Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Definition:
Inter-connection between two or more computers via a
transmission media for faster and easier communication and
resource sharing
Sharing peripherals
Electronic Mails
• It consists of a mail program that allows the user to send and
receive messages
• It provides a messaging system to support store-and-forward
functions.
• The system contains a dedicates computer called mail
server that acts as the central repository for incoming &
outgoing messages
• The central repository stores the messages submitted by a
user and waits until the other user logs on and then sends
him the messages.
• The users can send and read messages by using client-
messaging software provided by the messaging software.
• Some of the commonly used network messaging software is
Microsoft Exchange and Mail, Lotus CCMail and Notes and
Novell GroupWise.
NETWORKING COMPONENTS:
Computer Resources:
• Printers
• Scanners
• Storage devices (e.g. HDD, FDD, CD-ROM, etc)
• Fax devices
• Electronic mails
• Modems
• Files, folders & documents
Types of Resources:
• Local Resources
• Remote Resources
•
Resource Accessibility:
• Locally accessible resource
• Remotely accessible resource
2. Transmission Media – Any medium to exchange data or
information
Types of Media:
• Wired Media / Bounded Media
• Wireless Media / Unbounded Media
A file server allows the users on a network to share remote files, folders
and storage devices
Classification of server:
• Dedicated server: A server in which local resources are not
accessible once the server program is invoked on it
• Centralized
• Distributed
Advantages:
• Network is faster and cheaper
• Easiest way to build a network
• No network administrator is required
• User-level security
Disadvantages:
• No central administration
• Less security
Client/Server Networking:
• A computer is dedicated as a server that provides services to
multiple computers acting as clients or workstations over the
network
• An administrator is assigned to control the overall network and its
security
• Implementation of server application and client application is
mandatory
• All PCs depend on the central server that does the majority of
work
• A request from the client to the server contains the following
information –
• The server address
• The request
• The return address
Advantages:
• Strong central security
• Central file repository provides easy data backup
• Ability of servers to pool available hardware and software,
lowering overall costs
• Ability to share expensive equipments, such as laser printers
• Optimized dedicated servers that provide faster sharing of
network resources
Disadvantages:
• Implementation is costly and complicated
• Dedicated Network Administrator is required, which is again
a costly affair
• When the server is down, all the network services are
unavailable
NETWORK CLASSIFICATIONS:
LAN:
• A network of computers –
Within a room
Between rooms within a floor
Between floors within a building
Between buildings within a campus
MAN:
• A network of multiple LANs (a LAN of LANs)
WAN:
• A network of computers that expands throughout the world
INTERNETWORK
• When a number of smaller network segments are interconnected
using some networking devices such as ROUTERS to form a large
network, we call it Internetwork
• Internet is the perfect example of Internetwork
Case Study – I
Problem
Suggested Solution
Point-to-Point
• A one to one or back to back
communication where only two devices share a connection
• A specific level of bandwidth is assured to
the user as there are only two devices that share the
connection
Multipoint
• Three or more computers share the connection
• The bandwidth available for each user depends upon
the number of computers on the network
• Bandwidth changes drastically depending on the
network load
Types of Multipoint Physical Topology –
a. Bus
b. Star
c. Ring
d. Mesh
e. Hybrid
i. Star-Bus
ii. Bus-Ring
iii. Star-Ring
iv. Bus-Star-Ring
Bus Topology Ring Topology
Hybrid Topology:
•
(All People Seem To Need Data Processing / Please Do Not Throw
Sausage Pizza Away)
• Each layer performs its role independently but in coordination with
the overall goal of communication
Peer Entities:
Layers at the same level in two different machines on the network are
called Peer Entities. For example, the Application Layer on one machine
is the Peer Entity of the Application Layer on the other machine.
Peer Communication
Protocol:
Well-defined set of rules and conventions governing the format of
messages required for the peer entities on the network to communicate
with each other is called the PROTOCOL.
Data Flow:
• Encapsulation
• Decapsulation
Presentation Layer
• Provides appropriate data presentation
• Provides data encryption, compression and translation services
• Keeps data in the form of messages
• Services – ASCII, JPEG, MPEG, GIF, TIFF, RTF, BMP, MIDI, etc.
Session Layer
• Provides end-to-end connection
• Establishes, synchronizes, maintains & terminates a connection
(session)
• Practical functions such as security authentication, connection ID
establishment, data transfer, acknowledgements and connection
release take place
• Provides dialog control – keeps different application data separate
• Keeps data in the form of messages
• Services – Remote Procedure calls (RPC) & Network File System
(NFS)
Transport Layer
• Provides reliable and unreliable delivery (flow control)
• Performs error correction before transmission
• Keeps data in the form of segments
• Multiplexing connections
• Protocols – TCP, UDP, SPX
Network Layer
• Provides routing for packets
• Provides logical addressing
• Keeps data in the form of packets
• Protocols – IP, IPX, DECnet, AppleTalk, GRP, IGRP, EIGRP,
OSPF, etc.
Data Link Layer
• Provides access to media using MAC address
• Performs error detection but no error correction
• Combines packets into bytes and bytes into frames
• Keeps data in the form of frames
Physical Layer
• Moves bits between devices
• Specifies the type of cable, pin-out of cables, type of connectors,
type of interfaces
• Defines the physical topology
• Keeps data in the form of bits
LAYER – 1: THE PHYSICAL LAYER
FUNCTIONS:
• Bottom-most layer of the OSI Model
• Deals with physical and measurable entities that follow the low
level protocols for transmitting data
• Encodes data into bits and decodes bits into data (converts the
outgoing data bits into electrical signals & incoming signals into
binary data)
• Communicates directly with various types of actual communication
media
• Specifies the electrical, mechanical, procedural and functional
requirements for activating, maintaining and de-activating a
physical link between end systems
• Specifies the type of cable, pin-out of details, type of connectors
and the type of interfaces
• Defines the physical topology
PHYSICAL FEATURES:
1. Electrical Properties
2. Data Signaling and Encoding
3. Physical Topology
4. Transmission Media
5. Transmission Devices
6. Data Synchronization
7. Data Bandwidth
Electrical Properties:
1. Resistance – Electrical resistance is the result of friction offered
by the material of the cable that carries the signal. Thicker wires
have low resistance than the thinner wires. Resistance results in
the drop of voltage and the subsequent loss of data. So the cables
used must not be thin enough for the electrical signals to dissipate
due to high resistance.
1. Digital Signaling –
• Represents information as a discrete flow of voltage with
respect to time
• Uses the full capacity of the transmission media
• Cannot travel long distances as the signal strength becomes
weak
• A high voltage represents the bit value as 1
• A low voltage represents the bit value as 0
• Hence, a digital signal has one of two states – either high/1
or low/o
• As the signal jumps from one level to another, it is measured
during a time slot called Bit Interval
• The presence or absence of a pulse determines the bit value
at each interval
• There are 2 types of Digital Encoding methods – Current
State & State Transition
i. Current State –
Measures the presence or absence of a voltage
level during a bit interval
The sending and the receiving devices must be
synchronized to use the same bit interval
2. Analog Signaling –
• Represents information as a continuous and
variable flow of voltage with respect to time
• Does not use the full capacity of the
transmission media; hence multiple signals can be
transmitted over a single transmission media
• Can travel a long distance without
deteriorating the quality of the signal
• Signals are smooth and rhythmic, hence an
ideal platform for data communication
• Analog waves are measured according to its
features - Amplitude, Frequency and Phase
• There are 3 types of Analog Encoding
methods –
Physical Topologies:
• Point-to-Point
• Multipoint – Bus, Star, Ring, Mesh, Hybrid
Transmission Media:
• Media is anything that carries a message
• Transmission media are the elements that establish the physical
link over which signals are exchanged between the transmitting
and the receiving stations
Transmission Devices:
Provides basic data communication functions –
a) Translation (frames into bits & vice-versa)
b) Transformation (digital signal into analog
signal & vice-versa)
c) Transmission (one networking device to
another)
3. CSU/DSU
Such devices are used if the transmission media is also digital
(leased line & T-1 circuit)
Consists of 2 parts –
a) CSU – Channel Service Unit
Line management (grounding & loop-back testing)
B. Networking Devices
1. Network Interface Cards (NICs)
a) Ethernet
b) Token Ring
c) Fiber Distributed Data Interface (FDDI)
2. Media Connectors
a) BNC
b) RJ-45 / RJ-11
c) ST / SC
3. Repeaters
a) Amplifiers
b) Signal Regenerator
4. Hubs
a) Passive Hubs
b) Active Hubs
c) Intelligent Hubs
d) Stackable Hubs
5. Multi-Station Access Units (MSAU)
Data Synchronization:
Data synchronization is the process of establishing consistency
among data on remote sources and the continuous harmonization of the
data over time.
Data Bandwidth:
LAYER – 2: THE DATA LINK LAYER
FUNCTIONS:
• Receives raw data bits from the Physical Layer
• Transforms the data bits into organized structure called frames
• Adds control information to the data frame (Preamble – 7bytes, Start Frame Delimiter/Synch
– 1byte, DA – 6bytes, SA – 6bytes, Network Layer Protocol Identifier – 2bytes, Data Length –
variable, Frame Check Sequence/CRC – variable) – [SHOW DIAGRAM]
• Uses MAC address
• Performs error detection but no error correction
MAC Functions:
• Physical Addressing
• Media Access Method
• Logical Topology
Physical Addressing:
• A protocol independent hardware address
• Also called the MAC Address
• A unique 12-digit hexadecimal (48 bit) identifier of a particular PC on a network
• Regulated by IEEE Standards Organization
• Hard-coded within the EEPROM of the NIC
• No 2 NICs can exit with the same MAC Address
• A MAC Address is divided into 2 parts –
a) 1st six Hex. Digits identify the vendor of the NIC (Organizationally Unique Identifier –
OUI)
b) 2nd six Hex. Digits uniquely represents the NIC
Each data frame contains 2 MAC Addresses –
A source MAC address
A destination MAC address
• Again, destination MAC address can be of 3 types – [SHOW 3 DIAGRAMS]
a) Unicast MAC Address
b) Multicast MAC Address (creating groups)
c) Broadcast MAC Address (turning all bits to 1)
Contention:
A protocol that works on physical bus topology with standard
Ethernet networks
All transmitting devices have equal access to the network media
Data may be lost or damaged due to possible collisions
Collisions occur when 2 devices try to transmit at the same
time
Collisions result in disrupting each other’s data signaling
[SHOW DIAGRAM]
Modern method to reduce the chances of possible collisions – CSMA (Carrier Sense Multiple
Access)
Carrier Sense – Sensing the transmitting media for any existing signal
If no signal is sensed, sending station assumes the media to be free and starts transmitting
In the event of any existing signal, sending station backs off and waits until the media becomes free
Multiple Access – multiple stations can access the media at the same time
2 types of CSMA:
• CSMA/CD – CSMA with Collision Detection
• CSMA/CA – CSMA with Collision Avoidance
Procedure for CSMA/CD:
1. NIC of the sending station first senses for any exiting transmission within the media
2. If the media is free it starts transmitting data; if not, it backs off and waits for the
media to be free
3. After transmitting data, NIC listens to the media to detect any collision
4. If a collision is detected, a collision signal is sent and other NICs stops transmitting
5. All NICs will wait far a random delay of time before retransmitting
6. If collision occurs for the 2nd time, transmitting stations repeat the above steps but
doubles up the random time-out before they again retransmit
7. Once the transmissions are successfully done, other machines are allowed to
transmit
Logical Topology:
• Defines the way data is moved through a network
• Types are same as the physical topology
• Information flow specifies the type of topology to use
LLC Functions:
• Flow Control
• Error Checking
• Provides both Connection-less & Connection-oriented Services
Connection Services:
• Connectionless Services – sending and receiving frames without any flow control or error
checking or sequence control
• Connection-oriented Services – provides strict rules for flow control, error checking and
sequencing with proper acknowledgement
NOTE:
Physical Topology Logical Topology
APPLETALK:
LOCALTALK:
ETHERTALK:
TOKENTALK:
ARCNET:
• Full form – Attached Resource Computer Network
• Developed by Datapoint Corporation in 1970s
• Provides automatic reconfiguration to overcome various faults in a small network
• Economical, simple and robust technology
• Can support 2047 nodes per network
• Data transmission speed – 20 to 100 Mbps
• Uses token passing method of media access over logical bus topology
• Physical topology – star or bus
• Computers must possess token before transmission of data
• Data packet contains up to 508 bytes of data
• ARCnet Addressing:
i. Every ARCnet NIC has 8-bit number as a unique address
ii. Range of 1 – 255 is used for node addressing, 0 is used for broadcasts
iii. Token passing starts with the machine having the lowest node address
ARCnet with Coaxial Configuration:
i. Coaxial Cables used – RG-62 (93 Ohm) with BNC connector
ii. Maximum number of nodes – 255
iii. Maximum network distance – 6000 m
iv. Maximum segment distance – 300 m (using active hub)
v. Maximum segment distance – 30 m (using passive hub)
• ARCnet with Twisted Pair Configuration:
i. UTP with RJ-11 or RJ-45 Connectors
ii. Maximum number of cascaded hubs – 8
iii. Maximum number of nodes – 255
iv. Maximum network length – 6000 m
v. Maximum segment length – 120 m
DATA LINK LAYER DEVICES:
• Switches
• Bridges
Switches:
Operate at the Data Link Layer
More intelligent than hubs –
• Inspect the data packets as they are received
• Determine the source and the destination address of that packet
Appropriate delivery of the packet – conserve network bandwidth
Ethernet networks rely on contention-based technology (more collision with more devices)
To avoid Ethernet collision switched Ethernet is used (hubs are replaced by switches)
• HUBS – Single Collision Domain, Single Broadcast Domain, Division of Bandwidth
• SWITCHES – Multiple Collision Domain, Single Broadcast Domain, Equal Bandwidth Access
Address Learning:
• Application Specific Integrated Circuits (ASIC) Chip is used to build and maintain filter table
(MAC Table)
• When a switch is powered on MAC Table is empty
• When a device transmits, the connected interface (port) receives the frame
• The frame’s source address is placed in the MAC Table against the corresponding interface
• The frame is then flooded out to every port except the source port as the destination port is
unknown
• If a device responds against this broadcasted (flooded) frame, the ASIC chip promptly
records the source address of the responded frame along with the corresponding port
number into the MAC Table
• The two devices can now make a point-to-point connection and none other attached devices
will receive the frame
• If the two point-to-point devices don’t communicate again within a certain amount of time, the
switch will flush their entries from the MAC database
Forward/Filter Decisions:
• When a frame arrives at switch port, the destination MAC Address is compared to the MAC
database
• If the MAC Address matches, the frame is only sent out to the correct exit interface
• If the destination MAC Address is not matched, the frame is flooded out (broadcasted) to all
active interfaces except the source interface
LAYER – 3: THE NETWORK LAYER
FUNCTIONS:
• Logical addressing
• Switching
• Routing
• Network flow control (congestion control)
• Network sequencing
The Network layer transports traffic between devices that are not locally attached by –
• Managing device addressing
• Tracking device locations on the network
• Determining the best path to move data
DEVICES:
• Routers
• Brouters
• Layer 3 Switches
Most networks communicate using protocols that must have their own addressing schemes –
• TCP/IP (Transmission Control Protocol / Internet Protocol)
• IPX (Internetwork Packet Exchange)
IP Terminology
1. Bit – a binary digit, either 1 or 0
2. Byte – a group of 8 bits arranged in a sequence. A byte may also consists of 7 bits
depending on whether parity is used
3. Octet – an arrangement of 8 bits. Byte & Octet are completely interchangeable terms
IP Address
This is a numeric identifier assigned to each machine on an IP network
It designates the specific location of a device on the network
It is a software address
An IP Address allows a host on one network to communicate with a host on a different
network, regardless of the type of LANs
Currently we are using version 4 of IP addressing that consists of 32 bits of information
These 32 bits are divided into 4 sections of 8 bits (called octets), each separated by a period
called a DOT
An IP address can be depicted into one of the 3 methods:
• Dotted-decimal: 172.16.30.56
• Binary: 10101100.00010000.00011110.00111000
• Hexadecimal: AC.10.1E.38
Note: IP address in Hex form is stored in Windows Registry
The IP addressing scheme is structured in a three-level hierarchical order: (Class A & B)
• Network part –> network address
• Subnet part –> subnet address
• Host part –> host address
In some cases, two-level hierarchical structure is also used: (Class C)
• Network part
• Host part
Broadcast Address
• It is the numeric identifier used to send information to all nodes over a network, or to all
nodes of all networks
Example
IP address : 10.16.2.4 172.16.30.56 192.168.10.20
Network address : 10.0.0.0 172.16.0.0 192.168.10.0
Host address : 0.16.2.4 0.0.30.56 0.0.0.20
Broadcast address : 10.255.255.255 172.16.255.255 192.168.10.255
Classification of IP Address
Based on the rules defined by InterNIC IP addresses can be classified into following 5 network
classes:
To ensure efficient routing, internet designers defined a mandate for the leading-bits section (left-
most octet or 1st octet) of the IP address for each different network class
InterNIC defines that the left-most bits (also called the Most Significant bits) of the 1st octet must be in
the following order:
Class A = 0
Class B = 10
Class C = 110
Class D = 1110 (multicasting)
Class E = 11110 (scientific R&D)
The decimal value of any octet is based on the number of bits that are turned on or off
For example: when all the bits are turned off, we get –
00000000 = 0x27+0x26+0x25+0x24+0x23+0x22+0x21+0x20
= 0+0+0+0+0+0+0+0 = 0
But it is very important to note that all bits of the network part and all bits of the host part cannot be
turned all 0s or all 1s, as all 0s means nothing and all 1s means the broadcast.
SUBNETTING IP ADDRESSES
Subnetting – logical division of physical IP addresses; a method to break down a larger network into
a bunch of smaller ones
Benefits:
• Reduced network traffic
• Optimized network performance
• Simplified network management
• Efficient connection of large geographical distances
We have, a + b + c = 32
SWITCHING
ROUTING
LAYER – 4: THE TRANSPORT LAYER
FUNCTIONS:
• Provides reliable and unreliable delivery (flow control)
• Performs error correction before transmission
• Keeps data in the form of segments
• Multiplexing connections
• Protocols – TCP, UDP, SPX
LAYER – 5: THE SESSION LAYER
FUNCTIONS:
• Provides end-to-end connection between communicating application programs
• Allows two networked resources to hold ongoing communication across a network
• Applications on each end of the session are able to exchange data for the duration of the
session
• This layer establishes, synchronizes, maintains & terminates a connection (session)
• Practical functions such as security authentication, connection ID establishment, data
transfer, acknowledgements and connection release take place
• Provides dialog control – keeps different application data separate
• Keeps data in the form of messages
• Services such as Remote Procedure calls (RPC) & Network File System (NFS) and API
such as NetBIOS are typically used on the Session Layer
Connection Establishment:
i. The sender tries to communicate to the receiver
ii. The receiver asks for connection authentication from the sender
iii. The sender provides with the user login name and password for
authentication
iv. Once the sender is recognized, they both agree to communicate
v. A connection ID number is established using the Transport Layer Service
Address
vi. They then agree upon the type of service required and the duration of service
vii. Then the entity that is going to begin the conversation is determined
viii. Both the end stations coordinate upon message sequencing,
acknowledgement and retransmission procedures, represented as Session Layer Error
Checking
ix. This layer maintains the line of communication and ensures reliable
conversations
Once the above tasks have been accomplished and the connection has been opened, data transfer
begins
Data Transfer:
i. Session layer messages are controlled and ensures productive conversations
ii. Data transfer occurs through a specific Dialogue Control between the two networked entities
iii. Dialogues can occur in one of the three ways –
• Simplex
• Half-Duplex
• Full-Duplex
iv. During data transfer, the session layer is responsible for ACK or NACK
v. This reliability feature ensures that lower-layer protocols keep track of which messages
belong to which upper-layer services
vi. This layer provides error-checking algorithm that calls for the resumption of interrupted
communication
vii. Data transfer continues throughout the life of the conversation
Simplex Communication:
• It is only a one-way communication
• Only one device is allowed to transmit, while all other devices can only receive
• The transmitting device cannot receive and the receiving devices cannot transmit
• Full bandwidth of the channel is utilized for transmitting the signal
Half-Duplex Communication:
• Each device can transmit and receive, but not at the same time
• The transmitting device cannot receive while transmitting and the receiving device cannot
transmit while receiving
• Full bandwidth of the channel is available to the transmitting device
• Only one channel is required for both transmission and reception and support bi-directional
communication
Full-Duplex Communication:
• Every device is allowed to transmit and receive at the same time
• Two channels are required – one for transmission and the other for reception
Connection Release:
• Connection must be released to make room for future conversations
• The process can be accomplished by either of the two –
a) Planned Connection Release
b) Accidental Connection Release
Once the networking connection has been established and data transfer begun, focus shifts to the
Presentation Layer, where the data is translated into a mutually agreed-upon format
LAYER – 6: THE PRESENTATION LAYER
FUNCTIONS:
• Provides appropriate data presentation
• Provides data encryption, compression and translation services
• Keeps data in the form of messages
• Services – ASCII, JPEG, MPEG, GIF, TIFF, RTF, BMP, MIDI, etc.
LAYER – 7: THE APPLICATION LAYER
FUNCTIONS:
• Provides a user interface
• Provides file, printer, message, database & application services
• Defines how interaction occurs between network services (applications) and the network
• Keeps data in the form of messages
• Services – telnet, ftp, web browsers, e-mails, word processing, etc.
NET WORK CARD DRIVERS
• Driver: Software used by a hardware device to communicate with the Operating System
• NIC Driver: Software used by the NIC to communicate with the Operating System. Also
called MAC Driver
Sources of Drivers:
• Operating System in-built drivers
• Model-specific drivers supplied by the NIC manufacturers (support different Operating
Systems)
• Newer and upgraded version available from the vendors’ web sites
Automatic Installation
‘New Hardware Found’ -> Insert Driver Disk
As per of OS Installation
Resources Required:
• NIC drivers use certain computer resources –
• RAM
• DMA Channel
• I/O Port
• IRQ
Driver Interfaces:
• Open Driver Interface (ODI)
• Network Driver Interface Specifications (NDIS)
TRANSPORT PROTOCOLS
Protocol:
• Agreed-upon format of messages at each layer
• Rules and conventions for transmitting data between two devices
• Determines the type of error checking process
• Determines the data compression method
• Determines the method of acknowledgement
Protocol Stack / Protocol Suite:
• Collection of protocols and the order in which they work together
• Communicating machines must use a common protocol stack for flawless communication
• Most common protocol suites are –
TCP/IP
IPX/SPX
NetBEUI
TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP / IP):
Subnet Mask –
Determines local or remote network
Default Gateway –
IP address of the attached router interface
Limits the device to communicate only within the local
network