Layer Protocols
3.1.1 Introduction
nl
3.1.2 Client-Server Model
3.1.3 File Transfer Protocol(FTP)
O
3.1.4 E-mail Protocol (SMTP)
3.1.5 Domain Name System (DNS)
3.1.6 Hyper Text Transfer Protocol (HTTP)/(HTTPS)
ty
3.1.7 World Wide Web (WWW)
3.1.8 Streaming Audio and Video
3.1.9 Application Protocol Intercation with End-User Application
si
3.1.10 Application Layer Services
3.2 Transport Layer Protocols
3..2.1 Introduction-TCP/IP Layers r
ve
3.2.2 End Point Identification
3.2.3 Well-known Port Numbers
3.2.4 Message Oriented Interfaces
ni
e
Objectives
in
At the end of this unit, you will be able to:
nl
●● Describe the operation of application layer protocols
●● Understand the role and meaning of Domain Name System (DNS)
O
●● Describe and understand the working of Simple Mail Transfer Protocol (SMTP)
●● Learn Telnet and File Transfer Protocol (FTP)
Introduction
ty
The Transport Layer is responsible for sending data between two points. As a
result, it handles a variety of tasks, including data retransmission if the prior attempt
failed, flow control, and error control. You should be aware of the differences between
si
Transport Layer and DLL error control. Let us learn about them in the coming chapters:
3.1.1 Introduction
r
ve
The application layer of the internet protocol suite provides communication
protocols and interface methods that are used to process communication across the
network. Telnet, FTP, TFTP, SMTP, SNMP, DNS, and DHCP are among the protocols
found in the application layer. Application layer protocols. The applications layer
protocols are listed below.
ni
1. TELNET: Application Layer - This layer is close to the user interface. The Application
Layer is where the user interacts with the network. Let’s talk about the HTTP Protocol.
U
The end user is given a rule by the application layer about data transfer over the
internet. It is more focused on software.
Command:
ity
telnet [\\RemoteServer]
\\RemoteServer: Specifies the name of the server to which you want to connect
2. FTP (File Transfer Protocol): FTP stands for file transfer protocol. It is the protocol
m
that allows us to send and receive files. This may be done between any two machines
that use it. FTP, on the other hand, is both a protocol and an application. FTP allows
users to share files with others over the internet using a secure and efficient data
transfer protocol. For FTP, the data port is 20 and the control port is 21.
)A
Command:
ftp machinename
3. TFTP: The Trivial File Transfer Protocol (TFTP) is a stripped-down, stock version of
(c
FTP that you should use if you know exactly what you’re looking for and where to get
it. It’s a simpler form of FTP that allows you to transfer data across network devices.
e
Command
tftp [ options... ] [host [port]] [-c command]
in
4. NFS (Network File System): This stands for a network file system. It allows remote
computers to mount file systems across a network and interact with them as if they
nl
were locally mounted. This allows system administrators to concentrate resources
on the network’s centralised servers. The NFS port number is 2049.
Command
O
service nfs start
5. SMTP (Simple Mail Transfer Protocol): SMTP stands for Simple Mail Transfer
Protocol. The TCP/IP protocol includes it. SMTP transmits your email on and across
ty
networks via a procedure known as “store and forward.” It collaborates with the Mail
Transfer Agent (MTA) to deliver your message to the correct computer and email
mailbox. The SMTP port number is 25.
si
Command
MAIL FROM:<[email protected]?
6.
r
Line Printer Daemon (LPD): This stands for Line Printer Daemon. It’s made for
ve
shared printers. It’s the section that takes the request and processes it. A server or
agent is referred to as a “daemon.” The LPD port number is 515.
Command
ni
lpd [ -d ] [ -l ] [ -D DebugOutputFile]
Command
Run xdm in runlevel 5
8. SNMP (Simple Network Management Protocol): SNMP stands for Simple Network
Management Protocol. It collects data by polling network devices at specified or
m
The SNMP port numbers are 161 (TCP) and 162 (UDP) (UDP).
Command
snmpget -mALL -v1 -cpublic snmp_agent_Ip_address sysName.0
(c
9. DNS (Domain Name System): DNS stands for Domain Name System. As a result,
every time you use a domain name, a DNS provider must convert the name into an
IP address. The domain name www.abc.com, for example, may be translated as
198.105.232. 4.
Notes
e
Command
in
ipconfig /flushdns
10. DHCP: It stands for Dynamic Host Configuration Protocol and its port number is 53.
(DHCP). It assigns IP addresses to servers. When a computer registers for an IP
nl
address with a DHCP server, the DHCP server can offer a lot of information to the
host. The DHCP port numbers are 67 and 68.
Command
O
clear ip dhcp binding {address | * }
ty
The client-server paradigm is a distributed application structure that divides tasks
or labour between servers, who supply a resource or service, and clients, who request
that service. When a client computer submits a data request to the server via the
si
internet, the server acknowledges the request and returns the data packets requested
to the client. Clients do not share any of their assets with one another. Email, the World
Wide Web, and other client-server models are examples.
r
What is the Client-Server Model and how does it work?
ve
In this post, we’ll look at the Client-Server concept and how the Internet operates
using web browsers. This essay will assist us in establishing a solid web foundation and
dealing with web technologies with ease.
ni
U
ity
So, the Client requests something, and the Server fulfils the request as long as it is
m
The URL (Uniform Resource Locator) of the website or file is entered by the user.
)A
To interface with the servers as a client, there are a few steps to do.
e
(provided by DNS server).
4. The website’s relevant files are sent across by the server.
in
5. The files are subsequently rendered by the browser, and the webpage is shown.
The DOM (Document Object Model) interpreter, CSS interpreter, and JS Engine,
together known as the JI, are used to render the page.
nl
O
ty
Figure: Connecting browser and the servers
si
Client: When we talk about a client, we’re talking about a person or an organisation
who uses a specific service. A Client is a computer (Host) in the digital world, capable
r
of receiving information or using a specific service from the service providers (Servers).
Both distant processes run at the same time and share data through a shared resource.
ve
Servers: When we talk about servers, we’re talking about a person or a medium
who serves things. A server is a distant computer that delivers information or access to
certain services in the digital world. So, the Client requests something, and the Server
fulfils the request as long as it is stored in the database. A Client is a remote process
ni
that requests a resource from a Server, which is another remote application process.
the capacity to service requests, not the type of system, its size, or its computational
capability, that distinguishes a machine as a server.
ity
m
)A
(c
A system can serve as both a server and a client at the same time. That is, one
Notes
e
process serves as a server, while another serves as a client. It’s also possible that both
the client and the server processes are running on the same system.
in
Communication
In a client-server paradigm, two processes can communicate in a variety of ways:
nl
1. Sockets
2. Calls for Remote Procedures (RPC)
O
Sockets
In this paradigm, the Server process establishes a socket on a well-known (or
known by the client) port and waits for a client request. The second process, which acts
ty
as a Client, creates a socket as well, but instead of waiting for an incoming request, it
processes ‘requests first.’
r si
ve
ni
U
The request is served once it reaches the server. It might be a request for
ity
The operation on the remote host is called by one process (client). Server is the name
of the remote host’s process. Stubs are assigned to both processes. The following is
how this conversation takes place:
)A
1. The client stub is referred to by the client process. It passes all of the program’s local
parameters to it.
2. The arguments are then packaged (marshalled) and sent to the other side of the
network using a system call.
(c
3. Kernel delivers data through the network, which is received by the other end.
4. Data is sent from the remote host to the server stub, where it is unmarshalled.
5. The procedure is then performed when the arguments have been supplied to it.
Notes
e
6. In the same way, the result is returned to the client.
in
Client-Server Advantages:
Centralized system with all data in one location.
nl
costs.
O
Client-Server Model’s Drawbacks:
Viruses, Trojans, and worms can infect clients if they are present on the server or
are uploaded to the server.
ty
Denial of Service (DoS) attacks are common on servers.
si
Phishing, or collecting a user’s login credentials or other relevant information, is
prevalent, as are MITM (Man in the Middle) assaults.
connection’s end-user is referred to as localhost, while the server that supplies data is
referred to as remote host.
FTP is a TCP/IP-based standard internet protocol for transferring files from one
server to another.
ity
It is mostly used to transport web page files from their originator to a computer that
serves other computers on the internet as a server.
FTP’s Objectives
1. It allows users to share files.
2. It’s a tool that encourages people to use distant computers.
)A
transferring data between computers, such as HTTP, but they lack the clarity and
concentration of FTP. Furthermore, the systems engaged in the connection are
heterogeneous, meaning they have different operating systems, directories, formats,
Amity Directorate of Distance & Online Education
138 Network Basics
character sets, and so on. FTP protects the user from these variations and allows them
Notes
e
to transmit data quickly and reliably. FTP allows you to send ASCII, EBCDIC, or picture
files. The ASCII file sharing format is the default, and each character is encoded by
NVT ASCII. The destination in ASCII or EBCDIC must be prepared to accept files in this
in
format.
Transferring data from one machine to another is quite simple and uncomplicated,
nl
although it can occasionally cause issues. Two systems, for example, may have distinct
file conventions. Text and data may be represented differently in two systems. The
directory structures of two systems may differ. By creating two connections between
hosts, the FTP protocol solves these issues. One link is utilised for data transport, while
O
the other is used for control.
Transferring data from one machine to another is quite simple and uncomplicated,
although it can occasionally cause issues. Two systems, for example, may have distinct
ty
file conventions. Text and data may be represented differently in two systems. The
directory structures of two systems may differ. By creating two connections between
hosts, the FTP protocol solves these issues. One link is utilised for data transport, while
si
the other is used for control.
r
ve
ni
U
The FTP’s fundamental model is depicted in the diagram above. The user
ity
interface, control procedure, and data transmission method are all parts of the FTP
client. The server control process and the server data transmission process are the two
processes that make up the server.
basic rules. We can transfer a single line of command or answer at a time via control
connection. Between the control processes, a control link is established. During the
interactive FTP session, the control connection stays open.
)A
e
you and your host, and closing the connection.
A Web browser can also include an FTP application as a built-in component. This
in
GUI-based FTP client makes file transfers simple and eliminates the need to memorise
FTP commands.
nl
Clients for FTP
FTP is a client-server protocol. The FTP client is an application that runs on a
user’s computer that allows them to communicate with and download data from remote
O
computers. It’s a series of instructions that establishes a connection between two hosts,
assists with file transfer, and then disconnects the connection. Get filename (retrieve a
file from the server), mget filename (retrieve multiple files from the server), and ls are
some of the commands (lists files available in the current directory of the server). There
ty
are also built-in FTP tools, which make file transfers easier and eliminate the need to
memorise instructions.
si
1. One of the most significant advantages of FTP is its speed. FTP is one of the quickest
methods for transferring files from one computer to another.
2. r
It is more efficient since we do not have to do all of the processes to obtain the whole
ve
file.
3. Security: We must use the username and password to access the FTP server. As a
result, we may conclude that FTP is more secure.
4. Transferring files back and forth: FTP allows us to transmit files back and forth.
ni
Assume you are a firm management who sends information to all employees, who
then return information back to the same server.
U
Disadvantages of FTP
1. All FTP communications must be encrypted, according to industry standards.
However, not all FTP services are created equal, and not all offer encryptions. As a
ity
result, we’ll have to keep an eye out for FTP services that offer encryption.
2. FTP is used for two purposes: sending and receiving huge files over a network.
However, the maximum file size that may be transferred is 2GB. It also doesn’t
enable you to send data to several recipients at the same time.
m
3. Passwords and file contents are transferred in clear text, allowing for unauthorised
listening. As a result, it’s conceivable that attackers will try to guess the FTP password
in a brute force assault.
)A
4. It is incompatible.
Protocol.
e
allows applications to send electronic mail over the internet.
in
computer users.
It allows users on the same or separate computers to exchange mail, and it also
supports:
nl
1. It can transmit one or many recipients a single message.
2. Text, audio, video, and images can all be used to send messages.
O
3. It can also deliver messages through networks that aren’t connected to the internet.
SMTP is mostly used to establish communication rules between servers.
The servers have a mechanism for identifying themselves and stating the type of
ty
communication they are attempting. They also have a system in place to deal with
problems like an inaccurate email address. If the recipient address is incorrect, the
receiving server will respond with an error message.
si
SMTP Components
r
ve
ni
U
Figure: Step 1
First, we’ll separate the SMTP client and server into two parts: the user agent (UA)
and the mail transfer agent (MTA) (MTA). The user agent (UA) composes the message,
ity
generates the envelope, and inserts the message inside it. This mail is transferred
across the internet through a mail transfer agent (MTA).
m
)A
(c
Figure: Step 2
Amity Directorate of Distance & Online Education
Network Basics 141
e
More MTAs, operating as either a client or a server to relay the email, can be added
instead of simply one MTA on the sending side and one on the receiving side.
in
nl
O
ty
Figure: Step 3
si
The mail gateway may be used to send emails to users without using the TCP/IP
protocol, and this is accomplished by using the relaying system. The mail gateway is a
message transfer agent (MTA) that may be used to receive email.
SMTP’s Operation
r
ve
Message Composition: A user composes an electronic mail message using a
Mail User Agent to send an e-mail (MUA). A software that sends and receives mail
is known as a Mail User Agent. The message is divided into two parts: the body and
ni
the header. The body of the message is the most important element, whereas the
header contains information like the sender and recipient addresses. The header also
contains descriptive information, such as the message’s subject. The message body is
analogous to a letter, while the header is analogous to an envelope with the recipient’s
U
address.
Mail Submission: After writing an email, the mail client uses SMTP on TCP port 25
to send the finished message to the SMTP server.
ity
Mail Distribution: E-mail addresses are made up of two parts: the recipient’s
username and the domain name. priya @gmail.com, for example, where “priya” is the
recipient’s username and “gmail.com” is the domain name.
m
If the recipient’s email address’s domain name differs from the sender’s domain
name, MSA will forward the message to the Mail Transfer Agent (MTA). The MTA will
look for the destination domain in order to transport the email. To get the destination
domain, it looks for the MX record in the Domain Name System. The MX record
)A
contains the recipient’s domain’s domain name and IP address. MTA connects to the
exchange server to send the message after the record has been found.
Mail Receipt and Processing: The exchange server transmits the incoming
message to the incoming server (Mail Delivery Agent), which stores the e-mail and
(c
Mail Access and Retrieval: MUA may be used to retrieve email saved in MDA (Mail
Notes
e
User Agent). Login and password are required to access MUA.
in
An application layer protocol specifies how messages are sent between application
processes on various platforms.
nl
Domain Name System is the abbreviation for Domain Name System.
DNS is a directory service that maps a host’s name to its numerical address on a
O
network.
ty
each node in a tree.
The Domain Name System (DNS) is a service that converts domain names into
IP addresses. This allows network users to search for other hosts using user-friendly
si
names rather than knowing IP addresses.
Figure: DNS
)A
Country Domain
The structure of a country domain is similar to that of a generic domain, except
instead of three-character organisational abbreviations, it uses two-character country
abbreviations (e.g., us for the United States).
(c
Domain Reversed
Notes
e
When mapping an address to a name, the inverse domain is employed. When the
server receives a request from a client and only the files of authorised clients are stored
in
on the server. To see if the client is on the approved list, it sends a query to the DNS
server, asking for an address to be mapped to the name.
DNS’s Operation
nl
1. DNS is a network communication mechanism for clients and servers. DNS clients
make queries to DNS servers, and DNS servers respond to the requests.
O
2. Forward DNS lookups are queries that contain a name that is turned into an IP
address, whereas reverse DNS lookups are requests that contain an IP address that
is transformed into a name.
ty
3. DNS uses a distributed database to keep track of the names of all the hosts on the
internet.
4. A piece of software such as DNS resolver sends a request to the DNS server to
si
acquire the IP address of a hostname when a client such as a web browser submits
a request containing a hostname. If a DNS server does not have the IP address for
a hostname, the request is sent to another DNS server. If the resolver receives an IP
r
address, it completes the request through the internet protocol.
ve
ni
U
ity
m
)A
The HyperText Transfer Protocol (HTTP) stands for HyperText Transfer Protocol.
It’s a method of gaining access to data on the World Wide Web (www).
The HTTP protocol may be used to send plain text, hypertext, audio, video, and
Notes
e
other types of data.
in
allows us to utilise it in a hypertext environment where there are quick leaps from one
document to another.
HTTP is similar to FTP in that it sends files from one server to another. However,
nl
HTTP is easier to use than FTP since it just utilises one connection to transport data,
with no control connection.
O
As data is transmitted between the client and the server, HTTP is comparable
to SMTP. The way messages are transferred from the client to the server and from
the server to the client differs between HTTP and SMTP. HTTP communications are
ty
delivered quickly, whereas SMTP messages are saved and sent.
si
HTTP is a protocol that does not require a connection. The HTTP client sends a
request to the server and waits for a response. When the server gets the request, it
processes it and provides the response to the HTTP client, who then disconnects
r
the connection. The client-server connection exists just for the duration of the current
request and response.
ve
Data may be transferred as long as both the client and the server know how to
handle the data content, making the HTTP protocol media neutral. Both the client and
the server must define the content type in the MIME-type header.
ni
HTTP is a stateless protocol, which means that the client and server only know
each other for the duration of the current request. As of the protocol’s design, neither
the client nor the server keep track of information between web page requests.
U
ity
m
)A
(c
Figure: HTTP
e
The HTTP transaction between the client and the server is depicted in the diagram
above. A transaction is started by the client submitting a request message to the server.
in
The HTTP transaction between the client and the server is depicted in the diagram
above. A transaction is started by the client submitting a request message to the server.
A response message is sent by the server in response to the request message.
nl
Hyper Text Transfer Protocol Secure
“HyperText Transport Protocol Secure” is an acronym for “HyperText Transport
O
Protocol Secure.” HTTPS is the same as HTTP, but it encrypts data via a secure socket
layer (SSL). Banking and investing websites, e-commerce websites, and most websites
that need you to log in are all examples of sites that employ HTTPS.
The typical HTTP protocol transmits and receives data in an unencrypted way.
ty
This means that the data being exchanged between the user and the Web server can
be eavesdropped on. While this is exceedingly improbable, it is unsettling to think that
your credit card number or other sensitive information entered on a website may be
si
intercepted. Secure websites, on the other hand, employ the HTTPS protocol to encrypt
data transferred back and forth via SSL encryption. The data being transported through
HTTPS would be unrecognisable if it were intercepted.
r
By looking at the URL in your browser’s address bar, you can detect if a website
ve
is safe. You’ll know you’re on a secure website if the address begins with https://.
Most browsers will also show a lock icon anywhere along the window’s edge to signify
that the page you’re browsing is safe. You may examine the security certificate that
authenticates the website by clicking the lock icon.
ni
U
ity
Messages
There are two kinds of HTTP messages: request and response. The message
)A
The client sends a request message, which consists of a request line, headers,
Notes
e
and, in certain cases, a content.
in
nl
O
The server sends a response message to the client that includes a status line,
headers, and, in rare occasions, a content.
ty
r si
ve
URI (Uniform Resource Identifier) (URL)
A client who wants to view a document on the internet requires an address, and
HTTP leverages the idea of Uniform Resource Locator to make document access
easier (URL).
ni
U
Figure: URL
ity
The Uniform Resource Locator (URL) is a standard method of describing any type
of online data.
Method, host computer, port, and route are all defined in the URL.
The technique refers to the protocol for retrieving a document from a server. Take
m
Host: The host is the computer that stores the information, and it is given an alias
name. Web pages are mostly kept on computers, which are given an alias name that
)A
The server’s port number can also be found in the URL; however this is an optional
parameter. If the port number is used, it must be placed between the host and the route
and separated from the host by a colon.
(c
The pathname of the file where the information is saved is called Path. Slashes
divide the directories from the subdirectories and files in the path itself.
e
The World Wide Web, sometimes known as a Web, is a collection of websites or
web pages maintained on web servers and accessible through the internet by local
in
computers. Text pages, digital photos, audios, and videos, among other things, can
be found on these websites. Users may access the content of these sites through the
internet utilising devices such as computers, laptops, and cell phones from anywhere in
nl
the globe. The WWW, in conjunction with the internet, allows you to retrieve and display
text and media on your device.
History
O
It is a project started in 1989 by Timothy Berner’s Lee to allow researchers at
CERN to collaborate more efficiently. The World Wide Online Consortium (W3C) is a
non-profit organisation dedicated to furthering web development. Tim Berners-Lee,
ty
dubbed the “Father of the Web,” is in charge of this institution.
r si
ve
Architecture of the System:
ni
The WWW, in conjunction with the internet, allows you to retrieve and display text
and media on your device.
ity
Web pages, which are formatted in HTML and connected by connections known
as “hypertext” or hyperlinks and accessible over HTTP, are the building blocks of the
Web. These are electronic linkages that connect relevant bits of information so that
users may easily get what they need. The advantage of hypertext is that it allows you
m
to choose a word or phrase from a text and then go to other sites that provide further
information on that word or phrase.
(URL). A website is a collection of online pages that belong to a given URL, such as www.
facebook.com, www.google.com, and so on. As a result, the World Wide Web functions
as a massive electronic book, with pages saved on many servers throughout the world.
Small websites keep all of their WebPages on a single server, but large websites or
(c
organisations store their WebPages on many servers in various countries so that when
people from that location search their site, the information may be rapidly retrieved from
the nearest server.
As a result, the web serves as a platform for users to retrieve and share data
Notes
e
through the internet. A website is a collection of online pages that belong to a given
URL, such as www.facebook.com, www.google.com, and so on. As a result, the World
Wide Web functions as a massive electronic book, with pages saved on many servers
in
throughout the world.
Small websites keep all of their WebPages on a single server, but large websites or
nl
organisations store their WebPages on many servers in various countries so that when
people from that location search their site, the information may be rapidly retrieved from
the nearest server.
O
As a result, the web serves as a platform for users to retrieve and share data
through the internet. When you send an email or speak with someone online, for
example, you are utilising the internet. However, when you access information from a
website such as google.com, you are utilising the World Wide Web, which is a network
ty
of servers connected by the internet. When you use a browser to request a webpage
from your computer, the server produces that page for you. Your computer is referred
to as a client since it runs a programme (web browser) and requests information from
si
another computer (server).
r
Tim Berners-Lee took the lead in the creation of the World Wide Web in March
1989, writing the initial proposal for the World Wide Web. In May 1990, he submitted
ve
a new plan. After a few months, it was formalised as a management plan with Robert
Cailliau in November 1990. The essential concepts and vocabulary connected to the
Web were specified in this proposal. This article included a description of the World
Wide Web, a “hypertext project” in which browsers could see a web of hypertext pages.
ni
The three key technologies were included in his proposal (HTML, URL, and HTTP). Tim
Berners-Lee was able to test his ideas by running the first Web server and browser at
CERN in 1990. He wrote the code for his Web server on a NeXT computer and kept a
U
note on the machine “The machine in question is a server. DO NOT TURN IT OFF!!” So
that it isn’t unintentionally turned off by someone.
Tim built the world’s first website and Web server in 1991. It had the address info.
ity
cern.ch and was operating on the NeXT computer at CERN. In addition, the first URL
was http://info.cern.ch/hypertext/WWW/TheProject.html. This page included links to
information on the WWW project, as well as Web servers, hypertext descriptions, and
instructions for building a W3C site.
m
The Web Expands: Only a few people had access to the NeXT computer platform.
Later on, work on a ‘line-mode’ browser that could operate on any machine began.
Berners-Lee released his WWW software in 1991, which included a ‘line-mode’
)A
It was made available to coworkers using CERN computers in March 1991. After a
few months, he announced the WWW software on internet newsgroups in August 1991,
which sparked worldwide interest in the project. Tim Berners-Lee originally showed the
world the internet’s graphic interface on August 6, 1991. It was made accessible to the
(c
general public on August 23, 1991. Globalization: The first Web server was launched in
the United States in December 1991. There were only two sorts of browsers available
at the time: the original development version, which was only accessible on NeXT
Notes
e
computers, and the ‘line-mode’ browser, which was simple to install and run on any
platform but was less user-friendly and restricted in capability.
in
Berners-Lee urged other developers to contribute to its development over the
internet in order to enhance it further. For the X-Window System, several developers
created browsers. In 1991, Standard University in the United States introduced the first
nl
web server outside of Europe. In the same year, just ten web servers were known all
over the world. The National Center for Supercomputing Applications (NCSA) released
the initial version of their Mosaic browser in early 1993. The X Window System was
used to run it. The NCSA later released versions for the PC and Macintosh platforms.
O
The WWW began to expand rapidly over the world after the advent of user-friendly
browsers on these machines.
In the same year, the European Commission authorised its first online initiative,
ty
which included CERN as a partner. CERN released the source code for WWW on a
royalty-free basis in April 1993, making it open software.
Royalty-free indicates that you don’t have to pay a royalty or licencing charge to
si
utilise copyright content or intellectual property. As a result, CERN made the code and
web protocol available to the public for free. The technology used to create the WWW
became open source, allowing anybody to utilise them for free. People eventually
r
began to build websites for online commerce, information, and other similar uses. There
ve
were over 500 web servers towards the end of 1993, and the WWW accounted for 1%
of all internet traffic.
The First International World Wide Web Conference, sometimes known as the
“Woodstock of the Web,” was held at CERN in May 1994, with roughly 400 users and
ni
In the same year, another conference was conducted in the United States, with
U
about 1000 persons in attendance. The NCSA and the newly created International
WWW Conference Committee collaborated to put it on (IW3C2). The World Wide Web
had roughly 10,000 servers and 10 million users towards the end of this year (1994).
ity
To meet rising requirements and ensure security, the technology was constantly
enhanced, and e-commerce features were determined to be included shortly.
The fundamental goal was to retain the Web as an open standard for everyone
rather than a proprietary system. As a result, CERN submitted a proposal to the
m
European Union Commission under the ESPRIT initiative “WebCore.” The goal of
this initiative was to build a worldwide consortium with the Massachusetts Institute
of Technology (MIT) in the United States. Berners-Lee left CERN in 1994 to join MIT
)A
and form the International World Wide Web Consortium (W3C), which required a new
European partner.
The European Commission invited INRIA, the French National Institute for
Research in Computer Science and Controls, to take over the job of CERN. INRIA
became the first European W3C host in April 1995, while Keio University of Japan
(c
e
up the position of European W3C Host from INRIA in 2003. W3C announced Beihang
University as the fourth Host in 2013. There were almost 400 member organisations
from all around the world in September 2018.
in
The Web has evolved significantly since its birth, and it continues to evolve today.
Search engines have improved their ability to read, comprehend, and process data.
nl
They can quickly locate the information that consumers have requested, as well as
present additional pertinent information that may be of interest to them.
O
We now know that the World Wide Web (WWWW) is a collection of websites linked
to the internet that allow users to search for and exchange information. Let’s have a
look at how it works now!
ty
The internet’s core client-server format, as represented in the accompanying
graphic, governs how the Web functions.
r si
ve
ni
When users request web pages or information, the servers store and transport it to
their computers on the network. A web server is a computer programme that provides
web pages to people who access them using a browser. A client is the computer of a
user who requests documents from a server. Users can access the papers that have
ity
been obtained using a browser that has been installed on their machine.
Web servers hold all of the websites. A website, like a person who rents a house,
takes up space on a server and is kept there. When a user requests a website’s
WebPages, the server hosts it, and the website owner is responsible for paying the
m
hosting fee.
)A
(c
Notes
e
in
nl
O
Figure: Web servers
The WWW starts operating the instant you open your browser and put a URL into
the address bar or search for anything on Google. In order to send information (web
ty
pages) from servers to clients, three basic technologies are used (computers of users).
Hypertext Markup Language (HTML), Hypertext Transfer Protocol (HTTP), and Web
browsers are examples of these technologies (See chapter 3.1.6 for more information
si
on HTTP/HTTPS).
When the web was first created in the 1960s, it was not designed to stream audio
or video, but enterprising developers discovered a way to help customers listen to real-
time audio, and the first live audio streaming event was broadcast on Sept. 5, 1995,
for a game between the Seattle Mariners and the New York Yankees. At first, it was
)A
In just a few years, technology has advanced to the point where streaming video
and audio has become increasingly common. Netflix and Hulu, for example, provided
live movies and television. Content companies like Paramount and Disney launched
(c
their own video streaming networks, while internet behemoths like Apple and Amazon
followed suit. On demand, you may view old classic TV series or the most recent
movies.
Amity Directorate of Distance & Online Education
152 Network Basics
Streaming audio has also progressed. With music services like Deezer, Pandora,
Notes
e
and Spotify, you can listen to live sports from across the world or transform your
computer or smartphone into a bespoke radio station. People listen to true-crime
podcasts or the latest audiobooks on their way to work or the grocery store.
in
In just a few years, technology has advanced to the point where streaming video
and audio has become increasingly common. Netflix and Hulu, for example, provided
nl
live movies and television. Content companies like Paramount and Disney launched
their own video streaming networks, while internet behemoths like Apple and Amazon
followed suit. On demand, you may view old classic TV series or the most recent
movies.
O
Streaming audio has also progressed. With music services like Deezer, Pandora,
and Spotify, you can listen to live sports from across the world or transform your
computer or smartphone into a bespoke radio station. People listen to true-crime
ty
podcasts or the latest audiobooks on their way to work or the grocery store.
Audio and video streaming became popular enough in the previous decade for
cable and satellite TV providers to “cut the cord” and cancel their subscriptions in favour
si
of cheaper streaming choices. According to Nielsen, a media research firm, streaming
video has surpassed over-the-air television in popularity in the United States as of June
2021. Streamers had a 26 percent market share, compared to 25 percent for over-the-
r
air TV. Although this may not seem like much, especially because cable TV still has a
ve
39 percent market share, streaming media is expected to expand in the future, while
cable subscriptions are expected to shrink.
You may have even taken part in a live streaming broadcast. Many individuals
dialled in for remote meetings or online lessons during the COVID-19 epidemic. Live
ni
audio and video streaming may be done concurrently in one broadcast using tools
like Zoom, Microsoft Teams, or Google Meet. It’s similar to when phone companies
promised us videophones in the mid-twentieth century, but better. Locating and Using
U
Streaming Video and audio streaming service providers must figure out how to get their
material to your device in the most user-friendly way possible.
High-resolution photos, audio, and video files are sometimes big at first. Let’s
ity
pretend your smartphone has a 12-megapixel camera, despite the fact that imagines
aren’t streaming yet. The print size of a still shot taken with that camera is 9.7 by 14.5
inches (17.8 by 36.8 centimeters). That’s more than you’ll need for a short Instagram
post, but the higher file size means you may use the image for other purposes, such as
a poster.
m
As it’s typically a better idea to produce a huge file and reduce it down, our phones
create larger sound, video, and image files. It’s more difficult to expand a tiny media file
while maintaining great quality.
)A
Streaming services employ file formats that enhance quality at standard internet
speeds. Codecs, which are instructions for coding and decoding visual and audio
information in a common file format, are used to compress them. Lossless formats, on
the other hand, capture more of the original file’s integrity while still having higher file
(c
sizes. Many formats, on the other hand, are lossy, meaning they eliminate part of the
data in the file while preserving as much of the original as feasible.
A lossy-format codec can recognise bits of the video that it may duplicate and
Notes
e
use later in the show to condense audio and video data. To keep the file size down,
it removes superfluous information. Codecs can also limit the amount of colours in a
video, as well as the video’s resolution and frame rate. Lossy audio codecs may
in
eliminate frequencies from the original recording that are inaudible to most people, such
as 20 Hz to 20,000 Hz.
nl
While this may reduce streaming bandwidth, it can also cause issues. If visuals
appear washed out or pixilated while watching a show, you may have seen some file
compression side effects.
O
You might not hear a severely compressed audio file if you’re jogging with
earphones in, but with good headphones, you might.
Streaming service providers want to ensure that their service is as quick and
ty
reliable as possible, which necessitates the development of specialised traffic-handling
technologies.
si
content delivery network (CDN). The streaming video business has recently become a
global service with 4,669 servers in 243 sites across the world at the time. It has been
working on its own CDN since 2011 in order to prepare the service for worldwide traffic.
r
Netflix Open Connect, as it’s known, relies on internet service providers (ISPs) all
ve
around the world to make it work.
ni
U
ity
m
)A
Netflix incentivizes these ISPs to join the system by providing them with free Open
Connect Appliances (OCAs), which are Netflix’s proprietary streaming devices. The
(c
device is embedded in the networks of its ISP partners. The devices are then used by
Netflix to link users to the network’s nearest service point. It improves service quality
and keeps the network architecture from being overburdened.
The process of live-streaming a conference call is a little different. At the same time
Notes
e
as the other participants, each participant streams live audio and video to and from
their device. For people who need to attend but can’t access the internet, providers
emphasise connectivity above video quality and provide phone-based choices.
in
Another stumbling block is the security of a company’s computer network. The
Intelligent Transport Layer, which is part of Zoom’s streaming software, chooses the
nl
appropriate communication protocol for connecting many callers over diverse networks.
During conversations, Zoom employs a dispersed network and its own proprietary
codec to encode and transfer data.
O
What happens to the video and audio streams on your end? We frequently use
a proprietary application built by the streamer on our smartphones and tablets to take
care of the business for us. When you watch a Disney+ stream on your phone, you
don’t have to worry about being able to see it.
ty
Streaming, on the other hand, operates a little differently on a web browser.
The quality of the media stream on your system is influenced by your computer and
internet connection. With the advent of HTML 5, the language in which websites are
si
written, streaming services may now embed music and video files in their pages without
requiring the use of browser plugins.
r
ve
ni
U
ity
Smart TVs and devices that connect into televisions, such as the Roku or Apple
TV, have their own operating systems and specific streaming apps. It’s quite similar
m
Some content providers take use of their company structure to offer bundles to
potential multi-service subscribers. AT&T gives the HBO Max streaming service for free
to anybody who subscribes to its highest-end television, internet, or phone plans at the
time of writing in June 2021.
(c
influenced by the device you own and the internet service you subscribe to, for better or
Notes
e
worse.
in
The interaction between a web server and a web browser is an example of how
a protocol suite is used in network communications. In order to exchange information,
nl
this contact employs a variety of protocols and standards. The various protocols work
together to guarantee that both parties receive and comprehend the communications.
The following are some examples of these protocols:
O
Hypertext Transfer Protocol (HTTP) is a standard protocol that oversees the
interaction between a web server and a web client. The content and formatting of
requests and answers sent between the client and server are defined by HTTP. HTTP is
implemented as part of the application by both the client and the web server software.
ty
To control how messages are delivered between client and server, the HTTP protocol
relies on other protocols.
si
individual interactions between web servers and web clients. TCP breaks down HTTP
communications into segments, which are then transmitted to the destination client. It’s
also in charge of limiting the amount and speed with which messages are sent between
the server and the client. r
ve
Internetwork Protocol (IP) is the most widely used internetwork protocol (IP). IP
is in charge of encapsulating TCP’s structured segments into packets, assigning the
necessary addresses, and choosing the optimal path to the destination host.
ni
features. The rules we use to communicate over one medium, such as a phone
conversation, are not always the same as the protocols we use to communicate over
another medium, such as mailing a letter, in our day-to-day personal communication.
ity
Consider how many distinct laws or protocols govern all of the many forms of
communication that exist today.
Viewing a host as a stack is one of the greatest methods to visualise how all of
the protocols interact. A protocol stack depicts how the suite’s constituent protocols
are implemented on the host. The protocols are organised in a tiered structure, with
)A
Notes
e
in
nl
O
ty
Figure: Face-to-face communication is described using the mentioned layers
Consider the case of two persons conversing face-to-face. This action may
be described in three levels, as shown in the diagram. We have two humans at the
si
bottom layer, the Physical layer, each with a voice capable of uttering words loudly.
We have an agreement to talk in a common language at the second tier, the Rules
layer. The uppermost layer, the Substance layer, contains the actual words spoken—the
communication’s content. r
ve
We would not notice “layers” floating in space if we were to witness this exchange.
It’s vital to remember that layering is a model, and as such, it’s a simple approach to
break down a difficult operation into sections and define how they operate.
ni
specify specific needs and interactions in order for devices to communicate properly.
they passed?
4. Data transfer session creation and termination
A protocol suite’s individual protocols may be vendor-specific and private. In
)A
this sense, proprietary indicates that only one firm or provider has authority over the
protocol’s definition and operation. With authorization from the owner, some proprietary
protocols can be utilised by various organisations. Others can only be used on
proprietary vendor-made equipment.
(c
e
What are the differences between server and PC applications (services) and how
do they complement one other? Understanding Application Layer Services will aid you
in
in comprehending the capabilities and functions found at Layer 7 on either a server or
a computer. Applications at the OSI Module are technically referred to as services, and
particular roles of those services are reserved for Servers alone. With the right hardware
nl
arrangement, a server operating system may operate numerous or dedicated rolls. PC
operating systems were not designed to host services in the same way that servers do.
O
Generally, the operating system distinguishes between a Network device operating
as a Server Roll and a Network device operating as a Personal Computer. Nonetheless,
a large number of client devices can execute Services for testing purposes.
ty
For example, you may run Apache Server on a Windows 7 machine, but is Win7
suitable for Apache production? Of course, the answer is no. Understanding the roles of
servers and clients in terms of applications and services will help you comprehend why
si
we have two distinct roles - server and client.
r
ve
ni
U
a large number of client devices can execute Services for testing purposes.
For example, you may run Apache Server on a Windows 7 machine, but is Win7
suitable for Apache production? Of course, the answer is no. Understanding the roles of
)A
servers and clients in terms of applications and services will help you comprehend why
we have two distinct roles - server and client.
The Difference
A Request for Information: Client-side software that is used to request data from a
(c
server. As a result, the Server’s Services provide the appropriate data in response to
the client’s request.
Note: Understanding the differences between Server and Client Sending and
Notes
e
Receiving methods will make troubleshooting IP Networks a breeze.
in
As you may be aware, there are several applications that are utilised on clients;
however, I will focus on Web Browsers and the components that are used to retrieve
Web page data. To access the internet, the HTTP client’s programme (Internet Browser)
nl
such as Firefox, Safari, and IE should have three basic components:
O
2. World Wide Web (www) — This indicates that you are looking at Internet articles.
3. URI (Uniform Resource Identifier) - Indicates a full Web address or URL.
When they’re all put together, they make a web address or link that looks like
ty
https://www.ccnahub.com.
The World Wide Web’s data communication is built on the http:// protocol.
Following the establishment of a TCP connection between the Browser and the Web
si
Server, the http file transfer between the two machines begins. The HTTP protocol is
used to transport files in article format between two network devices.
r
To do this, the browser sends a GET request to a web server to obtain the index.
html file, and the web server responds with a Get response command with a code of
ve
200 signalling an OK message. One of the most well-known HTTP codes is 404, which
indicates that a file was not found or that the page could not be displayed.
Articles accessed over the internet that is referred to by an umbrella name that
incorporates all web servers across the world. You are exploring Articles or information
as “Web Pages,” such as this Article, according to the web.
U
In a nutshell, the web is a collection of articles; both client browsers and HTTP
servers such as Apache or Nginx allow users to request and view articles as web pages
via the http protocol.
ity
Domain Name - Domain Names come in a variety of degrees. The top level
domains are.com,.net,.org, and so on. The name ccnahub.com is the second level. The
third level, which is identified by sub-domains and can include mail.ccnahub.com, ftp.
ccnahub.com, and so on, is determined by the business requirements.
m
URL stands for Uniform Resource Locator and is also known as Web Address. A
URL can be typed into the browser’s Web Address box. URLs may be used with any
protocol, not just http. FTP is also a file transfer protocol. Its web address is as follows:
ftp:/ftp.ccnahub.com/uploads/.
)A
As previously said, a URL can have multiple components, such as http:// or ftp:/;
if it’s for web (articles), it may or may not contain www, such as http://archive.ccnahub.
com; if it’s for FTP requests, it may or may not include www, such as ftp:/us.ccnahub.
com/uploads/; and so on.
(c
HTTP as a Service
Notes
e
Web Browsers, such as Firefox, Safari, and Internet Explorer, are used on the
client side to peruse content from the internet that may be found on any Hosting Server.
in
To access material from Web Servers, most clients, such as PCs and smart
devices, employ Hypertext Transfer Protocol (http) and the World Wide Web (www)
addressing structure.
nl
Remember that when a client’s browser requests articles from the internet, the
client’s Layer 4 selects a random dynamic TCP port as the source port (as shown in
Understanding Multiplexing TCP and UDP Sockets) and port 80 as the destination port
O
to create a TCP socket for the HTTP service.
IP packets containing data (articles) begin to flow after the socket is established.
ty
Web Hosting Services
For a Server Roll, there are far too many services available; nevertheless, I will
concentrate on those utilised by a Hosting Server. At the end of the day, the principle
si
behind HTTP, FTP, MAIL, and any other Network TCP/IP service is the same: Server
side and Client side.
Apache or Nginx offer HTTP as a service called Web Server. It can be referred to
r
as a Web Server or a Web Service. The term “hosting server” refers to a system that
ve
hosts many services or servers, such as web or mail servers. IP packets containing
data (articles) begin to flow after the socket is created.
The majority of these custom web servers use custom ports such as 8080, 10000,
and 8181, depending on the design. Configuring a network printer through its Web
ni
DNS
U
As DNS Layer 3 only knows IP addresses and individuals can’t recall them, there
must be a means to convert human names to IP addresses. DNS and Name Servers
are used to convert domain names like ccnahub.com to their public IP addresses; DNS
ity
uses TCP or UDP port 53 to serve DNS queries from DNS clients.
When a user requests ccnahub.com via a web browser, the DNS client asks the
DNS server to translate ccnahub.com to its Public IP address, allowing the user to
access the ccnahub.com home page.
m
or Sync mail technologies. POP3 TCP port 110 is used by Push Technology for Post
Office Protocol Version 3 (POP3). Sync Technology uses TCP port 143 for Internet Mail
Access Protocol (IMAP).
On the client side, Outlook or other client applications can be set up to connect with
a POP3 or IMAP server. Push or sync technology is used to distribute mail to clients
(c
The difference between the two systems is that POP3 sends everything to the
Notes
e
client mailbox (Outlook) and empties the mail server, whereas IMAP syncs the server
and client inboxes, keeping emails up to date on all devices. POP3 and IMAP each
have their own set of benefits and drawbacks.
in
POP3 uses TCP port 995 for safe and encrypted communication, while IMAP uses
TCP port 993 as a secure socket for secure and encrypted communication.
nl
SMTP/SMTPS Service
Client-initiated mail is sent via the Simple Mail Transfer Protocol (SMTP) and
O
(SMTPS). For upfront communication, SMTP utilises TCP port 25, while for secure
communication, it uses TCP port 465 (SSL) or TCP port 587 (TLS).
ty
To remotely administer network devices, Telnet and SSH are utilised. TCP port 23
is used by the Telnet server, while TCP port 22 is used by SSH (the secure version
of Telnet). Secure Shell may be used for a variety of services, including safeguarding
si
FTP, SCP, and VPN tunnels. SSH is most commonly used to manage Cisco routers,
switches, and Linux computers.
r
Services for FTP, TFTP, and SCP
ve
The File Transfer Protocol (FTP) makes use of two TCP ports: 20 for data and 21
for control. In order to serve its customers, the FTP server requires both ports to be
open on the firewall or router. It’s important to remember that FTP isn’t safe; instead,
FTP can be offered using an SSL certificate as FTPS via 443 port, or SFTP, which uses
SSH TCP port 22 for secure connections. On Linux servers, OpenSSH is typically used
ni
to set up SFTP.
The TFTP (Trivial File Transmit Protocols) service uses UDP port 69 to transfer
U
firmware and operating system images such as Cisco IOS from a PC to a switch or
router. TFTP server may be installed on Windows as well; there are several free TFTP
server versions available online. Tftp clients that use the copy command come pre-
installed on routers and switches.
ity
SSH TCP port 22 is also used by the Secure Copy Protocol (SCP) service, and the
client interface is a command line interface for UNIX and Linux workstations. WinSCP
is a Windows client programme that can connect to SCP, SFTP, FTP, or FTPS services.
agent has encryption and is commonly used to monitor routers, switches, servers, and
other network devices.
SNMP agents connect with the NMS service through UDP port 161 at the
Application Layer of the OSI model (installed or configured on Network Devices such
Amity Directorate of Distance & Online Education
Network Basics 161
e
network devices all over the world. Install it on a server machine, configure all of your
network devices with SNMP agents, and then let the Spiceworks engine scan your
network.
in
NMS might be a large system like HP OpenView, and Cisco, of course, has its own
range of router and switch monitoring solutions, one of which is NetFlow. Cisco NetFlow
nl
is a flow technology created by Cisco that allows a network’s capacity to be monitored.
Cisco Prime Network is another advanced Cisco solution that uses SNMP to monitor all
of your network devices.
O
SNMP and NMS work together to collect and display relevant information about
network devices; it may also warn administrators to devices with low performance or
that have failed. Spiceworks.com and OpenNMS are free versions of NMS. Finally,
Cisco devices may be setup with SNMP agent using only a few commands.
ty
Both TCP and UDP ports are used.
TCP and UDP ports may be used by some programmes. As of UDP’s minimal
si
overhead, DNS can serve a large number of client requests fast. However, in some
cases, providing the desired data may need the use of TCP. Both TCP and UDP
protocols utilise the well-known port number 53 in this scenario. As a result, TCP and
UDP can use DNS Port 53 as needed. r
ve
Check your Understanding
Fill in the blanks:
3. ________ type of Endpoint Identity Agent includes packet tagging and computer
authentication.
4. In the R80 Smart Console, on ____________ tab are Permissions and Administrators
ity
defined.
5. ____________information is included in the “Full Log” tracking option, but is not
included in the “Log” tracking option.
m
Summary
●● The Transport Layer is responsible for sending data between two points. As
a result, it handles a variety of tasks, including data retransmission if the prior
)A
e
or labour between servers, who supply a resource or service, and clients, who
request that service.
in
●● Sockets-In this paradigm, the Server process establishes a socket on a well-
known (or known by the client) port and waits for a client request. The second
process, which acts as a Client, creates a socket as well, but instead of waiting for
nl
an incoming request, it processes ‘requests first.’
●● TCP/File IP’s Transfer Protocol (FTP) is an Internet utility. Abhay Bhushan created
the initial functionality of FTP in 1971. It facilitates the transfer of files from one
O
computer to another by granting access to distant directories or folders and
allowing the transmission of software, data, and text files between many types of
computers.
●● FTP is a well-known file transfer protocol. There are alternative protocols for
ty
transferring data between computers, such as HTTP, but they lack the clarity and
concentration of FTP.
●● Transferring data from one machine to another is quite simple and uncomplicated,
si
although it can occasionally cause issues. Two systems, for example, may have
distinct file conventions.
Activity r
ve
1. Draw different types of Application layer protocols.
2. Make a schematic representation of FTP
Glossary
●● TELNET: Application Layer - This layer is close to the user interface. The
Application Layer is where the user interacts with the network. Let’s talk about the
m
HTTP Protocol. The end user is given a rule by the application layer about data
transfer over the internet. It is more focused on software.
●● FTP (File Transfer Protocol): FTP stands for file transfer protocol. It is the protocol
)A
that allows us to send and receive files. This may be done between any two
machines that use it. FTP, on the other hand, is both a protocol and an application.
FTP allows users to share files with others over the internet using a secure and
efficient data transfer protocol. For FTP, the data port is 20 and the control port is
21.
(c
●● TFTP: The Trivial File Transfer Protocol (TFTP) is a stripped-down, stock version
of FTP that you should use if you know exactly what you’re looking for and where
to get it. It’s a simpler form of FTP that allows you to transfer data across network
Notes
e
devices. The TFTP port number is 69.
●● NFS (Network File System): This stands for a network file system. It allows remote
in
computers to mount file systems across a network and interact with them as if they
were locally mounted. This allows system administrators to concentrate resources
on the network’s centralised servers. The NFS port number is 2049.
nl
●● SMTP (Simple Mail Transfer Protocol): SMTP stands for Simple Mail Transfer
Protocol. The TCP/IP protocol includes it. SMTP transmits your email on and
across networks via a procedure known as “store and forward.” It collaborates with
O
the Mail Transfer Agent (MTA) to deliver your message to the correct computer
and email mailbox. The SMTP port number is 25.
●● Line Printer Daemon (LPD): This stands for Line Printer Daemon. It’s made for
shared printers. It’s the section that takes the request and processes it. A server or
ty
agent is referred to as a “daemon.” The LPD port number is 515.
●● X Window: It is a protocol for creating client/server applications with a graphical
user interface. The concept is to execute an application called a client on a single
si
machine. It’s mostly utilised in linked mainframe networks. For each server, the
port number for the X window starts at 6000 and grows by one.
●●
r
SNMP (Simple Network Management Protocol): SNMP stands for Simple Network
Management Protocol. It collects data by polling network devices at specified
ve
or random intervals from a management station, compelling them to provide
particular information. It’s a mechanism for servers to communicate information
about their present status, as well as a way for administrators to change pre-
defined settings. The SNMP port numbers are 161 (TCP) and 162 (UDP) (UDP).
ni
Further Readings:
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
U
2. lower; application
3. Full
4. Manage and settings
)A
e
Objectives
in
At the end of this unit, you will be able to:
nl
●● Understand the Working of transport layer
●● Understand the TCP Window management
O
●● Know the different transport layer design issues
Introduction
In the transport layer of the Internet, there are two basic protocols: a
ty
connectionless protocol and a connection-oriented protocol. The procedures are
complementary to one another. UDP is a connectionless protocol. It essentially does
nothing except transfer packets between apps, allowing programmes to add their own
si
protocols as needed. TCP is the connection-oriented protocol.
computer networking, which aided in the promotion of this approach. This happened
in March of 1982.
3. ARPANET accepted this structured protocol as a standard protocol in 1983.
m
4. Other computer and information technology firms, such as IBM, DEC, and others,
also adopted the TCP/IP architecture as their standard communication protocol.
5. The TCP/IP code was accepted for public domain by the University of California in 1989.
)A
6. This Internet protocol suite, often known as the TCP/IP paradigm, became widely
acknowledged as a complete foundation for computer networking and Internet
communication throughout time.
7. The Open Systems Interconnection Paradigm and the TCP/IP model are thought
(c
Unlike the OSI model, which is made up of seven levels, the TCP/IP model is made
Notes
e
up of four layers. These are the four layers:
in
1. The TCP/IP model architecture’s lowest layer is this.
2. It is a hybrid of the OSI model’s Data Link and Physical Layers.
nl
3. This layer is where data is physically sent.
4. This layer encapsulates the IP datagram into the frames after they have been sent
by a network.
O
5. This is also where IP addresses are translated into physical addresses.
6. This layer’s primary role is to convey data between two devices connected by a
network.
ty
Internet Layer
In terms of structure, it is the second layer of the TCP/IP paradigm, and it is similar
si
to the Network Layer of the OSI Model.
The Internet layer’s principal job is to send data packets to their destination networks.
IP: This is one of the most significant protocols since it detects a device’s IP
address, which is then used for internetwork connections. The path by which the
ni
Host-To-Host Layer
U
This layer’s primary job is to ensure that data is delivered without errors.
ity
UDP: It’s a connectionless protocol, which saves money but makes it less
dependable.
)A
FTP (File Transfer Protocol): As the name implies, FTP provides for convenient file
transfer.
(c
Network File System (NFS), Secure Shell (SSH), Simple Mail Transfer Protocol
(SMTP), Trivial File Transfer Protocol (TFTP), and others are examples of Application
layer protocols.
e
A message can be delivered to an endpoint, which could be a mobile device, an
email address, or a phone number.
in
Create, obtain information about, update, or remove a specific endpoint from an
application using the Endpoint resource. This includes changing an endpoint’s settings
and properties. Use the Endpoints resource to conduct these operations for numerous
nl
endpoints in a single operation.
O
endpoint as the “front door” in the software world. When you wish to exchange data with
an application/service/tool, you connect to its endpoint.
WCF services were first referred to as Endpoints. Despite the fact that this
ty
term is now identical with API resources, REST suggests that these URIs (URI[s]
that comprehend HTTP verbs and follow the REST architecture) be referred to as
“Resources.”
si
In a word, a Resource or Endpoint is an access point to a remotely hosted
programme that allows users to connect with it via the HTTP protocol.
r
What is an Endpoint Identifier (EIDs)?
ve
Endpoint identifiers (EIDs) are IPv4 or IPv6 addresses that are used to identify a
network endpoint. These EIDs are used to identify endpoints, such as a gateway or
H.323 terminal, where a locator gives information on the endpoint’s topological location.
If the endpoint moves, the locator providing information will not change its position. This
ni
is because endpoint IDs are used to identify endpoints. Nimrod’s internetworking and
routing design uses endpoint IDs particularly.
known ports. The Internet Assigned Numbers Authority assigns these ports to certain
server services (IANA). Web servers, for example, utilise port 80.
“Client applications, such as a web browser, utilise port numbers between 49152
and 65535. When you visit a website, your browser will allocate a port number from this
)A
range to that session. You may utilise any of these p as an application developer.
(c
e
Port # Protocol Description Status
0 TCP, UDP Reserved; do not use (but is a permissible source Official
in
port value if the sending process does not expect
messages in response)
1 TCP, UDP TCPMUX Official
nl
5 TCP, UDP RJE (Remote Job Entry) Official
7 TCP, UDP ECHO protocol Official
9 TCP, UDP DISCARD protocol Official
O
11 TCP, UDP SYSTAT protocol Official
13 TCP, UDP DAYTIME protocol Official
17 TCP, UDP QOTD (Quote of the Day) protocol Official
ty
18 TCP, UDP Message Send Protocol Official
19 TCP, UDP CHARGEN (Character Generator) protocol Official
20 TCP FTP Protocol (data) - port for transferring FTP data Official
si
21 TCP FTP Protocol (control) - port for FTP commands and Official
flow control
22 TCP, UDP SSH (Secure Shell) - used for secure logins, file Official
23
r
transfers (scp, sftp) and port forwarding
TCP, UDP Telnet protocol - unencrypted text communication, Official
ve
remote login service
25 TCP, UDP SMTP (Simple Mail Transport Protocol) - used for Official
email routing between email servers
26 TCP, UDP RSFTP - A simple FTP-like protocol Unofficial
ni
DHCP
69 UDP TFTP (Trivial File Transfer Protocol) Official
70 TCP Gopher protocol Official
79 TCP Finger protocol Official
80 TCP HTTP (HyperText Transfer Protocol) - used for Official
(c
e
88 TCP Kerberos - authenticating agent Official
101 TCP HOSTNAME
in
102 TCP ISO-TSAP protocol/Microsoft Exchange
107 TCP Remote Telnet Service
109 TCP POP, Post Office Protocol, version 2
nl
110 TCP POP3 (Post Office Protocol version 3) - used for Official
retrieving emails
111 TCP, UDP SUNRPC protocol
O
113 TCP Ident - old server identification system, still used by Official
IRC servers to identify its users
115 TCP SFTP, Simple File Transfer Protocol
117 TCP UUCP-PATH
ty
118 TCP, UDP SQL Services Official
119 TCP NNTP (Network News Transfer Protocol) - used for Official
retrieving newsgroups messages
si
123 UDP NTP (Network Time Protocol) - used for time Official
synchronization
135 TCP, UDP EPMAP / Microsoft RPC Locator Service Official
137 r
TCP, UDP NetBIOS NetBIOS Name Service Official
ve
138 TCP, UDP NetBIOS NetBIOS Datagram Service Official
139 TCP, UDP NetBIOS NetBIOS Session Service Official
143 TCP, UDP IMAP4 (Internet Message Access Protocol 4) - used Official
for retrieving emails
ni
e
201 TCP, UDP AppleTalk Routing Maintenance
209 TCP, UDP The Quick Mail Transfer Protocol
in
213 TCP, UDP IPX Official
218 TCP, UDP MPP, Message Posting Protocol
220 TCP, UDP IMAP, Interactive Mail AccessProtocol, version 3
nl
259 TCP, UDP ESRO, Efficient Short Remote Operations
264 TCP, UDP BGMP, Border Gateway Multicast Protocol
311 TCP Apple Server-Admin-Tool, Workgroup-Manager-Tool
O
318 TCP, UDP TSP, Time Stamp Protocol
323 TCP, UDP IMMP, Internet Message Mapping Protocol
383 TCP, UDP HP OpenView HTTPs Operations Agent
366 TCP, UDP SMTP, Simple Mail Transfer Protocol. On-Demand
ty
Mail Relay (ODMR)
369 TCP, UDP Rpc2portmap Official
371 TCP, UDP ClearCase albd Official
si
384 TCP, UDP A Remote Network Server System
387 TCP, UDP AURP, AppleTalk Update-Based Routing Protocol
389 TCP, UDP LDAP (Lightweight Directory Access Protocol) Official
401 TCP, UDP UPS Uninterruptible Power Supply
r Official
ve
411 TCP Direct Connect Hub port Unofficial
427 TCP, UDP SLP (Service Location Protocol) Official
443 TCP HTTPS - HTTP Protocol over TLS/SSL (used for Official
transferring web pages securely using encryption)
ni
protocol
500 TCP, UDP ISAKMP, IKE-Internet Key Exchange Official
512 TCP exec, Remote Process Execution
512 UDP comsat, together with biff: notifies users of new c.q.
yet unread e-mail
m
servers
517 TCP Talk
e
520 TCP efs
520 UDP Routing - RIP Official
in
513 UDP Router
524 TCP, UDP NCP (NetWare Core Protocol) is used for a variety Official
things such as access to primary NetWare server
nl
resources, Time Synchronization, etc.
525 UDP Timed, Timeserver
530 TCP, UDP RPC Official
O
531 TCP, UDP AOL Instant Messenger, IRC
532 TCP netnews
533 UDP netwall, For Emergency Broadcasts
540 TCP UUCP (Unix-to-Unix Copy Protocol)
ty
542 TCP, UDP commerce (Commerce Applications)
543 TCP klogin, Kerberos login
544 TCP kshell, Kerberos Remote Shell
si
546 TCP, UDP DHCPv6 client
547 TCP, UDP DHCPv6 server
548 TCP AFP (Apple Filing Protocol)
550 UDP r
new-rwho, new-who
ve
554 TCP, UDP RTSP (Real Time Streaming Protocol) Official
556 TCP Remotefs, rfs, rfs_server
560 UDP rmonitor, Remote Monitor
561 UDP monitor
ni
591 TCP FileMaker 6.0 Web Sharing (HTTP Alternate, see Official
port 80)
593 TCP, UDP HTTP RPC Ep Map/Microsoft DCOM Official
ity
e
698 TCP OLSR, Optimized Link State Routing
699 TCP Access Network
in
700 TCP EPP, Extensible Provisioning Protocol
701 TCP LMP, Link Management Protocol.
702 TCP IRIS over BEEP
nl
706 TCP SILC, Secure Internet Live Conferencing
711 TCP TDP, Tag Distribution Protocol
712 TCP TBRPF, Topology Broadcast based on Reverse-Path
O
Forwarding
720 TCP SMQP, Simple Message Queue Protocol
749 TCP, UDP kerberos-adm, Kerberos administration
750 UDP Kerberos version IV
ty
782 TCP Conserver serial-console management server
829 TCP CMP (Certificate Management Protocol)
860 TCP iSCSI
si
873 TCP rsync - File synchronisation protocol Official
901 TCP Samba Web Administration Tool (SWAT) Unofficial
902 VMware Server Unofficial
911 TCP
r
Network Console on Acid (NCA) - local tty redirection
ve
over OpenSSH
981 TCP SofaWare Technologies Remote HTTPS management Unofficial
for firewall devices running embedded Checkpoint
Firewall-1 software
ni
There is a lot of material on Service Oriented Architecture right now, but the finer
intricacies of Service Design are rarely addressed. I’d want to share a few suggestions
for getting started with service interface design in a service-oriented architecture.
)A
themselves creating and implementing service interfaces that are nothing more than the
service’s defined public APIs.
e
This may be thought of as an evolution of the Transfer / Value Object interface
design pattern. For its usefulness in the SOA world, we’ll take it a step further. Let’s
in
begin with an example.
Consider a company with the following attributes: id, name, and description.
Consider the Entity service, which performs standard CRUD (Create, Read, Update,
nl
and Delete) activities.
O
ty
r si
ve
ni
U
ity
Transfer Object.
Notes
e
in
nl
O
ty
r si
ve
ni
Advantages
The notion of a service request is codified as a java bean class and exposed to the
outside world in the example above.
U
The new service interface design standardises and unifies the interface.
ity
The service interface can be extended and modified without causing service client
code to fail owing to changes in compile time dependencies.
Disadvantages
Inherent validations on service data are missing: Along with getter and setter
)A
e
Invoking each other’s programmatic interfaces is the traditional way for services to
communicate with one another. This is seen in the diagram below.
in
nl
Figure: Invoking each other’s programmatic interfaces
O
unique approach for services to interact.
ty
r si
ve
ni
The Queue may also be used as a full-fledged JMS Queue, with features such as
guaranteed delivery, acknowledgements, and retries.
characteristic.
In terms of speed, this type of service interaction has very little overhead,
especially if we use in-memory queues (also known as VM (virtual machine) Queues
by some ESBs). However, as shown in the figure below, this queue-based architecture
)A
gives us a lot of flexibility in terms of being able to interface with a number of message
types and transports.
(c
Notes
e
in
nl
Figure: Queue-based architecture
O
In addition, most ESBs offer pre- and post-transformer wiring to ESB queues via
the ESB container’s settings. This increases the architectural flexibility of employing
intermediate Queues even further.
ty
Service Interactions Chronology:
A File Adapter reads an input data file, converts it to an appropriate format, and
places it on the Persistence Service’s Queue.
si
The persistence service reads the new message from the queue and processes it
using the appropriate business logic.
r
Finally, the persistence service queues messages for the Audit and Notification
ve
Services.
The audit and notification services both read messages from their respective
queues and process them before storing them in their respective local data stores.
ni
The presentation tier can also make advantage of programmatic interactions with
services if desired (using message-oriented service interfaces). This can improve
service interface invocation for presentation tiers with poor tolerance for sluggish data
retrievals.
U
consider taking messages directly from the application process and passing them to the
network layer; on the receiving side, you might consider taking messages directly from
the network layer and giving them to the application process. But, as we’ve seen, we
need to do a bit more than that!
(c
In order to transfer data between the network layer and the relevant application
level activity, the transport layer must at the very least provide a multiplexing/
e
performs almost nothing. It adds nothing to IP except for the multiplexing/demultiplexing
function and some minimal error checking. In reality, if the application developer uses
UDP rather than TCP, the software is practically directly communicating with IP.
in
UDP takes messages from the application process, adds the multiplexing/
demultiplexing service’s source and destination port number fields, two more tiny fields,
nl
and sends the resultant segment to the network layer. The transport layer segment is
encapsulated in an IP datagram by the network layer, which then makes a best-effort
delivery attempt to the receiving host. When the segment arrives at the receiving
host, UDP utilises the destination port number to transmit the data to the appropriate
O
application process. Before sending a segment, there is no handshaking between the
sending and receiving transport layer entities using UDP.
DNS is an application layer protocol that generally makes use of UDP. When a
ty
DNS application in a hot requests a query, it creates a DNS query message and sends
it via UDP. The host-side UDP adds header fields to the message and delivers the
resultant segment to the network layer without doing any handshaking with the UDP
si
entity executing on the destination end system. The datagram is sent to a name server
after the network layer encapsulates the UDP segment in a datagram. The requesting
host’s DNS programme then waits for a response to its query.
r
If it doesn’t obtain a response (perhaps because the underlying network lost the
ve
query or the reply), it either retries the query or alerts the calling programme that it can’t
get a response.
You might be asking why an application developer would pick UDP over TCP when
creating a new application. Isn’t it always better to use TCP since it provides a more
ni
The answer is no, because UDP is better suited for many applications for the
following reasons:
U
1. Control over what data is transmitted and when at the application level.
2. There was no way to create a connection.
ity
by more current updates, rendering the lost, out-of-date update ineffective. Network
management data is also sent over UDP. Since network management programmes
must frequently operate while the network is strained – precisely when reliable,
)A
conferencing, and streaming of stored audio and video employ both UDP and TCP.
These applications can withstand a modest degree of packet loss, therefore data
e
congestion management also has a negative impact on real-time applications like
internet phone and video conferencing. For these reasons, multimedia application
developers may opt to execute their programmes via UDP rather than TCP. TCP, on the
in
other hand, is becoming more popular for transporting streaming media. According to a
study, TCP was utilised in over 75% of on-demand and live streaming.
nl
TCP becomes an increasingly desirable protocol for streaming video transport
when packet loss rates are low and some businesses ban UDP traffic for security
concerns.
O
Running multimedia programmes via UDP is contentious, despite its widespread
use today. UDP, as previously stated, has no congestion control. However, congestion
control is required to prevent the network from becoming overburdened, resulting in
very little valuable work being completed. There would be so much packet overflow
ty
at routers if everyone started streaming high-bit-rate video without utilising congestion
management that just a few UDP packets would successfully traverse the source-to-
destination channel.
si
As a result of the lack of congestion management in UDP, large loss rates between
sender and receiver might occur, as well as the crowding out of TCP sessions - a major
concern. Many academics have suggested novel ways to require adaptive congestion
control from all sources, including UDP providers. r
ve
Before we wrap up this article, we’d like to point you that while utilising UDP, an
application can have dependable data transfer. This is possible if the application’s
dependability is built in (for example, b adding acknowledgement and retransmission
mechanisms). However, this is a difficult process that would keep an application
ni
If a process on Host A with port 19157 wants to send data to a process on Host B
with UDP port 46428, the transport layer in Host A creates a segment with source port,
destination port, and data, and sends it to the network layer in Host A, the transport
layer in Host B examines the destination port number and delivers the segment to the
m
Notes
e
in
nl
O
ty
3.2.7 Connection Oriented Protocol-TCP
Communications protocols may be described using a variety of attributes. The
si
contrast between connection-oriented transport services (COTS) and connectionless
transport services is the most essential (CLTS).
r
Protocols with a Connection-Oriented Protocol
ve
A connection-oriented protocol such as TCP is an example. Before data can be
shared, a logical link between the two processes must be created. The connection must
be maintained for the duration of the communication and then released afterwards.
Before the message can be sent, a virtual circuit must be established—the caller must
ni
know the person’s phone number and the phone must be answered—much like a
phone call.
Telnet, rlogin, and ftp are examples of services that leverage connection-oriented
U
transport services.
Connectionless Protocols
ity
UDP is a protocol that does not require a connection. It’s called a datagram
protocol since it’s similar to sending a letter and not acknowledging receipt.
)A
other hand, do not enable orderly release. Any handshake required by the application to
ensure orderly release is performed.
Broadcasting and tftp are two applications that leverage connectionless transport
Notes
e
services. Early NFS implementations used UDP, whereas current NFS implementations
favour TCP.
in
3.2.8 TCP Congestion Control
TCP avoids congestion by using a congestion window and a congestion strategy.
nl
Previously, we thought that the sender’s window size was determined only by the
recipient. Another element here, the network, went unnoticed. If the network cannot
convey the data as quickly as the sender creates it, the sender must be told to slow
O
down. To put it another way, the network, in addition to the receiver, determines the size
of the sender’s window.
ty
Slow Start Phase: starts slowly and increases exponentially until the threshold is
reached.
si
increased by one.
Congestion Avoidance Phase: Additive Increment — After the threshold value, also
known as ssthresh, this phase begins. The cwnd(congestion window) grows in size
ni
can lead a sender to believe that congestion has occurred. To recover a lost packet
that is thought to have been dropped by a router owing to congestion, retransmission
is required. When the RTO timer expires or three duplicate ACKs are received,
ity
(a) The size of ssthresh is lowered to half that of the current window.
m
(a) The ssthresh value is reduced to half the size of the current window.
(b) set cwnd=ssthresh (c) begin the congestion avoidance phase.
Consider the case of a TCP protocol that exhibits sluggish start behaviour. With
(c
a threshold (ssthresh) value of 32, the 5th transmission round enters the congestion
avoidance phase, which lasts until the 10th transmission.
Notes
e
in
nl
O
ty
si
3.2.9 Issues in Transport Layer Protocol
Ad hoc wireless networks, unlike wired networks, use multi-hop radio relaying
r
to create induced traffic. The neighbour nodes of both the sender and receiver of the
ve
connection are affected by a link-level transmission. Transmission at a single link
impacts one upstream and one downstream link in a route with several connections.
Induced traffic is traffic that is generated at a specific link (or path) as a result of
traffic generated at nearby connections (or pathways). This is owing to the channel’s
ni
Congestion control, reliability, and flow control are all separated: When end-to-
end dependability, flow management, and congestion control are handled individually,
a transport layer protocol can give greater performance. Congestion can sometimes
m
be a local activity, but reliability and flow control are end-to-end activities. When only
one intermediate connection is congested, the transport layer flow might become
congested. As a result, in networks like ad hoc wireless networks, the transport layer
)A
Constraints on power and bandwidth: The two most essential resources in ad hoc
(c
wireless networks are I power and (ii) bandwidth, and nodes in these networks confront
resource limits. These limitations have a substantial impact on the performance of a
transport layer protocol.
e
such as packet loss and retransmission timeout, are ineffective in detecting network
congestion in ad hoc wireless networks. This is because packet loss in ad hoc wireless
networks can be caused by high wireless channel error rates, location-dependent
in
congestion, hidden terminal issue, packet collisions in the network, route breaks owing
to node mobility, and node failure due to a depleted battery.
nl
As a result, the usual concept of network congestion does not apply to ad hoc
wireless networks.
O
problem that a transport layer protocol face. The bottom tiers of wired network transport
layer protocols are almost totally separated. For the transport layer to adapt to the
changing network environment in ad hoc wireless networks, cross-layer interaction with
lower levels such as the network layer and the MAC layer is critical.
ty
Due to the mobility of nodes, several deployment scenarios of ad hoc wireless
networks undergo rapidly changing network topologies. This can result in frequent
path breakage, network segmentation and remerging, and a long time for paths to be
si
reestablished. As a result, fast changes in network topology have a major impact on the
performance of a transport layer protocol.
3.2.10 Addressing r
ve
TCP/IP (Transmission Control Protocol/Internet Protocol) Addressing
TCP/IP contains an Internet addressing scheme that allows users and programmes
to locate and connect with a specified network or host. An Internet address functions
ni
similarly to a postal address in that it allows data to be routed to the desired location.
TCP/IP specifies address assignment for networks, subnetworks, hosts, and sockets,
as well as the use of specific addresses for broadcasts and local loopback.
U
A network address plus a host (or local) address makes up an Internet address.
A sender can indicate the network as well as a specific host on the network using this
two-part address.
ity
125 13 73 15
The network address and the host address are the two components of an Internet
Notes
e
address. When transferring information, a remote host might provide both the remote
network and the remote network host. A host number of 0 (zero) is used to refer to the
network itself as a matter of convention.
in
There are three types of Internet addresses supported by TCP/IP: Class A, Class
B, and Class C. The allocation of the 32 bits of the address determines the distinct
nl
types of Internet addresses. The address class to which a network is assigned is
determined by the network’s size.
Class A Addresses
O
An 8-bit network address and a 24-bit local or host address make up a Class A
address. The network address’s first bit is used to indicate the network class, leaving 7
bits for the actual network address. There are 128 potential Class A network addresses
ty
since 7 bits may indicate the greatest number in binary.
Two network addresses out of 128 are allocated for specific cases: 127 is
designated for local loopback addresses, and a network address of all ones denotes a
si
broadcast address.
As a result, there are 126 Class A network addresses and 16,777,216 local host
addresses to choose from. The highest order bit in a Class A address (see picture) is
set to 0. r
ve
In other words, a Class A address’s first octet is in the range 1 to 126.
Class B Addresses
ni
A 16-bit network address plus a 16-bit local or host address make up a Class B
address. The network address’s first two bits are used to indicate the network class,
leaving 14 bits for the actual network address.
U
As a result, there are 16,384 network addresses and 65,536 local host addresses
to choose from. The highest order bits in a Class B address (see picture) are set to 1
and 0.
ity
In other words, a Class B address’s first octet is in the range 128 to 191.
Class C Addresses
A 24-bit network address with an 8-bit local host address make up a Class C
address. The network address’s first two bits are used to indicate the network class,
m
leaving 22 bits for the actual network address. As a result, there are 2,097,152 network
addresses and 256 local host addresses to choose from. The highest order bits in a
Class C address are set to 1 and 1.
)A
In other words, a Class C address’s first octet is in the range 192 to 223.
Consider how many local hosts will be on the network and how many subnetworks
will be in the organisation when determining which network address class to utilise.
A Class C address is likely suitable if the business is small and the network will have
(c
fewer than 256 hosts. A Class B or Class A address may be more suited if the company
is significant.
Note: Multicast addresses are provided via Class D (1-1-1-0 in the highest order
Notes
e
bits) addresses, which are supported by UDP/IP under AIX.
in
TCP/IP delivers a wildcard address over the network when the host address
section of a C class Internet address contains a 0 (for example, 192.9.200.0). This
implies that any computer with the Class C address 192.9.200.X (where X is a number
nl
between 0 and 254) should be able to reply to the request. As a result, the network is
swamped with requests for computers that do not exist.
O
Class B addresses, such as 129.5.0.0, have similar issues. All computers have
a Class B address of 129.5.X.X.X. As Class B addresses are associated with larger
networks than Class C addresses, the network gets swamped with much more requests
in this situation.
ty
Subnet Addresses
Subnet addressing allows many networks to share the same Internet address in a
si
self-contained system. TCP/subnetwork IP’s functionality also allows a single network
to be divided into numerous logical networks (subnets). For example, a company can
have a single Internet network address that is visible to people outside the company
r
yet divide its network into departmental subnets within. In either instance, fewer Internet
network addresses are needed, and local routing capabilities are improved.
ve
A network address and a local address are the two portions of a conventional
Internet Protocol address field.
ni
Comparison of Addresses
On the source host’s subnet mask, the destination address and the local network
address are compared using logical AND and exclusive OR.
U
Combine the destination address with the mask of the local subnet address using a
logical AND.
ity
The target is presumed to be available directly through one of the local interfaces if
the result is all zeros.
m
Broadcast Addresses
TCP/IP can transfer data to all hosts on a local network or all hosts on all networks
that are directly linked. Broadcast messages are the term for such communications.
The routed routing daemon, for example, queries and responds to routing inquiries via
(c
broadcast messages.
User Datagram Protocol (UDP) and Internet Protocol (IP) are used to transfer data
Notes
e
to all hosts on all immediately linked networks, and the host destination address in the
IP header has all bits set to 1. All the bits in the local address component of the IP
address are set to 0 for data to be broadcast to all hosts on a specified network.
in
Although such instructions or programmes can be built, there are no user
commands that employ the broadcast capabilities.
nl
The broadcast address can be temporarily altered using the ifconfig command’s
broadcast argument. Using the Web-based System Manager fast path, wsm network,
or the SMIT fast path, smit chinet, you can change the broadcast address permanently.
O
If you need to be compatible with earlier versions of applications that utilise a different
broadcast address, changing the broadcast address may be advantageous; for
example, the host IDs are all set to 0.
ty
Local Loopback Addresses (Local Loopback Addresses)
si
to themselves. During the system starting procedure, the configuration manager sets
the local loopback address. The ifconfig command may also be used to set local
loopback, which is implemented in the kernel. When the system is started, loopback is
called.
r
ve
Obtaining an Official Internet Address
The Internet Registry (IR) is the body in charge of assigning identifiers to networks,
such as IP network numbers and autonomous system IDs. Currently, the IR is the
Defense Data Network Network Information Center (DDN NIC). Contact the NIC at
ni
Assume you’re sitting in front of your computer, downloading web pages while
simultaneously operating two FTP sessions and two telnet sessions. As a result, four
network application processes are active. When your computer’s transport layer gets
data from the network layer below, it must route the data to one of these four processes.
m
A process can have one or more sockets, which are doors that allow data to flow
from the network to the process and from the process to the network.
layer, rather than directly to a process. Each socket has its own identification (format
varies depending on TCP or UDP). Each transport-layer segment has its own set of
fields. The transport layer evaluates these fields at the receiving end to identify the
receiving socket and then routes the segment to that socket.
The task of collecting data chunks from various sockets at the source host,
Notes
e
encapsulating each data chunk with header information to produce segments, and
sending the segments to the network layer is called multiplexing.
in
The source port number field and the destination port number field are special
fields in the header. A 16-bit number is assigned to each port (0-65535).
Well-known port numbers range from 0 to 1023 and are restricted/reserved for
nl
usage by well-known application protocols such as HTTP (80) and FTP (21)
O
A port number is allocated to a UDP socket when it is created, but you can
afterwards bind it to a specific port.
ty
Let’s say a process on Host A uses UDP port 19157 to deliver a piece of
application data to a process on Host B that uses UDP port 46428.
si
the application data, the source port, the destination port number, and two additional
values.
r
The transport layer then sends the generated segment to the network layer, which
wraps it in an IP datagram and sends it out using the best available technology.
ve
If the segment arrives at receiving host B, the receiving host’s transport layer
evaluates the segment’s target port number and sends the segment to the socket
designated by port 46428.
ni
It’s worth noting that Host B may be hosting several processes, each with its
own UDP socket and port number. As UDP segments come from the network, host B
examines the segment’s target port number and routes (demultiplexes) each segment
U
Both segments will travel to the same socket if they have distinct source IP
addresses and/or source ports but the same destination IP address and port.
ity
If the server sends/responds back to the client, the source port and IP address is
utilised as a return address.
3. IP address and
4. port number of the destination
Two incoming segments will be forwarded to two distinct sockets, each with a
(c
To illustrate how it works, look at the example where we coded a TCP socket.
e
number and a connection-establishment bit set in the TCP header (it also contains the
source port number)
in
Consider a host that runs a Web server on port 80, such as an apache Web server.
When clients send segments to the server, all of them will have the port 80 as their
destination.
nl
The initial connection formation segments, as well as the segments delivering
HTTP request messages, will all use port 80 as their destination. The server uses
source IP addresses and source port numbers to differentiate segments from distinct
O
clients, as we just saw.
ty
thread with a new connection socket for each new client connection.
If the server connection is persistent, the same socket is used throughout the
connection. For each request/response, a new TCP connection is made and terminated
si
if it is a non-persistent connection.
Messages will begin to drop after a while. A flow control approach is used in computer
networks to address the dilemma of a rapid transmitter and a sluggish receiver.
U
ity
We can see an example of a slow receiver and a rapid transmitter in the diagram
above. We’ll witness how the messages will overflow in this section. The transmitter
is sending messages at a pace of 10 per second, while the receiver is receiving
)A
messages at a rate of 5 per second. The network enqueues messages in the receiver
queue when a sender transmits a message. Once the user application has read the
message. The message is obvious from the line, and one buffer space has been added
to the open space once more.
In the OSI Model, TCP is an example of a transport layer protocol. It ensures that
communications are delivered in a consistent and orderly manner. TCP retries to send a
Amity Directorate of Distance & Online Education
Network Basics 187
e
delivery. TCP will keep resending if there is no flow control, and the situation on the
computer network will deteriorate.
in
During communication, the TCP receiver sends the available space capacity for
incoming messages for flow control. The information on the recipient side is updated,
and the message sending rate is reduced. Flow control in TCP?
nl
Before delivering messages via TCP, the sender needs know how much free space
is available on the receiving side.
The window size is one of the parameters. Both endpoints of each TCP segment
O
provide the window size in the header.
The window size is set to the maximum size at the time of connection setup. The
window size changes as packets are transferred. The window size hits 0 when a TCP
ty
end can no longer accept any more messages. The recipient of a message with window
size zero should refrain from sending any more messages. Until it receives another
message with a nonzero window size.
si
Flow control and TCP users: Until now, the TCP layer has been the focus of all
debate. The traffic source for TCP, which is the layer’s user, will be discussed here.
r
Difference Flow Control vs. Congestion Control: What’s the Difference?
ve
The flow regulation is done from beginning to conclusion. Congestion control,
on the other hand, is a node that connects two nodes. A router between two
communicating nodes, for example, may get crowded.
Flow control is used to inform the sender that the receiver is slower. In order to do
this, a sender programme should be notified in the event of a sluggish receiver. When
sending data, the TCP module usually tells the sender.
U
between the application layer and the network layer. It plays a crucial role in delivering
direct communication services to application processes running on multiple hosts.
The application layer has access to two different transport layer protocols through
the internet:
1. UDP
)A
2. TCP
The calling programme finds TCP UDP, which stands for User Datagram Protocol,
to be an unstable connectionless service. TCP (Transmission Control Protocol) offers
the calling programme with a dependable, connection-oriented service. The application
(c
developer must choose one of these two transport protocols when creating a network
application.
e
simplify nomenclature. However, the internet literature (for example, the RFCs) refers
to the transport-layer packet for TCP as a segment, but the packet for UDP is frequently
referred to as a datagram. However, the network-layer packet is referred to as a
in
datagram in the same internet literature! Before we begin our introduction to UDP and
TCP, it will be helpful to have a basic understanding of the internet’s network layer.
nl
IP, or Internet Protocol, is the name of the internet’s network-layer protocol. IP
allows hosts to communicate logically. The IP service concept is based on providing the
best possible service. This indicates that IP will make its “best effort” to send segments
between communication hosts, but no assurances are made. It does not, for example,
O
ensure segment delivery, orderly segment distribution, or the integrity of the data in the
segments. As a result, IP is considered an unreliable service.
We should also point out that each host has at least one network-layer address,
ty
commonly known as an IP address. In Module 4, we’ll go over IP addressing in greater
depth; for now, all we need to remember is that each host has an IP address.
si
Let’s recap the service models supplied by UDP and TCP now that we’ve looked at
the IP service model. UDP and TCP’s most basic task is to expand IP’s delivery service
r
between two end systems to a delivery service between two processes executing on
those end systems. Transport-layer multiplexing and demultiplexing is the process of
ve
extending host-to-host delivery to process-to-process delivery. Integrity checking is also
provided by UDP and TCP, which include error detection fields in the segment headers.
UDP only provides two transport-layer services: process-to-process data transfer and
error checking. UDP, like IP, is an unreliable service in that it cannot ensure that data
ni
TCP, on the other hand, provides programmes with a number of extra services.
First and foremost, it ensures that data is sent in a secure manner. TCP guarantees that
U
data is transmitted accurately and in order from the sending process to the receiving
process by using flow control, sequence numbers, acknowledgements, and timers.
service offered to the invoking application than a service provided to the internet as a
whole, a service for the common good. TCP congestion control, to put it another way,
prevents a single TCP connection from flooding the connections and routers between
communicating hosts with traffic. TCP tries to allocate an equal amount of bandwidth
m
Notes
e
in
nl
O
ty
r si
ve
ni
U
ity
logical communication offered by the transport layer, without having to worry about the
intricacies of the physical infrastructure used to deliver these messages. The diagram
below depicts the concept of rational communication.
Transport layer protocols are implemented in end systems but not in network
(c
routers, as seen in the diagram above. The transport layer translates application-layer
messages received from a sending application process into transport-layer packets,
also known as transport-layer segments in internet parlance, on the sending side.
Amity Directorate of Distance & Online Education
190 Network Basics
To generate the transport layer segment, divide the application messages into smaller
Notes
e
chunks and add a transport-header to each chunk. At the transmitting end system, the
transport layer passes the segment to the network, where it is encased in a network-layer
packet (a datagram) and delivered to the destination. It’s worth noting that network routers
in
only affect the network-layer section enclosed in the datagram. The network layer takes the
transport-layer segment from the datagram and transfers it up to the transport layer on the
receiving side. The received segment is next processed by the transport layer, which makes
nl
the data in the segment available to the receiving application.
O
The Transport Control Protocol (TCP) is a dependable transport layer protocol.
This implies that if an application software sends a stream of data to TCP, TCP
must transmit the whole stream to the application programme on the other end in
ty
sequence, without errors, and without any parts being lost or duplicated.
si
via error control systems. A technique for fixing mistakes after they have been noticed
is included in error control. In TCP, error detection and repair are accomplished using
three basic tools: checksum, acknowledgement, and time-out.
r
Checksum: Each segment has a checksum field that is used to detect whether it is
ve
corrupted. If the segment is corrupted, the destination TCP discards it and considers it
lost. In every segment of TCP, a 16-bit checksum is required.
received. Control segments with no data but that consume a sequence number are also
recognised. The existence of ACK segments is never recognised. The retransmission of
segments lies at the heart of the error control system. A segment is retransmitted if it is
damaged, lost, or delayed.
U
Even though the lack of a received ACK might be due to a delayed segment, a
m
delayed ACK, or a lost acknowledgement, when the timer matures, the earliest
outstanding segment is retransmitted. It’s worth noting that a section with merely an a
doesn’t have a timer set.
)A
The out-of-order parts are not usually discarded in today’s implementations. They
(c
temporarily store them and mark them as out-of-order segments until the missing
segment is delivered. The out-of-order portions, on the other hand, are not given to the
process. TCP ensures that data is provided to the process in the correct sequence.
Amity Directorate of Distance & Online Education
Network Basics 191
e
Fill in the blanks:
in
2. Socket-style API for windows is called ___________.
3. Transmission control protocol is _______protocol.
nl
4. Transport layer aggregates data from different applications into a single stream
before passing it to ________
5. An endpoint of an inter-process communication flow across a computer network is
O
called ___________.
Summary
ty
●● The transport layer is a component of the TCP/IP networking paradigm, often
known as the networking architecture. It includes a complete set of documents that
detail everything needed to run a computer network.
●● The transport layer is in charge of logical communication between applications
si
operating on separate hosts, as well as delivering services to application layer
protocols on a higher tier of the TCP/IP network paradigm.
●●
r
Despite the fact that there are several transport layer protocols, the two most
often used protocols are the Transmission Control Protocol (TCP) and the User
ve
Datagram Protocol (UDP) (UDP).
●● These protocols offer a variety of features to meet the needs of various
applications.The following are a handful of the most essential features:
ni
a local or distant network. The transport layer includes a system that allows
any programme on a host to connect with another application on a different
host, either locally or remotely.
◌◌ According to Cisco, this system assigns an identification known as a port
number to each programme, ensuring that each software process that
m
◌◌ Similarly, the transport layer of the receiving device gets these segments
and utilises the header to rebuild them into full data. Using port numbers to
multiplex conversation.
Amity Directorate of Distance & Online Education
192 Network Basics
◌◌ When utilising an application, the data or services given typically seem like a
Notes
e
continuous stream of data.
◌◌ However, delivering data (for example, video) through a network in a
in
continuous stream might take all of the available network capacity. This
prevents other services from using the medium, such as email, and makes
error recovery and retransmission of damaged data more difficult.
nl
◌◌ The multiplexing method divides TCP and UDP data into little bits, allowing
various users’ communications to coexist on the same network. This
technique is based on the notion of a socket.
O
Activity
●● Draw different types of Transport layer protocols.
●● Make a schematic representation of Transport Protocols
ty
Question and Answers
1. Which layer is responsible to deliver data from one station to another?
si
2. What is multiplexing in a transport layer?
3. What is the difference between physical layer and data link layer?
4. r
What is fragmentation and re assembly in transport layer?
ve
Glossary
●● FTP (File Transfer Protocol): FTP stands for file transfer protocol. It is the protocol
that allows us to send and receive files. This may be done between any two
ni
machines that use it. FTP, on the other hand, is both a protocol and an application.
FTP allows users to share files with others over the internet using a secure and
efficient data transfer protocol. For FTP, the data port is 20 and the control port is
21.
U
●● TFTP: The Trivial File Transfer Protocol (TFTP) is a stripped-down, stock version
of FTP that you should use if you know exactly what you’re looking for and where
to get it. It’s a simpler form of FTP that allows you to transfer data across network
ity
across networks via a procedure known as “store and forward.” It collaborates with
the Mail Transfer Agent (MTA) to deliver your message to the correct computer
and email mailbox. The SMTP port number is 25.
●● Connection-oriented communication: It is normally easier for an application
(c
to interpret a connection as a data stream rather than having to deal with the
underlying connection-less models, such as the datagram model of the User
Datagram Protocol (UDP) and of the Internet Protocol (IP).
●● Same order delivery: The network layer doesn’t generally guarantee that packets
Notes
e
of data will arrive in the same order that they were sent, but often this is a
desirable feature. This is usually done through the use of segment numbering, with
the receiver passing them to the application in order. This can cause head-of-line
in
blocking.
●● Reliability: Packets may be lost during transport due to network congestion and
nl
errors. By means of an error detection code, such as a checksum, the transport
protocol may check that the data is not corrupted, and verify correct receipt by
sending an ACK or NACK message to the sender. Automatic repeat request
schemes may be used to retransmit lost or corrupted data.
O
●● Flow control: The rate of data transmission between two nodes must sometimes
be managed to prevent a fast sender from transmitting more data than can be
supported by the receiving data buffer, causing a buffer overrun. This can also be
ty
used to improve efficiency by reducing buffer underrun.
●● Congestion avoidance: Congestion control can control traffic entry into a
telecommunications network, so as to avoid congestive collapse by attempting
si
to avoid oversubscription of any of the processing or link capabilities of the
intermediate nodes and networks and taking resource reducing steps, such as
reducing the rate of sending packets. For example, automatic repeat requests may
r
keep the network in a congested state; this situation can be avoided by adding
congestion avoidance to the flow control, including slow-start. This keeps the
ve
bandwidth consumption at a low level in the beginning of the transmission, or after
packet retransmission.
●● Multiplexing: Ports can provide multiple endpoints on a single node. For example,
ni
Further Readings:
ity
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
2. Computer Networks, Andrew S. Tannenbaum, PHI, New Delhi.
3. Data and Computer Communication, William Stalling, PHI, New Delhi
m
2. winsock
3. connection oriented
4. network layer
(c
5. socket
e
Subnetting
in
Structure:
4.1 Network Layer Design Issues
4.1.1 Introduction: Network Layer
nl
4.1.2 Service Provided to the Transport Layer
4.1.3 Implementation of Connection Less Service
4.1.4 Implementation of Connection Oriented Service
O
4.1.5 Comparision of Virtual Circuit and Datagram Network
4.2 Routing Algorithms
4.2.1 Introduction to Routers
ty
4.2.2 The optimility principle
4.2.3 Shortest Path Algorithm
4.2.4 Flooding
si
4.2.5 Distance Vector Algorithm
4.2.6 Hierarichical Algirithm
4.2.7 r
Router Configuration
ve
4.3 Congestion Control
4.3.1 Approaches to Congestion Control
4.3.2 Traffic-aware Routing
4.3.3 Admission Control
ni
4.4.2 Tunneling
4.4.3 Internetwork Routing
4.4.4 Packet Fragmentation
ity
4.5 Subnetting
4.5.1 Subnetting IP Networks
4.5.2 Subnetting an IPv4 Network
4.5.3 Addressing Schemes
(c
e
Objectives
in
At the end of this unit, you will be able to:
nl
●● Differentiate between connection oriented and connection less services
●● Define the concept of addressing in networking
O
●● Define congestion in the network layer
●● Explain the concept of routing
●● Explain the concept of pocket switching
ty
●● Define packet switching network.
Introduction
si
The network layer was created with the following purposes in mind: The services
offered should be decoupled from the underlying technology. It is not necessary for service
consumers to understand the network’s physical implementation. Given the variety of
r
networks in use, this design aim is even more important. In the domain of public networks,
ve
technological knowledge is lacking in developing nations. The architecture of the layer should
allow it to connect to networks of various technologies. The transport layer (host computer)
should be protected against the number, type, and topologies of subnets that are used.
ni
subnets may use different protocols that are incompatible with one another. The
network layer is in charge of routing packets from source to destination while mapping
various addressing schemes and protocols.
The Internet Protocol is a well-known and commonly used Network Layer protocol
Notes
e
that allows end-to-end devices to interact across the internet. It’s available in two
varieties. IPv4, which has dominated the internet for decades, is running out of address
space. IPv6 was intended to replace IPv4 and, perhaps, to alleviate IPv4’s restrictions
in
as well.
nl
The transport layer’s services are described further below.
Addresses Mapping
O
It refers to the transformation of a transport address into a network address. When
a session entity delivers a transport service data unit (TSDU) to another session entity,
it uses its transport service access point address to identify itself. The network service
ty
access point (NSAP) address is then determined by the transport entity. Address
mapping is the term for this.
si
Network Connection Assignment
A network connection is assigned by the transport entity to convey the transport
protocol data units (TPDUs). This allocated network connection is established by the
r
transport entity. Recovery after network disconnection is possible in several transport
protocols. When a disconnection occurs in such protocols, the transport entity reassigns
ve
TPDU transport to a separate network connection.
The receiving transport entity uses the transport connection endpoint identifier
U
As indicated in the diagram below, the TCEP identification is unique for each
ity
connection.
m
)A
As indicated in the diagram below, the TCEP identification is unique for each
(c
connection.
e
When the network provider’s quality of service is less than the desired quality
of service, or when higher resilience against network connection failures is required,
in
the transport entity splits the data. Splitting refers to the sending of TPDUs from one
transport connection via several network connections.
nl
indicated in the diagram below.
O
ty
si
Figure: Reordering of TSDUs
r
ve
Establishment of Transport Connection
By sending a request, the transport layer creates the transport connection. It
uses the T-CONNECT service primitives to establish a link. The transportation entity is
responsible for the service quality, requirements, and collection of addresses.
ni
Data Transfer
The transport layer supports two forms of data transfer: normal data transfer and
U
accelerated data transfer. In a standard data transmission, the user can request that
user data be transferred in any integral number of octets.
This transfer is transparent, meaning that user data boundaries are kept and there
ity
Data can be sent in two directions at the same time. The accelerated data transfer
has its own control flow, and it may provide all of the data queues with the highest
priority. It’s a user-selectable or provider-selectable service. The amount of octets of
m
The transport entity splits the transport service data unit into numerous transport
protocol data units, each with its own header including a PCI identifier (Protocol Control
Identifier). Segments is the name for this function.
When the network service cannot accommodate the size of a transport protocol
(c
Notes
e
in
nl
Figure: Segmentation and concatenation of TSDU
O
Concatenation is the function of segments in reverse. The concatenation allows
several TPDUs to be mapped to a single NSDU. These TPUs may be associated with
one or more transport links. If they are connected by various modes of transportation,
ty
they must be travelling in the same direction. The transport entity performs a separation
function at the receiving end.
si
used to increase the efficiency of network service consumption.
There are some limitations on which types of TPDUs can be concatenated, and the
borders of those TPDUs must be established by the transport entity.
r
ve
ni
U
Flow Control
For flow control, the transport entity employs a modified version of the sliding
window protocol. As the transport layer may receive back pressure from the network
layer, this flow control is essential.
m
The window size is flexible and regulated by the receiver in the mechanism.
A credit is assigned to the sender of the receiver, indicating how many TPDUs it can
receive.
)A
Error Recovery
TPDU faults, protocol problems, or signal failure circumstances of network
connections, such as reset or release of network connections, can all cause errors at
this level. Such mistakes are communicated to the transport layer when they occur at
(c
layer 3.
TPDU faults can take the form of missing TPDUs, duplicated TPDUs, sequence
Notes
e
reordering, or content issues.
Duplicate TPDUs are deleted, and lost TPDUs are recognised with a request to
in
resend. They are re-sequenced in the recording, and content faults are recognised by
the transport entity inserting error detection bytes in TPDUs.
Content-error TPDUs are discarded and considered as lost, thus they are also
nl
acknowledged. When there are protocol failures, the connection is relinquished, and when
there are signal failure faults, the network connection is reassigned and resynchronized.
O
Sequence Numbering
In normal operations mode, a transport entity of seven bits assigns a sequence
number to each TPDU. This sequence numbering is used to manage flow and recover
from errors. The sequence number in extended mode can be up to 31 bits long.
ty
4.1.3 Implementation of Connection Less Service
si
As individual packets are injected into the network and routed separately when
connectionless service is provided, packets are commonly referred to as Datagrams
(much like telegrams).
r
There is no need to prepare ahead of time. Datagram subnets are a type of subnet.
ve
When a connection-oriented service is given, a path from the source router to the
destination router is created before any packet is transmitted. Virtual Circuit is the name
of the connection, while Virtual Circuit subnet is the name of the subnet.
Datagrams Network
Let’s take a step-by-step look at how a datagram network operates.
to P2 on host H2. P1 gives the message to the transport layer, along with instructions
for P2 to receive it on H2.
Step 2: On H1 and within the operating system, Transport Layer code is executing.
Notes
e
The message is prepended with a transport header, and the ultimate result is sent to
the network layer.
in
Step 3: Assume a packet that is four times larger than the maximum size of the
packet; the packet is then divided into four smaller packets, each of which is transmitted
to the router A using the point-to-point protocol, and career takes over from there.
nl
Step 4: Each router has an internal table that specifies where packets should be
transmitted. Every table entry is a pair that includes a destination and an outgoing line
for that destination. Only lines that are directly linked can be used.
O
Step 5: As A only has two outgoing connections to B and C, every incoming packet
must be routed through one of these routers, even if the final destination is another
router.
ty
Step 6: When the packets arrived at A, they were separated into three groups: 1,
2, 3, and 4. Then, according to A’s table, each packet is transported to C. Packet 1 is
transmitted to E, after which it is forwarded to F. When packet 1 reaches F, it is wrapped
si
in a data link layer and transmitted to H2 through the LAN. Packets 2 and 3 will go the
same path.
telephone system. The user creates a connection, utilises it, and then releases it to use
a connection-oriented service. The data streams/packets are sent to the recipient in the
same sequence as they were sent by the sender in connection-oriented services.
ity
Virtual circuit-switched connection: In this case, the data stream is sent through a
packet switched network, giving the user the impression that the sender and receiver
are on a dedicated channel. Here, a virtual route is built. Other connections, however,
)A
e
1. This is a dependable connection for the most part.
2. There are less traffic jams.
in
3. Data packets are guaranteed to be in the correct order.
4. Duplicate data packet issues are no longer an issue.
nl
5. It’s ideal for long-distance connections.
O
1. Prior to communication, resource allocation is required. As a result, network
resources are frequently underutilised.
2. The slower connection speed is caused by the time it takes to create and release the
ty
connection.
3. There are no other options for communicating in the event of router failures or
network congestion.
si
4.1.5 Comparison of Virtual Circuit and Datagram Network
Packet switching networks are classified as virtual – circuit and datagram
r
networks. A virtual path between the source and destination systems is constructed in
ve
virtual circuits, and data packets are transported from the source to the destination. In
datagram networks, on the other hand, each data packet, known as a datagram, has
sufficient header information to allow it to be independently routed to the destination by
all intermediary network switching devices.
ni
Addressing During the setup step, the The entire source and destination
Notes
e
addressing and route are addresses are included in each
decided. As a result, each datagram packet.
in
packet just includes the VC
number.
Header As all packets in a message Even if the separate datagram
nl
belong to the same virtual packets are part of the same
circuit, they all have the same message, the header information is
header information. distinct.
Cost Virtual circuits are more Datagram networks are much
O
expensive in terms of cheaper to install and maintain.
installation and maintenance.
Application Virtual Circuits are User Datagram Protocol (UDP) is
ty
Areas implemented in networks using a protocol that governs datagram
Asynchronous Transfer Mode communication (UDP). They're
(ATM) communications, as in used in an IP network.
making telephone calls.
si
Reliability and They provide greater reliability They require more complex logic.
Complexity and less complexity owing Also, they are less reliable than
to fixed paths and fixed virtual circuits due to error-prone
r
resources. dynamic resource allocation
ve
techniques.
Figure
ni
U
Summary
●● The network layer was created with the following purposes in mind: The services
offered should be decoupled from the underlying technology. It is not necessary for
(c
●● The Internet Protocol is a well-known and commonly used Network Layer protocol
Notes
e
that allows end-to-end devices to interact across the internet. It’s available in two
varieties-IPv4 and IPv6.
in
●● The receiving transport entity uses the transport connection endpoint identifier
(TCEPI), which is connected to each TSDU by the transmitting transport entity, to
identify the numerous TSDUs (multiplexed).
nl
●● When the network provider’s quality of service is less than the desired quality of
service, or when higher resilience against network connection failures is required,
the transport entity splits the data.
O
●● Data can be sent in two directions at the same time. The accelerated data transfer
has its own control flow, and it may provide all of the data queues with the highest
priority.
ty
●● For flow control, the transport entity employs a modified version of the sliding
window protocol. As the transport layer may receive back pressure from the
network layer, this flow control is essential.
si
●● Error Recovery: TPDU faults, protocol problems, or signal failure circumstances
of network connections, such as reset or release of network connections, can all
cause errors at this level. Such mistakes are communicated to the transport layer
when they occur at layer 3.
r
ve
●● Connection with a circuit-switched connection: A dedicated physical channel or
circuit is formed between the communication nodes in circuit switching, and then
the data stream is transmitted.
●● Packet switching networks are classified as virtual – circuit and datagram
ni
Activity
1. Draw various congestion control systems.
2. Make an algorithm on concepts of congestion in network.
ity
Glossary
1. Addresses Mapping: It refers to the transformation of a transport address into a
network address.
(c
2. Splitting: It refers to the sending of TPDUs from one transport connection via several
network connections.
e
connections to the network connection for optimal network link utilisation.
Connection-oriented communication: It is normally easier for an application to
interpret a connection as a data stream rather than having to deal with the underlying
in
connection-less models, such as the datagram model of the User Datagram Protocol
(UDP) and of the Internet Protocol (IP).
nl
4. Same order delivery: The network layer doesn’t generally guarantee that packets
of data will arrive in the same order that they were sent, but often this is a desirable
feature. This is usually done through the use of segment numbering, with the receiver
passing them to the application in order. This can cause head-of-line blocking.
O
5. Reliability: Packets may be lost during transport due to network congestion and errors.
By means of an error detection code, such as a checksum, the transport protocol
may check that the data is not corrupted, and verify correct receipt by sending an
ty
ACK or NACK message to the sender. Automatic repeat request schemes may be
used to retransmit lost or corrupted data.
6. Flow control: The rate of data transmission between two nodes must sometimes be
si
managed to prevent a fast sender from transmitting more data than can be supported
by the receiving data buffer, causing a buffer overrun. This can also be used to
improve efficiency by reducing buffer underrun.
7. r
Congestion avoidance: Congestion control can control traffic entry into a
ve
telecommunications network, so as to avoid congestive collapse by attempting to
avoid oversubscription of any of the processing or link capabilities of the intermediate
nodes and networks and taking resource reducing steps, such as reducing the rate
of sending packets. For example, automatic repeat requests may keep the network
ni
Further Readings:
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
2. Computer Network, A. S. Tarenbaum, 4th edition, Prentice Hall of India, New
ity
Delhi, 2002.
3. Data Network, Drnitri Berteskas and Robert Galleger, Second edition, Prentice
Hall of India, 1997, New Delhi.
m
5. connection oriented
e
Objectives
in
At the end of this unit, you should be able to:
nl
●● Draw a spanning tree
●● Understand the functioning of distance vector routing and link state routing
O
●● Understand and implement multicast routing
Introduction
The network layer must find the optimum path by which packets may be
ty
transmitted in order to send packets from source to destination.
The basic goal of the network layer, whether it provides datagram service or virtual
si
circuit service, is to provide the optimum path. This is handled by the routing protocol.
The routing protocol is a routing technique that finds the shortest route from one
point to another. The “least-cost path” from source to destination is the optimum way.
r
Routing is the act of moving packets from a source to a destination, but the routing
ve
algorithm determines the optimum path to take.
A router is a networking device that sends data packets from one computer
m
network to another.
Let us take an example: if you search for www.google.com in your web browser,
this is a request that will be sent from your system to the google’s server to serve that
)A
webpage; however, your request, which is nothing more than a stream of packets, does
not go straight to the google’s server; instead, it passes through a series of networking
devices known as a router, which accepts these packets and forwards them to the
correct path, and thus it reaches the google
(c
Notes
e
in
nl
O
Figure: Modem and Router Diagram
ty
A router has several interfaces via which it may communicate with a variety of host
systems.
si
A router’s functions are as follows:
r
Forwarding - The router takes packets from its input ports, verifies their headers,
ve
does some basic duties such as verifying checksums, and then looks up in the routing
table to identify the proper output port to dump the packets into, and then passes the
packets to that output port.
Routing - Routing is the process by which a router determines the optimal path for
ni
a packet to take to reach its destination. It does so by maintaining a routing table that is
created only by the router using various methods.
Input Port – This is the interface through which packets are admitted into the
ity
router; it performs several key functions, including terminating the physical link at
the router (the leftmost part in the diagram below), interoperating with the link-layer
(decapsulation), and looking up the forwarding table to determine the appropriate output
port based on the destination address (the last part of the input port).
m
Switching Fabric — This is the router’s brain, and it links the input and output ports.
It’s a form of network within a network.
There are several approaches to implement the switching fabric. Among the most
)A
notable are:
Switching through memory: This method uses a CPU to copy packets from input
ports and transmit them to the appropriate output port. It functions as a standard CPU,
with input and output ports that serve as input and output devices.
(c
Changing modes via bus: We have a bus in this implementation that links all of the
input ports to all of the output ports. The input port places a specific token on the packet and
transfers it to the bus after receiving it and deciding which output port it should be given to.
Amity Directorate of Distance & Online Education
Network Basics 207
The packets are visible to all output ports, however they will be sent to the output
Notes
e
port with the token, which is scraped off by that output port and the packet is forwarded.
in
bus to connect n input ports to n output ports in this more advanced network.
Output Port - This is the section of the router from which packets are sent out. The
output port examines its queuing buffers (queuing buffers are generated when several
nl
packets must be communicated over the same output port) and accepts packets,
performs link layer tasks, and ultimately transmits the packets to an outgoing link.
O
similarly to a standard CPU. It uses a variety of routing methods, such as the link-state
algorithm and the distance-vector algorithm, to create a forwarding table that is used to
identify the route and output port.
ty
4.2.2 The Optimality Principle
Introduction
si
Without respect to network structure or traffic, a general assertion regarding
best routes is made. The optimality principle is the name given to this assertion
(Bellman,1975).
r
ve
The optimality principle is stated as follows:
It asserts that if router J is on the best path from router I to router K, then the best
way from J to K is likewise on the best path. The path from I to J is referred to as r1,
whereas the rest of the trip is referred to as r2. It might be used with r1 to enhance the
ni
route from I to K, contradicting our claim that r1r2 is optimum only if there is a better
route from J to K than r2.
U
Example
Consider the following network of routers: G, H, I, J, K, L, M, N in the diagram.
Let’s say the best way to get from I to K is to take the green path, which is I-G-J-L-K.
The ideal path from J to K, according to the optimality principle, will be along the same
ity
Notes
e
in
nl
The collection of optimum routes from all sources to a particular destination may
be seen as a directed consequence of the optimality principle from a tree rooted at the
destination. This tree is known as a sink tree, and it is seen in figure.
O
Figure description:
The number of hops is used as the distance measure in the diagram. As a result,
ty
all routing algorithms have the same goal: to find and employ sink trees for all routers.
Other trees with similar route lengths may exist beside the sink tree. If we
allow all potential pathways to be taken, the tree becomes a DAG, which is a more
si
comprehensive structure (Directed Acyclic Graph). There are no loops in DAGs.
r
ve
ni
U
ity
m
)A
(c
e
For both scenarios, we’ll utilise sink trees as a useful shortcut. For both scenarios,
we’ll make the technical assumption that the pathways don’t interact with one another,
in
so a traffic bottleneck on one path won’t force another to detour.
Conclusion: As there are no loops in the sink tree, each packet will arrive in a
finite and bounded number of hops. Life isn’t always easy in practise. Due to the fact
nl
that links and routers might fall down and back up during operation, various routers
may have different views of the present topology. We also discovered the question
of whether each router must obtain the information on which to base its sink tree
O
computation independently or whether this information is gathered through other
sources. The optimality principle and the sink tree provide a baseline against which
other routing algorithms can be compared.
ty
4.2.3 Shortest Path Algorithm
In computer networks, shortest path algorithms seek to identify the shortest
pathways between network nodes in order to reduce routing costs. They are
si
straightforward implementations of graph theory’s suggested shortest route algorithms.
Explanation
r
Consider a network with N vertices (nodes or network devices) and M edges
ve
connecting them (transmission lines). Each edge has a weight connected with it, which
represents the transmission line’s physical distance or transmission delay. The goal of
shortest path algorithms is to discover a path between any two vertices along the edges
with the least number of weights.
ni
Set the distances from s to all nodes to infinity (); the distance to itself to 0; and an
)A
array dist[] of size |V| (number of nodes) with all values except dist[s].
Iteratively calculate the shortest distances. For each node except s, repeat |V|- 1
times.
For each edge linking the vertices u and v, repeat the process.
(c
If dist[v] is greater than (dist[u] + edge u-weight), v’s then update dist[v] to dist[u] +
edge u-weight. v’s
The shortest path from s to every other node is stored in the array dist[].
Notes
e
The Algorithm of Dijkstra
in
A shortest route tree, spt[, with s as the root node, is returned.
The initializations
nl
An array of distances dist[] of size |V| (number of nodes), where dist[s] = 0 and
dist[u] = (infinite), where u represents any node except s in the graph.
O
Q is an array that contains all of the graph’s nodes. Q will become empty when the
algorithm reaches its conclusion.
The visited nodes will be added to an empty set, S. When the process is finished, S
ty
will include all of the graph’s nodes.
si
Update dist[v] as for each node v that is near to u.
Update dist[v] = dist[u] + weight of edge u-v if (dist[u] + weight of edge u-v) =
dist[v]. r
ve
The shortest path from s to every other node is stored in the array dist[].
Output a shortest path cost matrix, cost[][, displaying the cheapest pathways
U
The shortest cost from each node, I to every other node, j, is included in the matrix
cost[][].
(c
4.2.4 Flooding
Notes
e
Flooding is a non-adaptive routing strategy that works on the following principle:
when a data packet arrives at a router, it is delivered to all outbound lines except the
in
one on which it arrived.
Consider the network shown in the diagram, which consists of six routers
connected by transmission lines.
nl
Using the flooding method When a packet arrives at A, it is sent to B, C, and D.
O
B, D, and F will get the packet from C.
ty
The parcel will be sent to F via E.
si
Various types of flooding
There are three forms of flooding.
r
Uncontrolled flooding occurs when each router sends all incoming data packets to
all of its neighbours without fail.
ve
They employ several strategies to regulate the delivery of packets to neighbouring
nodes, which is known as controlled flooding. Sequence Number Controlled Flooding
(SNCF) and Reverse Path Forwarding are two prominent methods for controlled
flooding (RPF).
ni
Selective flooding is when routers broadcast incoming packets just along pathways
that are roughly in the appropriate direction, rather than all available paths.
U
Benefits of Flooding
●● As a router may simply know its neighbours, it is incredibly simple to set up and
deploy.
ity
●● It’s highly durable. Even if a high number of routers fail, the packets find a way to
get to their destination.
●● All nodes that are related to each other, whether directly or indirectly, are visited.
m
As a result, there is no way for any node to be missed. In the case of broadcast
messages, this is an important criterion.
●● Flooding always chooses the quickest path.
)A
Flooding Constraints
●● Unless certain efforts are taken to damp packet creation, flooding tends to produce
an unlimited number of duplicate data packets.
●● If just one destination requires the packet, it is inefficient since it sends the data
(c
●● Unwanted and duplicate data packets might jam the network. Other data packets
Notes
e
may be hampered as a result.
in
The Distance vector algorithm is distributed, iterative, and asynchronous.
It is distributed in the sense that each node gets data from one or more of its
nl
directly associated neighbours, conducts calculations, and then distributes the results to
the rest of the network.
O
can be transferred between neighbours.
It is asynchronous in that it does not require all of its nodes to function in lockstep
with one another.
ty
A dynamic algorithm is the Distance Vector Algorithm.
si
Vector is a distance database that is maintained by each router.
The following are three keys to understanding how the Distance Vector Routing
Algorithm works:
r
ve
Understanding of the entire network: Each router communicates its information with
the rest of the network. The Router shares the information it has gathered about the
network with its neighbours.
Only route to neighbours: Only those routers with direct connectivity to the router
ni
receive the router’s network information. Through the ports, the router communicates
any information it has about the network. The router receives the data and utilises it to
update its own routing table.
U
Sharing information on a regular basis: The router relays the information to the
nearby routers in 30 seconds.
Let dx(y) be the cost of the shortest path between nodes x and y. The Bellman-
Ford equation, dx(y) = minvc(x,v) + dv(y), relates the lowest costs.
Where minv is the average of all x neighbours’ equations. If we analyse the least-
m
cost way from v to y after going from x to v, the path cost will be c(x,v)+dv (y). The
cheapest route from x to y is c(x,v)+dv(y) divided by all neighbours.
The node x carries the following routing information when using the Distance
)A
The cost c(x,v) is the route cost from x to a directly related neighbour, v, for each v.
Node x delivers a copy of its distance vector to all of its neighbours via an
Notes
e
asynchronous process known as distance vector routing. When node x gets a new
distance vector from one of its neighbours, v, it records v’s distance vector and updates
its own distance vector using the Bellman-Ford equation. The following is the equation:
in
For each node y in N, dx(y) = minv c(x,v) + dv(y)
Using the above equation, node x updates its own distance vector database and
nl
transmits it to all of its neighbours so that they can update their own distance vectors.
Algorithm
O
Initialization for all destinations y in N at each node x:
Dx(y) = c(x,y) = Dx(y) = Dx(y) = Dx(y) = Dx( If y is not a neighbour, then c(x,y) =
and w Dw(y) = for each neighbour. for every y in N destinations
ty
Send the distance vector Dx = [Dx(y) : y in N] to each of your neighbours. for each
y in N: to w loop wait(until I receive any distance vector from any neighbour w)
si
If Dx(y) is altered for any destination, y will change as well.
Each cloud in the above diagram represents a network, and the number within
each cloud is the network ID.
m
Routers link all of the LANs, which are represented by boxes designated A, B, C,
D, E, and F.
)A
By assuming that the cost of each link is one unit, the distance vector routing
method streamlines the routing process. As a result, the number of connections
required to reach the destination may be used to gauge transmission efficiency.
Notes
e
in
nl
O
ty
Figure: Router sends the knowledge
si
The router delivers the knowledge to the immediate neighbours, as seen in the
diagram above. The neighbours combine this information with their own and transmit
r
the updated table to their respective neighbours. As a result, routers receive both their
own information and fresh information about their neighbours.
ve
4.2.6 Hierarchical Algorithm
hierarchy.
In divisive hierarchical algorithms, on the other hand, all the data points are viewed
as one big cluster, and the clustering process entails splitting (Top-down method) the
one big cluster into several tiny clusters.
m
We’ll go through the most common and significant type of hierarchical clustering,
)A
agglomerative clustering. The following are the actions to take in order to do this:
First, treat each data point as if it were a single cluster. As a result, we’ll have, say,
K clusters to begin with. At the start, the amount of data points will also be K.
Phase 2: In this step, we’ll link two closet datapoints to build a large cluster. As a
(c
Step 3: Now we need to link two closet clusters together to make additional
Notes
e
clusters. As a result, there will be a total of K-2 clusters.
Step 4: To construct a single large cluster, repeat the previous three stages until K
in
equals 0, i.e. there are no more data points to combine.
Step 5: Finally, after creating a single large cluster, dendrograms will be utilised to
divide the cluster into numerous clusters based on the problem.
nl
Dendrograms’ Contribution to Agglomerative Hierarchical Clustering
The job of the dendrogram begins after the huge cluster is established, as we
O
explained in the previous stage.
ty
understand it.
si
of dendrograms from the simple example given before.
import pandas as pd
r
ve
%matplotlib inline
import numpy as np
path = r”C:\pima-indians-diabetes.csv”
headernames = [‘preg’, ‘plas’, ‘pres’, ‘skin’, ‘test’, ‘mass’, ‘pedi’, ‘age’, ‘class’]
U
array = data.values
X = array[:,0:8]
ity
Y = array[:,8]
data.shape
(768, 9)
m
data.head()”
)A
(c
Notes
e
in
nl
O
ty
r si
ve
ni
U
ity
m
)A
The details are extensive. With the assistance of two screenshots, I’ve displayed
(c
an example of a few of the significant lines shown by the router when we type the show
running-config command into the router.
e
in
nl
O
ty
si
Figure: Router configuration output 1
r
ve
ni
U
ity
m
All of the interfaces are down, and no IP addresses or routes are assigned to any
of the router’s ports or interfaces, as shown in the above default setup settings.
)A
#1) Now we must setup the router with some fundamental characteristics, such as
activating the hostname, password, and the configuration terminal.
#2) The configure terminal mode must be enabled in order to configure the router
(c
#3) We can log into the router with the username and password from the remote
end machine by using telnet.
Amity Directorate of Distance & Online Education
218 Network Basics
e
Telnet 10.180.196.42 is an example.
Router1 is the username and password for logging in (specify login id, here login id
in
is Router1)
******** Password:
nl
enable Router>
#4) With the aid of the following, you will have a better understanding.
O
Router> enable is an example.
ty
to configure the system.
#5) The hostname (router name) and password must now be defined.
si
# hostname Router(config) Router X Router(config)# exit
#6) We use the “Ping” command to determine if the router’s, switch’s, or any other
host’s far end IP is reachable or not from the remote end. It’s an important command
r
that may also be used locally on your PC to assess IP reachability.
ve
Ping Command Output from RouterX# ping 10.10.100.1
ni
U
ity
The above result indicates that the ping was successful, and that the IP address
may be reached. It’s also used to make if the loopback interface is working.
m
If we do not receive a response, it signifies that we are unable to contact the IP for
whatever reason.
)A
1. In order to transfer the packets from source to the destination, the network layer
must determine the best route through which _________ can be transmitted.
(c
2. In case of random walks, a packet sent by the node to one of its __________
randomly.
e
4. ___________ routing algorithm is also known as a static routing algorithm.
5. In case of flooding, every incoming packet is sent to all the _________ except the
in
one from it has been reached.
Summary
nl
●● The network layer must find the optimum path by which packets may be
transmitted in order to send packets from source to destination.
●● In this section, we first looked at several routing strategies. First, we looked at how
O
to identify the best route between two routers. On the graph, the algorithm finds
the shortest path between them. There are several techniques for determining the
shortest path between two nodes in a graph.
ty
●● Then we looked at floods. Every incoming packet is sent out on every outgoing
line except the one from whence it arrived in flooding. Although this approach
is fairly simple to construct, it creates a large number of redundant packets. It
identifies all paths, including the ideal one, thus it is resilient and performs well.
si
●● Following that, we investigated the Belman-Ford routing method. Each host in this
algorithm keeps a routing table. Every other router in the subnet has an entry in
r
this routing table. These tables are kept up to date by exchanging information with
neighbours.
ve
●● Following that, we looked at the link state routing method. In computer networks,
shortest path algorithms seek to identify the shortest pathways between network
nodes in order to reduce routing costs. They are straightforward implementations
ni
Activity
U
1. Alice and Bob are responsible for implementing Dijkstra’s algorithm at the nodes in
a network running a link-state protocol. On her nodes, Alice implements a minimum-
cost algorithm. On his nodes, Bob implements a “shortest number of hops” algorithm.
Give an example of a network topology with 4 or more nodes in which a routing loop
ity
occurs with Alice and Bob’s implementations running simultaneously in the same
network. Assume that there are no failures.
Glossary
●● Forwarding: The router takes packets from its input ports, verifies their headers,
(c
does some basic duties such as verifying checksums, and then looks up in the
routing table to identify the proper output port to dump the packets into, and then
passes the packets to that output port.
●● Routing: Routing is the process by which a router determines the optimal path for
Notes
e
a packet to take to reach its destination. It does so by maintaining a routing table
that is created only by the router using various methods.
in
●● Input Port: This is the interface through which packets are admitted into the router;
it performs several key functions, including terminating the physical link at the
router (the leftmost part in the diagram below), interoperating with the link-layer
nl
(decapsulation), and looking up the forwarding table to determine the appropriate
output port based on the destination address (the last part of the input port).
●● Switching Fabric: This is the router’s brain, and it links the input and output ports.
O
It’s a form of network within a network.
●● Output Port: This is the section of the router from which packets are sent out. The
output port examines its queuing buffers (queuing buffers are generated when
several packets must be communicated over the same output port) and accepts
ty
packets, performs link layer tasks, and ultimately transmits the packets to an
outgoing link.
●● Routing Processor: This component executes routing protocols and functions
si
similarly to a standard CPU. It uses a variety of routing methods, such as the link-
state algorithm and the distance-vector algorithm, to create a forwarding table that
is used to identify the route and output port.
●●
r
Input: A network graph with a source node.
ve
●● Output: The shortest path from s to all other nodes.
Further Readings:
ni
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
2. Computer Network, A. S. Tarenbaum, 4th edition, Prentice Hall of India, New
Delhi, 2002.
U
3. Data Network, Drnitri Berteskas and Robert Galleger, Second edition, Prentice
Hall of India, 1997, New Delhi.
3. Non-adaptive
4. outgoing links
)A
5. neighbors
(c
e
Objectives
in
At the end of this unit, you will be able to
●● Define congestion
nl
●● List the factors for the occurrence of congestion in the Network
●● Differentiate between congestion control and flow control
O
●● Outline the general principles of congestion Control
●● Discuss congestion prevention mechanism.
Introduction
ty
Congestion control refers to the methods used to reduce or eliminate traffic
congestion. Techniques for reducing traffic congestion can be divided into two groups:
Congestion control rules with an open loop are used to prevent congestion before it
si
occurs. The source or the destination is in charge of congestion control.
There are several ways for network congestion control that are often used on
various time scales to either avoid or respond to congestion after it has happened.
network that is well suited to the traffic it transports. When more traffic is aimed but only
a low-bandwidth link is available, congestion is inevitable.
Step 2 When there is severe congestion, resources like as routers and connections
)A
can be added dynamically. This is referred to as provisioning, and it takes place over a
period of months and is influenced by long-term patterns.
Step 3: To make the most of current network capacity, routers may be configured
to follow traffic patterns, allowing them to be active throughout the day when network
(c
Step 4: Some local radio stations have helicopters flying around their cities
reporting on traffic congestion so that their mobile listeners may route their packages
Notes
e
(cars) avoid congested areas. This type of routing is known as traffic aware routing.
Step 5: Increasing capacity is not always possible. Only by reducing the load
in
can congestion be alleviated. New connections can be rejected in a virtual circuit
network if they would cause the network to become overcrowded. This is referred to as
admissions control.
nl
Step 6. Routers can monitor average load, queueing latency, and packet loss. In
all of these circumstances, an increase in the number implies increased congestion.
Packets that the network cannot deliver are forced to be discarded. Load shedding is
O
the usual term for this. Congestion collapse can be avoided with a better method for
selecting which packets to reject.
ty
The first method we’ll look at is traffic aware routing. Changes in topology were
accommodated by these methods, but not changes in load. Routing can be customised
to traffic patterns that change during the day as network users rise and sleep in various
si
zones, with the objective of making the most of current network capacity.
By altering the shortest path weight, routes may be altered to divert traffic away
r
from congested areas. Some radio stations employ helicopters that hover about their
cities reporting on traffic congestion so that their mobile attendants may route their
ve
packets around the hotspot. Traffic-aware routing is the term for this. It’s a good idea to
split traffic up into several paths. According to this approach, it was utilised on the early
internet.
ni
Diagram description:
Consider the figure’s network, which is divided into two halves, east and west, and
is connected by two connections, CF and EL.
U
Assume that the majority of traffic flows between east and west via connection CF,
resulting in a severely congested connection with a considerable latency.
ity
EL will be more appealing if queuing is included in the weight used for short path
computation.
New routing tables have been installed, and the majority of east-west traffic will be
routed through EL, making CF seem to be the quickest option.
m
)A
(c
e
of other issues. This does not happen if the load is disregarded and just bandwidth
and propagation delay are evaluated. Attempt to incorporate load, however changing
weights over a wide range will simply slow down routing oscillations. A successful
in
solution can be achieved using two strategies. In the initial multipath routing, many
pathways from source to destination are possible.
nl
It has the following characteristics:
●● It is a congestion method.
●● As traffic patterns fluctuate during the day, these roots may be adjusted according
O
to traffic patterns. As network users, we can sleep in various time zones.
●● As there are highly used pathways, roots can be altered to redirect traffic.
●● Multiple pathways can be used to separate traffic.
ty
4.3.3 Admission Control
Congestion control refers to the methods used to reduce or eliminate traffic
si
congestion. Techniques for reducing traffic congestion can be divided into two groups:
r
ve
ni
Congestion control rules with an open loop are used to prevent congestion before it
U
It is the policy that handles packet retransmission. If the sender believes a packet
ity
has been lost or damaged, the packet must be resent. The network may become more
congested as a result of this broadcast.
Retransmission times must be designed to avoid congestion while still being able
to maximise efficiency.
m
The sort of window on the sender’s side may also have an impact on the
congestion. Although some packets may be successfully received at the recipient side,
some packets in the Go-back-n timeframe are re-sent. This duplication has the potential
)A
As a result, the Selective Repeat Window should be used since it transmits the
precise packet that was missed.
(c
Disposal Policy: A good discarding strategy chosen by routers is that it allows them
to avoid congestion while also partially rejecting corrupted or less sensitive packages
while maintaining message quality.
When transmitting audio files, routers might reject less sensitive packets to save
Notes
e
congestion while maintaining the audio file’s quality.
Acknowledgment Policy :
in
As acknowledgements are part of the network’s load, the acknowledgment policy
enforced by the receiver may have an impact on congestion. Congestion caused by
acknowledgement can be avoided using a variety of methods.
nl
Rather than sending acknowledgement for a single packet, the receiver should
send acknowledgement for N packets. Only when a packet must be sent, or a timer
expires should the recipient provide an acknowledgement.
O
Admission Policy: A technique should be employed in admission policy to reduce
congestion. Before transmitting a network flow farther, switches in a flow should assess
its resource requirements. To avoid further congestion, the router should prohibit
ty
creating a virtual network connection if there is a probability of congestion or if the
network is already congested. All of the measures listed above are implemented to
prevent network congestion before it occurs.
si
After congestion has occurred, closed loop congestion control techniques are employed
to cure or alleviate it. Different protocols employ a variety of strategies, including the following:
r
Backpressure: Backpressure is a mechanism in which a crowded node prevents
packets from reaching it from upstream nodes. This might lead the upstream node
ve
or nodes to become overburdened and refuse to accept data from the nodes above.
Backpressure is a congestion control strategy that spreads in the reverse direction of
data flow from node to node. The backpressure approach can only be used on virtual
circuits in which each node knows knowledge about the node above it.
ni
Choke Packet Technique: The choke packet technique may be used on both virtual
and datagram subnets. A choke packet is a message delivered by a node to the source
informing it that the network is congested. Each router keeps track of its resources and
U
how much each of its output lines is being used. The router sends a choke packet to
the source if resource use exceeds the threshold value defined by the administrator,
providing it feedback to minimise traffic. Congestion is not reported to the intermediate
ity
Explicit Signaling: If a node encounters congestion, it can send a packet to the source
or destination to tell the source or destination about the congestion. The difference between
)A
choke packet and explicit signalling is that with explicit signalling, the signal is contained in
the data packets rather than producing a separate packet as in choke packet.
The load shedding concept asserts that when a router is swamped with packets
Notes
e
that it can’t handle, it should simply throw them away.
A router that is overburdened with packets can drop any packet at any time. There
in
are, however, better ways to accomplish this.
The policy for discarding a packet is determined by its category. An old packet is
more crucial than a new packet for file transmission. In the case of multimedia, on the
nl
other hand, a fresh packet is more significant than an old one. So, the file transfer policy
is named wine (old is better than new) and the multimedia policy is called milk (new is
better than old).
O
Depending on the applications, an intelligent discard policy can be chosen. The
sender’s cooperation is required to execute such an intelligent discard policy.
The application should provide priority classes to their packets to signify their
ty
importance.
If this is done, the routers can drop packets from the lowest class first when
discarding packets (i.e., the packets which are least important). The routers will
si
then ignore packets from the following lower class, and so on. To set the priority for
determining a packet’s class, one or more header bits are necessary. In the header of
every ATM cell, one bit is set aside to indicate the priority. Every ATM cell is categorised
as either low or high priority. r
ve
Check your Understanding
Fill in the blanks:
1. Congestion is a state in the network layer that may occur in contrast to the packet
ni
3. In order to transfer the packets from source to the destination, the network layer
must determine the best route through which _________ can be transmitted.
4. In case of random walks, a packet sent by the node to one of its __________
randomly.
ity
Summary
m
●● Congestion occurs when the load is higher than the network’s available resources
can handle. In most cases, we will try to alleviate congestion by increasing
resources or decreasing load, but this is not always a smart idea.
)A
●● To make the most of current network capacity, routers may be configured to follow
traffic patterns, allowing them to be active throughout the day when network users
are consuming more and sleeping in various time zones.
●● Routing can be customised to traffic patterns that change during the day as
network users rise and sleep in various zones, with the objective of making the
(c
●● This mechanism is different from a leaky bucket algorithm which was used in
Notes
e
traffic policing.
●● The bucket in traffic policing is just a counter whereas, a bucket is traffic shaper is
in
a buffer that stores the packets.
●● Then, we gave two broad classification of congestion control; open loop and
closed loop. At the end, we touched upon issues related to congestion control in
nl
packet switched network.
Activity
O
1. Consider an example, where a host is generating data at 30 kbps, which, it can
transmit to the network in several ways Now draw the implementation under two
mechanism: Leaky bucket traffic Shaper and Token bucket traffic Shaper
ty
Question and Answers
1. Write the differences between Congestion Control vs. Flow Control.
2. What is the difference between leaky bucket traffic shaper and token bucket traffic
si
shaper?
3. What are the different approaches to open loop control?
4. r
Explain in detail on the congestion prevention mechanism.
ve
Glossary
●● Retransmission Policy: As per this policy, if the sender feels that the message
that was sent by him was either lost or corrupted, then the retransmission of the
ni
individually.
●● Admission Policy: In admission policy, the availability of the resources for the
transmission is checked by the switches. If there is a congestion or even a chance
for the same to occur then the router will deny to establish the virtual network
m
connection.
●● Window Policy: There are two window policies being used at the sender side to
control the congestion.
)A
●● Go-Back-N Window: This policy retransmits the entire packet even if the single-
packet lost or corrupt while transmitting. So, this window policy may become the
cause of duplication and will increase the congestion in the network.
●● Selective Repeat Window: This window policy should be a better choice for
(c
●● Discarding Policy: In the discarding policy, the packet containing less sensitive
Notes
e
data or corrupted data is discarded and keeping the quality of the message
unaffected.
in
●● Closed Loop Congestion Control: This technique is used to remove the congestion
if congestion has already occurred in the network. We have further few techniques
inside closed loop to deal with the connection that already occurred.
nl
Further Readings:
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
O
2. Computer Network, A. S. Tarenbaum, 4th edition, Prentice Hall of India, New
Delhi, 2002.
3. Data Network, Drnitri Berteskas and Robert Galleger, Second edition, Prentice
ty
Hall of India, 1997, New Delhi.
si
1. data transmission
2. two
3. packet r
ve
4. adaptive routing
5. Non-adaptive
ni
U
ity
m
)A
(c
e
Objectives
in
At the end of this unit, you will be able to:
nl
●● Differentiate between virtual circuit & datagram
●● Understand the functioning of a large number of protocols
O
Introduction
Using a standard data communication protocol and the Internet Routing Protocol,
internetworking facilitates data connectivity between networks owned and controlled by
ty
various businesses. The Internet is the world’s greatest collection of networks, but they
all use the same protocol stack, TCP/IP, to communicate with one another.
si
4.4.1 How Network Connected
A network is made up of two or more computers that are linked together to share
resources (such printers and CDs), exchange files, and allow electronic communication.
r
A network’s computers can be connected by cables, phone lines, radio waves,
ve
satellites, or infrared laser beams.
How to connect a Windows machine to the internet? You may accomplish this
using a wireless network by utilising your computer’s Wi-Fi menu, or you can use an
Ethernet connection to connect the computer directly to the Internet source. Remember
ity
that connecting to a network differs from setting up a wired computer network, such as
one found in an office.
connected to the modem, and both the router and the modem must be switched on in
order to connect to an Internet network.
The status lights on the modem and/or router may be used to check the status
(c
Click the icon labelled “Wi-Fi.” It’s on the right side of the taskbar, near the
Notes
e
bottom-right corner of the screen. A pop-up menu with a list of accessible networks
appears when you click the Wi-Fi symbol.
in
To see the Wi-Fi symbol, first click Image labelled in the lower-right corner of the
screen.
If required, turn on Wi-Fi. If a notice appears at the top of the pop-up menu that
nl
says “Wi-Fi Turned off,” click the Wi-Fi box in the bottom-left corner of the pop-up menu
before proceeding.
Choose the name of your wireless network. To connect to a wireless network, click
O
the name of the network. The name of the network will change.
You may need to go closer to your router/modem if you don’t see your network’s
name.
ty
If the network hasn’t been set up previously, the name of your router/modem,
model number, and/or manufacturer will most likely be in the title.
si
Connect by clicking the Connect button. In the pop-up menu, it’s below the
network’s extended name.
Enter the password for the network. Fill in the password you used to log onto your
network in the text box that opens. r
ve
The password may normally be found on a sticker on the bottom or back of the
router (or modem/router combo) if you haven’t changed the network’s password from
the factory default.
ni
If the network doesn’t have a password, you can connect to it by clicking Connect
in the previous step.
Next should be selected. It’s located beneath the password input form. This will
U
prompt you to enter your password and connect your computer to the network.
Wait for the network to establish a connection. When your computer has completed
its connection to the network, the term “Connected” should show underneath the
ity
network’s name. At this moment, you may start utilising the Internet on your computer.
to the modem in order to connect to an Internet network. Both of the units must be
switched on.
)A
You can connect your computer directly to the modem instead of using the router
if you don’t require the Internet to be available to wireless objects or users on your
network.
(c
If you don’t already have one, get one. Ethernet cables link networked devices
(such as your computer or router) to a modem or a connected router. Ethernet cables
are available at most electronics retailers, as well as at online sites.
If you can’t move your computer, make sure the Ethernet cable you buy is long
Notes
e
enough to reach from your router or modem to your computer.
Your Ethernet cable should not exceed 100 metres in length, with 90 metres being
in
the most typical effective length.
On your router or modem, look for an open Ethernet port. The Ethernet ports
on the back of your router and modem are square holes. “Internet” or “Ethernet” is
nl
frequently posted above or next to the Ethernet port on your router that you may utilise.
It’s possible that your router has numerous ports.
Most modems have only one “Internet” port, which is used to connect the modem
O
to the router.
Before proceeding, disconnect the router from the modem’s Ethernet connection
if you’re connecting your computer directly to the modem on a network that utilises a
ty
separate router.
Find the Ethernet port on your computer. On your PC, look for the square Ethernet
port. If your computer has an Ethernet port, it’s most likely on one of the laptop’s sides
si
or on the back of the tower (desktop).
As the ends of Ethernet cables are interchangeable, it doesn’t matter which end
ni
Before connecting your computer to the router or modem, plug the USB end of the
Ethernet adapter you bought into one of your computer’s USB ports if your PC doesn’t
U
have one.
Allow your computer to connect to the Internet while you wait. Your computer
will connect to the network after it detects the Ethernet connection; you should see a
ity
computer monitor-shaped icon appear on the right side of the taskbar where the “Wi-Fi”
Image symbol appear. You may now use your computer to access the Internet.
4.4.2 Tunnelling
m
When source and destination networks of the same kind must be linked through
a network of a different type, a technique known as tunnelling is utilised. Consider an
Ethernet that is connected to another Ethernet over a WAN as follows:
)A
Notes
e
in
nl
O
ty
The following is the sequence of events:
si
The IP packet is subsequently inserted into an Ethernet frame, which is directed to
the multiprotocol router M1.
The IP packet in this scenario does not have to deal with the WAN, and neither do
the hosts A and B. IP and WAN packets will be understood by the multiprotocol routers
M1 and M2. As a result, the WAN may be compared to a large tunnel connecting
U
Tunnelling makes use of a layered protocol paradigm like the OSI or TCP/IP
protocol suite. In other words, when data travels from host A to host B, it traverses
ity
all layers of the specified protocol (OSI, TCP/IP, and so on), and data conversion
(encapsulation) to fit different interfaces of the particular layer is referred to as
tunnelling.
delivered as its own internal packet. There is a different header and trailer for each
segment.
e
alternative methodologies for recombination or reassembly of fragments.
in
This fragmentation is carried out by one network and is invisible to all subsequent
networks through which packets traverse. Whenever a big packet arrives at a gateway,
it is broken down into smaller fragments, as seen in the accompanying image.
nl
Following that, each fragment will target the same exit gateway. Existing network
gateways reconstruct or recombine all fragments. For example, in the accompanying
diagram, network 1’s G2 recombines all fragments formed by G1 before delivering them
O
to network 2. As a result, the subsequent network is unaware of the fragmentation.
ATM networks employ this sort of technique. These networks make use of specific
technology that allows packet fragmentation to be done invisibly.
ty
r si
ve
Figure: Transparent fragmentation
When a network’s exit fragment recombines fragments, it must know when it has
ni
Each fragment of a packet is considered as the original packet once it has been
m
fractured. All pieces of a packet are sent through the exit gateway, where they are
recombined at the destination host.
)A
(c
Non-transparent fragmentation
Notes
e
The following are some of the disadvantages of non-transparent fragmentation:
in
●● When a packet is fragmented, the pieces should be numbered in order to
reassemble the original data stream.
nl
●● As each fragment must have its own header, total overhead rises as a result of
fragmentation.
O
4.4.5 IP Version 4 Protocol
IP stands for Internet Protocol, while v4 refers to the fourth version of the protocol
(IPv4). In 1983, the ARPANET’s major version, IPv4, was put into use for production.
ty
IPv4 addresses are 32-bit integers that are written in decimal format.
si
IPv4’s components
Part of the network: IP stands for Internet Protocol, while v4 refers to the fourth
version of the protocol (IPv4). In 1983, the ARPANET’s major version, IPv4, was put
into use for production. r
ve
IPv4 addresses are 32-bit integers that are written in decimal format.
IPv4’s components
Part of the network: The network component specifies the distinct variation
assigned to the network. The network portion also identifies the network category that
U
Host Component: The host part identifies the computer on your network in a unique
way. Every host is given this portion of the IPv4 address. The network component
ity
specifies the distinct variation assigned to the network. The network portion also
identifies the network category that has been assigned. The host part identifies the
computer on your network in a unique way. Every host is given this portion of the IPv4
address.
m
The network component of each host on the network is the same, but the host half
must differ. The non-obligatory portion of IPv4 is the subnet number. Local networks
with a large number of hosts are separated into subnets, each with its own subnet
number.
)A
IPv4 Characteristics
●● IPv4 addresses can be 32 bits long.
●● IPv4 can be a numeric address with a dot separating the bits.
(c
●● There are twelve header fields, each of which is twenty characters long.
●● Unicast, broadcast, and multicast addresses are available.
Amity Directorate of Distance & Online Education
234 Network Basics
e
●● The Post Address Resolution Protocol is used by IPv4 to map to the MAC address.
●● The routed daemon may support RIP as a routing protocol.
in
●● Networks should be designed manually or via DHCP.
●● Packet fragmentation is allowed by routers and causes host problems.
nl
IPv4’s Advantages
●● Encryption is possible with IPv4 security to maintain privacy and security.
O
●● The IPV4 network allotment is considerable, with over 85000 operational routers
now.
●● It becomes simple to connect several devices over a large network without using
ty
NAT.
●● This is a communication paradigm that delivers both excellent service and cost-
effective knowledge transfer.
si
●● IPV4 addresses have been renamed to allow for perfect encoding.
●● Routing is more scalable and cost-effective since addressing is done more
efficiently.
●●
r
In multicast organisations, data transfer across the network becomes much more
ve
specialised.
Disadvantages
●● Existing users’ net growth is limited, while new users’ use of the internet is
ni
hampered.
●● In IPv4, internet routing is inefficient.
U
●● It’s difficult to include future wishes as a result of the high overhead of putting it on
since it limits the ability to connect things through IP.
The Internet Protocol hierarchy has different kinds of IP Addresses that may
be utilised effectively in a variety of contexts depending on the needs of hosts on a
network. The IPv4 Addressing System is separated into five types of IP Addresses in
)A
IP addresses are assigned by the Internet Corporation for Assigned Names and
Numbers (ICANN).
The leftmost octet is the first one mentioned here. The dotted decimal notation of
(c
Notes
e
in
This formula may be used to calculate the number of networks and hosts per class.
nl
Number of networks = 2^network_bits
O
Two IP addresses are reduced when computing hosts’ IP addresses since they
cannot be given to hosts, i.e. the first IP of a network is network number and the last IP
is reserved for Broadcast IP.
ty
Addresses in Class A
The first octet’s first bit is always set to zero (zero). As a result, the first byte runs
from 1 to 127, indicating that Class A addresses only comprise IP addresses ranging
si
from 1.x.x.x to 126.x.x.x. Loopback IP addresses are assigned to the 127.x.x.x IP range.
00000001 - 01111111
1 - 127 r
ve
Class A IP addresses have a default subnet mask of 255.0.0.0, which means that
there can be 126 networks (27-2) and 16777214 hosts (224-2).
The first two bits of the first octet of a class B IP address are set to 10, i.e. Class B
Addresses
10000000 - 10111111
128 - 191
16384 (214) Network addresses and 65534 (216-2) Host addresses make up Class
m
B.
HHHHHHHH.HHHHHHHH
Addresses of Class C
The first three bits of a Class C IP address are set to 110, which means
(c
11000000 - 11011111
Amity Directorate of Distance & Online Education
236 Network Basics
192 - 223
Notes
e
The range of Class C IP addresses is 192.0.0.x to 223.255.255.x. 255.255.255.x is
the default subnet mask for Class C.
in
2097152 (221) Network addresses and 254 (28-2) Host addresses are assigned to
Class C.
nl
110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
Address Type D
O
In Class D IP addresses, the first four bits of the first octet are set to 1110, resulting
in a range of
11100000 - 11101111
ty
224 - 239
Addresses in Class D
si
The IP address range for Class D is 224.0.0.0 to 239.255.255.255. Multicasting is
assigned to Class D. As data in multicasting is not intended for a specific host, there is
no need to extract the host address from the IP address, thus Class D has no subnet
mask. r
ve
Addresses in Class E
This IP Class is exclusively for research and development (R&D) or study
purposes. The range of IP addresses in this class is 240.0.0.0 to 255.255.255.254. This
ni
IP Version 6 Protocol
U
The Internet Engineering Task Force (IETF) created IP v6 to address the issue
of IP v4 depletion. IPv6 is a 128-bit address with a 228-bit address space, which is
significantly larger than IPv4. We utilise Colon-Hexa representation in IPv6. There are
eight groups, each of which represents two bytes.
ity
●● Unicast
●● Multicast
)A
●● Anycast
1. Unicast Address - A single network interface is identified by a Unicast Address. A
packet submitted to a unicast address is delivered to the interface that address
identifies.
(c
location. If you send a packet to this multicast address, it will be disseminated to all
Notes
e
interfaces that match that multicast address.
in
0000 0000 Reserved 1/256
0000 0001 Unassigned (UA) 1/256
0000 001 Reserved for NSAP 1/128
nl
0000 01 UA 1/64
0000 1 UA 1/32
0001 UA 1/16
O
001 Global Unicast 1/8
010 UA 1/8
011 UA 1/8
ty
100 UA 1/8
101 UA 1/8
110 UA 1/8
1110 UA 1/16
si
1111 0 UA 1/32
1111 10 UA 1/64
1111 110
1111 1110 0
UA
UA
r 1/128
1/512
ve
1111 1111 10 Link-Local Unicast Addresses 1/1024
1111 1110 11 Site-Local Unicast Addresses 1/1024
1111 1111 Multicast Address 1/256
ni
We have 128 bits in an IPv6 address, but we can tell what sort of address it is
ity
Note: In IPv6, all 0s and 1s can be assigned to any host; unlike IPv4, there are no
restrictions.
m
Unicast addresses based on the provider: These are used for worldwide
communication.
The Registry Id (5-bit) specifies the area to which it belongs. Only four registry IDs
are utilised out of 32 (i.e. 25).
Provider Id: The number of service providers operating in an area determines how
many bits are assigned to the Provider Id field. This field isn’t required to be corrected.
(c
After the Provider Id has been adjusted, the remaining portion can be utilised by
Notes
e
the ISP as a regular IP address.
Unicast addresses based on the provider: These are used for worldwide
in
communication.
nl
O
The Registry Id (5-bit) specifies the area to which it belongs. Only four registry IDs
are utilised out of 32 (i.e. 25).
Provider Id: The number of service providers operating in an area determines how
ty
many bits are assigned to the Provider Id field. This field isn’t required to be corrected.
If the Subscriber Id is 56 – 10 = 46 bits, the Provider Id is 10 bits.
After the Provider Id has been adjusted, the remaining portion can be utilised by
si
the ISP as a regular IP address.
Registry Id Registry
10000 Multi Regional (IANA)
r
01000 RIPE NCC
ve
11000 INTER NIC
00100 APNIC
ni
The global routing prefix comprises all of the information about latitude and
U
longitude. It is not in use at the moment. Unicast address routing will be based on
geography in Geography-based Unicast.
Interface Id: In IPv6, we use the term Interface Id instead of Host Id.
ity
— Unspecified
m
Local Unicast Addresses: Local Unicast addresses are divided into two categories:
)A
number in the link-local address (i.e. FE80). Any packet having a Link-local address will
Notes
e
be dropped by the router.
in
Site local address: In IPv4, a site local address is the same as a private IP address.
nl
It’s likely that certain address space has been set aside that can only be routed within
a company. As the first ten bits are set to 1111111011, Site local addresses always start
with FEC0.
O
ty
4.4.8 IPV6 Network Addresses
IPv6 operates with addresses in the same way as IPv4 did. However, an IPv4
si
address is 32 bits long, and an IPv6 address is 128 bits long. This implies we have
a total of 2128 addresses to choose from (the number is 340,282,366,920,938,463,46
3,374,607,431,768,211,456 and reads as 340 undecillion). This is a massive number,
r
and writing it in dotted notation would be lengthy and difficult to read: instead of four
numbers, we’d have 16 in dotted notation. As a result, we altered the way the address
ve
is shown.
because a single hexadecimal digit may represent four bits (16 bits). We were able to
cut the number of blocks from 16 to 8, but there is still room for improvement. As the
addressing space is much larger than the one, we require today, it’s extremely possible
that you’ll discover numerous zeroes in IPv6 addresses. As a result, you’ll be writing
U
entire blocks of zeroes. Fortunately, each block’s preceding zeroes may be ignored. We
have a rather compact address this way, but we can do a lot better.
ity
m
)A
If you have a series of zero-valued blocks, you can express them as a single empty
block (two consecutive columns). This can clearly only be done once, because if you
do it twice in the same address, you’ll have no idea how to get the address back to its
(c
“regular” condition. As a result, we now have a very short address: take a look at the
image below.
Notes
e
in
By eliminating some zeroes, an IPv6 address can be rendered in a compact
nl
manner, as stated.
It’s vital to realise that while we can decrease and compress the way we represent
an IPv6 address for readability, we can’t reduce the way it’s kept in the computer’s
O
memory: it’ll always take up 128 bits and be considered as a 128-bit number. With that
in mind, we can see how IPv4 addresses may be broken down into three parts: the
major, the Subnet ID, and the Host ID. As we no longer have majors, IPv6 is a little
different.
ty
In the same way that the IPv4 Subnet ID represents a group of IPv4 addresses, the
network prefix represents a group of IPv6 addresses. The Interface ID is quite similar
to the IPv4 Host ID, however the principle is slightly different. We were accustomed
si
to thinking of IP addresses as being tied to hosts in version 4, but the truth is that an
IP address is related to the network interface (NIC), and a host can have numerous
addresses if it has several NICs. IPv6 was also used to fix this aesthetic flaw.
r
Furthermore, with IPv6, there are no subnet masks; instead, a CIDR-like notation (slash
ve
notation) is used to indicate how long the network prefix is, which is typically /64.
You can assume that your Internet Provider is the one that assigns you an IP
address, in this case an IPv6 address. This is entirely true, but whence do providers
get their addresses? Let’s take a different approach and start from the top instead
ni
of the bottom. The Internet Architecture Board (IAB) and the Internet Corporation for
Assigned Names and Numbers (ICANN) design the Internet, which subsequently
delegate address distribution to the Internet Assigned Numbers Authority (IANA).
U
IANA, on the other hand, does not assign addresses to providers directly, but rather
to the five Regional Internet Registries (RIRs). Each RIR is in charge of assigning IP
addresses to a region: AfriNIC is responsible for Africa, APNIC for Asia-Pacific, ARNIC
for North America, LACNIC for Latin America and the Caribbean, and RIPE NNC for
ity
Europe. They are the ones who issue addresses to Internet Service Providers (or large
businesses), whereas ISPs are the ones that offer addresses to end users. Remember
that you can only get your own address from a RIR, because you can only borrow an
address from the ISP’s addressing space from a provider. As a result, for IPv6, IANA
assigns network prefixes ranging in size from /19 to /32 to RIRs, who subsequently
m
Although the end-user should receive a /64 prefix, this is not always the case, and
)A
even smaller prefixes may be allocated to the end-user. IANA assigns addresses to
RIRs, which subsequently allocate them to ISPs, who lend them to clients. Only /64
network prefixes should be borrowed by final consumers.
requirement. Now, because we have a large number of addresses with IPv6, a router
cannot remember a distinct route for each prefix; instead, it should just know how
to reach Asian prefixes, American prefixes, and so on, saving a lot of memory and
Notes
e
processing resources on the router. Later in the CCNA course, we’ll go over the notion of
summarization.
in
nl
O
The size of the source and destination addresses, which are each 128 bits, is the
first thing you notice when glancing at the header of an IPv6 packet. Other fields are
ty
included to enable for better content delivery management. The following list contains
all of the pertinent information.
si
Version — Indicates the IP protocol version, which is always 6 for IPv6 (the binary
value is 0110).
Despite being shown as a single field, traffic class is really the combination of
r
two smaller elements that determine traffic significance, allowing routers to prioritise
ve
essential traffic above routine traffic. Differentiated services - the first six bits of the
traffic class field are used to indicate the current packet’s importance/priority.
Explicit Congestion Notification (ECN) - the final two bits of the traffic class field are
utilised by communicating devices to alert one another about network congestion.
ni
Flow label – this is an identifier for the traffic flow in which this packet is contained;
we almost never send a single IP packet, but rather a series of them; this identifies the
group of packets to which the current packet belongs so that the routers in the path can
U
have a hint and send all packets from the same flow on the same path, ensuring that
they arrive in the correct order at the destination.
IPv6’s developers performed an excellent job with the next header field. The
Transport Layer header is the next header we’ll encounter if we utilise a standard IPv6
header without any extensions. However, if we wish to add any options to the IPv6
Notes
e
header, the next header we’ll meet is an IPv6 header extension, indicating that we
don’t yet have the payload beyond the destination address. The Next Header field is
repeated at the conclusion of each header extension, allowing you to follow numerous
in
extensions one after the other until you reach the finish.
nl
Unicast, multicast, and broadcast were the three basic forms of addresses
(officially known as addressing techniques) in IPv4. This drastically changes in IPv6:
only unicast and multicast are preserved, while broadcast is removed. We then add
O
link-local and anycast addresses to the mix. You’ll have an entirely different perspective
on IP addressing once you comprehend these new address types.
Link-local
ty
A link-local IPv6 address is one that is only valid within the broadcast domain (it is
local to it). This address is not routable, which means no router can route it because it
must be physically linked, however it may be compared to a Layer 2 address because
si
it functions similarly. In IPv4, we had the APIPA address (169.254.0.0/16), which was
only usable inside the same network segment. However, the aim of this is revolutionary,
as we will see when discussing neighbour detection. Since the link-local address is
r
only valid inside the broadcast domain, another device may have your address in a
ve
separate broadcast domain, or even the same device could have the same link-local
address on each NIC on multiple broadcast domains. The full fe80::/10 network prefix
is reserved for link-local addresses, although only fe80::/64 can be given to interfaces.
In general, the Interface ID component of a link-local address is formed automatically
ni
(unless specifically defined) using the EUI-64 technique: the NIC’s MAC address
is separated into two parts (OUI on the left, NIC specific on the right), then FFFE is
put in between the two. A NIC with a MAC address of 00:19:80:fd:48:de, for example,
will have an EUI-64 of 001980FFFEfd48de, resulting in an IPv6 link-local address of
U
fe80::0019:80ff:fefd:48:de/64.
ity
m
)A
(c
Multicast
Notes
e
If the link-local address was introduced with IPv6, the broadcast addresses were
also removed: both the directed broadcast address and the regular broadcast address.
in
We can’t just do away of the broadcast since we still need a mechanism to convey
information to all nodes on the segment. Instead, we’ll have to come up with new ways
to do what broadcast accomplished. We also totally replaced broadcasts by utilising the
nl
multicast address idea. A multicast address, like IPv4, is an address that is “subscribed”
by several nodes: these nodes will listen to that address. In IPv6, the ff00::/8 prefix is
used for all multicast addresses.
O
Anycast
Since IPv4 does not allow the idea of anycast addresses by default, we must
break the protocol’s specifications in order to implement it. This isn’t the case with IPv6,
ty
because anycast is built-in. Anycast addresses are a hybrid of multicast and unicast
addresses. To be more precise, it’s a unicast address that’s been allocated to a number
of devices all around the world, and instead of identifying the device, it identifies the
services it provides. This allows other devices to point to that service and contact the
si
nearest device that provides that service without having to know what device is closest.
Unicast addresses
r
Unicast addresses are addresses that are only used once. Unicast addresses
ve
are similar to IPv4 addresses in that they are issued to a single interface and used to
identify it over the Internet. Even if IPv6 site-local unicast addresses still behave like
private IPv4 addresses, there is no need to conserve space by multiplexing many
private addresses onto a single public address: each device may be issued its own
ni
public address, and there are enough of them. In this method, rather of using private
addresses, an enterprise’s addressing strategy may be built directly using public
addresses.
U
control is provided through the Internet Control Message Protocol (ICMP). It’s utilised
for mistake reporting and management inquiries. It is a supporting protocol that is
used by network devices such as routers to deliver error messages and operational
information, such as when a requested service is unavailable, or a host or router cannot
be accessed.
m
Data/Payload/Variable Length)
source quench message to the source, telling it to slow down so that no packets are
lost.
Notes
e
in
nl
O
ICMP extracts the source IP from the rejected packet and sends a source quench
ty
message to the source.
The source will then limit the transmission speed so that the router is not clogged.
r si
ve
ni
When the congestion router is far away from the source, ICMP sends a hop-by-hop
source quench message to each router, slowing down the transmission speed.
U
When packets arrive at the router, the computed header checksum must match the
received header checksum, and only then will the packet be allowed by the router.
ity
m
)A
ICMP extracts the source IP from the rejected packet and sends a parameter
problem message to the source.
Notes
e
in
nl
O
ty
si
When some fragments are lost in a network, the router drops the holding fragment,
r
and ICMP extracts the source IP from the discarded packet and sends a time exceeded
ve
message to the source of the discarded datagram since the time to live field has
reached zero.
Destination un-reachable: The host or its inbound gateway generates this message
to warn the client that the destination is unavailable for whatever reason.
ni
U
ity
m
There is no need that just the router transmits an ICMP error message; sometimes
the destination host sends an ICMP error message when the network experiences any
form of failure (link failure, hardware failure, port failure, etc.).
)A
the best path to the destination is to go directly through R2. The host then transmits
data packets to R2 for the destination.
The original datagram will be sent to the desired destination via router R2.
Notes
e
However, if the datagram contains routing information, even if a better route is
available, this message will not be delivered since redirects should only be issued by
in
gateways and not by Internet hosts.
nl
O
ty
si
When a packet is transmitted in the wrong direction and subsequently redirected in
the correct direction, an ICMP re-directed message is sent.
r
4.4.10 Internet Multicasting
ve
What is Internet multicasting, and How does it Work?
1. Multicast in hosts, for starters. 2. Multicast at the link level 3. The protocol for
connecting a host to a router, also known as the host-to-router protocol. 4. Multicast
Amity Directorate of Distance & Online Education
Network Basics 247
e
Multicasting via the Internet protocol (IP) is a variant on network multicasting.
Unlike traditional Internet traffic, where each source-destination pair has its own
in
connection, IP multicasting allows many recipients to share the same source. This
implies that for all destinations, just one set of data packets is sent. IP multicasting is
thus more efficient than standard Internet transmissions for huge volumes of data since
nl
the server may send a message to several recipients at the same time.
O
Multicasting servers are available from a variety of companies. Before choosing on a
product, thoroughly consider your demands and evaluate their offerings.
ty
●● There is no such thing as multicast-TCP. Why?
●● The issue is how to handle all acknowledgements: ACK-implosions would be
caused by TCP-like ACKs.
si
Ideas:
●● Keep copies of data for retransmission scenarios at acknowledgement
aggregation sites. r
ve
●● Make use of NACKS (Negative acknowledgements)
●● Use forward error correcting codes to send redundant information so that lost
information may be recomputed from the data received (FEC)
ni
1. Network management system contains two primary elements: ______ and agents.
(c
4. __________are server programs, which hold information about the domain tree’s
Notes
e
structure and set information.
5. The next layer, UDP, allows _______ hosts to communicate with one another.
in
Summary
●● A network is made up of two or more computers that are linked together to
nl
share resources (such printers and CDs), exchange files, and allow electronic
communication.
●● You may accomplish this using a wireless network by utilising your computer’s Wi-
O
Fi menu, or you can use an Ethernet connection to connect the computer directly
to the Internet source.
●● Internetworking is a very graphically oriented subject, and icons are commonly
ty
used to represent networking devices. These include various types of computers
(a PC and laptop icon are shown), servers, and IP phones. On local area networks
these devices are typically connected by LAN media (wired or wireless).
●● For a network to function, the devices must be interconnected. Network
si
connections can be wired or wireless. In wired connections, the medium is either
copper, which carries electrical signals, or optical fiber, which carries light signals.
●● r
In the first step of its journey from the computer to its destination, our instant
message gets converted into a format that can be transmitted on the network. All
ve
types of messages must be converted to bits, binary coded digital signals, before
being sent to their destinations.
●● The expectation that the Internet is always available to the millions of users who
ni
Activity
1. Gather different computer data network symbols.
m
Glossary
●● Switch: Switch is the most common device for interconnecting local area networks.
e
●● Router: Router helps direct messages as they travel across a network.
●● Wireless Router: It is a specific type of router often found in home networks.
in
●● Cloud: Cloud is used to summarize a group of networking devices, the details of
which may be unimportant to the discussion at hand.
nl
●● Serial Link: It is one form of WAN interconnection, represented by the lightning
bolt-shaped line.
●● Network Interface Card - A NIC, or LAN adapter, provides the physical connection
O
to the network at the PC or other host device. The media connecting the PC to the
networking device plugs directly into the NIC.
●● Physical Port - A connector or outlet on an internetworking device where the media
ty
is connected to a host or other networking device.
●● Interface - Specialized ports on an internetworking device that connect to
individual networks. Because routers are used to interconnect networks, the ports
on a router are referred to network interfaces.
si
Further Readings:
1.
r
Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
ve
2. Computer Network, A. S. Tarenbaum, 4th edition, Prentice Hall of India, New
Delhi, 2002.
3. Data Network, Drnitri Berteskas and Robert Galleger, Second edition, Prentice
Hall of India, 1997, New Delhi.
ni
1. a manager
2. caching
3. client-server application
ity
4. name servers
5. two
m
)A
(c
e
Objectives
in
At the end of this unit, you will be able to
nl
●● Describe Block Dimensions
●● Differentiate subnetting as an IPv4 Network
O
●● Understand Addressing Schemes
Introduction
The purpose of subnetting is to establish a computer network that is quick,
ty
efficient, and robust. As networks grow in size and complexity, traffic must find more
efficient paths across them. Bottlenecks and congestion would arise if all network traffic
travelled across the system at the same time, utilising the same path, resulting in slow
si
and wasteful backlogs.
You may limit the number of routers that network traffic must transit through by
creating a subnet. To allow traffic to go the shortest distance feasible, an engineer will
r
effectively establish smaller mini-routes within a larger network.
ve
4.5.1 Subnetting IP Networks
IP Subnetting is the process of breaking up a big IP network into smaller ones.
ni
Subnetting divides a single huge IP network into numerous tiny manageable networks.
If we place more than 16000000 hosts in a single network to best use available
addresses, that network would never run owing to broadcast and collision. The
remaining addresses will be squandered if we set fewer hosts.
us to break up a huge network into smaller networks that not only meet our hosts’
needs but also provide additional networking benefits.
The first step in Subnetting is to identify the network and host portions of an IP
address. Only the host section can be subnetted. In an IP address, the subnet mask is
m
identification. Both addresses are always used in the same sentence. An IP address is
unclear without a subnet mask, and a subnet mask is merely a number without an IP
address.
Both addresses have a length of 32 bits. There are four sections to these pieces.
Each portion is referred to as an octet and includes eight bits. Periods separate octets,
(c
Notes
e
in
nl
Each bit of an IP address is assigned a unique bit by the subnet mask. The
allocated subnet mask bit will be turned on if the IP bit belongs to the network portion. If
the IP bit corresponds to the host portion, the assigned subnet mask bit is disabled.
O
The IP address and Subnet mask are commonly written in one of two ways:
decimal notation or binary notation.
ty
A number in the range of 1 to 255 indicates a turned on bit, whereas 0 (zero)
represents a turned off bit in decimal notation.
IP Address: 10.10.10.10
si
Subnet Mask: 255.0.0.0
IP Address: 172.168.10.1
A turned-on bit is represented by 1 (one) in binary notation, whereas a turned off bit
ni
is represented by 0 (zero).
U
ity
m
)A
Subnet
(c
A subnet is a tiny network that has been built from a larger network. Subnetting is
the process of dividing a single big network into many smaller networks. Subnets are
the name for these networks.
e
There are two types of special addresses in each network: network address and
broadcast address. The network address represents the network as a whole, whereas
in
the broadcast address represents all of the network’s hosts. These two addresses can’t
be allocated to a single network host. These two addresses are also used since each
subnet represents a separate network.
nl
The terms Network ID and broadcast ID are used to refer to the network address
and broadcast address, respectively.
O
Valid addresses for hosts
Valid host addresses are any addresses between the Network address and the
Broadcast address. A network’s devices can only be issued legitimate host addresses.
End-user devices such as computers, laptops, tablets, smartphones, IP phones,
ty
servers, printers, terminals, IP cameras, and networking equipment such as switches,
routers, firewalls, and proxy servers are examples of these devices. In summary, each
device that sends data using the IP protocol requires a valid host address.
si
Block Dimensions
The sum of the network address, valid host addresses, and broadcast address
r
determines the block size. For example, if a network has six legitimate hosts, the
ve
network’s block size is eight (1 network address + six valid hosts + one broadcast
address).
The different combinations of IP bits are used to create an IP address. The second
crucial stage in Subnetting is to figure out how many possibilities a given number of bits
ni
address.
an example.
Four subnets make up a class C network. Determine the amount of host bits
)A
The bits utilised in this network are 25 and 26 because Subnetting eligible bits start
at 25 in class C network space and Subnetting always runs from left to right without
(c
e
Each IP class has its own default subnet mask, which limits the number of
Networks and Hosts per network to a certain amount. Classful IP addressing does not
in
allow for a reduction in the number of hosts per network or an increase in the number of
networks per IP class.
CIDR, or Classless Inter Domain Routing, allows you to borrow pieces of the
nl
IP address’s Host component and use them as a Network in Network, or Subnet.
Subnetting allows a single Class A IP address to be utilised to create smaller sub-
networks, allowing for improved network administration.
O
Subnets of Class A
Only the first octet is used as a Network identification in Class A, while the
remaining three octets are used to allocate Hosts (i.e. 16777214 Hosts per Network).
ty
Bits from the Host portion are borrowed and the subnet mask is altered to form extra
subnets in Class A.
si
If one MSB (Most Significant Bit) is borrowed from the host bits of the second octet
and appended to the Network address, two Subnets (21=2) are created, each having
(223-2) 8388606 hosts.
r
Subnetting is reflected by changing the Subnet mask. A list of all conceivable Class
ve
A subnet combinations is shown below.
Subnetting is the process of dividing a large network into smaller ones. Subnets
are the technical term for this. This procedure is commonly used to free up more
public IPv4 addresses and to divide networks for better administration and security. To
ni
completely comprehend what subnetting entails, you must first comprehend the binary
and decimal structure of an IP address.
We’ll start with the basics to make things clearer. The IP address is similar to this:
U
194.168.1.28. It is vital to note that the IPv4 address is a 32-bit number that is further
divided into four 8-bit integers, also known as octets, to make it more uniform.
8 255.0.0.0 0 1 16777214
9 255.128.0.0 1 2 8388606
10 255.192.0.0 2 4 4194302
m
11 255.224.0.0 3 8 2097150
12 255.240.0.0 4 16 1048574
13 255.248.0.0 5 32 524286
)A
14 255.252.0.0 6 64 262142
15 255.254.0.0 7 128 131070
16 255.255.0.0 8 256 65534
17 255.255.128.0 9 512 32766
(c
e
21 255.255.248.0 13 8192 2046
22 255.255.252.0 14 16384 1022
in
23 255.255.254.0 15 32768 510
24 255.255.255.0 16 65536 254
nl
25 255.255.255.128 17 131072 126
26 255.255.255.192 18 262144 62
27 255.255.255.224 19 524288 30
O
28 255.255.255.240 20 1048576 14
29 255.255.255.248 21 2097152 6
30 255.255.255.252 22 4194304 2
ty
The first and last IP addresses of each subnet are used for Subnet Number and
Subnet Broadcast IP address, respectively, in subnetting. Sub-netting cannot be
accomplished using more than 30 bits as Network Bits since these two IP addresses
si
cannot be given to hosts, resulting in fewer than two hosts per subnet.
Subnets of Class B
r
By default, 14 bits are utilised as Network bits in Classful Networking, resulting
ve
in (214) 16384 Networks and (216-2) 65534 Hosts. Class B IP addresses, like Class
A addresses, can be subnetted by borrowing bits from the host bits. All potential
combinations of Class B subnetting are shown here.
16 255.255.0.0 0 0 65534
17 255.255.128.0 1 2 32766
U
18 255.255.192.0 2 4 16382
19 255.255.224.0 3 8 8190
20 255.255.240.0 4 16 4094
ity
21 255.255.248.0 5 32 2046
22 255.255.252.0 6 64 1022
23 255.255.254.0 7 128 510
24 255.255.255.0 8 256 254
m
28 255.255.255.240 12 4096 14
29 255.255.255.248 13 8192 6
30 255.255.255.242 14 16384 2
(c
Subnets of Class C
As a network can only have 254 hosts, Class C IP addresses are typically issued
e
provided below.
in
Network Bits Subnet Mask Bits Borrowed Subnets Hosts/Subnet
24 255.255.255.0 0 1 254
25 255.255.255.128 1 2 126
nl
26 255.255.255.192 2 4 62
27 255.255.255.224 3 8 30
O
28 255.255.255.240 4 16 14
29 255.255.255.248 5 32 6
30 255.255.255.252 6 64 2
ty
Subnet is a term used to describe a network.
The number of bits utilised for the network component of a 32-bit address is
referred to as a subnet. Additionally, the subnet masks may be specified using the slash
si
notation, often known as CIDR notation. To demonstrate how this works, consider the
following example. The following table shows how bits are used in the network.
It’s important to remember that the mask 255.255.255.0 may be written as /28. This
r
is due to the fact that it keeps 8-bits in parts of the total 32-bits needed to describe the
ve
IPv4 address in the network component.
Let’s take a look at another scenario. Consider the following scenario: You have a
network with the following IP addresses:
ni
175.16.56.40 (Computer 1)
175.16.56.50 (Computer 2)
U
The network in the case above employs three octets, or 24-bits. It’s also worth
ity
noting that the first three octets of each of the network’s host devices are identical. The
network component of an IP address with a /24 mask is referred to as this.
The IP address is 175.16.56.40, the mask is 255.255.255.0, and the binary mask is
11111111.11111111.11111111.00000000. The host part of the IP address is represented
m
by the final octet in the formula. You can assign your own gadgets in this section. This
implies that you can have up to 254 hosts running at the same time.
If it was /16, the network portion would be the first two octets in the formation, while
)A
the host portion would be the final two sets of octets in the formation. That is, it will
resemble the following: /16 – 255.255.0.0 – 11111111.11111111.00000000.00000000
Furthermore, if the network had /8 bits, the first octet would be the sole network
piece. It will take the following shape: /8 – 255.0.0.0 – 11111111.00000000.00000000.00
(c
000000
It’s important to note that the sorts of masks listed above are the most frequent and
Notes
e
straightforward. When you need more than one network, though, you’ll need to subnet.
in
It’s time to look at a subnet now that you’ve got a fundamental grasp of subnets,
binary, and classes. We’ll use an IP address like 43.17.255.71/27 for this portion. The
binary will look like this for this IP address: 00101011.000100011.111111.01000111.
nl
There are basically two conclusions to be drawn from this:
O
A minimum of 8 bits must be present in the network.
We’ll give it 27 bits, though. The network component of the subnet will now look
like this: /27 – 255.255.224 – 11111111.11111111.11111111.11100000.
ty
4.5.3 Addressing Schemes
This explains how to configure your router to route IP traffic, including how
si
addresses are split down and how subnetting works. You’ll learn how to provide each
router interface its own IP address and subnet. Examples have been supplied to help
bring things together.
r
To remedy the inadequacies of IP addressing, the notion of subnetting was
ve
established. Managing a big group of hosts is a huge undertaking. A corporation using
a class B addressing system, for example, may accommodate up to 65,535 hosts on a
single network. A multiple-network address scheme, or subnet scheme, is employed if
the firm has more than one network. The original IP address’s host ID is partitioned into
ni
Different subnet ID and host ID values can be used depending on the network
size. As a result, the outside world would not be plagued by a lack of fresh network
m
hosts. Smaller businesses might benefit from the system since it allows them to link all
Notes
e
of their devices to a single network. Large businesses, on the other hand, with several
subnetworks or subnets, may find it lacking in flexibility. The “classful” IP addressing
scheme was modified by a method known as subnet addressing, or simply subnetting,
in
to better satisfy the administrative and technical requirements of bigger enterprises.
Subnetting is the division of a big block of addresses into many contiguous sub-
nl
blocks and the assignment of these sub-blocks to several smaller networks. When
classless addressing is utilised, this is a common practise.
O
Sub-netting is a technique for reducing IP address waste in a block. We utilise
the host id bits of a classful IP address as the net id bits. We specify the IP address
and the amount of bits for the mask (typically preceded by a ‘/’ symbol), for example,
ty
192.168.1.1/28.
The subnet mask is obtained by setting the specified number of bits out of 32 to 1,
for example, in the provided address, we need to set 28 out of 32 bits to 1 and the rest
si
to 0, resulting in 255.255.255.240 as the subnet mask.
1. r
Number of subnets: given bits for mask – default mask bit count
ve
2. Subnet address: the result of the subnet mask AND the IP address supplied
3. Address for broadcasting: By setting the host bits to 1 and leaving the network bits
alone, the IP address may be created.
ni
This sub-unit contains a list of particular design options that a network designer
must make when constructing an IPv6-only or dual-stack network, as well as
recommendations and suggestions for the designer.
Should IPv4 and IPv6 traffic on a connection be logically separated? That is, you
can either mix IPv4 and IPv6 data on the same layer 2 connection, or you can do both.
)A
Use distinct physical or logical links to segregate IPv4 and IPv6 (e.g., two physical
lines or two VLANs on the same link)?
Option (a) assumes a single layer 3 interface with both IPv4 and IPv6 addresses at
either end, whereas option (b) assumes two layer 3 interfaces, one with IPv4 addresses
and the other with IPv6 addresses.
(c
Option (a) requires half as many layer 3 interfaces as option (b), allowing for easier
Notes
e
scaling.
in
Rate-limiting combined IPv4 and IPv6 traffic to or from a client, for example, can
make QoS implementation considerably easier.
nl
Provides improved support for the predicted future of rising IPv6 traffic and
decreasing IPv4 traffic, as well as being more conceptually straightforward.
For these reasons, the operator community has come to the conclusion that option
O
(a) is the better alternative.
Alternative (b) may, nevertheless, be the most practical option at times. Option (b)
is most typically utilised to work around network equipment constraints. When option
ty
(a) is chosen, one major example is the current lack of support for specific statistics
on IPv4 vs IPv6 traffic. There are also device-specific constraints. As IPv6 support
advances, these constraints are projected to disappear, making option (b) less and less
appealing until IPv4 is completely phased out.
si
Whenever possible, most networks nowadays employ option (a).
There are two benefits to using unnumbered connections. The first benefit is that it
ni
In a network with several unnumbered links, the operator can simply enable an
IGP on each router to avoid the time-consuming procedure of assigning and tracking
U
addresses for each link. The second benefit is safety. As link-local addresses are
unrouteable, an off-link device cannot target the associated interfaces. This means that
security ACLs will require less work to maintain.
ity
Pinging an interface with merely a link-local address from a device that is not
physically connected to the connection is not feasible.
m
To debug, log onto a device that is directly connected to the device in question and
run the ping command from there.
)A
The link-layer address of the interface is obtained by default on some devices from
the MAC address assigned to the interface. The link-layer address will change if the
(c
interface hardware (e.g. interface card) is swapped out after this is done. This may
necessitate extra adjustments in some circumstances (peering configuration, ACLs, and
so on).
Many devices, on the other hand, enable the link-layer address of an interface to
Notes
e
be manually specified, avoiding this problem.
When utilising LLAs alone, identifying router interfaces with DNS names is
in
challenging to impossible.
By just providing its address, it is not feasible to identify the interface or connection
(in a database, email, etc.).
nl
In a Static Route, Can You Do a Link-Local Next-Hop?
O
Use the link-local address of the far-end as the next-hop address, OR
ty
Remember that the IPv6 specifications for OSPF [RFC5340] and ISIS [RFC5308]
require that link-locals be used for next-hop addresses at all times. A router MUST be
able to detect the link-local address for each of its surrounding routers in order to verify
that the target address in a Redirect message identifies the neighbour router by its link-
si
local address, according to [RFC4861].
This means that if a GUA or ULA is used as the next hop, a router will not issue
r
Redirect signals to packets that “hit” this static route. All of this suggests that a link-local
address should be used as the next-hop address in a static route.
ve
However, there are two situations in which utilising a link-local address as the
next-hop is manifestly ineffective. The first is when the static route is indirect (or multi-
hop). The static route is redistributed into another routing protocol in the second case.
ni
Regardless of the preceding statement from RFC 4861, a GUA or ULA must be used in
these circumstances.
When using eBGP as the routing protocol for a dual-stack peering connection, one
can either: Use one BGP session to convey both IPv4 and IPv6 routes, OR
Use two BGP sessions: one over IPv4 that carries IPv4 routes and another over
ity
The key benefit of (a) is that it reduces the number of BGP sessions when
compared to (b) (b).
m
Adding or deleting an address family from an established BGP connection will force
the router to tear down and re-establish the session in most present implementations.
)A
Whatever transport protocol you use (v4 or v6), it will almost certainly look
ridiculous at some point. Both now and in the future, using two sessions is a good idea.
(c
Carrying IPv6 routes over IPv4 implies that route information is sent over a different
Notes
e
transport plane than data packets. If v6 connection fails locally without v4 connectivity
failing as well, v6 routes will continue to be exchanged, resulting in a blackhole.
in
Global or Link-Local Addresses for eBGP Endpoints?
There are two alternatives for the addresses to use at each end of the eBGP
session (or, more accurately, the underlying TCP session) when running eBGP over
nl
IPv6:
For the eBGP session, use link-local addresses OR use global addresses.
O
The decision here is whether to utilise global (or unique-local) addresses for the
eBGP sessions, not whether the connection itself contains global (or unique-local)
addresses. Even though the connection contains global addresses, it is entirely
conceivable for the eBGP session to use link-local addresses.
ty
Option (a) has a huge advantage in terms of security: an eBGP session employing
link-local addresses is hard to attack from off-link. This provides excellent defence
against TCP RST and other related attacks. While there are alternative ways to achieve
si
a comparable degree of security (e.g., GTSM [RFC5082], MD5 [RFC5925], or ACLs),
these other methods need extra setup that might be overlooked or misconfigured.
r
There are, however, a few minor drawbacks to utilising link-local addresses:
ve
It is only possible to use link-local addresses for single-hop eBGP sessions; it is not
possible to use link-local addresses for multi-hop eBGP sessions.
Redistributing routes learned using eBGP into iBGP will not function unless both
endpoints utilise “next-hop self.” (In this circumstance, some devices activate “next-hop
ni
self” automatically.)
Operators and tools are accustomed to referring to eBGP sessions just by address,
which is not feasible with link-local addresses.
U
When creating parallel eBGP sessions for IPv4 and IPv6 routes, utilising link-local
addresses for the IPv6 session adds an additional distinction between the two sessions.
ity
If the cable is moved to a different local interface due to hardware or other issues,
both ends must be reconfigured: the local end because the interface has changed
m
(and with link-local addresses, the interface must always be specified along with the
address), and the remote end because the link-local address has likely changed.
(Compare this to utilising global addresses, which need less re-configuration on the
local end and no re-configuration on the distant end.)
)A
IGP Option
The choice of IGP (Interior Gateway Protocol) within the network is one of the most
important options for an IPv6 implementor. The IETF protocols RIP [RFC2080], OSPF
(c
[RFC2328] [RFC5340], and IS-IS [RFC5120] [RFC5308] are the most popular, while
some operators may choose non-IETF protocols. We’ll focus on the advantages and
disadvantages of OSPF vs. IS-IS in this section.
Amity Directorate of Distance & Online Education
Network Basics 261
When it comes to OSPF vs. IS-IS, the choices are: Use OSPFv2 for IPv4 and
Notes
e
OSPFv3 for IPv6.
The operator’s present protocol for routing IPv4 is a key element in the decision.
in
Option (e) is unlikely to be a good decision for an operator using OSPF for IPv4 routing,
while option (a) is equally unlikely to be a good choice for an operator using IS-IS.
Option (a), (c), and (e), which employ two routing protocols, have the advantage of
nl
providing a clear distinction between IPv4 and IPv6 routing. As a result, an issue with
one protocol or set of routes is unlikely to have an impact on the other.
Option (a), (c), and (d) all have two drawbacks (e). One disadvantage is that all
O
protocol mechanisms must be maintained in two sets. This is unlikely to be a problem
on a bigger contemporary router, but it might be a problem on some edge devices.
The second disadvantage is that both protocols must be known by certain operational
ty
personnel. Although the protocols are sufficiently similar for many routing difficulties to be
regarded equivalent, other problems need a thorough understanding of the differences.
Option (b) necessitates the introduction of new protocol extensions that enable OSPFv3
si
to route IPv4 traffic as well. These additions are still very recent at the time of writing.
r
Subnetting IPv6 is simpler than IPv4. It’s also distinctive. Do you want to split or
ve
join a subnet? It’s as simple as adding or subtracting digits and adjusting the prefix
length by a multiple of four. Calculating subnet start/end addresses, usable addresses,
the null route, or the broadcast address is no longer necessary.
Subnet masking (dotted quad notation) was used in IPv4 before being superseded
ni
by CIDR masking. Instead of a subnet mask, IPv6 calls it a Prefix Length, which is
sometimes abbreviated as “Prefix.” Prefix length and CIDR masking both function in the
same way. The length of the prefix specifies how many bits of the address are used to
U
define the network in which it occurs. Prefixes for IPv6 are typically multiples of four, as
shown in Table IPv6 Subnet Table, but they can be any number between zero and 128.
Humans can differentiate IPv6 subnets more easily when prefix lengths are
multiples of four. To create a bigger or smaller subnet, just multiply the prefix by a
ity
multiple of four. See Table IPv6 Subnet Table for a list of available IPv6 addresses as
well as the number of IP addresses contained inside each subnet.
12 xxx:: 2 116 2 52
16 xxxx:: 2 112 2 48
20 xxxxx:: 2 108 2 44
24 xxxxxx:: 2 104 2 40
(c
28 xxxxxxx:: 2 100 2 36
32 xxxxxxxx:: 2 96 4,294,967
36 xxxxxxxxx:: 2 92 268,435,4
Notes
e
40 xxxxxxxxxx:: 2 88 16,777,21
44 xxxxxxxxxxx:: 2 84 1,048,576
in
48 xxxxxxxxxxxx:: 2 80
65,536
52 xxxxxxxxxxxx:: 2 76 4,096
nl
56 xxxxxxxxxxxxx:: 2 72 256
60 xxxxxxxxxxxxxx:: 2 68
16
O
The IETF defines a /64 as a common size IPv6 subnet. If auto configuration is
desired, it is the lowest subnet that may be utilised locally.
To provide WAN service, an ISP often assigns a /64 or smaller subnet. For LAN
usage, an extra network is routed. The amount of the allotment is determined by the
ty
ISP, however it’s very unusual for end consumers to receive a /64 or even a /48.
si
In assignments bigger than /64, the first /64 is normally used for LAN, while the rest
is subdivided for things like a VPN tunnel, DMZ, or a guest network.
r
In IPv6, special purpose networks are reserved. IPv6 Special Networks and
ve
Addresses shows six examples of IPv6 special networks and their addresses.
Finding a Neighbour
IPv4 hosts use ARP broadcast messages to discover each other on a local
ni
segment, whereas IPv6 hosts use Neighbor Discovery Protocol (NDP) messages. NDP,
like ARP, searches inside a broadcast domain for other hosts within a specified subnet.
Advertisements on Routers
ity
Instead of DHCP, Router Advertisement (RA) messages are used to locate IPv6
routers. Clients should anticipate IPv6-enabled routers that allow dynamic address
assignment to declare themselves on the network and react to router solicitations.
pfSense takes RA messages from upstream routers when serving as a client (WAN
m
interfaces).
Allocation of Addresses
)A
Prefix DHCP6 A routed IPv6 subnet is sent to a DHCP6 client via delegation. A
WAN interface can be configured to accept a DHCP6 prefix (DHCP6, Track Interface).
Amity Directorate of Distance & Online Education
Network Basics 263
Prefix delegation can be provided by a router at the edge of a large network to other
Notes
e
routers inside the network.
in
Fill in the blanks:
nl
2. A fundamental property of the DNS is _______.
3. Sub-netting is a technique for reducing ___________in a block.
O
4. __________are server programs, which hold information about the domain tree’s
structure and set information.
5. The choice of IGP (Interior Gateway Protocol) within the network is one of the most
important options for an_________.
ty
Summary
●● IP Subnetting is the process of breaking up a big IP network into smaller ones.
si
Subnetting divides a single huge IP network into numerous tiny manageable
networks.
●● Subnetting is a more effective technique to handle this scenario. Subnetting allows
r
us to break up a huge network into smaller networks that not only meet our hosts’
ve
needs but also provide additional networking benefits.
●● Each bit of an IP address is assigned a unique bit by the subnet mask. The
allocated subnet mask bit will be turned on if the IP bit belongs to the network
portion. If the IP bit corresponds to the host portion, the assigned subnet mask bit
ni
is disabled.
●● Addressing schemes explains how to configure your router to route IP traffic,
including how addresses are split down and how subnetting works.
U
Activity
1. Draw the steps to configure a WAN service.
)A
Glossary
Notes
e
1. Subnet: A subnet is a tiny network that has been built from a larger network. Subnetting
is the process of dividing a single big network into many smaller networks. Subnets
in
are the name for these networks.
2. Valid host addresses: Valid host addresses are any addresses between the Network
address and the Broadcast address.
nl
3. Router: Router helps direct messages as they travel across a network.
4. Wireless Router: It is a specific type of router often found in home networks.
O
5. Cloud: Cloud is used to summarize a group of networking devices, the details of
which may be unimportant to the discussion at hand.
6. Serial Link: It is one form of WAN interconnection, represented by the lightning bolt-
ty
shaped line.
7. Interface - Specialized ports on an internetworking device that connect to individual
networks. Because routers are used to interconnect networks, the ports on a router
are referred to network interfaces.
si
Further Readings:
1.
r
Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
ve
2. Computer Network, A. S. Tarenbaum, 4th edition, Prentice Hall of India, New
Delhi, 2002.
3. Data Network, Drnitri Berteskas and Robert Galleger, Second edition, Prentice
Hall of India, 1997, New Delhi.
ni
1. big IP network
2. caching
3. IP address waste
ity
4. name servers
5. IPv6 implementor
m
)A
(c
e
Structure:
in
5.1 Data Link Layer Design Issues
5.1.1 Intoduction : Data Link Layer
5.1.2 Service Provided to the Network Layer
nl
5.1.3 Framing
5.1.4 Error Control
5.1.5 Flow Control
O
5.1.6 Error Correctind Code
5.1.7 Error Detecting Code
5.2 Data Link Protocols
ty
5.2.1 Link Layer Addressing
5.2.2 Stop-Wait Protocol
5.2.3 Sliding Window Protocol
si
5.2.4 Packet over SONET Protocol
5.2.5 ADSL (Asymmetric Digital Subscriber Loop)
5.2.6 Channel Allocation Problem
5.2.7 Multiple Access Protocols r
ve
5.2.8 ALOHA
5.2.9 Collision Free Protocol
5.2.10 Wireless LAN Protocol
5.3 Physical Layer
ni
5.4.1 Bridges
5.4.2 Routers and Switches
5.4.3 Gateways
5.4.4 Repeaters
m
5.4.5 Hubs
5.4.6 Virtual LAN
)A
e
Objectives
in
At the end of this unit, you will be able to:
nl
●● Differentiate between connection oriented and connection less services
●● Define the concept of addressing in networking
O
●● Understand design issues
Introduction
The following are design difficulties with the data connection layer:
ty
The data link layer acts as a service interface to the network layer, providing
services to it. The main service is data transmission from the transmitting machine’s
si
network layer to the receiving machine’s network layer. DLL is used for this transfer as
well (Dynamic Link Library).
Flow control - Flow control is used to stop data frames from flowing at the receiver
end. The source machine cannot deliver data frames faster than the destination
machine’s capacity to take them.
ni
Error control - Error control is used to avoid frame duplication. At the destination
machine, mistakes produced during transmission from source to destination machines
must be discovered and repaired.
U
the most difficult to understand, with several functionality and risks. The data connection
layer hides the underlying hardware features and portrays itself to the top layer as a
communication medium.
The data link layer connects two hosts that are in some way directly connected.
m
complicated.
Protocols, flow control, and error control are all covered under logical link control.
Notes
e
Media Access Control is concerned with the real management of media.
in
Data-link Layer Functionality
Many functions are performed by the data connection layer on behalf of the top
layer. These are the following:
nl
Framing Data-link layer encapsulates packets from the Network Layer into Frames.
Then it transmits each frame to the hardware bit by bit. The data connection layer
O
at the receiver’s end collects signals from hardware and assembles them into frames.
ty
Synchronization: In order for data frames to be sent across the network, both
machines must be synced.
si
Error Control: Signals may occasionally experience problems during transition,
causing the bits to be flipped. These faults are recognised, and genuine data bits are
attempted to be recovered. It also provides a means for the sender to report errors.
r
On the same connection, multiple Flow Control Stations may have varying speeds
ve
or capacities. The data-link layer provides flow control, allowing two machines to
communicate data at the same time.
Multi-Access: When a host on a shared link tries to send data, there’s a good
chance they’ll collide. The data-link layer offers mechanisms such as CSMA/CD that
ni
The packets are forwarded via the network layer by a router. A forwarding table is
included on every router. A router forwards a packet by first looking at the header field
and then indexing into the forwarding table using the header field value. The outgoing
ity
interface link to which the packet is to be sent is indicated by the value entered in the
forwarding table corresponding to the header field value.
For example, if a router comes with a header field value of 0111, the router indexes
this value into the forwarding table, which determines that the output link interface is 2.
m
The packet is forwarded to interface 2 by the router. The values that are entered into
the forwarding table are determined by the routing algorithm. It is possible to have a
centralised or decentralised routing algorithm.
)A
(c
Notes
e
in
nl
O
ty
r si
ve
The Network Layer Provides Services
Guaranteed delivery: This layer offers a service that ensures the packet arrives at
its intended location.
ni
Guaranteed delivery with bounded delay: This service ensures that the packet
arrives within a defined host-to-host delay bound.
Packets for Pre-Order: This service guarantees that the packets arrive at their
U
Guaranteed maximum jitter: With this service, the time between two consecutive
transmissions at the sender is the same as the time between their receipt at the
ity
destination.
Security services are provided by the network layer, which uses a session key
to secure communication between the source and destination hosts. The payloads of
datagrams delivered to the destination host are encrypted by the network layer of the
m
source host. The payload would then be decrypted by the network layer on the target
host. The data integrity and source authentication services are maintained by the
network layer in this manner.
)A
5.1.3 Framing
Frames are digital transmission units that are often used in computer networks and
telecommunications. In the case of light energy, frames are analogous to the packets
(c
of energy known as photons. In the Time Division Multiplexing operation, the frame is
constantly employed.
e
wire through which data is sent as a stream of bits is known as framing. These bits,
on the other hand, must be organised into identifiable information blocks. The data
connection layer is responsible for framing. It allows a sender to deliver a group of bits
in
to a receiver that are relevant to the recipient.
nl
O
ty
It retrieves the message from the sender and sends it to the receiver by supplying
the sender’s and receiver’s addresses at the data link layer. The benefit of employing
si
frames is that data is divided down into easily recoverable bits that can be verified for
corruption.
Framing Issues - Detecting the Frame’s Beginning: Every station must be able to
r
detect a frame when it is broadcast. Frames are detected by the station by checking
ve
for a particular sequence of bits that indicates the start of the frame, i.e. SFD (Starting
Frame Delimeter).
The station detects a frame in the following way: Through a sequential circuit, each
station listens to the connection for the SFD pattern. If SFD is identified, the sequential
ni
1. Fixed size — As the frame is fixed in size, there is no need to give borders; the
frame’s length serves as a delimiter.
Internal fragmentation occurs when the data size is smaller than the frame size.
ity
2. Variable size - To identify, the conclusion of the frame as well as the beginning of
the following frame must be defined. This can be accomplished in one of two ways:
m
Length field — To show the frame’s length, we may add a length field to the frame.
Ethernet is a network protocol (802.3). The issue with this is that the length field can get
corrupted at any time.
)A
End Delimeter (ED) — To signify the frame’s end, we can use an ED (pattern). In
Token Ring, it’s used. The issue here is that ED can appear in the data. This can be
resolved by using the following methods:
If the data contains a ‘$’ anywhere, the ‘\O’ letter can be used to escape it.
Notes
e
in
nl
O
ty
si
Disadvantage – It is an expensive and out-of-date approach.
r
–> Sender stuffs a bit to break the pattern, i.e., appends a 0 in data = 011101.
ve
–> The frame is received by the receiver, who eliminates the 0 and reads the data if
the data contains 011101.
ni
U
ity
m
)A
If Data = 011100011110 and ED = 0111, how do you find data after bit stuffing? –>
011010001101100
(c
Find data after bit stuffing if Data > 110001001 and ED > 1000? –> 11001010011
e
The data-link layer employs error-control techniques to assure and validate that all
data frames or packets, i.e., data bit streams, are accurately transported or transferred
in
from source to receiver. At this data connection layer, using or providing error control
is an optimization; it was never a mandate. Error control is the process of detecting,
identifying and re-transmitting data frames that have been lost or damaged during
nl
transmission in the data link layer.
In each of these circumstances, the receiver or destination does not get the correct
data frame, and the sender or source is unaware of any data frame loss. As a result,
O
both the transmitter and the receiver are given with some fundamental protocols that
are necessary to detect or identify such faults as data frame loss.
ty
si
Error Detection: As the name implies, error detection simply refers to the detection
r
or identification of errors. These mistakes can occur as a result of noise or other
communication system impairments during transmission from the transmitter to the
ve
receiver. It’s a type of strategy for detecting jumbled.
Error Correction: As the name implies, error correction simply refers to the
correction, solution, or correcting of mistakes. It basically refers to the error-free
reconstruction and rehabilitation of original data. However, mistake rectification is both
ni
Various Strategies for Error Control: Error control techniques include the following:
U
1. Stop-and-Wait ARQ: Another name for Stop-and-Wait ARQ is alternating bit protocol.
It is one of the most basic flow and error control strategies. In telecommunications,
this method is used to send data or information between two linked devices. For
each frame, the receiver merely marks its readiness to receive data. In these, the
ity
transmitter sends data or information to the recipient. The sender then comes to a
halt and awaits the receiver’s acknowledgement. Furthermore, if the ACK does not
come within the specified time limit (time-out), the sender resends the frame and
waits for the ACK.
m
Furthermore, if the ACK does not come within the specified time limit (time-out), the
sender resends the frame and waits for the ACK. If the sender receives an ACK, it
will transmit the next data packet to the receiver and then wait for an ACK from the
)A
recipient. This stop and wait operation continues until the sender has no more data
frames or packets to send.
2. ARQ for Sliding Windows: This method is commonly used to control continuous
transmission error. It is further divided into two groups, as shown below:
(c
e
faults, the operation is identical to that of a sliding window.
Selective Repeat ARQ: Selective Repeat ARQ is a type of ARQ protocol that only
in
retransmits suspicious, damaged, or missing data frames. This approach is similar
to Go-Back-N ARQ, but it is significantly more efficient owing to the fact that it
minimises the number of retransmissions. Only frames for which NAK is received
nl
are retransmitted in this case. However, because of the increased complexity at
the sender and receiver, and since each frame must be recognised separately, this
approach is employed less frequently.
O
5.1.5 Flow Control
Flow control is a method of communicating between two stations that operate at
different rates. It’s a collection of controls that limit how much data a sender delivers
ty
so that a fast sender doesn’t overwhelm a sluggish receiver. Flow control in the data
connection layer limits the number of frames a sender may transmit before waiting for a
response from the receiver.
r si
ve
Flow Control Methodologies
ni
Flow Control using Feedback The sender delivers frames after receiving
U
acknowledgements from the user in these protocols. In the data connection layer, this is
utilised.
Flow Control Based on Rate These protocols feature built-in techniques that limit
ity
the rate at which data is sent without needing the receiver’s acknowledgement. This is
utilised at both the network and transport layers.
e
The sender delivers a frame and waits for an acknowledgement in this protocol.
When the receiver gets the frame, it sends the sender an acknowledgement frame.
in
The sender recognises that the receiver is ready to accept the next frame after
receiving the acknowledgement frame. As a result, it sends the next frame in the queue.
nl
Sliding Window
By allowing numerous frames to be delivered before getting an acknowledgement,
O
this protocol enhances the efficiency of the stop and wait protocol.
This protocol’s operating idea is as follows: both the transmitter and the receiver
have finite-sized buffers called windows. Based on the buffer size, the sender and
receiver agree on the number of frames to send.
ty
The sender sends a series of frames without waiting for an acknowledgement. It
waits for acknowledgement when its transmitting window has been full. It advances the
si
window and sends the following frames based on the number of acknowledgements
received.
Errors occur when bits are transferred through a computer network and are
corrupted as a result of interference and network issues. Errors are caused by
ni
corrupted bits, which result in erroneous data being received by the destination.
Error repair techniques determine the precise number of corrupted bits as well as
their positions. There are two primary approaches.
If the receiver identifies a mistake in the incoming frame, it requests that the sender
ity
retransmit the frame. It’s a straightforward procedure. However, it can only be utilised
effectively if retransmission is not costly, such as in fibre optics, and the retransmission
time is short in comparison to the application’s needs.
correcting code that creates the real frame. This reduces the amount of bandwidth
needed for retransmission. In real-time systems, it is unavoidable. If there are too many
faults, however, the frames must be resent.
)A
●● Codes of Hamming
●● Reed – Solomon Code
(c
e
There are two methods for controlling errors.
in
makes no difference how many mistake bits there are or what form of error they are.
Error repair entails determining the precise number of bits that have been
nl
corrupted as well as where the affected bits are located.
The sender must send some extra bits in addition to the data bits for both error
detection and repair. Based on the additional redundant bits, the receiver performs
O
appropriate checks. If the data is error-free, the unnecessary bits are removed before
the message is sent to the top levels.
ty
Parity Check, Checksum, and Cyclic Redundancy Check are the three basic
approaches for detecting mistakes in frames (CRC).
si
Parity Check
The parity check is performed by adding an additional bit to the data called the
parity bit, which results in a number of 1s that is either even in even parity or odd in odd
parity. r
ve
The sender counts the amount of 1s in a frame and adds the parity bit in the
following manner.
In the event of a tie: The parity bit value is 0 if the number of 1s is even. The parity
ni
In the case of odd parity, the parity bit value is 0 if the number of 1s is odd. The
parity bit value is 1 if the number of 1s is even.
U
The receiver counts the amount of 1s in a frame when it receives it. If the count of
1s is even in an even parity check, the frame is approved; otherwise, it is refused. For
odd parity check, a similar approach is used.
ity
The parity check is only good for detecting single bit errors.
Checksum
To get the total, the sender sums the segments using 1’s complement arithmetic. It
)A
then adds the sums together to generate the checksum, which it sends along with the
data frames.
To get the sum, the receiver adds the incoming segments and the checksum using
1’s complement arithmetic, then complements it.
(c
The received frames are accepted if the result is zero; else, they are discarded.
e
CRC is a binary division of the data bits being communicated by a specified divisor
agreed upon by the communication system. Polynomials are used to create the divisor.
in
Here, the sender divides the data segment by the divisor in binary. The remaining
CRC bits are then appended to the end of the data segment. As a consequence, the
generated data unit is divided by the divisor precisely.
nl
The divisor is used by the receiver to divide the incoming data unit. The data unit
is presumed to be correct and accepted if there is no residual. Otherwise, it’s assumed
that the data is tainted and will be discarded.
O
Check your Understanding
Fill in the blanks:
ty
1. __________, finite data rate and propagation delay have important implications for
the efficiency of the data transfer.
2. The _________ used for communications must take all these factors into
si
consideration.
3. The first framing method, __________ count, uses a field in the header to specify the
number of characters in the frame.
r
ve
Summary
●● The data connection layer is further subdivided into two layers:
●● Logical Link Control Sub-layer (LLC) — Provides the logic for the data link,
ni
controlling the data link layer’s synchronisation, flow control, and error checking
capabilities.
(i) Error Recovery is one of the functions.
U
(ii) It assigns unique addressing to stations that are directly linked to the LAN.
(iii) Error detection.
)A
●● The following are design difficulties with the data connection layer:
●● Providing network layer services –
●● The data link layer serves as a service interface between the network layer and
the data link layer. The primary service is data transport from the network layer on
(c
the sending machine to the network layer on the destination machine. This transfer
is also accomplished by DLL (Dynamic Link Library).
e
the destination machine in the form of blocks known as frames. Each frame’s
beginning and ending points should be defined so that the frame may be
recognised by the destination computer.
in
●● Flow control - Flow control is used to prevent data frames from flowing at the
receiver end. The source machine must not deliver data frames at a quicker pace
nl
than the destination machine’s capacity to take them.
●● Error control - Error control is used to avoid frame duplication. The faults created
during transmission from the source to the destination machines must be
O
recognised and repaired at the destination machine.
Activity
1. Draw the steps to configure an error correcting code.
ty
Question and Answers
1. Define Framing and explain in detail with example.
si
2. Describe Error Control in 5 statements.
3. What is Flow Control?
4. r
How to write Error Correcting Code
ve
5. Define Error Detecting Code.
Glossary
●● Multi-Access: When a host on a shared link tries to send data, there’s a good
ni
chance they’ll collide. The data-link layer offers mechanisms such as CSMA/CD
that enable many systems to access a shared medium.
●● Flow control: Flow control is used to stop data frames from flowing at the receiver
U
end. The source machine cannot deliver data frames faster than the destination
machine’s capacity to take them.
●● Error control: Error control is used to avoid frame duplication. At the destination
ity
●● Guaranteed delivery with bounded delay: This service ensures that the packet
arrives within a defined host-to-host delay bound.
●● Packets for Pre-Order: This service guarantees that the packets arrive at their
)A
Further Readings:
Notes
e
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
2. Computer Network, A. S. Tarenbaum, 4th edition, Prentice Hall of India, New
in
Delhi, 2002.
3. Data Network, Drnitri Berteskas and Robert Galleger, Second edition, Prentice
Hall of India, 1997, New Delhi.
nl
Check your Understanding-Answers
Fill in the blanks:
O
1. Circuit errors
2. protocols
ty
3. Character
r si
ve
ni
U
ity
m
)A
(c
e
Objectives
in
At the end of the unit, you will be able to:
nl
●● Understand various flow control methods
●● MAC sublayer protocols like CSMA/CD, Polling, Token Passing.
O
Introduction
The Data Link Layer delivers the following services to the Network Layer:
ty
The network layer is concerned in getting messages to a neighbouring machine’s
equivalent network layer module.
The sender should deliver an identical message to the distant Network Layer peer
si
(e.g., if the data link layer adds control information, the header information must be
removed before the message is passed to the Network Layer).
The Network Layer needs to make sure that all of the communications it sends are
r
delivered properly (e.g., none lost, no corruption). It’s worth noting that random failures
ve
can cause both data and control frames to be lost.
local shared media. The physical address is the device address in this layer. The Data
Link Layer splits the packets into frames. The frame header is contained in the data
link layer frame. The frame’s source address can also be seen in the header. Physical
U
addresses, unlike Layer 3 logical addresses, are not hierarchical and do not specify
which network the device is connected to. The device will continue to work with the
same Layer 2 physical address even if it is transferred to a different subnet.
ity
The Data Link layer address is only utilised for local delivery since the frame is
only used to convey data between nodes through local media. This layer’s addresses
have no value outside of the local network. In contrast, Layer 3 transports addresses
in the packet header from source to destination regardless of the number of network
hops along the route. If the frame’s packet needs to go to another network segment,
m
the intermediary device - a router - will decapsulate the original frame, construct a new
frame for the packet, and deliver it to the new segment. To transmit the packet over the
new network, the new frame will employ source and destination addressing as needed.
)A
Addressing Requirements
The logical topology determines whether Data Link layer addressing is required at
this layer. Addressing is not required in point-to-point topologies with only two coupled
nodes. The frame can only travel one way once it is on the medium.
(c
As ring and multi-access topologies can connect several nodes on a single media,
they require addressing. When a frame arrives at a node in the topology, it checks the
Amity Directorate of Distance & Online Education
Network Basics 279
e
A trailer is added to the end of each frame by Data Link layer protocols. The trailer
is used to see if the frame arrives in good condition.
in
Error detection is the term for this procedure. It’s important to note that this is not
the same as mistake rectification. Error detection is performed by storing in the trailer a
logical or mathematical summary of the bits that make up the frame.
nl
Sequence of Frame Checks
The Frame Check Sequence (FCS) field is used to see if there were any problems
O
during the frame’s transmission and reception. Since here is where data is transported
over the medium, error detection is provided at the Data Link layer. The media may be a
potentially dangerous place for data. Interference, distortion, or loss of the signals on the
media might result in significant changes in the bit values represented by those signals.
ty
Most faults created on the media are discovered by the error detection method
offered by the usage of the FCS field.
si
A transmitting node provides a logical summary of the contents of the frame to
guarantee that the content of the received frame at the destination matches that of the
frame that left the source node. The cyclic redundancy check (CRC) value is what this
r
is called. This value is used to indicate the contents of the frame in the Frame Check
ve
Sequence (FCS) field.
The receiving node determines its own logical summary, or CRC, of the frame
when it arrives at the destination node. The two CRC values are compared by the
receiving node.
ni
The frame is regarded to have arrived as sent if the two values are the same. The
frame is rejected if the CRC value in the FCS varies from the CRC calculated at the
receiving node.
U
There’s always the chance that a frame with a decent CRC result is in fact corrupt.
When the CRC is determined, errors in bits may cancel each other out. The use of
upper layer protocols to identify and remedy data loss would therefore be necessary.
ity
Error correction will be enabled or disabled depending on the protocol used in the
Data Link layer. Although the FCS is used to detect the problem, not every protocol will
allow it to be corrected.
m
receiver’s acknowledgement.
The sender’s waiting time is the period between message transmission and
acknowledgement receipt, and the sender remains inactive during this time.
When the sender receives the acknowledgement (ACK), it sends the next data
(c
packet to the receiver and waits for the disclosure again, and so on, as long as the
sender has data to transmit.
The data flow must be managed while being sent from the sender to the recipient.
Notes
e
The data will be lost if the transmitter sends it at a faster rate than the recipient can
receive and process it.
in
Flow-control approaches will assist in ensuring that data is not lost. The flow
control approach ensures that senders communicate data at a rate that the receiver can
understand and comprehend.
nl
The Stop and Wait Protocol is depicted in the diagram below:
O
ty
r si
ve
The fundamental benefit of stop-and-wait techniques is their precision. Only once
the first frame has been acknowledged is the second frame sent. As a result, there is no
risk of losing the frame.
This method has the disadvantage of being inefficient. It slows down the
ni
transmission process. This approach sends a single frame from source to destination
and a single acknowledgment from destination to source. As a result, each frame sent
or received consumes the whole amount of time required to traverse the connection.
U
●● Stop and Wait ARQ uses Window Size 1 for Sliding Window Protocol.
Sliding window protocols are data link layer protocols for delivering data frames in
a reliable and sequential manner. Transmission Control Protocol also makes use of the
sliding window.
A sender can send numerous frames at once in this protocol before obtaining
(c
an acknowledgement from the recipient. The phrase “sliding window” alludes to the
fictitious boxes that keep the frames in place. Windowing is another term for the sliding
window technology.
Working Principle
Notes
e
The sender has a buffer called the sending window, and the receiver has a buffer
called the receiving window in these protocols. The outgoing frame sequence number
in
is determined by the size of the transmitting window. The range of sequence numbers
that can be assigned is 0 to 2n-1 if the frames’ sequence number is an n-bit field. As
a result, the transmitting window has a size of 2n-1. As a result, an n-bit sequence
nl
number is chosen to suit a transmission window size of 2n-1.
Modulo-n is used to number the sequence numbers. If the transmitting window size
is 4, for example, the sequence numbers will be 0, 1, 2, 3, 0, 1, 2, 3, 0, 1, 2, 3, 0, 1,
O
and so on. The binary sequence 00, 01, 10, 11 is generated by using two bits in the
sequence number.
The receiving window’s size refers to the maximum number of frames the receiver
ty
may accept at one time. It establishes the maximum amount of frames a sender can
send before obtaining an acknowledgement.
Example
si
Assume we have a four-inch transmitter window and a four-inch receiving window.
As a result, both windows’ sequence numbers will be 0,1,2,3,0,1,2 and so on. The
location of the windows after sending the frames and getting acknowledgements is
depicted in the diagram below. r
ve
ni
U
ity
m
)A
(c
e
There are two types of Sliding Window ARQ (Automatic Repeat reQuest) protocols.
in
Go - Back - N ARQ
Go - Back - N ARQ allows you to send many frames before getting the first frame’s
acknowledgement. It is also known as sliding window protocol since it makes use of the
nl
sliding window notion. A limited amount of frames are supplied, which are consecutively
numbered. If a frame’s acknowledgment is not received within the specified time, all
frames following that frame are retransmitted.
O
ARQ Selective Repetition
This protocol also allows you to submit numerous frames before getting the first
frame’s acknowledgement. Only the incorrect or missing frames are retransmitted in
ty
this case, while the good frames are received and buffered.
si
Synchronous optical networking (SONET) is a physical layer protocol for sending
numerous digital bit streams via optical fibre lines, which serve as the network’s
backbone. Packet-over-SONET (POS) is a protocol for converting IP packets into
r
SONET frames. Point-to-Point Protocol (PPP) is used on IP routers to accomplish
ve
this technique. The Point-to-Point Protocol (PPP) is a data connection layer protocol
that is used to send data between two computers that are linked directly (point-to-
point). It’s a byte-oriented protocol that’s commonly utilised in high-speed broadband
communications with significant loads.
ni
The protocol stack for Packet over SONET (POS) is depicted in the diagram below.
PPP’s POS Framing features include encapsulating the datagram in a frame and
U
transmitting it over the selected physical layer. It marks the start and finish of each
frame and allows for error detection.
The Link Control Protocol (LCP) is in charge of creating, setting, testing, managing,
and terminating transmission lines. It also imparts negotiation between the two ends of
ity
NCPs (Network Control Protocols) are protocols that are used to negotiate network
layer settings and facilities.
m
standards for transporting data packets across a SONET network using PoS. The
following is a summary of these requirements:
To carry the needed payload of the PoS communication, this interface requires an STS-
12 circuit.
Octet alignment—This refers to the data packet octet boundaries being aligned
Notes
e
with the STS octet boundaries. An octet (byte) is a set of eight bits that can be used in
any way. A byte is defined as an 8-bit unit of measurement. A byte was once defined by
IBM as comprising seven bits. Although the terms byte and octet are interchangeable,
in
the term octet is a more appropriate representation of 8 bits because it refers to a
sequence of eight.
nl
Scrambling the payload—Scrambling is the technique of encoding digital 1s and 0s
into a line in such a way that the number of 1s density requirements are met.
For T1 transmission, the ANSI standard specifies a 12.5 percent average density
O
of 1s (a single 1 in 8 bits fits this criterion), with no more than 14 consecutive 0s for
unframed signals and no more than 15 consecutive 0s for framed signals. Timing
recovery or network synchronisation are the key reasons for implementing a 1s density
requirement. However, 1s density has an impact on other aspects such as automated
ty
line build-out (ALBO), equalisation, and power utilisation. RFC 2615 introduces a more
secure payload scrambling technique.
si
POS Implementation
●● When a big volume of network traffic has to be sent via the Internet.
●● In order to send IP packets over a wide area network (WANs).
●● In the RPR (resilient packet ring) standard.
r
ve
5.2.5 ADSL (Asymmetric Digital Subscriber Loop)
Asymmetric Digital Subscriber Line (ADSL) is a form of broadband communications
ni
technology that sends high-bandwidth digital data to homes and businesses over
existing phone lines.
A Digital Subscriber Line modem (DSL modem) must be installed on the client side
U
in order to access ADSL. The DSL modem transfers data bits across the telephone
network’s local loop. The local loop is a two-wire link between a subscriber’s home and
the telephone company’s end office. A device called a Digital Subscriber Line Access
Multiplexer accepts the data bits at the end office (DSLAM).
ity
Characteristics of ADSL
The DSL family of technologies includes ADSL.
m
ADSL is utilised in the telephone network’s local loop, or the portion of the network
that connects the customer’s home to the telephone company’s end office.
Multiple ADSL customers can be linked to the high-speed backbone network via a
)A
Digital Subscriber Line Access Multiplexer (DSLAM) at the telephone company’s end
office.
e
FDD is the most often used technology.
Upstream and downstream communications are carried out on two different bands.
in
Upstream communication is carried out on the frequency bands 26.075 kHz to
137.825 kHz, whereas downstream communication is carried out on the frequency
nl
ranges 138–1104 kHz. The frequency of voice transmission is less than 4 KHz. As a
result, data transfer occurs at the same time as speech transmission.
O
For data transmission, ADSL employs analogue sinusoidal carrier waves. ADSL
modems modulate and demodulate the waves at the customer’s location.
ty
r si
ve
ni
U
ity
users, and the channel is split into N equal-sized sub channels. Frequency Division
Multiplexing (FDM) is a simple and efficient channel bandwidth allotment technique that
may be employed if the number of users is minimal and does not change over time.
)A
Static Channel Allocation in LANs and MANs and Dynamic Channel Allocation may
both be used to tackle the channel allocation problem.
(c
e
1. LAN and MAN Static Channel Allocation:
in
It is the old or classic method of assigning a single channel to numerous competing
consumers. Frequency Division Multiplexing (FDM) is a kind of frequency division
multiplexing (FDM). If there are N users, the bandwidth is split into N sections of equal
size, with each user receiving one portion. There is no interaction between users
nl
because everyone has their own unique frequency band.
O
T = 1/(U*C-L); T(FDM) = N*T(1/U(C/N)-L/N)
Where,
T = mean time delay, C = channel capacity, L = frame arrival rate, 1/U = bits per
ty
frame, N = number of sub channels
si
2. Dynamic Channel Allocation: Hypotheses to consider are:
Station Model: Assumes that each of N stations produces frames separately. The
r
likelihood of generating a packet in the interval IDt, where I is the constant new frame
arrival rate.
ve
Assumption of a Single Channel: In this allocation, all stations are equal and can
broadcast and receive on the same channel.
Collision Assumption: Collision occurs when two frames intersect in time. Any
ni
frame clash is considered an error, and both frames must be resent. Collisions are the
only type of mistake that can occur.
U
Stations can detect whether a channel is busy before they attempt to use it.
IDt is the chance of a frame being created in a period of length Dt, where I is the
frame arrival rate.
m
Multiple access protocols are a group of protocols that operate under the Open
Systems Interconnection (OSI) model’s Medium Access Control sublayer (MAC
sublayer). These protocols enable several nodes or users to share a network channel.
Notes
e
The multi-point transmission channel transports numerous data streams coming from
various nodes.
in
Multiple access protocols have the goals of reducing transmission time, reducing
collisions, and preventing crosstalk.
nl
Random access protocols, controlled access protocols, and channelization
protocols are the three major kinds of multiple access protocols.
O
ty
r si
ve
Random Access Protocols (RAP)
Random access methods give all connected nodes the same priority. If the
ni
transmission channel is idle, any node can send data. There is no set timing or
sequence for data transmission.
U
CMSA/CD stands for carrier sense multiple access with collision detection.
ity
CMSA/CA stands for carrier sensing multiple access with collision avoidance.
The following three ways can be used to provide the station the ability to transmit. −
)A
Reservation
Token Passing
Channelization
(c
e
Multiple access frequency division (FDMA)
Code division multiple access (CDMA) is a kind of time division multiple access
in
(TDMA)
5.2.8 ALOHA
nl
ALOHA is a system that coordinates and arbitrates access to a shared
communication network channel. Norman Abramson and his colleagues at the
O
University of Hawaii created it in the 1970s. The system was originally designed
for ground-based radio broadcasting, but it has since been adopted by satellite
communication systems.
When two or more systems try to transmit on the same channel at the same time, a
ty
shared communication system like ALOHA needs a way to handle collisions. A node in the
ALOHA system delivers data whenever it is accessible. A collision happens when another
node transmits at the same moment, and the frames that were transferred are lost.
si
A node, on the other hand, may listen to broadcasts on any medium, including its
own, and assess if the frames were sent. “Hello” is what Aloha implies. Aloha is a data-
link layer multiple access protocol that describes how numerous terminals can access
r
the medium without interfering or colliding. Roberts devised a technique in 1972 that
ve
would double the capacity of aloha. The Slotted Aloha protocol divides the time interval
into distinct slots, each of which corresponds to one frame’s worth of time. To avoid
collisions, this approach necessitates synchronisation between the transmitting nodes.
●● The stations broadcast frames anytime they have data to send in pure ALOHA.
m
When two or more stations transmit at the same time, the frames collide and are
destroyed.
●● When a station transmits a frame in pure ALOHA, it expects the recipient to
)A
specifies that each station must wait a random length of time before re-sending its
frame. More collisions will be avoided as a result of the unpredictability.
e
in
nl
O
ty
In the illustration, there are four stations competing for access to a common
channel. Frames are being sent by each of these stations.
si
As numerous frames are vying for the shared channel, some of these frames will
collide. Frames 1.1 and 2.2 are the only ones that remain.
If two frames try to occupy the channel at the same time, a collision occurs,
r
resulting in both frames being damaged. When the initial bit of a fresh frame overlaps
ve
with the last bit of a nearly finished frame, both frames are destroyed and must be
retransmitted.
Slotted ALOHA
ni
Since the odds of colliding in pure ALOHA are relatively high, slotted ALOHA was
designed to increase the efficiency of pure ALOHA.
The time of the shared channel is split into distinct segments called slots in slotted
U
ALOHA.
Stations can only send a frame at the start of a slot, and each slot can only send
one frame.
ity
m
)A
(c
If a station in slotted ALOHA is unable to place the frame into the channel at the
Notes
e
start of the slot, i.e. it misses the time slot, the station must wait until the start of the
following time slot.
in
There is still a chance of collision in slotted ALOHA if two stations try to send at the
same time slot’s commencement, as seen in figure.
As the risks of colliding are lowered to half, slotted ALOHA still has an advantage
nl
over pure ALOHA.
ALOHA Protocol Flow Chart. The ALOHA protocol flow chart is shown in Fig.
O
Explanation:
●● It will be sent by a station that has a frame available.
●● After that, it sits and waits for a while.
ty
●● The communication is successful if it gets the acknowledgment.
●● If not, the station employs a backoff method and resends the packet.
si
●● If no acknowledgement is received after a certain number of attempts, the station
abandons the transmission plan.
we’ll look at several techniques for resolving collisions during the contention phase.
in the bitmap protocol technique has exactly N slots. If a station needs to deliver a
frame, it sends a 1 bit in the appropriate slot. Station 2 transmits a 1 bit during the
second slot if it has a frame to broadcast.
In general, by entering a 1 bit into slot 1, Station 1 announces that it has a frame
m
query. As a result, each station is fully aware of which station desires to transmit.
Since everyone agrees on who goes next, there will never be any crashes. Reser
Protocols are used in situations when the desire to send is broadcasting for the
)A
actual transmission.
(c
A Bit-Map Protocol
We shall measure time in contention bits slot units to analyse the protocol’s
Notes
e
performance, using a data frame consisting of d time units. Due to a paucity of data
frames, the bitmap will simply be replayed over and again under low demand situations.
At high load, all stations have something to send all of the time, therefore the N bit
in
contention period is prorated over N frames, resulting in a frame overhead of just 1
bit. The most significant bits are combined in an OR operation. Station 0001 notices
the 1MSB in another station’s address and realises it is fighting for the channel with a
nl
higher numbered station, so it opts out for the current round.
O
2. Binary Countdown: To overcome the overhead of one bit per binary station, the
binary countdown protocol is utilised. Binary station addresses are utilised in binary
countdown. If a station wishes to use the channel, it must broadcast its address as
ty
a binary bit string beginning with the high order bit. The length of all addresses is
considered to be the same. We’ll use this example to demonstrate how the binary
countdown works.
si
Different station addresses are ORed together in this manner to determine the
priority of transmission. If these stations 0001, 1001, 1100, and 1011 are all attempting
to take over the channel for transmission, At initially, each station broadcasts its most
r
significant address bit, which is 0, 1, 1, 1 for each station.
ve
In general, high-numbered stations must wait half a scan before transmitting. Low-
numbered stations must wait half a scan (N/2 bit slots) before transmitting; on average,
low-numbered stations must wait 1.5 N slots.
The other three stations, 1001, 1100, and 1011, are still on the air. At station 1100,
ni
the following bit is 1, whereas Swiss stations 1011 and 1001 give up. After that, station
110 transmits a frame, and a new bidding cycle begins.
U
ity
When the load is large, collision-free protocols (bitmap, binary Countdown) are
m
beneficial.
Partition the group of stations and set a restriction on the number of people
competing for each slot.
Everyone may attempt for each space like aloha if there isn’t a lot of traffic.
Notes
e
Only a small number of people may compete for each slot when there is a lot of
traffic.
in
How do we go about doing it?
Treat each station as the first slot in a binary tree (after successful transmission),
nl
and all stations can compete for it (under the root node).
If there isn’t a conflict, everything is great; if there is, only nodes in a subtree get to
attempt for the next one. (search in detail first).
O
ty
r si
Slot-0: C*, E*, F*, and H* (all nodes beneath node 0 can try to transmit), conflict
ve
Slot-1: C* (every node under node 1 may attempt, C transmits
Slot-2: E*, F*, H* (every node under node 2 can try, conflict)
Slot-2: E*, F* (all nodes beneath node 5 can attempt to transmit), conflict
ni
Wireless LANs are LANs (Local Area Networks) that connect devices using high-
frequency radio waves rather than wires. It’s a collection of laptops and other wireless
devices that communicate via radio waves. WLAN users are free to roam around within
the network’s service region. The IEEE 802.11 or WiFi standard is used in the majority
m
of WLANs.
WAPs (Wireless Access Points), sometimes known as access points (APs), are
wireless routers that serve as base stations or access points. The APs are connected
via the distribution infrastructure with fibre or copper lines.
(c
Clients include workstations, computers, laptops, printers, smart phones, and other
electronic devices. They’re only a few tens of metres away from an AP.
Notes
e
in
nl
O
ty
WLAN Protocols Types
There are several variants of IEEE 802.11 or WiFi, the most common of which are:
The 802.11a standard allows for extremely high transmission rates of 54Mbps. It
si
has a high frequency in the 5GHz band, which makes it difficult for signals to penetrate
walls and other obstacles. Orthogonal Frequency Division Multiplexing is used (OFDM).
r
802.11b Protocol: This protocol works at a frequency of 2.4GHz and enables a
data throughput of 11Mbps. It allows for easier route sharing and is less susceptible
ve
to obstacles. With the Ethernet protocol, it employs Carrier Sense Multiple Access with
Collision Avoidance (CSMA/CA).
The 802.11g protocol combines the benefits of the 802.11a and 802.11b protocols.
ni
It supports both the 5GHz (as defined by the 802.11a standard) and 2.4GHz frequency
bands (as in 802.11b standard). 802.11g is backward compatible with 802.11b devices
due to its dual characteristics. 802.11g offers fast speeds, a wide signal range, and
resistance to interference. It is, however, more expensive to install.
U
both the transmitter and receiver ends. Alternative routes are chosen if there are signal
blockages. The implementation, on the other hand, is quite costly.
1. __________, finite data rate and propagation delay have important implications for
the efficiency of the data transfer.
)A
2. The _________ used for communications must take all these factors into
consideration.
3. The first framing method, __________ count, uses a field in the header to specify the
number of characters in the frame.
(c
Summary
Notes
e
●● The sender should deliver an identical message to the distant Network Layer peer
(e.g., if the data link layer adds control information, the header information must be
in
removed before the message is passed to the Network Layer).
●● The Data Link Layer (DLL) offers an addressing system for delivering frames over
local shared media. The physical address is the device address in this layer.
nl
●● Error correction will be enabled or disabled depending on the protocol used in
the Data Link layer. Although the FCS is used to detect the problem, not every
protocol will allow it to be corrected.
O
●● When the sender receives the acknowledgement (ACK), it sends the next data
packet to the receiver and waits for the disclosure again, and so on, as long as the
sender has data to transmit.
ty
●● A sender can send numerous frames at once in this protocol before obtaining an
acknowledgement from the recipient. The phrase “sliding window” alludes to the
fictitious boxes that keep the frames in place.
si
●● The sender has a buffer called the sending window, and the receiver has a buffer
called the receiving window in these protocols. The outgoing frame sequence
number is determined by the size of the transmitting window.
Activity
r
ve
1. Draw different LAN architectures.
Glossary
1. Multi-Access: When a host on a shared link tries to send data, there’s a good chance
ity
they’ll collide. The data-link layer offers mechanisms such as CSMA/CD that enable
many systems to access a shared medium.
2. Flow control: Flow control is used to stop data frames from flowing at the receiver
end. The source machine cannot deliver data frames faster than the destination
m
6. Packets for Pre-Order: This service guarantees that the packets arrive at their
Notes
e
destination in the same sequence as they were despatched.
7. Guaranteed maximum jitter: With this service, the time between two consecutive
in
transmissions at the sender is the same as the time between their receipt at the
destination.
Further Readings:
nl
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
2. Computer Network, A. S. Tarenbaum, 4th edition, Prentice Hall of India, New
O
Delhi, 2002.
3. Data Network, Drnitri Berteskas and Robert Galleger, Second edition, Prentice
Hall of India, 1997, New Delhi.
ty
Check your Understanding-Answers
Fill in the blanks:
si
1. Circuit errors
2. protocols
3. Character
r
ve
ni
U
ity
m
)A
(c
e
Objectives
in
At the end of this unit, you should be able to:
nl
●● Understand the concept of framing
●● Understand various error handling methods
O
●● Know the Retransmission Strategies at data link layer
●● Understand various flow control methods
Introduction
ty
The Physical Layer, which is a physical and electrical representation of the system,
is the lowest layer in the Open System Interconnection (OSI) Model. It is made up of
numerous network components such as power plugs, connectors, receivers, and
si
different cable kinds. The Physical Layer transports data bits from one device (such
as a computer) to another (s). The types of encoding (how the 0s and 1s in a signal
are encoded) are defined by the Physical Layer. The Physical Layer is in charge of
r
transmitting unstructured raw data streams across a physical channel.
ve
5.3.1 Ethernet Physical Layer
Ethernet, as we’ve seen, is a collection of standards rather than a single item. As
Ethernet employs the same data-link layer standard across all channels, it may serve
ni
as a single LAN technology even if data may travel over multiple types of links (optical
and copper cables, wireless links) at varied speeds (from 10Mbps to 100Gbps).
U
The IEEE 802.3 standard defines the basic frame format, which is necessary for
all MAC implementations. Several extra formats are used to expand the protocol’s
fundamental functionality.
Preamble and SFD, both at the physical layer, begin an Ethernet frame. The
ity
Ethernet header comprises both the Source and Destination MAC addresses, followed
by the packet payload. The CRC field, which is used to identify errors, is the last field.
Let’s look at each field of the basic frame format now.
m
)A
to accommodate the loss of a few bits due to signal delays. Preamble is no longer
required to secure the frame bits in today’s high-speed Ethernet.
PRE (Preamble) informs the receiver that a frame is on its way and allows it to lock
Notes
e
onto the data stream before the frame begins.
SFD (start of frame delimiter) – This is a one-byte field with the value 10101011.
in
SFD denotes the start of the frame’s future bits, which is the destination address.
nl
or never.
Destination Address – A 6-byte field containing the MAC address of the machine to
O
which the data is being sent.
Source Address — This is a 6-byte field that contains the source machine’s MAC
address. The least significant bit of the first byte is always 0 since the Source Address
is always an individual address (Unicast).
ty
Length — The length of an Ethernet transmission is indicated by a 2-byte field
called length.
si
The length value in this 16-bit field can range from 0 to 65534, however it cannot
exceed 1500 due to Ethernet’s inherent limits.
Data (also known as Payload) — This is where real data is entered. If Internet
r
Protocol is utilised via Ethernet, both the IP header and the data will be placed here.
ve
The greatest amount of data that may be stored is 1500 bytes. If the data length is less
than the minimum length, which is 46 bytes, padding 0’s are appended to bring it up to
the minimum length.
CRC stands for Cyclic Redundancy Check and is a four-byte field. This field holds
ni
a 32-bit data hash code that is formed by combining the Destination Address, Source
Address, Length, and Data fields.
The data received is damaged if the checksum computed by the destination differs
U
Note: The Ethernet IEEE 802.3 frame size ranges from 64 bytes to 1518 bytes,
including data length (46 to 1500 bytes).
ity
The IEEE 802.3 basic frame format is described in full above. Let’s have a look at
the extended Ethernet frame header, which allows us to receive payloads greater than
m
1500 bytes.
)A
e
1 byte SSAP [802.2 Source Service Access Point]
in
> 46 bytes of data [protocol data]
nl
Despite the absence of a length field in Ethernet II frames, the frame length is
known since the frame is received by the network interface.
O
5.3.2 Ethernet MAC Sublayer Protocol
WiFi, or the IEEE 802.11 standard, defines the design and requirements of wireless
LANs (WLANs). Instead of using cables to link devices in a LAN, WiFi or WLAN uses
ty
high-frequency radio waves. WLAN users are free to roam around within the network’s
service region.
The 802.11 MAC sublayer abstracts the physical layer for the logical link control
si
sublayer and the OSI network’s upper levels. It’s in charge of encapsulating frames as
well as specifying frame formats.
Frame Control is a two-byte beginning field with eleven subfields. It holds the
frame’s control information.
ni
Duration is a two-byte field that indicates how long the frame and its
acknowledgement will occupy the channel.
There are three 6-byte address fields, one for the source, one for the proximate
U
The frame numbers are stored in the Sequence field, which is a two-byte field.
ity
The data from the higher levels is carried in this variable-sized field. The data field
has a maximum size of 2312 bytes.
m
)A
(c
e
The collision detection mechanism does not operate in wireless networks. It
employs the CSMA/CA (carrier sense multiple access with collision avoidance) protocol.
in
The CSMA/CA technique is as follows:
The transmitting station examines if the channel is idle or busy when a frame is
nl
ready.
If the channel is congested, the station will wait till it becomes available.
If the channel is not in use, the station waits an Inter-frame gap (IFG) before
O
sending the frame.
It starts a timer after sending the frame. The station then waits for the receiver’s
acknowledgment. It indicates a successful t if it receives the acknowledgement before
ty
the timer expires.
si
IEEE 802.11 MAC Sublayer Coordination Functions
The IEEE 802.11 MAC Sublayer utilises two co-ordination functions for collision
r
avoidance before transmission. The Distributed Coordination Function (DCF) is a
CSMA/CA-required function.
ve
It’s employed in channel access with distributed contention.
It is used in both Infrastructure BSS (basic service set) and Independent BSS
(independent service set).
ni
You’re thinking about upgrading to 10 Gbps Ethernet, but are you sure your
motherboard and system bus are fast enough to fill a 10 Gbps network? Can your disc
m
and file system I/O keep up with the data you’re sending and receiving?
The switch backplane requires 2 times the number of ports multiplied by the speed.
To be non-blocking, a switch with 20 ports running at 10 Gbps full-duplex requires a
)A
The switch backplane requires 2 times the number of ports multiplied by the speed.
To be non-blocking, a switch with 20 ports running at 10 Gbps full-duplex requires a
20210 = 400 Gbps bus backplane.
(c
Bonding several 10 Gbps adapters is costly, and the CPU is already overworked
Notes
e
trying to maintain the single 10 Gbps link full.
in
For all interfaces, get link-layer statistics:
“# ip -s link
nl
[...]
O
link/ether 00:11:95:1e:8e:b6 brd ff:ff:ff:ff:ff:ff
ty
8028989029 31573824 0 0 0 0
si
3272273796 15088848 0 0 0 0
[...]”
Dropped- It’s possible that this is due to iptables or other filtering rules, but it’s
more probable that this is due to a shortage of network buffer memory.
ni
Overrun- The number of times the network interface’s buffer space was exhausted.
issues.
Collsns- On a switched LAN, the number of collisions should always be zero. Non-
zero indicates that the appropriate duplex mode is not being negotiated. A little number
ity
that never expands indicates that it occurred when the interface first appeared but
hasn’t occurred subsequently.
A standard header is required for every Ethernet transmission. The default MTU,
or maximum Ethernet frame length, provides for 1500 bytes of payload due to design
optimization considerations made years ago. The maximum frame length restricts
latency, or how long a host must wait for a packet to be transmitted, although that limit
)A
of 1500 bytes of payload plus header and CRC was set when Ethernet was running at
10 Mbps. The frames might be substantially larger in bytes and still have a significantly
lower latency with 1,000 times the speed. Additionally, the CPU would be interrupted
less frequently.
(c
e
“# ip link set enp0s2 mtu 9000”
in
adjustment permanent.
nl
Be aware that the names of interfaces have changed; instead of eth0, eth1, and
so on, names that represent physical location, such as enp0s2, are now used. Here’s
where you can learn more about network interface names.
O
On a particular network interface, not all options will be available, and even if the
chipset supports something, the present Linux driver may not. As a result, don’t hold
your breath for all of the following to work on your system:
ty
Using ethtool as a tool
Get current parameters, such as speed and duplex mode, as well as whether or
si
not a link beat signal is detected, as well as driver information and statistics:
“# ethtool enp0s2
# ethtool -i enp0s2 r
ve
# ethtool -S enp0s2”
Interrupt Coalesce
Several packets in a quick succession can be merged into a single interrupt and
ni
handed up to the CPU, giving the CPU extra time to run the application.
“# ethtool -c enp0s2”
U
Ring Buffer
The driver queue is also known as the ring buffer. Get the current parameters for
the maximum receive and transmit buffer lengths. The number of frames in the buffer
ity
is reported by RX and TX, and the buffer includes pointers to frame data structures.
Change the parameters to the highest possible level to maximise throughput while
perhaps increasing latency. The CPU will have fewer opportunities to add packets to the
queue on a busy system, increasing the risk that the hardware will exhaust the buffer
before further packets can be queued.
m
“# ethtool -g enp0s2
Pre-set maximums:
RX: 4096
RX Mini: 0
(c
RX Jumbo: 0
TX: 4096
e
RX: 512
RX Mini: 0
in
RX Jumbo: 0
TX: 512
nl
# ethtool -G enp0s2 rx 4096 tx 4096
# ethtool -g enp0s2
O
Ring parameters for enp0s2:
Pre-set maximums:
ty
RX: 4096
RX Mini: 0
RX Jumbo: 0
si
TX: 4096
RX: 4096
r
ve
RX Mini: 0
RX Jumbo: 0
ni
TX: 4096”
Note: This is suitable for servers connected to high-speed LANs, but not for
personal computers with slower connections. Assume you have 256 packets in your
U
buffer. That’s 384,000 bytes or 3,072.000 bits at 1,500 bytes apiece. That’s about 3
seconds of delay on a 1 Mbps WLAN or ISP connection. With 9,000-byte jumbo frames,
it would be six times worse.
ity
Flow Control
Turn on flow control to allow the host and switch to pace their transmissions
dependent on the other end’s current receive capacity. This will minimise packet loss
and increase the performance of high-speed networks significantly.
m
“# ethtool -A enp0s2 rx on
Processing Offload
Offload as much processing as possible from kernel software to hardware.
“# ethtool -k enp0s2
(c
# ethtool -K tx-checksum-ipv4 on
TSO, USO, LSO, and GSO are examples of segmentation offload. TCP
Notes
e
segmentation may be feasible to offload. The kernel allocates a huge segment to the
NIC, perhaps 64 kbytes. The NIC has the intelligence to divide the data and add the
TCP, UDP, IP, and Ethernet headers using a template from the kernel’s TCP/IP stack.
in
TSO is for TCP Segmentation Offload, USO stands for UDP Segmentation Offload,
LSO stands for Large Segment Offload, and GSO stands for Generic Segmentation
nl
Offload. ethtool -k would be used to do this. Be cautious: while segmentation offload
should increase performance on a high-speed LAN, it is more likely to degrade
performance on a multi-hop WAN link.
O
Bufferbloat
Across many areas in protocol stacks across the Internet, there has been a
general tendency toward larger and larger buffers, which has harmed both latency
ty
and throughput. “The major issue we’ve been discussing is that all of this unnecessary
buffering ends up breaking many of the timeout mechanisms built into our network
protocols,” as Vint Cerf put it.
si
“# cat /etc/sysconfig/network-scripts/ifcfg-enp0s2
DEVICE=enp0s2
BOOTPROTO=static r
ve
IPADDR=10.1.1.100
NETMASK=255.255.255.0
converts a logical address (IP address) used at the network layer to a physical address
(MAC address) used at the data link layer. A cache table, queues, output module, input
module, and cache management module make up the Address Resolution protocol
package. Furthermore, the address Resolution protocol includes Hardware type,
protocol type, Hardware length, protocol length, activities such as request and reply,
m
the sender’s hardware address, the sender’s protocol address, the target’s hardware
address, and the target’s protocol address.
ARP stands for Address Resolution Protocol, and it’s used to determine a device’s
)A
MAC address from its IP address. This signifies that the source device already knows
the destination device’s IP address but not its MAC address. As you can’t connect
with a device in a local area network (Ethernet) without knowing its MAC address, the
device’s MAC address is necessary. As a result, the Address Resolution Protocol aids in
obtaining the destination device’s MAC address.
(c
Notes
e
in
Scenario 1: When a data packet is misplaced or incorrect.
ARP is used to convert a 32-bit logical address (IPv4 address) to a 48-bit physical
address (MAC address). The OSI model’s layer 2 and layer 3 are connected through
nl
this protocol. Layer 2 contains the MAC address, which is also known as the data link
layer, and Layer 3 contains the IP address, which is also known as the network layer.
Note that the ARP request is only sent when both the source and destination
O
devices are connected to the same network.
Consider the following scenario: two devices (device A and device B) desire to
connect with one another. The IP address of Device B is already known to Device A.
ty
However, device A still need the MAC address of device B in order to connect with it.
A device’s IP address is used to find it on a local area network, while its MAC address
is used to identify it. The device A first checks its internal list, known as the ARP cache
(table), to see if the device B’s IP address already contains its MAC address. If device
si
B’s MAC address is in the ARP table, device A can simply use that MAC address to
begin communication.
r
If the MAC address of device B is not found in the database, device A sends an
ARP broadcast message to the network to find out which device has that IP address
ve
and to request the MAC address of that device. The device with the same IP address
as the source address then sends an ARP response message with the device B’s
MAC address. When device A acquires the MAC address of device B, the information
is stored in the ARP cache (table). The ARP cache is used to improve network
ni
When device A wishes to connect with device B via a network, the stored
U
information is utilised instead of broadcasting a message over the network. It will just
look for items in the ARP cache and then utilise it for communication. Note that while
the ARP request message is broadcast, the ARP response message is unicast.
ity
Static Mapping - A table containing the logical address and physical address of
m
the destination device is used in static mapping. The device’s IP and MAC address are
manually inserted into an ARP table in this method. If a source wishes to connect with
the destination device, it must first access the table.
)A
e
LAN stands for Local Area Network (Local Area Network)
in
computers and their peripherals, such as disc storage devices and printers, are
connected to a single high-speed data connection inside a confined region in this sort
of network. A private network is commonly referred to as a local area network. In a LAN,
nl
data is separated and sent in packets, which are then regenerated by the receiving
computer.
It offers high data rates ranging from 10 to 100 megabits per second (Mbps). The
O
most recent LANs can deliver data rates of up to 10 Gbps. The coverage area is under
10 kilometres. LANs, like other networks, require hardware and software components.
The transmission medium and connecting equipment like as transceivers, bridges,
ty
switches, and repeaters make up hardware. Software has Application Programs, which
comprise IEEE-defined protocols.
r si
ve
ni
U
ity
Notes
e
in
nl
O
Figure: Ethernet LAN
ty
The wireless local area network (WLAN) communicates using radio waves. The
gadgets are connected without the need of wires. The advantage of WLAN over LAN
is that it provides more security. If the users are within the range of the Router, they
si
can access the internet without a wired connection (wireless). Many devices can be
connected at the same time via a WLAN connection, as long as they are all within the
router’s range.
r
ve
ni
U
●● Star Topology
●● Ring Topology
●● Bus Topology
m
Star Topology
All nodes in this network are linked to the Central Node. The devices are not linked
)A
to one another, and the communications are sent to the Central Node. The central node
is in charge of sending the message to the correct location. It is the most extensively
used LAN architecture.
Ring Topology
(c
The nodes in this network are joined to form a closed loop. Tokens are used
by each node to connect with the nodes on either side of it (information passing).
Nodes that have a Token are permitted to send data. This architecture eliminates
Notes
e
the requirement for a Network Server to control other devices because nodes are
connected to the central node.
in
Bus Topology
All nodes in this network, including PCs and servers, are connected via a single
cable known as the Bus. This network is simpler and more cost-effective than others.
nl
The source node sends out a signal that is transmitted across the Bus cable to all of the
other nodes. Despite the fact that the message is disseminated, the signal reaches the
intended receiver. If the MAC Address or IP Address of the receiver matches, the signal
O
can be accepted, and data transfer is one-way.
ty
r si
ve
Figure: LAN Topologies
●● LANs are commonly used in schools, workplaces, and hospitals because they
allow for the sharing of resources such as data, scanners, printers, and the
internet.
U
●● Less dependable.
●● The network must be set up by professional experts.
e
Check your Understanding
Fill in the blanks:
in
1. Turn on _________ to allow the host and switch to pace their transmissions
dependent on the other end’s current receive capacity.
nl
2. The Address Resolution Protocol (ARP) is an address mapping mechanism
that converts a logical address (IP address) used at the network layer to a
___________________ used at the data link layer.
O
3. The packets are frequently called datagrams and the subnet is called a _________
subnet.
Summary
ty
●● Ethernet LAN connects devices in a network using Ethernet wires. The network is
wired in this configuration, and the switches and routers are configured using the
network settings.
si
●● Ethernet, as we’ve seen, is a collection of standards rather than a single item. As
Ethernet employs the same data-link layer standard across all channels, it may
r
serve as a single LAN technology even if data may travel over multiple types of
links (optical and copper cables, wireless links) at varied speeds.
ve
●● Preamble is sometimes referred to as 8 bytes since SFD is sometimes considered
a component of PRE. The SFD informs the radio or stations that synchronisation is
now or never.
ni
●● CRC stands for Cyclic Redundancy Check and is a four-byte field. This field holds
a 32-bit data hash code that is formed by combining the Destination Address,
Source Address, Length, and Data fields.
U
●● WiFi, or the IEEE 802.11 standard, defines the design and requirements of
wireless LANs (WLANs). Instead of using cables to link devices in a LAN, WiFi or
WLAN uses high-frequency radio waves.
ity
●● It starts a timer after sending the frame. The station then waits for the receiver’s
acknowledgment. It indicates a successful t if it receives the acknowledgement
before the timer expires.
●● A standard header is required for every Ethernet transmission. The default MTU,
or maximum Ethernet frame length, provides for 1500 bytes of payload due to
m
Activity
1. Draw different sublayers of Data link layer and write its features.
e
1. What are the sub-layers of data link layer? Explain.
2. List the services of data link layer.
in
3. What is parity bit method? Explain its use with the help of an example.
4. Explain the importance of Sliding Window protocol. Also, List the types of sliding
nl
window techniques.
5. Compare the throughput of pure and slotted ALOHA.
O
Glossary
●● Logical Link Control (LLC) concerned with providing a reliable communication part
between two devices. It is also involved with flow control and sequencing. The LLC
is non-architecture-specific and is the same for all IEEE defined LANs. Medium
ty
Access Control (MAC) focuses on methods of sharing a single transmission
medium.
●● Framing: Encapsulation of network layer data packets into frames, and Frame
si
synchronization
●● Flow Control: Flow control deals with how to keep the fast sender from overflowing
r
a slow receiver by buffering and acknowledgement procedures. This flow control
at data link layer is provided in addition to the one provided on the transport layer.
ve
●● Error detection and correction codes: Various methods used for errordetection and
corrections are – Parity bit, cyclic redundancy check, checksum, Hamming code,
etc.
ni
●● Static Mapping: A table containing the logical address and physical address of the
destination device is used in static mapping.
●● Dynamic Mapping: In dynamic mapping, if a device knows the logical address
U
of another device, it can use the Address Resolution protocol to determine the
device’s physical address.
Further Readings:
ity
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
2. Computer Network, A. S. Tarenbaum, 4th edition, Prentice Hall of India, New
Delhi, 2002.
m
3. Data Network, Drnitri Berteskas and Robert Galleger, Second edition, Prentice
Hall of India, 1997, New Delhi.
3. datagram
e
Objectives
in
At the end of this unit, you will be able to:
nl
●● Understand different aspects of Routers and Switches
●● Describe Gateways and its role
O
●● Elaborate on Repeaters and its importance
●● Know Hubs and Virtual LAN
Introduction
ty
The switch’s job is to receive and forward incoming link-layer frames to outbound
connections. Packets are forwarded via switches based on their MAC addresses.
si
A host/router addresses a frame to another host/router (rather than the switch)
and cheerfully transmits it into the LAN, completely oblivious that the frame would be
received and forwarded by a switch.
r
The pace of frames arriving at any of the switch’s output interfaces may briefly
ve
surpass that interface’s connection capability. Switch output interfaces feature buffers
to address this issue, similar to how router output interfaces have buffers for datagrams.
Switches are plug-and-play devices since they don’t require any user or network
administrator involvement. To install a switch, all a network administrator needs to do
ni
is connect the LAN segments to the switch interfaces. The switch tables do not need
to be configured during installation or when a host is removed from one of the LAN
segments. Switches are also full-duplex, which means they may send and receive data
U
simultaneously.
5.4.1 Bridges
ity
Bridges provide significant advantages over repeaters by using the data stored
in the Data Link Layer. However, the price to be paid is a far more expensive and
sophisticated product than the repeater; a product that must incorporate logic and
memory. Furthermore, host computers must wrap the data to be transferred in a
packet(s) that includes, at a minimum, the Data Link Layer’s metadata. The source and
m
destination addresses, as well as critical supervisory bits, are all included in this data.
Bridges, also known as Medium Access Control (MAC) bridges, create tables of
)A
which addresses have arrived on which interfaces or connections using the source and
destination addresses in packets. The bridge only delivers packets using the interfaces
it has seen the source addresses originate from if it gets a packet with destination
addresses that are in the database. The packets will not be sent down all interfaces.
Early on, evolution bridges were dubbed “learning bridges,” despite the fact that the
(c
tables they generated were not in any way routing tables. The tables did help with the
store-and-forward capabilities built into bridge relay logic.
Notes
e
in
nl
O
ty
Figure: A network bridge
si
Bridges gain even more advantages by being able to read and use the address
information in packets, or datagrams. If the destination address is on the same network
r
as the packet’s originator, the packet does not need to be forwarded to other networks,
ve
lowering network traffic even more. Users may also utilise this capability to partition
an existing network to increase the performance of both new and existing networks.
A bridge used to segregate engineering workstations and office PCs into two new
networks, for example, will likely increase the performance of both new networks.
Bridges, on the other hand, are extremely quick since they do not inspect or utilise any
ni
to address bridges individually and can simply launch Data Link Layer built packets.
This may appear to be a benefit at first, but as network demands became more
complicated, Hosts would need to handle the Internetworking product. Finally, bridge
tables are nothing more than a static representation of a network since bridges only
ity
Bridges, however, could not fulfil the objectives of organisations and institutions
wishing to establish geographically scattered, massive corporate networks due to their
inability to route dynamically or fully allow multi-protocols.
m
Routers are computer networking devices that perform two functions: (1) creating
and maintaining a local area network, and (2) managing data entering and exiting the
network as well as data travelling within the network. It also aids in the management
of many networks and the routing of network traffic among them. Your router has two
(c
connections in your home network: one to the Internet and one to your private local
network. In addition, many routers include built-in switches that enable you to connect
several wired devices.
Amity Directorate of Distance & Online Education
Network Basics 311
Notes
e
in
nl
Figure: Router
O
What exactly is a switch?
A network switch is a computer networking device that links several computers
on a single network. It may also be used to route information transferred via networks
ty
in the form of electronic data. Switches are commonly referred to as bridging devices
since the process of connecting network segments is also known as bridging.
r si
ve
Figure: Switch
ni
Important Differences
Routers operate on the OSI model’s Layer 3 (Network), whereas network switches
U
Except for VLAN implementation, every port on the router has its own broadcast
domain, while the switch has just one broadcast domain.
Switches, on the other hand, are limited to wired network connections whereas
m
The Router will provide NAT, NetFlow, and QoS services, but the Switch will not.
The router is quicker in many sorts of network setups (MAN/WAN), however the
)A
switch is faster.
A router is a device that links several networks and monitors network traffic. It has
(c
two connections: one to the internet and one to your own network.
Furthermore, many routers include built-in switches that let you connect several
Notes
e
wired devices. Wireless radios are included in many routers, allowing you to connect
Wi-Fi devices.
in
What is the mechanism of Switch?
Bridging hub, switching, and MAC bridge are all terms used to describe a network
switch. MAC addresses are used by switches to route data to the correct destination.
nl
Packet switching is used by the operating system at the data connection layer to
receive, analyse, and forward data.
A switch provides data handling assistance and is aware of the specific addresses
O
to which the message should be sent. It may determine which computer the
communication is intended for and transmit the message to that machine directly. The
switch’s efficiency can be enhanced by increasing the network speed.
ty
5.4.3 Gateways
A gateway is a network node that serves as a connection point between
si
two networks that use distinct transmission protocols. The network gateway is
the most popular sort of gateway, and it works at layer 3 of the OSI (open systems
interconnection) architecture, which is the network layer. A gateway, on the other hand,
r
can operate at any of the seven levels of the OSI model, depending on the functionality.
As all traffic that passes across networks must pass via the gateway, it serves as the
ve
network’s entry and departure point. Internal communication between LAN nodes is the
only type of traffic that does not flow via the gateway.
ni
U
ity
m
)A
(c
Figure: Gateway
Gateway Characteristics
Notes
e
●● A gateway is a device that sits at the network’s edge and controls all data that
goes in and out of it.
in
●● It serves as a conduit between two networks that use distinct transmission
methods.
●● A gateway acts as a protocol converter, ensuring that the different protocols used
nl
in the two networks are compatible.
●● In most cases, a gateway is constructed as a node with many NICs (network
interface cards) linked to various networks. It may, however, be adjusted via
O
software.
●● It transmits data across networks using the packet switching mechanism.
ty
Gateways are divided into several categories.
Gateways are classified into two groups based on the direction of data flow.
Data can only go in one direction through unidirectional gateways. Changes to the
si
source node are replicated to the destination node, but not the other way around. They
can be used to store information.
r
Data can travel in both directions using bidirectional gateways. They can be used
as tools for synchronisation.
ve
The ability to function at any layer of the OSI model distinguishes a gateway from
other network devices.
There can be a number of gates based on functionality, the most famous of which
are as follows:
interface between two networks that use distinct protocols. A network gateway is
indicated whenever the term gateway is used without identifying the type.
It is a network node or server that transforms storage requests into multiple cloud
storage service API calls, such as SOAP (Simple Object Access Protocol) or REST
m
IoT Gateways collect sensor data from IoT (Internet of Things) devices in the field
(c
and convert it to other sensor protocols before transmitting it to the cloud. They serve
as a link between IoT devices, the cloud network, and user applications.
It enables data transmission between POTS (plain old telephone service) devices
Notes
e
such as landlines and fax machines and the VoIP (voice over Internet Protocol)
network.
in
5.4.5 Repeaters
Repeaters are network devices that amplify or regenerate an incoming signal
nl
before retransmitting it at the physical layer of the OSI model. They are used in
networks to increase their coverage area. Signal boosters are another name for them.
O
ty
r si
ve
Figure: Repeaters
the nature of the channel or the technology. The length of the LAN or the service area
of cellular networks is thus limited. Installing repeaters at regular intervals solves this
problem.
U
e
Repeaters may be divided into two kinds based on the sorts of signals they
reproduce.
in
Only the analogue signal may be amplified using analogue repeaters.
nl
Repeaters are divided into two varieties based on the networks they connect:
Wired Repeaters and Wireless Repeaters. Wired Repeaters are used in wired LANs.
Wireless Repeaters are used in wireless LANs.
O
Wireless Repeaters are used in cellular networks and wireless LANs.
Repeaters are classified into two kinds based on the domain of LANs they connect
to.
ty
Local Repeaters are devices that link LAN segments that are separated by a short
distance.
si
Remote Repeaters are devices that link LANs that are separated by a large
distance.
5.4.5 Hubs
m
A hub is a device with a large number of ports. One of these ports is plugged in
by a machine that wants to connect to the network. When a data frame arrives at a
port, it is broadcast to all other ports, regardless of whether it is intended for a specific
destination device.
(c
Notes
e
in
nl
O
ty
si
Figure: Hubs
Hub Characteristics r
ve
The physical layer of the OSI model is where a hub works.
Data cannot be filtered by a hub. It’s a dumb network device that broadcasts
messages to all ports.
ni
Inefficiencies and waste occur because they lack the intelligence to compute the
ity
They aren’t connected to any software and are hence passive devices.
Figure: Hubs-Types
Hubs were originally designed to be passive devices. Active hubs and intelligent
Notes
e
hubs, on the other hand, have become popular as a result of advancements in
technology.
in
Active Hubs: Before broadcasting, active hubs enhance and regenerate incoming
electrical impulses. They have their own power source and may function as both a
repeater and a connecting centre. They can increase the size of the LAN by extending
nl
the maximum distance between nodes due to their renewing capabilities.
Intelligent Hubs are active hubs that offer extra network management features.
They may perform a wide range of duties normally reserved for more sophisticated
O
network devices, such as network administration, switching, and offering adjustable
data rates.
ty
Virtual LAN (VLAN) is a notion that allows us to separate devices logically on layer
2 networks (data link layer). Layer 3 devices typically split broadcast domains, although
switches can use the idea of VLAN to divide broadcast domains.
si
A broadcast domain is a network segment where if a device broadcasts a packet,
it will be received by all devices in the same broadcast domain. All broadcast packets
r
are received by devices in the same broadcast domain, although this is limited to
switches only because routers do not forward out broadcast packets. Inter Vlan routing
ve
is required to forward packets to various VLANs (from one VLAN to another) or the
broadcast domain.
VLAN 0 and VLAN 4095 are reserved VLANs that can’t be viewed or utilised.
ni
VLAN 1: This is the switch’s default VLAN. VLAN is enabled on all switch ports by
default. This VLAN is not editable or deleteable, but it can be utilised.
U
VLAN 2-1001: This is a standard VLAN numbering scheme. These VLANs may be
created, edited, and deleted.
VLAN 1002-1005: For fddi and token rings, these are the CISCO defaults. These
VLANs are not able to be removed.
ity
“#switch1(config)#vlan 2
#switch1(config-vlan)#vlan accounts”
)A
The Vlan ID is 2 and the Vlan name is accounts. Vlan is now assigned to the switch
ports.
“Switch(config)#int fa0/0
e
“Switch(config)#int range fa0/0-2
in
Switch(config-if) #switchport access Vlan 2”
Vlan 2 will be assigned to switchports fa0/0, fa0/1, and fa0-2 as a result of this.
nl
O
ty
r si
192.168.1.1/24, 192.168.1.2/24, and 192.168.2.1/24 are the IP addresses assigned
to the PCs. Now we’ll set up Vlans 2 and 3 on the switch.
ve
“Switch(config)#vlan 2
Switch(config)#vlan 3”
ni
We’ve created VLANs, but the most crucial step is to allocate switch ports to them.
“Switch(config)#int fa0/0
U
Switch(config)#int fa0/1
ity
Switch(config)#int fa0/2
m
As you can see, Vlan 2 has been allocated to fa0/0, fa0/2, and Vlan 3 has been
assigned to fa0/1.
VLAN connection types – There are three methods to link devices on a VLAN; the
kind of connection is determined by whether the connected devices are VLAN-aware
(c
VLAN awareness is required for all devices connected to a trunk link. A specific
Notes
e
header called tagged frames should be appended to all frames on this page.
in
link. The access link’s frames must all be untagged.
Hybrid link - This is a link that combines the trunk and access links. Both VLAN-
unaware and VLAN-aware devices are connected here, and both tagged and untagged
nl
frames can be sent.
Advantages
O
Performance – There is a lot of broadcast and multicast traffic on the network.
VLAN eliminates the need to send such traffic to irrelevant locations. For example,
if communication is meant for two users but ten devices are present in the same
broadcast domain, all would get the traffic, resulting in bandwidth waste. However, if
ty
VLANs are created, the broadcast or multicast packet will only travel to the intended
users. Virtual group formation – VLANs may be quite effective in grouping devices
logically according to their departments, as every corporation has multiple departments
si
such as sales, finance, and so on.
Security - Sensitive data can be broadcast on the same network, which can be
accessed by an outsider, but we can regulate broadcast domains, set up firewalls,
r
and restrict access by creating VLANs. VLANs can also be used to notify the network
ve
administrator of an incursion. As a result, VLANs significantly improve network security.
Cost savings - VLANs may be used to build broadcast domains, obviating the
ni
requirement for costly routers. The number of minor broadcast domains may be raised
using Vlan, which are easier to manage than larger broadcast domains.
U
1. ________ provide significant advantages over repeaters by using the data stored in
ity
two connections: one to the ___________ and one to your own network.
4. A gateway is a network node that serves as a connection point between two networks
that use distinct _________ protocols.
)A
5. _________ are network devices that amplify or regenerate an incoming signal before
retransmitting it at the physical layer of the OSI model.
Summary
(c
●● The process of forwarding data frames or packets from one port to another that
leads to data transfer from source to destination is known as network switching.
●● The data link layer is the second layer of the Open System Interconnections
Notes
e
(OSI) paradigm, and its job is to partition the stream of bits from the physical layer
into data frames, which are then sent according to switching needs. Bridges are
network devices that perform switching at the data connection layer.
in
●● A data link layer bridge joins numerous LANs (local area networks) to build a
bigger LAN. Network bridging refers to the process of aggregating networks.
nl
●● A bridge joins the various components, making them appear to be part of a single
network.Switching by Bridges
●● When a data frame arrives at a bridge’s port, the bridge evaluates the data link
O
address, or more precisely, the MAC address of the frame. The bridge sends the
frame to the targeted port if both the destination address and the needed switching
are correct. If not, the frame is discarded.
ty
●● The bridge is not in charge of end-to-end data transport.
●● It is in charge of sending the data frame from one hop to the next. As a result, they
do not check the frame’s payload field. As a result, they can assist in the switching
si
of any type of packet from the network layer above.
●● Bridges can also be used to link virtual LANs (VLANs) to form a bigger VLAN.
Activity r
ve
1. Write different steps to link virtual LANs.
Glossary
●● Filtering: It is the switch function that determines whether a frame should be
ity
●● Switch Table: Switch filtering and forwarding are done with a switch table. The
switch table contains entries for some, but not necessarily all, of the hosts and
routers on a LAN.
)A
●● Flow Control: Flow control deals with how to keep the fast sender from overflowing
a slow receiver by buffering and acknowledgement procedures. This flow control
at data link layer is provided in addition to the one provided on the transport layer.
●● Logical Link Control (LLC) concerned with providing a reliable communication part
Notes
e
between two devices. It is also involved with flow control and sequencing. The LLC
is non-architecture-specific and is the same for all IEEE defined LANs. Medium
Access Control (MAC) focuses on methods of sharing a single transmission
in
medium.
●● Dynamic Mapping: In dynamic mapping, if a device knows the logical address
nl
of another device, it can use the Address Resolution protocol to determine the
device’s physical address.
●● Error detection and correction codes: Various methods used for errordetection and
O
corrections are – Parity bit, cyclic redundancy check, checksum, Hamming code,
etc.
●● Static Mapping: A table containing the logical address and physical address of the
destination device is used in static mapping.
ty
Further Readings:
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
si
2. Computer Network, A. S. Tarenbaum, 4th edition, Prentice Hall of India, New
Delhi, 2002.
3. r
Data Network, Drnitri Berteskas and Robert Galleger, Second edition, Prentice
Hall of India, 1997, New Delhi.
ve
Check your Understanding-Answers
Fill in the blanks:
ni
1. Bridges
2. Switches
3. internet
U
4. transmission
5. Repeaters
ity
m
)A
(c
e
The term “network security” refers to all parts of the network’s sensitive information
in
assets being protected. It encompasses a number of technologies that have been
developed to offer basic security services for data transfer.
This lesson will walk you through numerous different types of network
nl
vulnerabilities and assaults, as well as the security measures that may be used to
counter them. It explains how the most prevalent security protocols work at various
networking levels, from the application to the data connection layer.
O
5.5.1 Creation and Grow of Network
In 2014, two significant milestones in the advancement of information technology
ty
were reached. The first ARPAnet (later known as the Internet) link was established
between UCLA and SRI 45 years ago (October 29, 1969). Tim Berners-Lee presented
his management at CERN with a concept for “Mesh” (eventually known as the World
si
Wide Web) twenty-five years ago (March 1989).
The emergence of these twin blooms of the digital era, one (the Internet) a network
infrastructure and the other (the Web) a software architecture stacked on top of it, is
seen in this timeline. r
ve
They have so far linked more than a third of the world’s population, transforming
millions of individuals into new information consumers and providers.
From this brief history of the Internet and the Web, three major themes or conflicts
ni
universal systems, an ongoing battle that will determine the Internet’s and Web’s future.
of the articles in an encyclopaedia or, more broadly, all of the components of human
knowledge via association. “Former lexicographers have not tried anything like
Structure in their Works; nor appear to have been conscious that a lexicon was in some
degree capable of the Advantages of a prolonged Discourse,” Chambers said in the
m
Preface.
opened between the various parts of the Work; and the various Articles are in some
measure replaced in their natural Order of Science, out of which the Technical or
Alphabetical one had remov’d them.”
Amity Directorate of Distance & Online Education
Network Basics 323
Nobody would have bothered to link computers via a network if it wasn’t critical.
Notes
e
Let’s begin by looking at some classic uses of computer networks in businesses and for
individuals, and then move on to newer advancements in the field of mobile users and
home networking.
in
Business Applications of Computer Networks
The following are some examples of computer network business applications:
nl
1. Resource Sharing: The objective is to make all applications, equipment (such as
printers) and, most importantly, data, available to anybody on the network, regardless
O
of the resource’s or user’s physical location.
2. Server-Client model: A company’s information system might be made up of one or
more databases, as well as certain employees who need remote access. The data
is saved on powerful computers known as Servers in this architecture. A system
ty
administrator is usually in charge of storing and maintaining them. Employees, on
the other hand, have modest gadgets on their desks called Clients that allow them to
access remote data.
si
3. Employee Communication: A computer network may serve as an effective means of
communication among employees. E-mail (electronic mail) is now available in almost
every organisation with two or more computers, and employees use it extensively for
everyday communication. r
ve
4. eCommerce: Doing business with customers through the Internet is becoming
increasingly vital for organisations. Airlines, booksellers, and music retailers have
learned that many customers prefer to purchase from the comfort of their own
homes. This industry is likely to expand rapidly in the future.
ni
The following are some of the most common Internet applications for residential
m
users:
◌◌ Interactive entertainment
◌◌ Electronic commerce
e
We’ll go through the many sorts of network devices in this chapter, but first, let’s
define what a network device is. Hardware devices that connect computers, printers,
in
fax machines, and other electronic devices to a network are known as network devices.
These devices carry data over one or more networks quickly, safely, and accurately.
There may be inter-network or intra-network devices available. Some devices, such
nl
as the NIC card or the RJ45 connection, are installed on the device, whereas others,
such as a router or switch, are network components. Let’s take a closer look at a few of
these phones. A modem is a device that allows a computer to transmit and receive data
through phone or cable lines.
O
The data on the gadget is digital, however only analogue data may be sent through
a phone line or cable connection. In the modem, digital signals are transformed to
analogue signals and vice versa. The modem is made up of two devices: a modulator
ty
and a modulator. The modulator converts digital data into analogue data when the
processor provides the data. Analog data signals are converted to digital data when the
demodulator is received by the processor.
si
Network Devices of Various Types
Let’s have a look at the many sorts of network devices and how they function.
Access Point
r
ve
While an AP can have a wired or wireless connectivity, it generally refers to a
wireless device. An access point (AP) works on the second OSI layer, the data link
layer, and can function as a bridge to connect a conventional wireless network to
wireless devices or as a router to send data to another AP. WAPs (wireless access
ni
points) are devices that create a wireless LAN (WLAN) transmitter and receiver.
Networked distinct computers with an integrated antenna, transmitter, and adaptor are
commonly used as access points.
U
Router
Routers monitor the sea of networking devices associated with various network
ity
routers.
They operate on your network borders and function as a LAN external link to a
WAN. Routers communicate with one another through managing destination tables and
)A
local connections.
Hubs
Hubs connect a variety of networking devices. A network also serves as
(c
amplification by enhancing signals that weaken over long distances due to cable
degradation. A hub is the simplest of the network communication system family, as it
connects LAN components using the same protocols. A server can accept digital or
Amity Directorate of Distance & Online Education
Network Basics 325
analogue data as long as its setup allows for the formatting of the incoming data. Hubs
Notes
e
do not address or process packets; instead, they simply transmit data packets to all
connected devices. Data packets are sent. Hubs work at the physical layer of the Open
Systems Interconnection (OSI). There are two sorts of hubs: basic and numerous.
in
Hubs are divided into two categories:
Active HUB: These are hubs that use their power supply to clean, raise, and
nl
spread the signal across the network. It functions as a repeater as well as a cable hub.
It is possible to increase the overall distance between nodes.
Hubs that gather cable and electricity from active network nodes are known
O
as passive hubs. These hubs transmit signals to the grid without being cleaned or
enhanced, and there is no way to extend the distance between nodes.
ty
Bridges
Bridges connect two or more hosts or network segments together. The important
responsibilities in the network architecture are bridge processing and frame transfer
si
between the different bridge links. You employ Media Access Control (MAC) hardware
for picture transmission.
By checking at the MAC addresses of the devices connected to each line, bridges
r
may either transfer data or prohibit the crossing. Bridges can also be used to connect
ve
two physical LANs to a larger theoretical LAN. Bridges only work on the Physical and
Data Link levels of the OSI model. Bridges are used to divide big networks into smaller
portions by placing them between two physical network segments and managing data
flow between them.
ni
Bridges are similar to hubs in that they connect LAN components to the same
protocols. However, before transmission, frames, or bridges, filter incoming data
packets to addresses.
U
Gateway
The OSI model’s transportation and session layers are commonly implemented
in gateways. On the transport layer and above, there are several standards and
ity
topology, DNS policy, and network administration. All routing functions, as well as
others, are handled by gateways. In actuality, a gateway is a translation router that has
been added. The feature that translates protocols is known as a protocol converter.
)A
Switch
In general, switches do a better job than hubs. A switch increases the network’s
capacity. The switch stores limited information about internal network routing nodes and
connects to systems like hubs and routers. Switches are often used to connect LAN
(c
beaches. In most cases, switches will examine the hardware addresses of incoming
packets before transferring them to their intended destinations. As of the flexibility of the
digital circuit, switches outperform hubs or routers in terms of network efficacy. Switches
also increase network security because network control makes it easier to inspect
Notes
e
digital circuits.
Modem
in
Modems are used to send digital signals over analogue phone lines (modulator
demodulators). The modem translates digital signals into analogue signals of various
frequencies, which it then sends to a receiver modem. The receiving modem, on the
nl
other hand, gives a digital output to a device linked to the modem, which is usually a
computer. In most circumstances, digital data is sent to or received via a serial line
modem using the RS-232 standard interface. Many phone providers offer DSL services,
O
and most cable operators utilise modems as final terminals to find and remember their
homes and personal clients. Modems are used at all physical and data connection
levels.
ty
Brouter
The bridging router is also known as a device that combines the functions of a
bridge and a router. It may be utilised at both the data connection and network layers.
si
As a router, it may send packets across networks, act as a bridge, and filter network
traffic in the local area.
Intrusion detection appliances, for example, are devices that detect and report on
unauthorised traffic.
Preventative Mechanisms
)A
These devices analyse networks for security flaws and alert users. Devices for
penetration testing and vulnerability assessment, for example.
Firewalls are a type of network security device that manages and controls network
Notes
e
traffic using protocols. A firewall separates a trusted internal network from the rest of the
internet.
in
Firewalls are available in the form of software that runs on hardware as well as
physical appliances. Hardware-based firewalls can also perform additional tasks, such
as operating as a DHCP server for the network.
nl
To protect data from online dangers, most personal computers employ software-
based firewalls. Many routers that transmit data across networks include firewall
components, and many firewalls may perform basic routing duties as well.
O
To block illegal access from the internet, firewalls are often employed in private
networks or intranets. Every message that enters or leaves the intranet passes via the
firewall, which checks it for security measures.
ty
Both hardware and software-based devices make up an excellent firewall
arrangement. A firewall can also provide secure authentication certificates and logins for
remote access to a private network.
si
Firewalls, both hardware and software
Hardware firewalls are self-contained units. Broadband routers have them as well.
r
The majority of hardware firewalls provide at least four network ports for connecting
to other computers. Corporate networking firewall solutions are available for bigger
ve
networks, such as for business purposes.
Your machines have software firewalls installed. Your PC is protected from online
dangers by a software firewall. Antivirus
ni
products.
Filtering of Content
Unpleasant or offensive emails or webpages are filtered out by content filtering
systems. These are utilised in both corporate and consumer PCs as part of firewalls.
m
When someone tries to access an unauthorised web page or application, these devices
display the warning “Access Denied.”
)A
e
◌◌ Other stuff that is offensive
Intrusion Detection Systems, also known as Intrusion Detection and Prevention
in
Systems, are network appliances that monitor harmful activity, log information about it,
take action to stop it, and then report it.
Intrusion detection systems can alert you to any harmful behaviour on your
nl
network, delete packets, and reset the connection to save your IP address from being
blocked. The following actions can also be performed by intrusion detection systems:
O
◌◌ Prevent problems with TCP sequencing.
◌◌ Remove any unnecessary transport and network layer settings.
ty
5.5.4 Network Performance
The term “network performance” refers to the user’s perception of a network’s
service quality. Depending on the nature and architecture of the network, there are
si
several methods for measuring its performance. The following characteristics are used
to assess a network’s performance:
◌◌
◌◌
Bandwidth
Throughput
r
ve
◌◌ Latency (Delay)
◌◌ Bandwidth – Delay Product
◌◌ Jitter
ni
Bandwidth
The quantity of bandwidth given to the network is one of the most important factors
U
The amount of data or information that can be sent in a given amount of time is
referred to as bandwidth. The phrase can be applied in two ways, each having its own
set of estimated values. The bandwidth of digital devices is measured in bits per second
(bps) or bytes per second (bps).
m
internet speed. True internet speed is determined by the quantity of data you get per
second, which has a significant impact on latency.
Consider the situation where the tap pipe has been doubled in width but the water
rate remains the same as it was when the pipe was half the diameter. As a result,
there will be no increase in speed. When we think of WAN lines, we usually think of
Notes
e
bandwidth, and when we think of LAN connections, we usually think of speed. This is
because, rather than device and interface data transfer rates (or speed), we are often
bound by pricey cable bandwidth across WAN.
in
The range of frequencies contained in a composite signal or the range of
frequencies a channel may pass is measured in Hertz. Take, for example, a subscriber
nl
telephone line with a bandwidth of 4 kHz.
The amount of bits per second that a channel, a connection, or a network can send
is referred to as bandwidth in bits per second. A Fast Ethernet network, for example,
O
has a maximum bandwidth of 100 Mbps, which implies the network can transport 100
Mbps of data.
Note that the bandwidth in hertz and the bandwidth in bits per second have an
ty
explicit connection. A bandwidth increase in hertz equals a bandwidth increase in
bits per second. The connection changes depending on whether we’re talking about
baseband or modulated transmission.
si
Throughput
The number of messages successfully transmitted per unit time is known
as throughput. The available bandwidth, the available signal-to-noise ratio, and
r
hardware limits all play a role. As a result, a network’s maximum throughput may be
ve
larger than the actual throughput attained in everyday use. The phrases ‘throughput’
and ‘bandwidth’ are sometimes confused; however they are not interchangeable.
Throughput is an actual measurement of how fast we can deliver data, whereas
bandwidth is a prospective measurement of a network.
ni
The quantity of data transported between several sites over a certain period of
time is measured in bits per second (bps), which has developed into bytes per second
(Bps), kilobytes per second (KBps), megabytes per second (MBps), and gigabytes
U
per second (GBps) and gigabytes per second (GBps) (GBps). Several variables can
impact throughput, including the underlying analogue physical medium’s impediment,
the system components’ available computing capacity, and end-user behaviour. When
several protocol costs are included in, the utilisation rate of sent data might be much
ity
Example:
Input: A network with a 10 Mbps capacity can only send out an average of 12, 000
m
frames per minute, each containing 10,000 bits. What will this network’s throughput be?
Latency
(c
Latency (also known as delay) is defined as the whole time it takes for a full
message to arrive at the destination in a network, beginning with the moment the
first bit of the message is sent out from the source and ending with the time the final
Notes
e
bit of the message is delivered at the destination. Network connections with minimal
delays are referred to as “Low-Latency-Networks,” whereas those with large delays are
referred to as “High-Latency-Networks.”
in
Any network communication that has a high latency creates bottlenecks. It
prevents data from fully using the network pipe, resulting in a significant reduction in the
nl
communication network’s capacity. Depending on the cause of the delays, the effect of
latency on a network’s capacity might be transitory or permanent. Latency, often known
as ping rate, is a unit of measurement that is measured in milliseconds (ms).
O
In layman’s terms, latency is the time it takes to transport a packet over a network
successfully.
It may be measured in a variety of ways, including round trip, one way, and so on.
ty
Any component in the data transportation chain, such as workstations and WAN
links, might have an impact.
The time it takes for a bit to travel from its source to its destination is known as
si
propagation time. The ratio of the connection length (distance) to the propagation
speed over the communication medium can be used to compute propagation time.
Propagation time, for example, is the time it takes for an electric signal to propagate
along a wire. r
ve
Distance / Propagation Speed = Propagation Time
Transmission Time: The length of time it takes to convey a signal down a
transmission line is referred to as transmission time. It includes time costs for an EM
ni
signal to travel from one side to the other, as well as expenses such as the training
signals that the sender often places at the beginning of a packet to help the receiver
synchronise clocks. The length of time it takes for a message to be transmitted is
U
router. As the connection is usually busy, we are unable to transfer a packet instantly.
Waiting time is typically not a fixed component, it varies with the network’s load thrust.
In situations like this, the packet waits in a queue, ready to go. The amount of traffic on
the system is mostly responsible for these delays. The higher the volume of traffic, the
m
more probable a packet may become trapped in the queue, waiting to be sent.
Processing Delay: The processing delay is the time it takes the router to determine
where to transmit the packet. The packet will be queued for transmission as soon as the
)A
router discovers it. These expenses are mostly determined by the protocol’s complexity.
The router must be able to decode enough of the packet to determine which queue to
place it in. Simpler protocols are usually found at the bottom layers of the stack. If a
router is unsure which physical port to transmit a packet to, it will send it to all of them,
instantly queuing the packet in many queues.
(c
e
A link’s bandwidth and latency are two performance indicators. In data
transmission, however, the product of the two, the bandwidth-delay product, is crucial.
in
As an example, consider the following scenario.
Case No. 1: Assume a link with a bandwidth of 1 bps and a latency of 5 seconds.
nl
In this situation, let’s look for the bandwidth-delay product. We may deduce from the
graphic that this product 1 x 5 is the maximum amount of bits that can be used to fill the
connection. On the connection, there might be close to 5 bits at any moment.
O
ty
r si
ve
ni
Jitter
Another performance issue linked to delay is jitter. Jitter is defined as “packet delay
ity
35 milliseconds late, and the third arrives 50 milliseconds late, the real-time destination
application that uses the packets would suffer jitter.
Jitter is a bad characteristic that contributes to network congestion and packet loss.
)A
Packet loss is the second negative impact. When packets come at irregular
intervals, the receiving system is unable to process the data, resulting in missing data,
commonly known as “packet loss.” Video watching suffers as a result of this. The
network is suffering jitter if a video turns pixelated and skips. Packet loss is the effect of
Notes
e
jitter.
in
nl
Figure: Jitter
The time it takes for packets to be transmitted is not the same as the time it takes
O
for them to arrive at the recipient side, as seen in the above graphic. One of the packets
experiences an unexpected delay in transit and arrives later than planned. This is what
jitter is.
ty
A jitter buffer can be used in a network, on a router or switch, or on a computer
to mitigate the impacts of jitter. The network packets are frequently received through
the buffer rather than straight from the source system by the system at the destination.
Each packet is supplied at a regular interval from the buffer.
si
5.5.5 Managing IOS Configuration Files
r
This chapter explains how to generate, load, and keep configuration files up to
ve
date. Configuration files are a set of user-configured commands that allow you to adjust
your Cisco routing device’s functionality.
The Cisco IOS XE software instructions used to change the functioning of your
Cisco routing equipment are stored in configuration files (router, access server, switch,
and so on). When the system is booted (from the startup-config file) or when you
input commands at the CLI in configuration mode, the Cisco IOS XE software parses
U
update the running configuration, but not the copy running-config startup-config EXEC
command to preserve it.
)A
To modify the startup configuration file, use the copy running-config startup-config
EXEC command to save the running configuration file to the startup configuration, or
transfer a configuration file from a file server to the startup configuration.
The following are the places where configuration files are kept:
e
platforms except those with the Class A Flash file system (NVRAM).
●● On Class A Flash file system systems, the startup configuration is saved in the
in
CONFIG FILE environment variable-specified location.
nl
The BOOT environment variable’s contents, as well as the name of the
configuration file pointed to by the CONFIG FILE environment variable and the contents
of the BOOTLDR environment variable, are listed.
O
Router# additional file-urls
ty
The contents of the running configuration file are shown. (An alias for the command
more system:running-config.)
si
Router#display startup-config
r
(The nvram: startup-config command has a command alias.) The default startup-
config file is normally stored in NVRAM on all platforms except those with the Class A
ve
Flash file system. The CONFIG FILE environment variable on Class A Flash file system
platforms refers to the default startup-config file. The CONFIG FILE variable is set to
NVRAM by default.
ni
When you configure from the terminal, you may use the command line to input
configuration commands, as indicated in the next section. The startup configuration file
is loaded when you configure from memory.
One configuration command per line is accepted by the Cisco IOS XE software.
You have complete freedom to insert as many configuration commands as you wish.
)A
You can leave comments in a configuration file that describe the commands you’ve
run. An exclamation mark (!) should come before a comment. Comments do not display
when you use the show running-config or more system:running-config EXEC command to
list the active configuration because they are not saved in NVRAM or in the active copy of
the configuration file. When you use the show startup-config or more nvram:startup-config
(c
EXEC mode command to list the startup settings, comments are not displayed.
When the configuration file is loaded onto the router, the comments are removed.
Notes
e
You may, however, list the comments in configuration files saved on a TFTP (Trivial File
Transfer Protocol) server.
in
When you use the CLI to setup the programme, the commands are executed as
you type them. Use the following commands in privileged EXEC mode to setup the
programme via the CLI:
nl
Step 1: Configure the terminal with the router#
O
This command saves the settings to NVRAM on most systems. This phase saves
the configuration to the location given by the CONFIG FILE environment variable on
Class A Flash file system platforms (the default CONFIG FILE variable specifies that the
file should be saved to NVRAM).
ty
The router’s router prompt name is configured in the following example. The
exclamation point (!) indicates that the comment line does not execute any commands.
si
The hostname command is used to modify the router name from Router to new
name in this example. The user exits configuration mode by pressing Ctrl-Z (Z) or
inputting the end command.
r
Step 2: Type the configuration commands that are required. Configuration
ve
commands are arranged by technology in the Cisco IOS XE documentation collection.
Note When you press the Ctrl and Z keys at the same time, the letter Z appears on
the screen.
The startup configuration file is created from the ongoing configuration file.
You may also use the alias copy running-config startup-config, but keep in mind
ity
This command saves the settings to NVRAM on most systems. This phase saves
the configuration to the location given by the CONFIG FILE environment variable on
Class A Flash file system platforms (the default CONFIG FILE variable specifies that the
m
The router’s router prompt name is configured in the following example. The
exclamation point (!) indicates that the comment line does not execute any commands.
)A
The hostname command is used to modify the router name from Router to new
name in this example. The user exits configuration mode by pressing Ctrl-Z (Z) or
inputting the end command.
(c
e
The Cisco IOS XE command-line parser handles command line translation and
execution (parsing) in the Cisco IOS XE software. The Parser Cache functionality was
in
created to parse big configuration files quickly, reducing load time substantially.
By dynamically creating, caching, and reusing simplified parse graphs, the Parser
Cache feature allows for the rapid recognition and translation of configuration lines
nl
in a configuration file that differ slightly from previously used configuration lines (for
example, pvc 0/100, pvc 0/101, and so on).
O
instructions hundreds or thousands of times, such as when thousands of virtual circuits
for subinterfaces must be established or hundreds of access lists must be created.
The performance of files in which the same commands are used frequently but the
ty
numerical arguments change from command to command will benefit the most.
si
to free up resources or reset the parser cache memory. Use the following command in
privileged EXEC mode to clear the information kept by the Parser Cache feature:
By default, the Parser Cache functionality is turned on. Use the following command
in global configuration mode to disable the Parser Cache feature:
The no parser cache option is enabled when the parser cache is deactivated.
ity
1. __________can alert you to any harmful behaviour on your network, delete packets,
and reset the connection to save your IP address from being blocked.
m
3. The ____________is also known as a device that combines the functions of a bridge
and a router.
4. ________ is the amount of time it takes for a packet to sit in the router.
5. A link’s bandwidth and __________ are two performance indicators.
(c
Summary
Notes
e
●● When you consider how the Internet has affected so many of the things’ people do
on a daily basis, it is difficult to think that it has only been available to the majority
in
of people for around 20 years.
●● It has completely changed the way people and companies interact. For example,
prior to the widespread availability of the Internet, organisations and small
nl
enterprises depended heavily on print marketing to make consumers aware of
their products.
●● Businesses depended on mass print marketing initiatives since it was difficult
O
to discern which families were potential clients. These projects were costly and
varied in their success.
●● Consider how customers are contacted nowadays. Most businesses have a
ty
website where clients may learn about their products, read customer reviews, and
buy things straight from the internet.
●● Social networking sites collaborate with companies to advertise their goods and
si
services.
●● Bloggers collaborate with businesses to spotlight and promote their products and
services. The majority of this product placement is aimed towards the potential
r
consumer rather than the general public.
ve
●● Businesses and consumers must continue to adapt to this ever-changing
environment as new technology and end-user devices enter the market. The
network’s function is evolving to facilitate the connecting of people, devices,
and information. Several new networking developments will have an impact
ni
on businesses and consumers. Bring Your Own Device is one of the top trends
(BYOD)
1. Collaboration through the internet
U
years. These patterns will be discussed in further depth in the following areas.
Activity
1. Configure network security group flow logs by using an ARM template
m
Glossary
Notes
e
●● Resource Sharing: The objective is to make all applications, equipment (such
as printers) and, most importantly, data, available to anybody on the network,
in
regardless of the resource’s or user’s physical location.
●● Server-Client model: A company’s information system might be made up of one or
more databases, as well as certain employees who need remote access. The data
nl
is saved on powerful computers known as Servers in this architecture. A system
administrator is usually in charge of storing and maintaining them. Employees, on
the other hand, have modest gadgets on their desks called Clients that allow them
O
to access remote data.
●● Employee Communication: A computer network may serve as an effective means
of communication among employees. E-mail (electronic mail) is now available
in almost every organisation with two or more computers, and employees use it
ty
extensively for everyday communication.
●● eCommerce: Doing business with customers through the Internet is becoming
increasingly vital for organisations. Airlines, booksellers, and music retailers have
si
learned that many customers prefer to purchase from the comfort of their own
homes. This industry is likely to expand rapidly in the future.
●●
r
Active HUB: These are hubs that use their power supply to clean, raise, and
spread the signal across the network. It functions as a repeater as well as a cable
ve
hub. It is possible to increase the overall distance between nodes.
●● Bridges: It connect two or more hosts or network segments together.
●● Static Mapping: A table containing the logical address and physical address of the
ni
Further Readings:
U
1. Homer, Douglas E. The Internet. New Delhi: Prentice Hall of India, 2000. Print
2. Computer Network, A. S. Tarenbaum, 4th edition, Prentice Hall of India, New
Delhi, 2002.
ity
3. Data Network, Drnitri Berteskas and Robert Galleger, Second edition, Prentice
Hall of India, 1997, New Delhi.
3. brouter
4. Queuing time
5. Latency
(c