Friday, March 29, 2019

Concepts of Computer Networking

Concepts of Computer Ne dickensrkingCHAPTER 1 communicateING CONCEPTSNETWORKING BASICSAt its most elementary level, a computer net profit consists of both computers connected to either(a)(prenominal) new(prenominal) by a stock system that run finisheds them to sh ar info. All computer engagementing, no matter how sophisticated stems from that h mavenst system. While the idea of connecting ii computers by a cable may non seem extraordinary, inretrospect it has proven to be a major movement in communications.Computer meshing arose as an answer to the fill to dish turn kayoed info in a timely fashion. Personal computers atomic scrap 18 powerful tools that rear process and manipulate large amounts of selective entropy quickly, but they do not on the wholeow users to sh atomic number 18 that data efficiently. Before mesh topologys, users directed either to yarn-dye break through documents or copy document tears to a disk for an otherwise(prenominal)s t o blue-pencil or use them. If others made changes tothe document, thither was no easy stee rout to merge the changes. This was, and still is, cognize as fashioning in a stand-al angiotensin converting enzyme environment.TYPES OF NETWORKSComputer vanes rump be categorized in the adjacent types.LOCAL AREA NETWORK (local argona engagement)A local ara meshing (LAN) supplies mesh topologying capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing re authors like files, printers, games or other maskings. A LAN in turn much connects to other LANs, and to the ne cardinalrk . The most common type of local atomic number 18a mesh is an Ethernet LAN. The smallest home LAN can invite hardly two computers a large LAN can accommodate many thousands of computers. Many LANs be divided into logical groups called subnets.METROPOLITAN AREA NETWORK (MAN)MAN stands for metropolitan atomic numbe r 18a engagement .It is a internet of kinks inside an ara of bingle to ten kilometers or with in a city. It may be a single network such as a cable telly network or it may be a means of connecting a come of LANs into a larger network so that resources may be considerd LAN to LAN as well as doohickey to whirl.WIDE AREA NETWORK ( demented)A WAN stand for all-encompassing area network .It is spread finished out the world. A WAN that is wholly owned and apply by a single confederacy is often referred to as an enterprise network. It can connect computers and other devices on opposite sides of the world. A WAN is made up of a number of interconnected LANs. Perhaps the ultimate WAN is the Internet.INTRANETAnintranetis a tete-a-tetecomputer networkthat usesInternet Protocoltechnologies to securely share any part of an organizations culture or operational systems within that organization. The limit is used in contrast tointernet, a network mingled with organizations, and s o unityr refers to a network within an organization. both(prenominal)times the term refers entirely to the organizations internal vanesite, but may be a more extensive part of the organizations in plaster castation technology infrastructure. It may host eight-fold private weather vanesites and constitute an burning(prenominal) comp championnt and focal commove of internal communication and collaboration.EXTRANETAnextranetis a private network that usesInternet communications communications protocols,networkconnectivity. An extranet can be viewed as part of a companysintranetthat is all-inclusive to users outside the company, commonly via theInternet. It has as well been describe as a subject of mind in which the Internet is perceived as a stylus to do liftiness with a selected company of other companies (business-to-business, B2B), in closing off from all other Internet users. In contrast,business-to-consumer(B2C) archetypes involve known bonifaces of one or more com panies, communicating with previously unknown consumer users. netWORKAn Internetwork is a charm of two or more LANs connected by WANs. Internworks are referred to interchangeably as data networks or simply networks. The most popular internetwork is the Internet which is blossom forth to public.COMPONENTS OF NETWORKA data communication system has two main components-HARDWARE COMPONENTSDevices and media are the physiological elements or hardware of the network Hradware is often the visible components of the network platform such as a laptop, a PC or swtich etc used to connect the devices. Ocassionally some components competency not be so visible.DEVICESDevices of the network can be of two types that are the end devices and the intermediary devices, we explain both the types-END substance abuser DEVICESAn end use device refers to a piece of equipment that is either the ousce or the culture of a message on a network. Network users usaully only see or touch an end device, which is most often a computer. Another can generic term for an end device that dispatchs or receives messages is a host. E.g host and end devices are Printers, Computers, Scanners, Webcams etc.INTERMEDIARY DEVICES intercessor devices connect the indivisual hosts to the network or can connect multiple networks to form an internetwork. Intermediary devices are not all the self alike(p)(prenominal). Some work deep cut back the LAN to perfom faulting turns and others help thoroughfare messages in the midst of networks. Example of intermediary devices are Switches, Hubs and Routers etc.NETWORK MEDIACommunication crossways a network is carried on a medium. The medium imparts the channel all over which the message travels from source to terminal figure. The three main types of media in use in a network areCOPPERA twisted pair cable unremarkably used as a medium inside a LAN environment.FIBEROPTICSMade up of glass or plastic fibers in a vinyl coating usually used for immense runs in a LAN and as a trunk.WIRELESSIt connects local users through air employ electromagnetic waves.SOFTWARE COMPONENTSSoftware components can be divided in to two parts, function and processes.SERVICESA network service provide in data formation in responce to a request. Services imply many of the common netowrk finishs people use every day, like netmail hosting services and web hosting services. For an instance we can throw example of bumpkin enterprise, they provide mail services as well as web services, there are a number of companies offering these kind of services.PROCESSESProcesses provide the funtionality that directs and moves the messages through the network. Processes are less obvious to us ut are critical to the opeation of networks. For example viewing a webpage invokes one network process, clicking on a hyperlink causes a web browser to pass with a web server, in the identical way many network processes can take place at the same time.NETWORK TOPOLOGIESTopology of a network is the geometrical repre displaceation of the relationship of all the links and linking devices to one another. somatic TOPOLOGIESThere are quartet basic natural topologies possible mesh, star, bus, and ring. profits TOPOLOGYIn a mesh topology every device has a dedicated point to point connection to every other device .A fully connected mesh network therefore has n(n-1)/2 physiologic channels to link n devices .STAR TOPOLOGYIn star topology each device has a dedicated point to point connection only to a central controller usually called a hub . The devices are not directly connected to each other .Unlike a mesh topology ,a star topology does not allow direct traffic amidst devices the controller acts as an exchange if one device wants to send data to another it sends the data to the controller which consequently relays the data to the other connected device.BUS TOPOLOGYA bus topology on the other hand is multi point one long cable acts as a back bone to link all the d evices in a network nodes are connected to the bus cable by drop lines and smashers a drop line is a connection running betwixt the devices and the main cable a tap is a connector that either splices into the main cable or punctures the cover of a cable to create a contact with the metallic core. noise TOPOLOGYIn a ring topology each device has a dedicated point to point connection only with the two devices on either side of it . A signal is passed along the ring in one direction from device to device until it reaches to its coating protocols. synthetical TOPOLOGIESThe Logical topology defines how the systems communicate across the sensible topologies. There are two main types of logical topologiesSHARED MEDIA TOPOLOGYIn a shared media topology, all the systems have the ability to access the physical layout whenever they need it. The main advantage in a shared media topology is that the systems have unrestricted access to the physical media. Of course, the main disadvantage to this topology is collisions. If two systems send tuition out on the wire at the same time, the mailboats collide and kill both mailboats. Ethernet is an example of a shared media topology. minimal BASED TOPOLOGYThe token-based topology works by using a token to provide access to the physical media. In a token-based network, there is a token that travels around the network. When a system needs to send out big buckss, it grabs the token off of the wire, attaches it to the packets that are send, and sends it back out on the wire. As the token travels around the network, each system examines the token. When the packets arrive at the destination systems, those systems copy the information off of the wire and the token continues its travel until it gets back to the sender. When the sender receives the token back, it pulls the token off of the wire and sends out a new empty token to be used by the next machine. protocolSIn information technology, a protocol (from the Greek protocollon , which was a leaf of paper glued to a manuscript volume, describing its contents) is the special execute of rules that end points in a telecom connection use when they communicate. Protocols equal at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. In the standard vex known as Open Systems Interconnection (OSI), there are one or more protocols at each tier in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocols are often described in an industry or international standard.NETWORK protocolSFor devices to communicate over the network, they must follow unlike protocols that perform the many tasks to be completed. The protocols define the interestThe format of the messageThe way intermediary dvices share information about the way to the destinationThe method to handle update me ssages between intermediary devicesThe process to initiate and terminate communications between hostsINTERACTION OF PROTOCOLSInteraction between protocols can be clearly still by a simple example, the way that a web server and a web knob interacts. HTTP defines the formatting and content of the requests and responses exchanged between the client and server. Both the client and server implements HTTP as part of the application. The HTTP protocol relies on other protocols to govern how the message are behaveed between the client and server. transmission control protocol is the captivate protocol that divides the HTTP messages in to smaller pieces to be displace to the destination client, it is also responsible for controlling the size and rate at which messages are exchanged between the client and the server. Another protocol called IP is responsible for taking the formatted segments from transmission control protocol, encapsulating them into packets, assigning the appropriate c all upes and selecting the best path to the destination host.TECHNOLOGY INDEPENDENT PROTOCOLSProtocols that guide the network data are not dependent on any unique(predicate) technology to carry out the task. Protocols describe what must be done to communicate, not how the task is to be completed.This is the reason that enables different kind of devices such as mobilizes and computers to use the same network infrasturcture to communicate.PROTOCOLS AND REFRENCE vexSNetworking professionals use two networking pretences to comminicate within the industry, they are protocol models and cite models. Both were created in the 1970s.A protocol model is a model that closely matches the structure of a particular protocol suite. The hierarhical set of think protocols in a suite typically repre moves all the functionality required to user interface the human network with the data network. The transmission control protocol/IP model is a protocol model because it describes the functions tha t occur at each tier of protocols with in the protocol suite.A refrence model provides a common referecen for maintaining the consistency within alkl types ofn etwork protocols and services. The primary function of a refercen model is to aid in clearer reasonableness of the functions and process involved. The OPEN SYSTEMS INERCONNECTION (OSI) the most well known grapheme model.OSI MODELIn 1978, the International Organization for Standardization (ISO) released a set of specifications that described network architecture for connecting dissimilar devices. The original document applied to systems that were open to each other because they could all use the same protocols and standards to exchange information. use horizontal surfaceThe topmost tier of the OSI reference model, is the application tier. This layer relates to the services that directly defy user applications, such as software for file transfers, database access, and e-mail. In other words, it serves as a window through which application processes can access network services. A message to be sent across the network enters the OSI reference model at this point and exits the OSI reference models application layer on the receiving computer.PRESENTATION LAYERThe presentation layer, defines the format used to exchange data among networked computers. Think of it as the networks translator. When computers from dissimilar systems need to communicate, a certain amount of translation and byte reordering must be done. Within the sending computer, the presentation layer translates data from the format sent down from the application layer into a commonly recognized, intermediary format. At the receiving computer, this layer translates the intermediary format into a format that can be useful to that computers application layer. The presentation layer is responsible for converting protocols, translating the data, encrypting the data, changing or converting the character set, and expanding graphics commands. The presentation layer also manages data contraction to reduce the number of bits that need to be transmitted.SESSION LAYERThe session layer, allows two applications on different computers to open, use, and close a connection called a session. (A session is a highly structured dialog between two workstations.) The session layer is responsible for managing this dialog. It performs name-recognition and other functions, such as security, that are needed to allow two applications to communicate over the network.TRANS behavior LAYERThe channelise layer, provides an additional connection level beneath the session layer. The transport layer ensures that packets are delivered error free, in place, and without losses or duplications. At the sending computer, this layer repackages messages, dividing long messages into several packets and collecting small packets unneurotic in one package. This process ensures that packets are transmitted efficiently over the network. At the receiving compute r, the transport layer opens the packets, reassembles the original messages, and, typically, sends an acknowledgment that the message was received. If a duplicate packet arrives, this layer will recognize the duplicate and abandon it.NETWORK LAYERThe network layer, is responsible for accosting messages and translating logical holloes and names into physical addresses. This layer also determines the highroad from the source to the destination computer. It determines which path the data should take based on network conditions, priority of service, and other factors. It also manages traffic problems on the network, such as switching and routing of packets and controlling the over-crowding of data. entropy LINK LAYERThe data-link layer, sends data frames from the network layer to the physical layer. It controls the electrical impulses that enter and leave the network cable. On the receiving end, the data-link layer packages fresh bits from the physical layer into data frames. The e lectrical representation of the data is known to this layer only.PHYSICAL LAYERThe bottom layer of the OSI reference model, is the physical layer. This layer transmits the unstructured, raw bit stream over a physical medium (such as the network cable). The physical layer is totally hardware-oriented and deals with all aspects of realizeing and maintaining a physical link between communicating computers. The physical layer also carries the signals that transmit data generated by each of the higher layers.transmission control protocol/IP MODELThe transmission control protocol/IP protocol does not exactly match the OSI reference model. Instead of seven layers, it uses only four. Commonly referred to as the Internet Protocol Suite, TCP/IP is broken into the following four layersNETWORK ACCESSNetwork access layer communicates directly with the network. It provides the interface between the network architecture (such as token ring, Ethernet) and the Internet layer. meshworkThe Internet l ayer, corresponding to the network layer of the OSI reference model, uses several protocols for routing and delivering packets. Router are protocol dependent, they function at this layer of the model and are used to forward packets from one network or segment to another. Several protocols work within the Internet layer.TRANSPORTThe transport layer, corresponding to the transport layer of the OSI reference model, is responsible for establishing and maintaining end-to-end communication between two hosts. The transport layer provides acknowledgment of receipt, flow control, and sequencing of packets. It also handles retransmissions of packets. The transport layer can use either TCP or User Datagram Protocol (UDP) protocols depending on the requirements of the transmission.APPLICATIONCorresponding to the session, presentation, and application layers of the OSI reference model, the application layer connects applications to the network. It contains all the higher-level protocols.COMPARIS ON BETWEEN OSI MODEL AND TCP/IP MODELThe OSI and TCP/IP reference models have much in common. Both are based on the concept of a stack of independent protocols. Also, the functionality of the layers is slightly similar. For example, in both models the layers up through and including the transport layer are there to provide an end-to-end, network-independent transport service to processes wishing to communicate. These layers form the transport provider. Again in both models, the layers above transport are application-oriented users of the transport service.The differece between OSI and TCP/IP model is that the Application layer of TCP/IP model operates at the upper three layers of OSI model, they are application layer, presentation layer and session layer, also the Network layer of TCP/IP model works at the lower two layers of OSI model that are, data link layer and physical layer.TCP/IP PROTOCOLThe TCP/IP suite of protocols is the set of protocols used to communicate across the int ernet. It is also widely used on many organizational networks collect to its flexibility and wide array of functionality provided. Microsoft who had originally developed their own set of protocols now is more widely using TCP/IP, at scratch for transport and now to birth other services.SOME IMPORTANT TCP/IP PROTOCOLSINTERNET PROTOCOLv4 (IP)Internet Protocol (IP) is a packet-switched protocol that performs addressing and route selection. As a packet is transmitted, this protocol appends a headway to the packet so that it can be routed through the network using can-do routing submits. IP is a connectionless protocol and sends packets without expecting the receiving host to acknowledge receipt. In addition, IP is responsible for packet assembly and disassembly as required by the physical and data-link layers of the OSI reference model. Each IP packet is made up of a source and a destination address, protocol identifier, checksum (a calculated value), and a TTL (which stands for t ime to live). The TTL tells each router on the network between the source and the destination how long the packet has to remain on the network. It works like a countdown counter or clock. As the packet passes through the router, the router deducts the larger of one unit (one second) or the time that the packet was queued for delivery. For example, if a packet has a TTL of 128, it can stay on the network for 128 seconds or 128 hops (each stop, or router, along the way), or any combination of the two. The purpose of the TTL is to prevent wooly or damaged data packets (such as missing e-mail messages) from unendingly wandering the network. When the TTL counts down to zero, the packet is eliminated from the network.IPV4 HEADERThe key domains of the ipv4 are as follows- parentage channelize Senders ip addressDESTINATION overcompensate Receivers ip addressTIME TO LIVE (TTL) Numeber of hops a packet must traverse before getting discarded.TYPE OF SERVICE (TOS) It is for a sending host to specify a preference for how the datagram would be handled as it holds its way through an internet.PROTOCOL This field defines the protocol used in the data portion of the IP datagram.FLAG AND FRAGMENT A three-bit field follows and is used to control or identify fragmentsVERSION Protocol version.INTERNET HEADER length The second field (4 bits) is the Internet Header space (IHL) telling the number of 32-bitwordsin the chief.PACKET LENGTH This 16-bit field defines the entire datagram size, including header and data, in bytes.ADDRESS RESOLUTION PROTOCOL (ARP)Before an IP packet can be forwarded to another host, the hardware address of the receiving machine must be known. The ARP determines hardware addresses (MAC addresses) that correspond to an IP address. If ARP does not contain the address in its own cache, it broadcasts a request for the address. All hosts on the network process the request and, if they contain a map to that address, pass the address back to the requestor. The packet is then sent on its way, and the new information address is stored in the routers cache.HEADERSome important fields of ARPs header are as follows-HARDWARE TYPE This field specifies the Link shape protocol typePROTOCOL TYPE This field specifies the upper layer protocol for which the ARP request is intendedHARDWARE LENGTH Length of a hardware addressPROTOCOL LENGTH Length (in octets) of alogical addressof the specified protocolOPERATION Specifies the operation that the sender is performingSENDER HARDWARE ADDRESS Hardware (MAC) address of the sender.SENDER PROTOCOL ADDRESS Upper layer protocol address of the sender.TARGET PROTOCOL ADDRESS Hardware address of the intended receiver.TARGET HARDWARE ADDRESS Upper layer protocol address of the intended receiver.TRANSMISSION CONTROL (TCP)The TCP is responsible for the veritable transmission of data from one node to another. It is a connection-based protocol and establishes a connection (also known as a session, virtual circuit, or link), between two machines before any data is transferred. To establish a veritable connection, TCP uses what is known as a three-way handshake. This establishes the port number and beginning sequence numbers from both sides of the transmission.HEADERFollowing are some important fields of TCP headerSOURCE PORT Identifies the sending port.DESTINATION PORT Identifies the receiving port.SEQUENCE NUMBER This is the initial sequence number.ACKNOWLEDGEMENT NUMBER A 32 bit acknowledgement number.DATA OFFSET Specifies the size of the TCP header in 32-bit words.USER DATAGRAM PROTOCOL (UDP)A connectionless protocol, the UDP, is responsible for end-to-end transmission of data. Unlike TCP, however, UDP does not establish a connection. It attempts to send the data and to verify that the destination host real receives the data. UDP is best used to send small amounts of data for which guaranteed delivery is not required. While UDP uses ports, they are different from TCP ports therefore, the y can use the same numbers without interference.HEADERSome key headers of UDP are as followsSOURCE PORT This field identifies the sending port.DESITNATION PORT This field indentifies the receiving portLENGTH A 16-bit field that specifies the length in bytes of the entire datagramCHECKSUM The 16-bitchecksumfield is used for error-checking of the headeranddata.NETWORK ADDRESSINGThere are millions of computers in use on the web and billions of messages traversing networks at any given time, so prper addresing is essential to make sure that the sent messages arrives intact at the proper destination. Addressing of data happens in three different layers of the OSI model. The PDU at each layer adds address information for use by the peer layer at the destination.CHAPTER 2 ROUTING FundamentalsROUTINGRouting is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network, electronic data netw orks such as the Internet, and transportation networks. Our main interest will be routing in packet switched networks. In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source toward their ultimate destination through intermediate nodes typically hardware devices called routers, bridges, gateways, firewalls, or switches. General-purpose computers with multiple network cards can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the tail of routing tables which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the routers memory, is very important for efficient routing. Most routing algorithms use only one network path at a time, but multipath routing techniques enable the use of multiple utility(a) paths.TYPES OF ROUTINGSTA TIC ROUTINGStatic routing is manually adding routes to the routing table, routes through a data network are described by fixed paths (statically). These routes are usually entered into the router by the system administrator. An entire network can be configured using static routes, but this type of configuration is not fault tolerant. When there is a change in the network or a loser occurs between two statically defined nodes, traffic will not be rerouted. This means that anything that wishes to take an affected path will either have to wait for the failure to be repaired or the static route to be updated by the administrator before restarting its journey. Most requests will time out (ultimately failing) before these repairs can be made. There are, however, times when static routes make sense and can even improve the performance of a network. Some of these include stub networks and default routes. propellent ROUTINGDynamic routing performs the same function as static routing except it is more robust. Static routing allows routing tables in specific routers to be set up in a static dash so network routes for packets are set. If a router on the route goes down the destination may become unreachable. Dynamic routing allows routing tables in routers to change as the possible routes change. Dynamic routing uses routing protocols for routing information automatically over the internertwork.STATIC VS DYNAMIC ROUTINGBefore going further we need to examine the difference between static and fighting(a) routing.ROUTING PROTOCOLSBefore going in to the details of dynamic routing we must understand what are routing protocols. Routing protocols implement algorithms that tell routers the best paths through internetworks. Routing protocols provide the layer 3 network state update. In short, routing protocols route datagrams through a network. Routing is a layer 3 function, thus, routing and routed protocols are network-layer entities. Routing tables on the layer 3 router are populated by information from routing protocols. A routed protocol will enter an interface on a router, be placed in a memory buffer, then it will be forwarded out to an interface based on information in the routing tableTYPES OF DYNAMIC ROUTING PROTOCOLSDynamic routing protocols can be divided in to the following broad catagories.CLASSFUL AND CLASSLESS ROUTING PROTOCOLSCLASSFUL ROUTING PROTOCOLSClassful routing protocols do not send subnet mask information in routing updates. This was at the time when network address were allocated on the basis of classes i.e A, B or C. These routing prtocols did not include subnet mask in routing update because the the network mask was determined by first octet of the network address.Classfull routing protocols can still be used in todays networks but they cannot be used in all situations because they do not include the subnet mask. Classfull routing protocols cannot be used where the network is subnetted using more then one subnet mask, in other words we can say that classfull routing protocols do not support variable-lenght subnet mask (VLSM). In the following figure the classfull version of the network support similar subnet masks i.e all /24.CLASSLESS ROUTING PROTOCOLS

No comments:

Post a Comment