BASIC NETWORKING MANUAL
BASIC NETWORKING MANUAL
FOR
ND 2 COMPUTER SCIENCE
CHAPTER ONE
1.1 COMPUTER NETWORKING
A computer network consists of two or more autonomous computers that are
connected together in order to:
Share resources (files, printers, modems, fax machines).
Share Application software like MS office.
Allow Electronic communication.
Makes it easier to share data amongst users.
The computers on a network may be linked through Cables, telephones lines, radio
waves, satellites etc. A computer network includes, the network operating system
in the client and server machines, the cables, which connect different computers
and all supporting hardware ill between such as bridges, routers and switches.
A network is a group of two of more computer systems sharing services and
interacting in some manner. This interaction is accomplished through a shared
communication link with the shared components being data. Also a network is a
collection of machines that have been linked both physically and through software
components to facilitate communication and the sharing of information.
A physical pathway known as transmission medium, connects the systems and a
set of rules determines how they communicate. These rules are known as
protocols. A network protocol is a software installed on a machine that determines
the agreed –upon set of rules for two or more machine to communicate with each
other. One common metaphor used to describe different protocols is to compare
them to human languages. Think of a group of people in the same room who know
nothing about each other. In order for them to communicate, this group must
determine what language to speak and how to identify each other, whether to make
general announcements or have private conversations and so on. Machines using
different protocols installed can't communicate with each other. Networks are
widely used by companies or on personal level also.
Fig 1: A typical computer Networking Environment
NETWORK
The network can be divided into geographical areas and fall into one of two major
categories
Local Area Network (LANs)
Metropolitan Area Network (MANs)
Wide Area Network (WANs)
Campus Area Networks (CANs)
Personal Area Network (PANs)
CHAPTER TWO
2.1 HARDWARE COMPONENTS OF COMPUTER
The interfaces and devises that are used to connect computing devices and
transmission media are called connectivity hardware or network connectivity
devices. Network connectivity hardware connects individual devices and
transmission media are called connectivity hardware or network connectivity
devices”. Network connectivity hardware connects individual devices to a single
network, for example a PC or printer would use network connectivity devices to
connect to UTP.
• Router
• Switches
• Repeater
• Gateway and cables
Router
Router is layer-3 Device. Layer-3 routing is the process of forwarding a packet
from one network to another network, based on the Network-layer header. Routers
build routing tables to perform forwarding decisions, which contain the following:
• The destination network and subnet mask
• The next hop router to get to the destination network
• Routing metrics and Administrative Distance
Function of Repeater
Repeater is use to replicate
The repeater amplifies
Repeater received a signal and transmits it before it becomes too weak or
corrupted.
2.4 BRIDGES
Bridges connects two separate networks to form a logical one by operating at the
data link layer of the OSI model. Bridges rely on MAC addresses for their
operation. Unlike repeaters, bridges examine the packet's destination address
before forwarding it to other segments. A bridge extends the maximum distance of
your network by connecting separate network segments, and selectively pass
signals from one medium segment to another. Bridges isolate the media access
mechanisms of the LANs to which they are connected. If a packet has a destination
address on the same network segment as the source of the signal, the bridge ignore
the signal. If the destination address is different from the source address network
segment, the bridge sends the message along in a fashion similar to what a repeater
would. Since bridges are selective about which data packets can be transferred,
they are useful in solving traffic bottlenecks it must be noted, however that bridges
do not reduce traffic caused by broadcast packets or
broadcast storms.
Function of Bridge
A bridge functions by blocking or forwarding data, based on the destination MAC
address written into each frame of data.
2.5 ROUTERS
Routers like bridges-can be used to connect network segments. Whereas bridges
only know to forward what they don't recognized, routers are aware of multiple
paths that lead to a destination address and know which path is best.
Function of Router
Routers are normally responsible for performing the following functions:
Route selection: A router is maintaining the information in its routing table
about how to reachremote networks. It will then make routing decisions
based on that information
Logical addressing: A device that operates at layer 3 requires some form of
logical addressing.These addresses will be used to determine route selection.
Segmentation: routers can be provided by a powerful method of segmenting
your networks to allow optimum utilization of available bandwidth.
2.6 NETWORK INTERFACE CARD (NIC)
A NIC (pronounced 'nick') is also known as a network card. It connects the
computer to the cabling, which in turn links all of the computers on the network
together. Each computer on a network must have a network card. Most modern
network cards are 10/100 NICs and can operate at either 10Mbps or 100Mbps.
Computers with a wireless connection to a network also use a network card. NIC
hardware address is in Hexadecimal form and it is of 48 bit
Functions
A NIC provides a computer with a dedicated full-time connection to a
network.
It implements the physical layer circuitry necessary for communicating with
a data link layer standard, such as Ethernet or Wifi.
Each card represents a device and can prepare, transmit and control the flow
of data on the network.
CHAPTER THREE
3.1 Network Planning and Design
Network planning and design is an iterative process, encompassing topological
design, network synthesis and network realization, and is aimed at ensuring that a
new telecommunications network or service meets the needs of the subscriber and
operator. The process can be tailored according to each new network or service.
The network planning process involves three main steps:
• Topological Design: This stage involves determining where to place the
components and how to connect them. The (topological) optimization
methods that can be used in this stage come from an area of mathematics
called Graph theory. These method involve determining the cost of
transmission and the cost of switching, and thereby determining the
optimum connection matrix and location of switches and concentrators.
• Network Synthesis: This stage involves determining the size of the
components used, subject to performance criteria such as the Grade of
services (GOS). The method used is known as “Nonlinear Optimization”,
and involves determining the topology, required GOS, cost of transmission,
etc, and using this information to calculate routing plan and the size of the
components.
• Network Realization: This stage involves determining how to meet
capacity requirements, and ensure reliability within the network. The
method. The method used is known as “Multi-commodity flow
Optimization”, and involves all information determining relating to demand,
costs, and reliability, and then using this information to calculate and actual
physical circuit plan.
The steps are performed iteratively in parallel with one another.
THE ROLE OF FORECASTING
During the process of Networking planning and Design, estimates are made of the
expected traffic intensity and traffic load that the network must support. Fi a
network of a similar nature already exists, traffic measurements of such a network
can be used to calculate the exact traffic load. If there are no similar networks, then
the network planner must use telecommunications forecasting methods to estimate
the expected traffic intensity.
The forecasting process involves several steps:
• Definition of a problem
• Data acquisition
• Choice of forecasting method
• Analysis/ forecasting
• Documentation and analysis of results.
BUS TOPOLOGY
RING TOPOLOGY
MESH TOPOLOGY
A mesh network has point-to-point connections between every device in the
network. Because each device requires an Interface for every other device on the
network, mesh topologies are not usually considered practical. However, mesh
networks are extremely fault tolerant, and each link provides guaranteed capacity.
Typically, you use mesh topologies in a hybrid network with just the largest or
most important sites interconnected. You would use a hybrid mesh topology with
redundant links between the main sites to insure continuous communications
between the mainframes. The following figure will explain the topological
difference between true mesh and hybrid mesh.
CELLULAR TOPOLOGY
CHAPTER FOUR
4.1 NETWORK CLASSIFICATION
(a) Point-to-point
Point-to-point, networks are those in which there are many connections between
individual pairs of machines. In these networks, when a packet travels from source
to destination it may have to first visit one or more intermediate machines. Routing
algorithms play an important role in point-to-point networks because often
multiple routes of different lengths are available. a personal computer directly to a
printer, you have created a point-to-point link. Another example is the link
between two microwave antennas. The figure given below shows point-to-point
connections. Because only two devices share a point-to point connection, each
station is guaranteed a specific transmission capacity or bandwidth.
Fig. 4.1: point-to-point connection
(b) Peer-to-Peer
Shielded
Unshielded
CHAPTER FIVE
5.1 OPEN SYSTEM INTERCONNECTION MODEL (OSI)
Open System Interconnection (OSI) Model is a logical and conceptual model that
defines network communication used by systems open to interconnection and
communication with other systems. The open system interconnection (OSI Model)
is also a set of protocols that attempt to define and standardize the data
communications process; we can say that it is a concept that describes how data
communications should take place. The OSI model was set by the international
Standards Organizations (ISO) in 1984, and it is now considered the primary
architectural model for inter-computer communications. The OSI model has the
support of most major computer and network vendors, many large customers, and
most governments in different countries. The open System Interconnection (OSI)
reference model describes how information from a software application in one
computer moves through a network medium to a software application in another
computer. The OSI reference model is a conceptual model compose of seven layers
as show in below each specifying particular network functions and into these
layers are fitted the protocol standards developed by the ISO and other standards
bodies. The OSI model divides the task involved with moving information between
networked computers into seven smaller, more manageable task groups. A task or
group of tasks is then assigned to each of the seven OSI layers. Each layer is
reasonably self-contained so that the tasks assigned to each layer can be
implemented independently. This enables the solutions offered by one layer to be
updated without affecting the other layers.
The OSI model is modular. Each successive layer of the OSI model works with the
one above and below it. Although each layer of the OSI model provides its own set
of functions, it is possible to group the layer into two distinct categories. The first
four layers i.e, physical, data link, network, and transport layer proved the end-to-
end services necessary for the transfer of data between two system. These layers
pr9.flde the protocols associated with the communications network used to link
two computers together. Together, these are communication oriented.
The top three layers i.e, the application, presentation, and session layers provide
the application services required for the exchange of information. That is, they
allow two application, each running on a different node of the network to interact
with each other through the services provided by their respective operating
systems. Together, these are data processing oriented.
The following are the seven layers of the Open System Interconnection (OSI)
reference model.
Layer 7 - Application layer
Layer 6 - Presentation layer
Layer 5 - Session layer
Layer 4 - Transport layer
Layer 3 - Network layer
Layer 2 - Data link layer
Layer 1 - physical layer
Application Layer (layer 7)
The application layer is probably the most easily misunderstood layer of the model.
This top layer defines the language and syntax that program use to communicate
with other program. The application layer represents the purpose of
communicating in the first place. For example, a program in a client workstation
uses commands to request data from a program in the server. Common functions at
this layer and opening, closing, reading and writing files, transferring files and e-
mail messages, executing remote jobs and obtaining directory information about
network resources etc.
Presentation Layer (Layer 6)
the presentation layer performs code conversion and data reformatting (syntax
translation). It is the translator of the network; it makes sure the data is in the
correct form for the receiving application. when data are transmitted between
different types of computer systems, the presentation layer negotiates and manages
the way data are represented and encoded. For example, it provides a common
denominator between ASCII and EBCDIC machines as well as between different
floating point and binary formats. Sun’s XDR and OSI’s ASN,I are two protocols
used for this purpose. This layer is also used for encryption and decryption. It also
provides security features through encryption and decryption.
Session Layer (Layer 5)
The session layer decides when to turn communication on and off between two
computers. It provides the mechanisms that controls the data-exchange process and
coordinates the interaction (communication) between them in ail orderly manner.
It sets up and clear communication channels between two communicating
components. It determines one-way or two-way communications and manages the
dialogue between both parties; for example, making sure that the previous request
has been fulfilled before the next one is sent. It also marks significant prats of the
transmitted data with checkpoints to allow for fast recovery in the event of a
connection failure.
Transport Layer (Layer 4)
The transport layer is responsible for overall end-to-end validity and integrity of
the transmission i.e, it ensures that data is successfully sent and received between
two computers. The lower data link layer (layer 2) is only responsible for
delivering packets from one node to another. Thus, if a packet gets lost in a router
somewhere in the enterprise internet, the transport layer will detect that. It ensures
that if a 12MB file is sent, the full 12MB is received.
If data is sent incorrectly, this layer has the responsibility of asking for
retransmission of the data. Specifically, it provides a network independent, reliable
message independent, reliable message interchange service to the top three
application-oriented layers. This layer acts as an interface between the bottom and
top three layers. By providing the session layer (layer 5) with a reliable message
transfer service, it hides the detailed operation of the underlying network from the
session layer.
Network Layer (layer 3)
The network layer establishes the route between the sending and receiving stations.
The unit of data at the network layer is called a packet. It provides network routing
and flow and congestion functions across computer network interface.
It makes a decision as to where to route the packet based on information and
calculations from other routers, or according to static entries in the routing table. It
examines network addresses in the data instead of physical address see in the Data
Link layer. The Network layer establishes, maintain, and terminates logical and/or
names, into physical addresses.
The main device found at the Network layer is a router
Data Link Layer (Layer 2)
The data link layer groups the bits that we see o the physical layer into Frames. It
is primarily responsible for error-free delivery of data on a hop. The data link layer
is split into two sub-layer i.e, the Logical Link Control (LLC) and Media Access
Control (MAC). The Data-Link layer handles the physical transfer, framing (the
assembly of data into a single unit or block), flow control and error-control
functions (and retransmission in the event of an error) over a single transmission
link; it is responsible for getting the data packaged and onto the network cable. The
data link layer provides the network layer (layer 3) reliable information-transfer
capabilities. The min network device found at the Datalink layer is a bridge. This
device works at a higher layer than the repeater and therefore is a more complex
device. It has some understanding of the data it receives and can make a decision
based on the frames it receives as to whether it needs to let the information pass, or
can remove the information from the network. This means that the amount of
traffic on the medium can be reduced and therefore, the usable bandwidth can be
increased.
Physical Layer (Layer 1)
The data units on this layer are called bits. This layer defines the mechanical and
electrical definition of the network medium (cable) and network hardware. This
includes how data is impressed onto the cable and retrieved from it. The physical
layer is responsible for passing bits onto and receiving them from the connecting
medium. This layer gives the data-link layer (layer 2) its ability to transport a
stream of serial data bits between two communicating systems; it conveys the bits
that moves along the cable. It is responsible for ensuring that the raw bits get from
one place to another, no matter what shape they are in, and deals with the
mechanical and electrical characteristics of the cable. This layer has not
understanding 01 the meaning of the bits, but deals with the electrical and
mechanical characteristics of the signals and signaling methods.
The main network device found in the physical layer is a repeater. The purpose of
a repeater (as the name suggests) is simply to receive the digital signal. Reform it,
and retransmit the signal. This has the effect of increasing the maximum length of
a network, which would not be possible due to signal deterioration if a repeater
were not available. The repeater, simply regenerates cleaner digital signal so it
doesn’t have to understand anything about the information it is transmitting, and
processing on the repeater is non-existent. An example of the physical layer is RS-
232. Each layer, with the exception of the physical layer, adds information to the
data as it travels from the application layer down to the physical layer. This extra
information is called a header. The physical layer does not append a header to
information because it is concerned with sending and receiving information on the
individual bit level.
5.2 TCP/IP REFERENCE MODEL
APPLICATION LAYER
TRANSPORT LAYER
NETWORK LAYER
LINK/PHYSICAL LAYER
CHAPTER SEVEN
7.1 INTERNET AND EXTRANET
INTERNET
When ARPANET and NSFNET were interconnected the number of networks,
machines and users grew exponentially, many regional networks joined up and
connections were made across many countries. The internet is said to have been
“officially” born around 1982 when the different networks (BITNET, EARN, etc.)
agreed on using the TCP/IP protocol as a standard for their interconnections
making it a network of networks and overcoming some of the previous cacophony
of standards, protocols and increasing it coverage. The world internet was coined
from the words “interconnection” and “network”, Now Internet is the world’s
largest computer network. It is considered to be the network of networks, and is
scattered allover the world. The computers connected to the internet may
communicate with each other using fiber optic cables, telephone lines, satellite
links and other media. The development of Internet is coordinated by a non-profit
organization called the internet Society (ISOC). Its aim is to spread the use of
internet, keep statistics of its use, helpless developed countries in building their
infrastructure and internet-technology. The internet Architecture Board (IBA),
plans long term trends and keeps a record of the RFC (Request for Comments)
documents on various technical solutions and protocols used in internet. The
development is also steered by the IETF (Internet Engineering Task Force), which
has several sub-groups for handling various problems and planning new standards
etc. The rapid growth of internet may also be due to several important factors:
1. Easy-to-use software graphical browsers
2. Improved telecommunications connections
3. Rapid spread of automatic data processing, including electronic mail, bank
transfers, etc.
4. The information superhighway projects.
The internet Society maintains a list of internet service providers providing
connections allover the world. There is one “universal” aspect of all computers
connect to the internet i.e, the all run the TCP/IP family of protocol.
The internet protocol (IP) gives the physical 32-bit address, which uniquely
identifies and individual computer connected to the internet, while Transmission
control protocol (TCP) is a connection-oriented protocol, which takes cares of the
delivery and order of the packages. TCP also provides the port numbers for
individual services within a computer. The major information services provided by
the Internet are (with the protocol in parenthesis): electronic mail (SMTP), remote
file copying (FTP), remote login, terminal connections (TELNET), menu-based
file access (GOPHER), wide area information servers (W AIS, Z39.50), the World
Wide Web (HTTP), and the packet internet Groper (PING).
EXTRANET
An extranet is a controlled private network that allows access to partners, vendors
and suppliers or an authorized set of customers normally to a subset of the
information accessible from an organization’s intranet. An extranet is similar to a
DMZ in that it provides access to needed services for authorized parties, without
granting access to an organization’s entire network.
7.2 TYPES OF INTERNET CONNECTION
There are three fundamental types of network connections
Local Area Network
Wifi Hotspots
Wife Hotspots are sites that offer internet access over a wireless local area network
(WLAN) by way of a router that then connects to an internet service provider.
hotspots utilized WIFI technology which allows electronic devices to connect to
the internet or exchange data wirelessly through radio waves.
Dial-up
Dial-up connections require users to link their phone line to a computer in order to
access the internet. This particular type of connection also referred to as analog
does not permit users to make or receive phone calls through their home phone
service while using the internet.
Broadband
This high-speed internet connection is provided through either cable or telephone
companies. One of the fastest options available, broadband internet uses multiple
data channels to send large quantities of information. The term broadband is
shorthand for broad bandwidth. Broadband internet connections such as DSL and
cable are considered high-bandwidth connections.
Digital Subscriber Line
DSL, which stand for Digital Subscriber Line uses existing 2-wire copper
telephone line connected to one’s home so service is delivered at the same time as
landline telephone service. Customers can still place calls while surfing the
internet.
7.4 Difference between Dial-up, Wireless and Broadband Internet Access
The fundamental difference between dialup and broadband connections is the
manner in which the connection is made from pc to the internet.
A dialup service connects to the internets to the internet through a phone line with
a maximum speed of 56kbps.
Broadband: It refers to a connection that has capacity to transmit large
amount of data at high speed. Presently a connection having download
speeds of 356kbps or more is classified as broadband.
Advantages of Broadband Network
1. Connectivity: One great reason to consider wireless broadband is its
connectivity.
2. Speed: broadband connection is almost 100x faster. This high speed makes
it ideal to be used for downloading large videos, music and other files
3. It does not affect the phone line
4. Online gaming is only possible using a broadband internet access
Wireless network
The term 'wireless network' refers to two or more computers communicating using
standard network rules or protocols, but without the use of cabling to connect the
computers together. Instead, the computers use wireless radio signals to send
information from one to the other. A wireless local area network (WLAN) consists
of two key components: an access point (also called a base station) and a wireless
card. Information can be transmitted between these two components as long as
they are fairly close together (up to 100 metres indoors or 350 metres outdoors).
Types of Network Security
Firewall: Firewall control incoming and outgoing traffic on networks, with
predetermined security rules.
Network Segmentation
Remote Access VPN
Email Security
Data Loss Prevention (DLP)
Intrusion Prevention system