Chapter 3 Computer Networking
Chapter 3 Computer Networking
COMPUTER NETWORKING
Objectives
Learners should be able to:
. define computer network
. explain various networking devices
. explain communication protocols
r compare TCP/IP model and the oSI model
. mapping OSI model to the TCP/IP model
. explain q/pes ofsignal routing protocols
ComputerNetwork
. This is whereby computer systems are linked together so that they are able to share comPuting
powet storage facilities and various comPuter resources.
. it refers to the interconnection of two or more computers and associated devices to facilitate
communication between or among them.
. Cables or wireless technology can be used to connect diferent computers to a network.
. The connection may be between computers in the same building (LAN) or befi^'een comPuters
in different parts of the country (WAN).
Advantages of networking
. Facilitates easy sharing ofexpensive peripheral devices like printers and scanners
. Facilitates easy sharing ofdata and information
. Saves money by sharing expensive software, for example through telnet
. Easier and faster communication with other computers using large networks like internet.
. Avoids duplication of information since the same shafe-file is used
. User activities can be monitored easily
. User can login to any connected computer in order to access network services
. Allows .-ploy"". to work away from the ofhce (tele-working) thereby cutting overhead
expenses for the organisation
95
(
D isadvantages of networking
. Hardware, software and setup costs for designing and implementing the network are very h4r
. Hardware and software management costs are high since a network administrator has to r
hired
. Malware spreads/propagates faster over computer networks
. Promotes illegal or undesirable behaviour for example downloading/uploading explicit cc
tent
. Hackers can gain access to data and information thereby compromising the integrity and *
curity of data stored in computer systems
. The whole network becomes unusable ifa server breaks down
Tlpes of networks
. Local Area Network (LAN)
. Wide Area Network (WAN)
. Metropolitan Area Net$tork (MAN)
. Personal Area Network (PAN)
Intranet is a private organisationt network that uses internet technologies for the benefits ofsuch r
organisation,
Extranet (EXTernal Restricted Access NETwork): an extension of the intranet giving authorisd
outsiders controlled/limited access to the intranet.
Hardware requirements
l. Host computer / Server: This is the main computer that controls and manages other computcc
on the network. A server is an optional device used to store software that controls the network, usc
application software and data files that can be shared by all users ofthe network.
2, Workstations/Terminals: Workstations are computers that can work on their own as standaloa
computers. Terminals are controlled by the host computer. If the terminal has its own processing anl
storage capabilities, it is called an intelligent terminal. However, if the terminal does not have its on!
processing and storage facilities and relies on the host computer for it to work, it is called a durry
terminal.
\r
3. Transmission media: These are pathways for data from one computer to another. The transmissio!
media can be wired (cables) or wireless (Bluetooth, infra-red, etc). Cables can be coaxial, fibre optica
twisted pair, etc.
96
i
4' A hub or a switch: These are central devices used as a connection point for other devices and com-
puters on a Local Area Network. Usually used when connecting computers to
a star network. Switches
are more popular these days as compared to hubs.
5' Network Interface Card (NIC):- Each computer on the network must have this
as it allows
comPuters to be linked and to be uniquely identified on the network via MAC addresses.
A network
card identifies a comPuter to the network, and this is where the network cables are plugged
on the
computer
However, some networks are now using wireless technology and these are called Wireless Local Area
Networks (WLAN). wLAN uses radio signals and therefore no cabling is required.
I
I
I
}
Fig 3.1 Local Area Network
97
I
.Links2ormoredevicesusingwirelesscommunicationtoformaLANwithinalimitedat!
etc'
,rr.n ttottt., school, campus' ofrce building
", "
Wide AreaNetwork (WAN) large geographical area' for example'
coverl
. tonntti# of computers over a
This refers to tht
Jift""' countries' Inieriet is also part of wAN'
wANs d
the whole airt,i"t, p'oiin-t" o'
also be wireless.
98
for connecting LAN to a WAN
nection using a telephone line' They can be used as gateway trans-
b. Communication link Acts as a transmission media for data, e.g. telephone line, satellite
mission, etc.
network, where
c. Network cards for each computer:- a device that identifies computers to the
network cables are plugged on the computer
99
Fig 3.4 MetroPolitan Area Network
\r
100
I
Fig 3.5 Personal Arco Network
NetworkToPologY
ThephysicallayoutorthewayinwhichnetworkconnectionsaremadeiscalledtoPology'Thetypes
of network toPologies are
. Bus or Line ToPologY
. Star ToPologY
. RingToPologY
. Tree ToPologY
. HYbridtoPologY
the lower grades
Nf , N.t*J typls an"i topologies were discussed in
Networking devices
?
in order to make a LAN. It receives signal/
lio", ,, a device that connects workstations together
Ui"ud""rt. it io all ports on it. Thus all-workstations I
data from workstations, regenlr"ate, ii ""J,fr* they cannot determine the
' \'r
Juta packets. Hubs are. not inteiligent,
connected to it will get tfr..ign"i;, a security risk' It is
the data ,, .o irr.y troua.ust the signal. This is
exact computer "d#;;;;;;;
star*,**i", e i"irt., miny ports on which cables to all
used on a
model's layer I (physical
usually "r'"iyiltiJi.*1rtr.
A hub op"rut., on th" oSI refeience
computers on the network are connected.
r0l
layer). In a star topology, each node is connected to the hub with a Point-to-point connection. Hubs
can be active or passive.
Active hub: It has its own power supply and can clean, boost and relay the signal along the networL
It serves both as a repeatei as well as a wiring centre. It is used to extend maximum distance between
nodes.
Passive hub:It collects wiring from nodes and power supply from an active hub' Relays signals onto
the network without cleaning and boosting them. This cannot be used to extend distance between
nodes.
Router
This is a networking device that connects difierent types of networks together, for example, it cal
gateway betweea
connect a school LAN to the internet (which is a WAN). A router essentially acts as a
two networks. It makes sure that data is directed to the correct destination, such as an email being
sed
to uniqudy
to the correct ISP and recipient. It is configured to have a network address that will be used
identifr an indiviclual organisationt network on the internet. It is a network layer device which ir
responsible for routing data Packets based on their IP addresses'
A iouter can route fackets of the same protocol (e.g. TCP/p) over networks with dissimiler
architectures (e.g. Ethernet to token ring). It has a dynamic routing table on which it can malc
decisions on how to route the data packets. It receives transmitted messages and forwards
them to
their correct destinations over the most efficient available route. A router is used to form complc
on
networks with multiple paths between network segments (subnets). Each subnet and each node
each subnet is assigned as network address.
A router is very intelligent. It uses network addresses and IP addresses of other routers to creaE
used in routing
routes between two networks. It keeps tables ofaddresses (routing tables) that will be
information. Routers are thus used for:
. Determining the path ofdata packets using destination addresses ofthe packets
. Used for packet switching
. perform irotocol Translation (Wired Ethernet to Wireless/Wi-Fi, or Ethernet to CATV)
HubBI
\r
r02
Fig 3.6 Router connecting LANS
Switch
It is a device thatioins comPuters on a LAN and is found at layer 2 ofthe OSI reference model. A switch
is a networking device that allows multiple devices and workstations to be connected to each other on
a LAN just as a hub does. However, a switch is more intelligent than a hub; it uses MAC addresses to
identify individual computers on the network. It then creates a virtual link between the devices that
will be communicating together. A switch directs traffic across a LAN, enabling computers to talk to
each other and share resources. It allows different nodes on the network to direcily communicate with
each other. A switch runs in firll duplex mode. It can recognise different devices on the network using
their MAC address so that data and signals can be send to exact/intended devices. This is more secure
than a hub. Switches can be LAN switches or ATM switches which are used on WANs and MANs.
A switch can also be used as a multiport bridge, functioning at the Data Link Layer. Thus it can be used
to connect LAN segments into a single network. It keeps track ofthe MAC addresses of all attached
devices (just like a bridge). Switches are popular than hubs since they are more intelligent and can
filter data just like a bridge.
Modem
Modem stands for modulator - demodulator. It is a networking device used for connecting computers
to the internet using a telephone line. It converts digital signals frorn the computer inio analogue
sign-als that can-be transmitted over telephone lines and vice versa. It operates itlayer I and layer
2 of the OSI reference model. Cable modems employ broadband transmission acrois regular cable
television wires.
Fig 3.7
Multiplexer/De-multiplexer
A multiplexor is a communications device that combines several signals from different sources for
transmission over a single medium. A de-multiplexor completes the process by separating multiplexed
signals from a transmission line. Frequently a multiplexor and de-multiplexor are combined into a
single device capable ofprocessing both outgoing and incoming signals. It is a transport layer device.
A multiplexor is a device which takes in data from multiple signal lines and outputs a single signal
103
between several
line. It works as an electronic switch. A multiplexer (or mux) is a device that selects
analogue or digital input signals and forwards it to a single output line' /4\
Receivers,,
WDM Transmiitets WDM
', ,\
v\"\/'
: - ''- -|
-)l
j
A4 Transmission on fiber oplic line
{:.
'r1.,.
Fig 3.8 Multiqlexing
Prory Server
This is a dedicated computer or a software running on a computer
that acts as an intermediary betrrrl
an endpoint devi.., ,rr.h a computer, a,'d anoih.r server from which a user or client
is requ{
",
a service. It acts as an intermediary for requests from clients seeking
resources from other serveE I
client connects to the proxy seru.i, ,.qu.rtirrg some service, such as a file,
connection, web pagc e
other resource availabie from a different server and the proxy server
evaluates the.request as a qt
to simplify and control its complexity. The prory server rnuy t*itt in the same machine as
a 6rd
,".u., o, it -uy be on a separatl servlr, which forwards requests through the firewall'
I
\rr
104
rf Sdlool PC
\\
BtockeL
Website
Request
Allowed
Proxv
Reqrjest
Proxy
Website
Request
IU
Proxy Senar
IU
3-g ProxY Senrer oPeratiot
GatewaY
Thisisanetworkingdeviceusedtoconnectdifferentkindsofnetworks'Itactsasalinktodifferent
networks *iii air.t.tt architectures
and different
wANs. A gateway " i' d#"*;;;;;Jr from the
aI;; ;;';;;;ay, its softw"re.ffi all networkinginformation
orotocols. when packets sends it on
iuiJ
.Jlr! translates the iata into the new format and
packet, leaving onty ,t . ,u* lateway converter'
pro,o.;i;lr Jrr" i"ri"i,t"" a
system. Thus it becomes Protocol
using the networtirrg
does not
Agatewayisanetworklayerdeviceusedtoforwardthepacketswhichareintendedforremote
rtave,default gateY"v
ri"tra
network from local n"twor;'E;;;n*1" ?dd:::::-]f,packetto find the
take tlie help of gateway device
wodi
find its destination address in r"i
n'.t*ort then it
Jestination address in remote network'
Gatewaysareusuallyusedtobridgethedifferentnetworks.AEatewaydeviceknowsthepathofremote in other
If ,.quir;i;;iro tt; .r,""p.oi"tion of packet so it can travel
destination address. "h"ng.,
i.i*"tt," g" ns destination address' Examplest"ofgatewavs:x'aoo format before forwarding'
. Email cu,"*"y' r'-'tliJ^si"np'"--'"if 'L"d"'i
to access resources from NetWare
server
. GSNW Gateway: u['o" windo"t
and X'25 network'
. PAD Gateway: t'""td"'';;;;;;;i"ityu"t*te" nN network
"lients
105
Bridge
It is used to
This is a device that connects networks using the same communication Protocols.
together' However'
connect diferent parts ofa LAN, thus is used to connect different LAN segments
it cannot handle multiple paths for data.
Jo,R
Wreline LAN
q
''(. '
x\
switch
"-t ' =/--Y'1;',,,.
I .. ii n.ia.,"
Bridge
)--
'-( JF
Wireless LAN
Fig j.10 Bridge connecting LANS
i
In general a bridge ,:u..d foti.
. ^rr_^^^^.
^ ^ addresses'
Filtering trafic using MAC
I
. |oining-different LAN segments with different
or- similar topologies
\r
106
Hub 1
Host D
e!1 ell
I
lirk
I
-\\
I
ro7
lnternet
./ "\
,llr, tttt,E*
1 92.1 68.7.x
I
ll il-r ll
il-r
tltl
,-.-.r
.r .E!ltlt
(b---l
-
s, \S,
B tr o-. *- Lr o-.
Fig 3,13 Wirelus Bridge conneclion to a Wireless LAN
In OSI Layer model bridge works at physical layer and data link layer. However bridges have tic
following problems:
. Bridges have limited Ports.
. In bridge forward decision are made through the software which slows down ovenl
performance of network.
. Bridges use age old technology which is not capable to fulfil the requirement of moden
networks efectivelY.
It is also called a network adapter or network card. It is a small electronic circuit board within r
computer (or other device that can be connected to a network) that controls the sending and receivi{
of data within a LAN. A network adapter (sometimes referred to as a NIC - Network
Interface card) L
either integrated into the system board or inserted into one ofthe exPansion ports inside the
comPutcr
process' Thi
-
The NIC cintain a unique MAC address which is hardwited on it during manufacturing
is sometir.Gt
MAC address is used io uniquely identify a computer on a LAN. The MAC address
physical addred'
referred to as a networking h".dw"r. address, the burned-in address (BIA), or the
NIC operates at the Physical layer of the OSI reference model' The NIC:
108
t
provides a connection socket for the network cables;
iranslates the signals that are generated by a computer into a form that is suitable for transmis-
sion down a wiie (or through the air) - for example, it translates the parallel signals from the
processor into serial signals that can be carried down a wire'
Repeater
over
This is a networking device used to regenerate and remove noise from digital signals transmitted
done to extend the length
the same network before the signals b-ecome too weak or corrupted. This is
to which the signal can be traismitted over the same network without distortion. It oPerates
at the
physical layer oithe OSI. When the signal becomes weak, they copy the signal bit by bit and regenerate
allows
it ut tt. origitrul strength. It is used tJoost the signals in connect networks of same types' This
a signal
the extensiJn ofa netiork beyond physical length li-itutiont. A digital repeater reconstructs
eliminated'
to near its original quality, it io"rrri lurt omplift it as the distortion and noise will also be
A repeater decodes the signal, extract the original signal and regenerat€ the signal then retransmit
it'
Repeater eliminates the n-oise by regenerating the signal' It maximizes the signal
to noise ratio hence
decreases the error associated with the signal.
Repeaters can be replaced by amplifiers if the signals -being transmitted are in analogue
form'
the noise'
Amplifiers increase the amplitude oithe signal. The amplifier amplifies the signal along with
It m-inimises the signal to noise levels, therefore, increases the noise'
109
--4 ti a4 tta'
;E
il be
iq eY bq
4s
to at!
with two copper wires orabout
I
ff;.t"i.il1.' T1l'1":::^:T*:::'"::*ffi'ff::ter
over short distances' Telepho
crosstalk.Twistedparisveryffi;il;;;;r;tgtoapt'io'-""tt
wiring systems' Tlvisted pair
exists in h
*ir* i" ,i.i.
comDanies use twir,"u-o"o .ioo.l pair (UTP)'
*Jif" "i"phone
untt'i"rato 1*;'1t6
forms; Shielded Twottd t"oiSiP)
Twisted Pair
Fig3.16: Shietded and lln-Shielded
u0
Twisted pair has the following advantages;
. Twisted pair is very cheap to purchase
. The system uses colour coded cabling which makes it easier link with connectors
. Permits many communication protocols
. Thin and flexible EasY to install
. Small size does not fill up wiring ducts fast
Coaxial Cable
Coaxial cable has a centre core conductor of solid copper wire. The copper wire is enclosed
in an
metallic
insulating sheath, which, in itself, is enclosed in an outer conductor of metal foil. The outer
material ierves as shield against noise disturbances. It is used for transmission of both
digital and
analogue signals. The whole cable is protected by plastic cover as shown below'
Genter Conductor
Dielectric
Conducting Shield
Outer Jacket
Fig j.17: Coaxial Cable
\
The following are some ofthe advantages of coaxialtable:
. Allows for both baseband and broadband transmission
. Has less attenuation than twisted pair,
. Has high bandwidth and
. Have low error rates.
. Can transmit analogue and digital signals
. Ensures accurate data transfer,
. pair'
Coaxial cable is much less susceptible to interference and crosstalk than twisted
lll
\
Application: Used for TV distribution (connecting decoders with the antenna on the satellite rlisi
long distance telephone transmission; short run computer system links, Local Area Networks
Fibre is preferred over electrical cabling when high bandwidth, long distance, and immunity
electromagnetic interference are required. It is therefore used by many telecommunications compan
to transmit telephone signals, for internet communication, and cable television signals.
Fibre optics is in two forms, multimode and mono-mode. Multimode fibre optic cable carries 2
more signals at a time, each at a slightly different reflection angle. This is used over short distanc
Mono-mode (Single mode) cable carried one signal at a time and is appropriate for long distal
communication.
:T
Grass
@
Light Signal 1
€ --
Total intemal refl ection
Light Signal 2
Light ray
-
Fig 3.21: Monomode ond multimode Optie Fibre
tt2
. It is thin and small in size and therefore has less weight.
. It allows very fast data transfer, as it can transmit more information, like thousands of tele-
phone conversations down a single strand
. Has no electromagnetic interference
However, fibre optic cables have the following disadvantages:
. Are very expensive to buy
. Are uni-directional (data travels in one direction only).
. Cable cannot bend around tight corners.
. It is also difficult to directly interface with computers.
n3
almost 299 GHz. Therefore, wider sub-bands cao
t'
. The microwave band is relatively wide,
assigned and a high date rate is possible'
. Use ofcertain portions ofthe band requires permission from authorities' by mca
and reception of radio signals are achieved
In microwave tranr-irrior, *.Jiu, tr"nsmis.ion
of antennas with a line-of-sigiJl *.""i*"
*,.rnas. uied for uni-cast communication systems hL
RePeatert --
wireless LANS. Signals are uni-directional'
mobile phones, satellite communication and
neededforlongdi,,un"..o-,.,o',i.u.lon.Veryhighsignalsca_nnotPenetratethroughobstacles.
Giventhecurvatureoftheearth,andtheobviousproblemsoftransmittingthroughit,microEr
5o
hops generally are limited to aPProximately lt-' .
Fortransmissionofasignal,,"dio-f,.qu.n.yelectricalenergyfromthetransmitterisconvertedi
environment' For rec€F'-
electromagnetic by tn.llr""""f*J tiar"red into the-surrounding
"n.rgy on the antenna is converted into radio-ftequrr
of a signal, electromagnetic ttttgy i^pitging
electrical energy and fed into the receiver'
114
- tll ".=-Ih
-
Trangnitter and
Transrnit Anlsnna
iver and
Rec;e
Recclve Antenna
Destlnafion Ground
Orlglnatlng Ground Statlon
St don
Fig j.22 Sateltite Mi owave transmission
Bothterrestrialandsatellitemicrowavecommunicationsrequireground-basedreceiverstohavea so
*"iri aro h", to b'. dir..ted toward the satellite
oarabolic antenna to ,.".,u",i'i"ffi
rrr"
work when there is a
th. p"."bol" on ih.'satellite transmission. Ground receivers only
that it focuses
satellite in the atmosphere'
line of sight from the communications
them with
if thev have a crear rine of sight between
"":u'ffi::ff:,:1il:::::::iilliil::tr slopes or. trees in the way'
,ro oUrt".tat such as buildings' bad weather'
. uy tttt atmosphere'
Signal can bt
"b'o'b;;;;;i"'io'tta
. TheY have big attenuation
. Slow in sending message
objects
. Signal does not pass through solid
Data Communication
It is the process of transferring data through networked computers. It is exchange of data betweeo
connected devices in a network. It involves the transmission or passing of data and information fron
one computer (or device) to another.
This process involves a communication system which is made up of hardware and software. Thc
hardware part involves the sender and receiver devices and the intermediate devices through which thc
data passes. The software part involves certain rules which specify what is to be communicated, howl
is to be communicated and when it is communicated and these are called protocols. T{re transmittol
data can be in analogue or in digital form.
Digital Data
This refers to facts in discrete values, that is, in ones and zeros. Digital data has the following advan-
tages:
Analogue Data
Data is in continuously varying form, e.g. human voice. This is it will be in fon
diftcult to handle as
of waves. Analogues data can be collected by sensors e.g.57 and 93 are all analogue data. Analogu
data is difficult to handle and occupies a lot disk storage sPace.
2. Numbers
. Numbers include combination of digits from 0 to 9.
. It is stored as a pattern ofbits.
. Prevalent4ncoding systems : ASCII, Unicode
3. Images
. Can be pictures which are digitally stored \r
. commonly used image formats : jpg, png, bmp, etc
4. Audio
. Data can also be in the form ofsound which can be recorded and broadcasted.
l16
I
or information'
. on the radio is a source of data
For examPle; what we hear
discrete'
. Audio daia is continuous' not
t uifrit"" chps
in form of animation or movie
. refers to broadcasting of data
Set of
Set of Rules
Rules
Transmission Medium
Transmission '
Fig 3.23: Components of Data
rt7
willdecidethebestroutefordatatransmission'The3basicswitchingtechniquesthatcanbeuscde.
asfollows:
. Circuit switching
. Message switching
. Packet switching
the above switching methods'
The following diagram summarises
recri
in which,h.
:T#:ffll*1"f..*"0o*'it'*" ttif1l_l'"::*.T::#':'LrTL to be established bi
eo t"a-t"-""a p"ft has i:ilTlffi,to
r'nmediatelv before data 't"tt' first'
:H;:ilffi;;;;;;,. ft"'' a circuit must be established
f-';;';il duration of t'""'mit'iott' This
provides a dedicr
The circuit is maintained infringed upc
p",f' Utt'n"t'i tnio'""u""n' u,,i of"" bandwidth that cannot be
communication wood mo"oPoli'e the whole communicJ
that the channel wl
that tfre communicating Parties
other users. It implies
channel during,,-'-i"io"iril';;"il:"';i;"" il;;;;ication
released for use bY other Parties'
\,
rl8
:
-*4?'.'
(,rr\$o' ,' s2 S4
a.
/
63-='q 55
s3
II. Data transfer - data is now sent over the dedicated channel'
IIl. Circuit disconnect - connection termination'
In circuit switching,
.Thereisnoneedforwaitingperiodfordata'Thereiscontinuoustransmissionthatensures
better utilisation of the channel's bandwidth'
. The sender and receiver must send and receive
data at the same rate'
. pJ ;;;, ;;" (connected) for the sender and the receiver until
The transmission
transmission is comPlete'
. others to use'
After transmission, the path can now be released for
. Ifno path is established, transmission cannot occur
. similar to nor^"t ta.fio* ,yrt.-, *h.r.by a specific line is routed from point A to point B
and is dedicated but not necessarily used dl the
time'
. Data is not necessarily split, thus is send as it is' at
. Data signals ,"""i'"f,ii tt e same order they are send, therefore no need for processing
"r"
the receiving end.
. feeds' audio messages' etc
Used in telephone conversations, Iive broadcast
. Suitable for real-time sYstems
l19
Message Switching
. Also called a store and forward network
. Message switching is a switching technique in which a message is transferred as a complete
unit and routed through intermediate nodes at which it is stored and forwarded'
s2
A 51 / B
Packet Switching:
. Data is first split into smaller chunks called packets (or datagrams) which may take different
routes and then reassembled to the original order at their destination.
. Each packet is assigned a unique number that would be used in determining the reassem-
bling order at the receiver
. Packets are routed to the next (intermediate) node along an appropriate route, which can
store and transmit the packet until the destination,
. Each packet takes its own convenient path and then re-assembled at the receMng end.
. Packets take the shortest path necessary.
. Packets do not necessarily arrive at the same time or in correct order.
. At the destination, packets are re-grouped to the original message.
. Packets can be offxed size
. Each packet has the following data: source address, destination address, error control signal,
packet size, packet sequence number, etc.
. if any packet is missing or corrupted, then the sender would be asked to resend the whole
message.
. If the correct order ofthe packets is reached, then the acknowledgment message will be sent.
Transmission Protocols
. A protocol is a set of rules that govern how data is transferred in a network. It defnes the rules
on how network devices communicate.
. The sending device cannot just send the data and expect the receiving device to receive and
further interpret it correctly.
. When the sinder sends a message, it may consist of text, number, images, etc; which are
converted into bits and grouped into blocks to be transmitted. Often certain additional
information called controi information is also added to help the receiver to interpret the data.
. For successful communication to occur, the sender and receiver must agree uPon certain rules
on how to:
* interpret signals
* identifi bneself'and other computers on a network
' initiate and end network communications
l2l
Semantics: Entails the meaning of each section of bits and indicates the interPretation
of
each section. It also tells what action/decision is to be taken based on the interpretation'
synchronisation/Timing: It tells the sender about the readiness of the receiver to
receive
the data and tells the sender at what rate the data should be sent to the receiver to
avoid
overwhelming the receiver.
and error
Error recover'y method: communicating parties need to agree on error detection
detection methods to use if communication errors occur'
protocols
Types of -a.e
pro'tocols rules that govern communicating devices. The following are some of the communica-
tion protocols.
III.TELNET
comPuter and usc
This is a network protocol that allows a comPuter user to gain access to another
to access data stored on
its software and data, usually on a LAN and on the internet. It allows users
servers from their terminals (remote access). Telnet allows comPuters
to connect to each other and
the internet.
allows sharing of data and files. Telnet has security problems especially on
Communication Ports
added to an Ip address, this identifies the process to pass to on
the host ma-
e fo.t i,
chine.
"r, "t.-ent
\r
122
Examples of ports
Port number Protocol that uses it
2l File Transfer Protocol
23 Telnet
25 Simple Mail Transfer Protocol
80 and 8080 Hypertext Transfer protocol
ll0 Post Office Protocol v3(pOp3)
989 Secure FTP (SFTP)
Standards in Networking
Standards are necessary in networking to ensure interconnectivity
and interoperability between
various networking hardware and software components. without
st"ni".d, *" *orild hav. proprleta.y
products creating isolated islands ofusers whici cannot interconnect.
Standards provide guidelines to product manufacturers and vendors
to ensure national and
international interconnectivity, Data communications standards are
classifed into trvo categories,
l. De facto Standard
standards that have been traditionally used and mean by fact or by
convention and are not approved
by any organised body but are adoptJd by widespread use.
2. De jure standard
It means \
law or_ by regulation. These are legislated and approved by a body
that is officially rec-
ognised' The standards are created by standar-ds creation committees,
foru-'r, urrd!*.rrr-"nt
regulatory agencies.
.'
International Telecommunications union - Telecommunications Standard (ITU-T)
American National Standards Institute (ANSI)
. Institute of Electrical & Electronics Engineers (IEEE)
. Electronic Industries Associates (EIA)
Forurns
A forum is a place, meeting or medium on the internet where ideas and views
on a particular issue
can be exchanged. It is an area where users share thoughts, ideas,
or help by postinjtext messages.
Examples of Forums include:
.ATM Forum \i
.MPLS Forum
.Frame Relay Forum
.TechZim Forum
123
Regulatory agencies
This is a governmental body that is created by a legislature to implement and enforce specific lanr
An agency has quasi-legislative fi-rnctions, executive functions and judicial functions. ixamples c .
Regulatory Agencies:
. Federal Communications Committee (FCC)
. Postal and Tele-Communication Regulatory Authority (POTRAZ)
Networking Models
A model is a way to organise a system's functions and features to define its structural design. A desig
can help us understand how a communication system accomplishes tasks to form a protocol suil i
This book will look the OSI and TCP/IP models.
The phrase, All People Seem To Need Data Processing, can be used to denote the layer.. \
124
Scnding Device
.'
enables a user (human or software) to access the
network resources
the only layer seen by most users ofthe Internet
. the layer contains functions mostly needed such
* as
remote printer access and remote 6le access and transfer
* resource sharing and device redirection
* network management
* directory services
* browsing the www
* e-mail messaging
* Responsible for virtual terminal and networking
* Responsible for file transfer and access
. Appli-cation layer devices include gateways, firewalls, pCs,
phones, servers,
' It defines how user applications interface or access communication etc
services, initiates or
accepts a request, provide network applications like
data transfer, messaging, opera,irri,y*"-
125
function
Presentation layer
. It forms part of an operating system that converts incoming and outgoing data from or
presentation format to another e.g. from clear text to encrypted text at one end and back t
clear text at the other end.
. The layer is responsible for performing translation, encryption and compression ofdata
. It performs character code translation (for example ASCII to EBCDIC). The sending anl ,
receiving devices may run on different platforms (hardware, software and operating systenl
It is important that they understand the messages being send, hence a translation service m4/ I
be required which is provided by the presentation layer
. Performs compression of data. This involves reducing the number of bits to be transmittd {
over the internet, This ensures faster data transfer. The data compressed at sender has to bc
decompressed at the receiving end and are both performed by the presentationlayer.
. Encryption ofdata is done for secruity reasons. It is a process of transforming and scramblir!
the original message to change its meaning before sending it. The reverse process calld
decryption has to be performed at the receiving end to recover the original message from thr
encrypted message. Encryption involved converting plaintext into cipher text while decryptia
involves converting cipher text back to plaintext.
. Presentation layer devices include gateways, firewalls and PCs.
Session layer
. It creates and terminates sessions, e.g. login session, file transfer session
. It sets up, coordinates and terminates conversation services, include authentication and
reconnection after an irtterruption
. Establishes a session between the communicating devices called dialogue and synchronizl
their interaction.
. Also called the nerwork dialogue controller.
. Used for user authentication
. At the sending side it accepts data from the presentation layer, adds checkpoints to it (called
sync bits) and passes the data to the transport layer.
. At the receiving end the session layer receives data from the transport layer removes thc
checkpoints inserted previously and passes the data to the presentation layer.
. Session layer devices include gateways, firewalls and PCs.-
Transport layer
. Manages packetisation ofdata, delivery of the packets and checking oferrors in the data oncc
it arrives
. A logical address at network layer facilitates the transmission ofdata from source to destination
device.
. The Sansport layer takes care ofprocess to process delivery of data and makes sure that it ir
intact and in order
. At the sending side, the transport layer receives data from the session layer, divides it into units \ir
called segments and sends it to the network layer.
. At the receiving side, the transport layer receives packets from the network layer, converts and
arranges into proper order of subdMsions and sends it to the session layer.
. Is responsible for segmentation and reassembly of the message into segments which bear
t26
sequence numbers.
. This numbering enables the receMng transport layer to rearrange the segments in
. proper order.
. Transport layer devices are gateways and firewalls
. In summary, it allows error correction during transmission, maintains flow control, allows
data recovery, allows routing, addressing and multiplexing of signals
Network layer
. The main resPonsibility ofthis layer is transmission ofpackets ofdata from source to destination
. The network layer makes sure that the data is delivered to the receiver despite multiple
intermediate devices.
. The network layer at the sending side accepts data from the transport layer, divides it into
packets, adds addressing information in the header and passes it to the data link
. At the receiving end the network layer receives the frames sent by data link layer, converts
them back into packets, verifes the physical address (verifies if the receiver address matches
with its own address) and then send the packets to the transport layer.
. Performs logtcal addressing ofthe network and routing of packets.
. Logical addressing of network layer works as follows:
* The network layer uses logical address commonly known as IP address to recognise devices
on the network.
* An IP address is a universally unique address which enables the network layer to identifo
devices outside the sendert network.
* The header appended by the network layer contains the actual sender and receiver's IP
addresses.
. Routing happens when a computer on one network needs to send a packet to a computer on
another network. The routing process works as follows:
t The network layer divides data into units called packets of equal size and bears a sequence
number for rearranging on the receiving end.
* Each packet is independent of the other and may travel using diferent routes to reach the
receiver hence may arrive out of turn at the receiver.
* The best possible path may depend on several factors such as congestion, number ofhops,
etc.
* This process offinding the best path is called Routing. It is doie using routing algorithms.
* Network layer devices include routers, brouters and 3-layer switches.
t27
Re-assembling of frames at the receiving end
Phvsical Addressins: The Data Link hler adds a header to
the frame in order to de6nc
,"ra* receiver of the frame, if the frames are to be distributed to
il,ffi; "dil.iirr.the network'
".
different systems on
FlowControl:Aflowcontrolmechanismtoavoidafasttransmitterfromrunningaslou traftc jam a:
..""*". Uy U"e"ring the extra bit is provided by flow control This Prevents
the receiver side.
at the end of the fram
Error Control: Error control is achieved by adding a trailer
Data Link Layers ad&
O"pif.",i." ftames are also pre"tnted by using thi-s mechanism'
"f
mechanism to Prevent duPlication of frames'
which ofthe devices has control over thr
Access Control: proto.oh ofthi' layer determine
the same link'
ii"t *V glt* time, when two oi more devices are connected to
",
Physical laYer
.Thelowestlayeroftheoslmodelconcernedwiththetransmissionandreceptionofthl
unstructured ,"* Uit it""t oue' u physitd
medium' It describes the electrical/optical
physical medium, and carries the signals for all
d
mechanical, *a ru',.tiona i,,terfaces to the
the higher laYers' It Provides: the PC to
. Data encoding: *oaiit"t'" simple digital signal pattern (ls and.0s)::td I
if the fttysiiut medium, and to aid in bit and fra*
better accommodat. tle
"h"ra.teristi.s
sYnchronization. It determines:
* What signal state rePresents a binary I
* How the receiving siation knows when a
"bit-time" starts
* How the receiving station delimits a frame
various possibilities in the medium
. Physical medium attachment, accommodating
* Will an external transceiver be used to connect to
the medium?
*Howmanypinsdotheconnectorshaveandwhatiseachpinusedfor?
the encoded bits will be transmitted by baseband
. Transmission technique' letermines whether
(digital) or broadband (analogue) signaling'
for thc
. physical mediu- trunimits b.-it. as electrical or optical signals appropriate
,r*.-irri"i,
phYsical medium, and determines:
* What physical medium options can be used?
* a given signal state, using a given physice
How many volts shodd Le used to represent
medium
and token ring networks
. Media used include Ethernet cables, hubs, repeaters
. Following ar. tfr" i-ttio"''pt'fo'^"d by the Physical layer of the OSI model'
* "*io"' of stream of bits. The bits must be encoda
Representation of Bits: Data in this layer consists
ofencoding i'e' how 0's and l's are changa
into signals for transmission' It defines the type
to signal.
* which is the number of bits^!::tf'"19
Data Rate: This layer defines the rate of transmission
* synchronisation: It deals with the synchronisation
of the transmitter and receiver' th. t.
sender and receiver are synchronised at bit
level'
* Interface: Th" p;;;;ii;yer defines the transmission interface between devices ar
transmission medium' -the medium: Point to Po
* Line conngorutioi; This layer connects devices with
128
configuration and Multipoint configuration.
* Topologies: Devices must be connected using the following topologies: Mesh, star,
Ring
and Bus.
* Deals with baseband and broadband transmission.
The structure of TCP/IP model is similar to the structure of the OSI model. Howeve! the OSI model
has seven layers whereas the TCp/Ip model has four layers.
t29
TEP/Plvffi- FroTOEOLS AiIII SENVEES O:iltrtffi-
AFFLEA'IIil
PnE:EilffATI rl
HTIPfTTP
TEJGTJTTP
qff.Ft{
TRATTsFTTRT
TCFJIF
TGTIVTR( NETWTNK
IIAIA Ltrt(
tGTlvltft(
NTENFAEE
4. Application Layer
Gives the applications the ability to access the services ofother layers
Defines the protocols that applications use to exchange data
Media such as Ethernet, fiber, satellites through the router are used
It port numbers to offer service to each application.
uses
It has the following protocols in it: HTTB SMTB FTB Telnet, Dynamic Host Configuration
Protocol (DHCP)
The application layer generates the message. For example, a web browser like Mozilla Firefor
can send a request to open a web page. This message will then be send to the transport layer.
3. Transport Layer
3rd layer which is between Application and Internet layers
It is concerned with the transmission of data using the TCP and the UDP (User Datagram
Protocol).
Breaks the data into chunks / packets
Each packet is attached to a unique number specifring its order or position
A packet is given to a port number
Allows two communicating devices to carry on a conversation \rr
Outlines the level of service and status ofthe connection used when transporting data
Protocols used include TCB UDP (User Datagram Protocol),
130
2. Internet Layer
. Also called the Network Layer
. Responsible for addressing, packaging and routing packets
. The sender's IP address is attached. This is done to enable the receiver to identifu the sender
. Packs data into packets called IP datagrams. Datagrams contain source and destination
addresses (logical or IP addresses)
. Protocols used include IB ICMP (Internet Control Message Protocol), ARP (Address
Resolution Protocol) and RARP (Reverse Address Resolution Protocol).
l. Link Layer
. Responsible for placing the packets on the transmission medium and removing packets offthe
network
* How TCP/IP functions, an example:
* A sending computer processes an e-mail at the application layer using the SMTP
* The file is passed to the next layer, Transport Layer
* The data is broken down into packets and then passed to internet layer where an IP address
is attached
* Then the packets are able to move using one of the following; Ethernet cables, satellites,
fibers, wireless technologies etc. to the receiving comPuter
* Packets are reassembled on the transport layer of the receiving computer into the exact
email that was sent
* The email will be passed to the application layer of the receMng computer where it will
processed using the POP or IMAP thereby enabling the user to read the email
* POP is used for retrieving stored email and SMTP is for sending the email
9. OSI model has a problem of fitting the proto- 9. TCP/IP model does not fit any protocol
cols into the model.
10. Protocols are hidden in OSI model and are 10. In TCP/IP replacing protocol is not easy.
easily replaced as the technology changes.
ll. OSI model defines services, interfaces and In TCP/IP, services, interfaces and protocols
11.
protocols very clearly and makes clear distinction are not clearly separated. It is also protocol
between them. It is protocol independent. dependent.
12. It has 7 layers 12. It has 4 layers
IP Addressing
What is an IP address?
. An Internet Protocol address (IP address) is a numerical label assigned to each device connected
to a computer network that uses the Internet Protocol for communication especially on thc
internet.
. It is an address with information on how to reach a specific host or resource, especially outside
the LAN.
. An IP address should not be confused with a MAC address, Media Access Control (MAC)
address is a unique number that is embedded on a device connected to a network for
identification purposes. The MAC address is hardwired on the devicet NIC and therefore
it is used to identifi a device on a network. MAC addresses are usually important on LAN
setup other than on the internet. Thus, MAC addresses allows physical and have a permanent
identification whereas IP addresses are logical and may change each time a device is connectd
to the internet, Only IP addresses for servers can be permanent.
Public IP Addresses \r
A public IP address is the one that is used to identify a host on th€ internet and is not reserved for use
on private organisationt network. A computer with a public IP addresses can be viewed on a global
scale, allowing other machines on the internet to communicate with it. Public IP addresses are unique
r32
the.world over, allowing computers to see each other and exchange data on a global scale. public Ip
addresses are assigned by the ISp
Private IP addresses
Private IP addresses, also known as local IP addresses, are those that are reserved for
use within
an organisationt network, e.g on a LAN or intranet. Computers with private Ip addresses cannot
communicate on the internet directly but have to communicate with the outside through a
router.
Private IP addresses are available for use behind the router. Private IP addresses are issued
by a router
to comPuters that are connected to it. This provides unique identification for devices on the LAN
during that session. Private IP addresses never leave a LAN.
Private IP addresses provide an entirely separate set ofaddresses that still allow access on a network but
without taking up a public IP address space. This is because the world is running out oflp addresses as
too many_electronic gadgets are being connected to the internet. The following Il address ranges are
available for use as private IPs:
. 10.0.0.0 to 10.255.255.255
. 172.16.0.0 to t72.3t.255.255
. 192.168.0.0 to 192.t6t.255.255
It does not matter if the private IP addresses for different organisations' computers are the same since
they do not directly communicate with each other over the internet. They communicate through their
router.
Note: An organization can be given both a private IP address and a public IP address. The private Ip
address would be used when communicating with other devices locally within the intranet. The public
IP address would be used for communication with other devices over the internet.
Reserved IP addresses
These are IP addresses that cannot be used for communications between hosts on the internet.
Additionally, reserved IP addresses are set aside for other purposes, for example, Ip address 127.0.0.1
is used as a loop back facility. It is used for testing your computer's network adapter. Ifused, the user
would be informed that he or she is trlng to connect to his or her own No data or traffic
addressed to this IP address would be transferred either on a LAN or "o-pui.r.
ovei the internet. Also, the
first address 0.0.0.0 refers to the default network while the IP address 2,s5.255.255.2ss is called the
broadcast address.
Static IP addressing
A static IP address is the address provided by the ISP for an individual organization and this would
never change. Even if users reboot the router or modem, it will stay the same.lt is assigned permanently
and physically to a host, for example IP address ofa server. Static IP addresses are-ideaias public Ip
addresses for large organisations. On a LAN, one can also assign specific IP addresses to ind"ividual \r
comPuter and every time the computer connects to the internet, it will use that IP address assigned
to it. However, if two or more computels are assigned the same static IP address, then only one of
them will connect to the internet at a time, the other computers would get connected if the currently
connected compirter is disconnected.
133
Dynamic IP Addressing
Using this scheme, computers pick an IP address that is not in use at that time. Thus every time
the computer connects to the internet, it can use a diferent IP address. However, only available IP
addresses within the range or address space can be picked. This is ideal for public IP addresses for
home users and other small businesses. A dynamic IP address is automatically assigned to a host by a
DHCP server every time it needs an internet connection. A dynamic IP address is different each time
a device gets connected to the internet.
Dynamic IP addressing is very flexible, easy to setup, easy to administer and to manage than static IPs-
Devices would be free to pick up any available IP address. Also, they offer some form of security sinc.
no one is more likely to track users using a dynamic IP address.
t
IP address Versions
There two versions of IP addresses, namely:
. IPv6 (Internet protocol Version 6)
. IPv4 (Internet Protocol Version 4)
a. IPv6
IPv5 was developed as a response to exhaustion ofIP addresses available for IPv4. However, it is still
to be fully deployed and adopted, most devices still run on IPv4. IPv6 would change the address sizc
from 32 bits to 128 bits, giving an address space of2128. This change needs existing hardware to bc
changed. IPv6 addresses are written in hexadecimal.
b. IPv4
IPv4 has been in existence for a long time and is the widely used protocol for internet connectioDr
to this day. Most computers on the internet use IPv4. IPv4 addresses are in binary notation but are
displayed in human readable form. The IP Address is a 32 bit unique address having an address spacc
of232.
Format of an IP address
This section looks at the format of IPv4 address since it is the most widely used as compared to Ih6.
Generally, an IPv4 address is written in dotted decimal notation, hexadecimal notation, octal notatioo
or binary notation. However, the dotted decimal and the binary-notions are of concern in this booh
IP address classes also form part of the IP address format.
Each IP address format, whether in decimal or binary notation, serves two principal functions:
t34
. Network identification and
. Host identification
r-ilr
Sbits
Sbits Sbits _]q .r
,-.162.1.I02
Fig 3'30 IP Address format
101000.00000001.01 l00l l0
class while the right bits
indicate the host' The
bits indicate Network
The hisher order left-most
;ff *.?r.il;;+"r."*tji,f'l,hitij;ttk*:*1**n;*T:::"'":":J'using'lhe
classiful lP addressing mecna
IP address Classes
No. of Bits
Default Subnet Theoretical IP
Class Format Start Bits Host
Mask Address Range Network
24
0 255.0.0.0 1.0.0.0 - 7
A N.H.H.H 127.255.255.255
128.0.0.0 - t4 16
-B N.N.H.H 10 255.255.O-0
t91.255.255.255
8
110 255.255.255.0 192.0.0.0 - 22
C N.N.N.H ).23.255.255.255
224.0.0.0 - N/A
1110 N/A
D N/A 1\s.255.255.255
240.0.0.0 - N/A
E N/A ull N/A
255.255.255.255-
135
Ip address ctasses include Class A, Class B, Class C, Class D and class E as illustrated in the table aboe
Classes A, B and C are the only ones available for comrnercial use'
Class A
If the first bit of the 6rst octet of an IP address is a binary 0, the address is a Class A address. Witl
that first bit being a 0, the lowest network number that can be represented is 00000000, decimal 0. Tbt
highest network number that can be represented is 011I I l1l, decimal 127. Any address that startr
wih a value between 0 and I27 in the first octet is a Class A address. These two numbers,0 and 127
are reserved and cannot be used as a network address'
Class A is for very few large organisations. Class A address uses the 6rst 8 bits for the network
Addresr
and the other 24 bits for host addresses. We can write this as N.H.H.H. IP addresses 127.0.0.0 t3
127.255.255.255 cannot be used and is reserved for loopback, broadcasting and diagnostic functioni
Number of Hosts
.From the format N.H.H.H, we have 3 bytes of H, which gives us 24 bits
. 224 - rc777 216
. Two of these IP addresses, the lowest (which is all 0s, representing the NetworklD) and tb
highest (ail ls, for broadcasting) are reserved. This gives us 16 ,777 214 hosts that can bc
ad-tlressed. For example, IP address 192.0.0.0 is a Network ID, whle 192.255.255.255 will bc r
broadcasting IP address.
Class B
Class B addresses start with a binary l0 in the first 2 bits ofthe first octet. Therefore, the lowest
networt
number that can be represented wiih a Class B address is 10000000, decimal 128. The highest
netwot
value in thc
number that can be represented is l01l I I I l, decimal l9l. Any address that starts with a
range of 128 to 191 in the first octet is a Class B address.
thiJ is a class reserved for medium-size organisations. Class B address uses 16 bits for the networt
address and 16 bits for host addresses. We can write this as N'N'H'H'
136
Number of Hosts
.From the format N.N.H.H, we have 2 bytes of H, which gives us l6 bits
.216 = 55 536
.Two ofthese are reserved, leaving us with 65 534 hosts
Class C
A Class C address begins with binary ll0. Therefore, the lowest number that can
be represented is
I1000000' decimal 192. The highest number that can be represented is Il0lIlll, decimal 223. Ifan
IPv4 address contains a number in the range of 192 to 223 rn the first octet, it is a Class
C address. This
is for small organisations.
The first three octets ofa Class C address represent the network number. The
last octet may be used
for hosts. One host octet lelds 256 (2s) posiibiliti.s. After the all-0s network number and
the all-ls
broadcast address are subtracted, only 254 hosts may be addressed on a Class C
network. Whereas
Class A and Class B networks_prove impossibly large without subnetting, Class C
networks can impose
an overly restrictive limit on hosts.
Because the 6rst 3 bits ofa Class C address are always 110, 2l bits are left in the network portion ofthe
address, resultin g in 221 or 2 097 152 Class C networks.
Class D
A Class D address begins with binary lll0 in the first octet. Therefore, the first octet range for
a class
D address is I I100000 to lll0llll,
or 224to 239. Class D addresses are not used to address individual
hosts. Instead, each Class D address can be used to represent a group ofhosts called
a host group, or
multicast group
Class E
Ifthe first octet ofan IP address begins with I I I l, the address is a Class E address. Therefore, the first
octet range for Class E addresses is I I I10000 to 1l I l l l l, or 240 to 255. Class E addresses
are reserved
for experimental purposes and should not be used to address hosts or multicast groups.
IP Address Subnetting
Large and complex networks can be split into multiple smaller network segments called
subnets. This
gives rise to classless IP addressing. This concept is beyond the scope of this book.
t37
have multimedia data
. http: - Protocol specifying that the page can
. r/iww: - Host on the network
. tsambesanta : - Domain name (name of
the website)
. ac : - Domain tyPe (academic institution)
. zw : - Country code, where the server resides
. ComputerScience : - name of the main folder
. Loweisixth : - sub-folder of ComPuterscience
. chaPter3 : - File name
. .pdi, - File type (portable document)
be followed to identify a unique resource on
th
It can be noted that the uRL is a path that must th
internet. Internet resources r#Ji.a ty rpecifying the IP address of the computers that store
-.
tjll^,ltij; a diary of all IP addresses-and therefst
it becomes difficult for user to memorise or keep domain I
The DNS would then map the human readable
they just need to type the Unl- in ;l"tti;i for the uscrr
stored in domain servers. This simplifies life
specific Ip address that i, t"pt in i"tuu"ses
ComputersontheinternethaveDNSservers.TheseserversmaintainadatabasethatcontainslL readl*
udd'ess' The DNS system allocates these human
mapping between a domain namt *d * tp individd
u ty*t* for finding the IP address for an
domain names for Internet h;;;;;;;J*
(iNS) is the way that internet domain names r
domain name. Thus, the d.-;i; ;;. system
located and translated IP addresses'
Path Determination
algorithms to determine fu
Routingprotocolsusemetricstoevaluatewhatpathwillbethebestforapackettotravel.Ametricirt
standard of mearrrr"-.nt, ts path bandwidth' that is used by routing
'uth fiil;;;;;' determination, routing algorithms initialir
optimal path to a destination.'T" "ip"n depen'linl
route iriformation, Route information varies
and maintain routing tables, ,rrri"r, ..rrr"in
on the routing algorithm used' .
Routingalgorithmsfillroutingtableswithavarietyofinformation.Destinationornexthopasso\ packet r
can be reached optimally by sendin-g the
ciations tell a router that pu.ii.rrl", destination
a particular router
"
rePresent"g "t*t hop' on the way to the final destination When a routtt
'
'ftt this addra
receives an incoming o*0",],".i..n, ,il l"Jrin",ion addiess and attempts to associate
r38
with a next hoP' path' Routers
such as data about the desirability of a
Routing tables can contain other information, of
and these metrics differ depending on the design
comDare metrics to a"t"r-irr" fpti-al routes,
ilHffi:L;;,h;;. til;il;;;;;il*iih on.
"noth"r
and maintain their routing tables
139
i
. More secute
Static routing disadvantages are as follows:
. Configuration and maintenance are time-consuming.
. Confguration is error-prone, especially in large networks.
. Administrator intervention is required to maintain changing route information especi
when topology changes.
. Becomes more complex as the network grows
. Requires complete knowledge of the entire network for proper implementation.
Dynamic Routing Protocols
Dynamic routing enables routers to select paths according to real-time logical network layout changcr
In dynamic routing, the routing protocol operating on the router is responsible for the creatic
maintenance and updating ofthe dynamic routing table. This networking technique provides op-:rnd
data routing.
D1'namic routing uses multiple algorithms and protocols. The most popular are Routing Informatb
Protocol (RIP) and Open Shortest Path First (OSPF). Dynamic routing is cheaper and automates tafi
changes, at the same time providing the best paths for data transmission.
140
. More secure
Static routing disadvantages nre as follows:
. Configuration and maintenance are time_consuming.
. Configuration is error-prone, especially in large networks.
' Administrator intervention is required to m-aintain changing
route information espq
when topology changes.
. Becomes more complex as the network grows
' Requires complete knowledge of the entire network
for proper implementation.
network,
as a hop. The best route is the route which has the rowest
,i"-t.r'"li"p,
," ,ri.,
l4{)
\r
I
receivedflomitsneighborsbuthasnoideaoftheidentityofroutersthatareontheselectedroute.Thisits neighbors'
,outing table by adding information about all
implies that each ,outer keeps-an-JiJ"i.d
pI" of a distance vector protocol'
Routing Information Protocol (RIi; it "" "*"
Each table
path first, in which each router creates three separate tabres'
+iT$nti*:*::shortest of directly auached neighbors, the second
one
perform its difierent tu*,i""rt*il;;;; ;;;;;;;;k table'
determines the topology t ;;;;;; tti"r"",."tt, and- the third one is used for the routingintended to
.f Lirk;;;;;itrg pr"to*r. Theal_gorithms link state had initially
oSpF is an exampl. the
#J;;;;;;;uting. w-hen a router is initialised, it must define
overcome the shortcomings to all
of its links .""n..ia i. *oth.. ,rod.. The nod" then broadcasts the information
cost of each information'
autonomous ,yr;, ;d ,h.;;fore not only to its neighbours. From all this
nodes in the
t;ble indicating the cost of achieving
for obtaining a routing"ott"tr
the nodes can perform their calculation its routing table, it notifies all
each destination. when a ;;;;;;; i"i"r-"ii"r tiut
of each link'
.o"iit"'"ti;;:;;;;e has the network topologyind costs
intervening rout.r, i' it,
node'
routing cai be seen as central in each
Protocol and open Shortest Path Ftust'
This book will dir"u* trr. no,r:tirrg Information
TherearetwoversionsofRlBRIPversionlandRlPversion2.Thedifrerencesbetweenthe2ver.
sions are as follows:
mask (VLSM)
ffi "bt.+t$t*ubnet
s."dr*"-;*t -"rk "t"ng with routing update
Broadcast address Multicast address
C.ffi"i."t", *tth "th- RIP router through the
Supports authentication
/
be between I
on, RIP counts the number of hops for each packet' which must
As has been said earlier to establish the
t6 indicates ih"iii. ..""".it.n cannot be established' RIP messages
and 15. The value
;*ry If a RIP message does not reach its neighbor
;; ;ds.
routing tables ur. ,.nt "ppro*iii'":t.,i
l4r
I
after three minutes, the latter considers that the link is no longer valid; the number oflinks is
than 15. RIP relies on hop count as the only measure for choosing the best route. RIp disr
is that it is inefficient on large networks or on networks where a large number ofrouters are
osPF is basically a link state and hierarchical IGP routing algorithm. It uses features like
routing, least cost routing and load balancing. Its major metric is the cost to determine the best
OSPF uses Dijkstra algorithm. OSPF uses load balancing, in which it overally distributes traffic rG
equally.
oSPF operates inside a distinct autonomous system and frequently updates its database.
l. Resource Sharing:
The goal is to make all programs, equipment (like printers etc), and especially data, available to anyor
on the network without regard to the physical location ofthe resource and the user.
2. Server-Clientmodel:
\r
In this model, the data is stored on powerful computers called Servers. Often these are centrallyhoused
and maintained by a system administrator. In contrast, the employees have simple machines, called
clients, on their desks, using which they access remote data.
t42
'lr
IJ.r
3. CommunicationMedium:
A computer network can provide a powerful communication medium among employees. Virtually
every company that has two or more computers now has e-mail (electronic mail), which employees
generally use for a great deal of daily communication.
4. eCommerce:
A goal that is starting to become more important in businesses is doing business with consumers over
the Internet. Airlines, bookstores and music vendors have discovered that many customers like the
convenience ofshopping from home. This sector is expected to grow quickly in the future.
The most popular forms are listed in the below figure:
I
I
i-
l
r43
qlt-
3. What are the three basic types of web documents? AIso explain the advantages and disadvantag'
es of each type. t8l
al I th
5. Draw a neat labeled diagram of the OSI reference model for computer networks showing
layers and the communication subnet boundary' I7l
I
\r
]
IM
It
\t'
I