Basic of Network

Embed Size (px)

Citation preview

  • 7/30/2019 Basic of Network

    1/74

    INTRODUCING OF COMPUTER NETWORK

    NETWORK

    A network is a connection between computer, terminals and networking

    device and other components which maintain or allows the transmission of data

    between one system to another system.

    OR

    A network is define as when two or more computer, components terminals

    are connected to each other for the purpose of sharing of files.

    OR

    When two or more computers are able to send and receive any data through

    the transmission media (wired or wireless) then it is said to be network.

    OR

    When communication occurred between two or more computer by means of

    environment is said to network.

    SOURCE COMPUTER

    The computer which is able to send any information or data is called source

    computer.

    The computer where data is generated from is said to be source computer.

    DESTINATION COMPUTER

    The computer which is able to receive any information is called destination

    computer. Where the data is received is called destination computer.

  • 7/30/2019 Basic of Network

    2/74

    NODE:-

    The computer which is connected for the purpose of communication is

    called NODE.

    All the computers which are attached in to the network and help to make

    proper communication are term as NODE

    SENDER:-

    The computer which can send data is sender.

    RECEIVER:-

    The computer which can receive data is receiver.

    FIGURE

    Sender Receiver

    NETWORKING

  • 7/30/2019 Basic of Network

    3/74

    Networking is the ability to share information efficiently for the purpose of sharing

    or transferring any information.

    OR

    Networking is the process by which network can be established to make them

    (computer) as a node.

    NETWORKING ARCHITECTURE

    1. Peer to peer based networking2. Client server based networking

    PEER TO PEER BASED NETWORKING

    In peer to peer based type of architecture all the computer is attached in simplemanner. All of them are said to be as a NODE

    We can attach max.15 devices.

    Advantage:-

    1. No use of centralized administrator.2. Every computer on peer to peer network function both as server& a client.3. It is inexpensive.4. It can be easily established

    Disadvantage:-

  • 7/30/2019 Basic of Network

    4/74

    1. User performs as administrator for their own computer.2. No security.3. Additional load of computer for resources sharing.

    CLIENT SERVEER BASED NETWORKING

    In this type of computer networking architecture all the computers are controlled

    by the single computer (server) which is also called centralized administrator.

    It consists of many clients and one or more server to provide better security.

    Advantage:-

    1. Central file stored which allows all users to work from the single location.2. Easy to take back up of critical data.

    Disadvantage:-

    1. It is expensive to implement because more hardware and software arerequired.

    2. Network administrator is required.

  • 7/30/2019 Basic of Network

    5/74

    CLIENT COMPUTER:-

    The computer which is used to access resources in the network is called

    client computer.

    SERVER COMPUTER:-

    Computer that provide shared resources such as storage and printers and

    network server such as e-mail and internet access.

    TYPES OF NETWORKING

    1. LAN (Local area network)2. WAN (Wide area network)3. MAN (Metropolitan area network )4. PAN (Personal area network)5. SAN (storage area network)6. VPN (virtual private network)

    LAN:-

    When network is established in a limited area for the purpose of

    communication occurred locally, them it is said to LAN.

    Generally LAN is established is small offices, Originations etc.

    WAN

    When communication occurs from one single location to another location

    either it belong from the same networks, then it is said to WAN.

    Group of LAN is called a WAN which communicates globally.

    MAN

    When communication occurs among different cities or specific location,

    then it is said to MAN.

  • 7/30/2019 Basic of Network

    6/74

    PAN

    In this type of network communication are established for the purpose of

    involving different location.

    MODE OF COMMUNICATION

    Mode of communication defines the way of communication which is applied

    when any communication occurs between the devices. It is the pattern which

    resembles that which type of communication occurs.

    Basically they are three types;

    1. Simplex mode2. Half duplex mode3. Full duplex mode

    SIMPLEX MODE:-

    In this mode of communication there are only one device is in active state,

    means is that only one way communication established. Communication is occurs

    due to the broad casting. Example: - Television, Radio etc.

    HALF DUPLEX MODE:-

    In this communication any device can communicate to another device but at

    the time. It means when first device communicate then another device can not

    communicate, it is in dumb position. Example: - Walky-talky.

    FULL DUPLEX MODE:-

    In full duplex mode communication occurs in both ways that all the devices

    can communicate to each other at the same time. Example: - Internet, telephone

    etc.

    TOPOLOGY

  • 7/30/2019 Basic of Network

    7/74

    It is define the layout or fashion that in which manner computer are

    connected. Topology represents the standard of network and also provides the

    information about the following things.

    Limitation of networks

    Device which are used

    Path of communication

    Transmission of media

    How to troubleshoot

    OR

    A network topology is the basic design of a computer network. It is very

    much like a map of a road. It details how key network components such as nodes

    and links are interconnected.

    TYPE OF TOPOLOGY

    1. Bus topology2. Star topology3. Ring topology4. Mesh topology5. Hybrid topology

    BUS TOPOLOGY

    In bus topology all the computer are attached with the single backbone. In

    this topology computer are connected in peer to peer manner, backbone uses

    coaxial cable.

    Bus topology is terminated in both sides. Computer is attached to the

    backbone with the UTP cable.

  • 7/30/2019 Basic of Network

    8/74

    Advantages:-

    1. It is the cheapest topology because it does not use any additional device.2. All the workgroup computer are connected in a simple manner, it mean

    layout is simple.

    3. The entire computer communicates easily without anyinterference/restrictions.

    4. Easy to implement new node.5. Good for smaller networks not requiring higher speeds.Disadvantages:-

    1. It is not secure connection.2. If backbone cable break then communication is not possible.3. If destination is not available, data is loss.4. Limited in size and speed.

    Star Topology:-

    In this topology all the computers are attached with central located device

    called HUB. HUB makes communication possible because it has many ports to

    attached computer. HUB can transmit data from one port to another port directly.

  • 7/30/2019 Basic of Network

    9/74

    In a star topology, each network device has a home run of cabling back to a

    network hub, giving each device a separate connection to the network. So, there

    can be multiple connections in parallel.

    This topology generally used UTP or STP cable. It is cheap reliable

    topology.

    Advantages:-

    1. If one workgroup computer is failed another workgroup computer is notaffected.

    2. Easy to implement new workgroup computer.3. Communication is quite secure due to the use of HUB.4. More suited for larger networks.

    Disadvantages:-

    1. It is an expensive topology in comparison to bus topology due to the use ofHUB.

    2. If central located device failed then communication become not possible.3. It uses the greatest table length.4. Installation costs are high because each node needs to be connected to the

    central switch.

  • 7/30/2019 Basic of Network

    10/74

    Ring Topology:-

    In ring topology all computer are connected in the form of ring. Ring

    topology uses a special device MAU (multi station access unit) logically. MAU

    makes communication possible in the form of ring. Ring topology also uses UTP& STP cable.

    In a ring topology, the network signal is passed through each network card

    of each device and passed on to the next device. Each device processes and

    retransmits the signal, so it is capable of supporting many devices in a somewhat

    slow but very orderly fashion. There is a very nice feature that everybody gets a

    chance to send a packet and it is guaranteed that every node gets to send a packet

    in a finite amount of time.

    Advantages

    1. It uses token ring mechanism.2. Reliable and offers best speed.3. No collision.4. Handle large value of traffic.

    Disadvantages:-

    1. More cabling is require in comparison BUS topology.2. One fault device affects the entire network.3. Not easy to implement new node.4. Error detection and network administration becomes difficult.

  • 7/30/2019 Basic of Network

    11/74

    MESH topology:-

    In mesh topology all the computer are connected with each computer end to

    end. So for that connection become much more reliable and data travels at very

    higher speed. It is special used in WAN link king through router (device).

    TYPE OF MESH TOPOLOGY:-

    1. FULL MESH: - In full mesh topology all devices are connected with eachand every end for exchanging/transferring of data at higher band width

    (speed).

    2. PARTIAL MESH: - In partial mesh topology some devices are connectedto only those devices with which they exchange most of data.

  • 7/30/2019 Basic of Network

    12/74

    Advantages:-

    1. Improve fault tolerance.2. Failure of one link dose not effect on entire network.3. Centralize management is not required.4. Data transmit at very higher bandwidth due to the multiple path ways.

    Disadvantages:-

    1. Difficult to implement, manage add new node.2. Each link attached with one device to another device, so requires individual

    NIC.

    3. It is much expensive.

    Hybrid topology

    Hybrid topology is the combination of two or more different physical

    topology commonly star, bus, and ring. It is special topology which is generally

  • 7/30/2019 Basic of Network

    13/74

    used in corporate world. It is used to connected different topology in a single

    topology. It is used in both LAN &WAN.

    Advantages:-

    Used for creating larger network handle large volume of traffic fault

    detection is easy.

    Disadvantages:-

    Installation, configuration is difficult more expensive than other topology

    because more cabling is required.

  • 7/30/2019 Basic of Network

    14/74

    PATH OF COMMUNICATION:-

    It define the path (medium) by which the communication is established; there are

    two type of path communication.

    1. BASEBAND: - In base band type of communication computer can carryone signal at a time and all of the system takes turn to using. To make a

    base band communication the data transmitted by each system is spitted

    in to separate path called packet. It mean that computer transmit each

    packet at a time.

    2. BROADBAND: - Broadband is the opposite of base band because it cancarry multiple channels at the same time. It has higher band width and

    most effective.

  • 7/30/2019 Basic of Network

    15/74

    IP ADDRESS:-

    An Internet Protocol (IP) address is a numerical label that is assigned to

    devices participating in a computer network utilizing the Internet Protocol for

    communication between its nodes. An IP address serves two principal functions in

    networking: host identification and location addressing.

    The role of the IP address has also been characterized as follows: "A name

    indicates what we seek. An address indicates where it is. A route indicates how to

    get there.

    MAC address:-

    In computer networking a Media Access Control address (MAC address) is a

    unique identifier assigned to most network adapters or network interface cards

    (NICs) by the manufacturer for identification, and used in the Media Access

    Control protocol sub layer. If assigned by the manufacturer, a MAC address

    usually encodes the manufacturer's registered identification number. It may also be

    known as an Ethernet Hardware Address (EHA), hardware address, adapter

    address, or physical address.

    TRANSMISSION MEDIA:-

    The medium (cable, devices etc) through which data can be transmitted from

    one point to another is called transmission media. Commonly they are two types.

    1. Cables2. Networking device

    CABLE:-

    Cable is the physical transmission medium which carries data in form of

    signal. It has the central conductor of wire surrounded by the plastic jacket.

  • 7/30/2019 Basic of Network

    16/74

    Cable are divided into three types according to their speed, cost, need etc.

    1. Twisted pair cable2. Co-axial cable3.

    Fiber optic cable

    1. TWISTED PAIR CABLE:-A twisted pair wire consist of two bunches of thin copper wire and enclosed

    separately in a plastic insulator with conductor. One the wire is used to carry the

    signal to the receiver and the other is used as ground reference. The connectors

    used for this cables are called RJ45 (registered jack).

    It is more flexible and easy to bend, cheaper than other cable and easy to

    install. They are of two types.

    Unshielded twisted pair (UTP)

    Shielded twisted pair (STP)

    Unshielded twisted pair (UTP)

    It content 8 separate copper conductor and they are arranged in 4 pair. The 4

    pairs are then encased in a single sheath.

  • 7/30/2019 Basic of Network

    17/74

    Category of UTP Cable:-

    CAT-1 traditional telephone line carries voice but not data

    CAT-2 for data transmission up to 4Mbps

    CAT-3 for data transmission up to 10Mbps

    CAT-4 for data transmission up to 16Mbps

    CAT -5 for data transmission up to 100Mbps

    CAT-5(e) for data transmission up to 100to1000Mbps

    CAT-6 for data transmission up to 1Gbps

    Advantages:-

    1. In expensive media.2. Easy to install.3. Easy to bend.4. Support up to 1Gbps.

    Disadvantages:-

    1. Not suitable for long distance.2. Signal can travel only 100 meter.3. Easy gets affected by EMI (electro-magnetic interference).

    UTP Cable description:-

    Max. Cable length..100 meter.

    Band width.100 Mbps.

    Connector .RJ 45

    Bend radius 360./ fit.

    Resistance.. 100 Ohms.

    Signal transmission mode.Base band.

  • 7/30/2019 Basic of Network

    18/74

    STP Cable:-

    It is similar in construction UTP but it has additional foil (layer) or mesh

    shielding around each pair. The additional shielding in STP cable makes it

    preferable to UTP in installation where EMI is problem. STP is most expensive

    than UTP, resistance of this cable is 150 ohm.

  • 7/30/2019 Basic of Network

    19/74

    2. COAXIAL CABLEIt consists of a central copper wire surrounded by a PVC insulation

    over which a sleeve is again shielded by an outer shield of thick PVC

    (plastic) material. The signal is transmitted by the inner copper wire. Co-

    axial cable offer much higher band width than twisted pair cable could carry

    digital up to 600 Mbps.

  • 7/30/2019 Basic of Network

    20/74

    Advantages:-

    Shielded allows signal to travel 500 meter.Unrepeated.Relative inexpensive.Medium difficult to install.

    Disadvantages:-

    Limited to 10 Mbps.Relative unreliable.Only usable in BUS topologyNot the easy to install.Not the least expensive medium.

    Type of co-axial cable:-

    Co-axial cable is found in to types.

    1. Thin net (RG 8):- It is about 0.25 inches in diameter making it flexible. Itcan carry a signal about 185 meters. It uses N connectors.

    This network runs at 10 Mbps and uses base band transmission. So for that it

    is also called 10 Base 2. The 2 implies 200 meters and 10 imply its speed.We can connect 30 hosts per segment. Its minimum distance between the

    hosts is 0.5 meter.

  • 7/30/2019 Basic of Network

    21/74

    2. Thick net (RG-58):- It is about 0.38 inches in diameter making it a better

    conductor. It can carry a signal of about 500 meters. It uses BNC connector.

    Feature of 10 base 5 (thick net):-

    1. Base band communication.2. 10Mbps transfer rate.3. Max. Distance of 500 maters/network segment.4. 100host per segment.5. 2.5meters min. distance between hosts.

    Description of Cables

    Name Description Type Segment Speed

    10 Base T Common UTP 5 to 100 m 10Mbps

    10 Base 2 thin net co-axial 185 m 10Mbps

    10 Base 5 thick net co-axial 500 m 10Mbps

    100 Base T Common UTP 5 to 100 m 100Mbps

  • 7/30/2019 Basic of Network

    22/74

    3. Fiber optic cable

    A fiber optic cable is made of glass or plastic and transmits signals in the

    form light because light travels much faster than electricity, physically. A fiberoptic cable consists of three concentric layers, the inner core, a cladding around it

    and the outer protective coating. It provides a reliable, secure and very high band

    width transmission media.

    Type of fiber optic cable:-

    1. Single mode fiber optic cable: - it has core diameter of 8.3 micron and

    the thickness of the core and cladding together is 125 micron. It referred as 8.3/125

    single mode fiber optic. It uses a single wave length laser as a light source and

    carry signal for extremely long distance.

  • 7/30/2019 Basic of Network

    23/74

    2. Multi mode fiber optic cable: - it is rated as 62.5/125 Multi mode. Ituses a LED as a light source and carries multiple wave length. Both uses subscriber

    connector and straight tip connectors.

  • 7/30/2019 Basic of Network

    24/74

    CABLE VARIATION

    Designation Cable Type Topology SpeedMaximum

    Segment Length

    10Base5 RG-8 coaxial Bus 10 Mbps 500 meters

    10Base2 RG-58 coaxial Bus 10 Mbps 185 meters

    10Base-T Category 3 UTP Star 10 Mbps 100 meters

    Fiber Optic Inter-RepeaterLink (FOIRL)

    62.5/125 multimode fiberoptic

    Star 10 Mbps 1000 meters

    10Base-FL62.5/125 multimode fiber

    opticStar 10 Mbps 2000 meters

    10Base-FB62.5/125 multimode fiberoptic

    Star 10 Mbps 2000 meters

    10Base-FP62.5/125 multimode fiber

    opticStar 10 Mbps 500 meters

    100Base-TX Category 5 UTP Star100Mbps

    100 meters

    100Base-T4 Category 3 UTP Star100

    Mbps100 meters

    100Base-FX62.5/125 multimode fiberoptic

    Star100Mbps

    412 meters

    1000Base-LX9/125 single mode fiber

    opticStar

    1000

    Mbps5000 meters

    1000Base-LX50/125 or 62.5/125multimode fiber optic

    Star1000Mbps

    550 meters

    1000Base-SX50/125 multimode fiber

    optic (400 MHz)Star

    1000

    Mbps500 meters

    1000Base-SX50/125 multimode fiber

    optic (500 MHz)Star

    1000

    Mbps550 meters

    1000Base-SX62.5/125 multimode fiberoptic (160 MHz)

    Star1000Mbps

    220 meters

    1000Base-SX62.5/125 multimode fiber

    optic (200 MHz)Star

    1000

    Mbps275 meters

    1000Base-LH9/125 single mode fiberoptic

    Star1000Mbps

    10 km

    1000Base-ZX9/125 single mode fiber

    opticStar

    1000

    Mbps100 km

    1000Base-CX150-ohm shielded coppercable

    Star1000Mbps

    25 meters

    1000Base-T Category 5 (or 5E) UTP Star1000

    Mbps100 meters

  • 7/30/2019 Basic of Network

    25/74

    Cable Problems

    Attenuation: -Attenuation is signal deterioration, and noise which is signal

    interference can cause problems in networks because the data send may beinterpreted incorrectly or not recognized at all after it has been received.

    Noise: - Noise is any electric energy on the transmission cable that makes it

    difficult for a receiver to interpret the data sent from the transmitter.

    Cross talk: - Cross talk involves the transmission of signal from wire to a nearby

    wire, when voltage change on a wire electromagnetic energy is generated. This

    energy radiates outward from the wire like a radio signal from a transmitter

    adjacent wire in the cable as like antennas and receives the transmitted energywhich interferes with data on that wire.

    NETWORKING DEVICES

    The device which is used to connect network with cable by which

    connection is established and communication become much easier, reliable and

    fast is called networking devices. It can be used to extend networks.

    The main device which is used in networking is:-

    1. HUB2. Repeater3. Bridge4. Switch5. Router

    HUB

    A HUB or concentrator is a device used to connect all of computer on a star

    or ring network. Ethernet HUB is also called a multiport Repeater.

    When data enter the Hub through any of its ports, the hub amplifies the

    signal and transmits it out through all of the other ports, this enable a star network

    to share a single medium even though each computer has its own separate cable.

    The HUB relies every packet transmitted by any computer on the network to all of

    the other computer while amplifies signal.

  • 7/30/2019 Basic of Network

    26/74

    Repeater or HUB work at OSI physical layer to regenerate the network

    signal and resend them to other segment. It is physical layer device.

    Types of HUB:-Passive HUB: - Passive hub is used to receive data from one port of

    the hub and send it out to the other ports. A passive Hub has no power source or

    electric component, there is no signal processing and there is no regenerating of the

    signal to ensure that it is readable to the destination.

    A passive hub simply attached to the ports internally and enables

    communication to flow through the network.

    Active HUB: - An active hub provides the same functionality as a

    passive hub with an additional feature. Active hub rebuilds the data before sendingit to all of the destination port of the hub. Due to this we can increase the length of

    network because although the signal weakens with distance. An active hub has apower source and built in repeater to boost the signal.

    Hybrid hub:- Hybrid hub is a hub that can use many different types

    of cable in additional to UTP cabling. A hybrid hub usually is cabled using thin net

  • 7/30/2019 Basic of Network

    27/74

    or thick net along with popular cable type such as twisted pair cabling because it

    has many ports.

    REPEATER

    Repeater is also physical layer device which is used to boost (regenerate) the

    signal. The signal are weakens which are coming from long distance so repeater

    can be use to solve this problems. Repeater can connect one segment to other

    segment. It work with amplified the signal.

    Network interface card (NIC)

    This device/card install on the system that is responsible for sending and

    receiving data on to the network. It is also responsible for preparing the data from

    the system to be transparent on the wire by converting the outbound data to electric

    signal. This card should be install in expansion slot on the motherboard. Today in

    modern computer has build-in LAN card in form of chip it is also called LAN

    adapter card or Ethernet card.

  • 7/30/2019 Basic of Network

    28/74

    A NIC makes networking possible because it carries a unique code called

    MAC address is 48 bit in length and express in 12 hexadecimal digits. MAC

    address are some time referred to as burned in address (BIA) because they are

    burned in to ROM and are copied in to RAM when the NIC initialized. It is a data

    link layer (layer 2) device.

    BRIDGE

    Bridge is a data link layer device (layer to device). Bridge convert network

    transmission data formats as well as perform basic data transmission management.Bridge as name implies, provide connection between LANs, not only do connect

    LANs but they also perform a check on the data to determine whether it should

    cross the bridge or not, this makes each part to the network more efficient.

    Bridge can analyze incoming data packet to determine if the bridge is able to

    send the given packet to another segment of the network.

  • 7/30/2019 Basic of Network

    29/74

    Bridge learn MAC address of the system by which it creates a table of

    source MAC address and destination address called bridging table. Bridging

    broadcast their massage only to different segment. It can never broadcast their

    massages to its own segment from where source data is generated. This mechanismis possible by the entry of MAC address in bridge table. It reuses network traffic.

    Bridge has only two ports either it connect the segment or it break the

    segment.

    Bridge use two method to resolve the network segment that MAC address

    belong to;

    Transparent bridge: - This method uses a forwarding data base to send frame

    across network segment. The forwarding data base is initially empty and entries in

    the database are built as the bridge receives frames. It an address entry is not found

    in the forwarding database, the frame rebroadcast to all port of the bridgeforwarding the frame to all segment except the source address.

    Source route bridging:- With source route bridging two frame type are used in

    order to find the route to the destination network segment single route (SR) frame

    makes up most of the network traffic and have set destinations while all-route (AR)

    frame are used to find routes.

    SWITCH:-

    A network switch is a computer networking device that connects network

    segment. The term commonly refers to a network bridge that processes and routesdata at data link layer (layer2) of the OSI model. Switches that additionally process

    data at the network layer (layer 3 and above) are often referred to as a layer 3

    switches or multilayer switches.

    The term network switch does not generally encompass unintelligent or

    passive network device such as HUB & repeaters.

    Switches resemble bridges and can be considered as multiple bridges by

    having multiport can better use limited band width and prove more cost effective

    than bridge. Switch can transmit its frame to the next port only.

  • 7/30/2019 Basic of Network

    30/74

    It is possible because switch also maintain switching table called CAM

    (common addressable memory) of both source and destination MAC address. It is

    widely used in LAN. It come in various speed, 10 Mbps, 100 Mbps &1 Gbps.

    There are four forwarding method of switches.

    STORE &FORWARD:- The switch buffer and typically perform a checksum 0n

    each frame before forwarding them.

    CUT THROUGH:- The switch read only up to t

    he frames hardware address before starting to forward it. There is no error

    checking with the method.

    FRAGMENT FREE:-A method that attempt to retain the benefit to both store &

    forward and cut throw fragment free check the first 64 bytes of the framewhere addressing information is stored.

    ADAPTING SWITCHING:- A method of automatically switching between theother three mode.

    SWITCH CONFIGURATION:-

    Unmanaged switch:- These switch have no configuration interface or

    option, they are plug and play. They are typically the least expansive switchesfound in home SOHO or small business they can be desktop or rack mounted.

    Managed switch:- These switches have one or more method to modify the

    operation of the switch. Common management method include; a serial console orcommand line interface accessed via tenant or secure shell an embedded simple

    network management station or a web interface for management from a web

    browser.

    Sub classes of managed switch are:-

  • 7/30/2019 Basic of Network

    31/74

    Smart (or intelligent) switches:- These are managed switch with a limited

    set of managed feature.

    Enterprise managed (or fully managed) switch:- These have a full set of

    management features including command line interface SNMP agent and web

    interface. They may have additional feature to manipulate configuration such asthe ability to display, modify, back up and restore configurations.

    Advantages of switch: -

    Switches divide a network into several isolated channels (or collision domains).

    Reduce the possibility of collision Collision only occurs when two devices try to get access to one

    channel.

    Can be solved by buffering one of them for later occurs.Each channel has its own network capacity

    Suitable for real time applications e.g. video configuration.Since isolated, hence secure

    Data will only go to the destination but not other.

    NETWORK ROUTER:-

    Network Router is a layer 3 device (network layer). A network connects two

    dissimilar network together forming an internetwork when computer on a LANwants to transmit data to a computer on other LAN. The system sends its packets

    to a router on the local network and the router forward them to the destination

    network. A router will have multiple networks interfaces with each network

    interface connecting to a network or a WAN environment. Router typically is used

    to connect LAN to a WAN or WAN to a WAN.

    Router learns logical address (IP address) for routing. Router has the

    following features,

    Router work on IP address. Router select best and shortest path. Router perform packet filtering, it connect two different networks

    (LAN).

    Typically used in WAN. Keep the information of connected router.

  • 7/30/2019 Basic of Network

    32/74

    HOW ROUTER WORK

    A router forward a packet based on a destination address in the network

    layer protocol header, which specify the packets ultimate destination and not the

    hardware address used at the data link layer. A router uses internal table (called

    routing table) that contain information about the network around it and this tablehelps to determine where to send each packet if the packet destination for system

    one of the network to which the router is connected. The router transmits thepacket directly to the system.

    Router has multiple broadcast domains and reduces collision domain. There

    are two type of routing Static and Dynamic routing.

    STATIC ROUTING:- Static routing is a process of creating routing tableinters manually. This is because of network administrator decide what the router

    should do when it receive the packets.

    DYNAMIC ROUTING:- In dynamic routing router automatically decidewhat to do with packet by the help of routing table.

  • 7/30/2019 Basic of Network

    33/74

    ADVANTAGES AND DISADVANTAGES OF NETWORKING DEVICE:-

    HUB:-

    Advantage:-

    Hub can connect many devices than other devices. Hub can transmit data in greater speed. Communication is quite secure due to hub use.

    Disadvantages:-

    It is an expensive device. It uses the greatest cable length. If centrally located device failed then communication become not possible.

    REPEATER:-

    Advantage:-

    It boost the lose signal. Repeater can connect one segment to other segment. It is suitable for long distance network.

    Disadvantages:-

    It only regenerates the signals. It is not only suitable for long distance network.

    BRIDGE:-

    Advantage:-

    Bridge can connect two segments. Bridge can transfer data in greater speed. It reduces the network traffic.

    Disadvantages:-

  • 7/30/2019 Basic of Network

    34/74

    Bridge can transfer data to one segment to another segment. Bridge can not transfer data in own port. Bridge has only two ports either it connect the segment or it divide the

    segment.

    SWITCH:-

    Advantage:-

    It also connects two segments like bridge. It has a multiple port. Switch also transfers data to one port to another.

    Disadvantages:-

    Switches can not transfer data in own ports. It is widely use in LAN. The term network switch dose not generally encompass unintelligent or

    passive network device such as HUB and repeater.

    GATEWAY:-

    A gateway is responsible for translating information from one format to

    another format. In other word gateway is used as internet device to convert the data

    and packet of the sender in that format that could be easily identify by the

    receivable end. The gateway is used in any layer on the OSI reference model

    depending on what information gateway translate.

    MODEM:-

    A modem is a physical layer device that converts digital data originating

    from a computer to analog signal. It convert the digital signal into analog signal &

    Analog signal to Digital signal suitable for transmission over a telephone line it

  • 7/30/2019 Basic of Network

    35/74

    convert the pulse tone (audio tone) into digital tone. Modem is used to

    communicate with the system across the PSTN (public switch telephone network).

    FIREWALL:-

    Firewall is networking component responsible for protecting the network

    from outside introduce. The firewall design to block the particular type of traffic

    by alloying shortens information to pass through them. The firewall administrator

    chooses which traffic can and can not be passed through the firewall. It is specially

    used for security purpose.

    Measuring bandwidth:-

    Units of bandwidth Abbreviation Equipment

    Bits per second Bps fundamental unit of bandwidth

    kilobits per second Kbps 1 Kbps=103

    bps

    Megabits per second Mbps 1Mbps=10 bps

    Gigabits per second Gbps 1Gbps=109bps

    Terabits per second Tbps 1Tbps=10

    12

    bps

  • 7/30/2019 Basic of Network

    36/74

    PROTOCOL: -

    A written specification that defines how product should perform a certain

    task typically in network. In other word, a protocol is a set of rules which is used

    by computer to communicate with each other a cross a network. It is a standardthat control or enable the correction, communication and data transfer between

    computing end point. Protocol may be implementing by H/W, S/W or both.

    Properties of protocol:-

    Detection of under lying physical connection.

    Hand shaking.

    Negotiation of various connections corrects tactic.

    How to start and a massage.

    Processor on formatting a massage.

    Error correction.

    How to detect unexpected loss of the connection.

    Termination of the session or connection.

    Protocols:-

    NCP- network core protocol.

    SAP- Service advertising protocol.

    IPX- Internetwork packet exchange.

    RIP- Routing information protocol.

    ADSP - AppleTalk data stream protocol.

    AEP - Apple Talk echo protocol.

    AFP - AppleTalk filling protocol.

    ASP - AppleTalk session protocol.

    ATP - AppleTalk transaction protocol.

    DDP - Datagram delivery protocol.

    LAP - Link access protocol.NBP - Name-binding protocol.

    PAP - Printer access protocol.

    RTMP - Routing table maintenance protocol.

    ZIP - Zone information protocol.

    SLIP - Serial line internet protocol.

  • 7/30/2019 Basic of Network

    37/74

    CSLIP- Compressed Serial line internet protocol.

    PPP - Point to point protocol.

    ARP - Address resolution protocol.

    IP - Internet protocol.

    RARP - Reverse address resolution protocol.TCP - Transport layer protocol.

    ICMP Internet control message protocol.

    IGMP- Internet group management protocol.

    FTP File transfer protocol.

    OSI REFRENCE MODEL:-

    OSI was developed in 1984 by the international organization for

    standardization (ISO) a global federation of national standard organization

    representing approximately 130 countries. OSI (open system inter connection)

    define a standard a set of rules that allow the networking component tocommunicate easily

    The core of this standard is the OSI reference model, a set of 7 layer that define the

    different stages data must go through to travel from one device to another device

    over a network.

    OSI is a system open for communication with other system. The OSI model

    has 7 layers the principles were applied to achieve at the 7 layer as follows,

    A layer should be created where a different level of abstraction is needed.Each layer should perform a well defined function.The function of each layer should be chosen with an eye to word defining

    internationally standardization protocol.

    The layer boundaries should be chosen to minimize the information followacross the interface.

  • 7/30/2019 Basic of Network

    38/74

    The number of layer should be large enough that distinct function need notbe through together in the same layer out of necessity, and small enough that

    the architecture dose not becomes unwieldy.

    Figure:-

  • 7/30/2019 Basic of Network

    39/74

  • 7/30/2019 Basic of Network

    40/74

    THE PHYSICAL LAYER:-

    The main task of the physical layer is to transmit raw bits over a

    communication channel. It defines the electrical & physical specification for

    device. It also defines the relationship between a device and a physical medium. Itinclude layout of pins cable specifications, HUB, Repeater, Network adaptor and

    more.

    The major function and service perform by the physical layer are:-

    1. Establishment and termination of a connection to a communicationmedium.

    2. Modulation or conversion between the representation of digital data in userequipment and the corresponding signal transmitted over communication

    channels. These all signal operating over the physical cabling or over a

    radio link.

    3. It converts the frame into multiple bits and then again converts these bits inthe form of electrical signal to transmit data over a medium (cable).

    DATA LINK LAYER:-

    The data link layer provides the functional and procedural mean to transfer

    data between network and entities and to detect and possible correct errors that

    may occur in the physical layer.

    The main task of this layer is to take a raw transmission facility and transfer

    it into a line that appears free of undetected transmission error to the network layer.

    To accomplish this, the sender breaks the input data into multiple data frame

    (typically of few 100 or 1000 bytes) transmit the frame sequentially and process

    the acknowledgement frame sent back by the receiver.

    The issues that the layer has to solve:-

    To create and to recognize frame boundaries typically by attached specialbit patterns to the beginning and end of the frame.

    To solve the problem caused by damaged, lost or duplicate frame (the datalink layer may offer several different services classes to the network layer,

    each with different quality and price).

  • 7/30/2019 Basic of Network

    41/74

    To keep a fast transmitter from drawing a slow receiver in data. If the line is bi-directional, the acknowledgement frame complete for the

    use of the line with data frame.

    Broadcast network have an additional issue in the data linklayer, how to control access to the shared channel. A special sub layer of the data

    link layer (medium access sub layer) deals with the problems.

    The user of the data link layer may be sure that his data were

    delivered without errors to the neighbor node. However, the layer is able to deliver

    the data just to the neighbor node.

    SUBLAYER OF DATA LINK LAYER:-

    The data link layer has two sub layers.

    Logical link control sub layer:- the upper most sub layer is logical

    link control (LLC). This sub layer multiplexes protocols running atop the data link

    layer, and optionally provides flow control, acknowledgment, and error

    notification. The LLC provides addressing and control of the data link. It specifies

    which mechanism is to be used for addressing stations over the transmission

    medium and for controlling the data exchanged between the originator and

    recipient machines.

    Media access control sub layer: - The sub layer below it is MAC.

    There are generally two forms of media access control distributed and centralized

    both of these may be compared to communication between people.

    The media access control sub layer also determines where one frames of

    data ends and the next one starts frames synchronization. There are four means of

    frames synchronization time based, character counting byte stuffing and bit

    stuffing.

    Some time this refers to the sub layer that determine who is allowed to

    access the media at any time usually (CSMA/CD) other times it refers to a frames

    structure with MAC address inside.

    NETWORK LAYER:-

  • 7/30/2019 Basic of Network

    42/74

    The network layer is layer 3 of the seven layer OSI model of computer

    networking. The network layer is responsible for end to end (source to destination)

    packet delivery including routing through intermediate hosts whereas the data link

    layer is responsible for node to node (hop to hop) frame delivery on the same link.

    The network layer provides the functional and procedural means of

    transferring variable length data sequences from a source to a destination host via

    one or more networks while maintaining the quality of service and error control

    functions.

    FUNCTION OF NETWORK LAYER:-

    Connection model

    It is the main function of the network layer which includes two types ofcommunication.

    Connection oriented: - Connection oriented is a data transmission attribute

    that describes a facility in which the devices at the end point uses a protocol to

    established an end to end connection before any data is sent. Connection oriented

    transmission is highly reliable.

    Connection less: - Connection less mode transmission is a transmission in

    which each packet is pretend with a header containing a destination addresssufficient to permit the independent delivery of the packet without the aid of

    additional instructions.

    Congestion control:-

    A router can be connected to 4-5 networks. If the entire network sends

    packet at the same time with maximum rate possible them the router may not be

    able to handle all the packets and may drop some/all packet. In this context the

    dropping of the packets should be congestion is also a function of the networklayer.

    Internetworking:-

    Internetworking are multiple network that are connected in such a way that they

    act one large network, connecting multiple office or department networks.

  • 7/30/2019 Basic of Network

    43/74

    Internetwork is connected by networking hardware such as router, switch and

    bridges. Internetworking is a solution born of three networking problems, isolated

    LANs, duplication of resources, and the lack of a centralized network management

    system.

    TRANSPORT LAYER:-

    The transport layer is responsible for delivering data to the appropriate

    application process on the host computers. This involve statistical multiplying of

    data from different application processes; i.e. forming data packets, and adding

    source and destination port number in the header of each transport layer data

    packet together with the source and destination IP address the port numbers

    constitutes a network socket, i.e. an a identification address of the process to

    process communication.

    A byte stream is delivered while hiding the packet mode communication forthe application process. This involves the connection establishment, dividing at the

    data stream into packet called segment numbering and reordering of out of order

    data.

    TRANSPORT LAYER SERVICE:-

  • 7/30/2019 Basic of Network

    44/74

    Connection oriented Same order delivery Order delivery Flow control Congestion avoidance Byte orientation Port (Part of the Transport Layer in the TCP/IP model but of the Session

    Layer in the OSI model) Ports are essentially ways to address multiple

    entities in the same location. For example, the first line of a postal address

    is a kind of port, and distinguishes between different occupants of the same

    house. Computer applications will each listen for information on their own

    ports, which is why you can use more than one network-based application at

    the same time.

    SESSION LAYER:-

    The Session Layer provides the mechanism for opening, closing and

    managing a session between end-user application processes, i.e. a semi-permanent

    dialogue. Communication sessions consist of requests and responses that occur

    between applications. Session Layer services are commonly used in applicationenvironments that make use of remote procedure calls (RPCs).

    In case of a connection loss this protocol may try to recover the connection.

    If a connection is not used for a long period, the Session Layer Protocol may close

    it and re-open it. It provides for either full duplex or half-duplex operation and

    provides synchronization points in the stream of exchanged messages.

    Within the service layering semantics of the OSI network architecture, the

    session layer respond to service requests from the presentation layer and issuesservice to the transport layer.

    SESSION LAYER SERVICE:-

    AuthenticationPermissions

  • 7/30/2019 Basic of Network

    45/74

    Session restoration (checkpoint & recovery)PRESENTATION LAYER:-

    Presentation layer is responsible for the delivery and formatting of the

    information to the application layer for further processing or display. It relieves the

    application layer of concern regarding syntactical difference in data representation

    in within the end user systems.

    An example of a presentation service would be the conversion of an EBCD-

    coded text file to an ASCII-coded file.

    The application layer is the lowest layer at which application programmers

    consider data structure and presentation, instead of simply sending data in form of

    datagrams or packet between hosts.

    E3ncryptionand compression should be presentation layer functions,

    although they are frequently provide on other layers.

    SUBLAYER:-

    The presentation layer is composed of two sub layers;

    1. CASE(common application service element)2. SASE(specific application service element)

    CASE:-

    The CASE sub layer provides services for the application layer and request

    service from the presentation layer. It provides support for common application

    services such as;

    ASCE (association control services element)

    ROSE (remote operation service element)

    CCR (commitment concurrency and recovery)

    RISE (reliable transfer service element)

  • 7/30/2019 Basic of Network

    46/74

    SASE:-

    The SASE sub layer provides application specific services (protocol) such as;

    FTAM (file transfer access and manager)

    VT (virtual terminal)

    MOTIS (massage oriented text interchange)

    APPLICATION LAYER:-

    The application layer contains all the protocol and method that fall into the

    realm of process to process communication via an internet protocol (IP) network

    using the transport layer protocols to establish underlying host to host connection.

    The common application layer service provides semantic conversion

    between associated application processes.

    This layer handles issues like network transparency, resource allocation and

    problem partitioning. The application layer is censured with the users view of

    network (e.g. formatting electronic mail massages). The presentation layer

    provides the application layer with a familiar local representation of data

    independent of the format used on the network.

    The application layer provides the interface to the communication

    environment which is used by the application process. It is responsible for

    communicating application process parameters.

    The host layer also provide for accurate delivery of data between computers in the

    network.

    TCP/IP

    TCP/IP MODEL:-

  • 7/30/2019 Basic of Network

    47/74

    PROTOCOLUSED IN DIFFERENT LYER:-

  • 7/30/2019 Basic of Network

    48/74

    1. ETHERNET:-Ethernet is the most popular LAN protocol operating at the data link layer. It

    was developed in 1970. Todays Ethernet can run at speed of 10, 100 & 1000Mbps

    (1Gbps). Ethernet was first developed by digital equipment corporation, Inteland Xerox, which came to be known as DIX Ethernet. DIX Ethernet was first

    published in 1980 &defined a network running at 10 Mbps using RG 8 co-axial

    cables in a bus topology. This standard is known as thick net, thin net Ethernet or

    10base5 Ethernet.

    The DIX Ethernet II is standard, published in 1982, and is called as thin

    Ethernet, cheaper net or 10base2 Ethernet.

    After further development DIX Ethernet added a specification for an UTP

    cable options known as 10baseT Ethernet.

    Ethernet standard consist of the following 3 basic component:-

    1. Physical layer specification2. Frame formats3. CSMA/CD(carrier sance multiple access with collision detection)

    Physical layer specification: - it describe the cable used in a network, it

    defines the topologies and also cable segment or length.

    Frame format:- Ethernet protocol is used to in capsulate the data it receive

    from the network layer protocol in a frame, in presentation for its transmission

    across the network.

    Frame consist of a header and a footer that are divided into field containing

    specific information needed to get each packet to its destination regular, fast and

    gigabits Ethernet all used the same frame. The frame format an Ethernet is below.

    802.3 MAC Frame

  • 7/30/2019 Basic of Network

    49/74

    Preamble

    Start-of-

    Frame-

    Delimiter

    MAC

    destination

    MAC

    sourceEthernet/Length

    Payload

    (Data and

    padding)

    CRC32Interface

    gap

    7 octets of10101010

    1 octet of10101011

    6 octets6octets

    2 octets461500octets

    4 octets 12 octets

    641518 octets

    721526 octets

    Preamble (7 bytes). This field contains 7 bytes of alternating 0s and 1s,

    which the communicating systems use to synchronize their clock signals.

    Start Of Frame Delimiter (1 byte). This field contains 6 bits of

    alternating 0s and 1s, followed by two consecutive 1s, which is a signal tothe receiver that the transmission of the actual frame is about to begin.

    Destination Address (6 bytes). This field contains the 6-byte hexadecimal

    address of the network interface adapter on the local network to which the

    packet will be transmitted.

    Source Address (6 bytes). This field contains the 6-byte hexadecimal

    address of the network interface adapter in the system generating the packet.

    Ethernet/Length (2 bytes). In the DIX Ethernet frame, this field contains a

    code identifying the network layer protocol for which the data in the packet

    is intended. In the IEEE 802.3 frame, this field specifies the length of thedata field (excluding the pad).

    Data and Pad (46 to 1500 bytes). This field contains the data received

    from the network layer protocol on the transmitting system, which is sent to

    the same protocol on the destination system. Ethernet frames (including the

    header and footer, except for the Preamble and Start Of Frame Delimiter)

    must be at least 64 bytes long; so if the data received from the network layer

  • 7/30/2019 Basic of Network

    50/74

    protocol is less than 46 bytes, the system adds padding bytes to bring it up

    to its minimum length.

    Frame Check Sequence (4 bytes). The frame's footer is a single field that

    comes after the network layer protocol data and contains a 4-byte checksum

    value for the entire packet. The sending computer computes this value and

    places it into the field. The receiving system performs the same computation

    and compares it to the field to verify that the packet was transmitted without

    error.

    CSMA/CD:- carrier sance multiple access with collision detection

    (CSMA/CD), in computer networking is a network access method in which;

    A carrier sensing scheme is used.

    A transmitting data station that detects another signal while transmitting aframe, stops transmitting that frame, transmits a jam signal, and then wait for

    a random time interval (known as back off delay and determined using the

    truncated binary exponential back off algorithm) before trying to send that

    frame again.

    CSMA/CD is a modification of pure carrier sense multiple access (CSMA)

    collision detection is used to improve CSMA performance by terminating as soon

    as a collision is detected and reducing the probability of a second collision on retry.

    Method for collision detection are media dependent, but on a electrical bus

    such as Ethernet, collision can be detected by comparing transmitted data with

    received data if they differ another transmitter is overlying the first transmitters

    signal (a collision) and transmission terminates immediately. A jam signal is sent

    which will cause all transmitters to back of by random intervals, reducing the

    probability of collision when the first retry is attempted CSMA/CD is layer 2

    access method not a protocol OSI model.

  • 7/30/2019 Basic of Network

    51/74

  • 7/30/2019 Basic of Network

    52/74

    2. TOKEN RING:-IBM originally design token ring but was standardized in IEEE 802.5

    document. Token ring network were originally designed to run at 4 mbps & 16

    mbps.

    It uses a special three byte frame called a token ring frame travel completely

    around the loop. Token ring network experience no collision link Ethernet. Token

    ring network use ring topology, which is implemented logically inside the MAU,

    the token ring equivalent a Hub. When a system receives a frame from the MAU, it

    reads the destination address from the token ring header to determine it should pass

    or not.

    Token ring uses UTP & STP cable. Generally UTP Category 5 with standard

    RJ-45 is used. MAU device is also used to make token ring networking possible.

    Figure

  • 7/30/2019 Basic of Network

    53/74

    Start Delimiter (1 byte). This field contains a bit pattern that signals thebeginning of the frame to the receiving system.

    Access Control (1 byte). This field contains bits that can be used toprioritize Token Ring transmissions, enabling certain systems to have

    priority access to the token frame and the network.

    Frame Control (1 byte). This field contains bits that specify whether theframe is a data or a command frame.

    Destination Address (6 bytes). This field contains the 6-byte hexadecimaladdress of the network interface adapter on the local network to which the

    packet will be transmitted.

    Source Address (6 bytes). This field contains the 6-byte hexadecimaladdress of the network interface adapter in the system generating the packet.

    Information (up to 4500 bytes). This field contains the data generated bythe network layer protocol, including a standard LLC header, as defined in

    IEEE 802.2.Frame Check Sequence (4 bytes). This field contains a 4-byte checksum

    value for the packet (excluding the Start Delimiter, End Delimiter, and

    Frame Status fields) that the receiving system uses to verify that the packet

    was transmitted without error.

    End Delimiter (1 byte). This field contains a bit pattern that signals the endof the frame, including a bit that specifies if there are further packets in the

    sequence yet to be transmitted and a bit that indicates that the packet has

    failed the error check.

    Frame Status (1 byte). This field contains bits that indicate whether thedestination system has received the frame and copied it into its buffers.

    The following major vector IDs indicate some of the most common control

    functions performed by these packets:

    0010Beacon. Beaconing is a process by which systems on a Token Ringnetwork indicate that they are not receiving data from their nearest active

    upstream neighbor, presumably because a network error has occurred.Beaconing enables a network administrator to more easily locate the

    malfunctioning computer on the network.

    0011Claim Token. This vector ID is used by the active monitor systemto generate a new token frame on the ring.

  • 7/30/2019 Basic of Network

    54/74

    0100Ring Purge. This vector ID is used by the active monitor system inthe event of an error to clear the ring of unstrapped data and to return all of

    the systems to repeat mode.

    TOKEN PASSING:-

    Each station receive data through a connection from its nearest upstream

    neighbor, and transmit data through a connection to its nearest downstream

    neighbor. Data transmitted by a station travel sequentially, bit by bit, through each

    station. Each station repeats the data, while checking it for errors. The addressed

    destination station (s) copy the information as it passes. When the data returns to

    the originating station, it is stripped, or removed from the ring.

    A station gains the right to transmit data, or frames, onto the medium when

    it detects a token passing on the medium. The token consist of a unique signaling

    sequence that circulates on the medium following each frame transfer. Any station,

    upon detecting a valid token, my capture the token by modifying it to start of frame

    sequence and appending appropriate control and status fields, address field, check

    sum and the ending frame sequence. After completion of the frame transfer, the

    station transmits anew token allowing other station the opportunity to gain access

    to the ring.

    3. FDDI(Fiber distributed data interface):-FDDI provide a standard for data transmission in a local area network that

    can extend in range up to 200 kilometers (124 miles) although FDDI topology is a

    token ring network. It does not use the IEEE 802.5 token ring protocol as its basis;

    instead, its protocol is dividing from the IEEE802.5 token bus timed token

    protocol. In addition to covering large geographical areas FDDI local area

    networks can support thousands of users.

    HOW FDDI WORKS:-

    The computers are actually cabled together in a ring. To provide fault

    tolerance in the event of a cable break, the network is a double ring that consists of

    two independent rings, a primary and a secondary, with traffic following in

    opposite direction. A computer that is connected to both rings is called a dual

    attachment station (DAS) and when one of the ring is broken by a cable fault, the

  • 7/30/2019 Basic of Network

    55/74

    computer switch to other ring, providing continued full access to the entire

    network. A double ring FDDI network in this condition is called a wrapped ring.

    The DAC (dual attachment concentrator) creates a signal logical ring like a

    token ring MAU. A computer connected to the DAS is called a SAS (single

    attachment station). The DAS server have full advantage of the double rings fault

    tolerance, whereas the SAS computer attached to the DAC are connected to the

    primary ring only. If DAC fails the DAC can remove it from the ring without

    disturbing communication to expend the network further, we can connected

    additional DAC to port in existing DACs without limit.

    Figure

  • 7/30/2019 Basic of Network

    56/74

    CSMA/CA:-

    Carrier sense multiple access collision avoidance (CSMA/CA) is a

    probabilistic media access control (MAC) protocol in which a node verifies the

    absence of other traffic before transmission on a shared transmission medium such

    as an electrical bus, or a brand of the electromagnetic spectrum.

    Carrier sense describes the fact that a transmitter listens for a carrier wave

    before trying to send. That is, it tries to detect the presence of an encoded signal

    from another station before attempting to transmit. If a carrier is sensed, the station

    waits for the transmission in progress to finish before initiating its own

    transmission.

    Multiple access describe the fact that multiple station send and receive on

    the medium transmission by one node are generally received by all other stationusing the medium.

    CSMA/CA is a network control protocol in which;

    (a) A carrier sensing scheme is used(b)A data station that intends to transmit sends a jam signal(c) After waiting a sufficient time for all station to receive the jam signal,

    the data station transmits a frame and

    (d)While transmitting, if the data station detects a jam signal from anotherstation, it stops transmitting for a random time and then tries again.

    IEEE 802 STANDARDS:-

    IEEE 802 LAN/MAN

    IEEE 802.1 Standards for LAN/MAN bridging and management and remote media access control

    (MAC) bridging.

    IEEE 802.2 Standards for Logical Link Control (LLC) standards for connectivity.

  • 7/30/2019 Basic of Network

    57/74

    IEEE 802.3 Ethernet Standards for Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

    IEEE 802.4 Standards for token passing bus access.

    IEEE 802.5 Standards for token ring access and for communications between LANs and MANs

    IEEE 802.6 Standards for information exchange between systems.

    IEEE 802.7 Standards for broadband LAN cabling.

    IEEE 802.8 Fiber optic connection.

    IEEE 802.9 Standards for integrated services, like voice and data.

    IEEE 802.10 Standards for LAN/MAN security implementations.

    IEEE 802.11

    Wireless Networking "Wi-Fi".

    IEEE 802.12 Standards for demand priority access method.

    IEEE 802.14 Standards for cable television broadband communications.

    IEEE

    802.15.1Bluetooth

    IEEE

    802.15.4Wireless Sensor/Control Networks "ZigBee"

  • 7/30/2019 Basic of Network

    58/74

    IEEE 802.16 Wireless Networking "WiMAX"

    Wireless networking:-

    Wireless networking allow user mobility, means is that it allow connection

    to LAN without having to be physically connected by cable, wireless uses radio

    frequency as a transmission media. The technology to transmit and receive data

    over air for which user can access shared resources without looking for a place to

    plucked in cable, providing that their terminal are mobile and with in the

    designated network area, it uses variation on CSMA/CD & CSMA/CA mechanism.

    The IEEE802.11 working group was convent in 1990 for the purpose of

    developing the global wireless network with a transmission rate of 6, 12, 18, 24,

    36, 48& 54 Mbps operate at the frequency range of 5.275 to 5.875 GHz.

    The standard has come to be known as IEEE802.11a. the later IEEE 802.11b

    standard provide transmission speed of 5.5 Mbps &11 Mbps on June 2003,new

    standard was released that is 802.11g at the data rate of 54 Mbps and recently in

    Oct2008, 802.11n was released at the data transmission speed of 74 Mbps.

    IPERATING MODES:-

    IEEE 802.11 defines the following operating modes:

    Infrastructure mode Ad hoc mode

    In both operating modes, a Service Set Identifier (SSID), also known as thewireless network name, identifies the wireless network. The SSID is a name

    configured on the wireless AP (for infrastructure mode) or an initial wireless client

    (for ad hoc mode) that identifies the wireless network. The SSID is periodically

    advertised by the wireless AP or the initial wireless client using a special 802.11

    MAC management frame known as a beacon frame.

  • 7/30/2019 Basic of Network

    59/74

    802.11 Infrastructure Mode:-

    In infrastructure mode, there is at least one wireless AP and one wireless

    client. The wireless client uses the wireless AP to access the resources of a

    traditional wired network. The wired network can be an organization intranet or the

    Internet, depending on the placement of the wireless AP. An extended service set

    (ESS) is shown in the following figure.

    802.11 Infrastructure Mode

    802.11 Ad Hoc Mode:-

    In ad hoc mode, wireless clients communicate directly with each otherwithout the use of a wireless AP, as shown in the following figure.

    802.11 Wireless Clients in Ad Hoc Mode

    Ad hoc mode is also called peer-to-peer mode. Wireless clients in ad hocmode form an independent basic service set (IBSS). One of the wireless clients, the

    first wireless client in the IBSS, takes over some of the responsibilities of the

    wireless AP.

  • 7/30/2019 Basic of Network

    60/74

    PROTOCOL & TOPOLOGIES:-

    The 802.11-related protocols and technologies are discussed in detail in the

    following section:

    802.11. The IEEE 802.11 wireless standard defines the specifications for thephysical layer and the media access control (MAC) layer.

    802.1X. The IEEE 802.1X standard defines port-based, network accesscontrol used to provide authenticated network access for Ethernet networks.

    Extensible Authentication Protocol (EAP) over LAN (EAPOL). EAP is aPoint-to-Point Protocol (PPP)-based authentication mechanism that was

    adapted for use on point-to-point local area network (LAN) segments.

    Wired Equivalent Privacy (WEP). WEP provides data confidentialityservices by encrypting the data sent between wireless nodes.

    Wi-Fi Protected Access (WPA). WPA is an interim standard until the IEEE802.11i standard is ratified. These standards, intended to be a replacement

    for the WEP standard, offer more robust methods of data encryption andnetwork authentication.

    Wireless Auto Configuration. The Wireless Auto Configuration feature ofWindows XP and Windows Server 2003 dynamically selects the wireless

    network to which a connection is attempted, based either on configured

    preferences or default settings.

    INFRARED (IrDA):-

    Infrared radiation is electromagnetic radiation with a wave length between

    0.7 & 300 micrometer. It wave length is longer than that of visible light but the

    wave length is shorter than that of radiation microwaves infrared connectivity is an

  • 7/30/2019 Basic of Network

    61/74

    old wireless technology to connect two electronic devices. It uses a beam of

    infrared light to transmit information and so0 requires direct line of sight and

    operates only at close range. Infrared communication uses high frequency (infrared

    beam) to send data transmission between devices.

    IrDA (infrared data association) is a standard for transmitting data using an

    infrared port. Transfer speed is roughly the same as traditional parallel port. IrDA

    is the industry groups that create the IrDA technical standard.

    FEATURE OF INFRARED:-

    1. It provides speed up to 16 Mbps.2. It provide vary limited range approximately 3 feet and typically7 uses in PANJ,

    it uses less power.

    3.

    It is a secure mechanism because it travel short range between devices4. Infrared was superseded by Bluetooth which has drainage of operating at longdistance (around 30 feet).

    BLUETOOTYH:-

    Bluetooth is an open wireless protocol for exchanging data over short

    distances from fixed a mobile device, creating PAN. It can connect several device

    over coming problem synchronization.

    Bluetooth is essentially a networking standard that works at two levels;

    It provide agreement at the physically level Bluetooth is radio frequencystandard.

    It provides agreement at the protocol level where product have to agree onwhen bit are sent, how the parties in conversation can be sure that the

    massage sent.

    The older Bluetooth 1.0 standard has a maximum transfer speed of 1megabits/second, while Bluetooth 2.0 can manage up to 3 Mbps. Bluetooth

    2.0 is a backward compatible with 1.0 device its frequency is about 2.4 GHz.

    It was initially conceive by Ericsson.

  • 7/30/2019 Basic of Network

    62/74

    IP ADDRESS:-

    SUBNETTING:-

    Steps of sub netting:-

    1. How many subnets? No of subnet=2n where n is the no. of masked bits (1s).2. How many hosts per subnets? No. of host per network =2

    n

    -2 where n is theno. of unmasked bits (os).

    3. What are the valid subnets? 256-subnet mask= block size.4. What is the network address for each subnet?5. What is the range of each subnet? (Valid host).6. What is the broadcast address of each subnet?.

  • 7/30/2019 Basic of Network

    63/74

    SUBNET MASK:-

    A subnet mask allows us to identify which part of an IP address is reserved

    for the network, and which part is available for host use. If we look at the IP

    address alone specially with CIDR (class less inter domain) , we cant tell which

    part of address is which. Subnet mask gives all the information to calculate

    network & host portion of the address for example:-

    IP address:-156.154.126.45

    Subnet mask:- 255.255.255.240

    Subnet mask are critical to communication on an IP network. Network

    devices use the IP address target and defined net mask to determine if the network

    the host on is a local subnet, or a remote network.

    SU8BNET:-

    A subnet is a logical origination of network address ranges used to separate

    host and network devices from each other to serve as physical or geographical

    separation.

    BROAD CAST ADDRESS:-

    A b/a address is an IP address that we can use the target all system on a

    specific subnet instead of single hosts. The broad cast address of any IP address

    can be calculated by taking the bit compliment of the subnet mask , sometimes

    referred to as the reverse mask , and then applying it with a bit wise or calculation

    to the IP address in question.

    ISDN (integrated service digital network)

    ISDN is a set of communication standards for simultaneous digital

    transmission of voice, video, data and other network service over the traditional

    circuit of PSTN (Public switch telephone network).

  • 7/30/2019 Basic of Network

    64/74

    The key feature of ISDN is that it integrated speech and data on the same

    lines. There are several kinds of access interfaces to ISDN defined as BRI (basic

    rate interface), PRI (primary rate interface) and broadband ISDN.

    ISDN is a circuit switch telephone network system which also provides

    access to packet switch network, designed to allow digital transmission of voice

    and data. ISDN is designed to provide access to voice and data service

    simultaneously.

    BRI (basic rate interface):- consist of two B Chanel (64 Kbps) and one D

    channel for transmitting control information.

    PRI (primary rte interface):- consist of 23 B channels and one D channel.

    B for barer channel

    D for delta channel

    PSTN (public switch telephone network)

    PSTN is the global collection of interconnect originally designed to support

    circuit voice telephone. The PSTN provides the traditional POTS (plane old

    telephone service) to residences and many other establishments parts of the PSTN

    are also utilized for DSL (digital subscriber loop), VOIP (voice over I P) and other

    internet based network technology.

    The basic PSTN network link support 64 kbps band width. Traditional dial

    up modem utilized nearly 56 kbps of this band width when connected to a phone

    line.

    DATA ENCAPSULATION:-

    The sending and receiving of data from a source device to the destinationdevice is possible with the help of networking protocols by using data

    encapsulation. The data is encapsulated with protocol information at each layer of

    the OSI reference model. When a host transmits data to another device across a

    network, each layer communicates with its neighbor layer on the destination, each

    layer uses protocol data units (PDUs) to communicate and exchange information.

  • 7/30/2019 Basic of Network

    65/74

    IMAGE:

    PDU (PROTOCOL DATA UNIT):-

    The PDU contains the control information attached ton the data at each

    layer. The information is attached to the header of the data field but can also be inend of the data field or trailer. PDUs are encapsulating by attached them to the data

    attached layer of the OSI reference model.

    DE-ENCAPSULATION:-

    On destination side, the receiving device will synchronize on the digital

    signal and extract the 1s and 0s from the digital. At this point the devices build the

    frame, run a cyclic redundancy check (CRC) , and then check their output against

    the output in the frame check sequence (FCS) field of the data frame, if the

    information matches then the packet is pulled from the frame, and the frame isdiscarded. This process is known as de-encapsulation.

  • 7/30/2019 Basic of Network

    66/74

    IMAGE:-

    HOW TO MAKE A NETWORK CABLE:-

    1. Unroll the required length of network cable and add a little extra wire, just incase.

    2. Carefully remove the outer jacket of cable.3. Inspect the newly revealed wires for any cuts or scraps that expose the copper

    wire inside.

    4. Untwist the pair so they will lay flat between your fingers.5. Arrange the wires based on the wiring specification you are following:-

    there are two method set by the TIA, 568A and 568B. Which we used will

    depend on what is being connected. A straight through cable is used to connect

    two different layer devices (hub & a pc). Two like devices normally require a

    cross over cable. The difference between the two is that a straight through

    cable has both ends wired identically with 568A, while a cross over cable has

    one end wire 568A and the other end wired 568B for our5 demonstration in the

    following steps. We will use 568B but the instructions can easily be adapted to

    568A.

    568A:- put the wire in the following order, from left to right.

  • 7/30/2019 Basic of Network

    67/74

    White orange Orange White green Blue White blue green White brown Brown568B:- from left to right; white green, green, white orange, blue, white blue,

    orange, white brown, brown. We can also use the mnemonic 1-2-3-6/3-6-1-2

    to remember which wire is switched.

    white green green white orange Blue white blue Orange white brown Brown

    6. Press all the wires flat and parallel between our thumb and fore finger.7. Keep the wire flat and in order as you push them into the rj-45 plug with the

    flat surface of the plug on top

    ROLL OVEER CABLE:-

    A rollover cable is used with each pin on one end of cable connected to the

    reverse pin on the other end. So the cable on pin 1 on one end of the cable connectsto pins at the other end, etc. rollover cable are used to connect the serial port of a

    network switch so that you can configure the network switch. These cables are not

    used for network connectivity.

  • 7/30/2019 Basic of Network

    68/74

    SWITCHING TECHNIQUES:-

    Switching techniques are used for transmitting data across the networks. 3

    types of switching techniques are there, circuit switching, message switching,packet switching.

    CIRCUIT SWITCHING:-

    Circuit switching physical connection between the two computers is

    established and then data is transmitted from source to destination computer. When

    a computer places a telephone call, the switching equipment within the telephone

    system seeks out a physical copper path from senders to receivers telephone. It

    sets up end to end connection between computers before any data can be sent.

    MASSEGE SWITCHING:-

    Massage switching the source computer sends the data to the switching

    office first which store the data in its buffer. It then looks for a free link to another

    switching office and then sends the data to this office. Process is continued till the

    data is delivered to the destination computer. It is also known as store and forward

    technique.

    PACKET SWITCHING:-

    Packet switching there is a tight upper limit on the block size. In massage

    switching there was no upper limit. A fixed size of packet is specified. All the

    packets are stored in main memory in switching office. In massage switching

    packets are stored on disk. This increases the performance as access time is

    reduced.

  • 7/30/2019 Basic of Network

    69/74

    NETWORK MANAGEMENT:-

    Network management is the process of controlling a complex data network

    to maximize its efficiency and productivity.

    The overall goal of network management is to help with the complexity of a

    data network and to ensure that data can go across it with maximum efficiency and

    transparency to the users.

    The international organization for standardization (ISO) network

    management forum divided network management into five functional areas;

    Fault managementConfiguration managementSecurity managementPerformance managementAccounting management

    FAULT MANAGEMENT:-

    It is the process of locating problems or faults, on the data network. It involves the following steps;

    Discover the problem Isolate the problem Fix the problem (if possible)

    CONFIGURATION MANAGEMENT:-

    The configuration of certain network deices controls the behavior of the datanetwork.

    Configuration management is the process of finding and setting up(configuring) these critical devices.

  • 7/30/2019 Basic of Network

    70/74

    SECURITY MANAGEMENT:-

    It is the process of controlling access to information on the data network. Provides a way to monitor access points and records information on a

    periodic basic provides audit trails and sounds alarms for security breaches.

    PERFORMNCE MANAGEMENT:-

    Involves measuring the performance of the network hardware, software andmedia.

    Example of measured activities are;

    Overall throughput. Percentage utilization. Error rates. Response time.

    ACCOUNTING MNAGEMENT:-

    Involves tracking individuals utilization and grouping of network resourcesto ensure that users have sufficient resources.

    Involves granting or rumoring permission for access to the network.

    NETWORK OPERATING SYSTEM:-

    A network operating system (NOS) is a peace of software that controls a network

    and its message, traffic and queues, control access by multiple user to network

    resources such as files and provide for certain administrative function including

    security. It is use in both LAN & WAN.

    NEEDS OF NOS:-

    It provides basic operating system feature such as support for processorprotocol, automatic hardware detection.

  • 7/30/2019 Basic of Network

    71/74

    Security feature such as authentication, authorization logon restriction andaccess control.

    Provide name & directory services.Provide file, print web services etc.Highly fault tolerant and highly capable.

    NOVELL UNIX WINDOWS LINUX

    Netware HP-UX NT Red hat

    Internet were sun Solaris 2000 server Caldera

    BSD Net server Sues

    SCO server 2003 Devins

    AIX Server 2008 Slack ware

    NOS CONSIDERATIONS:-

    security Encryption user authentication

    robustness balanced workload redundancy

    performance consistency overstrain

    scalability ready for growth

    management system administration

    WINDOW OS:-

    window NT work station corporate users

    Server department server

    window 2000 Professional corporate uses or small

    Server intent or remote access server

    advantage server department serverNet enterprise server

    enterprise server

    enterprise internet server

  • 7/30/2019 Basic of Network

    72/74

    NETWORK MANAGEMENT PROTOCOL:-

    A simple protocol defines common data formats and parameters and allowsfor easy retrieval of information.

    A complex protocol adds some change capability and security.An advanced protocol remotely executes network management task is

    independents of the network layer.

    The most common protocols are;

    SNMP(simple network management protocol) SNMP v2(SNMP version 2) CMIS/CMIP(common management information services/common

    management information protocol)

    SNMP is beyond the simple protocol with adequate monitoring capabilities and

    some change capabilities.

    SNMP v2 greatly enhances the SNMP feature set.

    CMIP/CMIS approaches the advantage tool but implementation issues have limited

    its use.

    SNMP:-

    At the end of the 80s a solution was chosen called the internet standard network

    management framework.

    This was a set of three documents defining.

    A set of rules for describing management information. An initial set of managed objects. A protocol used to exchange management information.

  • 7/30/2019 Basic of Network

    73/74

    DNS (domain name system):-

    The domain name system (DNS) is a hierarchical naming system for

    computer, services or any resource connected to the internet or a private network.

    It associates various information with domain names assigned to each of the

    participants. Most importantly, it translated domain names meaningful to humans

    into the numerical (binary) identifiers associated with networking equipment for

    the purpose of locating and addressing these devices worldwide.

    No often used analogy to explain the domain name system is that it serves as

    the phone book for the internet by translating human friendly computer

    hostnames into IP address for example; www.example.com translates to

    208.77.188.166.

    NET BIOS:-

    Network basic input output system is a program that allows applications on

    different computer to communicate with in a local area network. It was created by

    IBM for its early PC network, was adapted by Microsoft. Net BIOS is use in

    Ethernet and token ring networks and included as part of (net BEUI), in resent

    Microsoft windows operating system.

    Net BIOS provides the session and transport services described in the OSImodel. It does not provide a standard frame or data format for transmission. A

    standard frame format is provided by net BEUI.

    NETWORK TROUBLESHOOTING COMMAND:-

    Computer network can have different kinds of problems such as it can be infected

    with virus, attached by hackers, accessed by unauthorized users and may face

    connectivity failure issues due to the faulty network devices or configuration.

    Using following trouble shooting command can help him diagnosing andresolving the issues with our computer network.

    PING: - ping is the most important trouble shooting command for checking the

    connectivity with the other computer.

    Ping

  • 7/30/2019 Basic of Network

    74/74

    IPCONFIG: - it shows the IP address of the computer and also it shows the DNS,

    DHCP, Gateway addresses of the network & subnet mask.

    IPCONFIG /ALL: - it shows the details information of whole network parameter

    like IP, MAC, Subnet mask, LAN connectivity.

    NSLOOKUP: - Nslookup is a TCP/IP based command and it checks domain name

    aliases, DNS record, operating system information. This command is specially

    used to resolve the errors with the DNS of our network server.

    HOST NAME: - host name command shows our computer name.

    NETSTAT: - this utility shows the protocol statics and the current established

    TCP/IP connection in the computer.

    NBTSTAT: - it helps to troubleshoot the NetBIOS name resolution problem.

    ARP: - ARP displays and modifies IP to physical address translation table that is

    used by ARP protocol.

    TRACERT: - it is used to determine the path of the remote system. It also

    provides the no. of hopes and the IP address of each hope.

    Tracert

    TRACEROUTE: - trace route is the network debugging command and it is used

    in locating the server that is slowing down the transmission on the internet and it

    also shows the route between the two system or two hopes.

    Trace route

    ROUTE: - route command allows us to make manual entrees in the routing table