CH 2. Networks
CH 2. Networks
3
FIGURE 2.1: STANDARDS GOVERN
COMMUNICATION
Message Message
Client PC Message
Standards are rules of operation that govern communication between 2 H/W stations
or 2 S/W on different machines.
-TCP/IP Model
Network Access Layer
MAC Address
Bridge/Switch
Internet Layer
IP
Router
OSI REFERENCE MODEL
OSI: Open Systems Interconnection
It is group of concepts that describes how device know how to send data from
hop to hop then end to end
• Data encryption.
OSI SEVEN LAYERS
Presentation
Establish Close
Connection Connection
OSI SEVER LAYERS
Session
A common example of connection-oriented communication is a telephone call: you call, the 'destination' picks up the
phone and acknowledges and you start talking (sending data). When a message or a piece of it doesn't arrive, you
say: "What!?" and the sender will retransmit the data.
Connectionless is the opposite of connection-oriented; the sender does not establish a connection before it sends
data, it just sends without guaranteeing delivery. UDP is an example of an connectionless transport protocol. A
common example is regular mail versus registered/return receipt mail. Regular mail is UDP and registered mail is TCP.
OSI SEVEN LAYERS
Network
Organize data into Packets
It is responsible for the Internet Protocol Addressing (IP)🡪logical address
It know the best path for the destination
End-to-end Addressing
OSI SEVEN LAYERS
Network
TCP/IP
IPX/SPX
NetBEUI
Apple Talk
TCP/IP PROTOCOL SUITE
TCP/IP is open standard protocol
Not tied to one vendor
TCP/IP is the internet protocol
Now internet use TCP/IP v4
Next version TCP/IP v6
It is the default protocol for
Microsoft Operating Systems
UNIX Operating Systems
LINUX Operating Systems
OSI VERSUS TCP/IP
VERTICAL LAYERED Internet Layer
Data Link Layer
COMMUNICATION Physical Layer
IN A SINGLE HOST 30
VERTICAL COMMUNICATION ON
THE SOURCE HOST ر
Internet Process IP Packet
Data Link
Process DL-T IP Packet
IP Packet DL-H
Physical Process
Sender
Host A
31
FIGURE 2.11: VERTICAL
COMMUNICATION ON THE SOURCE
HOST
Internet Layer Process
Creates an IP packet
Passes the packet down to the data link layer process
Data Link
IP Packet in Data Field
Layer
Of the Frame
Header
Frame
33
VERTICAL COMMUNICATION ON THE DESTINATION HOST
(HOST B)
DL-T IP
IP Packet
Packet DL-H Data Link Process
Physical Process
Receiver
Host B
34
VERTICAL COMMUNICATION ON
THE DESTINATION HOST
Physical Layer Process
Converts the signal into bits of the frame
Passes the frame up to the data link layer process
Data Link Layer Process
Checks the data link layer header (and, if present, trailer)
Decapsulates the IP packet
Passes the packet up to the internet layer process
VERTICAL COMMUNICATION ON SWITCH X1
Switch X1
A B
Frame Frame
Data Link Layer Process
Port Port Port Port
1 2 3 4
PHY PHY PHY PHY
Host A Switch X2
Notes:
A. Switch X1 receives frame in Port 1.
B. Data Link process sends frame out Port 2.
36
VERTICAL COMMUNICATION ON SWITCH X1
Switch takes the signal from Host A at its the Physical Layer and at specific
port no (as here Port 1), It passes this frames to its Data Link Layer (Note:
switches don’t change frames, they only checking it). If the destination in the
MAC address of the frame refer to the router, then the switch passes this
frame to the router port (here it’s Port 4)
VERTICAL COMMUNICATION ON ROUTER R1
IP Packet
Internet Layer Process
Switch X2
38
VERTICAL COMMUNICATION ON ROUTER R1
IP Packet
Internet Layer Process
Router 2
Internet process sends packet out on Port 4.
DL Process on Port 4 encapsulates packet in frame.
DL Process passes frame to Port 4 PHY.
39
VERTICAL COMMUNICATION ON ROUTER R1
• Each Port in the router contains physical layer process and data link
layer process (Switches ports only have physical layer process).
• The internet layer at the router looks out for destination IP address
and makes routing decision of what is the suitable port to use to send
the packet out.
•Routers also don’t change packets, it’s only checks them for their
validity and their destination IP.
40
QUIZ
From knowledge that gained till now:
44
COMMUNICATING WITHIN THE
LAN
Unicast: traffic, many streams of IP packets that move
across networks flow from a single point, such as a website
server, to a single endpoint such as a client PC. This is the
most common form of information transference on
networks.
Broadcast: Here, traffic streams from a single point to all possible endpoints
within reach on the network, which is generally a LAN. This is the easiest
technique to ensure traffic reaches its destinations.
This mode is mainly utilized by television networks for video and audio
distribution. Even if the television network is a cable television (CATV) system,
the source signal reaches all possible destinations, which is the key reason that
some channels’ content is scrambled. Broadcasting is not practicable on the
public Internet due to the massive amount of unnecessary data that would
continually reach each user’s device, the complications and impact of
scrambling, and related privacy issues.
Multicast: In this method traffic recline between the
boundaries of unicast (one point to one destination) and
broadcast (one point to all destinations). And multicast is a
“one source to many destinations” way of traffic
distribution, which means that only the destinations that
openly point to their requisite to accept the data from a
specific source to receive the traffic stream.
PHYSICAL ADDRESSES
▪ Shares bandwidth
▪ Extends cable distances
▪ Repeats or amplifies signal
▪ It is layer 1 device
▪ It work only with bits
▪ Must work with half duplex communication
COLLISIONS
▪ All ports of the hub have the same collision domain and broadcast
domain.
▪ Collisions makes the network very slow and congested
CSMA/CD
SWITCH/BRIDGE
10 A1-44-D5-1F-AA-4C UTP
13 B2-CD-13-5B-E4-65
15 C3-2D-55-3B-A9-4F
15 C3-2D-55-3B-A9-4F D4-47-55-C4-B6-9F
16 D4-47-55-C4-B6-9F UTP UTP On Port 16
UTP Frame
Frame
C3-2D-55-3B-A9-4F
A1-44-D5-1F-AA-4C B2-CD-13-5B-E4-65 On Port 15
On Port 10 On Port 13
57
FIGURE 5.1: MULTI-SWITCH
ETHERNET LAN
Switch 2
Port 5 on Switch 1
to Port 3 on Switch 2 Port 7 on Switch 2
to Port 4 on Switch 3
Switch 1 Switch 3
C3-2D-55-3B-A9-4F
Switch 2, Port 5
B2-CD-13-5B-E4-65
Switch 1, Port 7
58
MULTI-SWITCH ETHERNET
LAN
Switch 2
B2-CD-13-5B-E4-65
Switch 1, Port 7
A1-44-D5-1F-AA-4C E5-BB-47-21-D3-56
Switch 1, Port 2 Switch 3, Port 6
59
MULTI-SWITCH ETHERNET
LAN
Switch 2
C3-2D-55-3B-A9-4F
Switch 1 Switch 2, Port 5 Switch 3
60
MULTI-SWITCH ETHERNET
LAN
Switch 2
Port 7 on Switch 2
to Port 4 on Switch 3
Switching Table Switch 3
Port Station
4 A1-44-D5-1F-AA-4C Switch 3
4 B2-CD-13-5B-E4-65
4 C3-2D-55-3B-A9-4F
2 D4-47-55-C4-B6-9F
6 E5-BB-47-21-D3-56
61
HIERARCHICAL ETHERNET
LAN
Only One
Possible Path
Between Ethernet
Any Two Switch A
Stations
Ethernet Ethernet
Switch B Switch C
PC Client 2
Ethernet Switch F
Ethernet
Switch D Ethernet
Switch E
Server X Server Y
Client PC1
62
SINGLE POINT OF FAILURE IN A
SWITCH HIERARCHY Switch Fails
Switch 2
No Communication No Communication
C3-2D-55-3B-A9-4F
Switch 1 Switch 3
B2-CD-13-5B-E4-65 D4-47-55-C4-B6-9F
A1-44-D5-1F-AA-4C E5-BB-47-21-D3-56
63
802.1D SPANNING TREE
PROTOCOL
Normal Operation Module C
Loop, but
Spanning Tree Protocol
Deactivates One Link
Switch 2 Activated
Activated Deactivated
C3-2D-55-3B-A9-4F
Switch 1 Switch 3
B2-CD-13-5B-E4-65 D4-47-55-C4-B6-9F
A1-44-D5-1F-AA-4C E5-BB-47-21-D3-56
64
802.1D SPANNING TREE
PROTOCOL
Switch 2 Fails
Module C
Switch 2 Deactivated
Deactivated
Activated
B2-CD-13-5B-E4-65 D4-47-55-C4-B6-9F
A1-44-D5-1F-AA-4C E5-BB-47-21-D3-56
65
HIERARCHICAL ETHERNET
LAN
Core
Core
Ethernet
Switch A
66
WORKGROUP SWITCHES
VERSUS CORE SWITCHES
67
SWITCHING MATRIX WITH
QUEUE
Module C
Switch Matrix
Input Queue
Incoming Outgoing
Signal Signal
68
WORKGROUP SWITCHES VERSUS CORE
SWITCHES
Switching Matrix
Ports = 4 4Gbps
Nonblocking
Speed = 1 Gbps
1 Gbps
Maximum input = 4 Gbps
Nonblocking switch matrix
capacity = 4 Gbps
1 Gbps
1 Gbps
1 Gbps
69
VIRTUAL LAN WITH ETHERNET
SWITCHES
Server Broadcasting without VLANS
Frame is Broadcast
Goes to all stations
Creates congestion
Server
Broadcast
Client C
Client B
Client A Server D Server E
70
VIRTUAL LAN WITH ETHERNET
SWITCHES
Server Multicasting with VLANS
Server
Broadcast
Client C
on VLAN1
Client B
on VLAN2
Client A Server D Server E
on VLAN1 on VLAN2 on VLAN1
71
TYPICAL 802.11 WIRELESS LAN
OPERATION WITH ACCESS POINTS
CSMA/CA+ACK
Switch
UTP Radio Link
Access
Point A
Laptop
Access Handoff()اﻟﺗﺣوﯾل
Point B If mobile computer
Client PC moves to another
Server access point,
it switches service
to that access point
Large Wired LAN
72
TYPICAL 802.11 WIRELESS LAN
OPERATION WITH ACCESS POINTS
Access Point
Industry
Standard
Coffee
Cup
Wireless
Notebook
To Ethernet
NIC
Switch
73
FIGURE 5.8: TYPICAL 802.11
WIRELESS LAN OPERATION WITH
ACCESS POINTS
D-Link
Wireless
Access
Point
74
CSMA/CA + ACK IN 802.11
WIRELESS LANS
CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance)
Station or access point sender listens for traffic
If there is no traffic, can send if there has been no traffic for a specified
amount of time
If the specified amount of time has not been met, must wait for the specified
amount of time. Can send if the line is still clear
75
CSMA/CA + ACK IN 802.11
WIRELESS LANS
CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance)
Station or access point sender listens for traffic
If there is traffic, the sender must wait until traffic stops
The sender must then set a random timer and must wait while the timer is
running
If there is no traffic when the station or access point finishes the wait, it may
send
76
CSMA/CA + ACK IN 802.11
WIRELESS LANS
ACK (Acknowledgement)
Receiver immediately sends back an acknowledgement;
no waiting because ACKs have highest priority
If sender does not receive the acknowledgement,
retransmits using CSMA/CA
77
WHO IMPLEMENTS CSMA/CA?
Stations (when they send)
Access Points (when they send)
802.11
Mobile Frame
Access
Station Point
CSMA/CA+ACK
78
AD HOC 802.11 NETWORKS Module C
No Access Point
a wireless network that allows easy connection establishment between wireless client devices in
the same physical area without the use of an infrastructure device.
79
TCP/IP PROTOCOL ARCHITECTURE
Internet Layer (IP)
Routing of data
Logical addressing IPV4 , IPV6
WHY IP ADDRESSES?
They uniquely identify each device on an IP network.
Some times we called it the logical address
Every host (computer, networking device, peripheral) must have a unique address.
Host ID:
Identifies the individual host
Is assigned by organizations to individual devices
The router maintain network information to route the data
The IP address 32 bit divided into 4 octets each octet 8 bit
Octet is a unit consists of 8 bits
Network.Host
IP ADDRESS FORMAT: DOTTED
DECIMAL NOTATION
▪ Direct Broadcast
▪ Loopback address
▪ Auto configuration
▪ All networks
PUBLIC IP ADDRESSES
A 10.0.0.0 to 10.255.255.255
B 172.16.0.0 to 172.31.255.255
C 192.168.0.0 to 192.168.255
Routers / L3 Switch
A device used to redirect packets between networks
Use network layer address ( IP Address)
Operate at the network layer of OSI
Routers forward packets based upon The Destination IP Network
Router search the routing table for the needed network ID
Routers are protocol dependent
89
THANK YOU