Introduction To Networking
Introduction To Networking
July 2022
Overview of networking
Types of networks
Based on the geographical area covered and data transfer
rate, computer networks are broadly categorised as:
● PAN ( Personal Area Network)
● LAN (Local Area Network)
● MAN (Metropolitan Area Network)
● WAN (Wide Area Network)
Overview of networking
The Internet
● The Internet is a public and global communication network
that provides direct connectivity to anyone over a local
area network (LAN) or Internet Service Provider (ISP).
Intranet, Extranet, and Internet
The Internet
● The Internet is a public network that is connected and
routed over gateways. End users are connected to local
access providers (LANs or ISPs), who are connected to
the Internet access providers, to network access
providers, and eventually to the Internet backbone.
Intranet, Extranet, and Internet
The Internet
● Since access to the Internet is open to all, there is a lack
of control that may result in an unruly proliferation of
information.
Intranet, Extranet, and Internet
The Intranet
● An intranet is a corporate LAN or wide area network
(WAN) that uses Internet technology and is secured
behind company’s firewalls.
Intranet, Extranet, and Internet
The Intranet
● The intranet links various servers, clients, databases, and
application programs like Enterprise Resource Planning
(ERP). Although intranets are developed on the same
TCP/IP protocol as the Internet, they operate as a private
network with limited access.
Intranet, Extranet, and Internet
The Intranet
● Only authorized employees are able to use it. Intranets
are limited to information pertinent to the company and
contain exclusive and often proprietary and sensitive
information.
Intranet, Extranet, and Internet
The Extranet
● An extranet, or “extended intranet”, uses the TCP/IP
protocol network of the Internet, to link intranets in
different locations.
● Extranet transmission is usually conducted over the
Internet, which offers little privacy or transmission security.
Intranet, Extranet, and Internet
The Extranet
● Therefore, when using an extranet, it is necessary to
improve the security of connecting portions of the Internet.
This can be done by creating tunnels of secured data
flows, using cryptography and authorization algorithm.
● The Internet with tunneling technology is known as a
virtually private network (VPN).
Comparison of
Intranet,
Extranet, and
Internet
Identifying nodes in a network
MAC address
● MAC stands for Media Access Control.
● The MAC address, also known as the physical or
hardware address, is a unique value associated with a
network adapter called a NIC.
Identifying nodes in a network
MAC address
● The MAC address is engraved on NIC at the time of
manufacturing and thus it is a permanent address and
cannot be changed under any circumstances.
● The machine on which the NIC is attached, can be
physically identified on the network using its MAC
address.
Identifying nodes in a network
MAC address
● Each MAC address is a 12-digit hexadecimal numbers (48
bits in length), of which the first six digits (24 bits) contain
the manufacturer’s ID called Organisational Unique
Identifier (OUI) and the later six digits (24 bits) represents
the serial number assigned to the card by the
manufacturer.
Identifying nodes in a network
MAC address
● A sample MAC address looks like:
FC:F8:AE: CE:7B:16
OUI Unique Serial Number
Identifying nodes in a network
IP address
● IP address, also known as Internet Protocol address, is
also a unique address that can be used to uniquely
identify each node in a network.
● The IP addresses are assigned to each node in a network
that uses the Internet Protocol for communication. Thus, if
we know a computer’s IP address, we can communicate
with that computer from anywhere in the world.
Identifying nodes in a network
IP address
● However, unlike MAC address, IP address can change if a
node is removed from one network and connected to
another network.
Identifying nodes in a network
IP address
● The initial IP Address called version 4 (IPV4 in short), is a
32 bit numeric address, written as four numbers separated
by periods, where each number is the decimal (base-10)
representation for an 8-bit binary (base-2) number and
each can take any value from 0 - 255.
● A sample IPV4 address looks like:
192:168:0:178
Identifying nodes in a network
IP address
● With more and more devices getting connected to the
Internet, it was realised that the 32-bit IP address will not
be sufficient as it offers just under 4.3 billion unique
addresses.
Identifying nodes in a network
IP address
● Thus, a 128 bits IP address, called IP version 6 (IPV6 in
short) was proposed. An IPv6 address is represented by
eight groups of hexadecimal (base-16) numbers
separated by colons. A sample IPV6 address looks like:
2001:CDBA:0000:0000:0000:0000:3257:9652
HTML
http://test.edu/onlinetest.htm
URL
URL
URL: http://www.bca.com/it/index.html
● http is the protocol.
● bca.com is the server name.
● index.htm is the file name.
● it directory
HTTP
● Root Server
● Primary Server
● Secondary Server
Root server
HTTP is connectionless
HTTP is connectionless
HTTP is stateless
HTTP is stateless
● Client
● The HTTP client sends a request to the server in the
form of a request method, URI, and protocol version,
followed by a MIME-like message containing request
modifiers, client information, and possible body content
over a TCP/IP connection.
HTTP
● Server
● The HTTP server responds with a status line, including
the message's protocol version and a success or error
code, followed by a MIME-like message containing
server information, entity meta information, and
possible entity-body content.
TCP 3-Way Handshake Process
● Techniques -
a. Protocols that use algorithm feedback to reduce data packet
throughput to acceptable levels are exponential backoff protocols.
b. Prioritization strategies are used to allow only critical data streams
to be transmitted.
c. Appropriate network resource allocation in anticipation of
increased data packet throughput requirements.
Congestion Control
● Algorithms -
a. Leaky Bucket
b. Token Bucket Algorithm
Congestion Control
340,282,366,920,938,463,463,374,607,431,768,211,456
and this number will never run out(at least in near future).
IPV6
adba:1925:0000:0000:0000:0000:8a2e:7334
IPV6
● Network
Address
Translation
(NAT)
IP masquerading
● The machines on
network
192.168.2.x will
obtain services
through gateway
B using IP
masquerading,
when gateway B
is setup properly.
IP masquerading
● When gateway B
receives the packages
from S6, it converts
them to ping packages
as though they were
sent from itself and
sends them to S2.
IP masquerading
● Gateway B then
converts the packages
to be addressed to S6
and sends them.
Routing
● Unicast routing
● Most of the traffic on the internet and intranets known as unicast
data or unicast traffic is sent with specified destination. Routing
unicast data over the internet is called unicast routing. It is the
simplest form of routing because the destination is already
known. Hence the router just has to look up the routing table and
forward the packet to next hop.
Routing
Routing
● Broadcast routing
● By default, the broadcast packets are not routed and forwarded
by the routers on any network. Routers create broadcast
domains. But it can be configured to forward broadcasts in some
special cases. A broadcast message is destined to all network
devices.
Routing
● A router creates a data packet and then sends it to each host one
by one. In this case, the router creates multiple copies of single
data packet with different destination addresses. All packets are
sent as unicast but because they are sent to all, it simulates as if
router is broadcasting.
● This method consumes lots of bandwidth and router must
destination address of each node.
Routing
● This method is easy on router's CPU but may cause the problem of
duplicate packets received from peer routers.
● Reverse path forwarding is a technique, in which router knows in
advance about its predecessor from where it should receive
broadcast. This technique is used to detect and discard duplicates.
Routing
● Multicast routing
● Multicast routing is special case of broadcast routing with
significance difference and challenges. In broadcast routing,
packets are sent to all nodes even if they do not want it. But in
Multicast routing, the data is sent to only nodes which wants to
receive the packets.
Routing
Routing
● Multicast routing
● The router must know that there are nodes, which wish to receive
multicast packets (or stream) then only it should forward.
Multicast routing works spanning tree protocol to avoid looping.
● Multicast routing also uses reverse path Forwarding technique, to
detect and discard duplicates and loops.
Routing
● Flooding
● Flooding is simplest method packet forwarding. When a packet is
received, the routers send it to all the interfaces except the one on
which it was received. This creates too much burden on the
network and lots of duplicate packets wandering in the network.
Routing algorithm
● Shortest Path
● Routing decision in networks, are mostly taken on the basis of
cost between source and destination. Hop count plays major role
here. Shortest path is a technique which uses various algorithms
to decide a path with minimum number of hops.