ITPC 105 Module 2
ITPC 105 Module 2
Module II
2
MODULE II
Introduction
This module covers in depth discussion of Network architecture, standards and
protocols. It covers discussion of main type of network architecture, the different
network protocols, the OSI model and different network topologies.
In the network architecture, you will learn the main types of network
architecture including its features.
In Network protocol, you will learn how network protocols work. An in-depth
discussion of the classification of network protocols.
In this module, you will also learn the different network topologies including
its features, advantages and disadvantages.
OBJECTIVES
There are four lessons in the module. Read each lesson carefully then answer
the exercises/activities to find out how much you have benefited from it. Work on
these exercises carefully and submit your output to your instructor.
In case you encounter difficulty, discuss this with your instructor during the
face-to-face meeting or contact your tutor at CIT office.
Module II
3
Lesson 1
Network Architecture
Network Architecture
1. Peer-to-Peer (P2P)
Module II
4
2. Client/Server
• A single server hosting all the required data in a single place facilitates
easy protection of data and management of user authorization and
authentication.
• Resources such as network segments, servers, and computers can be
added to a client-server network without any significant interruptions.
Module II
5
• Data can be accessed efficiently without requiring clients and the server
to be in close proximity.
• All nodes in the client-server system are independent, requesting data
only from the server, which facilitates easy upgrades, replacements, and
relocation of the nodes.
• Data that is transferred through client-server protocols are platform-
agnostic.
Lesson 2
Network Protocols
Network Protocols
Network protocols are a set of rules, conventions, and data structures that
dictate how devices exchange data across networks. In other words, network
protocols can be equated to languages that two devices must understand for seamless
Module II
6
The seven layers in the OSI model can be divided into two groups: upper layers,
including layers 7, 6, and 5, and lower layers, including layers 4, 3, 2, and 1. The
upper layers deal with application issues, and the lower layers deal with data
transport issues.
Module II
7
Network protocols divide the communication process into discrete tasks across
every layer of the OSI model. One or more network protocols operate at each layer in
the communication exchange.
Now that you know how the OSI model works, you can dive straight into the
classification of protocols. The following are some of the most prominent protocols
used in network communication.
• Tracking internet activity becomes tedious, as the same device can have
multiple IP addresses over a period of time.
• Computers with DHCP cannot be used as servers, as their IPs change
over time.
2. DNS: Domain Name System protocol
The DNS protocol helps in translating or mapping host names to IP addresses.
DNS works on a client-server model, and uses a distributed database over a hierarchy
of name servers.
Advantages
Module II
8
Advantages
• Enables sharing large files and multiple directories at the same time.
• Lets you resume file sharing if it was interrupted.
• Lets you recover lost data, and schedule a file transfer.
Disadvantages
HTTP is a stateless protocol, meaning the client and server are only aware of
each other while the connection between them is intact. After that, both the client
and server forget about each other's existence. Due to this phenomenon, the client
and server can't both retain information between requests.
Advantages
• Memory usage and CPU usage are low because of lesser concurrent
connections.
• Errors can be reported without closing connections.
• Owing to lesser TCP connections, network congestion is reduced.
Module II
9
Disadvantages
Advantages
• As the emails are stored on the mail server, local storage utilization is
minimal.
• In case of accidental deletion of emails or data, it is always possible to
retrieve them as they are stored on the mail server.
Disadvantages
Advantages
• If the local device on which the emails were downloaded crashes or gets
stolen, the emails are lost.
7. SMTP: Simple Mail Transfer Protocol
SMTP is a protocol designed to transfer electronic mail reliably and efficiently.
SMTP is a push protocol and is used to send the email, whereas POP and IMAP are used
to retrieve emails on the end user's side. SMTP transfers emails between systems, and
Module II
10
notifies on incoming emails. Using SMTP, a client can transfer an email to another
client on the same network or another network through a relay or gateway access
available to both networks.
Advantages
• Ease of installation.
• Connects to any system without any restriction.
• It doesn't need any development from your side.
Disadvantages
Advantages
The SNMP agent resides on the managed device. The agent is a software module
that has local knowledge of management information, and translates that information
into a form compatible with the SNMP manager. The SNMP manager presents the data
obtained from the SNMP agent, helping network admins manage nodes effectively.
Module II
11
Currently, there are three versions of SNMP: SNMP v1, SNMP v2, and SNMP v3.
Both versions 1 and 2 have many features in common, but SNMP v2 offers
enhancements such as additional protocol operations. SNMP version 3 (SNMP v3) adds
security and remote configuration capabilities to the previous versions.
Advantages
Module II
12
Advantages
• TCP ensures three things: data reaches the destination, reaches it on time, and
reaches it without duplication.
• TCP automatically breaks data into packets before transmission.
Disadvantages
• TCP cannot be used for broadcast and multicast connections.
2. UDP: User Datagram Protocol
UDP is a connection-less transport layer protocol that provides a simple but
unreliable message service. Unlike TCP, UDP adds no reliability, flow control, or error
recovery functions. UDP is useful in situations where the reliability mechanisms of
TCP are not necessary. Retransmission of lost data packets isn't possible with UDP.
Advantages
• In UDP, it's possible that a packet may not be delivered, be delivered twice, or
not be delivered at all.
• Manual disintegration of data packets is needed.
Advantages
Module II
13
network. IPv6 was created to deal with IPv4 exhaustion. It increases the IP address
size from 32 bits to 128 bits to support more levels of addressing.
Advantages
Advantages
Advantages
• MAC addresses need not be known or memorized, as the ARP cache contains all
the MAC addresses and maps them automatically with IPs.
Disadvantages
Module II
14
Advantages
• SLIP doesn't support automatic setup of network connections in multiple OSI layers at
the same time.
• SLIP does not support synchronous connections, such as a connection created through
the internet from a modem to an internet service provider (ISP).
• As you may now be aware, switching fits into the OSI model at Layer 2. With switching
and bridging happening at Layer 2, they deal with the MAC address information found
in the Ethernet frames. If you go down to Layer 1, a device such as a repeater or hub
simply takes the electrical impulse on the wire and amplifies the signal. A switch, on
the other hand, reads the Ethernet frame into memory, reconstructs it, and
retransmits it out of the destination port (or all ports, in the case of a broadcast
frame).
Module II
15
Lesson 3
Network Protocols
Network Topology
Bus Topology
A bus topology orients all the devices on a network along a single cable running
in a single direction from one end of the network to the other—which is why it’s
sometimes called a “line topology” or “backbone topology.” Data flow on the network
also follows the route of the cable, moving in one direction.
Module II
16
Ring topology is where nodes are arranged in a circle (or ring). The data can
travel through the ring network in either one direction or both directions, with each
device having exactly two neighbors.
Module II
17
Module II
18
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
Partial Mesh Topology : In this topology some of the systems are connected in the
same fashion as mesh topology but some devices are only connected to two or three
devices.
Full Mesh Topology : Each and every nodes or devices are connected to each other.
• Fully connected.
• Robust.
• Not flexible
Module II
19
It has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the hierarchy.
HYBRID Topology
Module II
20
Lesson 4
Switching and the OSI Model
Module II
21
The Open Systems Interconnection (OSI) Reference Model provides a layered network
design framework that establishes a standard so that devices from different vendors
work together.
Layer 2 switches operate using physical network addresses. Physical addresses, also
known as link-layer, hardware, or MAC-layer addresses, identify individual devices.
Most hardware devices are permanently assigned this number during the
manufacturing process.
Switches operating at Layer 2 are very fast because they’re just sorting physical
addresses, but they usually aren’t very smart.
With switching and bridging happening at Layer 2, they deal with the MAC address
information found in the Ethernet frames. If you go down to Layer 1, a device such as
a repeater or hub simply takes the electrical impulse on the wire and amplifies the
signal. A switch, on the other hand, reads the Ethernet frame into memory,
reconstructs it, and retransmits it out of the destination port (or all ports, in the case
of a broadcast frame).
Store-and-forward switching: A process by which the switch reads the entire Ethernet
frame into memory before examining it, at which time the switch will identify the
destination address and make a forwarding decision. This type of switching provides
two benefits: The switch is assured of a complete frame and no collision will occur on
the network before sending the data. The drawback is a slight delay on forwarding of
the data.
Depending on the type of frame and the use of Access Control Lists (ACLs), a total of
54 bytes of data can be read. This condition can significantly reduce the delay in
forwarding data to its destination, because without the store-and-forward delay, you
can approach true wire speed. The problem occurs when you experience a collision
on your network for a data frame that is partially forwarded, making the work done
forwarding the frame useless.
Module II
22
This issue is mitigated on networks that are entirely switched because collisions will
occur only when you have two or more devices connected with a hub that is then
connected to a port on a switch. By eliminating hubs on your network, you eliminate
collisions.
On a fully switched network, this process does not provide a benefit over cut-through
switching. However, if the chance for collisions is high, this process is preferable to
cut-through switching because it prevents forwarding frames that are less than the
minimum Ethernet size. (These illegally sized frames are called runts.)
Both switching methods that forward data before the entire frame is read into the
switch have a critical flaw when dealing with the integrity of the Ethernet frame. The
last piece of data is the FCS, or Frame CheckSum, which is used to verify that the
Ethernet frame that has arrived at the switch has not been altered or changed through
a network error.
Because the switch has not read the entire frame, the switch is not able to calculate
a checksum or compare it to the FCS found at the end of the frame. Frames with a
failed checksum should not be forwarded; but in this case, most of the switch has
already been forwarded by the time the switch knows the checksum is wrong.
Because of the speed of the current switches, you will likely find that most switches
on the market, like Cisco’s switches, use the store-and-forward method of passing
data because the new speeds of moving data internally in the switch outweigh the
cost of forwarding bad data.sss
Layer 3 switches use network or IP addresses that identify locations on the network.
Physical addresses identify devices; network addresses identify locations. A location
can be a LAN workstation, a location in a computer’s memory, or even a packet of
data traveling through a network.
Network addresses are hierarchical. The more details included, the more specific the
address becomes and the easier it is to find.
Switches operating at Layer 3 are smarter than Layer 2 devices and incorporate
routing functions to actively calculate the best way to send a packet to its destination.
However, because Layer 3 Switches take the extra time to read more details of a
network address, they are sometimes much slower than Layer 2 Switches.
Module II
23
packet and uses this information to hand off the packet to the appropriate higher-
layer software. Layer 4 switches make packet forwarding decisions based not only on
the MAC address and IP address, but also on the application a packet belongs to.
Because Layer 4 devices enable you to establish priorities for network traffic based
on application, you can assign a high priority to packets belonging to vital in-house
applications with different forwarding rules for low-priority packets, such as generic
HTTP-based Internet traffic.
Layer 4 switches also provide an effective wire-speed security shield for your network.
Module II