Network Essentials
Network Essentials
N+
Network Essentials
An Introduction to Networking
Network Essentials
Introducing Networks
Network Topologies
Network Essentials
Network Topologies
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Cellular Topology
Network Categories
Network Essentials
Network Categories
Peer-to-Peer Networks
Client
Server
Network interface card (NIC)
NOS
Connectivity device
Network Essentials
UNIX
LINUX
Types of Network
Network Essentials
Types of Network
Node1
Node 2 Node 3
Transmission Basics
Network Essentials
Transmission Direction
Bandwidth
The greater the capacity, the more likely that greater performance
will follow, though overall performance also depends on other
factors, such as latency.
Latency
Throughput
Baseband
Broadband
Attenuation
Transmission Media
Network Essentials
Transmission Media
Cables
Coaxial Cables
Fiber-optic
Types of Fiber-optic
Wireless Transmission
Connectors
&
Media Converters
Network Essentials
MTRJ
SC
ST
Network Essentials
Media Converters
Media converters are simple networking devices that
make it possible to connect two dissimilar media types
such as twisted pair with fiber optic cabling.
Network Essentials
Note:
OSI layers
Network Essentials
Physical layer
Network Essentials
Note:
Note:
Hop-to-hop delivery
Network Essentials
Network layer
Network Essentials
Note:
Source-to-destination delivery
Network Essentials
Transport layer
Network Essentials
Note:
Session layer
Network Essentials
Note:
Presentation layer
Network Essentials
Note:
Application layer
Network Essentials
Note:
Summary of layers
Network Essentials
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
Communication
Host A Host B
7 Application Application
6 Presentation Presentation
5 Session Session
Data Encapsulation
Host A Host B
Application Application
Presentation
Session
Transport
} { Data Presentation
Session
Transport
Network Network
Physical Physical
Network Essentials
Presentation
Session
Transport
} { Data
Network Data
Header
Presentation
Session
Transport
Network Network
Physical Physical
Network Essentials
Presentation
Session
Transport
} { Data
Network Data
Header
Presentation
Session
Transport
Network Network
Physical Physical
Network Essentials
Presentation
Session
Transport
} { Data
Network Data
Header
Presentation
Session
Transport
Network Network
Physical Physical
0101101010110001
Network Essentials
Host Layers
}
7 Application
6 Presentation Host layers: Provide accurate
data delivery between computers.
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Network Essentials
Media Layers
}
7 Application
6 Presentation Host layers: Provide accurate
5 Session
data delivery between computers.
4 Transport
}
3 Network
Media layers: Control physical
delivery of messages over the
2 Data Link
network.
1 Physical
Network Essentials
Physical Layer
24 bits 24 bits
0000.0c12. 3456
ROM
RAM
Network Layer
Which
Which Path?
Path?
Network Essentials
Transport Layer
Sender Receiver
Synchronize
Negotiate Connection
Synchronize
Acknowledge
Connection Established
Data Transfer
(Send Segments)
Network Essentials
Transmit
Sender Receiver
Buffer Full
Not Ready
Stop Process
Segments
Go Ready
Buffer OK
Resume Transmission
Network Essentials
• Window Size = 1
Send 1 Receive 1
Ack 2
Sender Send 2 Receive 2 Receiver
Ack 3
• Window Size = 3
Send 1 Receive 1
Send 2 Receive 2
Sender
Send 3 Receive 3 Receiver
Ack 4
Send 4
Network Essentials
Sender Receiver
1 2 3 4 5 6 7 1 2 3 4 5 6 7
Send 1
Send 2
Send 3
Ack 4
Send 4
Send 5
Send 6
Ack 5
Send 5
Ack 7
Network Essentials
End-to-End Segments
Routed Packets
Network Essentials
Session Layer
Service Request
Service Reply
Network Essentials
Presentation Layer
Provides code formatting and conversion for applications.
• Text • Graphics
• Data • Visual images
ASCII PICT
login:
EBCDIC TIFF
Encrypted JPEG
• Sound GIF
MIDI
• Video
MPEG
QuickTime
Network Essentials
Application Layer
COMPUTER
APPLICATIONS NETWORK
Word Processor APPLICATIONS INTERNETWORK
Presentation Graphics Electronic Mail APPLICATIONS
Spreadsheet File Transfer Electronic Data Interchange
Database Remote Access World Wide Web
Design/Manufacturing Client-Server Process E-Mail Gateways
Others Network Management Special-Interest Bulletin Boards
Others Financial Transaction Services
Internet Navigation Utilities
Conferencing (Voice, Video, Data)
Others
Network Essentials
Summary
What is Protocol?
Introduction to TCP/IP
(DoD Model)
Network Essentials
Application Layer
This layer says to the upper layer, “Just give me your data
stream, with any instructions, and I’ll begin the process of getting
your information ready to send.”
Network Essentials
Internet Layer
It includes the LAN and WAN technology details, and all the details
contained in the OSI physical and data link layers.
Network Essentials
Note:
Stream delivery
Network Essentials
Control field
Network Essentials
Description of flags
Network Essentials
A TCP Connection
TCP is connection-oriented.
Note:
Note:
Data transfer
Network Essentials
Example 1
Suppose a TCP connection is transferring a file of 5000 bytes.
The first byte is numbered 10001. What are the sequence
numbers for each segment if data is sent in five segments, each
carrying 1000 bytes?
Solution
The following shows the sequence number for each segment:
Segment 1 ➡ Sequence Number: 10,001 (range: 10,001 to 11,000)
Segment 2 ➡ Sequence Number: 11,001 (range: 11,001 to 12,000)
Segment 3 ➡ Sequence Number: 12,001 (range: 12,001 to 13,000)
Segment 4 ➡ Sequence Number: 13,001 (range: 13,001 to 14,000)
Segment 5 ➡ Sequence Number: 14,001 (range: 14,001 to 15,000)
Network Essentials
Aborting a connection
Network Essentials
Denying a connection
Network Essentials
Error Control
Note:
Note:
In modern implementations, a
retransmission occurs if the
retransmission timer expires.
Network Essentials
Note:
Normal operation
Network Essentials
Lost segment
Network Essentials
Note:
Fast retransmission
Network Essentials
Lost acknowledgment
Network Essentials
Note:
Note:
State Transition
Addresses in TCP/IP
Addresses in TCP/IP
Port Numbers
TCP and the upper layers don’t use MAC and IP addresses to
understand the sending host’s address as the Data Link and
Network layer protocols do. Instead, they use port numbers.
TCP and UDP must use port numbers to communicate with the
upper layers because they’re what keep track of different
applications' conversations crossing the network simultaneously.
Example 1
Example 2
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
Example 3
Example 3 (Continued)
Example 5
Example 5 (Continued)
88 Kerberos Authentication
110 POP3 Receiving Mails
123 Network Time Protocol Synchronize Time
Registered Ports
Port No TCP UDP Protocol / Application Comment
1293 IPSec (Internet Protocol Encrypting IP Packets
Security)
1503 Windows Live Messenger Chat Messenger
Socket
Multicast: These are packets sent from a single source host and
transmitted to many devices on different networks.
Broadcasts (layer 3): These are sent to all hosts on the network.
Broadcast Domain
ARP operation
Each host checks the request against it’s IP address the right
one responds.
Note:
RARP finds the IP address for a machine that only knows its
MAC address.
ICMP In Action
When Host A sends a packet destined for Host B, the Lab_B router
will send an ICMP destination unreachable message back to the
sending device (Host A in this example).
HTTP
FTP
TFTP
TELNET
SSH
DNS
SMTP
POP
IMAP
TELNET
DNS (Continued)
FQDN
Country Domains
Example 3
In Linux and Windows, the nslookup utility can be used to
retrieve address/name mapping. The following shows how we
can retrieve an address when the domain name is given.
$ nslookup india.com
Name: india.com
Address: 153.18.8.1
Note:
Most e-mail systems that send mail over the Internet use SMTP
to send messages from one server to another; the messages
can then be retrieved with an e-mail client using either POP or
IMAP.
Note:
Email address
SMTP range
LAN Technologies
LAN Technologies
Ethernet
Token Ring
FDDI
Ethernet
Ethernet layers
Ethernet frame
Collision
Collision Domain
Ethernet Operation
A B C D
Collision
A B C D
Ethernet Communication
CSMA/CD
CSMA/CD Process
Effects of Collisions
800 Mb
400 Mb
– Network protocols
20%
– Network operating systems
– Network applications
80%
– Network management Workgroup
Token Ring
FDDI (Continued)
There are two pieces of fiber that carry data in opposite directions.
FDDI (Continued)
If one ring breaks, any device can switch data from one ring to
the other.
Networking Devices
Network Devices
Repeaters
Hubs
Bridges
Switches
Routers
CSU/DSU
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
NIC Card
1 Physical Hub
Repeater
Repeater
Note:
Note:
Note:
Function of a repeater
Hub
A hub is a device that receives a signal on one port and
retransmits it on one or more other ports.
Hub In Action
Hub
Hub
Hub (Continued)
Hub
Hub
Node A
Collision
Voltage Suge
3. The collision results in a voltage
surge as the two transmission
interfere with one another. The
voltage surge must arrive before node
A finishes transmitting its frame.
Bridge
Bridge
Note:
Note:
Learning bridge
Switches
Switches are intelligent network devices that provide universal
connectivity.
Switches
Switches are multiport bridges.
Switches (Continued)
Collision
Repeater
Switch
Components of Switch
Ports
Ports on a single switch can have different speeds or use different
media.
Frame buffers
Frames may be stored temporarily for various reasons in memory called
frame buffers.
Backplane bus
The circuitry that connects line cards and ports.
Switching Fabric
Transfers data from port to port.
Switch Operation
Backplane
Ports
Functions of Switch
Address Learning
Switches examine the source MAC address of each frame and build a
MAC address table (CAM) so they can forward frames correctly.
Address Learning
Source: AB Destination: FC
Source: AF Destination: AB
Broadcast
Forwarded out every port except the one it arrived on.
Acts like a layer 1 repeater.
Unicast
If the destination address is in the CAM then.
If the address is on a different port than the one the frame arrived on, the
frame is forwarded out the correct port.
If the destination address is not in the CAM then the frame is treated like
a broadcast.
Yes
Filter Frame
Copyright © UTL Technologies Ltd 2013 All rights reserved
Network Essentials
Source: AF Destination: AB
Server
Repeater
Switch
The host network card and the switch port must be capable of operating
in full-duplex mode.
Routers
Routers are layer 3 network devices that provide connectivity
between WANs and LANs, between networks with different
topologies, or between networks using different network
standards.
Routers (Continued)
Packet Switching
Best Path Determination
Packet Filtering
Internetwork Communications
Note:
A router is a three-layer
(physical, data link, and network)
device.
Note:
Note:
CSU / DSU
The Channel Service Unit / Digital Service Unit (CSU/DSU) is a
hardware device that connects a leased line to a user’s hardware
device.
IP Addressing:
Classful Addressing
Two devices on the Internet can never have the same address.
They are unique in the sense that each address defines one, and
only one, connection to the Internet.
Each octet constitutes 8 bits, where each bit can either have a
binary value of 1 or 0, as shown in the following figure.
IPv4 Address
Note:
Note:
Note:
Dotted-decimal notation
Example 1
Change the following IP addresses from binary notation to
dotted-decimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 11100111 11011011 10001011 01101111
d. 11111001 10011011 11111011 00001111
Solution
We replace each group of 8 bits with its equivalent decimal
number (see Appendix B) and add dots for separation:
a. 129.11.11.239 b. 193.131.27.255
c. 231.219.139.111 d. 249.155.251.15
Example 2
Solution
We replace each decimal number with its binary equivalent:
a. 01101111 00111000 00101101 01001110
b. 11011101 00100010 00000111 01010010
c. 11110001 00001000 00111000 00001100
d. 01001011 00101101 00100010 01001110
Example 3
Solution
a. There are no leading zeroes in dotted-decimal notation (045).
b. We may not have more than four numbers in an IP address.
c. In dotted-decimal notation, each number is less than or equal
to 255; 301 is outside this range.
d. A mixture of binary notation and dotted-decimal notation is
not allowed.
Copyright © UTL Technologies Ltd 2013 All rights reserved
Network Essentials
Example 4
Change the following IP addresses from binary notation to
hexadecimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
Solution
We replace each group of 4 bits with its hexadecimal
equivalent (see Appendix B). Note that hexadecimal notation
normally has no added spaces or dots; however, 0X (or 0x) is
added at the beginning or the subscript 16 at the end to show
that the number is in hexadecimal.
a. 0X810B0BEF or 810B0BEF16
b. 0XC1831BFF or C1831BFF16
Copyright © UTL Technologies Ltd 2013 All rights reserved
Network Essentials
Classful IP Addressing
Example 5
Solution
In class A, only 1 bit defines the class. The remaining 31 bits are
available for the address. With 31 bits, we can have 231
or 2,147,483,648 addresses.
Example 6
Solution
See the procedure in Figure 4.4.
a. The first bit is 0. This is a class A address.
b. The first 2 bits are 1; the third bit is 0. This is a class C
address.
c. The first bit is 0; the second bit is 1. This is a class B address.
d. The first 4 bits are 1s. This is a class E address..
Copyright © UTL Technologies Ltd 2013 All rights reserved
Network Essentials
Example 7
Solution
a. The first byte is 227 (between 224 and 239); the class is D.
b. The first byte is 193 (between 192 and 223); the class is C.
c. The first byte is 14 (between 0 and 127); the class is A.
d. The first byte is 252 (between 240 and 255); the class is E.
e. The first byte is 134 (between 128 and 191); the class is B.
Example 8
Example 8 (continued)
If we subtract the first from the last and add 1 to the result
(remember we always add 1 to get the range), we get
2,147,483,648 or 231.
Note:
Note:
Note:
Note:
Note:
Note:
Example 9
Given the network address 17.0.0.0, find the class, the block,
and the range of the addresses.
Solution
The class is A because the first byte is between 0 and 127. The
block has a netid of 17. The addresses range from 17.0.0.0 to
17.255.255.255.
Example 10
Given the network address 132.21.0.0, find the class, the block,
and the range of the addresses.
Solution
The class is B because the first byte is between 128 and 191.
The block has a netid of 132.21. The addresses range from
132.21.0.0 to 132.21.255.255.
Example 11
Solution
The class is C because the first byte is between 192 and 223.
The block has a netid of 220.34.76. The addresses range from
220.34.76.0 to 220.34.76.255.
Default masks
Note:
Example 12
Solution
The default mask is 255.0.0.0, which means that only the first
byte is preserved and the other 3 bytes are set to 0s. The
network address is 23.0.0.0.
Example 13
Solution
The default mask is 255.255.0.0, which means that the first 2
bytes are preserved and the other 2 bytes are set to 0s. The
network address is 132.6.0.0.
Example 14
Solution
The default mask is 255.255.255.0, which means that the first 3
bytes are preserved and the last byte is set to 0. The network
address is 201.180.56.0.
Note:
Special addresses
Reserved IP Addresses
What is Subnet?
A sub network or a subnet is a logical division of a large network
into smaller networks, as shown in the following figure:
Subnets on a Network
Example 15
Solution
We apply the AND operation on the address and the subnet
mask.
Note:
In subnetting, we need the first address
of the subnet and the subnet mask to
define the range of addresses.
TCP/IP comes with complete set of utilities that can help to track
down most TCP/IP-related problems.
385
Copyright © UTL Technologies Ltd 2013 All rights reserved
Network Essentials
Ping
386
Copyright © UTL Technologies Ltd 2013 All rights reserved
Network Essentials
Netstat
387
Copyright © UTL Technologies Ltd 2013 All rights reserved
Network Essentials
Traceroute (Tracert)
Data packets sent between the two systems may take different
paths.
Traceroute is a tool that allows you to trace the path between two
systems.
388
Copyright © UTL Technologies Ltd 2013 All rights reserved
Network Essentials
Each router reduces the TTL value of the packet by 1 hence; it has
now become a Hop Counter.
389
Copyright © UTL Technologies Ltd 2013 All rights reserved
Network Essentials
390
Copyright © UTL Technologies Ltd 2013 All rights reserved
Network Essentials
WHOIS
391
Copyright © UTL Technologies Ltd 2013 All rights reserved