Professional Documents
Culture Documents
Introduction to Networking
Group of computers and associate peripherals connected by communication channels, which is used
to share resources and for communication.
A network consists of two or more computers that are linked in order to share resources (such as
printers and CD-ROMs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams. Today every business in the world from banking to airlines offices, corporate organizations,
postal services, universities and a even a home where there are two or more computers, need a
network to communicate with other people.
Advantages of Network.
Cost.
Network able versions of many popular software programs are available at considerable savings
when compared to buying individually licensed copies. Besides monetary savings, sharing a program
on a network allows for easier upgrading of the program. The changes have to be done only once, on
the file server, instead of on all the individual workstations.
Security.
Files and programs on a network can be designated as "copy inhibit," so that you do not have to
worry about illegal copying of programs. Also, passwords can be established for specific directories to
restrict access to authorized users.
Centralized Software Management.
One of the greatest benefits of installing a network at a school is the fact that all of the software can be
loaded on one computer (the file server). This eliminates that need to spend time and energy
installing updates and tracking files on independent computers throughout the building.
Resource Sharing.
Sharing resources is another area in which a network exceeds stand-alone computers. Most
companies cannot afford enough laser printers, fax machines, modems, scanners, and CD-ROM
S.Kishokumar B.Sc (EUSL), PG Dip in IT (UPDN), MBCS.
IDM Affiliated University College, Higher Studies Division, No: 11/7 Station Road, Batticaloa.
Networking Concepts
Speed.
Networks provide a very rapid method for sharing and transferring files. Without a network, files are
shared by copying them to floppy disks, then carrying or sending the disks from one computer to
another. This method of transferring files is very time-consuming.
players for each computer. However, if these or similar peripherals are added to a network, they can
be shared by many users.
Electronic Mail.
The presence of a network provides the hardware necessary to install an e-mail system. E-mail aids in
personal and professional communication for all school personnel, and it facilitates the dissemination
of general information to the entire school staff. Electronic mail on a LAN can enable students to
communicate with teachers and peers at their own institute. If the LAN is connected to the Internet,
students can communicate with others throughout the world.
Flexible Access.
Some networks allow students to access their files from computers throughout the institute. Students
can begin an assignment in their classroom, save part of it on a public access area of the network,
then go to the media center after school to finish their work. Students can also work cooperatively
through the network.
Workgroup Computing.
Workgroup software (such as Microsoft BackOffice) allows many users to work on a document or
project concurrently. For example, educators located at various locations within a county could
simultaneously contribute their ideas about new curriculum standards to the same document and
spreadsheets.
Disadvantages of Network
Expensive to Install.
Although a network will generally save money over time, the initial costs of installation can be
prohibitive. Cables, network cards, and software are expensive, and the installation may require the
services of a technician.
Requires Administrative Time.
Proper maintenance of a network requires considerable time and expertise. Many institute have
installed a network, only to find that they did not budget for the necessary administrative support.
Networking Concepts
Scope of Network
The scope of a network refers to its geographical size. It determined by the size of the organization or
the distance between users on the network.
The scope determines how the network is designed and what physical components are used in its
construction.
There are two general types of network scopes.
1. Local area networks (LANs)
2. Wide area networks (WANs)
Networking Concepts
Network Models:
Comparing Server-Based and Peer-to-Peer Configurations
PC networks generally fall within one of these two network types:
Server-based.
Peer-to-peer.
Server-Based Networking
The server-based network model is more efficient for all but the smallest networks because hardware
resources can be concentrated on relatively few highly-utilized network servers; client computers can
be designed with minimal hardware configurations. A basic network client machine, for instance,
might have a 486 processor and 8-16 megabytes of RAM. A typical server might have 32 megabytes of
RAM (or more) and many gigabytes of file storage capacity.
Peer-to-Peer Networking
In the peer-to-peer network environment, resources are distributed throughout the network on
computer systems that may act as both service requesters and service providers. In a peer-to-peer
network, the user of each PC is responsible for the administration and sharing of resources for his PC,
which is known as distributed or workgroup administration.
A peer-to-peer network sometimes is called a workgroup. Peer-to-peer networks are ideal for small
organizations (fewer than ten users) where security is not of concern. Peer-to-peer networks also
S.Kishokumar B.Sc (EUSL), PG Dip in IT (UPDN), MBCS.
IDM Affiliated University College, Higher Studies Division, No: 11/7 Station Road, Batticaloa.
Networking Concepts
In a server-based network environment, resources are located on a central server or group of servers.
A server is a computer that is specifically designated to provide services for the other computers on
the network. A network client is a computer that accesses the resources available on the server.
provide a decentralized alternative for situations in which server administration would be too large
or complex a task.
Because a peer-to-peer network does not attempt to centralize security, and because peer-to-peer
networks are generally much smaller and simpler than server-based networks, the software required
to operate a peer-to-peer network can be much simpler. Several desktop operating systems, including
the Microsoft operating systems Windows for Workgroups, Windows 95, and Windows NT
Workstation, come with built-in peer-to-peer networking functionality.
Log on to a network
Access shared resources
Access and participate in distributed applications
Other than that a network operating system will provide services like File Services, Printer Services,
fax Services, Application Services, Directory Services and etc.
1.
2.
3.
4.
Centralized computing.
Distributed computing.
Collaborative or cooperative computing.
S.Kishokumar B.Sc (EUSL), PG Dip in IT (UPDN), MBCS.
IDM Affiliated University College, Higher Studies Division, No: 11/7 Station Road, Batticaloa.
Networking Concepts
Centralized Computing
The earliest computer was large, expensive, and difficult to manage. Originally, these large mainframe
computers were not networked in the sense you are familiar with today. Jobs were entered into the
system by reading commands from card decks. The computer would execute one job at a time and
generate a printout when the job was complete.
Terminals, which came later, enabled users to interact with the centralized computer, but terminals
were merely input/output devices that had no independent processing power. All processing still
took place on the main frame, hence the name centralized computing. Networks, therefore, served
little purpose other than to deliver commands to and results from the powerful centralized
processing device.
Distributed Computing
As personal computers were introduced to organizations, a new model of distributed computing
emerged. Instead of concentrating computing to a central device, PCs made it possible to give each
worker an independent, individual computer. Each of these PCs can process and store data locally,
without assistance from another machine.
This meant that groups who previously had found the cost of a mainframe environment prohibitive
were able to gain the benefits of networking at a far reduced cost.
Under the distributed computing model, networking has evolved to enable the many distributed
computers to exchange data and share resources and services among themselves. Note that these
machines need not be considered equals. A Windows NT file server, for instance, is considered to be a
part of a distributed network. This server stores and retrieves files for other machines, but does not
do the thinking for these machines as a mainframe would have done in the centralized computing
model.
Collaborative Computing
Obviously, collaborative computing cannot take place without a network to enable the various
computers to communicate.
Collaborative computing is exemplified in Microsoft networks by server-based products such as
Exchange Server or SQL Server. With both of these products, requests originate from intelligent client
software (which uses the processor power of the workstation it is running on) but then are serviced
from server software running on an NT Server. The server processes the request using its own
resources and then passes the results back to the client. Processor and memory resources on both the
client and the server are utilized in the completion of the task.
In summary, collaborative computing involves the following:
Networking Concepts
Client (Workstation)
Client computers make requests for services or data on the network form computers referred to as
servers.
Servers
Servers are computers that provide services and data to client computers. In a complex network
several servers are been assigned specific servers.
Eg:- File and print servers, Application Servers, Fax Servers, Data Base Servers, Mail Servers.
File Services
File services enable networked computers to share files. This capability was one of the primary
reasons networking personal computers initially came about. File services include all network
functions centering on the storage, retrieval, or movement of data files. A common feature of file
services is access control and transaction logging.
File services enable users to read, write, and manage files and data, but they also should restrict users
to authorized file operations so that files arent accidentally overwritten or deleted.
Two types of servers exist:
1. Dedicated Servers.
2. Non Dedicated Servers.
Dedicated servers do nothing but fulfill requests to network clients. These are commonly found in
client server environments. Non Dedicated Servers do double duty by requesting and providing
services, and they are the backbone of the peer-to-peer structure.
i.
ii.
iii.
Central file servers can be managed more efficiently, with user and security data located in a
single database.
Central file servers can contain expensive, high-performance hardware that expedites file
services and makes the file servers more reliable.
The cost of specialized file server technology is shared by a large number of users. Centralized
networks are more reliable.
The following drawbacks, however, should be considered with regard to centralized file services:
When all data is stored on a single server, a single point of failure exists. If the server fails, all
data becomes unavailable, making proper design, management, and backup of the server
essential.
Because all clients contend for file services from a single source, average file access times
might be slower with a centralized file server than when file are stored on individual, local
drives.
Centralized file services generally are chosen for organizations that want to achieve the highest levels
of protection for their data files.
S.Kishokumar B.Sc (EUSL), PG Dip in IT (UPDN), MBCS.
IDM Affiliated University College, Higher Studies Division, No: 11/7 Station Road, Batticaloa.
Networking Concepts
File transfer
File storage
File migration
File archiving
File-update synchronization
File Transfer
Without a network, the options for transferring data between computers are limited. You can, of
course, exchange files on floppy disks. This process came to be called sneaker-net because it
consisted of networking by physically running around and hand-delivering floppy disks from desk to
desk. Otherwise, you can use communication software to dial another computer and transfer files via
a modem or a direct serial connection. With a network, users have constant access to high-speed data
transfer without leaving their desks or dialing anywhere. Moving a file is as easy as depositing it in a
shared directory.
When users transfer confidential files, the need for network security rises. You might need to limit file
transfers to authorized users who are using password-controlled security systems, to assign file
attributes that restrict the operations that may be performed with a file, or to encrypt files so they
may be read only by authorized users. Each of these options is possible with networking.
Another important file-management task of the NOS is to provide and regulate access to programs
and data stored on the file servers hard drive, which is known as file sharing.
File sharing is another main reason companies invest in a network. Companies save money by
purchasing a single network version of an application rather than many single-user versions. Placing
data files created by employees on a file server also serves several other purposes, such as security,
document control, and backup.
Most networks have some form of centralized file storage. For many years, companies have used the
online storage approach to file storage. In the online storage scenario, data is stored on hard disks
that are accessible on demand. The files that can be accessed on a server are limited to the amount of
available hard drive space. Hard drives are fast, but even with drive prices decreasing in recent years,
the cost to store a megabyte of data this way is still fairly high. Hard drives have another
disadvantage; that is, generally, they cannot be removed for off-site storage or exchange or simply to
build a library of files that are seldom required but must be fairly readily available.
Almost all companies have large amounts of infrequently used data. For example, there is usually no
need to keep all the financial reports from the previous year online. However, those reports must be
stored somewhere in case questions arise or an audit occurs.
Another common approach to file storage, therefore, is offline storage, which consists of removable
media that is managed manually. After data is written to a tape or optical disk, the storage medium
can be removed from the server and shelved. Users who require offline data might need to know
which tape or optical disk to request.
Some systems provide indexes or other aids that make requesting the proper offline storage element
automatic. A system operator still has to retrieve the tape or disk and mount it on the server,
however.
S.Kishokumar B.Sc (EUSL), PG Dip in IT (UPDN), MBCS.
IDM Affiliated University College, Higher Studies Division, No: 11/7 Station Road, Batticaloa.
Networking Concepts
File Storage
When the slow response of offline storage is unacceptable, a near-line storage approach may be
selected. Near-line storage employs a machine, often called a jukebox, to manage large numbers of
tapes or optical disks automatically. The proper tape or disk is retrieved and mounted by the jukebox
without human intervention. With near-line storage, huge amounts of data can be made available
with only slight delays, but at a much lower cost than would be required to store the data on hard
drives.
Data Migration
Data migration is a technology that automatically moves less-used data from online storage to nearline or offline storage. The criteria for moving files can depend on when the files were last used, the
owner of the files, file size, or a variety of other factors. An efficient data-migration facility makes
locating migrated files easier for users.
Data migration.
File Archiving
File archiving (also known as backup) is basically offline storage that is primarily geared to creating
duplicate copies of online files. These backup copies serve as insurance against minor or major
system failures by creating a redundant copy of important system and data files.
File-Update Synchronization
In its simplest form, file-update synchronization is a means of ensuring that all users have the latest
copy of a file. File-update synchronization services can manage files by monitoring the date and time
stamps on files to determine which files were saved most recently. By tracking the users who access
the file, along with the date and time stamps, the service can update all the copies of the file with the
most recent version.
File-update synchronization, however, can be considerably more involved. In a modern computing
environment, it is not always feasible for all users to access all files in real time. A salesman, for
example, might carry a notebook computer on which to enter orders. Dialing the central LAN every
time an order was to be entered would be impractical, so the salesman would enter orders offline
(while disconnected from the network) and store them in the laptop. That evening, he would call the
central LAN, log in, and transmit all the days orders at once.
Networking Concepts
Generally, network administrators enable file archiving from a centralized location. A single site, for
example, can back up all the servers on a network. Many current backup systems also offer the
capability to back up various client workstations, making it feasible to archive all files on the network
to a central facility, whether the files are located on network servers or clients. This archive then is
stored in a safe location, and a duplicate often is made and placed off the premises in case of disaster.
During this process, files on the LAN must be updated to reflect new data in the salesmans portable
computer. In addition, the salesmans PC might need to be updated, for example, with order
confirmations or new pricing information. The process of bringing the local and remote files into
agreement is also known as file-update synchronization.
File-update synchronization becomes considerably more challenging when additional users are
sharing data files simultaneously. Complex mechanisms must be in place to ensure that users do not
accidentally overwrite each others data. In some cases, the system simply flags files that have
multiple, conflicting updates and require a human to reconcile the differences. In Windows 95 and NT
4.0, the My Briefcase program provides this service.
Most PC networks, including Ethernet and Token Ring networks, use network adapter card. The
network adapter card is thus as essential part of networking, and an understanding of network
adapter cards is crucial for any networking professional.
Networking Concepts
As the data passes through the cable to the network adapter, it is formatted into Packets.
10
The physical topology of a network refers to the configuration of cables, computers, and other
peripherals. A topology basically defines how the network has to be designed and provides a
structure to the network.
Physical Topology, when in the context of networking, refers to the physical layout of the devices
connected to the network, including the location and cable installation.
The Logical Topology refers to the way it actually operates (transfers data), as opposed to its layout.
The five different kinds of topologies are
Bus
Ring
Star
Tree
Mesh
1.
Bus topology
A bus topology network is a network architecture in which a set of clients are connected via a shared
communications line, called a bus. The bus topology is often referred to as a "linear bus" because the
computers are connected in a straight line. This is the simplest and most common method of
networking computers.
Networking Concepts
Below figure shows a typical bus topology. It consists of a single cable called a trunk (also called a
backbone or segment) that connects all of the computers in the network in a single line.
Disadvantages
1. Difficult to administer/troubleshoot
S.Kishokumar B.Sc (EUSL), PG Dip in IT (UPDN), MBCS.
IDM Affiliated University College, Higher Studies Division, No: 11/7 Station Road, Batticaloa.
11
2.
3.
4.
5.
6.
2.
Ring topology
A ring network is a topology of computer networks where each node is connected to two other nodes,
so as to create a ring. The ring topology connects computers on a single circle of cable. Unlike the bus
topology, there are no terminated ends. The signals travel around the loop in one direction and pass
through each computer, which can act as a repeater to boost the signal and send it on to the next
computer. Following figure shows a typical ring topology with one server and four workstations. The
failure of one computer can have an impact on the entire network.
One method of transmitting data around a ring is called token passing. (A token is a special series of
bits that travels around a token-ring network. Each network has only one token.) The token is passed
from computer to computer until it gets to a computer that has data to send. Below figure shows a
token ring topology with the token. The sending computer modifies the token, puts an electronic
address on the data, and sends it around the ring.
Ring networks also carry the disadvantage that if one of the nodes in the network breaks down then
the entire network will break down with it as it requires a full circle in order to function.
Advantages
1. The transmission of data is relatively simple as packets travel in one direction only.
Disadvantages
1. Data packets must pass through every computer between the sender and recipient Therefore
this makes it slower.
2. If any of the nodes fail then the ring is broken and data cannot be transmitted successfully.
3. It is difficult to troubleshoot the ring.
3.
Star topology
Star networks are one of the most common computer network topologies. In its simplest form, a star
network consists of one central switch , hub or computer which acts as a router to transmit messages.
S.Kishokumar B.Sc (EUSL), PG Dip in IT (UPDN), MBCS.
IDM Affiliated University College, Higher Studies Division, No: 11/7 Station Road, Batticaloa.
12
Networking Concepts
In the star topology, cable segments from each computer are connected to a centralized component
called a hub or switch. Following figure shows four computers and a hub connected in a star topology.
Signals are transmitted from the sending computer through the hub to all computers on the network.
This topology originated in the early days of computing when computers were connected to a
centralized mainframe computer.
The star network offers the advantage of centralized resources and management. However, because
each computer is connected to a central point, this topology requires a great deal of cable in a large
network installation. Also, if the central point fails, the entire network goes down. If one computer or
the cable that connects it to the hub fails on a star network, only the failed computer will not be able
to send or receive network data. The rest of the network continues to function normally.
Disadvantages
1. Depending on the transmission media, length limitations may be imposed from the central
location used
2. Failure of the central node can disable the entire network
3. Limited cable length and number of stations
4.
Tree Topology
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of
star-configured workstations connected to a linear bus backbone cable. Tree topologies allow for the
expansion of an existing network, and enable schools to configure a network to meet their needs.
13
Networking Concepts
Disadvantages
1. Overall length of each segment is limited by the type of cabling used.
2. If the backbone line breaks, the entire segment goes down.
3. More difficult to configure and wire than other topologies.
5.
Mesh topology
Disadvantages
1. Requires more cable than the other LAN topologies.
2. Complicated implementation.
S.Kishokumar B.Sc (EUSL), PG Dip in IT (UPDN), MBCS.
IDM Affiliated University College, Higher Studies Division, No: 11/7 Station Road, Batticaloa.
14
Networking Concepts
A mesh topology network offers superior redundancy and reliability. In a mesh topology, each
computer is connected to every other computer by separate cabling. This configuration provides
redundant paths throughout the network so that if one cable fails, another will take over the traffic.
While ease of troubleshooting and increased reliability is definite pluses, these networks are
expensive to install because they use a lot of cabling. Often, a mesh topology will be used in
conjunction with other topologies to form a hybrid topology.
Network media is the actual path over which an electrical signal travels as it moves from one
component to another. Understanding the characteristics of different types of cable and how they
relate to other aspects of a network is necessary for the development of a successful network. The
following section describes the common types of network media, including twisted-pair cable, coaxial
cable, fiber-optic cable, and wireless.
Twisted-Pair Cable
Twisted-pair cable is a type of cabling that is used for telephone communications and most modern
Ethernet networks. A pair of wires forms a circuit that can transmit data. The pairs are twisted to
provide protection against crosstalk, the noise generated by adjacent pairs. When electrical current
flows through a wire, it creates a small, circular magnetic field around the wire. When two wires in an
electrical circuit are placed close together, their magnetic fields are the exact opposite of each other.
Thus, the two magnetic fields cancel each other out. They also cancel out any outside magnetic fields.
Twisting the wires can enhance this cancellation effect.
Two basic types of twisted-pair cable exist:
Unshielded twisted pair (UTP) and
Shielded twisted pair (STP).
The following sections discuss UTP and STP cable in more detail.
1.
UTP cable often is installed using a Registered Jack 45 (RJ-45) connector. The RJ-45 is an eight-wire
connector used commonly to connect computers onto a local-area network (LAN), especially
Ethernets.
15
Networking Concepts
UTP cable is a medium that is composed of pairs of wires. UTP cable is used in a variety of networks.
Each of the eight individual copper wires in UTP cable is covered by an insulating material. In
addition, the wires in each pair are twisted around each other.
UTP cable offers many advantages. Because UTP has an external diameter of approximately 0.43 cm
(0.17 inches), its small size can be advantageous during installation. Because it has such a small
external diameter, UTP cable is easy to install and is less expensive than other types of networking
media.
UTP is considered the fastest copper-based medium today. The following summarizes the features of
UTP cable:
Speed and throughput
10 to 1000 Mbps
Least expensive
Small
100 m (short)
2.
Category 1Used for telephone communications. Not suitable for transmitting data.
Category 2Capable of transmitting data at speeds up to 4 megabits per second (Mbps).
Category 3Used in 10BASE-T networks. Can transmit data at speeds up to 10 Mbps.
Category 4Used in Token Ring networks. Can transmit data at speeds up to 16 Mbps.
Category 5Can transmit data at speeds up to 100 Mbps. (100 BASE T)
Category 5e Used in networks running at speeds up to 1000 Mbps (1 gigabit per second
[Gbps]).
Although STP prevents interference better than UTP, it is more expensive and difficult to install. In
addition, the metallic shielding must be grounded at both ends. If it is improperly grounded, the
shield acts like an antenna and picks up unwanted signals. Because of its cost and difficulty with
termination, STP is rarely used in Ethernet networks. STP is primarily used in Europe.
16
Networking Concepts
Shielded twisted-pair (STP) cable combines the techniques of shielding, cancellation, and wire
twisting. Each pair of wires is wrapped in a metallic foil. The four pairs of wires then are wrapped in
an overall metallic braid or foil. As specified for use in Ethernet network installations, STP reduces
electrical noise both within the cable (pair-to-pair coupling, or crosstalk) and from outside the cable
(EMI and RFI). STP cabling also can use the same RJ connectors that UTP uses.
10 to 100 Mbps
Moderately expensive
Medium to large
100 m (short)
Coaxial Cable
Coaxial cable consists of a hollow outer cylindrical conductor that surrounds a single inner wire made
of two conducting elements. One of these elements, located in the center of the cable, is a copper
conductor. Surrounding the copper conductor is a layer of flexible insulation.
Coaxial cable supports 10 to 100
Mbps and is relatively inexpensive,
although it is more costly than UTP
on a per-unit length. However, coaxial
cable can be cheaper for a physical
bus topology because less cable will
be needed. Coaxial cable can be
cabled over longer distances than
twisted-pair cable. For example, Ethernet can run approximately 100 meters (328 feet) using twistedpair cabling. Using coaxial cable increases this distance to 500m (1640.4 feet).
Coaxial cable comes in a variety of sizes.
The largest diameter (1 centimeter [cm]) referred to as
Thicknet. (500m)
The smallest diameter (0.35 centimeter [cm]) referred
to as Thinnet. (185 m)
10 to 100 Mbps
Inexpensive
Medium
500 m (medium)
BNC
T-connectors
are
female devices for connecting
two cables to a network
interface card (NIC)
17
Networking Concepts
Generally fiber optic cable is categorized as either multimode cable, which is used for short-distance
connections (LANs, campus networks, and short-distance metro networks), or single-mode cable
that is used for long-distance (cross-country networks and intercontinental submarine links).
Single-mode fiber gives you a higher transmission rate and up to 50 times more distance than
multimode, but it also costs more. Single-mode fiber has a much smaller core than multimode. The
small core and single light-wave virtually eliminate any distortion that could result from overlapping
light pulses, providing the least signal attenuation and the highest transmission speeds of any fiber
cable type.
18
Networking Concepts
Media
Type
Maximum
Segment
Length
Speed
Cost
UTP
100 m
10 Mbps to
1000 Mbps
Least
expensive
STP
100 m
10 Mbps to
100 Mbps
More
expensive than
UTP
10 Mbps to
100 Mbps
Relatively
inexpensive,
but more
costly than
UTP
Less susceptible to
EMI interference than
other types of copper
media
Expensive
Cannot be tapped, so
security is better; can
be used over great
distances; is not
susceptible to EMI; has
a higher data rate than
coaxial and twistedpair cable
500 m
(Thicknet)
Coaxial
185 m
(Thinnet)
FiberOptic
10 km and
farther
(single-mode)
100 Mbps to
100 Gbps
(single mode)
2 km and
farther
(multimode)
100 Mbps to
9.92 Gbps
(multimode)
Advantages
Disadvantages
Susceptible to
interference; can cover
only a limited distance
Difficult to work with;
can cover only a limited
distance
Difficult to work with
(Thicknet); limited
bandwidth; limited
application (Thinnet);
damage to cable can
bring down entire
network
Difficult to terminate
Wireless communication uses radio frequencies (RF) or infrared (IR) waves to transmit data between
devices on a LAN. For wireless LANs, a key component is the wireless hub, or access point, used for
signal distribution.
To receive the signals from the access point, a PC or laptop
must install a wireless adapter card (wireless NIC).
Wireless signals are electromagnetic waves that can travel
through the vacuum of outer space and through a medium
such as air. Therefore, no physical medium is necessary
for wireless signals, making them a very versatile way to
build a network.
The primary difference between electromagnetic waves is
their frequency. Low-frequency electromagnetic waves have a long wavelength (the distance from
one peak to the next on the sine wave), while high-frequency electromagnetic waves have a short
wavelength.
19
Networking Concepts
Wireless Communication
Networking Concepts
20
Computer network devices also known as communication devices and they constitute a data
communication network. These devices are NIC, routers, switches, hubs, LAN cards, gateway,
modems, hardware firewall and transceivers. In an Ethernet or WAN network, the data
communication cannot be performed without these devices. Being an IT professional or a network
administrator, you must have the good understanding of these devices.
Modem
Internal modem
External Modem
Wireless Modem
Hub
The central connecting device in a computer network is known as a hub. Every computer is directly
connected with the hub. When data packets arrives at hub, it broadcast them to all the LAN cards in a
network and the destined recipient picks them and all other computers discard the data packets. Hub
has five, eight, sixteen and more ports and one port is known as uplink port, which is used to connect
with the next hub.
21
Networking Concepts
Switches
Like the router, a switch is an intelligent device that maps the IP address with the MAC address of the
LAN card. Unlike the hubs, a switch does not broadcast the data to all the computers, it sends the data
packets only to the destined computer. Switches are used in the LAN, MAN and WAN. In an Ethernet
network, computers are directly connected with the switch via twisted pair cables.
Routers
A router is a communication device that is used to connect two logically and physically different
networks, two LANs, two WANs and a LAN with WAN. The main function of the router is to sorting
and the distribution of the data packets to their destinations based on their IP addresses. Routers
provides the connectivity between the enterprise businesses, ISPs and in the internet infrastructure,
router is a main device. Cisco routers are widely used in the world. Every router has routing
software, which is known as IOS. Router does not broadcast the data packets.
A bridge is a product that connects a local area network (LAN) to another local area network that
uses the same protocol (for example, Ethernet or Token Ring).A bridge examines each message on a
LAN, "passing" those known to be within the same LAN, and forwarding those known to be on the
other interconnected LAN (or LANs).
Bridges serve a similar function as switches. Switches are sometimes called "multi-port bridges" for
this reason. A bridge only has one incoming and one outgoing port.
22
Networking Concepts
Bridge
Gateway
A network gateway is an internetworking system capable of joining together two networks that use
different base protocols. The gateway has two sides. The WAN side connects to your cable DSL modem
and LAN side connects to your private network via a hub or switch. The main function of it is to route
the traffic from computer to the Internet and back to the computer. A computer with the two NIC
cards can act as a gateway. It routes the network traffic between two logically and physically different
networks.
Repeater
A network repeater is a device used to expand the boundaries of a wired or wireless (WiFi) local area
network (LAN). In the past, wired network repeaters were used to join segments of Ethernet cable.
The repeaters would amplify the data signals before sending them on to the uplinked segment,
thereby countering signal decay that occurs over extended lengths of wire.
A WiFi network repeater will pick up the signal from a wireless router and amplify it, propagating
signal strength to boost distance and coverage of the WLAN.
Wireless access points (APs or WAPs) are specially configured nodes on wireless local area networks
(WLANs). Access points act as a central transmitter and receiver of WLAN radio signals.
Access points used in home or small business networks are generally small, dedicated hardware
devices featuring a built-in network adapter, antenna, and radio transmitter. Access points support
Wi-Fi wireless communication standards.
23
Networking Concepts
Devices in a wireless network are set up to either communicate indirectly through a central place
an access point or directly, one to the other. The first is called "Infrastructure Mode" and the
other is called "Ad Hoc" mode (it's also called peer-to-peer).
Media Converters
24
Networking Concepts
Network media converters are used to interconnect different types of cables within an existing
network. They receive data from one type of cable and convert the signals for transmission along
another cable type.
Definition:
A network address serves as a unique identifier for a computer on a network. When set up correctly,
computers can determine the addresses of other computers on the network and use these addresses
to send messages to each other.
One of the best known form of network addressing is the Internet Protocol (IP) address. IP
addresses consist of four bytes (32 bits) that uniquely identify all computers on the public Internet.
Another popular form of address is the Media Access Control (MAC) address. MAC addresses are six
bytes (48 bits) that manufacturers of network adapters burn into their products to uniquely identify
them.
Network ID
Host ID
The various classes of networks specify additional or fewer octets to designate the network ID versus
the host ID.
25
Networking Concepts
Leftmost bits
Start address
Finish address
0xxx
0.0.0.0
126.255.255.255
10xx
128.0.0.0
191.255.255.255
110x
192.0.0.0
223.255.255.255
1110
224.0.0.0
239.255.255.255
1111
240.0.0.0
255.255.255.255
Sub netting is the process of breaking down a main class A, B, or C network into subnets for routing
purposes. A subnet mask is the same basic thing as a net mask with the only real difference being that
you are breaking a larger organizational network into smaller parts, and each smaller section will use
a different set of address numbers. This will allow network packets to be routed between sub
networks.
Setting up subnets the following must be determined:
Number of segments
Hosts per segment
Sub netting provides the following advantages:
26
Networking Concepts
Subnet masks
IPv6
2b63:1478:1ac5:37ef:4e8c:75df:14cd:93f2
27
Networking Concepts
IPv6 is 128 bits. It has eight octet pairs, each with 16 bits and written in hexadecimal as follows:
Networking Concepts
28
Network devices
MAC Devices
: PC NIC, Router.
Ethernet Cable
1.
RJ45 Plugs
Wire Cutters
RJ45 Crimper
110 Punch Down Tool
Cable Tester
4.
2.
3.
5.
6.
Inside the Ethernet cable, there are 8 color coded wires. These wires are twisted into 4 pairs of wires,
each pair has a common color theme. One wire in the pair being a solid or primarily solid colored
wire and the other being a primarily white wire with a colored stripe.
Wiring diagram and pin out
29
Networking Concepts
Wire Color
Wire Diagram
End #1
White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown
RJ45 Pin
(END 2)
1
2
3
4
5
6
7
8
Wire Color
Diagram
End #2
White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown
Diagram
End #1
RJ45 Pin
(END 2)
1
2
3
4
5
6
7
8
Wire Color
Diagram
End #2
White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown
Networking Concepts
RJ45 Pin
(END 1)
1
2
3
4
5
6
7
8
30
Upper layers
Even though most computer network technologies do not follow strictly to the OSI Model in that they
combine several OSI layers functions in one protocol, the OSI Model is still used as a reference and a
guideline in network design. Understanding the OSI Model will help you understand how a network
works.
31
Networking Concepts
Lower layers
Layer Name
Functions
Layer 7
Application Layer
application support
Layer 6
Presentation Layer
Layer 5
Session Layer
Layer 4
Transport Layer
end-to-end transport
Layer 3
Network Layer
addressing, routing
Layer 2
Layer 1
Physical Layer
electrical/optical signaling,
cabling, connector pin
assignment
Examples
HTTP, FTP, Telnet, SMTP, SNMP,
POP3, IMAP4
SIP
TCP, UDP, RT
P, RTCP
IP, IPSec, IPX, NetBEUI,
AppleTalk, ICMP
Ethernet, Wi-Fi, HomePNA,
HomePlug, PPP, PPTP, L2TP,
ATM, Frame Relay, Token Ring,
FDDI
RF, UTP, STP, coax, fiber optic,
connectors, signaling, voltages
The following table explains network components along with their functions and the corresponding
layers in the OSI Model.
Network Adapter
Modem (Modulator
& demodulator)
Repeater
(Regenerator)
Bridge
Hub
Switch
Access Point
Router
Residential
Gateway
Gateway
Functions
Converts a computer message into
electrical/optical signals for transmission across a
network.
Puts a message (baseband signal) on a carrier for
efficient transmission; takes the baseband signal
from the carrier.
Receives signal, amplifies it, then retransmits it.
Connects networks with different Layer 2
protocols; divides a network into several
segments to filter traffic.
Connects computers in a network; receives a
packet from a sending computer and transmits it
to all other computers.
Connects computers in a network; receives a
packet from a sending computer and transmits it
only to its destination.
Connects computers in a wireless network;
connects the wireless network to wired networks;
connects it to the Internet.
Forwards a packet to its destination by examining
the packet destination network address.
Connects a home network to the Internet; hides all
computers in the home network from the Internet.
Connects two totally different networks;
translates one signaling/protocol into another.
OSI Model
Physical (Layer 1)
Physical (Layer 1)
Physical (Layer 1)
Data Link (Layer 2)
Networking Concepts
Network
Component
Physical (Layer 1)
Data Link (Layer 2)
Data Link (Layer 2)
Network (Layer 3)
Network (Layer 3)
All layers
32
This layer conveys the bit stream through the network at the electrical and mechanical level. It
provides the hardware means of sending and receiving data on a carrier.
33
Networking Concepts
:
HTTP
FTP
SMTP
POP3
DNS
DHCP
IMAP
IRC
NTP
SNMP
Telnet
Transport Layer
Internet Layer
TCP
UDP
Ethernet
Frame Relay
ATM -
Networking Concepts
Application Layer
34
What is a Protocol?
A protocol is a set of rules that governs the communications between computers on a network. In
order for two computers to talk to each other, they must be speaking the same language. Many
different types of network protocols and standards are required to ensure that your computer (no
matter which operating system, network card, or application you are using) can communicate with
another computer located on the next desk or half-way around the world.
FTP
FTP (File Transfer Protocol) is somewhat unique in that it is both a protocol and a program. As the
name would indicate, it is used to transfer files. It is very powerful and flexible in its use. It can be
configured to let users take files but not transmit them. This could be very advantageous in the case of
limiting the transfer of files that may contain a virus. There is also a stripped down version of FTP
called TFTP (Trivial File Transfer Protocol) which lacks some of the functionality of FTP in particular
the ability to browse for files.
SMTP
SMTP (Simple Mail Transfer Protocol) provides a mechanism to send email between dissimilar
operating systems. It is SMTPs ability to send email between different operating systems that makes
it so useful on the Internet. An example of this would be composing an email message from a
Windows 98 client, forwarding that to a local Microsoft Exchange Server which could then send it via
the Internet to a server running the UNIX operating system.
The POP3 (Post Office Protocol) version 3 is used to download email from various servers to an email
client. Microsofts Outlook Express is an example of a client-side software that uses POP3 technology.
Most ISPs (Internet Service Providers) that provide home service also use the POP3 protocol. This
enables the ISP to download messages to the individual users computer rather than having to store
them on the ISPs servers.
TCP
The main function of TCP is to establish and monitor connections between the sending and receiving
devices. TCP is responsible for providing reliable connection-oriented data delivery. TCP functions at
the Transport layer of the OSI model. When you are using TCP, you basically have an
acknowledgement between sender and receiver that is maintained the entire length of the data
transmission.
35
Networking Concepts
P0P3
IP
Internet Protocol provides the mechanism for Internet addressing. IP functions at the Network layer
of the OSI model. There are basically two parts to an IP address; the first part defines the network a
device is attached to, and the second portion identifies the actual device itself. An IP address can be
assigned by the network administrator or assigned by a DHCP (Dynamic Host Configuration Protocol)
server.
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP
address) to a physical machine address that is recognized in the local network. For example, in IP
Version 4, the most common level of IP in use today, an address is 32 bits long. In an Ethernet local
area network, however, addresses for attached devices are 48 bits long. (The physical machine
address is also known as a Media Access Control or MAC address.) A table, usually called the ARP
cache, is used to maintain a correlation between each MAC address and its corresponding IP address.
ARP provides the protocol rules for making this correlation and providing address conversion in both
directions.
AppleTalk
AppleTalk, a protocol suite developed by Apple Computer in the early 1980s, was developed in
conjunction with the Macintosh computer. AppleTalk's purpose was to allow multiple users to share
resources, such as files and printers. The devices that supply these resources are called servers, while
the devices that make use of these resources (such as a user's Macintosh computer) are referred to as
clients. Hence, AppleTalk is one of the early implementations of a distributed client/server
networking system. This chapter provides a summary of AppleTalk's network architecture.
AppleTalk was designed with a transparent network interfacethat is, the interaction between client
computers and network servers requires little interaction from the user. In addition, the actual
operations of the AppleTalk protocols are invisible to end users, who see only the result of these
operations.
S.Kishokumar B.Sc (EUSL), PG Dip in IT (UPDN), MBCS.
IDM Affiliated University College, Higher Studies Division, No: 11/7 Station Road, Batticaloa.
36
Networking Concepts
Simple Network Management Protocol (SNMP) is used as the transport protocol for network
management. SNMP is now a part of TCP/IP suite of protocols, works over the internet, and can be
used to manage virtually any device such as printers, switches, and wiring hubs. Its improved version
(called remote network monitoring specification or RNMS) allows error alerts to be sent to network
administrators.
37
Networking Concepts
Telnet
Telnet is a program for TCP/IP networks such as the Internet. The Telnet program runs on your
computer and connects your PC to a server on the network. You can then enter commands through
the Telnet program and they will be executed as if you were entering them directly on the server
console. This enables you to control the server and communicate with other servers on the network.
To start a Telnet session, you must log in to a server by entering a valid username and password.
Telnet is a common way to remotely control Web servers.
Frame Relay
Frame relay is a computer networking structure that allows for a quick and efficient way to transmit
frames from one device to another. These frames, or packets of data, are usually sent between local
area networks (LANs) within a wide area network (WAN). The way the frames are sent is like a relay
data is passed from one router or node to another from where it's then sent to another node or
router. It's a relatively inexpensive technology though alternative structures like virtual private
networks (VPNs) or multiprotocol label switching (MPLS) are often preferred.
Asynchronous transfer mode (ATM) is a switching technology that facilitates the movement of data
from one point to another. It is one of the preferred technologies because of its efficiency of use,
especially with different hardware components. Unlike other types of technology, the speed and
efficiency used in asynchronous transfer mode makes it one of the most common network protocol
standards in use today. The main advantage of asynchronous transfer mode technology is the ability
to transfer many different types of data at the same time. This is because all bandwidth is utilized, as
long as it is available.
38
Networking Concepts
Short for Sequenced Packet Exchange, a transport layer protocol (layer 4 of the OSI Model) used in
Novell Netware networks. The SPX layer sits on top of the IPX layer (layer 3) and provides
connection-oriented services between two nodes on the network. SPX is used primarily by
client/server applications.
Whereas the IPX protocol is similar to IP, SPX is similar to TCP. Together, therefore, IPX/SPX provides
connection services similar to TCP/IP.
39
Networking Concepts
Firewall
A system designed to prevent unauthorized access to
or from a private network. Firewalls can be
implemented in both hardware and software, or a
combination of both. Firewalls are frequently used to
prevent unauthorized Internet users from accessing
private networks connected to the Internet, especially
intranets. All messages entering or leaving the intranet
pass through the firewall, which examines each
message and blocks those that do not meet the
specified security criteria.
Hardware Firewall:
A Hardware Firewall is a physical piece of equipment that sits between the Internet and your
computer. An example of a hardware firewall is a broadband router, a common form of Internet
connection. The benefit of using a hardware firewall, is that it has the ability to protect multiple
computer systems that are connected to it at the same time. This makes it an effective firewall for use
in businesses that have multiple computers connected to the Internet, as well as in homes that have
more than one computer system.
Software Firewall:
Software Firewalls work in the same way as a hardware firewall, by monitoring and blocking
information that comes to your computer via the Internet, however software firewalls must be
installed as a program on your computer. These software firewalls can either be installed from a
computer disk that you have purchased, or downloaded over the Internet. Software firewalls are the
most common type of firewall. Programs such as Norton 360, Norton Internet Security, ESET Smart
Security, and Kaspersky Internet Security all have a firewall bundled within them.
Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it
based on user-defined rules. Packet filtering is fairly effective and transparent to users, but
it is difficult to configure. In addition, it is susceptible to IP spoofing.
Application gateway: Applies security mechanisms to specific applications, such as FTP
and Telnet servers. This is very effective, but can impose a performance degradation.
Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is
established. Once the connection has been made, packets can flow between the hosts
without further checking.
Proxy server: Intercepts all messages entering and leaving the network. The proxy server
effectively hides the true network addresses.
In practice, many firewalls use two or more of these techniques in concert. A firewall is considered a
first line of defense in protecting private information. For greater security, data can be encrypted.
40
Networking Concepts
Multiplexing
Under the simplest conditions, a medium can carry only one signal at any moment in time. Many
times, however, we want a medium to carry multiple signals at the same time. Technique of
transmitting multiple signals over a single medium is multiplexing. Multiplexing is a technique
performed at the physical layer of the OSI model or the interface layer of the Internet model. For
multiple signals to share one medium, the medium must somehow be divided, giving each signal a
portion of the total bandwidth. there are four basic ways to divide a medium: frequency division
multiplexing, time division multiplexing, dense wavelength division multiplexing, and code division
multiplexing.
41
Networking Concepts
Used in many fields of communications, including cable television, cellular telephones, broadcast
television and radio, and pagers It is also one of the simplest multiplexing techniques. Frequency
division multiplexing (FDM) is the assignment of non-overlapping frequency ranges to each user of
a medium. So that multiple users can share a single medium, each user is assigned a channel. A
channel is an assigned set of frequencies that is used to transmit the users signal. Frequency division
multiplexing is used only with analog signals.
Since the high-speed output data stream generated by the multiplexor does not contain addressing
information for individual bytes, a precise order must be maintained, so that the de multiplexor can
disassemble and deliver the bytes to the respective owners in the same sequence as the bytes were
input.
Both frequency division multiplexing and synchronous time division multiplexing can waste unused
transmission space. One solution to this problem is statistical time division multiplexing. Statistical
time division multiplexing (Stat TDM, sometimes called asynchronous time division multiplexing)
transmits data only from active users and does not transmit empty time slots. To transmit data only
from active users, the multiplexor creates a more complex frame that contains data only from those
input sources that have something to send.
42
Networking Concepts
It is interesting that because of the properties of the signals, light, and glass fiber, each signal carried
on the fiber can be transmitted at a different rate from the other signals. This means that a single fiber
optic line can support simultaneous transmission speeds such as 51.84 Mbps, 155.52 Mbps, 622.08
Mbps, and 2.488 Gbps.
Networking Concepts
Code division multiplexing (CDM and also known as code division multiple access) is a relatively new
technology and has been used extensively by both the military and cellular telephone companies.
Whereas other multiplexing techniques differentiate one user from another by either assigning
frequency ranges or interleaving bit sequences in time, code division multiplexing allows multiple
users to share a common set of frequencies by assigning unique digital codes to each user.
43
Connection-oriented Services
Requires a session connection (analogous to a phone call) be established before any data can be sent.
This method is often called a "reliable" network service. It can guarantee that data will arrive in the
same order. Connection-oriented services set up virtual links between end systems through a
network, as shown in figure below. Note that the packet on the left is assigned the virtual circuit
number 01. As it moves through the network, routers quickly send it through virtual circuit 01.
Does not require a session connection between sender and receiver. The sender simply starts sending
packets (called datagrams) to the destination. This service does not have the reliability of the
connection-oriented method, but it is useful for periodic burst transfers. Neither system must
maintain state information for the systems that they send transmission to or receive transmission
from. A connectionless network provides minimal services.
Note: TCP (Transmission Control Protocol) is a connection-oriented transport protocol, while UDP
(User Datagram Protocol) is a connectionless network protocol. Both operate over IP.
44
Networking Concepts
Connectionless Services
Transmission Impairments
Analog signal consist of varying a voltage with time to represent an information steam. If the
transmission media were perfectly, the receiver could receive exactly the same signal that the
transmitter sent. But communication lines are usually not perfect, so the receive signal is not the
same as the transmitted signal. For digital data this difference can lead to errors. Transmission lines
suffers from three major problems,
1. Attenuation
2. Delay distortion
3. Noise
Impairments exist in all forms of data transmission:
Analog signal impairments result in random modifications that impair signal quality.
Digital signal impairments result in bit errors (1s and 0s transpose)
Attenuation
Signal amplitude decrease along a transmission medium over distance. This is known as signal
attenuation.
Amplifiers (analog) or repeaters (Digital) are inserted at intervals along the medium to
improve the received signal as closed as to its original level. Attenuations and amplifications
are measured in decibel (dB).
Delay distortion
Velocity of a propagation of a signal through a guided medium varies with frequency. The varies
frequency components in digital signal arrive at the receiver with varying delay, resulting in delay
distortion. Various components of a signal arrive at receiver at different times. Effects digital more.
45
Networking Concepts
Limited Bandwidth
Every medium has a limit on its bandwidth. Bandwidth is the range of frequencies that the equipment
or channel is capable of processing. If there is not enough bandwidth some of the frequencies will be
lost, and the signal will be distorted.
Noise
Noise is unwanted sound or an unwanted electrical interference on the signal wires. There are
several types of noises.
Thermal
Intermediation
Crosstalk
Impulse
Thermal
The noise caused by the increase of current carries in a resistor due a thermal increase in the device.
Or it cause from thermal agitation of electrons.
46
Networking Concepts
NEXT -
IEEE Standards
The Institute of Electrical and Electronics Engineers
Standards Association (IEEE-SA) is an organization within IEEE
that develops global standards in a broad range of industries,
including: power and energy, biomedical and healthcare,
information technology, telecommunications, transportation,
nanotechnology, information assurance, and many more.
IEEE 802 refers to a family of IEEE standards dealing with local
area networks and metropolitan area networks. The number 802
was simply the next free number IEEE could assign though 802
is sometimes associated with the date the first meeting was held
February 1980.
IEEE 802
IEEE 802.1
IEEE 802.2
IEEE 802.3
IEEE 802.4
IEEE 802.5
IEEE 802.6
IEEE 802.7
IEEE 802.8
IEEE 802.9
IEEE 802.10
IEEE 802.11
IEEE 802.12
IEEE 802.14
IEEE 802.15.1
IEEE 802.15.4
IEEE 802.16
LAN/MAN
Standards for LAN/MAN bridging and management and remote media
access control (MAC) bridging.
Standards for Logical Link Control (LLC) standards for connectivity.
Ethernet Standards for Carrier Sense Multiple Access with Collision
Detection (CSMA/CD).
Standards for token passing bus access.
Standards for token ring access and for communications between LANs and
MANs
Standards for information exchange between systems.
Standards for broadband LAN cabling.
Fiber optic connection.
Standards for integrated services, like voice and data.
Standards for LAN/MAN security implementations.
Wireless Networking "WiFi".
Standards for demand priority access method.
Standards for cable television broadband communications.
Bluetooth
Wireless Sensor/Control Networks "ZigBee"
Wireless Networking "WiMAX"
IEEE 8802.11 Wi Fi
The name of a popular wireless networking technology that uses radio waves to provide wireless
high-speed Internet and network connections. The Wi-Fi Alliance, the organization that owns the WiFi (registered trademark) term specifically defines Wi-Fi as any "wireless local area network (WLAN)
products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11
standards."
47
Networking Concepts
Advantages of WiFi
Disadvantages of WiFi
Networking Concepts
48
LAN Technologies
Each computer in a LAN can effectively send and receive any information addressed to it. This
information is in the form of data 'packets'. The standards followed to regularize the transmission of
packets, are called LAN standards. There are many LAN standards as Ethernet, Token Ring , FDDI etc.
Usually LAN standards differ due to their media access technology and the physical transmission
medium.
There are different types of LAN technologies available.
Ethernet
A local-area network (LAN) architecture/technology uses a bus or star topology and supports
data transfer rates of 10 Mbps. The Ethernet specification served as the basis for the IEEE
802.3 standard, which specifies the physical and lower software layers. Ethernet uses the
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol to control access
network.
Ethernet Frame Format
An Ethernet frame is a way of arranging sections of data for transfer over a computer
network. The frame is the one of the key elements of the Ethernet system, one of the most
popular types of local network. It is made up of three elements: a pair of addresses, the data
itself, and an error checking field.
Preamble
The preamble is a 64-bit (8 byte) field that contains a synchronization pattern consisting of
alternating ones and zeros and ending with two consecutive ones. After synchronization is
established, the preamble is used to locate the first bit of the packet. The preamble is
generated by the LAN interface card.
Destination Address
The destination address field is a 48-bit (6 byte) field that specifies the station or stations to
which the packet should be sent. Each station examines this field to determine whether it
should accept the packet.
Source Address
The source address field is a 48-bit (6 byte) field that contains the unique address of the
station that is transmitting the packet.
Type field
The type field is 16-bit (2 byte) field that identifies the higher-level protocol associated with
the packet. It is interpreted at the data link level.
49
Networking Concepts
I.
Data Field
The data field contains 46 to 1500 bytes. Each octet (8-bit field) contains any arbitrary
sequence of values. The data field is the information received from Layer 3 (Network Layer).
The information, or packet, received from Layer 3 is broken into frames of information of 46
to 1500 bytes by Layer 2.
FCS (Frame check sequence) CRC Field
The Cyclic Redundancy Check (CRC) field is a 32-bit error checking field. The CRC is generated
based on the destination address, type and data fields.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is the LAN access method used in
Ethernet. When a device wants to gain access to the network, it checks to see if the network is free. If
the network is not free, the device waits a random amount of time before retrying. If the network is
free and two devices access the line at exactly the same time, their signals collide. When the collision
is detected, they both back off and wait a random amount of time before retrying.
Carrier Sense:
Carrier sense means that every Ethernet device listen to the Ethernet wire
before it attempts to transmit. If the Ethernet device senses that another
device is transmitting, it will wait to transmit.
Multiple Access:
Multiple access means that more than one other network device can be sensing
(listening and waiting to transmit) at a time.
Collision Detection: Collision Detection means that when multiple Ethernet devices accidentally
transmit at the same time, they are able to detect this error.
Token Ring This is a 4-Mbps or 16-Mbps token-passing method, operating in a ring topology. Devices on a
Token Ring network get access to the media through token passing. Token and data pass to
each station on the ring. The devices pass the token around the ring until one of the computer
who wants to transmit data, takes
the token and replaces it with a
frame. Each device passes the frame
to the next device, until the frame
reaches its destination. As the frame
passes to the intended recipient, the
recipient sets certain bits in the
frame to indicate that it received
the frame. The original sender of
the frame strips the frame data off
the ring and issues a new token.
50
Networking Concepts
II.
III.
Fast Ethernet This is an extension of 10Mbps Ethernet standard and supports speed up to 100Mbps. The
access method used is CSMA/CD. For physical connections Star wiring topology is used. Fast
Ethernet is becoming very popular as an up gradation from 10Mbps Ethernet LAN to Fast
Ethernet LAN is quite easy.
IV.
FDDI (Fiber Distributed Data Interface) FDDI provides data speed at 100Mbps which is faster than Token Ring and Ethernet LANs .
FDDI comprise two independent, counter-rotating rings : a primary ring and a secondary ring.
Data flows in opposite directions on the rings. The counter-rotating ring architecture prevents
data loss in the event of a link failure, a node failure, or the failure of both the primary and
secondary links between any two nodes. This technology is usually implemented for a
backbone
network.
Networking Concepts
In (a), the outer ring is used to transfer data. In (b), a station has failed and the adjacent stations
detect the disconnection and reconfigure to use the reverse path to form a closed ring. This process of
reconfiguring is called self-healing and FDDI is known as a self-healing network.
51
WAN Technologies
Wide Area Networks (WANs) are used to interconnect networks that are not physically close to each
other, might be physically separated across the cities, across regions, or even across geography.
Currently there are many WAN technologies available. Primary different between WAN technology
and LAN technology is about the distance that separates the interconnected networks. WANs use
different transmission media, hardware, and protocols. Data transfer rates are typically much lower
for WAN communication when compared to LAN rates.
1. ATM
ATM or Asynchronous Transfer Mode is a high bandwidth and high speed wide area network
technology that operates at the speed of 155Mbps. ATM is also called cell relay and it supports
multiple data types such as data, voice, video etc. ATM uses fixed sized packets for data
communication that are also known as packets.
Asynchronous Transfer Mode, or ATM, uses fiber optic cable to achieve speeds exceeding 600 Mbps,
and is only used in large-scale, backbone operations. ATM can accommodate such varying
technologies as traditional phone service, data service, and even VOIP service (Voice over IP).
2. ISDN
Integrated Services Digital Network (ISDN) is a circuit-switching network used for voice, data, and
video transfer over plain copper telephone lines. ISDN is a bit similar to the normal telephone system
but it is faster, more reliable, and requires less time to setup a call.
ISDN Network availability is widespread, but you can still find places where it is simply not available.
One key reason to use dialed connections of any kind, including ISDN network, might be to send and
receive data for only short periods of time. Routers frequently use ISDN network to create a backup
link when their primary leased line or Frame Relay connection is lost.
ISDN network includes two types of interfaces: Basic Rate Interface (BRI) and Primary Rate
Interface (PRI). ISDN BRI offers connection speeds up to 128 Kbps while ISDN PRI services offer
connections ranging up to 2.048 Mbps (or 1.554 Mbps).
ISDN BRI network includes two 64 Kbps channels (called B channel), and one 16 Kbps channel (called
D channel). B channel carry data, digitalized voice, or digitalized video signals. The D channel is
service channel used for both data and control information. ISDN BRI is ideal for home and small
businesses that need data transfer rates higher than traditional modems.
There are two scenarios you can use with this ISDN BRI network:
1. One B channel is dedicated to voice, and the other B channel is dedicated to data
2. Both B channels are dedicated to data for a total transfer rate of 128 Kbps
The total bandwidth of an ISDN BRI line is 144 Kbps (two B channels and one D channel) with total
data transfer rate is 128 Kbps.
52
Networking Concepts
ISDN BRI offers the following benefits over dial-up modems and other WAN connection options.
Faster data transfer rates (128Kbps) compared to dial-up modems (56Kbps maximum)
Faster call establishment (dial-up) than modems
Lower cost than other WAN solutions (users pay a monthly fee plus connection charges)
3. Frame Relay
Frame Relay is a high-performance WAN protocol that can provide digital internetwork WAN
connections up to 2.048 Mbps (and sometimes higher) in many parts of the world. Frame relay uses
virtual circuits to connect sites and provide scalability by the definition of guaranteed data pipes
(using a committed information rate). Frame relay is so popular because its scalable bandwidth
offerings across digital pathways. Using standard Frame Relay configurations is a simple way of
minimizing connectivity problems in large Frame Relay networks.
53
Networking Concepts
ISDN PRI network is used in businesses that require an always on high speed connection. PRI is an
industrial ISDN line while the Basic Rate Interface, or BRI, is used to cater to home and small
enterprises. A PRI is typically used to establish communication between a PBX, or a private branch
exchange, which is a telephone exchange operated by the customer of a telephone company, and a
Central Office of the telephone company or an Inter Exchange Carrier or IXC, a long distance
telephone company. The advantage of primary rate interface or PRI is that the 23 or 30 B channels
can be used in various combinations for specific data transmission needs, such as a
videoconferencing, allowing bulk data transfer to be achieved more flexibly.
4. X.25
X.25 was originally designed more than 25 years ago to carry voice over analog telephone lines
(dialup networks). Typical applications of X.25 today include automatic teller machine networks and
credit card verification networks. X.25 also supports a variety of mainframe terminal/server
applications.
5. Packet Switching
Packet-switched networks use two different technologies for sending messages and data from one
point to another.
In packet-based networks, the message gets broken into small data packets. These packets
are sent out from the computer and they travel around the network seeking out the most
efficient route to travel as circuits become available. This does not necessarily mean that they
seek out the shortest route.
Each packet may go a different route from the others.
Each packet is sent with a header address. This tells it where its final destination is, so it
knows where to go.
The header address also describes the sequence for reassembly at the destination computer
so that the packets are put back into the correct order.
S.Kishokumar B.Sc (EUSL), PG Dip in IT (UPDN), MBCS.
IDM Affiliated University College, Higher Studies Division, No: 11/7 Station Road, Batticaloa.
54
Networking Concepts
X.25 is a standard suite of protocols used for packet switching across computer networks. Each X.25
packets contains up to 128 bytes of data. The X.25 network handles packet assembly at the source
device, delivery, and then disassembly at the destination. X.25 packet delivery technology includes
not only switching and network-layer routing, but also error checking and re-transmission logic
should delivery failures occur. X.25 supports multiple simultaneous conversations by multiplexing
packets and using virtual communication channels.
One packet also contains details of how many packets should be arriving so that the recipient
computer knows if one packet has failed to turn up.
If a packet fails to arrive, the recipient computer sends a message back to the computer which
originally sent the data, asking for the missing packet to be resent.
Advantages
Security
Bandwidth used to full potential
Devices of different speeds can communicate
Not affected by line failure (re diverts signal)
Availability do not have to wait for a direct connection to become available
During a crisis or disaster, when the public telephone network might stop
working, e-mails and texts can still be sent via packet switching
Disadvantages
Circuit switching was designed in 1878 in order to send telephone calls down a dedicated
channel. This channel remained open and in use throughout the whole call and could not be
used by any other data or phone calls.
There are three phases in circuit switching:
1. Establish
2. Transfer
3. Disconnect
The telephone message is sent in one go, it is not broken up. The message arrives in the same
order that it was originally sent.
In modern circuit-switched networks, electronic signals pass through several switches before
a connection is established.
During a call, no other network traffic can use those switches.
The resources remain dedicated to the circuit during the entire data transfer and the entire
message follows the same path.
Circuit switching can be analogue or digital
With the expanded use of the Internet for voice and video, analysts predict a gradual shift
away from circuit-switched networks.
A circuit-switched network is excellent for data that needs a constant link from end-to-end.
For example real-time video.
55
Networking Concepts
6. Circuit Switching
Advantages:
Disadvantages:
Networking Concepts
Inefficient the equipment may be unused for a lot of the call, if no data is being
sent, the dedicated line still remains open
Takes a relatively long time to set up the circuit
During a crisis or disaster, the network may become unstable or unavailable.
It was primarily developed for voice traffic rather than data traffic.
56
57
Networking Concepts
In order to gain access to the private network, a user must be authenticated using a unique
identification and a password.
Layer 2 Tunneling Protocol (L2TP) is a protocol used to tunnel data communications traffic
between two sites over the Internet.
Advantages
Allows you to be at home and access your company's computers in the same way as if you
were sitting at work.
A VPN is a inexpensive effective way of building a private network.
Almost impossible for someone to tap or interfere with data in the VPN tunnel.
If you have VPN client software on a laptop, you can connect to your company from anywhere
in the world.
Disadvantages
Networking Concepts
58
Provide technical expertise and platform leadership in areas of Cisco WAN, LAN, WLAN, VPN
and Firewall technologies.
Configure,
implement,
and
troubleshoot
variety
of
Cisco
Hardware/Software
Develop tactical and strategic plans, standards, guidelines and policies for the
Coordinate change planning and formal change control process to systems in order to
Eliminate customer impact and to ensure that availability SLA's are met.
59
Networking Concepts
You are responsible for the use of your network ID (Net ID) and all computer accounts that
are assigned to you.
You may not give anyone else access to your Net ID or computer accounts. .
You are responsible for the security of your passwords. This includes changing passwords on
a regular basis and making sure no one else knows them.
You must not use NU's network resources to gain or attempt to gain unauthorized access to
remote computers.
You must not deliberately perform an act that will seriously impair the operation of
computers, terminals, peripherals, or networks. This includes, but is not limited to, tampering
with components of a local area network (LAN) or the high-speed backbone network,
otherwise blocking communication lines, or interfering with the operational readiness of a
computer.
You must not run or install on any of NU's computer systems, or give to another, a program
that could result in the eventual damage to a file or computer system and/or the reproduction
of itself. This is directed towards, but not limited to, the classes of programs known as
computer viruses, Trojan horses, and worms.
You must not attempt to circumvent data protection schemes or exploit security loopholes or
interfere with standard technical measures that identify and protect the rights of copyright
owners.
Networking Concepts
60