COM 221 Basic Computer Networks Lecture Note 2022
COM 221 Basic Computer Networks Lecture Note 2022
COURSE DETAILS
Department/ Computer Science/ ND II
Programme:
Course: Basic Course Code: COM
Contact Hours: 4 hours/week
Computer Networking 221
General Objectives
On completion of this course the student should be able to:
Understand the basic Concepts of Computer Networking
Know the Hardware Components of Computer Networks and their Functions
Understand Network Planning and Design
Know the Different Types of Network Connections
Understand the Open System Interconnection (ISO) Model and the TCP/IP Model
Understand IP Address on Networks using IPv4 and IPv6
Understand Wireless Network Access
ASSESSMENT
Type of Assessment Purpose and Nature of Assessment (COM 414) Weighting (%)
Total 100
*****************WEEK ONE******************
COMPUTER NETWORK
A computer network is a set of devices connected through links. A node can be computer, printer,
or any other device capable of sending or receiving the data. The links connecting the nodes are
known as communication channels.
Computer Network uses distributed processing in which task is divided among several computers.
Instead, a single computer handles an entire task, each separate computer handles a subset.
Resource sharing: Resource sharing is the sharing of resources such as programs, printers,
and data among the users on the network without the requirement of the physical location
of the resource and user.
Server-Client model: Computer networking is used in the server-client model. A server
is a central computer used to store the information and maintained by the system
administrator. Clients are the machines used to access the information stored in the server
remotely.
Communication medium: Computer network behaves as a communication medium
among the users. For example, a company contains more than one computer has an email
system which the employees use for daily communication.
E-commerce: Computer network is also important in businesses. We can do the business
over the internet. For example, amazon.com is doing their business over the internet, i.e.,
they are doing their business over the internet.
Helps you to connect with multiple computers together to send and receive information
when accessing the network.
Helps you to share printers, scanners, and email.
Helps you to share information at very fast speed
Electronic communication is more efficient and less expensive than without the network.
Investment for hardware and software can be costly for initial set-up
If you don’t take proper security precautions like file encryption, firewalls then your data
will be at risk.
Some components of the network design may not last for many years, and it will become
useless or malfunction and need to be replaced.
Requires time for constant administration
Frequent server failure and issues of regular cable faults
A Local Area Network (LAN) is a group of computer and peripheral devices which are connected
in a limited area such as school, laboratory, home, and office building. It is a widely useful network
for sharing resources like files, printers, games, and other application. The simplest type of LAN
network is to connect computers and a printer in someone’s home or office. In general, LAN will
be used as one type of transmission medium. It is a network which consists of less than 5000
interconnected devices across several buildings. Local area networks, generally called LANs, are
privately-owned networks. They provide a useful way of sharing resources between end users. The
resources such as printers, file servers, scanners, and internet are easily sharable among other
connected computers in a network. Traditional LANs run at speeds of 10 to 100 Mbps (but now
much higher speeds can be achieved) but newer LANs operate at up to 10 Gbps speed.
Characteristics of LAN
Here are the important characteristics of a LAN network:
Peer-to-peer LANs do not have a central server, instead each computer in the network shares in
the running of the network itself. The computers are all connected to the internet via the same
router – this is how the majority of household LANs are set up.
There are a number of reasons why you might want to build a LAN at home, which we'll get into
now. The advantages are pretty much the same as they are in business, where LANs are used all
the time.
Shared network devices – Connecting your computers all up to one network means each of
those devices has access to the same network devices, such as printers, scanners and hard disks
Shared internet connection – A LAN in your home or office requires only one internet
connection, as long as there is enough bandwidth to go around. If your current connection isn't
good enough, check out these great broadband deals
Shared software – If you've ever bought office software, whether it's for design, accounting or
anything else, you'll know it doesn't come cheap. So being able to buy one software licence and
share it across multiple devices can bring significant savings
Security – Using a LAN means you have control over where your data is stored, bringing
obvious security benefits
Easy transfer of data – Computers on a LAN can easily send and receive data and messages
between each other
Privacy – LANs are private networks and are not controlled by outside regulatory bodies
Advantages of LAN
1. Resource Sharing: LAN provides resource sharing such as computer resources like
printers, scanners, modems, DVD-ROM drives, and hard disks can be shared within the
connected devices. This reduces cost and hardware purchases.
2. Software Applications Sharing: In a Local Area Network, it is easy to use the same
software in a number of computers connected to a network instead of purchasing the
separately licensed software for each client a network.
3. Easy and Cheap Communication: Data and messages can easily be shared with the other
computer connected to the network.
4. Centralized Data: The data of all network users can be stored on a hard disk of the
central/server computer. This help users to use any computer in a network to access the
required data.
5. Data Security: Since data is stored on the server computer, it will be easy to manage data
at only one place and the data will be more secure too.
6. Internet Sharing: Local Area Network provides the facility to share a single internet
connection among all the LAN users. In school labs and internet Cafes, single internet
connection is used to provide internet to all connected computers.
Disadvantages of LAN
1. High Setup Cost: The initial setup costs of installing Local Area Networks is high because
there is special software required to make a server. Also, communication devices like
an Ethernet cable, switches, hubs, routers, cables are costly.
2. Privacy Violations: The LAN administrator can see and check personal data files of each
and every LAN user. Moreover, he can view the computer and internet history of the LAN
user.
3. Data Security Threat: Unauthorised users can access important data of an office or
campus if a server hard disk is not properly secured by the LAN administrator.
4. LAN Maintenance Job: Local Area Network requires a LAN Administrator because there
are problems such as software installations, program faults or hardware failures or cable
disturbances in Local Area Network. A LAN Administrator is required to maintain these
issues.
5. Covers Limited Area: LANs are restricted in size they cover a small area like a single
office, single building or a group of nearby buildings.
1.2.2 Personal Area Network
PAN (Personal Area Network) is a computer network formed around a person. It generally consists
of a computer, mobile, or personal digital assistant. PAN can be used for establishing
communication among these personal devices for connecting to a digital network and the internet.
Characteristics of PAN
Below are the main characteristics of PAN:
Advantages of PAN
Here are the important pros/benefits of PAN network:
Disadvantages of PAN
Here are the cons/drawbacks of using PAN network:
It may establish a bad connection to other networks at the same radio bands.
Distance limits.
WAN (Wide Area Network) is another important computer network that which is spread across a
large geographical area. WAN network system could be a connection of a LAN which connects
with other LAN’s using telephone lines and radio waves. It is mostly limited to an enterprise or an
organization.
Characteristics of WAN
Below are the characteristics of WAN:
The software files will be shared among all the users; therefore, all can access to the latest
files.
Any organization can form its global integrated network using WAN.
Advantages of WAN
Here are the benefits/pros of WAN:
WAN helps you to cover a larger geographical area. Therefore business offices situated at
longer distances can easily communicate.
Contains devices like mobile phones, laptop, tablet, computers, gaming consoles, etc.
WLAN connections work using radio transmitters and receivers built into client devices.
Disadvantages of WAN
Here are the drawbacks/cons of WAN network:
A Metropolitan Area Network or MAN is consisting of a computer network across an entire city,
college campus, or a small region. This type of network is large than a LAN, which is mostly
limited to a single building or site. Depending upon the type of configuration, this type of network
allows you to cover an area from several miles to tens of miles.
Figure 28: Metropolitan Area Network (MAN)
Characteristics of MAN
Here are important characteristics of the MAN network:
Advantages of MAN
Here are the pros/benefits of MAN network:
It offers fast communication using high-speed carriers, like fiber optic cables.
It provides excellent support for an extensive size network and greater access to WANs.
The dual bus in MAN network provides support to transmit data in both directions
concurrently.
A MAN network mostly includes some areas of a city or an entire city.
Disadvantages of MAN
Here are drawbacks/cons of using the MAN network:
You need more cable to establish MAN connection from one place to another.
In MAN network it is tough to make the system secure from hackers
Apart from above mentioned computer networks, here are some other important types of
networks:
WLAN (Wireless Local Area Network)
Storage Area Network
System Area Network
Home Area Network
POLAN- Passive Optical LAN
Enterprise private network
Campus Area Network
Virtual Area Network
1) WLAN
WLAN (Wireless Local Area Network) helps you to link single or multiple devices using wireless
communication within a limited area like home, school, or office building. It gives users an ability
to move around within a local coverage area which may be connected to the network. Today most
modern day’s WLAN systems are based on IEEE 802.11 standards.
3) System-Area Network
System Area Network is used for a local network. It offers high-speed connection in server-to-
server and processor-to-processor applications. The computers connected on a SAN network
operate as a single system at quite high speed.
*****************WEEK TWO***************
It is not a simple project to set up a LAN network (seen in the below image), especially for a
beginners in telecom field. Thus it is advisable to make a comprehensive plan before making the
next move. Network components like cable router, Ethernet cables, Ethernet switch and Network
interfaces are the basics of a LAN network. Computers are connected to a switch with Ethernet
cables. Make sure cable lengths do not exceed 100 meters, or about 300 feet. Each device are
supposed to have a unique IP address. Besides that, you must first identify which services you
need to provide locally on the LAN. The next part will move on to give you some detailed
instruction about setting up a LAN network.
Step 1. Identify the local services that you want available on the network. Identify network-attached
printers, network disk drives, any server that will share printers or disks. Identify how many devices
will have to connect to the network. Each device, server or workstation will require a unique
address.
Step 2. Do not run cables in air ducts unless they are fire rated. A wired LAN will always get better
performance and be more secure than a wireless LAN. Wherever possible, run a cable to servers,
printers, IP phones or work locations. Run a cable to any area where you are likely to work and use
standard Ethernet cables. The accessories like fiber optic wall plates, fiber patch cables, optical
connectors are small but indispensable for a high performance LAN network just as seen in the
below image.
Step 3. Use a switch or router with wireless capacity gives you more flexibility. The simple secure
way to connect to the Internet is to use a cable router. Many types and models are available. If the
model you choose does not have enough ports to connect all of your computers, then you will need
to purchase a switch as well. Also a wireless router is needed in a modern LAN network.
Step 4. Configure the LAN ports of your cable router. Most cable routers will act as a Dynamic
Host Configuration Server, or DHCP server. This means that the router will give addresses to
workstations automatically. Be certain that the address pool has enough addresses for all of the
workstations. Make certain that there are enough addresses outside of the range for any hosts that
need static addresses. For example, a network address with a mask of 255.255.255.0 has a total of
254 hosts. If the dynamic pool has 200 addresses available, that means the remaining 54 addresses
are available to give printers or servers static addresses.
Step 5. Connect the wires for the network. Workstations and servers can be connected with standard
Ethernet cables. Connect the switch to the cable router LAN ports by using the up-link or straight
port on the switch. If the switch does not have an up-link port, connect any standard port of the
switch to a LAN port on the cable router with an Ethernet crossover cable. Ethernet crossover cables
can be purchased at any electronics store.
Step 6. Test the services and Internet connectivity. The actual performance of LAN network
depends upon numerous factors including the cable specification, the quality of the installation and
the connected devices. For this reason it is not sufficient to assume an installation will perform at
the desired speed; its actual performance should be checked. It is advisable to test each of the
workstations to ensure they can connect to the Internet and test any local servers and printers. Print
test pages on the shared printers. Tests read and write permissions on shared file servers by copying
files to the servers and copying files from the server to a workstation.
2.2 Computer Network Architecture
Computer Network Architecture is defined as the physical and logical design of the software,
hardware, protocols, and media of the transmission of data. Simply we can say that how computers
are organized and how tasks are allocated to the computer.
o Peer-To-Peer network
o Client/Server network
*****************WEEK THREE***************
For a specific purpose if things are connected together, are referred to as a NETWORK. A
network can be of many types, like a telephone network, television network, computer network,
or even a people network. Similarly, a COMPUTER NETWORK is also a kind of setup, where
it connects two or more devices to share a range of services and information in the form of e-
mails and messages, databases, documents, websites, audios and videos, Telephone calls, and
video conferences, etc among them.
A NIC converts data packets between two different data transmission technologies. A PC uses
parallel data transmission technology to transmit data between its internal parts whereas the media
that provides connectivity between different PCs uses serial data transmission technology. A NIC
converts a parallel data stream into the serial data stream and a serial data stream into the parallel
data stream.
For desktop or server systems, they are available as adapters that can be plugged into an available
slot on the motherboard. For laptops or other smaller-sized devices, they are available in PCMCIA
(International Association of Personal Computer Memory Cards) card form that can be inserted
into a PCMCIA slot.
Types of NICs
There are two types of NICs: media-specific and network design specific
Media Specific: - A media-specific NIC supports a particular type of media. For example, to
connect a coaxial cable, you need a NIC that has the BNC port whereas to connect an Ethernet
cable, you need a NIC that has the RJ-45 port.
Network Design Specific: - A network design-specific NIC supports a specific network topology.
For example, FDDI, Token Ring, and Ethernet have their distinctive type of NIC cards. They
cannot use other types of NIC cards.
Passive Hub: - A passive hub forwards data signals as it receives them. It does not change data
signals in any manner.
Active Hub: - An active hub also forwards data signals. But, before forwarding them, it amplifies
them. Due to this added feature, an active Hub is also called a repeater.
Hub is used for Ethernet network while MAU is used for Token Ring network.
Hub logically forms the star topology while MAU logically forms the ring topology.
A patch panel is used to organize the UTP cables systematically. It doesn't interfere with the data
signals.
3.2.4 Bridge
A bridge is used to divide a large network into smaller segments. The basic functions of a bridge
are the following: -
A bridge can connect two different types of media or network architecture, but it cannot connect
two different types of network layer protocols such as TCP/IP or IPX. It requires the same network-
layer protocols across all segments.
There are three types of bridge:-
Local Bridge: - The Bridge directly connects two LAN segments. In Ethernet implementations,
this is known as a transparent bridge. In the Token Ring network, this is called a source-routed
bridge.
Remote Bridge: - This Bridge connects with another Bridge over the WAN link.
Wireless Bridge: - This Bridge connects with another Bridge without using wires. It uses radio
signals for connectivity.
In networking models such as the OSI layers model and TCP/IP model, the functionalities of
Bridges are defined in the physical layer and data link layer.
Just like a Hub, a Bridge is also no longer used in the computer network. Bridges have been
replaced by switches.
3.2.5 Switch
Just like a hub and a bridge, a switch is also used to connect multiple devices in a LAN segment.
A switch is the upgraded version of the bridge. Besides providing all the functionalities of a bridge,
it also offers several additional features. The biggest advantage of a switch is that it makes
switching decisions in hardware by using application-specific integrated circuits (ASICs).
Unlike the generic processors that we use in our PC, ASICs are specialized processors built only
to perform particular tasks. Usually, the ASICs in switches have a single task and that is switching
the frames as fast as they can. An ASIC occupied switch performs this task blazingly fast. For
example, an entry-level 2960 Catalyst Switch can process 2.7 million frames per second.
3.2.6 Modem
In simple language, a modem is a device that is used to connect to the Internet. Technically, it is
the device that enables digital data to be transmitted over telecommunication lines. A Telco
company uses entirely different data transmission technology from the technology that a PC uses
for data transmission. A modem understands both technologies. When it receives signals from the
PC, it converts them into the format that the Telco Company understands. When it receives signals
from the Telco Company, it converts them into a format that the PC understands. It enables
communication between the PC (Known as the DTE device) and the Telecom company's office
(Known as the DCE device).
3.2.7 Gateway
Gateway is used to forward packets that originate from a local host or a local network and are
intended for remote networks. If a data packet does not get its destination address in the local
network then it takes the help of the gateway device to find the destination address in the remote
network. The gateway device knows the path to the remote destination address. If necessary, it
also encapsulates the packet so that it can travel through other networks to reach its destination
address. The following image shows a gateway device.
Figure 17. Gateway
Email Gateway:- An email gateway translates SMTP e-mails in standard X.400 format before
forwarding.
GSNW Gateway:- A GSNW gateway allows Windows clients to access resources from the
NetWare server.
PAD Gateway:- A PAD gateway provides connectivity between a LAN network and an X.25
network.
3.2.9 Router
A router connects different network segments. It switches data packets between networks that are
either located in different logical segments or constructed with different network-layer protocols.
When a router receives a data packet on any of its interfaces, it checks the destination address of
that packet, and based on that destination address, forwards that data packet to the interface that is
associated with the destination address. To forward data packets to their destination, the router
keeps a record of the connected network. These records are maintained in a database table known
as the routing table. Routing tables can be created statically or dynamically. The following image
shows two routers.
3.2.10 Proxy
A proxy is used to hide the internal network from the outside world. It may be a dedicated device
or maybe an application software. Once it is configured, all communication goes through it. Since
external devices cannot directly access internal equipment, they cannot tamper with internal
equipment. The following image shows an example of a proxy.
2.2.11 Transceiver
A transceiver is a small device that can send and receive both types of signals: analog and digital.
Usually, it is inbuilt in the network interface card. But, it is also available as a separate device. It
detects the type of signal from the network wire and converts the signal accordingly.
*****************WEEK FOUR***************
In this topic, private WAN infrastructures are discussed including leased lines, dialup access,
ISDN, Frame Relay, ATM, MPLS, and Ethernet WANs, and VSAT.
When permanent dedicated connections are required, a point-to-point link is used to provide a pre-
established WAN communications path from the customer premises to the provider network.
Point-to-point lines are usually leased from a service provider and are called leased lines.
Leased lines have existed since the early 1950s, and for this reason are referred to by different
names, such as leased circuits, serial link, serial line, point-to-point link, and T1/E1 or T3/E3 lines.
The term leased line refers to the fact that the organization pays a monthly lease fee to a service
provider to use the line. Leased lines are available in different capacities and are generally priced
based on the bandwidth required and the distance between the two connected points.
In North America, service providers use the T-carrier system to define the digital transmission
capability of a serial copper media link, while Europe uses the E-carrier system.
Figure 21
For instance, a T1 link supports 1.544 Mbps, an E1 supports 2.048 Mbps, a T3 supports 43.7 Mbps,
and an E3 connection supports 34.368 Mbps. Optical Carrier (OC) transmission rates are used to
define the digital transmitting capacity of a fiber-optic network.
Cost: Point-to-point links are generally the most expensive type of WAN access. The cost
of leased line solutions can become significant when they are used to connect many sites
over increasing distances. In addition, each endpoint requires an interface on the router,
which increases equipment costs.
Limited flexibility: WAN traffic is often variable, and leased lines have a fixed capacity,
so that the bandwidth of the line seldom matches the need exactly. Any change to the leased
line generally requires a site visit by ISP personnel to adjust capacity.
T1—T1 circuits were originally used in telephony networks, with the intent of one voice
conversation being carried in a single channel (that is, a single DS0). A T1 circuit is composed
of 24 DS0s, which is called a Digital Signal 1 (DS1). The bandwidth of a T1 circuit is 1.544
Mbps.
Because an E1 circuit has more DS0s than a T1, it has a higher bandwidth capacity.
Specifically, an E1 has a bandwidth capacity of 2.048 Mbps.
Unlike a T1 circuit, an E1 circuit does not group frames together in an SF or ESF. Instead, an
E1 circuit groups 16 frames together in a multiframe.
T3—In the same T-carrier family of standards as a T1, a T3 circuit offers an increased
bandwidth capacity. Although a T1 circuit combines 24 DS0s into a single physical connection
to offer 1.544 Mbps of bandwidth, a T3 circuit combines 672 DS0s into a single physical
connection, which is called a Digital Signal 3 (DS3). A T3 circuit has a bandwidth capacity of
44.7 Mbps.
CSU/DSU—Although far less popular than they once were, analog modems allowed a phone
line to come into a home or business and terminate on analog modems, which provided data
connections for devices such as PCs. These analog modems supported a single data
conversation per modem.
However, digital circuits (for example, T1, E1, T3, or E3 circuits) usually have multiple data
conversations multiplexed together on a single physical connection. Therefore CSU/DSU, a
digital modem, is needed, as opposed to an analog modem. This digital modem must be able
to distinguish between data arriving on various DS0s.
A CSU/DSU circuit can terminate an incoming digital circuit from a service provider and send
properly formatted bits to a router. A CSU/DSU uses clocking (often provided by the service
provider) to determine when one bit stops and another starts. Therefore, the circuit coming
from a service provider and terminating on a CSU/DSU is a synchronous circuit (in which the
synchronization is made possible by clocking).
4.1.2 Dialup
Dialup WAN access may be required when no other WAN technology is available. For example,
a remote location could use a modem and analog dialed telephone lines to provide low-capacity
and dedicated switched connections. Dialup access is suitable when intermittent, low-volume data
transfers are needed.
Traditional telephony uses a copper cable for the local loop to connect the telephone handset in
the subscriber premises to the CO. The signal on the local loop during a call is a continuously
varying electronic signal that is a translation of the subscriber voice into an analog signal.
Traditional local loops can transport binary computer data through the voice telephone network
using a modem. The modem modulates the binary data into an analog signal at the source and
demodulates the analog signal to binary data at the destination. The physical characteristics of the
local loop and its connection to the PSTN limit the rate of the signal to less than 56 Kbps.
For small businesses, these relatively low-speed dialup connections are adequate for the exchange
of sales figures, prices, routine reports, and email. Using automatic dialup at night or on weekends
for large file transfers and data backup can take advantage of lower off-peak tariffs (toll charges).
Tariffs are based on the distance between the endpoints, time of day, and the duration of the call.
The advantages of modem and analog lines are simplicity, availability, and low implementation
cost. The disadvantages are the low data rates and a relatively long connection time. The dedicated
circuit has little delay or jitter for point-to-point traffic, but voice or video traffic does not operate
adequately at these low bit rates.
4.1.3 ISDN
Integrated Services Digital Network (ISDN) is a circuit-switching technology that enables the local
loop of a Public Switched Telephone Network (PSTN) to carry digital signals, resulting in higher-
capacity switched connections.
ISDN changes the internal connections of the PSTN from carrying analog signals to time-division
multiplexed (TDM) digital signals. TDM allows two or more signals, or bit streams, to be
transferred as subchannels in one communication channel. The signals appear to transfer
simultaneously; but physically, the signals are taking turns on the channel. The Figure
below displays a sample ISDN topology. The ISDN connection may require a terminal adapter
(TA), which is a device used to connect ISDN Basic Rate Interface (BRI) connections to a router.
ISDN turns the local loop into a TDM digital connection. This change enables the local loop to
carry digital signals that result in higher-capacity switched connections. The connection uses 64-
Kbps bearer channels (B) for carrying voice or data and a signaling delta channel (D) for call setup
and other purposes.
Figure 22: Sample ISDN Topology
Basic Rate Interface (BRI): ISDN BRI is intended for the home and small enterprise and
provides two 64-Kbps B channels and one 16-Kbps D channel. The BRI D channel is
designed for control and often underused, because it has only two B channels to control.
Primary Rate Interface (PRI): ISDN is also available for larger installations. In North
America, PRI delivers 23 B channels with 64 Kbps and 1 D channel with 64 Kbps for a
total bit rate of up to 1.544 Mbps. This includes some additional overhead for
synchronization. In Europe, Australia, and other parts of the world, ISDN PRI provides 30
B channels and 1 D channel, for a total bit rate of up to 2.048 Mbps, including
synchronization overhead.
BRI has a call setup time that is less than a second, and the 64-Kbps B channel provides greater
capacity than an analog modem link. If greater capacity is required, a second B channel can be
activated to provide a total of 128 Kbps. Although inadequate for video, this permits several
simultaneous voice conversations in addition to data traffic.
Another common application of ISDN is to provide additional capacity as needed on a leased line
connection. The leased line is sized to carry average traffic loads while ISDN is added during peak
demand periods. ISDN is also used as a backup if the leased line fails. ISDN tariffs are based on a
per-B-channel basis and are similar to those of analog voice connections.
With PRI ISDN, multiple B channels can be connected between two endpoints. This allows for
videoconferencing and high-bandwidth data connections with no latency or jitter. However,
multiple connections can be very expensive over long distances.
Frame Relay is a simple Layer 2 non broadcast multiaccess (NBMA) WAN technology used to
interconnect enterprise LANs. A single router interface can be used to connect to multiple sites
using Permanent Virtual Circuits. PVCs are used to carry both voice and data traffic between a
source and destination, and support data rates up to 4 Mbps, with some providers offering even
higher rates.
An edge router only requires a single interface, even when multiple virtual circuits (VCs) are used.
The short-leased line to the Frame Relay network edge allows cost-effective connections between
widely scattered LANs.
Frame Relay creates PVCs, which are uniquely identified by a data-link connection identifier
(DLCI). The PVCs and DLCIs ensure bidirectional communication from one DTE device to
another.
For instance, in the example in figure below R1 will use DLCI 102 to reach R2, while R2 will use
DLCI 201 to reach R1.
Asynchronous Transfer Mode (ATM) technology is capable of transferring voice, video, and data
through private and public networks. It is built on a cell-based architecture rather than on a frame-
based architecture. ATM cells are always a fixed length of 53 bytes. The ATM cell contains a 5-
byte ATM header followed by 48 bytes of ATM payload. Small fixed-length cells are well-suited
for carrying voice and video traffic because this traffic is intolerant of delay. Video and voice
traffic do not have to wait for larger data packets to be transmitted.
The 53-byte ATM cell is less efficient than the bigger frames and packets of Frame Relay.
Furthermore, the ATM cell has at least 5 bytes of overhead for each 48-byte payload. When the
cell is carrying segmented network layer packets, the overhead is higher because the ATM switch
must be able to reassemble the packets at the destination. A typical ATM line needs almost 20
percent greater bandwidth than Frame Relay to carry the same volume of network layer data. ATM
was designed to be extremely scalable and to support link speeds of T1/E1 to OC-12 (622 Mbps)
and faster.
ATM offers both PVCs and SVCs, although PVCs are more common with WANs. As with other
shared technologies, ATM allows multiple VCs on a single leased-line connection to the network
edge. In the example in figure below, the ATM switch transmits four different traffic flows
consisting of video, VoIP, web, and email.
Ethernet was originally developed to be a LAN access technology. At that time however, it really
was not suitable as a WAN access technology because the maximum cable length supported was
only up to a kilometer. However, newer Ethernet standards using fiber-optic cables have made
Ethernet a reasonable WAN access option. For instance, the IEEE 1000BASE-LX standard
supports fiber-optic cable lengths of 5 km, while the IEEE 1000BASE-ZX standard supports up to
70 km cable lengths.
Service providers now offer Ethernet WAN service using fiber-optic cabling. The Ethernet WAN
service can go by many names, including Metropolitan Ethernet (MetroE), Ethernet over MPLS
(EoMPLS), and Virtual Private LAN Service (VPLS). The figure below displays a sample
Ethernet WAN topology.
4.1.7 MPLS
MPLS has several defining characteristics. It is multiprotocol, meaning it has the ability to carry
any payload including IPv4, IPv6, Ethernet, ATM, DSL, and Frame Relay traffic. It uses labels
that tell a router what to do with a packet. The labels identify paths between distant routers rather
than endpoints, and while MPLS actually routes IPv4 and IPv6 packets, everything else is
switched.
MPLS is a service provider technology. Leased lines deliver bits between sites, and Frame Relay
and Ethernet WAN deliver frames between sites. However, MPLS can deliver any type of packet
between sites. MPLS can encapsulate packets of various network protocols. It supports a wide
range of WAN technologies, including T-carrier / E-carrier links, Carrier Ethernet, ATM, Frame
Relay, and DSL. The sample topology in figure below illustrates how MPLS is used.
Notice that the different sites can connect to the MPLS cloud using different access technologies.
In the figure, CE refers to the customer edge, PE is the provider edge router, which adds and
removes labels, while P is an internal provider router, which switches MPLS labeled packets.
4.1.8 VSAT
All private WAN technologies discussed so far used either copper or fiber-optic media. What if an
organization needs connectivity in a remote location where there are no service providers that offer
WAN service?
Very small aperture terminal (VSAT) is a solution that creates a private WAN using satellite
communications. A VSAT is a small satellite dish similar to those used for home Internet and TV.
VSATs create a private WAN while providing connectivity to remote locations.
Specifically, a router connects to a satellite dish that is pointed to a service provider’s satellite in
a geosynchronous orbit in space. The signals must travel approximately 35,786 km (22,236 miles)
to the satellite and back.
The example in figure below displays a VSAT dish on the roofs of the buildings communicating
with a satellite dish thousands of kilometers away in space.
Figure 29: Sample VSAT Topology
In this topic, public WAN infrastructures are discussed, including DSL, cable, wireless, 3G/4G
cellular, as well as the need to secure data using site-to-site VPNs and remote-access VPNs.
4.2.1 DSL
Digital Subscriber Line (DSL) technology is an always-on connection technology that uses
existing twisted-pair telephone lines to transport high-bandwidth data, and provides IP services to
subscribers. A DSL modem converts an Ethernet signal from the user device to a DSL signal,
which is transmitted to the central office.
Multiple DSL subscriber lines are multiplexed into a single high-capacity link using a DSL access
multiplexer (DSLAM) at the provider location. DSLAMs incorporate TDM technology to
aggregate many subscriber lines into a single medium, generally a T3 (DS3) connection. Current
DSL technologies use sophisticated coding and modulation techniques to achieve fast data rates.
There is a wide variety of DSL types, standards, and emerging standards. DSL is now a popular
choice for enterprise IT departments to support home workers. Generally, a subscriber cannot
choose to connect to an enterprise network directly, but must first connect to an ISP, and then an
IP connection is made through the Internet to the enterprise. Security risks are incurred in this
process, but can be mediated with security measures. The topology in figure below displays a
sample DSL WAN connection.
Figure 30: Sample DSL Topology
4.2.2 Cable
Coaxial cable is widely used in urban areas to distribute television signals. Network access is
available from many cable television providers. This allows for greater bandwidth than the
conventional telephone local loop.
Cable modems provide an always-on connection and a simple installation. A subscriber connects
a computer or LAN router to the cable modem, which translates the digital signals into the
broadband frequencies used for transmitting on a cable television network. The local cable TV
office, which is called the cable headend, contains the computer system and databases needed to
provide Internet access. The most important component located at the headend is the cable modem
termination system (CMTS), which sends and receives digital cable modem signals on a cable
network and is necessary for providing Internet services to cable subscribers.
Cable modem subscribers must use the ISP associated with the service provider. All the local
subscribers share the same cable bandwidth. As more users join the service, available bandwidth
may be below the expected rate. The topology in figure below displays a sample cable WAN
connection.
Wireless technology uses the unlicensed radio spectrum to send and receive data. The unlicensed
spectrum is accessible to anyone who has a wireless router and wireless technology in the device
they are using. Until recently, one limitation of wireless access has been the need to be within the
local transmission range (typically less than 100 feet) of a wireless router or a wireless modem that
has a wired connection to the Internet. The following new developments in broadband wireless
technology are changing this situation:
Municipal Wi-Fi: Many cities have begun setting up municipal wireless networks. Some
of these networks provide high-speed Internet access for free or for substantially less than
the price of other broadband services. Others are for city use only, allowing police and fire
departments and other city employees to do certain aspects of their jobs remotely. To
connect to a municipal Wi-Fi, a subscriber typically needs a wireless modem, which
provides a stronger radio and directional antenna than conventional wireless adapters. Most
service providers provide the necessary equipment for free or for a fee, much like they do
with DSL or cable modems.
WiMAX: Worldwide Interoperability for Microwave Access (WiMAX) is a new
technology that is just beginning to come into use. It is described in the IEEE standard
802.16. WiMAX provides high-speed broadband service with wireless access and provides
broad coverage like a cell phone network rather than through small Wi-Fi hotspots.
WiMAX operates in a similar way to Wi-Fi, but at higher speeds, over greater distances,
and for a greater number of users. It uses a network of WiMAX towers that are similar to
cell phone towers. To access a WiMAX network, subscribers must subscribe to an ISP with
a WiMAX tower within 30 miles of their location. They also need some type of WiMAX
receiver and a special encryption code to get access to the base station.
Satellite Internet: Typically used by rural users where cable and DSL are not available. A
VSAT provides two-way (upload and download) data communications. The upload speed
is about one-tenth of the 500 Kbps download speed. Cable and DSL have higher download
speeds, but satellite systems are about 10 times faster than an analog modem. To access
satellite Internet services, subscribers need a satellite dish, two modems (uplink and
downlink), and coaxial cables between the dish and the modem. The figure below displays
an example of a WiMAX network.
Increasingly, cellular service is another wireless WAN technology being used to connect users and
remote locations where no other WAN access technology is available. Many users with
smartphones and tablets can use cellular data to email, surf the Web, download apps, and watch
videos.
Phones, tablet computers, laptops, and even some routers can communicate through to the Internet
using cellular technology. As shown in figure below, these devices use radio waves to
communicate through a nearby mobile phone tower.
The device has a small radio antenna, and the provider has a much larger antenna sitting at the top
of a tower somewhere within miles of the phone.
Security risks are incurred when a teleworker or a remote office worker uses broadband services
to access the corporate WAN over the Internet. To address security concerns, broadband services
provide capabilities for using Virtual Private Network (VPN) connections to a VPN server, which
is typically located at the corporate site.
A VPN is an encrypted connection between private networks over a public network, such as the
Internet. Instead of using a dedicated Layer 2 connection, such as a leased line, a VPN uses virtual
connections called VPN tunnels, which are routed through the Internet from the private network
of the company to the remote site or employee host.
Site-to-site VPNs: Site-to-site VPNs connect entire networks to each other; for example,
they can connect a branch office network to a company headquarters network, as shown
in the figure below. Each site is equipped with a VPN gateway, such as a router, firewall,
VPN concentrator, or security appliance. In the figure, a remote branch office uses a site-
to-site-VPN to connect with the corporate head office.
*****************WEEK FIVE***************
Network design starts with identifying business and technical requirements and continues until
just before the network implementation stage (when you actually do the work to deploy and
configure what was designed). Network design includes things like network analysis, IP
addressing, hardware selection, and implementation planning.
In simple networks, like those found in most homes and small offices, network design is a
straightforward process. In large enterprise networks, the network design process is often very
complex and involves multiple stakeholders.
One of the most popular network lifecycle models is Cisco’s PPDIOO (Prepare, Plan, Design,
Implement, Operate and Optimize) model:
Prepare. This is where you define high-level requirements and strategy. For example, your
deliverables from this phase may include requirements documentation and current state
surveys.
Plan. This stage deals with specific network requirements based on information gathered
in the planning stages.
Design. During the design stage, the information gathered from the previous two stages is
used to create a detailed network design.
Implement. This is where the work gets done to configure and deploy the network
infrastructure. There is often testing to validate the design in this phase.
Operate. This is the portion of the lifecycle where the network is in production use. During
this stage, monitoring is an important part of validating that the network is working as
designed and being able to quickly address issues when it isn’t.
Optimize. At some point in most networks’ lifecycle, tweaks and optimizations are
needed. This is the stage where those changes are identified. For major changes, the cycle
begins again to plan and implement them.
Other network lifecycle models include Cisco’s PBM (plan, build, manage) and
the NDLC (network development life cycle). Regardless of which model you choose, the general
steps as information gathering, design, implementation, and improvement and cyclical nature are
the same. The important takeaway is understanding any network lifecycle and where network
design fits in.
Business requirements help define what you need to do. That means things like:
Once you’ve detailed the business requirements, it’s time to move on to the technical/functional
requirements. Example requirements include:
Bandwidth
Security requirements
Specific protocols the project must implement
RTO/RPO (recovery time objective/recovery point objective) numbers
Uptime SLAs (service level agreements)
When you create your requirements, don’t overlook constraints. For example, business
requirements will have a budget constraint. Technical requirements may have constraints such as
the need to continue supporting legacy apps.
Whatever the state of the network is, it’s important you know early in the design process. You
need to assess the network’s current state before you make any specific design recommendations.
At the end of this step, you should understand the network layout, performance, data flows,
applications & services on the network, network security, and physical and logical layout.
When it comes to physical network design you’ll need to address things like:
IP addressing/subnetting
VLANs
Data flows
Network topology
At the end of this step, you should be able to create a static map of the physical and logical
network you’re designing.
Before we move on to the next step, let’s take a look at two key network design concepts:
hierarchical network layers and top-down vs bottom-up design.
Hierarchical network design: What are core, distribution, and access layers?
A traditional hierarchical network design is based on the idea of three basic network layers. Each
layer handles a separate portion of the dataflows on a network. Those layers are:
Core layer. This is the layer that routes traffic between different geographical sites. In
other words, it’s the network backbone. The core layer is where high-throughput,
expensive core routers shine.
Distribution layer. The distribution layer sits between the core and access layers. It acts
as a boundary and implements network policies to restrict or allow data flows between
different subnets within the network. Less expensive routers and L3 switches are the
common workhorses of the distribution layer.
Access layer. The access layer is the layer for endpoint devices like user PCs, printers, and
VoIP phones. Smaller “access switches” are responsible for switching packets and routing
traffic at this layer.
In some cases, you may not need all three of these layers. For example, many networks bypass the
distribution layer altogether.
Top-down is generally considered a better approach when you start with business requirements
and work your way down. However, top-down is also often more time-consuming. Bottom-up
network design starts with the physical aspect of the network and works upwards.
As a result, bottom-up can be quicker but can often lead to missed requirements or compromises
on desired outcomes, as designing a network from the bottom up locks you into certain outcomes
before you get to the application layer where users get work done.
During this stage, you’ll choose specific cables, racks, network devices, servers, applications,
cloud services, etc. to make your design a reality. For custom parts or large orders, keep in mind
potential supply-chain issues. If you can’t get your structured cabling or access switches in time,
you can slow down project completion.
Treat security requirements with just as much priority as performance requirements and spec them
into a project early on. Ideally, we should all have a “security is everyone’s responsibility” mindset,
but in practice that isn’t always the case. It’s usually a great idea to have a security-focused
stakeholder(s) involved in the project end-to-end.
However, there are many network design projects where the resource and time investment in going
top-down just doesn’t make sense. For example, if you’re already familiar with an organization’s
overall business requirements and simply need to expand a network or increase bandwidth,
bottom-up can be much more efficient.
3. Standardize everything
If it can be standardized, standardize it. It will make troubleshooting, patching, maintenance, and
asset management drastically easier in the long run.
Here are some examples of things you can and should standardize:
One answer is obvious: just build in additional bandwidth based on your expectations. However,
making sure the network is flexible and modular enough to easily accommodate expansion is
arguably more important. After all, you can’t know for certain what your requirements will be in
the future, but you can design with the idea you may need to extend the network in mind.
During the network design process, you’ll need to keep these requirements in mind to build a
compliant network.
Of course, resilience and redundancy come with a budgetary cost. Your network design will need
to balance resilience and redundancy against the expense. Reliably achieving five-nines (99.999%
uptime) is great if you can do it, but it ain’t cheap!
A good way to frame this tradeoff is: considering your cost of downtime (i.e. how many dollars
per minute/hour will you lose if the network goes down) and balancing that against your exposure
to downtime with your current redundancy plan.
Make sure your electrical panels and electrical outlets can accommodate your new
equipment.
Make sure to account for power-over-Ethernet (PoE) loads when sizing UPS (battery
backups) and other power equipment.
Make sure your server room cooling can handle the additional heat generated by your new
network gear or plan to invest in supplemental cooling.
There’s no one size fits all network design. With the right approach, however, you can create a
design that matches your business requirements. Of course, as network lifecycle models like
PPDIOO demonstrate, it doesn’t stop after the design stage!
*****************WEEK SIX***************
6.2 Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is
connected to sending end of the other and vice-versa.
If the hosts are connected point-to-point logically, then may have multiple intermediate devices.
But the end hosts are unaware of underlying network and see each other as if they are connected
directly.
Both ends of the shared channel have line terminator. The data is sent in only one direction and
as soon as it reaches the extreme end, the terminator removes the data from the line. The features
of Bus topology are as follows
o The bus topology is designed in such a way that all the stations are connected through a
single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly connected to
the backbone cable.
o When a node wants to send a message over the network, it puts a message over the network.
All the stations available in the network will receive the message whether it has been
addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other topologies.
o The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense Multiple
Access).
CSMA: It is a media access control used to control the data flow so that data integrity is
maintained, i.e., the packets do not get lost. There are two alternative ways of handling the
problems that occur when two nodes send the messages simultaneously.
o CSMA CD: CSMA CD (Collision detection) is an access method used to detect the
collision. Once the collision is detected, the sender will stop transmitting the data.
Therefore, it works on "recovery after the collision".
o CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the
collision by checking whether the transmission media is busy or not. If busy, then the
sender waits until the media becomes idle. This technique effectively reduces the
possibility of the collision. It does not work on "recovery after the collision".
Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a
point of failure. The features of Ring topology are as follows:
o Ring topology is like a bus topology, but with connected ends.
o The node that receives the message from the previous computer will retransmit to the next
node.
o The data flows in one direction, i.e., it is unidirectional.
o The data flows in a single loop continuously known as an endless loop.
o It has no terminated ends, i.e., each node is connected to other node and having no
termination point.
o The data in a ring topology flow in a clockwise direction.
o The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is passed from one
node to another node.
o Token: It is a frame that circulates around the network.
All neighboring hosts have point-to-point connection between them. Similar to the Bus topology,
if the root goes down, then the entire network suffers even though it is not the single point of
failure. Every connection serves as point of failure, failing of which divides the network into
unreachable segment. The features of Tree topology are as follows:
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with each
other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it forms
a parent-child hierarchy.
o Full Mesh Topology: In a full mesh topology, each computer is connected to all the
computers available in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain computers are
connected to those computers with which they communicate frequently.
o Reliable: The mesh topology networks are very reliable as if any link breakdown will not
affect the communication between connected computers.
o Fast Communication: Communication is very fast between the nodes.
o Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
Each link in daisy chain topology represents single point of failure. Every link failure splits the
network into two segments. Every intermediate host works as relay for its immediate hosts.
*********************WEEK SEVEN**********************
Optical fibre is rapidly replacing copper wires in telephone lines, internet communication and even
cable TV connections because transmitted data can travel very long distances without
weakening. Single node fibre optic cable can have maximum segment length of 2 kms and
bandwidth of up to 100 Mbps. Multi-node fibre optic cable can have maximum segment length of
100 kms and bandwidth up to 2 Gbps.
7.5.1 Advantages of Optical Fibre
Optical fibre is fast replacing copper wires because of these advantages that it offers −
High bandwidth
Immune to electromagnetic interference
Suitable for industrial and noisy areas
Signals carrying data can travel long distances without weakening
7.6 Infrared
Low frequency infrared waves are used for very short distance communication like TV remote,
wireless speakers, automatic doors, hand held devices etc. Infrared signals can propagate within a
room but cannot penetrate walls. However, due to such short range, it is considered to be one of
the most secure transmission modes.
Barrel connectors that are used to connect STP or UTP cables are known as Ethernet LAN
jointers or couplers. The following image shows Ethernet LAN jointers or couplers.
Barrel connectors do not amplify the signals. It means, after joining, the total cable length must
not exceed the maximum supporting length of the cable. For example, a standard UTP cable
supports a maximum distance of 100 meters. You can join two UTP cables if their sum is not more
than 100. For example, you can join the following cables.
Cable 1 (45 meters) + cable 2 (30 meters) = joint cable (75 meters = 45 meters + 30 meters)
Cable 1 (65 meters) + cable 2 (45 meters) = joint cable (110 meters = 65 meters + 45 meters)
8.3 F connectors
An F connector is used to attach a coaxial cable to a device. F connectors are mostly used to install
home appliances such as dish TV, cable internet, CCTV camera, etc. The following image shows
F connectors.
One of the most popular uses of a DB-9 connector is to connect the serial port on a computer with
an external modem.
8.9 Universal serial bus (USB) connectors
USB connectors are the most popular. They support 127 devices in the series. All modern
computers have USB ports. Most devices that you can connect to the system have USB ports.
Some examples of devices that support or have USB ports are mice, printers, network cards, digital
cameras, keyboards, scanners, mobile phones, and flash drives.
If the device has a USB port, you can use a cable that has a USB connector on both ends to connect
the device to the computer. If the device does not have a USB port, you can still connect the device
to the USB port. For that, you can use a cable that has a USB connector on one side and the
corresponding connector on the other.
8.10 Fiber cable connectors
A variety of connectors are used to connect fiber cables. Some popular connectors are ST, SC, LC,
and MTRJ. Let's discuss these connectors.
8.10.1 SC connectors
SC connectors are also known as subscriber connectors, standard connectors, or square
connectors. An SC connector connects to a terminating device by pushing the connector into the
terminating device, and it can be removed by pulling the connector from the terminating device. It
uses a push-pull connector similar to audio and video plugs and sockets.
8.10.3 LC connectors
LC connectors are known as Lucent Connectors. For a secure connection, they have a flange on
top, similar to an RJ-45 connector. An LC connector connects to a terminating device by pushing
the connector into the terminating device, and it can be removed by pressing the tab on the
connector and pulling it out of the terminating device.
8.10.4 MTRJ connectors
An MTRJ connector connects to a terminating device by pushing the connector into the
terminating device, and it can be removed by pulling the connector from the terminating device. It
includes two fiber strands: a transmit strand and a receive strand in a single connector.
************************WEEK NINE***********************
9.2 Advantages
The advantages of client server network are as follows:
It is very secure.
Gives better performance.
It has centralized backup.
It is very reliable.
9.3 Disadvantages
The disadvantages of client server network are as follows −
The main objective of a computer network is to be able to transfer the data from sender to receiver.
This task can be done by breaking it into small sub tasks, each of which are
well defined. Each subtask will have its own process or processes to do and will take specific
inputs and give specific outputs to the subtask before or after it. In more technical terms we can
call these sub tasks as layers. In general, every task or job can be done by dividing it into sub task
or layers. Consider the example of sending a letter where the sender is in City A and receiver is in
city B.
In the Figure we have a sender, a receiver, and a carrier that transports the letter. There is a
hierarchy of tasks.
On the Way
The letter is then on its way to the recipient. On the way to the recipient's local post office,
the letter may actually go through a central office. In addition, it may be transported by
truck, train, airplane, boat, or a combination of these.
Hierarchy
According to our analysis, there are three different activities at the sender site and another three
activities at the receiver site. The task of transporting the letter between the sender and the receiver
is done by the carrier. Something that is not obvious immediately is that the tasks must be done in
the order given in the hierarchy. At the sender site, the letter must be written and dropped in the
mailbox before being picked up by the letter carrier and delivered to the post office. At the receiver
site, the letter must be dropped in the recipient mailbox before being picked up and read by the
recipient.
Services
Each layer at the sending site uses the services of the layer immediately below it. The sender at
the higher layer uses the services of the middle layer. The middle layer uses the services of the
lower layer. The lower layer uses the services of the carrier. The layered model that dominated
data communications and networking literature before 1990 was the Open Systems
Interconnection (OSI) model. Everyone believed that the OSI model would become the ultimate
standard for data communications, but this did not happen. The TCPIIP protocol suite became the
dominant commercial architecture because it was used and tested extensively in the Internet; the
OSI model was never fully implemented.
The ISO Established in 1947, the International Standards Organization (ISO) is a multinational
body dedicated to worldwide agreement on international standards. An ISO standard that covers
all aspects of network communications is the Open Systems Interconnection model. It was first
introduced in the late 1970s. An open system is a set of protocols that allows any two different
systems to communicate regardless of their underlying architecture. The purpose of the OSI model
is to show how to facilitate communication between different systems without requiring changes
to the logic of the underlying hardware and software. The OSI model is not a protocol; it is a model
for understanding and designing a network architecture that is flexible, robust, and interoperable.
ISO is the organization. OSI is the model.
The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems. It consists of seven separate but related
layers, each of which defines a part of the process of moving information across a network. An
understanding of the fundamentals of the OSI model provides a solid basis for exploring data
communications
Peer-to-Peer Processes
At the physical layer, communication is direct: In the Figure device A sends a stream
of bits to device B (through intermediate nodes). At the higher layers, however, communication
must move down through the layers on device A, over to device B, and then back up through the
layers. Each layer in the sending device adds its own information to the message it receives from
the layer just above it and passes the whole package to the layer just below it.
At layer I the entire package is converted to a form that can be transmitted to the receiving device.
At the receiving machine, the message is unwrapped layer by layer, with each process receiving
and removing the data meant for it. For example, layer 2 removes the data meant for it, then passes
the rest to layer 3. Layer 3 then removes the data meant for it and passes the rest to layer 4, and so
on.
In this type of transmission, the receiving device sends an acknowledgement, back to the
source after a packet or group of packet is received. This type of transmission is reliable and
secure.
2. Connection less service: It is a one-phase process and includes Data Transfer. In this type of
transmission, the receiver does not acknowledge receipt of a packet. This approach allows for
much faster communication between devices. Connection-oriented service is more reliable
than connectionless Service.
3. Data in the Transport Layer is called as Segments. Transport layer is operated by the Operating
System. It is a part of the OS and communicates with the Application Layer by making system
calls. Transport Layer is called as Heart of OSI model.
SCENARIO:
Let’s consider a scenario where a user wants to send a message through some Messenger
application running in his browser. The “Messenger” here acts as the application layer which
provides the user with an interface to create the data. This message or so-called Data is compressed,
encrypted (if any secure data) and converted into bits (0’s and 1’s) so that it can be transmitted.
TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is specifically designed as
a model to offer highly reliable and end-to-end byte stream over an unreliable internetwork.
A layer should only be created where the definite levels of abstraction are needed.
The function of each layer should be selected as per the internationally standardized
protocols.
The number of layers should be large so that separate functions should not be put in the
same layer. At the same time, it should be small enough so that architecture doesn’t
become very complicated.
In the OSI model, each layer relies on the next lower layer to perform primitive
functions. Every level should able to provide services to the next higher layer.
Changes made in one layer should not need changes in other lavers.
Another similarity is that the upper layer for each model is the application layer, which performs
the same tasks in each model but may vary according to the information each receives. The
functions performed in each model are also similar because each uses a network and transport
layer to operate. The OSI and TCP/IP model are mostly used to transmit data packets, although
they each use different means and paths to reach their destinations.
Additional similarities between the OSI and TCP/IP models include the following:
Differences between the OSI and TCP/IP models include the following:
OSI uses three layers -- application, presentation and session to define the functionality of
upper layers, while TCP/IP uses only the application layer.
OSI uses two separate layers -- physical and data-link -- to define the functionality of the
bottom layers, while TCP/IP uses only the link layer.
OSI uses the network layer to define the routing standards and protocols, while TCP/IP uses
the internet layer.
********************WEEK TWELVE***********************
Here a server sends packets which are entertained by more than one servers. Every network has
one IP address reserved for the Network Number which represents the network and one IP address
reserved for the Broadcast Address, which represents all the hosts in that network.
A single IP address can contain information about the network and its sub-network and ultimately
the host. This scheme enables the IP Address to be hierarchical where a network can have many
sub-networks which in turn can have many hosts.
12.3.1 Subnet Mask
The 32-bit IP address contains information about the host and its network. It is very necessary to
distinguish both. For this, routers use Subnet Mask, which is as long as the size of the network
address in the IP address. Subnet Mask is also 32 bits long. If the IP address in binary is ANDed
with its Subnet Mask, the result yields the Network address. For example, say the IP Address is
192.168.1.152 and the Subnet Mask is 255.255.255.0 then −
This way the Subnet Mask helps extract the Network ID and the Host from an IP Address. It can
be identified now that 192.168.1.0 is the Network number and 192.168.1.152 is the host on that
network.
12.3.2 Binary Representation
The positional value method is the simplest form of converting binary from decimal value. IP
address is 32 bit value which is divided into 4 octets. A binary octet contains 8 bits and the value
of each bit can be determined by the position of bit value '1' in the octet.
Positional value of bits is determined by 2 raised to power (position – 1), that is the value of a bit
1 at position 6 is 2^(6-1) that is 2^5 that is 32. The total value of the octet is determined by adding
up the positional value of bits. The value of 11000000 is 128+64 = 192. Some examples are shown
in the table below −
12.4 Internet Protocol Version 4 (IPv4)
Internet Protocol is one of the major protocols in the TCP/IP protocols suite. This protocol works
at the network layer of the OSI model and at the Internet layer of the TCP/IP model. Thus this
protocol has the responsibility of identifying hosts based upon their logical addresses and to route
data among them over the underlying network.
IP provides a mechanism to uniquely identify hosts by an IP addressing scheme. IP uses best effort
delivery, i.e. it does not guarantee that packets would be delivered to the destined host, but it will
do its best to reach the destination. Internet Protocol version 4 uses 32-bit logical address.
The encapsulated data is referred to as IP Payload. IP header contains all the necessary information
to deliver the packet at the other end.
IP header includes many relevant information including Version Number, which, in this context,
is 4. Other details are as follows −
Version − Version no. of Internet Protocol used (e.g. IPv4).
IHL − Internet Header Length; Length of entire IP header.
DSCP − Differentiated Services Code Point; this is Type of Service.
ECN − Explicit Congestion Notification; It carries information about the congestion seen
in the route.
Total Length − Length of entire IP Packet (including IP header and IP Payload).
Identification − If IP packet is fragmented during the transmission, all the fragments
contain same identification number. to identify original IP packet they belong to.
Flags − As required by the network resources, if IP Packet is too large to handle, these
‘flags’ tells if they can be fragmented or not. In this 3-bit flag, the MSB is always set to ‘0’.
Fragment Offset − This offset tells the exact position of the fragment in the original IP
Packet.
Time to Live − To avoid looping in the network, every packet is sent with some TTL value
set, which tells the network how many routers (hops) this packet can cross. At each hop, its
value is decremented by one and when the value reaches zero, the packet is discarded.
Protocol − Tells the Network layer at the destination host, to which Protocol this packet
belongs to, i.e. the next level Protocol. For example protocol number of ICMP is 1, TCP is
6 and UDP is 17.
Header Checksum − This field is used to keep checksum value of entire header which is
then used to check if the packet is received error-free.
Source Address − 32-bit address of the Sender (or source) of the packet.
Destination Address − 32-bit address of the Receiver (or destination) of the packet.
Options − This is optional field, which is used if the value of IHL is greater than 5. These
options may contain values for options such as Security, Record Route, Time Stamp, etc.
12.6 IP packet
IP (Internet Protocol) is a network layer protocol that has to do with routing. It is used to make
sure packets arrive at the correct destination. Packets are sometimes defined by the protocol they
are using. A packet with an IP header can be referred to as an "IP packet." An IP header contains
important information about where a packet is from (its source IP address), where it is going
(destination IP address), how large the packet is, and how long network routers should continue to
forward the packet before dropping it. It may also indicate whether or not the packet can be
fragmented, and include information about reassembling fragmented packets.
"Datagram" is a segment of data sent over a packet-switched network. A datagram contains enough
information to be routed from its source to its destination. By this definition, an IP packet is one
example of a datagram. Essentially, datagram is an alternative term for "packet."
12.7 IP Address
An IP address is a numerical label assigned to the devices connected to a computer network that
uses the IP for communication. IP address act as an identifier for a specific machine on a particular
network. It also helps you to develop a virtual connection between a destination and a source. The
IP address is also called IP number or internet address. It helps you to specify the technical format
of the addressing and packets scheme. Most networks combine TCP with IP. An IP address
consists of four numbers, each number contains one to three digits, with a single dot (.) separates
each number or set of digits.
IP Address is divided into two parts:
Prefix: The prefix part of IP address identifies the physical network to which the computer
is attached. . Prefix is also known as a network address.
Suffix: The suffix part identifies the individual computer on the network. The suffix is also
called the host address.
IPv4 is a connectionless protocol used for packet-switched networks. It operates on a best effort
delivery model, in which neither delivery is guaranteed, nor proper sequencing or avoidance of
duplicate delivery is assured. Internet Protocol Version 4 (IPv4) is the fourth revision of the
Internet Protocol and a widely used protocol in data communication over different kinds of
networks. IPv4 is a connectionless protocol used in packet-switched layer networks, such as
Ethernet. It provides a logical connection between network devices by providing identification
for each device. There are many ways to configure IPv4 with all kinds of devices – including
manual and automatic configurations – depending on the network type.
IPv4 is defined and specified in IETF publication RFC 791. IPv4 uses 32-bit addresses for
Ethernet communication in five classes: A, B, C, D and E. Classes A, B and C have a different
bit length for addressing the network host. Class D addresses are reserved for military purposes,
while class E addresses are reserved for future use.
IPv4 uses 32-bit (4 byte) addressing, which gives 2 32 addresses. IPv4 addresses are written in
the dot-decimal notation, which comprises of four octets of the address expressed individually
in decimal and separated by periods, for instance, 192.168.1.5.
12.8 IP Header Classes:
Max
Address Subnet Example Leading
Class number of Application
Range masking IP bits
networks
Used for large
IP Class A 1 to 126 255.0.0.0 1.1.1.1 8 128
number of hosts.
Used for medium
IP Class B 128 to 191 255.255.0.0 128.1.1.1 16 16384
size network.
Used for local
IP Class C 192 to 223 255.255.255.0 192.1.11. 24 2097157
area network.
Reserve for multi-
IP Class D 224 to 239 NA NA NA NA
tasking.
This class is
reserved for
IP Class E 240 to 254 NA NA NA NA research and
Development
Purposes.
Connectionless Protocol
Allow creating a simple virtual communication layer over diversified devices
It requires less memory, and ease of remembering addresses
Already supported protocol by millions of devices
Offers video libraries and conferences
********************WEEK THIRTEEN***********************
13. 1 IPv6
IP v6 was developed by Internet Engineering Task Force (IETF) to deal with the problem of IP v4
exhaustion. IP v6 is a 128-bits address having an address space of 2^128, which is way bigger than
IPv4. In IPv6 we use Colon-Hexa representation. There are 8 groups and each group represents 2
Bytes.
IPv6 (Internet Protocol Version 6) is a network layer protocol which allows communication and
data transfers to take place over the network. IPv6 came into existence in 1998 and was created
out of the concern that demand for IPv4 addresses would exceed availability. IPv6 protocol, which
is 128-bits, consists of eight numbered strings, each containing four characters, separated by colon.
This gives us an unbelievable amount of unique IP addresses. Despite these, IPv6 protocol also
simplifies address assignment (for computers) and provides additional security features. It greatly
solves network bottleneck caused by the soaring amount of Internet-connected devices.
IPv6 protocol is all about future-proofing, with which every current household could have trillions
of connected devices, each with their own individual IP addresses, and there would still be plenty
of IPv6 addresses to spare, without the need for NAT. Here are the pros and cons of IPv6.
Conversion: IPv4 is still widely used and the world is slow to convert to IPv6, the process
of making the switch to IPv6 from IPv4 is slow and tedious.
Communication: IPv4 and IPv6 machines cannot communicate directly to each other, in
the very rare circumstance that they would need to.
Readability: Understanding IPv6 subnetting can be difficult on its own, let alone trying to
remember/memorize your IPv6 address.
IPv4 vs IPv6
Basis for
IPv4 IPv6
differences
Size of IP address IPv4 is a 32-Bit IP Address. IPv6 is 128 Bit IP Address.
IPv6 is an alphanumeric address whose
Addressing IPv4 is a numeric address, and its
binary bits are separated by a colon (:). It
method binary bits are separated by a dot (.)
also contains hexadecimal.
Number of header
12 8
fields
Length of header
20 40
filed
Checksum Has checksum fields Does not have checksum fields
Example 12.244.233.165 2001:0db8:0000:0000:0000:ff00:0042:7879
Type of Addresses Unicast, broadcast, and multicast. Unicast, multicast, and anycast.
Basis for
IPv4 IPv6
differences
IPv4 offers five different classes of lPv6 allows storing an unlimited number of
Number of classes
IP Address. Class A to E. IP Address.
You have to configure a newly
In IPv6, the configuration is optional,
Configuration installed system before it can
depending upon on functions needed.
communicate with other systems.
IPv4 support VLSM (Variable
VLSM support IPv6 does not offer support for VLSM.
Length Subnet mask).
Fragmentation is done by sending
Fragmentation Fragmentation is done by the sender.
and forwarding routes.
Security is dependent on IPSec(Internet Protocol Security) is built
Security applications – IPv4 was not into the IPv6 protocol, usable with
designed with security in mind. a proper key infrastructure.
Packet size 576 bytes required,
Packet size 1208 bytes required without fragmentation
fragmentation optional
Packet Allows from routers and sending
Sending hosts only
fragmentation host
Does not identify packet flow for
Packet head contains Flow Label field that
Packet header QoS handling which includes
specifies packet flow for QoS handling
checksum options.
IPv4 and IPv6 cannot communicate with other but can exist together on the same network. This is
known as Dual Stack.
Sales 100
Purchase 50
Accounts 25
Management 5
Step - 3
Allocate the highest range of IPs to the highest requirement, so let's assign 192.168.1.0 /25
(255.255.255.128) to the Sales department. This IP subnet with Network number 192.168.1.0 has
126 valid Host IP addresses which satisfy the requirement of the Sales department. The subnet
mask used for this subnet has 10000000 as the last octet.
Step - 4
Allocate the next highest range, so let's assign 192.168.1.128 /26 (255.255.255.192) to the
Purchase department. This IP subnet with Network number 192.168.1.128 has 62 valid Host IP
Addresses which can be easily assigned to all the PCs of the Purchase department. The subnet
mask used has 11000000 in the last octet.
Step - 5
Allocate the next highest range, i.e. Accounts. The requirement of 25 IPs can be fulfilled with
192.168.1.192 /27 (255.255.255.224) IP subnet, which contains 30 valid host IPs. The network
number of Accounts department will be 192.168.1.192. The last octet of subnet mask is 11100000.
Step - 6
Allocate the next highest range to Management. The Management department contains only 5
computers. The subnet 192.168.1.224 /29 with the Mask 255.255.255.248 has exactly 6 valid host
IP addresses. So this can be assigned to Management. The last octet of the subnet mask will contain
11111000.
By using VLSM, the administrator can subnet the IP subnet in such a way that least number of IP
addresses are wasted. Even after assigning IPs to every department, the administrator, in this
example, is still left with plenty of IP addresses which was not possible if he has used CIDR.
This testing majorly involves User Interface, APIs, databases, security controls, client/server
application functionality of an application under test. Functional Testing is performed either
manually or can be automated.
When testing is done based on functional requirements, it contains all the functional
specifications that form the basis of tests to be conducted.
When testing is done based on scenarios, it contains information about the system of
how the business perspective will perceive it.
Testing and quality are major parts of the SDLC process, and we should be aware of all type of
testing even if we are not directly involved with the testing regularly. The scope of testing is wider
like an ocean, and a team of quality testers is required to give the right direction to an application.
13.10 Different Types of Functional Testing
Functional Testing can be divided into multiple categories based on the scenario, and most popular
ones are discussed below.
You may understand different types of functional testing with the help of this flow chart.
********************WEEK FORTEEN***********************
14.1 Internet
It is a worldwide/global system of interconnected computer networks. It uses the standard Internet
Protocol (TCP/IP). Every computer in Internet is identified by a unique IP address. IP Address is
a unique set of numbers (such as 110.22.33.114) which identifies a computer’s location.
A special computer DNS (Domain Name Server) is used to provide a name to the IP Address so
that the user can locate a computer by a name. For example, a DNS server will resolve a
name https://www.tutorialspoint.com to a particular IP address to uniquely identify the computer
on which this website is hosted.
14.2 Intranet
Intranet is the system in which multiple PCs are connected to each other. PCs in intranet are not
available to the world outside the intranet. Usually each organization has its own Intranet network
and members/employees of that organization can access the computers in their intranet.
Each computer in Intranet is also identified by an IP Address which is unique among the computers
in that Intranet.
Similarities between Internet and Intranet
Intranet uses the internet protocols such as TCP/IP and FTP.
Intranet sites are accessible via the web browser in a similar way as websites in the internet.
However, only members of Intranet network can access intranet hosted sites.
In Intranet, own instant messengers can be used as similar to yahoo messenger/gtalk over
the internet.
Differences between Internet and Intranet
Internet is general to PCs all over the world whereas Intranet is specific to few PCs.
Internet provides a wider and better access to websites to a large population, whereas
Intranet is restricted.
Internet is not as safe as Intranet. Intranet can be safely privatized as per the need.
The Internet is a global network of networks where computers communicate with each other via
Internet Protocol. Intranets, on the other hand, are private networks. Go through this article to find
out the other major differences between the Internet and an Intranet.
Users can access a huge variety of On an Intranet, users can have access
Data data on the Internet. Anyone with a to only limited data. Only members of
accessibility network connection can have access the organization with login credentials
to the Internet. can have access to an Intranet.
Key Internet Intranet
Access providers
They provide access to internet through telephone lines, cable wi-fi or fiber optics.
Mailbox Provider
Such providers offer mailbox hosting services.
Hosting ISPs
Hosting ISPs offers e-mail, and other web hosting services such as virtual machines, clouds etc.
Virtual ISPs
Such ISPs offer internet access via other ISP services.
Free ISPs
Free ISPs do not charge for internet services.
ISDN
ISDN is acronym of Integrated Services Digital Network. It establishes the connection using the
phone lines which carry digital signals instead of analog signals.
There are two techniques to deliver ISDN services:
1. Basic Rate Interface (BRI)
2. Primary Rate Interface (PRI)
Key points:
The BRI ISDN consists of three distinct channels on a single ISDN line: t1o 64kbps B
(Bearer) channel and one 16kbps D (Delta or Data) channels.
The PRI ISDN consists of 23 B channels and one D channels with both have operating
capacity of 64kbps individually making a total transmission rate of 1.54Mbps.
The following diagram shows accessing internet using ISDN connection:
DSL
DSL is acronym of Digital Subscriber Line. It is a form of broadband connection as it provides
connection over ordinary telephone lines. Following are the several versions of DSL technique
available today:
1. Asymmetric DSL (ADSL)
2. Symmetric DSL (SDSL)
3. High bit-rate DSL (HDSL)
4. Rate adaptive DSL (RDSL)
5. Very high bit-rate DSL (VDSL)
6. ISDN DSL (IDSL)
All of the above mentioned technologies differ in their upload and download speed, bit transfer
rate and level of service. The following diagram shows that how we can connect to internet using
DSL technology:
Cable TV Internet Connection
Cable TV Internet connection is provided through Cable TV lines. It uses coaxial cable which is
capable of transferring data at much higher speed than common telephone line.
Key Points:
A cable modem is used to access this service, provided by the cable operator.
The Cable modem comprises of two connections: one for internet service and other for
Cable TV signals.
Since Cable TV internet connections share a set amount of bandwidth with a group of
customers, therefore, data transfer rate also depends on number of customers using the
internet at the same time.
The following diagram shows that how internet is accessed using Cable TV connection:
********************WEEK FIFTEEN***********************
This is the situation, where the concept of wireless controller comes into play. It is the
"Mastermind" behind all the wireless network operation. This centralized server which has the IP
connectivity to all the AP's on the network making it easy to manage all of them globally from the
single management platform, push configuration templates, monitor users from all the AP's in real
time and so on.
SSID can have a length of up to 32 alphanumeric characters and uniquely identifies a particular
WLAN broadcasted by the AP. In case, when the AP has multiple SSIDs defined, it will then send
a separate beacon frame for each SSID.
Cell
A cell is basically a geographical region covered by the AP's or BTS's antenna (transmitter). In the
following image, a cell is marked with a yellow line.
Most often, an AP has much more output power, when compared it with the capabilities of the
antenna built-in into the client device. The fact that, the client can receive frames transmitted from
the AP, does not mean that a 2-way communication can be established. The above picture perfectly
shows that situation. - In both situations, a client can hear AP's frames, but only in the second
situation, the 2-way communication can be established.
The outcome from this short example is that, when designing the wireless cell sizes, one has to
take into account, what is the average output transmitting power of the antennas that clients will
use.
Channel
Wireless Networks may be configured to support multiple 802.11 standards. Some of them operate
on the 2.4GHz band (example are: 802.11b/g/n) and other ones on the 5GHz band (example:
802.11a/n/ac).
Depending on the band, there is a predefined set of sub-bands defined for each channel. In
environments with multiple APs placed in the same physical area, the smart channel assignment
is used in order to avoid collisions (collisions of the frames transmitted on exactly the same
frequency from multiple sources at the same time).
Let's have a look at the theoretical design of the 802.11b network with 3 cells, adjacent to each
other as shown in the above picture. Design on the left is composed of 3 non-overlapping channels
- it means that frames sent by APs and its clients in particular cell, will not interfere with
communication in other cells. On the right, we have a completely opposite situation, all the frames
flying around on the same channel leads to collisions and degrade the wireless performance
significantly.
Antennas
Antennas are used to "translate" information flowing as an electrical signal inside the cable and
into the electromagnetic field, which is used to transmit the frame over a wireless medium.
Every wireless device (either AP or any type of wireless client device) has an antenna that includes
a transmitter and the receiver module. It can be external and visible to everyone around or built-
in, as most of the laptops or smartphones nowadays have.
For wireless security testing or penetration tests of the wireless networks, external antenna is one
of the most important tools. You should get one of them, if you want to go into this field! One of
the biggest advantages of external antennas (comparing to most of the internal antennas you might
meet built-in to the equipment), is that they can be configured in a so-called "monitor mode" - this
is definitely something you need! It allows you to sniff the wireless traffic from your PC
using wireshark or other well-known tools like Kismet.
FDMA allots a different sub-band of frequency to each different user to access the
network.
If FDMA is not in use, the channel is left idle instead of allotting to the other users.
FDMA is implemented in Narrowband systems and it is less complex than TDMA.
Tight filtering is done here to reduce adjacent channel interference.
The base station BS and mobile station MS, transmit and receive simultaneously and
continuously in FDMA.
15.5.2 Time Division Multiple Access (TDMA)
In the cases where continuous transmission is not required, there TDMA is used instead of FDMA.
The features of TDMA include the following.
TDMA shares a single carrier frequency with several users where each users makes use of
non-overlapping time slots.
Data transmission in TDMA is not continuous, but occurs in bursts. Hence handsoff
process is simpler.
TDMA uses different time slots for transmission and reception thus duplexers are not
required.
TDMA has an advantage that is possible to allocate different numbers of time slots per
frame to different users.
Bandwidth can be supplied on demand to different users by concatenating or reassigning
time slot based on priority.
15.5.3 Code Division Multiple Access (CDMA)
Code division multiple access technique is an example of multiple access where several
transmitters use a single channel to send information simultaneously. Its features are as follows.
In CDMA every user uses the full available spectrum instead of getting allotted by
separate frequency.
CDMA is much recommended for voice and data communications.
While multiple codes occupy the same channel in CDMA, the users having same code can
communicate with each other.
CDMA offers more air-space capacity than TDMA.
The hands-off between base stations is very well handled by CDMA.
15.5.4 Space Division Multiple Access (SDMA)
Space division multiple access or spatial division multiple access is a technique which is MIMO
(multiple-input multiple-output) architecture and used mostly in wireless and satellite
communication. It has the following features.
All users can communicate at the same time using the same channel.
SDMA is completely free from interference.
A single satellite can communicate with more satellites receivers of the same frequency.
The directional spot-beam antennas are used and hence the base station in SDMA, can
track a moving user.
Controls the radiated energy for each user in space.
15.5.5 Spread Spectrum Multiple Access
Spread spectrum multiple access (SSMA) uses signals which have a transmission bandwidth
whose magnitude is greater than the minimum required RF bandwidth.
There are two main types of spread spectrum multiple access techniques −
Web filtering
Screening of Web sites or pages
E-mail filtering
Screening of e-mail for spam
Other objectionable content
15.7.4 Intrusion Detection Systems
Intrusion Detection Systems, also known as Intrusion Detection and Prevention Systems, are the
appliances that monitor malicious activities in a network, log information about such activities,
take steps to stop them, and finally report them.
Intrusion detection systems help in sending an alarm against any malicious activity in the network,
drop the packets, and reset the connection to save the IP address from any blockage. Intrusion
detection systems can also perform the following actions −
Efficiency