Professional Documents
Culture Documents
1 NETWORKING CONCEPTS
STRUCTURE
1.1 INTRODUCTION
1.2 OBJECTIVES
1.13 MPLS
1.14 MPLS-VPN
1.15 SUMMARY
1.1 INTRODUCTION
The Internet protocol suite is the set of communications protocols used for the
Internet and similar networks. Because of most popular protocol stack for wide area
networks, it is commonly known as TCP/IP. The most important protocols are:
Transmission Control Protocol (TCP) and Internet Protocol (IP). These protocols were
the first networking protocols defined in this standard.The TCP/IP model and related
protocols are maintained by the Internet Engineering Task Force (IETF).
Without a network, you can access resources only on your own computer. These
resources may be devices in your computer, such as a folder or disk drive, or they may be
connected to your computer, such as a printer or CDROM drive. These devices,
1.2 OBJECTIVES
After reading this unit, you should be able to understand:
a) TCP/IP Model
b) Comparison of OSI and TCP/IP Model
c) Networking concepts
d) Networking components
3: Transport
2: Network
1: Link / Physical
1. The link layer (commonly Ethernet) contains communication technologies for a local
network.
2. The internet layer (IP) connects local networks, thus establishing internetworking.
3. The transport layer (TCP) handles host-to-host communication.
4. The application layer (for example HTTP) contains all protocols for specific data
communications services on a process-to-process level (for example how a web
browser communicates with a web server).
Functions of Layers
1. Application Layer: This is the topmost layer of the TCP/IP suite. This is responsible
for coding of the packet data. It contains all protocols for specific data
communications services on a process-to-process level. For example, how a web
browser communicates with a web server.
2. Transport Layer: This layer monitors end-to-end path selections of the packets. It
also provides service to the application layer. It handles host-to-host communication
3. Internet Layer: This layer is responsible for sending packets through different
networks. It connects local networks, thus establishing internetworking.
4. Link Layer: It is the closest layer to the network hardware. It provides service to
Internet layer. The Link Layer (commonly Ethernet) contains communication
technologies for a local network.
Utility Applications
Utility applications include the following.
Simple network management protocol (SNMP) – provides network management
information.
Boot protocol (BOOTP) – provides remote loading capability for diskless
workstations.
Domain name service (DNS) – provides directory assistance for Internet addresses
using local names.
Address resolution protocol (ARP) – provides a physical address from an IP address.
Reverse address resolution protocol (RARP) – provides an IP address from a physical
device address.
In theory, all application protocols could use either the UDP or the TCP transport
protocol. The reliability requirements of the application dictates, which transport layer
protocol is used. For example, some applications, such as the domain name service
(DNS), may either UDP or TCP. The UDP provides an unreliable, connectionless
transport service, while the TCP provides a reliable, in-sequence, and connection-
oriented service. Because the UDP is unreliable, many of the application layer protocols
only use TCP, for example, FTP and TELNET. For the application layer protocols that
do not require a reliable service, they use only UDP, for example, TFTP, SNMP, VoIP
etc.
Computer Network
A network is any collection of independent computers that communicate with one
another over a shared network medium. A computer network is a collection of two or
more connected computers. When these computers are joined in a network, people can
share files and peripherals such as modems, printers, tape backup drives, or CD-ROM
drives. When networks at multiple locations are connected using services available from
phone companies, people can send e-mail, share links to the global Internet, or conduct
video conferences in real time with other remote users.
When a network becomes open sourced it can be managed properly with online
collaboration software. As companies rely on applications like electronic mail and
database management for core business operations, computer networking becomes
increasingly more important.
EVERY NETWORK INCLUDES
At least two computers Server or Client workstation.
Networking Interface Card's (NIC)
A connection medium, usually a wire or cable, although wireless communication
between networked computers and peripherals is also possible.
Network Operating system software, such as Microsoft Windows NT or 2000 or
Novell NetWare or Unix / Linux
Compatibility
With the meteoric rise in demand for connectivity, the Internet has become a
communications highway for millions of users. The Internet was initially restricted to
military and academic institutions, but now it is a full-fledged conduit for any and all
forms of information and commerce. Internet websites now provide personal,
educational, political and economic resources to every corner of the planet.
INTRANET
With the advancements made in browser-based software for the Internet, many
private organizations are implementing intranets. An intranet is a private network
utilizing Internet-type tools, but available only within that organization. For large
organizations, an intranet provides an easy access mode to corporate information for
employees.
MAN (METROPOLITAN AREA NETWORKS)
The refers to a network of computers with in a City.
VPN (VIRTUAL PRIVATE NETWORK)
VPN uses a technique known as tunneling to transfer data securely on the Internet
to a remote access server on your workplace network. Using a VPN helps you save
money by using the public Internet instead of making long–distance phone calls to
connect securely with your private network. There are two ways to create a VPN
connection, by dialing an Internet service provider (ISP), or connecting directly to
Internet.
Client/server application design also lets the application provider mask the actual
location of application function. The user often does not know where a specific operation
is executing. The entire function may execute in either the PC or server, or the function
may be split between them. This masking of application function locations enables
system implementers to upgrade portions of a system over time with a minimum
disruption of application operations, while protecting the investment in existing hardware
and software.
-Something else to note about these cables is that they are defined in numbers also. The
bigger the number the better the protection from interference. Most networks should go
with no less than a CAT 3 and CAT 5 is most recommended.
-Now you know about cables we need to know about connectors. This is pretty important
and you will most likely need the RJ-45 connector. This is the cousin of the phone jack
connector and looks real similar with the exception that the RJ-45 is bigger. Most
commonly your connector are in two flavors and this is BNC (Bayonet Naur Connector)
used in thicknets and the RJ-45 used in smaller networks using UTP/STP.
UNSHIELDED TWISTED PAIR (UTP)
This is the most popular form of cables in the network and the cheapest form that
you can go with. The UTP has four pairs of wires and all inside plastic sheathing. The
biggest reason that we call it Twisted Pair is to protect the wires from interference from
themselves. Each wire is only protected with a thin plastic sheath.
10Base5, this is considered a thicknet and is used with coaxial cable arrangement such as
the BNC connector. The good side to the coaxial cable is the high-speed transfer and
cable segments can be up to 500 meters between nodes/workstations. You will typically
see the same speed as the 10Base2 but larger cable lengths for more versatility.
10BaseT, the “T” stands for twisted as in UTP (Unshielded Twisted Pair) and uses this
for 10Mbps of transfer. The down side to this is you can only have cable lengths of 100
meters between nodes/workstations. The good side to this network is they are easy to set
up and cheap! This is why they are so common an ideal for small offices or homes.
100BaseT, is considered Fast Ethernet uses STP (Shielded Twisted Pair) reaching data
transfer of 100Mbps. This system is a little more expensive but still remains popular as
the 10BaseT and cheaper than most other type networks.
10BaseF, this little guy has the advantage of fiber optics and the F stands for just that.
This arrangement is a little more complicated and uses special connectors and NIC's
along with hubs to create its network. Pretty darn neat and not to cheap on the wallet.
ETHERNET
Ethernet is the most popular physical
layer LAN technology in use today. Other LAN
types include Token Ring, Fast Ethernet, Fiber
Distributed Data Interface (FDDI),
Asynchronous Transfer Mode (ATM) and
LocalTalk.
Ethernet connection is popular because it
strikes a good balance between speed, cost and
ease of installation. These benefits, combined
with wide acceptance in the computer
marketplace and the ability to support virtually all popular network protocols, make
Ethernet an ideal networking technology for most computer users today. The Institute for
Electrical and Electronic Engineers (IEEE) defines the Ethernet standard as IEEE
There are topologies to think about when you get into networks. These are the bus , ring
,star , start bus and mesh.
BUS TOPOLOGY
In Bus bus topology, each node (computer, server,
peripheral etc.) attaches directly to a common cable. This
topology most often serves as the backbone for a network. In
some instances, such as in classrooms or labs, a bus will connect
small workgroups. Each node is daisy-chained (connected one
right after the other) along the same backbone, similar to C
hristmas lights. Information sent from a node travels along the
backbone until it reaches its destination node. Each end of a bus
network must be terminated with a resistor to keep the signal that
is sent by a node across the network from bouncing back when it
reaches the end of the cable.
RING TOPOLOGY
Ring, a ring topology features a logically closed loop.
Data packets travel in a single direction around the ring from one
network device to the next. Each network device acts as a
repeater, meaning it regenerates the signal. Like a bus network,
rings have the nodes daisy-chained. The difference is that the end
of the network comes back around to the first node, creating a
complete circuit. In a ring network, each node takes a turn
sending and receiving information through the use of a token.
The token, along with any data, is sent from the first node to the
second node, which extracts the data addressed to it and adds any
data it wishes to send. Then, the second node passes the token and data to the third node,
and so on until it comes back around to the first node again. Only the node with the token
is allowed to send data. All other nodes must wait for the token to come to them.
STAR TOPOLOGY
Star, in a star topology each node has a dedicated set
of wires connecting it to a central network hub. Since all
traffic passes through the hub, the hub becomes a central point
for isolating network problems and gathering network stati
stics. In a star network, each node is connected to a central
device called a hub. The hub takes a signal that comes from
any node and passes it along to all the other nodes in the
network. A hub does not perform any type of filtering or
routing of the data. It is simply a junction that joins all the
different nodes together.
LAN Architecture
The lowest layer of the IEEE 802 reference model corresponds to the physical layer of
the OSI model, and includes the following functions :
Encoding/ decoding of signals
Preamble generation/ removal (for synchronisation)
Bit transmission/ reception
The physical layer of the 802 model also includes a specification for the transmission
medium and the topology. Generally, this is considered below the lowest layer of the OSI
model. However, the choice of the transmission medium and topology is critical in LAN
design, and so a specification of the medium is included.
Above the physical layer are the functions associated with providing service to the LAN
users. These comprise :
The above functions are typically associated with OSI layer 2. The last function noted
above is grouped in to a logical link control (LLC) layer. The functions in the first three
bullet items are treated as a separate layer, called medium access control (MAC). The
separation is done for the following reasons:
The logic and mechanism required to manage access to a shared-access medium is
not found in the conventional layer-2 data link control.
For the same LLC, different MAC options may be provided.
MAC control : This field contains any protocol control information needed for the
functioning of the MAC protocol. For example, a priority level could be indicated
here.
Destination MAC Address : The destination physical attachment point on the LAN
for this frame.
Source MAC address : The source physical attachment point on the LAN for this
frame.
LLC : The LLC Data from the next higher layer.
CRC : The cyclic redundancy check field ( also known as the frame check sequence,
FCS, field). This is an error-detecting code, as we have seen in HDLC and other data
link control protocols
New cards are software configurable, using a software programs to configure the
resources used by the card. Other cards are PNP (plug and Play), which automatically
configure their resources when installed in the computer, simplifying the installation.
With an operating system like Windows 95, auto-detection of new hardware makes
network connections simple and quick.
Cabling
Cables are used to interconnect computers and network components together. There are 3
main cable types used today :
twisted pair
coaxial
fibre optic
The choice of cable depends upon a number of factors like :
cost
distance
number of computers involved
speed
bandwidth i.e. how fast data is to be transferred
Repeaters also allow isolation of segments in the event of failures or fault conditions. A
repeater works at the Physical Layer by simply repeating all data from one segment to
another.
Summary of Repeater features :
increases traffic on segments
have distance limitations
limitations on the number of repeaters that can be used
propagate errors in the network
cannot be administered or controlled via remote access
cannot loop back to itself (must be unique single paths)
no traffic isolation or filtering is possible
BRIDGES
Bridges interconnect Ethernet segments. Most bridges today support filtering and
forwarding, as well as Spanning Tree Algorithm. The IEEE 802.1D specification is the
standard for bridges.
During initialisation, the bridge learns about the network and the routes. Packets are
passed onto other network segments based on the MAC layer. Each time the bridge is
presented with a frame, the source address is stored. The bridge builds up a table which
identifies the segment to which the device is located on. This internal table is then used to
determine which segment incoming frames should be forwarded to.
The diagram above shows two separate network segments connected via a bridge. Note
that each segment must have a unique network address number in order for the bridge to
be able to forward packets from one segment to the other.
Bridges work at the Media Access Control sub-layer of the Data Link layer of the
OSI model.
Summary of Bridge features :
operate at the MAC layer (layer 2 of the OSI model)
can reduce traffic on other segments
broadcasts are forwarded to every segment
most allow remote access and configuration
often SNMP (Simple Network Management Protocol) enabled
loops can be used (redundant paths) if using spanning tree algorithm
small delays may be introduced
fault tolerant by isolating fault segments and reconfiguring paths in the event of
failure
ROUTERS
In an environment consisting of several network segments with differing protocols and
architectures, a bridge may not be adequate for ensuring fast communication among all of
the segments. A network this complex needs a device which not only knows the address
of each segment, but also determine the best path for sending data and filtering broadcast
traffic to the local segment. Such a device is called a router.
Routers work at the Network layer of the OSI model. This means they can switch and
route packets across multiple networks. They do this by exchanging protocol-specific
information between separate networks. Routers read complex network addressing
information in the packet and, because they function at a higher layer in the OSI model
than bridges, they have access to additional information.
Routers have access to more information in the packet than bridges, and use this
information to improve packet deliveries. Routers are used in complex network situation
because they provide better traffic management than bridges and do not pass broadcast
traffic. Routers can share status and routing information with one another and use this
information to bypass slow or malfunctioning connections.
The routing table found in routes contain network addresses. However, host
addresses may be kept depending on the protocol the network is running. A router uses a
table to determine the destination address for incoming data. The table lists the following
information :
All known network addresses
How to connect to other networks
The possible path between those routers
The cost of sending data over those paths
The router selects the best route for the data based on cost and available paths.
Nowadays, with the advent of 10BaseT, hub concentrators are being very popular. These
are very sophisticated and offer significant features which make them radically different
from the older hubs which were available during the 1980's. These 10BaseT hubs provide
each client with exclusive access to the full bandwidth, unlike bus networks where the
bandwidth is shared. Each workstation plugs into a separate port, which runs at 10 Mbps
and is for the exclusive use of that workstation, thus there is no contention to worry about
like in Ethernet.
In standard Ethernet, all stations are connected to the same network segment in bus
configuration. Traffic on the bus is controlled using CSMA (Carrier Sense Multiple
Access) protocol, and all stations share the available bandwidth.
10BaseT Hubs dedicate the entire bandwidth to each port (workstation). The W/S attach
to the Hub using UTP. The Hub provides a number of ports, which are logically
combined using a single backplane, which often runs at a much higher data rate than that
of the ports.
Ports can also be buffered, to allow packets to be held in case the hub or port is busy.
And, because each workstation has its own port, it does not contend with other
workstations for access, having the entire bandwidth available for its exclusive use.
The ports on a hub all appear as one Ethernet segment. In addition, hubs can be stacked
or cascaded (using master/ slave configurations) together, to add more ports per segment.
As hubs do not count as repeaters, this is a better solution for adding more workstations
than the use of a repeater.
EETP/BSNL Platinum Certification Course Version 1.0 June 2014 Page 22 of 31
For Restricted Circulation
IP Networking and Security(IP) Networking Concepts
Hub options also include an SNMP (Simple Network Management Protocol) agent. This
allows the use of network management software to remotely administer and configure the
hub.
Wireless LAN
A wireless local area network (LAN) utilizes radio frequency (RF) as an
alternative for a wired LAN. Wireless LANs transmit and receive data over the air,
without the use of any cable, combining the benefits of data connectivity and user
mobility.
Mobility: Wireless LANs can provide users with access to real-time information
and resources anywhere in their organization through designated access points. This
freedom to "roam" increases employee productivity as they move throughout the
building.
Installation Speed and Simplicity: Installing a wireless LAN system can be fast
and easy and eliminates the need to pull cable through walls and ceilings.
Scalability: Configurations for wireless LANs are easily changed and range from
peer-to-peer networks suitable for a small number of users to full infrastructure networks
of thousands of users that enable roaming over a broad area. Adding a user to the
network is as simple as equipping a PC or laptop with a wireless LAN adapter card or
USB device.
Wireless LANs use radio airwaves to communicate information from one point to
another without relying on any physical connection. Radio waves are often referred to as
radio carriers because they simply perform the function of delivering energy to a remote
receiver. The data being transmitted is superimposed (modulated) on the radio carrier so
that it can be accurately extracted at the receiving end.
End users access the wireless LAN through wireless LAN adapters. These are
mostly implemented as PC cards in notebook computers, PCI cards in desktop computers
or as USB devices. Wireless LAN adapters provide an interface between the client
network operating system (NOS) and the airwaves via an antenna.
MPLS works by prefixing packets with an MPLS header, containing one or more
'labels'. This is called a label stack. Each label stack entry contains four fields:
- 20-bit label value (This is MPLS Label)
- 3-bit Experimental field used normally for providing for QoS (Quality of Service)
Label A label identifies the path a packet should traverse and is carried or
encapsulated in a Layer-2 header along with the packet. The receiving router examines
the packet for its label content to determine the next hop. Once a packet has been
labelled, the rest of the journey of the packet through the backbone is based on label
switching.
Label Creation Every entry in routing table (build by the IGP) is assigned a
unique 20-bit label either per platform basis or per interface basis.
SWAP: The Incoming label is replaced by a new Outgoing label and the packet is
forwarded along the path associated with the new label.
PUSH : A new label is pushed on top of the packet, effectively "encapsulating"
the packet in a layer of MPLS.
POP :The label is removed from the packet effectively "de-encapsulating". If the
popped label was the last on the label stack, the packet "leaves" the MPLS tunnel.
LER : A router that operates at the edge of the access network and MPLS
network LER performs the PUSH and POP functions and is also the interface between
access and MPLS network, commonly know as Edge router.
LSR : An LSR is a high-speed router device in the core of an MPLS network,
normally called Core routers. These routers perform swapping functions and participate
in the establishment of LSP.
Ingress / Egress Routers: The routers receiving the incoming traffic or
performing the first PUSH function are ingress routers and routers receiving the
terminating traffic or performing the POP function are Egress routers. The same router
performs both functionality i.e. Ingress and Egress. The routers performing these
functions are LER.
FEC The forward equivalence class (FEC) is a representation of a group of
packets that share the same requirements for their transport. All packets in such a group
are provided the same treatment en route to the destination. As opposed to conventional
IP forwarding, in MPLS, the assignment of a particular packet to a particular FEC is done
just once, as the packet enters the network at the edge router.
Label Distribution Protocol (LDP): The LDP is a protocol for the distribution
of label information to LSRs in a MPLS networks. It is used to map FECs to
labels, which, in turn, create LSP. LDP sessions are established between LDP
peers in the MPLS network (not necessarily adjacent).
MPLS Operation : The following steps must be taken for a data packet to travel
through an MPLS domain. Label creation and distribution, Table creation at each router,
Label-switched path creation, Label insertion/table lookup and Packet forwarding. The
source sends its data to the destination. In an MPLS domain, not all of the source traffic
is necessarily transported through the same path. Depending on the traffic characteristics,
different LSPs could be created for packets with different CoS requirements.
In Figure 1, LER1 is the ingress and LER4 is the egress router.
MPLS Applications:
MPLS addresses today’s network backbone requirements effectively by providing
a standards-based solution that accomplishes the following:
1. Improves packet-forwarding performance in the network
2. MPLS enhances and simplifies packet forwarding through routers using Layer-2
switching paradigms.
3. MPLS is simple which allows for easy implementation.
4. MPLS increases network performance because it enables routing by switching at wireline
speeds.
5. Supports QoS and CoS for service differentiation
6. MPLS uses traffic-engineered path setup and helps achieve service-level guarantees.
7. MPLS incorporates provisions for constraint-based and explicit path setup.
8. Supports network scalability
Customer network - Consisted of the routers at the various customer sites. The
routers connecting individual customers' sites to the service provider network were called
customer edge (CE) routers.
In the MPLS VPN architecture, the edge routers carry customer routing
information, providing optimal routing for traffic belonging to the customer for inter-site
traffic. The MPLS-based VPN model also accommodates customers using overlapping
The MPLS VPN domain, like the traditional VPN, consists of the customer
network and the provider network. The MPLS VPN model is very similar to the
dedicated PE router model in a peer-to-peer VPN implementation. However, instead of
deploying a dedicated PE router per customer, customer traffic is isolated on the same PE
router that provides connectivity into the service provider's network for multiple
customers. The components of an MPLS VPN shown in Figure are highlighted next.
CE routers, which are routers in the customer network that interface with the
service provider network. In Figure , the CE routers for Customer A are CE1-A and CE2-
A, and the CE routers for Customer B are CE1-B and CE2-B.
PE routers, which are routers in the provider network that interface or connect to
the customer edge routers in the customer network. PE1 and PE2 are the provider edge
routers in the MPLS VPN domain for customers A and B.
P routers, which are routers in the core of the provider network that interface
with either other provider core routers or provider edge routers. Routers P1, P2, P3, and
P4 are the provider routers.
VPN
Depending on the service provider's participation in customer routing, the VPN
implementations can be classified broadly into one of the following:
Overlay model
Peer-to-peer model
Dial VPN
Overlay model
Peer-to-peer model
The peer-to-peer model was developed to overcome the drawbacks of the Overlay
model and provide customers with optimal data transport via the SP backbone. Hence,
the service provider would actively participate in customer routing. In the peer-to-peer
model, routing information is exchanged between the customer routers and the service
provider routers, and customer data is transported across the service provider's core,
optimally. Customer routing information is carried between routers in the provider
network (P and PE routers) and customer network (CE routers). The peer-to-peer model,
consequently, does not require the creation of virtual circuits. The CE routers exchange
routes with the connected PE routers in the SP domain. Customer routing information is
propagated across the SP backbone between PE and P routers and identifies the optimal
path from one customer site to another.
1.15 SUMMARY
TCP/IP suite has become the industry-standard method of interconnecting hosts,
networks, and the Internet. As such, it is seen as the engine behind the Internet and
networks. Therefore, understanding the concept of TCP/IP is important from the
perspective of understanding the working of Internet. Without a network, you can access
resources only on your own computer.
These resources may be devices in your computer, such as a folder or disk drive,
or they may be connected to your computer, such as a printer or CDROM drive. These
devices, accessible only to you, are local resources. Networking allows you to share
resources among a group of computer users.