Computer-Networks IBDP
Computer-Networks IBDP
Through the use of the OSI layer model if any standards change then the rules set out can easily
be changed without having to rewrite the complete rule set.
Standards in the
construction of
networks- OSI -7
layers-open
system
interconnectivity
in a network
between sender
and reciever
Application Layer
Manipulation of data(information) in various ways is done in this
layer which enables user or software to get access to the
network. Services provided by this layer E-Mail, File transfer, ,
directory services, etc.It contains a variety of protocols that are
commonly needed by users. Examples of application layer
protocols: HTTP(HyperText Transfer Protocol)
File Transfer Protocol(FTP),
Trivial File Transfer Protocol(TFTP),
Simple Mail Transfer Protocol(SMTP),
TELNET- remote connection to server
Domain Name System(DNS) Internet's system for mapping
alphabetic names to numeric Internet Protocol (IP) addresses like a
phone book maps a person's name to a phone number
Session Layer -
Communication
The Session Layer allows users on different machines to establish
synchronization between active communication sessions between them.
Session layer manages and synchronize the conversation between two
different applications.
4.Error Control: Error Control is performed end to end in this layer to ensure
that the complete message arrives at the receiving transport layer without
any error. Error Correction is done through retransmission.
Network Layer
1.It translates logical network address into physical address. Concerned with
circuit, message or packet switching.
2.Routers and gateways operate in the network layer. Mechanism is provided
by Network Layer for routing the packets to final destination.
Routers in VLAN
topologies provide
broadcast filtering,
security, and
traffic flow
management.
VLAN introduction
VLANs address scalability, security, and network management.
Switches may not bridge any traffic between VLANs, as this would violate the integrity
of the VLAN broadcast domain.
Traffic should only be routed between VLANs.
A VLAN is a broadcast domain created by one or more switches.
All users
of the
same port
must be in
the same
VLAN.
Benefits of VLANs
The key benefit of VLANs is that they permit the network administrator to organize the LAN
logically instead of physically.
VLAN types
Port-based VLANs
MAC address based VLANs
Protocol based VLANs
VLAN types
The number of VLANs in a switch vary depending on several factors:
Traffic patterns
Types of applications
Network management needs
Group commonality
Vlan and subnet – How are they
different?
Whats subnetting?
The practice of dividing a network into two or more networks is called subnetting. Computers that
belong to the same subnet are addressed with an identical most-significant bit-group in their IP
addresses.
VLAN is a logical LAN that contains broadcasts within itself, and only hosts belonged to that VLAN will
see those broadcasts. Subnet is an IP address range of IP addresses that help hosts communicate
over layer 3. VLAN allows us to create different logical and physical networks.
Both deal with segmenting or partitioning a portion of the network.
However,
VLANs - data link layer (OSI layer 2) constructs,
Subnets - network layer (OSI layer 3) IP constructs,
and they address different issues on a network. Although it’s a common practice to create
a one-to-one relationship between a VLAN and subnet, the fact that they are independent
layer 2 and layer 3 constructs adds flexibility when designing a network.
Difference in hub, router and
switch
Difference in hub, router and switch,
repeater
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes
too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network. An important point to be
noted about repeaters is that they do no amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate it
at the original strength. It is a 2 port device.
2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in
star topology which connects different stations. Hubs cannot filter data, so data packets are sent to all connected devices. In other words,
collision domain of all hosts connected through Hub remains one. Also, they do not have intelligence to find out best path for data packets
which leads to inefficiencies and wastage. neither A hub is neither a collision domain separator nor a broadcast
domain separator. All the devices connected to a hub are in a single collision and single broadcast
domain. Remember, hubs do not segment a network, they just connect network segments.
3. Bridge – A bridge operates at data link layer. A bridge is a repeater, with add on functionality of filtering content by reading the MAC
addresses of source and destination. It is also used for interconnecting two LANs working on the same protocol. It has a single input and
single output port, thus making it a 2 port device.
4. Switch – A switch is a multi port bridge with a buffer and a design that can boost its efficiency(large number of ports imply less traffic) and
performance. Switch is data link layer device. Switch can perform error checking before forwarding data, that makes it very efficient as it does
not forward packets that have errors and forward good packets selectively to correct port only. In other words, switch divides collision
domain of hosts, but broadcast domain remains same. Every port on a switch is in a different collision domain, i.e a
switch is a collision domain separator. So messages that come from devices connected to different
ports never experience a collision. This helps us during designing networks but there is still a problem
with switches. They never break broadcast domains, which means it is not a broadcast domain
separator. All the ports on the switch are still in a single broadcast domain. If a device sends a
broadcast message, it will still cause congestion.
Difference in Bridge and Switch
Bridges and Switches are pretty similar, both operate at the
Data Link layer (Layer 2) and both can filter data so that only the
appropriate segment or host receives a transmission.
Both filter packets based on the physical address (MAC – Media Access
Control – address) of the sender/receiver although newer switches
sometimes include the capabilities of a router and can forward data based
on IP address (operating at the Network Layer) and are referred to as
IP Switches. So the modern IP switches operate on Network layer
and old switches on data link layer
Which is mor superior? Bridge or switch? Switch
Bridges extend the distance capabilities of the network & minimize overall
traffic, Switches give filtering capabilities to create multiple, smaller
virtual LAN’s out of one large LAN for easier management/administration
(VLAN’s).
5. Routers – A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs and
WANs together and have a dynamically updating routing table based on which they make
decisions on routing the data packets. Router divide broadcast domains of hosts connected
through it. This is a saviour!! like a switch it routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs and
WANs together and have a dynamically updating routing table based on which they make
decisions on routing the data packets. Router divide broadcast domains of hosts connected
through it.
15-32
Networking
Computer networks have opened up an entire frontier in the world of computing called the client/server
model
15-34
Types of Networks
Various configurations, called topologies, have been
used to administer LANs
◦ Ring topology A configuration that connects all nodes in
a closed loop on which messages travel in one direction
◦ Star topology A configuration that centers around one
node to which all others are connected and through which
all messages are sent
◦ Bus topology All nodes are connected to a single
communication line that carries messages in both
directions
15-35
Types of Networks
Wide-area network (WAN) A network that
connects two or more local-area networks
over a potentially large geographic distance
Often one particular node on a LAN is set up to
serve as a gateway to handle all communication
going between that LAN and other networks
Metropolitan-area network (MAN) The communication infrastructures that have been
developed in and around large cities
15-37
Internet Connections
There are various technologies available that you can use to
connect a home computer to the Internet
◦ A phone modem converts computer data into an analog audio
signal for transfer over a telephone line, and then a modem at the
destination converts it back again into data
◦ A digital subscriber line (DSL) uses regular copper phone lines to
transfer digital data to and from the phone company’s central
office
◦ A cable modem uses the same line that your cable TV signals come
in on to transfer the data back and forth
15-38
Internet Connections
Broadband A connection in which transfer speeds
are faster than 128 bits per second
◦ DSL connections and cable modems are broadband
connections
◦ The speed for downloads (getting data from the Internet
to your home computer) may not be the same as uploads
(sending data from your home computer to the Internet)
15-39
Packet Switching
To improve the efficiency of transferring information over a
shared communication line, messages are divided into fixed-sized,
numbered packets
Network devices called routers are used to direct packets
between networks
Figure 15.4
Messages
sent by
packet
switching
15-18
Open Systems
Proprietary system A system that uses
technologies kept private by a particular
commercial vendor
One system couldn’t communicate with another, leading
to the need for
Interoperability The ability of software and
hardware on multiple machines and from multiple
commercial vendors to communicate
Leading to
Open systems Systems based on a common model
of network architecture and a suite of protocols
used in its implementation
15-41
Open Systems
The International
Organization for
Standardization (ISO)
established the Open
Systems Interconnection
(OSI) Reference Model
Each layer deals with a
particular aspect of network
communication
Figure 15.5 The layers of the OSI Reference Model
15-42
Network Protocols
Network protocols are layered such that each one relies on the protocols that underlie it
Sometimes referred to as a protocol stack
15-43
TCP/IP
TCP stands for Transmission Control Protocol
TCP software breaks messages into packets, hands them off to the IP software for delivery, and then orders
and reassembles the packets at their destination
15-44
TCP/IP (cont.)
UDP stands for User Datagram Protocol
◦ It is an alternative to TCP
◦ The main difference is that TCP is highly reliable, at the cost of decreased performance, while UDP is less
reliable, but generally faster
15-45
High-Level Protocols
Other protocols build on the foundation established by the TCP/IP protocol suite
◦ Simple Mail Transfer Protocol (SMTP)
◦ File Transfer Protocol (FTP)
◦ Telnet
◦ Hyper Text Transfer Protocol (http)
15-46
Roles of a Computers and devices in a networked
world
Client: Piece of computer hardware/software that accesses services made available
by server, by sending requests to server
Server: Program/host computer that fulfils requests from client programs or
computers across network and shares info to clients
Email server: Message transfer agent that transfers electronic messages from one
computer to another in a network
DNS (Domain Name Server): Server that translates web addresses written in letters
(more memorable for humans) to the numeric IP (Internet Protocol) address
Router: Connects networks together to forward data packets between networks,
deciding where to send information so it is received by one network and then sent to
another until it reaches its destination
Firewall: Controls incoming and outgoing network traffic, determining what data
packets should be allowed through, based on a rule set. Needed to protect integrity of
client computer.
VPN-what is ? And types..
VPNs maintain the same security and management policies as a private network. They are the
most cost effective method of establishing a virtual point-to-point connection between remote
users and an enterprise customer's network. There are three main types of VPNs.
Access VPNs—Provide remote access to an enterprise customer's intranet or extranet over a
shared infrastructure using analog, dial, ISDN, digital subscriber line (DSL), mobile IP, and cable
technologies to securely connect mobile users, telecommuters, and branch offices.
Intranet VPNs—Intranet VPN differs from extranet VPNs in that they allow access only to the
enterprise customer's employees over a shared infrastructure using dedicated connections
Extranet VPNs— Extranet VPNs differ from intranet VPNs in that they allow access to users
outside the enterprise to an enterprise customer's network over a shared infrastructure
Types of VPNs –Remote and Site
2 Site
Remote Access VPN:
Purpose: secure connection and providing resources as if
users were onsite but actually are from remote location.
Users: Usually for small groups of users to work from home
or while travelling.
Connection type: The connection is initiated by the remote
user using VPN client software, which establishes an
encrypted tunnel to the VPN server located within the private
network.
Security: Encrypted traffic between the remote user and the
VPN server ensures confidentiality and data integrity.
Site to Site VPN:
Purpose: also known as a router-to-router VPN, connects entire
networks or multiple sites together over the internet securely. It allows
different physical locations to communicate with each other as if they
were part of the same private network. For examples all the Bata shoe
networks
Users: is for interconnecting networks rather than individual users using
routers or dedicated VPN appliances.
Connection type: The VPN tunnel is established between the routers or
VPN gateways at each location. The devices handle the encryption and
decryption of traffic between the sites.
Security: all traffic passing through the VPN tunnel is encrypted and
protected.
Identify the technologies
required to provide a VPN.
VPN tunneling involves establishing and maintaining a logical network connection (that may
contain intermediate hops). On this connection, packets constructed in a specific VPN protocol
format are encapsulated within some other base or carrier protocol, then transmitted between
VPN client and server, and finally de-encapsulated on the receiving side. Before setting up a VPN,
the type of network protocol has to be chosen. There are four to consider:
SSL (Secure Socket Layer) - For very small businesses, as the VPN is set up via an internet
browser.Unlike ipsec, it does not need to be installed on client computers- gives remote access
to users for client /server & web applications .
Open VPN – cheap-this VPN is based on open source SSL code and as its name suggests, the
code can be seen – and potentially hacked – by anyone.point 2 point or site 2 site connections
created.
PPTP (Point-to-Point Tunnelling Protocol) - This is the latest type of VPN- supported natively by
Windows, Mac OS X and mobile operating systems, which makes it ideal for BYOD in which
personal data devices need to be secured.
IPsec (Internet Protocol Security) and L2TP (Layer 2 Tunnelling Protocol) - These VPNs are more
secure than PPTP but are more complex to set up.l2tp does not encrypt data on vpn but l2tp
does. So to prevent hacking ipsec is implemented alongwith l2tp.
Difference in VPN and Extranet
VPN authenticates the sender before (establishing the tunnel).
VPN access is always encrypted, whereas extranet has limited encryption;
VPN transmission is always encrypted;
VPN users have access to everything whereas extranet users only have
access to (enabled) specific services
A network has limited bandwidth, in that only a certain number of bits can be push through it at any one time
without losing data.
To reduce the use of bandwidth in a network, and hence ensure that the network does not becomes
congested, redundancies in data can be removed. This process is called compression.
Lossy data compression: This type of compression removes the unnecessary data. It is mainly used in pictures,
example: conversion of a picture from GIF to JPEG and conversion of an audio file from WAV to MP3.You cant
get original file back.
Lossless data compression: This type of compression allows you to recreate the original file. It involves
breaking the original file into a smaller version while it is transmitted or stored in a way that when it reaches
its destiny it can be put back together and used as before. Example of lossless data compression is when you
zip an amount of files into a file (usually done with 7-zip).
ASN(Autonomous System
Numbers)
Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol
(IP) routing prefixes under the control of one or more network operators on behalf of a single
administrative entity or domain that presents a common, clearly defined routing policy to the
Internet.
Multiple organizations can run Border Gateway Protocol (BGP) using private AS numbers to an
ISP that connects all those organizations to the Internet. Even though there may be multiple
autonomous systems supported by the ISP, the Internet only sees the routing policy of the ISP.
That ISP must have an officially registered autonomous system number (ASN).
A unique ASN is allocated to each AS for use in BGP routing. AS numbers are important because
the ASN uniquely identifies each network on the Internet.
Earlier AS numbers were defined as 16-bit integers. Now they are in 32 bits so this allows more
assignments.
Peer to peer network
• Megabits per second (Mbit/s or Mb/s.) are units of measurement for network
bandwidth. Each Mbps represents the capacity to transfer 1 million bits each
second.
Figure 15.9
An IP address is
stored in four
bytes
15-67
Domain Name System
15-68
Domain Name System
Figure 15.11
Some of the top-level domain
names based on country codes
15-69
Domain Name System
15-70
VLAN types
An important consideration in defining the size of the
switch and the number of VLANs is the IP addressing
scheme.
Because a one-to-one correspondence between
VLANs and IP subnets is strongly recommended,
there can be no more than 254 devices in any one
VLAN.
It is further recommended that VLANs should not
extend outside of the Layer 2 domain of the
distribution switch.
Virtual memory
Virtual memory
To expand memory usable by the CPU it is possible to use something called virtual memory
where the most important instructions for the program are stored in the RAM and the less
necessary information is stored in secondary memory (usally the HDD) and then the data is
switched between RAM and virtual memory as it is needed (to swap).
Advantages:
More memory to work with.
Disadvantages:
It is very slow compared to the primary memory
Thrashing can occur. Thrashing is a condition when there is too much data that needs to be
swapped between RAM and virtual memory, and the computer's response time is compromised
.The swapped files are called page files.