Networking Essentials
Networking Essentials
A Simple Guide for Beginners
NETWORKING
ESSENTIALS
PREFACE
In today’s information technology world, networking is very
much essential for any computer professional, either he/she is in the field
of computer hardware & networking profession or any other computer
technology. Now‐a‐days computer is widely used in all most every office
of companies from different sectors & sizes and even if shops & in home
users also. Networking is successfully used there in various forms. In
home users and small shops networking is used in the form of internet
through wi‐fi router and for printing documents through wireless printer.
This book is a step‐by‐step guide for the beginners of computer
hardware & networking profession and for those who want to
understand how computer networking works. The book covers basic
networking concepts, reference models, basics of IP address, networking
devices, cabling & crimping, file & printer sharing and many more. This
book is based on my knowledge and experience. When writing this book,
I aim to provide some basic information about the computer networking
for beginners.
Pradeep Patra
Contents
2. Reference models 8 – 16
3. Network Standardization 17 – 21
5. Network Topologies 25 – 28
6. Protocols 29 – 42
7. Port Number 43 – 43
8. IP Address 44 – 48
9. Subnet Mask 49 – 49
14. Connectors 79 – 80
Definition of a Network:
A computer network can do many things, which are listed below, that a stand-
alone machine cannot do:
1. Share a single copy of a file among all the users, even concurrently.
2. Transfer files from computer to computer or from one computer to the server.
3. Share applications over the entire network. A multi-user license costs much
less than buying a standalone license.
4. Share resources like printers, hard disks, CD-ROM drives, modems, etc.
5. Use e-mail for communications, inter-office notes, creating an almost
paperless office.
• Servers: Servers are faster computers that run various software, share its
resources, store & process information and also provide a human interface for
the users to be able to use the networked computers.
• LAN Cable: This is the medium or channel over which the information travels
from computer to computer. The information travels from one computer onto
the medium and then from the medium to another computer in the form that it
can be read.
It is very much important to see why people are interested in computer networks,
in what way it is helpful.
Benefit for the company or organization may be due to many factors like listed in the
following section.
(i) Access to remote information: there are many areas where access to
remote information is necessary in our daily life. Here applications involve
interactions between a person and remote database. One area seen is
financial institutions like banks, power supply department etc. Many people
pay their bills; manage bank accounts and handle investment
electronically.
The discussions in which one person posts a message and all other
subscribers can read the message or one subscriber may put a query and
anyone who knows can answer the query by posting so that all subscribers
can read.
Another issue is employee versus employer rights. Many people read and
write mails at work. Some employers have claimed the right to read and possible
censor employees’ mails including those that come from home machines.
Computer networks may be classified according to the network layer at which they
operate according to some basic reference models that are considered to be standards in
the industry such as the seven-layer OSI reference model and the four layers TCP/IP
model. Few ways of classification are listed below:
¾ By scale: To the scale or extent of reach of the network, for example as a Personal
Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN)
or Wide Area Network (WAN).
Broadcast links
Point-to-point links
Broadcast system generally allows the possibility of addressing a packet to all the
destinations by using a special code in the address field. When this code is transmitted, it
is received and processed by every machine on the network. Again, considering the
above example: A teacher put forth the question in a class to all students, which is the
teacher does not ask to a specific student by any unique name, then, all are supposed to
analyze the question and answer. This mode of operation is referred to broadcasting.
Some broadcasting systems also support transmission to a subset of the users, which is
a group of users. This mode is called as multicasting.
Interprocessor Processors
distance located in same
1m Square meter Personal Area Network
10 m Room
100 m Building Local Area Network
1 km Campus
10 km City Metropolitan Area Network
100 km Country
Wide Area Network
1000 km Continent
10,000 km Planet The Internet
At the top we have Personal Area Networks (PAN) meant for a single person. For e.g., a
wireless network connecting a computer with its mouse, keyboard and a printer can
constitute a personal area network.
Beyond the personal area network, we have longer-range networks which are
broadly classified networks as
• LAN
• MAN
• WAN
Local Area Networks are generally called LANs. They are privately owned
networks within a single building or campus of up to few kilometers in size. They are used
to connect personal computers and workstations in company offices and factories to
share resources and exchange information. Traditional LANs run at speeds of 10Mbps to
100Mbps, have low delay (microseconds and nanoseconds) and make very few errors.
Newer LANs operate at 10Gbps.
Cable television is not the only MAN; today’s developments in high-speed wireless
internet access also resulted in MAN.
A wide area network is referred as WAN. WAN spans a large geographical area
often a continent or country. WAN contains a collection of machines, traditionally called
as hosts, these hosts can be on LANs and are connected by a subnet. The hosts are
owned by customers or are personal computers. The subnets are owned by a telephone
company or internet service provider. The subnet carries the messages from hosts to
hosts, just as telephone system carries words from speaker to listener. Each host is
connected to a LAN on which a router is present. Sometimes a host may be connected
directly to a router.
In most WANs, the network contains many transmission lines each connecting a
pair of routers. A packet is sent from one router to another via one or more intermediate
routers. The packet is received at each intermediate router in its entirety. That is store the
packet in full until the required output line is free and then forwards it. A subnet that works
according to this principle is called store and forward or packet switched subnet. Not all
WANs are packet switched. A second possibility for a WAN is a satellite system. Satellite
networks are inherently broadcast networks.
There are two important network architectures. They are ISO-OSI reference
model and TCP/IP reference model. These two are discussed below:
Parts of OSI have influenced Internet protocol development, but none more than
the abstract model itself, documented in ISO 7498. In this model, a networking system is
divided into layers. Within each layer, one or more entities implement its functionality.
Each entity interacts directly only with the layer immediately beneath it and provides
facilities for use by the layer above it.
Protocols enable an entity in one host to interact with a corresponding entity at the
same layer in a remote host. Service definitions abstractly describe the functionality
provided to a (N)-layer by an (N-1) layer, where N is one of the seven layers inside the
local host.
Application 7
Presentation 6
Session 5
Transport 4
Network 3
Data Link 2
Physical 1
The ISO-OSI reference model is as shown in the above figure. As such the model
is not network architecture as it does not specify exact services and protocols. It just tells
what each layer should do and where it lies. The bottom most layer is referred as physical
layer.
This layer is the bottom most layer that is concerned with transmitting raw bits
over the communication channel (physical medium). The design issues have to do with
making sure that when one side sends a 1 bit, it is received by other side as a 1 bit and
not as a 0 bit. It performs direct transmission of logical information that is digital bit
streams into physical phenomena in the form of electronic pulses. Modulators/
demodulators are used at this layer. The design issue here largely deals with mechanical,
electrical and procedural interfaces and the physical transmission medium, which lies
below this physical layer.
The Data Link Layer provides the functional and procedural means to transfer
data between networks entitles and to detect and possibly correct errors that may occur
in the Physical Layer. That is it makes sure that the message indeed reach the other end
without corruption or without signal distortion and noise. It accomplishes this task by
having the sender break the input data up into the frames called data frames. The DLL of
transmitter then transmits the frames sequentially and processes acknowledgement
frames sent back by the receiver. After processing acknowledgement frame, may be the
transmitter needs to re-transmit a copy of the frame. So therefore, the DLL at receiver is
required to detect duplications of frames.
Networking Essentials – Reference Models 10
The best-known example of this is Ethernet. This layer manages the interaction of
devices with a shared medium. Other examples of data link protocols are HDLC and
ADCCP for point-to-point or packet-switched networks and Aloha for local area networks.
On IEEE 802 local area networks and some non-IEEE 802 networks such as FDDI, this
layer may be split into a Media Access Control (MAC) layer and the IEEE 802.2 Logical
Link Control (LLC) layer. It arranges bits from the physical layer into logical chunks of
data, known as frames.
This is the layer at which the bridges and switches operate. Connectivity is
provided only among locally attached network nodes forming layer 2 domains for unicast
or broadcast forwarding. Other protocols may be imposed on the data frames to create
tunnels and logically separated layer 2 forwarding domain.
The Network Layer provides the functional and procedural means of transferring
variable length data sequences from a source to a destination via one or more networks
while maintaining the quality of service requested by the Transport Layer. The Network
Layer performs network routing functions and might also perform fragmentation and
reassembly and report delivery errors. Routers operate at this layer sending data
throughout the extended network and making the Internet possible. This is a logical
addressing scheme values are chosen by the network engineer. The addressing scheme
is hierarchical.
The transport layer provides transparent transfer of data between end users,
providing reliable data transfer while relieving the upper layers of it. The transport layer
controls the reliability of a given link through flow control, segmentation/de-segmentation
and error control. Some protocols are state and connection oriented. This means that the
transport layer can keep track of the segments and retransmit those that fail. The best-
known example of a layer 4 protocol is the Transmission Control Protocol (TCP).
The transport layer is the layer that converts messages into TCP segments of
User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), etc.
packets. Perhaps an easy way to visualize the Transport Layer is to compare it with a
Post Office, which deals with the dispatch and classification of mail and parcels sent. Do
remember, however, that a post office manages the outer envelope of mail. Higher layers
may have the equivalent of double envelopes, such as cryptographic presentation
services that can be read by the addressee only.
Networking Essentials – Reference Models 11
The Presentation Layer transforms the data to provide a standard interface for the
Application Layer. MIME encoding, data encryption and similar manipulation of the
presentation are done at this layer to present the data as a service or protocol developer
sees fit. Examples of this layer are converting an EBCDIC (Extended Binary Coded
Decimal Interchange Code)-coded text file to an ASCII (American Standard Code for
Information Interchange)-coded file or serializing objects and other data structures into
and out of XML.
The Application Layer is the seventh level of the seven-layer OSI model. It
interfaces directly to the users and performs common application services for the
application processes. It also issues requests to the presentation layer. Carefully noted
that, this layer provides services to user-defined application processes and to the end
user, for e.g., it defines a file transfer protocol but the end user must go through an
application process to invoke file transfer. The OSI model does not include human
interfaces.
Networking Essentials – Reference Models 12
The seven OSI layers use various forms of control information to communicate
with their peer layers in other computer systems. This control information consists of
specific requests and instructions that are exchanged between peer OSI layers.
Control information typically takes one of two forms: headers and trailers. Headers
are prepended to data that has been passed down from upper layers. Trailers are
appended to data that has been passed down from upper layers. An OSI layer is not
required to attach a header or a trailer to data from upper layers.
Headers, trailers and data are relative concepts, depending on the layer that
analyzes the information unit. At the data link layer, however, all the information passed
down by the network layer (the layer 3 header and the data) is treated as data.
Similar to Network Layer now attaches its header (DH) and Trailer (DT) to the data
that received from network layer. In other words, the data portion of an information unit at
a given OSI layer potentially can contain headers, trailers and data from all the higher
layers. This is known as encapsulation. In the following figure shows how the header and
data from one layer are encapsulated into the header of the next lowest layer. In figure
AH, PH, SH, TH, NH refer to the header of application layer to Network layer respectively.
DT & DH refer to Data link layer Trailer & Header.
The TCP/IP reference model is the network model used in the current Internet
architecture. It was created in the 1970s by DARPA (Defense Advanced Research
Projects Agency) for use in developing the Internet’s protocols and the structure of the
Internet is still closely reflected by the TCP/IP model. It has fewer, less rigidly defined
layers than the commonly referenced OSI Model and thus provides an easier fit for real
world protocols. It is considered as the grandfather of the Internet, the ARPANET
(Advanced Research Projects Agency Network). This was a research network sponsored
by the Department of Defense in the United States.
A goal was of continuing the conversation between source and destination even if
transmission went out of operation. The reference model was named after two of its main
protocols, TCP (Transmission Control Protocol) and IP (Internet Protocol). No document
officially specifies the mode. Different names are given to the layers by different
documents and different numbers of layers are shown by different documents. There are
versions of this model with four layers and with five layers.
The original four-layer version of the model has layers as shown in the following
figure.
Application
Transport
Internetworking
Host
to
Network
This is where the “higher level” protocols such as FTP, HTTP, etc. operate. The
original TCP/IP specification described a number of different applications that fit into the
top layer of the protocol stack. These applications include Telnet, FTP, SMTP and DNS.
Telnet is a program that supports the TELNET protocol over TCP. TELNET is a
general two-way communication protocol that can be used to connect to another host and
run applications on that host remotely.
FTP (File Transfer Protocol) is a protocol that was originally designed to promote
the sharing of files among computer users. It shields the user from the variations of file
storage on different architectures and allows for a reliable and efficient transfer of data.
Networking Essentials – Reference Models 14
SMTP (Simple Mail Transport Protocol) is the protocol used to transport electronic
mail from one computer to another through a series of other computers along the route.
DNS (Domain Name System) resolves the numerical address of a network node
into its textual name or vice-versa. It would translate www.google.com to 172.217.26.228
to allow the routing protocols to find the host that the packet is destined for.
This is where flow-control and connection protocols exist, such as TCP. This layer
deals with opening and maintaining connections, ensuring that packets are in fact
received. The transport layer is the interface between the application layer and the
complex hardware of the network. It is designed to allow peer entitles on the source and
destination hosts to carry on conversations. Data may be user data or control data. Two
modes are available, full-duplex and half-duplex. In full-duplex operation, both sides can
transmit and receive data simultaneously, whereas in half-duplex, a side can only send or
receive at one time.
This layer defines IP addresses, with many routing schemes for navigating
packets from one IP address to another. The job of the network layer is to inject packets
into any network and have them travel independently to the destination. The layer defines
IP (Internet Protocol) for its official packet format and protocol. Packet routing is a major
job of this protocol.
This layer describes the physical equipment necessary for communications, such
as twisted pair cables, the signaling used on that equipment and the low-level protocols
using that signaling. The Host-To-Network layer interfaces the TCP/IP protocol stack to
the physical network. The TCP/IP reference model does not specify in any great detail the
operation of this layer, except that the host has to connect to the network using some
protocol so it can send IP packets over it. As it is not officially defining, it varies from
implementation to implementation, with vendors supplying their own version.
The basic idea of the networking system is to allow one application on a host
computer to talk to another application on a different host computer. The application
forms its request and then passes the packet down to the lower layers, which add their
own control information, either a header or footer, onto the packet. Finally, the packet
reaches the physical layer and is transmitted through the cable onto the destination host.
The packet then travels up through the different layers, with each layer reading,
deciphering and removing the header or footer that was attached by its counterpart on the
originating computer. Finally, the packet arrives at the application it was destined for.
Even though technically each layer communicates with the layer above or below it, the
process can be viewed as one layer talking to its partner on the host.
Interaction between the transport layer and the other layers immediately above
and below is shown in the following figure.
Networking Essentials – Reference Models 15
Application
AP AP AP
Layer
Internet IP
Layer
Any program running in the application layer has the ability to send a message
using TCP or UDP, which are the two protocols defined for the transport layer. The
application can communicate with the TCP or the UDP service, whichever it requires.
Both the TCP and UDP communicate with the Internet Protocol in the internet layer. In all
cases communication is a two-way process. The applications can read and write to the
transport layer. The diagram only shows two protocols in the transport layer.
A message to be sent originates in the application layer. This is then passed down
onto the appropriate protocol in the transport layer. These protocols add a header to the
message for the corresponding transport layer in the destination machine for purposes of
reassembling the message. The segment is then passed onto the internet layer where the
Internet Protocol adds a further header. Finally, the segment is passed onto the physical
layer; a header and a trailer are added at this stage. The following figure shows the
structure of the final segment being sent.
The relations of all protocols that reside in corresponding layers are as shown in
the following figure.
IP Network
Interfaces: It tells the processes above it how to access it. It specifies what
parameters are and what result to expect.
Protocols: It provides the offered service. It is used in a layer and are layers own
business.
The TCP/IP did not originally distinguish between the service, interface &
protocols. The only real services offered by the internet layer are SEND IP packets and
RECEIVE IP packets.
The OSI model was devised before the protocols were invented. Data link layer
originally dealt only with point-to-point networks. When broadcast networks came around,
a new sub-layer had to be hacked into the model. With TCP/IP the reverse was true, the
protocols came first and the model was really just a description of the existing protocols.
This TCP/IP model did fit any other protocol stack.
The OSI Model has seven layers and TCP/IP has four layers as shown in the
following figure.
OSI TCP/IP
7 Application Application
Most official computer standards are set by one of the following organizations:
Benefits of Standardization:
First, one of the national standards organizations feels the need for an
international standard in some area.
The CD is then circulated to all the member bodies, which get six months to
criticize it.
Based on the results of this round, the final text of the IS (International Standard)
is prepared, approved and published.
The worldwide Internet has its own standardization mechanism, different from
those of ITU-T and ISO. When ARPANET was set up, DoD created an informal
committee. In 1983 the committee was renamed the IAB (Internet Activities Board). Then
the meaning was changed as to Internet Architecture Board. Communication was done
by a series of technical reports called RFCs (Request for Comments). RFCs are stored
on-line and can be fetched by anyone interested in them. They are numbered in
chronological order of creation.
There was another group called IRTF (Internet Research Task force), which was
made subsidiary to IAB along with the IETF (Internet Engineering Task Force). Later, the
Internet society was created. IRTF concentrated on long term research and IETF dealt
with short term engineering issues and was divided into working groups, each with
specific problem to solve.
IEEE Standards:
IEEE has standardized a number of LAN’s and MAN’s under the name of IEEE
802. Few of the standards are listed in the following figure. The most important of the
survivors are 802.3 (Ethernet) and 802.11 (Wireless LAN). Both these two standards
have different physical layers and different MAC sub-layers but converge on the same
logical link control sub layer so they have same interface to the network layer.
Ethernets:
From this early and comparatively simple concept, Ethernet evolved into the
complex networking technology that today powers the vast majority of local computer
networks. The coaxial cable was later replaced with point-to-point links connected
together by hubs and/or switches in order to reduce installation costs, increase reliability
and enable point-to-point management and troubleshooting. Star LAN was the first step in
the evolution of Ethernet from a coaxial cable bus to a hub-managed, twisted-pair
network.
Above the physical layer, Ethernet stations communicate by sending each other
data packets, small blocks of data that are individually sent and delivered. As with other
IEEE 802 LANs, each Ethernet station is given a single 48-bit MAC address, which is
used both to specify the destination and the source of each data packet. Network
Interface Cards (NICs) or chips normally do not accept packets addressed to other
Ethernet stations. Adapters generally come programmed with a globally unique address,
but this can be overridden either to avoid an address change when an adapter is replaced
or to use locally administered addresses.
The most kinds of Ethernets used were with the data rate of 10 Mbps. The
following table gives the details of the medium used, number of nodes per segment and
distance it supported along with the application.
Fast Ethernet:
Fast Ethernet is a collective term for a number of Ethernet standards that carry
traffic at the nominal rate of 100 Mbit/s. Of the 100 megabit Ethernet standards
100baseTX is by far the most common and is supported by the vast majority of Ethernet
hardware currently produced. Full duplex fast Ethernet is sometimes referred to as “200
Mbit/s” though this is somewhat misleading as that level of improvement will only be
achieved if traffic patterns are symmetrical. Fast Ethernet was introduced in 1995 and
remained the fastest version of Ethernet for three years before being superseded by
Gigabit Ethernet.
Networking Essentials – Network Standardization 20
A Fast Ethernet adapter can be logically divided into a Medium Access Controller
(MAC) which deals with the higher-level issues of medium availability and a physical layer
interface (PHY). The MAC may be linked to the PHY by a 4 bit 25 MHz synchronous
parallel interface known as MII (Media-Independent Interface). Repeaters (Hubs) are also
allowed and connect to multiple PHYs for their different interfaces.
100BASE-T is any of several Fast Ethernet standards for twisted pair cables.
100BASE-TX (100 Mbit/s over two-pair Cat5 or better cable).
100BASE-T4 (100Mbit/s over four-pair Cat3 or better cable).
100BASE-T2 (100 Mbit/s over two-pair Cat3 or better cable).
The segment length for a 100BASE-T cable is limited to 100 meters. Most
networks had to be rewired for 100-megabit speed whether or not they had supposedly
been Cat3 or cat5 cable plants. The vast majority of common implementations or
installations of 100BASE-T are done with 100BASE-TX.
100BASE-TX is the predominant form of Fast Ethernet and runs over two pairs of
Category 5 or above cable. A typical Category 5 cable contains 4 pairs and can therefore
support two 100BASE-TX links. Each network segment can have a maximum distance of
100 meters. In its typical configuration, 100BASE-TX uses one pair of twisted wires in
each direction, providing 100 Mbit/s of throughput in each direction (full-duplex).
In 100BASE-T2, the data is transmitted over two copper pairs, 4 bits per symbol.
First, a 4 bit symbol is expanded into two 3-bit symbols through a non-trivial scrambling
procedure based on a linear feedback shift register.
100BASE-FX is a version of Fast Ethernet over optical fiber. It uses two strands of
multi-mode optical fiber for receive (RX) and transmit (TX). Maximum length is 400
meters for half-duplex connections or 2 kilometers for full-duplex.
100BASE-SX is a version of Fast Ethernet over optical fiber. It uses two strands of
multi-mode optical fiber for receive and transmit. It is a lower cost alternative to using
100BASE-FX, because it uses short wavelength optics which are significantly less
expensive than the long wavelength optics used in 100BASE-FX. 100BASE-SX can
operate at distances up to 300 meters.
Gigabit Ethernet:
Gigabit Ethernet, increasing the speed to 1000 Mbit/s. The initial standard for
Gigabit Ethernet was standardized by the IEEE in June 1998 as IEEE 802.3z. 802.3z is
commonly referred to as 1000BASE-X (where -X refers to either -CX, -SX, -LX or -ZX).
Name Medium
1000BASE-T Unshielded twisted pair
1000BASE-SX Multi-mode fiber
1000BASE-LX Single-mode fiber
1000BASE-CX Balanced copper cabling
1000BASE-ZX Single-mode fiber
Networking Essentials – Data Transmission Modes 22
Tx Rx
Transmitter Rx Tx Receiver
Ground Ground
Transmitter Receiver
D8
In serial transmission it sends and receives information in serial format, i.e. one
binary digit (bit) at a time. But in parallel transmission it sends and receives information in
parallel format, i.e. one byte (8 bits) at a time. This concept of serial and parallel
transmission is shown in the following figure.
Parallel Transmission
Serial Transmission
The comparisons of the serial and parallel transmission modes are listed in the
following table.
Simplex refers to communications in only one direction from the transmitter to the
receiver as shown in the following figure. There is no acknowledgement of reception from
the receiver, so errors cannot be conveyed to the transmitter. For example, a radio is a
simplex device; TV broadcast is a simplex device.
A B
Simplex
A B
Half-Duplex
A B
Full-Duplex
Networking Essentials – Data Transmission Modes 24
Synchronous Transmission:
The two ends of a link are synchronized by carrying the transmitter’s clock
information along with date. Bytes are transmitted continuously, if there are gaps then
inserts idle bytes as padding.
Advantage:
Disadvantage:
For correct operation the receiver must start to sample the line at the correct instant.
Application:
Asynchronous Transmission:
Advantage:
The character is self-contained & Transmitter and receiver need not be synchronized
Transmitting and receiving clocks are independent of each other.
Disadvantage:
Application:
If channel is reliable, then suitable for high-speed else low speed transmission
Most common use is in the ASCII terminals.
Networking Essentials – Network Topologies 25
It is to find the most economical and efficient way to connect all the users to the
networks resources while providing adequate capacity to handle user demands, maintain
system reliability and minimize delay. Many topologies do exist but most commonly there
are 3 types of basic topologies used for networking computers.
Network Topologies are logical layouts of the network. The term “logic” used here
marks a great significant, which means network topologies depend not on the “physical”
layout of the network. No matter that computers on a network are placed in a linear
format, but if they connected via a hub/switch they are forming a Star Topology, not the
Bus Topology. And here is the important factor where networks differ, visually and
operationally.
The type of network topology in which all of the nodes of the network are connected to a
common transmission medium which has exactly two endpoints is called the ‘bus’. That is
transmitted between nodes in the network is transmitted over this common transmission
medium and is able to be received by all nodes in the network virtually simultaneously. It
consists a single main cable connects each node. The bus topology is as shown in the
following figure.
Nodes Printer
The network operating system keeps track of unique electronic address for each
node and manages the flow of information. A single cable is dedicated to all the
information traffic; performance can be slow at a times. This topology is often bound in
client-server systems (example, File Server: dedicated solely to the distribution of data
files). This topology is most commonly used, as it can be easily expandable as the
network grows.
Advantages:
Disadvantages:
Ring Topology:
This type of network topology in which each of the nodes of the network is
connected to two other nodes in the network and with the first and last nodes being
connected to each other, forming a ring. Ring Topology looks something like shown in the
following figure. That is the nodes are connected in a circle using cable segments. Each
node is physically connected only to two others.
All data that is transmitted between nodes in the network travels from one node to
the next node in a circular manner and the data generally flows in a single direction.
Performance can be faster. Found in peer-to-peer networks. The operation and working
of LAN using ring topology illustrated in standard IEEE 802.5.
Ring Topology
Networking Essentials – Network Topologies 27
Star Topology:
Nodes
Hub or Switch
Printer
File Server
Star Topology
Advantages:
Disadvantages:
Tree Topology:
Nodes
Nodes
Printer
Hub/Switch
Backbone Cable
File Server
Tree Topology
Advantages:
Disadvantages:
Chapter 6: PROTOCOLS
Network protocols define a language of rules and conventions for communication
between network devices. A protocol is essentially a “language” that a computer uses to
communicate and the other computer to which it is connected must use the same
language for communication to take place. Computers use many different protocols to
communicate, which has given rise to the OSI reference model, which defines the layers
at which different protocols operate.
The transport layer is the fourth layer of the OSI Reference Model. It provides
transparent transfer of data between end systems using the services of the network layer.
The details of the two transport layer protocols i.e., TCP & UDP are given below:
TCP Protocol:
The Transmission Control Protocol (TCP) is one of the core protocols of the
Internet protocol suite, often simply referred to as TCP/IP. Using TCP, applications on
networked hosts can create connections to one another, over which they can exchange
streams of data using Stream Sockets. The protocol guarantees reliable and in-order
delivery of data from sender to receiver. TCP also distinguishers data for multiple
connections by concurrent applications (e.g., Web server and e-Mail server) running on
the same host.
TCP supports many of the Internet’s most popular application protocols and
resulting applications, including the World Wide Web, e-Mail, File Transfer Protocol and
Secure Shell.
In the Internet protocol suite, TCP is the intermediate layer between the Internet
Protocol (IP) below it and an application above it. Applications often need reliable pipe-
like connections to each other, whereas the Internet Protocol does not provide such
streams, but rather only best effort delivery (i.e., unreliable packets). TCP does the task
of the transport layer in the simplified OSI model of computer networks. The other main
transport-level Internet Protocol is UDP.
Application send streams of octets to TCP for delivery through the network and
TCP divides the byte stream into appropriately sized segments (usually delineated by the
maximum transmission unit (MTU) size of the data link layer of the network to which the
computer is attached). TCP then passes the resulting packets to the Internet Protocol, for
delivery through a network to the TCP module of the entity at the other end, TCP checks
to make sure that no packets are lost by giving each packet a sequence number, which is
also used to make sure that the data is delivered to the entity at the other end in the
correct order. The TCP module at the far end sends back an acknowledgement for
packets which have been successfully received; a timer at the sending TCP will cause a
timeout if an acknowledgement is not received within a reasonable round-trip time (or
RTT), and the (presumably lost) data will then be re-transmitted. The TCP checks that no
bytes are corrupted by using a checksum; one is computed at the sender for each block
of data before it is sent and checked at the receiver.
Networking Essentials – Protocols 30
The header consists of 11 fields, of which only 10 are required. The eleventh field
is optional and aptly named: options.
16–31
+ Bits 0–3 4–7 8–15
0 Source Port Destination Port
32 Sequence Number
64 Acknowledgement Number
Data
96 Reserved Flags Window
Offset
128 Checksum Urgent Pointer
160 Options (optional)
160/192+ Data
Sequence Number: The sequence number has a dual role. If the SYN flag is present
then this is the initial sequence number and the first data byte is the sequence
number plus 1. Otherwise, if the SYN flag is not present then the first data byte is the
sequence number.
Acknowledgement number: If the ACK flag is set then the value of this field is the
sequence number that the sender of the acknowledgement expects next.
Data offset: This 4-bit field specifies the size for the TCP header in 32-bit words. The
minimum size header is 5 words and the maximum is 15 words thus giving the
minimum size of 20 bytes and maximum of 60 bytes. This field gets its name from the
fact that it is also the offset from the start of the TCP packet to the data.
Reserved: 4-bit reserved field for future use and should be set to zero.
o CWR: Congestion Window Reduced (CWR) flag is set by the sending host to
indicate that it received a TCP segment with the ECE flag set.
o ECE: ECN-Echo flag. Used to indicate that the TCP peer is ECN capable during
3-way handshake.
Window: The number of bytes the sender is willing to receive starting from the
acknowledgement field value.
Checksum: The 16-bit checksum field is used for error-checking of the header and
data.
UDP Protocol:
User Datagram Protocol (UDP) is one of the core protocols of the Internet
Protocol suite. Using UDP, programs on networked computers can send short messages
sometimes known as datagrams (using Datagram Sockets) to one another. UDP is
sometimes called the Universal Datagram Protocol or Unreliable Datagram Protocol.
UDP does not guarantee reliability or ordering in the way that TCP does.
Datagrams may arrive out of order, appear duplicated or go missing without notice.
Avoiding the overhead of checking whether every packet actually arrived makes UDP
faster and more efficient, at least for applications that do not need guaranteed delivery.
Time-sensitive applications often use UDP because dropped packets are preferable to
delayed packets. UDP’s stateless nature is also useful for servers that answer small
queries from huge numbers of clients. Unlike TCP; UDP supports packet broadcast
(sending to all on local network) and multicasting (send to all subscribers).
Common network applications that use UDP include the Domain Name System
(DNS), streaming media applications such as IPTV, Voice over IP (VoIP), Trivial File
Transfer Protocol (TFTP) and online games.
Ports 49,152 through 65,535 are ephemeral ports and are used as temporary
ports primarily by clients when communicating to servers.
Packet Structure:
+ Bits 0 – 15 16 – 31
0 Source Port Destination Port
32 Length Checksum
64 Data
The UDP header consists of only 4 fields. The use of two of those is optional.
Source Port: This field identifies the sending port when meaningful and should be
assumed to be the port to reply to if needed. If not used, then it should be zero.
Destination Port: This field identifies the destination port and is required.
Length: A 16-bit field that specifies the length in bytes of the entire datagram: header
and data. The minimum length is 8 bytes since that’s the length of the header. The
field size sets a theoretical limit of 65,527 bytes for the data carried by a single UDP
datagram.
Checksum: The 16-bit checksum field is used for error-checking of the header and
data.
CSMA Protocol:
“Carrier Sense” describes the fact that a transmitter listens for a carrier wave
before trying to send. That is, it tries to detect the presence of an encoded signal from
another station before attempting to transmit. If a carrier is sensed, the node waits for the
transmission in progress to finish before initiating its own transmission.
“Multiple Access” describes the fact that multiple nodes send and receive on the
medium. Transmissions by one node are generally received by all other nodes using the
medium.
Collisions:
In pure CSMA, only the carrier sense is used to avoid collisions. If two nodes try to
send a frame at nearly the same, neither detects a carrier so both begin transmitting. The
transmitters do not detect collisions, so transmit the entire frame (thus wasting the
bandwidth used). Receivers cannot distinguish between collisions and other sources of
frame errors, so collision recovery relies on the ability of the communicating nodes to
detect frame errors and invoke an error recovery procedure. For example, the receiver
may not send a required ACK, causing transmitter to time out and retry.
Networking Essentials – Protocols 33
Non-Persistent CSMA:
1 – Persistent CSMA:
P – Persistent CSMA:
P – Persistent CSMA details the time slot is usually set to the maximum
propagation delay. As p decreases, stations wait longer to transmit but the number of
collisions decreases. Considerations for the choice of p: (n x p) must be < 1 for stability,
where n is maximum number of stations.
In all three cases a collision is possible. CSMA determines collisions by the lack of
an ACK which results in a TIMEOUT. This is extremely expensive with respect to
performance. If a collision occurs, THEN wait a random amount of time and start over.
CSMA/CD Protocol:
Attempt 1
Yes Collision
Collision detected? recovery
sub-algorithm
No
Transmit
No
next bit of Transmission finished? Not
the frame Recovered
Yes
End End
This is most commonly used standard that is implemented at the Data link layer. It
is a bit-oriented protocol. It is developed by ISO as a superset of SDLC. The frame format
for HDLC is as shown in the following figure and control field of 8 bits is expanded as
shown in the following figure.
Bits 8 8 8 ≥0 16 8
Bits 1 3 1 3
HDLC can be used for point to multipoint connections, but is now used almost
exclusively to connect one device to another, using what is known as Asynchronous
Balanced Mode (ABM). The other modes are Normal response Mode and Asynchronous
Response Mode.
(i) I Frames: This frame has the control field as shown in above figure (a). These are
used to transport user data from the network layer. They also include flow and error
control information piggybacked on data. Seq, which defines the sequence number of
frames that is transmitted from source to destination. P/F, which defines Poll/final
field, and is a single bit with dual purpose. It is called Poll when used by the primary
station to obtain a response from a secondary station and Final when used by the
secondary station to indicate a response or the end of transmission. Next field also
defines the sequence number of a frame, but gives a number that the source machine
is expecting from the destination machine in a two-way communication system.
(ii) Supervisory Frames: This frame has the control field as shown in above figure (b).
These frames are used for flow and error control whenever piggybacking is
impossible or inappropriate. For example, when primary field has to send only
command or response or acknowledge and not data. S-Frame does not have
information fields. The type field is used for retransmission.
(c) Receiver not ready: It acknowledges all frames up to but not including next.
(d) Selective reject: It calls for retransmission of only that frame specified in the next
field.
(iii) U-Frames: This frame has the control field as shown in above figure (c). These are
used for link management. They are used to exchange session management and
control information between connected devices. U-frame contains an information field
used for system management information and not user data.
A data-link layer TCP/IP protocol used for WAN connections, especially dial-up
connections to the Internet and other service providers. Unlike its progenitor, the SLIP,
PPP includes support for multiple network layer protocols, link quality monitoring
protocols and authentication protocols. PPP is used for connections between two
computers only and therefore does not need many of the features found in LAN protocols,
such as address fields for each packet and a MAC mechanism.
This is an application layer protocol used for to retrieve e-mail files from an e-mail
server. Whenever you connect to a POP3 e-mail server, all messages addressed to your
e-mail address are downloaded into your e-mail application. Once e-mail files are
downloaded, you can view, modify and/or delete the messages without further assistance
from the POP3 server. POP3 can be used with or without SMTP.
As its name implies, SMTP is used to send e-mail. One thing to remember is how
SMTP compares with POP3, which can be used with or without POP3. SMTP uses the
spooled or queued method to deliver e-mail. An e-mail is sent to destination and is
spooled to a hard disk drive. The destination e-mail server regularly checks the spooled
e-mail queue for new e-mails and when it finds new e-mails forwards or sends them to
their destinations.
Most internet-based e-mail services use SMTP to send e-mails along-with wither
POP3 or IMAP4 to receive e-mails. SMTP is generally used to send messages between
mail servers. This is why you need to specify both the POP3 and SMTP server IP
address when you configure your e-mail application.
Telnet stands for Telephone Network, so called because most Telnet sessions
occur over a dial-up network. Telnet is a terminal emulation program often used to
connect a remote computer to a Web server but can connect to any kind of server. Once
the connection is established, you enter and execute commands using a command
prompt. Telnet depends on TCP for transport service and reliable delivery. To start a
Telnet session, using a Telnet client, you must log on to a Telnet server by entering a
valid username and password. When you access another computer and run a program, it
is the processor in the remote computer that executes that program. However, all
versions of Windows include a Telnet client.
This is an application layer protocol, which is the basis for World Wide Web (www)
communications. Web browsers generate HTTP GET request messages containing URLs
and transmit them to web servers, which reply with one or more HTTP response
messages containing the requested files. HTTP traffic is encapsulated using the TCP at
the transport layer and the IP at the network layer. Each HTTP transaction requires a
separate TCP connection. HTTP resides in the application layer of the OSI model, uses
little bandwidth and supports the use of both text and graphics.
HTTPS is the secure version of the HTTP. HTTPS offer secure message-oriented
communications and is designed for use with HTTP. HTTPS allows browsers and servers
sign, authenticate and encrypt an HTTP network packet. HTTPS uses the Secure Socket
Layer (SSL) and Transport Layer Security (TLS) protocols for security.
Networking Essentials – Protocols 38
This is the primary network layer protocol in the TCP/IP suite. IP is the protocol
that is ultimately responsible for end-to-end communications on a TCP/IP internetwork
and it includes functions such as addressing, routing and fragmentation. IP packages
data that it receives from transport layer protocols into data units called datagram by
applying a header containing the information needed to transmit the data to its
destination. The IP addressing system uses 32-bit addresses to uniquely identify the
computers on a network and specifies the address of the destination system as part of
the IP header. IP is also responsible for routing packets to their destinations on other
networks by forwarding them to other routers on the network. When a datagram is too
large to be transmitted over a particular network, IP breaks it into fragments and transmits
each in a separate packet.
IP Security (IPSec):
IPSec is a security protocol that provides authentication and encryption over the
Internet. It operates at the Network layer and secures all packets operating in the upper
OSI layer. It works with IPv4 and IPv6 and has broad industry support. IPSec uses either
Authentication Header (AH) or Encapsulating Security Payload (ESP) to ensure sender
authentication and data encryption. It is most often used to secure VPN on the Internet
using digital certificates sent from the server to authenticate the sender.
L2TP was designed by the Internet Engineering Task Force (IETF) to support
non-TCP/IP protocols using VPNs over the Internet. L2TP combines the best features of
two tunneling protocol: PPTP (Point-to-Point Tunneling Protocol) and L2F (Layer 2
Forwarding). As the name implies, it operates at Layer 2 of the OSI reference model.
L2TP uses packet-switched network connections, making it possible for endpoints to be
located on different nodes. It supports a number of protocols, including IP and AppleTalk.
L2TP is a good protocol to use when you have two non-TCP/IP networks that must have
internet access.
ARP is a network layer protocol that resolves network (IP) addresses into
hardware (MAC) addresses. ARP uses the address resolution cache table built into every
NIC. This table maps IP addresses to MAC addresses on the network. Whenever a node
needs to send a packet, it checks the address resolution cache table to see if the MAC
address information for the destination is there. If so, that destination address will be
used. If not, an ARP broadcast request is issued.
RARP uses a host MAC address to discover its IP address. The host broadcasts
its MAC physical address and a RARP server replies with the host’s IP address.
A server application that can supplies client computers with IP address, other
TCP/IP configuration parameters and executable boot files. As the progenitor to the
DHCP, BOOTP provides the same basic functions, except that it does not allocate IP
addresses from a pool and reclaim them after a specified length of time. Administrators
must supply the IP address and other settings for each computer to be configured by the
BOOTP server.
The FTP is an application layer protocol that allows a user to upload or download
files between hosts. FTP is the simplest way to exchange file between computers on the
Internet and is used on the Web to download files. It’s often compared to HTTP, which
transfers Web pages, and to SMTP, which transfers e-mails.
Networking Essentials – Protocols 40
FTP operates as a protocol when used by applications. However, FTP also can
operate as a program. Users can use FTP to access directories and files and to perform
directory operations such as relocating directories or files. FTP is limited to listening and
manipulating directories, typing file contents and transferring files between computers.
FTP cannot execute remote files as programs. When paired with Telnet, FTP allows for
seamless login to an FTP server for file transfers. FTP also offers authentication security.
TFTP is also similar to FTP in that it facilitates file transfer between computers.
The difference between FTP and TFTP is speed. FTP uses TCP, which is reliable but has
high overhead, and TFTP uses UDP, which uses much less bandwidth, offering greater
speeds but less reliably.
NNTP is an application layer protocol used for the distribution, inquiry, retrieval
and posting of news articles and USENET messages. USENET is a bulletin board system
that contains more than 14,000 forums, called newsgroups. Millions of people around the
world use NNTP to view, access and use their favorite newsgroup forums.
Networking Essentials – Protocols 41
SCP is based upon and is very similar to SFTP. It uses SSH for safe, secure
copying files between local and a remote computer. SCP requires the local computer
running SCP client software.
IGMP is a network layer protocol that is used by an internet computer to report its
multicast group membership to adjacent routers. Multicasting allows an internet computer
to send content to multiple computers. Multicasting is used to send out company
newsletters to an e-mail distribution list and to broadcast high–bandwidth programs using
streaming media to a multicast group membership audience.
LPR is a printer protocol, originally developed for and used on UNIX systems.
Today, it’s the de-facto printing protocol used to print across different NOS platforms. The
LPR client sends a print request to the IP address of the LPD print server. The LPD print
sever queues and prints the file. To enable LPR, LPR must be installed on the client
computer.
Authentication Protocols:
PAP is the weakest authentication protocol that sends the username and
password in clear text (no encryption) over the network to be verified by the RAS. PAP
should only be used as a last resort only if the RAS does not support stronger
authentication protocols. Most all NOS remote servers support PAP.
Kerberos:
Kerberos is more than a strong, secure network authentication protocol. It’s a full-
fledged security system designed to provide strong authentication for client-server
applications by using secret-key cryptography. Created at MIT, Kerberos establishes a
user’s identity as soon as he or she logs on to a network where Kerberos supported. A
unique key (ticket) is issued to each user after the user logs on to the network. All
network messages that the user sends over the network contain this unique key used to
identify the user-sender. The user identification and security credentials contained in the
embedded ticket are used throughout the entire network session. The encryption used by
the Kerberos is freely available. The source code can also be downloaded via the
Internet. The Windows 2000 family, Windows XP, Windows Server 2003 and above,
UNIX, Novell and Linux all support Kerberos.
EAP is a general protocol that provides support for several different authentication
protocols such as EAP-TLS (EAP-Transport Level Security), MS-CHAP, Kerberos,
certificates, public key authentication and smart cards. It is often used by wireless devices
to connect to a RADIUS authentication server. A wireless client requests a WAN
connection from an AP, which requests the identity of the user and transmits the user
identity to an authentication server such as RADIUS. The RADIUS Server asks the AP for
proof of identity, gets it, and sends it back to the Server.
EAP-TLS uses certificates for user authentication such as smart cards. Smart
cards are often used with laptop and notebook PCs to provide remote access
authentication. EAP-TLS provides mutual authentication, negotiation of encryption type
and is the strongest authentication protocol method.
Networking Essentials – Port Number 43
For example, a request from a client to a server on the Internet may request a file
be served from that host's File Transfer Protocol (FTP) server or process. In order to pass
your request to the FTP process in the remote server, the Transmission Control Protocol
(TCP) software layer in your computer identifies the port number of 21 (which by
convention is associated with an FTP request) in the 16-bit port number integer that is
appended to your request. At the server, the TCP layer will read the port number of 21
and forward your request to the FTP program at the server.
The well-known port numbers are the port numbers that are reserved for
assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for
use by the application end points that communicate using the Internet's Transmission
Control Protocol (TCP) or the User Datagram Protocol (UDP). Each kind of application
has a designated (and thus "well-known") port number. For example, a remote job entry
application has the port number of 5; the Hypertext Transfer Protocol (HTTP) application
has the port number of 80; and the Post Office Protocol Version 3 (POP3) application,
commonly used for e-mail delivery, has the port number of 110. When one application
communicates with another application at another host computer on the Internet, it
specifies that application in each data transmission by using its port number.
The port field is 16-bits so the valid range is 0 to 65,535. Port 0 is reserved, but is
a permissible source port value if the sending process does not expect messages in
response. Ports 1 through 1023 are named “well-known” ports requires root access. Ports
1024 through 49,151 are registered ports.
Ports 49,152 through 65,535 are ephemeral ports and are used as temporary
ports primarily by clients when communicating to servers.
On most systems, a well-known port number can only be used by a system (root)
process or by a program run by a privileged user. Before the arrival of ICANN, the well-
known port numbers were administered by the Internet Assigned Numbers Authority
(IANA).
Networking Essentials – IP Address 44
Chapter 8: IP ADDRESS
Addressing is one of the main functions of the Internet Protocol (IP), the one that
is primarily responsible for the protocol suite’s cross-platform interoperability. Every
device on a TCP/IP network must have a unique IP address, which enables any other
device to send traffic directly to it, even devices on remote networks.
An 8-bit binary number can have 256 possible values, which are represented in
decimal form as the numerals 0 to 255. An IP address can never have a value greater
than 255 for one of its octets.
An IP address identifies both a specific TCP/IP device (called a host) and the
network on which the device is located. This is possible because every IP address
consists of two parts: a network identifier and a host identifier. The network identifier
always precedes the host identifier, but the dividing line between the two can be located
anywhere in the 32-bit value. This two-tiered arrangement (a common one on the
Internet) is what makes the administration of IP addresses practical on a large scale.
The Internet is by far the largest TCP/IP network in existence, with millions of
computers located on thousands of networks around the world. Every one of those
computers visible from the Internet has to have a unique IP address. Rather than
undertake the monumental task of creating a central registrar to keep track of each of
these millions of addresses, a body called the Internet Assigned Numbers Authority
(IANA) functions as a registrar for networks, assigning identifiers to networks all over the
world. The administrators of the individual networks are then responsible for assigning
host identifiers to each computer on their networks.
Network Identifiers:
The network identifier indicates the TCP/IP hosts that are located on the same
physical network. All hosts on the same physical network must be assigned the same
network identifier to communicate with each other. If you are running an internetwork that
consists of multiple networks connected by routers, a unique network ID is required for
each network, including each WAN connection (which is a separate network unto itself).
A computer with more than one network interface must have a separate IP
address for each interface. When a TCP/IP network is to be connected to the Internet, it
must use a network address assigned by the IANA. This is to prevent the existence of
duplicate IP addresses in the Internet. Today, virtually all network addresses are
registered with the IANA by ISPs. If a network is not connected to the Internet, it does not
have to use a registered network address.
Networking Essentials – IP Address 45
Host Identifiers:
IP Address Classes:
The IANA assigns network addresses in different classes, based on the number of
hosts that the network has to support. In a classfull system, IP addresses can be grouped
in to one of five different classes: A, B, C, D, and E. Each of the four octets of an IP
address represents either the network portion or the host portion of the address,
depending on the address's class.
Only the first three classes (A, B, and C) are used for addressing actual hosts on
IP networks. Class D addresses are used for multicasting, and Class E addresses are
reserved for experimentation. The following sections explore each of the five classes of
addresses.
Class A Addresses:
If the first bit of the first octet of an IP address is a binary 0, then the address is a
Class A address. With that first bit a 0, the lowest number that can be represented is
00000000 (decimal 0), and the highest number that can be represented is 01111111
(decimal 127). Any address that starts with a value between 0 and 127 in the first octet is
a Class A address. These two numbers, 0 and 127, are reserved and cannot be used as
a network address.
Why are two host addresses reserved for special purposes? Every network
requires a network number, an ID number that is used to refer to the entire range of hosts
when building routing tables. The address that contains all 0s in the host portion is used
as the network number and cannot be used to address an individual node. 46.0.0.0 is a
class A network number. Similarly, every network requires a broadcast address that can
be used to address a message to every host on a network. It is created when you have all
1s in the host portion of the address.
How many Class A addresses are there? If only the first octet is used as network
number, and it contains a value between 0 and 127, then 126 Class A networks exist.
There are only 126 Class A addresses, each with almost 17 million possible host
addresses which makes up about half of the entire IPv4 address space! Under this
system, a mere handful of organizations control half of the Internet's addresses.
Class B Addresses:
Class B addresses start with a binary 10 in the first 2 bits of the first octet.
Therefore, the lowest number that can be represented with a Class B address is
10000000 (decimal 128), and the highest number that can be represented is 10111111
(decimal 191). Any address that starts with a value in the range of 128 to 191 in the first
octet is a Class B address.
There are 16,384 Class B networks. The first octet of a Class B address offers 64
possibilities (128 to 191), and the second octet has 256 (0 to 255). That yields 16,384 (64
* 256) addresses, or 25 percent of the total IP space. Nevertheless, given the popularity
and importance of the Internet, these addresses have run out quickly, which essentially
leaves only Class C addresses available for new growth.
Class C Addresses:
A Class C address begins with binary 110. Therefore, the lowest number that can
be represented is 11000000 (decimal 192), and the highest number that can be
represented is 11011111 (decimal 223). If an IPv4 address contains a number in the
range of 192 to 223 in the first octet, it is a Class C address.
Class C addresses were originally intended to support small networks; the first
three octets of a Class C address represent the network number, and the last octet may
be used for hosts. One octet for hosts yields 256 possibilities; after you subtract the all 0s
network number and all 1s broadcast address; only 254 hosts may be addressed on a
Class C network. Whereas Class A and Class B networks prove impossibly large, Class
C networks can impose too restrictive a limit on hosts.
With 2,097,152 total network addresses containing a mere 254 hosts each, Class
C addresses account for 12.5 percent of the Internet's address space. With Class A and
B exhausted, the remaining Class C addresses are all that is left to be assigned to new
organizations that need IP networks. The figure summarizes the ranges and availability of
three address classes used to address Internet hosts.
Networking Essentials – IP Address 47
Class D Addresses:
A Class D address begins with binary 1110 in the first octet. Therefore, the first
octet range for Class D addresses is 11100000 to 11101111, or 224 to 239. Class D
addresses are not used to address individual hosts. Instead, each Class D address can
be used to represent a group of hosts called a host group, or multicast group.
Class E Addresses:
If the first octet of an IP address begins with 1111, then the address is a Class E
address. Class E addresses are reserved for experimental purposes and should not be
used for addressing hosts or multicast groups.
The properties of above three classes (A, B & C) are shown in the following table.
IP addresses that are registered with the IANA are essential for computers that
are to be visible from the Internet, such as Web, E-Mail servers. However, there are
situations in which computers that access the Internet do not required registered
addresses, such as when you use network address translation (NAT) or a proxy server to
provide users with Internet connectivity. In these cases, you can theoretically use any IP
addresses for your network, as long as you follow the standard addressing rules, such as
having the same network identifier for all the computers on a single LAN. However,
simply choosing network addresses at random can lead to problems. If you happen to
select an address that is already registered to another Internet site, for example, your
users will have problems accessing that site.
To address this problem, the IANA has allocated specific ranges of IP addresses
for use on private networks. These addresses are not registered to any single user, and
therefore will not cause conflicts. The following table lists the private network addresses
for each of the address classes. It is strongly recommended that you use these
addresses when building an unregistered network, whether you are currently connecting
it to the Internet or not.
Networking Essentials – IP Address 48
When a DHCP client boots up, it first looks for a DHCP server in order to obtain
an IP address and subnet mask. If the client is unable to find the information, APIPA
allocates addresses in the private range 169.254.0.1 to 169.254.255.254 that has been
reserved especially for Microsoft. The client also configures itself with a default Class B
subnet mask of 255.255.0.0. Clients verify their address is unique on the LAN using ARP.
When the DHCP server is again able to service requests, clients update their addresses
automatically.
The APIPA service also checks regularly for the presence of a DHCP server. If it
detects a DHCP server on the network, APIPA stops, and the DHCP server replaces the
APIPA networking addresses with dynamically assigned addresses.
APIPA is enabled on all DHCP clients in Microsoft Windows unless the computer's
Registry is modified to disable it. APIPA can be enabled on individual network adapters.
The main problem caused by having identifiers of variable lengths is that there is
no obvious way to determine where the network identifier in an IP address ends and
where the host identifier begins. To resolve this problem, TCP/IP clients always include
what is known as a subnet mask with each address. A subnet mask is a 32-bit binary
value that uses 1s and 0s to designate the network and host identifiers. A 1 indicates a
network identifier bit and a 0 indicates a host identifier bit. As with an IP address, the 32
bits are then converted into dotted decimal notation. For example, if the IP address
192.168.35.221 is paired with a subnet mask of 255.255.255.0, this means that the first
three octets of the IP address (192.168.35) are the network identifier and the last octet
(221) is the host identifier. Because, when you convert the address and mask to binary
form, you see the following:
The presence of the 1 bit in the mask indicates that the corresponding bits in the
IP address are the network identifier bits.
Networking Essentials – Default Gateway 50
A Default Gateway is the node on the computer network that is chosen when the
IP address does not match any other routes in the Routing Table.
In homes, the gateway is usually the ISP-provided device that connects the user
to the Internet, such as a DSL or cable modem. In enterprises, however, the gateway is
the node that routes the traffic from a workstation to another network segment. The
default gateway is commonly used to be the node connecting the internal networks and
the outside network (Internet). In such a situation, the gateway node could act as a proxy
server and a firewall. The gateway is also associated with both a router, which uses
headers and forwarding tables to determine where packets are sent, and a switch, which
provides the actual path for the packet in and out of the gateway. In other words, it is an
entry point and an exit point in a network.
Virtually every operating system with networking capabilities includes support for
the TCP/IP protocols and in most cases; the TCP/IP implementation also includes an
assortment of programs that enable you to gather information about the various protocols
and the network. Traditionally, these utilities run from the command line, although
graphical versions are sometimes supplied. In many cases, a program uses the same
syntax, even on different operating systems. The most common TCP/IP utilities are
discussed below:
Ping:
Ping is the most basic of the TCP/IP utilities. Virtually every TCP/IP
implementation includes a version of it. In all versions of the Windows operating system, it
is called Ping.exe. Ping can tell you if the TCP/IP stack of another system on the network
is functioning normally. The Ping program generates a series of Echo Request messages
using the Internet Control Message Protocol (ICMP) and transmits them to the computer
whose name or IP address you specify on the command line. At its most basic, the syntax
of the Ping.exe program is as follows:
ping target
All TCP/IP computers must respond to any echo request messages they receive
that are addressed to them by generating Echo reply messages and transmitting them
back to the sender. The payload data included in the request message is copied to the
replies before they are transmitted. When the pinging system receives the Echo Reply
messages, it produces a display like the following
C:\>ping 192.168.1.1
In the case of the Windows operating systems Ping implementation, the display
shows the IP address of the computer receiving the Echo Requests, the number of bytes
of data included with each request, the elapsed time between the transmission of each
request and the receipt of each reply, and the value of the Time to Live (TTL) field in the
IP header. A successful use of Ping like this one indicates that the target computer’s
networking hardware is functioning properly, as are the protocols, at least as high as the
network layer of OSI reference model. If the Ping test fails, either one or both of the
computers is experiencing a problem with its networking hardware or software or some
device on the network is blocking ICMP traffic.
Tracert.exe:
Tracert.exe is a variant of the ping program that displays the path that packets
take to their destination. Because of the nature of IP routing, paths through an
internetwork can change from minute to minute, and Tracert.exe displays a list of the
routers that are currently forwarding packets to a particular destination.
Tracert.exe uses ICMP Echo request and Echo reply messages just like ping, but
it modifies the messages by changing the value of the TTL field in the IP header of each
message. The TTL field is designed to prevent packets from getting caught in router
loops that keep them circulating endlessly around the network. The computer generating
the packet normally sets a relatively high value for the TTL field; on Windows systems,
the default value if 128. Each router that processes the packet reduces the TTL value by
one. If the value reaches zero, the last router discards the packet and transmits an ICMP
error message back to the original sender.
When you run Tracert.exe with the name or IP address of a target computer, the
program generates its first set of Echo request messages with TTL values of 1. When the
messages arrive at the first router on their path, the router decrements their TTL values to
0, discards the packets and reports the errors to the sender. The ICMP error messages
contain the router’s address, which the Tracert.exe program displays as the first hop in
the path to the destination. Tracert’s second set of Echo Request messages use a TTL
value of 2, causing the second router on the path to discard the packets and generate
error messages. The Echo Request messages in the third set have a TTL value of 3, and
so on. Each set of packets travels one hop farther than the previous set before causing a
router to return error messages to the source. The list of routers displayed by the program
as the path to the destination is the result of these error messages. The following is an
example of the Tracert.exe display
C:\>tracert www.google.com
1 2 ms 1 ms 1 ms 192.168.1.1
2 69 ms 63 ms 61 ms 10.213.102.110
3 62 ms 60 ms 57 ms 10.213.102.74
4 64 ms 64 ms 70 ms 117.227.128.2
5 71 ms 59 ms 60 ms 117.210.254.17
6 74 ms 67 ms 55 ms 117.216.206.229
7 * * * Request timed out.
8 76 ms 77 ms 225 ms 117.216.207.208
9 58 ms 67 ms 70 ms 117.216.207.209
10 * * * Request timed out.
11 * * * Request timed out.
Networking Essentials – TCP/IP Tools 53
Trace complete.
In this example, each of the entries contains the elapsed times between the
transmission and reception of three sets of Echo Request and Echo Reply packets. In this
trace you can clearly see the point at which the packets begin travelling across the Globe.
This is the time to takes the packets to travel the thousands of miles across the Globe.
tracert.exe target
Pathping.exe:
pathping target
The following is a typical Pathping.exe report. The compiled statics that follow the
hop list indicate packet loss at each individual router.
C:\>pathping www.google.com
0 PC [192.168.1.2]
1 192.168.1.1
2 10.213.102.110
3 10.213.102.74
4 117.227.128.2
5 117.210.254.17
6 117.216.206.229
7 * * *
Networking Essentials – TCP/IP Tools 54
Trace complete.
When you run Pathping.exe, you first see the result for the route as the program
tests it for problems. This is the same path that is shown by the Tracert.exe program.
Pathping.exe then displays a busy message for the next 150 seconds (this time varies
according to the hop count). During this time, Pathping.exe gathers information from all
the routers previously listed and from the links between them. At the end of this period the
program displays the test results.
The two rightmost columns – This Node/Link Lost/sent=Pct and Address – contain
the most useful information. All links are working normally.
The loss rates displayed for the links (marked as a | in the rightmost column)
indicate losses of packets being forwarded along the path. This loss indicates link
congestion. The loss rates displayed for routers (indicated by their IP addresses in the
rightmost column) indicate that those routers might be overloaded. These congested
routers might also be a factor in end-to-end problems, especially if packets are forwarded
by software routers.
Ipconfig.exe:
The Windows 7 TCP/IP client includes a program called Ipconfig.exe that displays
the current TCP/IP configuration for the computer’s network interface adapters.
When you run Ipconfig.exe at the Windows 7 command line, the following will be
displayed:
C:\>ipconfig
Windows IP Configuration
Running the program with /all parameter displays a full list of configuration data.
This utility is often associated with DHCP because there is no easier way on a Windows
system to see what IP address and other parameters the DHCP server has assigned to
your computer. However, these programs also enable you to manually release IP address
obtained through DHCP and renew existing leases. By running IPconfig.exe with the
/release and /renew command-line parameters, you can release or renew the IP address
assignment of one of the network interfaces in the computer or for all the interfaces at
once.
ARP.exe:
Windows systems include a command-line utility called Arp.exe that you can use
to manipulate the contents of the ARP cache. For example, you can use Arp.exe to add
the hardware addresses of computers you contact frequently to the cache, thus saving
time and network traffic during the connection process. Address that you add to the cache
manually are static, meaning that they are not deleted after the usually expiration period.
The cache is stored in memory only, however, so it is erased when you reboot the
computer. If you want to preload the cache whenever you boot your system, you can
create a batch file containing Arp.exe commands and execute it from the Windows
Startup group.
arp.exe –a
Networking Essentials – TCP/IP Tools 56
C:\>arp -a
Netstat.exe:
netstat.exe –a
C:\>netstat -a
Active Connections
The interface statistics by command netstat –e, display looks like this:
C:\>netstat -e
Interface Statistics
Received Sent
Nbtstat.exe:
nbtstat.exe
Unlike the other utilities, the command-line parameters for Nbtstat.exe are case-
sensitive and should be displayed as follows:
C:\>nbtstat -n
No names in cache
No names in cache
No names in cache
Networking Essentials – TCP/IP Tools 58
Telnet.exe:
Telnet was originally designed for use on UNIX systems, and it is still an
extremely important tool for UNIX network administrators. The various Windows operating
systems all include a Telnet client, but only Windows 2000 and later versions have a
Telnet server. The syntax for connecting to a Telnet server is as follows:
telnet target
Telnet uses a text-based command and response syntax that was the model for
several other important application layer protocols, including File Transfer Protocol (FTP),
the Hypertext Transfer Protocol (HTTP) and the Simple Mail transfer Protocol (SMTP).
Because all information transmitted during a Telnet session is in clear text, the protocol
presents a security hazard when used on unsecured networks.
Ftp.exe:
The File Transfer Protocol (FTP) is similar to Telnet, but it is designed for
performing file transfers instead of executing remote commands. FTP includes basic file
management commands that can create and remove directories, rename & delete files
and manage access permissions. All Windows computers have a character-based FTP
client, but FTP server capabilities are built into the Internet Information Services (IIS)
application that is included with the Windows 2000 server and above products. Many
other FTP clients are also available that offer graphical interfaces and other usability
features. Generally speaking, Windows computers don’t need FTP for communications
on a LAN because they can access the shared files on other computers directly.
Networking Essentials – Networking Devices 59
Most devices are connected to each other by medium such as a cable. The device
has a port where it connects to a cable. A port has physical as well as logical
characteristics the physical part being a plug that the cable’s plug can fit into and special
circuitry that handles the data communication, while the logical part is a software entity.
Repeaters:
A repeater is a device that has just two ports. It operates at layer 1 that is physical
layer of the OSI model and TCP/IP model. It simply acts as transceivers that receives,
amplifies and retransmits information. Signals that carry information within a network can
travel a fixed distance before attenuation endangers the integrity of the data. A repeater
receives a signal and before it becomes too weak or corrupted, it regenerates the original
bit pattern. The repeater then sends the refreshed signal. Repeaters are unintelligent
devices connected between two LAN segments of the same type.
Repeaters are analog devices that connect two cable segments. Signal appearing
is amplified. Repeaters do not understand frames, packets or headers. Understand only
Volts. Repeaters are used to increase the number of nodes.
Repeaters may introduce side effects where they add cost to the circuit. Also, they
introduce distortion as a result of limited bandwidth, additional noise and also sometimes
they may amplify some other undesirable noise to the signal. Because of these reasons
there is a limit on the use of number of repeaters. Designers attempt to minimize the use
of repeaters to the greatest extent possible.
Repeater
Regenerated Corrupted
Signal Signal
Right-to-Left transmission
Uses of Repeaters:
Repeaters are used to extend LAN beyond its usual distance limitation.
A repeater actually does not connect two LANs. It connects two segments of the
same LAN; i.e., the segments connected are still part of one single LAN. A repeater is
not a device that can connect two LANs of different protocols, as it cannot understand
any frames or packets etc. That is here it is used merely to extend the length of a
LAN.
Hubs:
It is a thin wire segment with fixed taps. Each tap is provided with reliable
connector (RJ45). Hubs are the simplest network devices and their simplicity is reflected
in their low cost. Small hubs with four or five ports are often referred to as workgroup
hubs. With the requisite cables, they provide everything needed to create a small
network. Hubs with more ports are available for networks that require greater capacity.
Computers connect to a hub via a length of twisted-pair cabling. In addition to ports for
connecting computers, even a very inexpensive hub generally has a port designated as
an uplink port that enables the hub to be connected to another hub to create larger
networks.
The basic function of a hub is to take data from one of the connected devices and
forward it to all the other ports on the hub. This method of operation is very inefficient
because, in most cases, the data is intended for only one of the connected devices. The
following figure is shown how a hub works.
Uplink
Normal Port
Ports HUB
Power
Data is forwarded
Data sent by one node to all connected
nodes
Working of a Hub
Salient Features:
(i) Frames arriving on any of the lines are transmitted in the others.
(ii) All lines coming into a Hub must operate at a same speed.
(iii) Hubs do not amplify the incoming signal.
(iv) Hubs do not understand frames, packets or headers.
Networking Essentials – Networking Devices 62
Classifications:
Passive Hubs: These are rare do not need power because they don’t regenerate
the signal.
Active Hubs: These are regenerating a signal before forwarding it to all the ports
on the device. In order to do this, the hub needs a power supply; small workgroup
hubs normally use an external power adapter, but on larger units the power supply
is built in.
Due to the inefficiencies of the hub system and the constantly increasing demand
for more bandwidth, hubs are slowly replaced with switches.
USB Hubs:
Switches:
A switch is like a hub in that it has multiple ports, but internally it has a table listing
which systems are found on each port and shuttles the packets where they need to go.
Unlike a hub, signals are transmitted only to the port where they need to go, rather than
to all ports. The table needs to be simple enough that there is only one possible path for
any given packet. As a general rule, switches will be faster than hubs because each port
doesn’t have to carry all of the traffic. They also tend to be faster than bridges and more
expensive than either hubs or bridges.
Switches are fast multi-port bridges that provide an economical way to resolve
network congestion. A multi-port network switch in a packet switching network is coupled
to stations on the network through its multiple ports. Network switch I/O ports often
include buffer memories for storing packets. Both hubs and switches are used in Ethernet
networks.
On the surface, a switch looks much like a hub. Switches can do much more and
offer many more advantages than hubs. As with a hub, computers connect to a switch via
a length of twisted-pair cable. Multiple switches can be used, to create larger networks.
Despite their similarity in appearance and their identical physical connections to
computers, switches offer significant operational advantages over hubs. As discussed
earlier on a hub, data is forwarded to all ports, regardless of whether the data is intended
for the system connected to the port. This arrangement is very inefficient; however, it
requires very little intelligence on the part of the hub, which is why hubs are inexpensive.
Rather than forwarding data to all the connected ports, a switch forwards data
only to the port on which the destination system is connected. It looks at the Media
Access Control (MAC) addresses of the devices connected to it to determine the correct
port. A Mac address is a unique number that is programmed into every NIC. By
forwarding data only to the system to which the data is addressed, the switch decreases
the amount of traffic on each network link dramatically. In effect, the switch literally
channels data between the ports. The following figure illustrates how a switch works.
Switch
Data is forwarded
only to the
Data sent by one node
destination node
Working of a Switch
Ethernet networking, we have seen that collisions occur on the network when two
devices attempt to transmit at the same time. Such collisions cause the performance of
the network to degrade. By channeling data only to the connections that should receive it,
switches reduce the number of collisions that occur on the network. As a result, switches
provide significant performance improvements over hubs.
Switches can also further improve performance over the performance of hubs by
using a mechanism called full-duplex. On a standard network connection, the
communication between the system and the switch or hub is said to be half-duplex, in a
half-duplex connection, data can be either sent or received on the wire, but not at the
same time. Because switches manage the data flow on the connection, a switch can
operate in full-duplex mode – it can send and receive data on the connection at the same
time. In a full-duplex connection, the maximum bandwidth is double that for a half-duplex
connection – for example, 10Mbps become 20Mbps and 100Mbps becomes 200Mbps.
As you can imagine, the difference in performance between a 100Mbps network
connection and a 200Mbps connection is considerable.
Networking Essentials – Networking Devices 64
Switching Methods:
It is important to know how to work with hubs and switches, sometimes in the
same environment.
Hubs and switches have two types of ports: medium dependent interface (MDI)
and medium dependent interface crossed (MDI-X). The two types of ports differ in their
wiring. As the X implies, an MDI-X port’s wiring is crossed; this is because the transmit
wire from the connected device must be wired to the receive line on the other. Rather
than use a crossover cable we also use the simpler straight-through cable to connect
systems to the switch or hub.
On most hubs and switches, a special port called the uplink port allows you to
connect two hubs and switches together to create larger networks. The connection for the
port is not crossed; a straight-through network cable is used to connect the two hubs or
switches together.
Rather than having a dedicated uplink port, some switches and hubs have a port
that you can change between MDI and MDI-X by pushing a button. While using the port
to connect a computer, make sure it is set to MDI-X and while connecting to another hub
or switch, make sure it is set to MDI. In the absence of an uplink port, we can connect two
hubs or switches together by using MDI-X ports, but must use a crossover cable to do so.
Two types of cables are used to connect devices to hubs and switches; crossover
cables and straight-through cables. The difference between the two types is that in a
crossover cable, two of the wires are crossed; in a straight-through cable, all the wires run
straight through.
Specifically, in a crossover cable, Wires 1 & 3 and Wires 2 & 6 are crossed: Wire
1 at one end becomes Wire 3 at the other end; Wire 2 at one end becomes Wire 6 at the
other end and vice versa in both cases.
Networking Essentials – Networking Devices 65
Both hubs and switches come in managed and unmanaged versions. A managed
device has an interface through which it can be configured to perform certain special
functions. For example, it may allow for port mirroring, which can be useful for network
monitoring or a low port to be specified to operate at a certain speed. Because of the
extra functionality of a managed device and because of the additional components
required to achieve it, managed devices are considerably more expensive than
unmanaged devices. When you’re specifying switches or hubs, consider the need for
manageability carefully. If a switch will be used to connect servers to the network, a
managed device might make the most sense – the extra functionality might come in
handy. On parts of the network that accommodate client computers, non-managed
devices generally suffice.
Bridges:
Like a repeater, a bridge has just two ports and is used to connect two groups of
computers. The difference is that a bridge has a list of which computers are on each side
and it only passes along packets that need to go to the other side. The cuts down on
network activity; where the two groups have heavy traffic amongst themselves but not too
much with each other.
Bridges are intelligent devices that operate at layer 2 and are used to interconnect
LANs of the same type. Packets received on one port may be retransmitted or forwarded
on another port.
A bridge unlike repeaters will not start retransmission until it has received the
complete packet. As a consequence, stations on either side of a bridge may be
transmitting simultaneously without causing collisions. A bridge, like a repeater, does not
modify the contents of a packet in any way; and a simple bridge retransmits every packet
whether or not this is necessary.
Unlike repeaters, bridges may provide filtering and forwarding services across the
link. A learning bridge examines the source field of every packet it seen on each port and
builds up a picture of which addresses are connected to which ports; therefore, a packet
will not be transmitted to a network segment that has no need to see the information.
Filtering means that if the destination of a packet is the same side of the bridge as its
origin, the bridge ignores it but if the address is on the other segment, the bridge lets it
across or forwards it.
If a bridge sees a packet addressed to a destination that is not in its address table,
the packet is retransmitted on every port except the one it was received on. Bridge also
age address table entries; if a given address has not been communicating in a specified
period of time, then the address is delayed from the address table. The learning bridge
concept works equally well with several interconnected networks, provided that there are
no loops in the system.
Bridges are networking devices that divide up networks. In the days before routers
and switches became popular, bridges were used to divide up networks and thus reduce
the amount of traffic on each network. Network switches have largely replaced them. A
bridge functions by blocking or forwarding data, based on the destination MAC address
written into each frame of data. If the bridge believes the destination address is on a
network other than that from which the data was received, it can forward the data to the
other networks to which it is connected. If the address is not on the other side of the
bridge, the data is blocked from passing. Bridges “learn” the MAC addresses of devices
Networking Essentials – Networking Devices 66
on connected networks by “listening” to network traffic and recording the network from
which the traffic originates. The following figure shows a representation of a bridge.
Bridge
Working of a Bridge
Types of Bridges:
(i) Transparent Bridge: A transparent bridge is invisible to the other devices on the
network. Transparent bridges only perform the function of blocking or forwarding
data based on the MAC address; the devices on the network are oblivious to
these bridges’ existence. Transparent bridges are by far the most popular types of
bridges.
(ii) Translational Bridge: A translational bridge can convert from one networking
system to another. As you might have guesses, it translates the data it receives.
Translational bridges are useful for connecting two different networks, such as
Ethernet and Token Ring networks. Depending on the direction of travel, a
translational bridge can add or remove information and fields from the frame as
needed.
(iii) Source-route Bridge: Source-route bridges were designed by IBM for use on
Token Ring networks. The source-route bridge derives its name from the fact that
the entire route of the frame is embedded within the frame. This allows the bridge
to make specific decisions about how the frame should be forwarded through the
network. The diminishing popularity of Token Ring makes the chances that you’ll
work with a source-route bridge very slim.
Bridges use a method known as the spanning tree algorithm to construct a non-
looping topology by deciding not use certain links in the network. The links are still there
and may come into use if the network is re-configured.
Networking Essentials – Networking Devices 67
Routers:
A router is an intelligent packet sorter, which can look at the ultimate destination
for a packet and analyze the best way to get it there. Where the devices above supply a
physical path for the packets, a router also provides the information on how to get from
one place to another and this information is added to the packet header. This makes it a
much more powerful device for use with complex networks, including the Internet. In fact,
the Internet itself could be described as a network of routers.
A router is often a full-fledged computer system with multiple network cards and
its own operating system. The types of tables and routing protocols used by different
routers are beyond the scope of this unit and will be discussed in advance computer
networks. At this point it is necessary to remember that any router accessing the Internet
must use at least TCP/IP.
Routers operate on Layer 3, the network layer that routes data to different
networks. Routing is important when multiple segments are connected in such a way that
there is more than one possible path between one station and another on the network. A
router determines the next network point to which a packet should be forwarded toward
its destination. It is located at any juncture of networks and it decides which way to send
each information packet based on its current understanding of the state of the networks to
which it is connected. A router creates or maintains a table of the available routes and
their conditions and uses the information along with distance and cost algorithms to
determine the best route for a given packet. Typically, a packet may travel through a
number of network points with routers before arriving at its destination.
Router performance is measured using its packet forwarding rate, which is the
number of packets transferred per second from input to output port. This rate depends on
packet size and how many protocols are being supported. The larger the packet, the
greater the router throughput because each forwarded packet requires reading the packet
header, which consumes time. Routers have protocol intelligence, which enables them to
handle multiple protocols. Many organizations continue to rely upon traditional multi-
protocol routers to provide the foundation for their networking infrastructure. In that case,
the router, is the collapse point for the entire enterprise as the total network response
time depends upon how the router manages all the WAN and LAN connectivity.
WAN
Port
WAN Router
LAN
Unlike bridges and switches, which use the hardware-configured MAC address to
determine the destination of the data, routers use the software configured network
address to make decisions. This approach makes routers more functional than bridges or
switches and it also makes them more complex because they have to work harder to
determine the information. The following figure illustrates the working of a router.
Workstation
1
Server
Workstation
Router Router
Router
1 Data is sent to the Router
2
2 The router determines the
destination address and
forwards it to the next step
in the journey
The basic requirement for a router is that it must have at least two network
interfaces. If they are LAN interfaces, then the router can manage and route the
information between two LAN segments. More commonly, a router is used to provide
connectivity across wide area network (WAN) links.
A router can be either a dedicated hardware device or a server system that has at
least two network interfaces installed in it. All common network operating systems offer
the capability to act as routers as part of their functionality. Dedicated hardware routers
offer greater performance levels than server-based solutions.
The capabilities of a router depend on the features it has installed. A basic router
may route only one protocol between two network interfaces of the same type. A more
advanced router may act as a gateway between two networks and to protocols. In
addition, it may offer firewall services, security and authentication or remote access
functionality such as virtual private networking.
Gateways:
The key feature of a gateway is that it converts the format of the data. A gateway
operates at/above Layer 4. It spans all seven layers of the OSI Model. It is designed to
link incompatible networks. A gateway typically handles three different protocols: source,
destination and transmission path protocols. A gateway is a network point that acts as an
entrance to another network, and vice-versa. Gateways are most commonly used to
transfer data between private networks and the Internet.
Networking Essentials – Networking Devices 70
Gateways, which are networking devices, and default gateways working with
TCP/IP, perform very different roles on a network. The function of a gateway is very
specific. No matter what their use, gateways slow the flow of data and can therefore
potentially become bottlenecks. The conversion from one data format to another takes
time and so the flow of data through a gateway is always slower than the flow of data
without one.
Other Devices
Modem:
Proxy Server:
This is a system that sits in between a workstation and the server that workstation
is accessing. The most common example is for Internet access, where the browser on a
workstation is addressing a server somewhere out on the web, but is actually talking to
the local proxy server.
There are a couple of advantages to this arrangement. For one, the proxy server
will cache recently accessed web pages and the workstation can get them faster from the
proxy’s cache than it could from a remote site. This speed up Internet access for
everyone. The proxy server can also be used to control Internet access, which is a major
issue at some companies. It is a very convenient place to put a firewall too and it is not
unusual to find the gateway, firewall and proxy server functions all combined in the same
box, controlling traffic both into and out of the local area network.
Another advantage is that the local network only requires one IP address from the
Internet Service Provider and that’s used by the proxy server while all of the workstations
that connect to it use one of the 3 ranges of ‘private’ IP addresses. Given the popularity of
the Internet, it is likely that without proxy servers we would be running short of IP
addresses already.
Wireless network devices gain access to the network via WAPs. WAPs are
typically deployed in a small businesses or home offices; they can operate completely
independently of a normal network. When a WAP connects to a wired network, it is often
referred to as a wired access point because it joins the wireless portion of the network
with the wired portion. WAPs process signals and are required power, which is supplied
through an external AC power adapter.
Networking Essentials – Transmission Medium 71
Guided media provides a guided (by a solid medium) path for propagation of
signals such as twisted pairs, coaxial cables, optical fibers etc. Unguided media employ
an antenna for transmitting through air, vacuum or water. This form of transmission is
referred to as wireless transmission. For example, Broadcast radio, satellite etc.
• Bandwidth: Greater the bandwidth of the signal, the higher data rate can be
achieved.
• Transmission impairment: These limit the distance. Twisted pair suffers more
impairment than coaxial cable which in turn suffers more than optical fiber.
• Number of receivers: A point to point links is used or shared link is used with
multiple attachments are used. In shared link each attachment introduces
some attenuation and distortion on the line limiting the distance and/or data
rate.
• For guided the transmission capacity depends on data rate or bandwidth and
depends critically on the distance (whether medium is point-to-point or
multipoint).
Networking Essentials – Transmission Medium 72
Twisted Pair:
They are least expensive and most widely used. They are easier to work with but
limited in terms of data rate and distance. In consists of two insulated cupper wires
arranged in regular spiral pattern. Wire pair acts like a communication link. Usually,
numbers of these pairs are bundled together in a protective sheath in to a cable. Twisting
tends to decrease the crosstalk. On long distance links, the twist length typically varies
from 5-19 cm. The thickness of wires may be 0.4 – 0.9mm. Over long distance, cables
may contain hundreds of pairs. It is most common for both analog and digital signals.
Commonly used in telephone network and is the workhouse for communication within
buildings, for example, individual residential telephone or in an office building.
These were designed to support voice traffic using analog signaling. However, it
can handle digital data traffic at modest data rates. It is also commonly used for digital
signaling with the use of a digital switch or digital PBX with data rate of 64kbps
commonly. It is for LAN supporting PCs’ with commonly 10/100/1000 Mbps. For long
distance twisted pair with 4Mbps or more is used.
Transmission Characteristics:
Twisted pair can be used for both analog and digital transmission. For analog
signals, amplifiers are required about every 5-6km. For digital transmission (analog and
digital signals), repeaters are required every 2-3kms. Other impairments are also severe
for twisted pair. It is susceptible to interference and noise. Impulse noise can also intrude
easily.
Unshielded Twisted Pair (UTP) Cable which is typically 1mm thick with a minimum
number of twists per foot. Twisting reduces electrical interference. They run several
kilometers without amplification, repeaters are needed. They are used for transmitting
either analog or digital signals. There are different categories of UTP’s that are used they
are:
CAT 5 Cable: They are similar to CAT3, but are with more twists/
cm. They have less crosstalk and provide better quality over long
distance. They are suitable for high-speed communication.
Bandwidth up to 100 MHz signals can be handled. It supports data
rate up to 100 Mbps.
CAT 6 Cable: They are more improved version than CAT 5. They are
suitable for higher bandwidth up to 250 MHz. It supports data rate up to
10 Gbps.
Networking Essentials – Transmission Medium 73
CAT 7 Cable: They are still more improved version than CAT 6. They
are suitable for higher bandwidth of up to 600 MHz. It supports data
rate up to 10 Gbps.
Coaxial Cable:
Transmission Characteristics:
Coaxial cable is used to transmit both analog and digital signals. Coaxial cable
has frequency characteristics that are superior to those of twisted pair and can hence be
used effectively at higher frequencies and data rates. Because of its shielded, concentric
construction, coaxial cable is much less susceptible to interference and crosstalk than
twisted pair.
The principal constrains on performance are attenuation, thermal noise and inter-
modulation noise. The latter is present only when several channels (FDM) or frequency
bands are in use on the cable. For long-distance transmission of analog signals,
amplifiers are needed every few kilometers, with closer spacing, required if higher
frequencies are used. The usable spectrum for analog signaling extended to about 500
MHz. For digital signaling, repeaters are needed every kilometer or so, with closer
spacing needed for higher data rates.
Networking Essentials – Transmission Medium 74
Coaxial cable has better shielding than twisted pairs and can span longer distance
at higher speeds. There are two types of coaxial cable that are used in LAN.
Thick coax: These are used for Ethernets but are difficult to work with and are
expensive. It has greater degree of noise immunity and is strong. It requires
vampire tap and a drop cable to connect to the network.
Thin coax: These are easier to work and less expensive. It carries signal over
shorter distance and is preferred over thick coax as it needs simple BNC
connector. They are flexible, cheaper and idle for office cabling.
Optical Fiber:
An optical fiber is a thin, flexible medium capable of guiding an optical ray. Total
internal reflection is the basic principle on which the transmission of data takes place
through fibers. If the angle of incidence is sufficiently large, then the light in the fiber will
reflect repeatedly in the interface between the materials as shown in the following figure.
The fiber need not be straight but can conduct light even when bent.
Total internal
reflection
Light
Source Total internal reflection
An optical fiber has a cylindrical shape and consists of three concentric sections;
the core, the cladding and the jacket. The core is the inner most sections and consists of
one or more very thin strands, or fibers, made of glass or plastic and is shown in the
following figure. The core has a diameter in the range of 8 to 100μm. Each fiber is
surrounded by its own cladding, a glass or plastic coating that has optical properties
different from those of the core. Various glasses and plastics can be used to make optical
fibers. The lowest losses have been obtained using fibers of ultra-pure fused silica. Ultra
pure fiber is difficult to manufacture; higher loss multi component glass fibers are more
economical and still provide good performance. Plastic fiber is even less costly and can
be used for short-haul links, for which moderately high losses are acceptable.
(a) Side view of a single fiber (b) View of sheath with three fibers
Networking Essentials – Transmission Medium 75
The interface between the core and cladding acts as a reflector to confine light
that would otherwise escape the core. The outermost layer, surrounding one or a bundle
of cladded fibers, is the jacket. The jacket is composed of plastic and other material
layered to protect against moisture, abrasion, crushing and other environmental dangers.
One of the most significant technological breakthroughs in data transmission has been
the development of practical fiber optic communication systems. Optical fiber already
enjoys considerable use in long-distance telecommunications, and its use in military
applications is growing. The continuing improvements in performance and decline in
prices, together with the inherent advantages of optical fiber, have made it increasingly
attractive for LAN.
Transmission Characteristics:
Optical fiber transmits a signal encoded beam of light by means of total internal
reflection. Total internal reflection can occur in any transparent medium that has higher
index of refraction than the surrounding medium. In effect, the optical fiber acts as a
waveguide for frequencies in the range of about 1014 to 1015 Hz; this covers portions of
infrared and visible spectra.
Light from a source enters the cylindrical glass or plastic core. Rays at shallow
angles are reflected and propagated along the fiber; other rays are absorbed by the
surrounding material. This form of propagation is called step-index multimode referring to
the variety of angles that will reflect.
Finally, by varying the index of refraction of the core, a third type of transmission,
known a graded index multimode, is possible. This type is intermediate between the other
two in characteristics. The higher refractive index at the center makes the light rays
moving down the axis advance more slowly than those curves helically because of the
graded index, reducing its travel distance. The shortened path and higher speed allow
light at the periphery to arrive at a receiver at about the same time as the straight rays in
the core axis. Graded index fibers are often used in LANs.
Applications:
The advantages of optical fiber over twisted pair and coaxial cable become more
compelling as the demand for all types of information (voice, data, image and video)
increases. Five basic categories of applications have become important for optical fiber;
they are Long-haul trunks, Metropolitan trunks, Rural exchange trunks, Subscriber loops
and Local Area Networks.
Networking Essentials – Transmission Medium 76
• Metropolitan trunking: These circuits have an average length of 12km and may
have as many as 1,00,000 voice channels in a trunk group. Most facilities are
installed in underground conduits and are repeater-less, joining telephone
exchange in a metropolitan or city area. Included in this category are routes
that link long haul microwave facilities that terminate at a city perimeter to the
main telephone exchange building downtown.
• Rural exchange trunks: These have circuit lengths ranging from 40 to 60km
and link towns and villages. Most of these systems have fewer than 5000
voice channels. The technology used in these applications competes with
microwave facilities.
• Subscriber loop circuits: These are fibers that run directly from the central
exchange to a subscriber. These facilities are beginning to displace twisted
pair and coaxial cable links as the telephone networks evolve into full-service
networks capable of handling not only voice and data, but also image and
video.
Standards have been developed and products introduced for optical fiber
networks that have a total capacity of 100Mbps to 1Gbps. Recent achievable bandwidth
is in excess of 50,000Gbps i.e., 50Tbps but current limit is 10Gbps. It can support
hundreds or even thousands of stations in a large office building of a complex of
buildings.
The following characteristics distinguish optical fiber from twisted pair or coaxial
cable.
Greater capacity: The potential bandwidth and hence data rate of optical fiber
is immense, data rates of hundreds of Gbps over tens of kilometers have been
demonstrated. Compare this to the practical maximum of hundreds of Mbps
over about 1km for coaxial cable and just a few Mbps over 1km or up to
100Mbps to 1Gbps over a few tens of meters for twisted pair.
Smaller size and lighter weight: Optical fibers are considerably thinner than
coaxial cable or bundled twisted-pair cable at least an order of magnitude
thinner for comparable information transmission capacity. For cramped
conduits in buildings and underground along public rights-of-way, the
advantage of small size is considerable. The corresponding reduction in
weight reduces structural support requirements.
Lower attenuation: Attenuation is significantly lower for optical fiber than for
coaxial cable or twisted pair and is constant over a wide range.
Networking Essentials – Transmission Medium 77
Greater repeater spacing: Fewer repeaters mean lower cost and fewer
sources of error. The performance of optical fiber systems from this point of
view has been steadily improving. Repeater spacing in the tens of kilometers
for optical fiber is common and repeater spacing of hundreds of kilometers
have been demonstrated. Coaxial and Twisted Pair systems generally have
repeaters every few kilometers.
Wireless Transmission
(i) Frequencies in the range of about 2GHz (1GHz = 109Hz) to 40GHz are
referred to as microwave frequencies.
We will refer to this range as the broadcast radio range. Microwave covers
part of UHF and the entire SHF band, and broadcast radio covers the VHF
and part of the UHF band.
(iii) Another important frequency range, for local applications, is the infrared
portion of the spectrum. This cover, roughly from 3 x 1011Hz to 2 x 1014Hz.
Radio Transmission:
Radio Link:
At regular intervals, the signal is received and forwarded to the next link station.
The link station may be either active or passive. An active link station amplifies or
regenerates the signal. A passive link station generally consists of two directly
interconnected parabolic antennas without any amplifying electronics between them.
Each radio link needs two radio channels: one for each direction. A few MHz spacing is
needed between the transmitter frequency and the receiver frequency. The same
parabolic antenna and waveguide are used for both directions.
Microwave Transmission:
Properties:
Uses:
RJ-11:
RJ-45:
F-Type:
ST:
SC:
MT-RJ:
USB:
Network cables are used to connect and transfer data & information between
computers, switches, routers etc. These cables are essentially the carrier or media
through which data flows.
In local area networks; typically, office environments, retail and commercial sites;
the most commonly used types of communication cables are “twisted pair cable”. Twisted
pair cable is used in many ethernet networks, comprising of four pairs of thin wires or
conductors. These ‘wires’ or ‘conductors’ are contained inside of the insulation or outer
sheath of the cable. Each pair is twisted into several additional twists. These twists are
designed to prevent interference from other devices and indeed from other adjacent
cables.
For cabling, we need UTP (Unshielded Twisted Pair) cable of at least Category 5
(Cat 5). Cat 5 is required for basic 10/100 Mbps functionality, we will need Cat 5e for
gigabit (1000 Mbps/1 Gbps) operation and Cat 6 or higher gives us a measure of future
proofing. Bulk cable comes in many types; there are 2 basic categories, solid and braided
cable. Braided cable tends to work better in patch applications for desktop use. It is more
flexible than solid cable and easier to work with, but really meant for shorter lengths. Solid
cable is meant for longer runs in a fixed position. Plenum rated cable must be used
whenever the cable travels through an air circulation space, e.g., above a false ceiling or
below a raised floor.
Inside the cable, there are 8 color coded wires. These wires are twisted into 4
pairs of wires; each pair has a common color theme. One wire in the pair being a solid or
primarily solid colored wire and the other being a primarily white wire with a colored stripe
(Sometimes cables won't have any color on the striped wire, the only way to tell which
wire it is twisted around). Examples of the naming schemes used are: Orange for the
solid-colored wire and Orange/White for the striped cable. The twists are extremely
important. They are there to counteract noise and interference. It is important to wire
according to a standard to get proper performance from the cable. The TIA/EIA-568
specifies two wiring standards for an 8-position modular connector such as RJ45. The
two wiring standards, T568A and T568B vary only in the arrangement of the colored
pairs. It might be determined by the need to match existing wiring, jacks or personal
preference, but it should maintain consistency.
Networking Essentials – Cabling & Crimping 82
The RJ45 connector is an 8-position modular connector that looks like a large
phone plug. There are a couple variations available. The primary variation you need to
pay attention to is whether the connector is intended for braided or solid wire. For
braided/stranded wires, the connector has sharp pointed contacts that actually pierce the
wire. For solid wires, the connector has pins which cut through the insulation and make
contact with the wire by grasping it from both sides. The connector is the weak point in an
Ethernet cable, choosing the wrong one will often cause grief later.
RJ45 jacks come in a variety styles intended for several different mounting
options. The choice is one of requirements and preference. RJ45 jacks are designed to
work only with solid cable. Most jacks come labeled with color codes for either T568A or
T568B or both.
There are two basic cable pin outs. A straight through cable; most commonly used
to connect a host to a client, i.e., computers, printers and other network client devices to a
hub or switch. A cross over cable; most commonly used to connects to hosts directly, i.e.,
a computer directly to another computer, a switch directly to another switch or a router
directly to another router. It is to be noted that, while in the past when connecting two
devices directly a crossover cable was required. Now-a-days, most devices have auto-
sensing technology that detects the cable & device and crosses pairs when needed.
Besides above two cable pin outs, there is another one namely rollover cable. A
rollover cable most commonly used to connect to a device’s console port to configuring
the device. Unlike straight-through and crossover cables, rollover cables are not intended
to carry data but instead create an interface with a device.
Cable – Bulk; Category Wire Cutters - to cut & strip RJ45 Crimper
(Cat) 5, 5e, 6 or higher cable the cable if necessary
Networking Essentials – Cabling & Crimping 83
2. Untwist the pairs - don't untwist them beyond what you have exposed, the more
untwisted cable you have the worse the problems you can run into.
4. Trim all the wires to the same length, about 1/2" to 3/4" leave from the sheath open.
5. Insert the wires into the RJ45 connector - make sure each wire is fully inserted to the
front of the RJ45 connector and in the correct order. The sheath of the cable should
extend into the RJ45 connector by about 1/2" and to be held in proper place in the
crimping tool. Then crimp the RJ45 connector with the crimping tool.
6. Verify the wires ended up the right order and that the wires extend to the front of the
RJ45 connector and make good contact with the metal contacts in the RJ45
connector.
7. Cut the cable to length - make sure it is more than long enough for your needs.
Notes: For details, go through the “process of making patch cable” illustrated below.
1. Laying the full length of cable in place from endpoint to endpoint, make sure to leave
excess.
2. At one end, cut the wire to length leaving enough length to work, but not too much
excess.
5. Use the punch down tool to insert each wire into the jack.
If a cable tester is available, use it to verify the proper connectivity of the cable. If
your cable doesn't show proper connectivity, look closely at each end and see if you can
find the problem. Often a wire ended up in the wrong place or one of the wires is making
poor contact or no contact. Also, double check the color coding to verify it is correct. If
you see a mistake or problem, cut the cable at end off and start again. A cable tester is
invaluable at identifying and highlighting these issues.
When sizing cables remember that an end-to-end connection should not extend
more than 100m (~328ft). Try to minimize the cable length, the longer the cable becomes,
the more it may affect performance. This is usually noticeable as a gradual decrease in
speed and increase in latency.
Networking Essentials – Cabling & Crimping 86
Power over Ethernet has been implemented in many variations before IEEE
standardized 802.3af. 802.3af specifies the ability to supply an endpoint with 48V DC at
up 350mA or 16.8W. The endpoint must be capable of receiving power on either the data
pairs [Mode A] or the unused pairs [Mode B] in 100Base-TX. PoE can be used with any
Ethernet configuration, including 10Base-T, 100Base-TX and 1000Base-T. Power is only
supplied when a valid PoE endpoint is detected by using a low voltage probe to look for
the PoE signature on the endpoint. PoE power is typically supplied in one of two ways,
either the host Ethernet switch provides the power, or a "midspan" device is plugged in
between the switch and endpoints and supplies the power. No special cabling is required.
1. For patch cables, T568-B wiring is by far, the most common method.
2. There is no difference in connectivity between T568B and T568A cables. Both wiring
would work fine on any system.
4. For a crossover cable, one end to be T568A and the other end T568B wiring.
4. Pull on the spine and fold the pairs back. Then cut the
spine as close to the cables end as possible.
6. Bring all of the wires together, until they touch. Hold the
sorted wires together tightly. At this point, recheck the
wiring sequence with the diagram.
Networking Essentials – Cabling & Crimping 88
10. Push the connector all of the way in and then squeeze
down the crimping tool. Remove the connector from the
crimping tool.
11. Repeat the procedure on the other end of the cable using the same wiring diagram. If
you wish to make a crossover cable, then use the other diagram (in this case T568-A).
12. Test the cable using a good quality LAN cable tester.
Note: If the completed assembly does not pass continuity, you may have a problem in
one, or both ends. First try giving each end another crimp. If that does not work, then
carefully examine each end. Are the wires in the proper order? Do all of the wires fully
extend to the end of the connector? Are all of the pins pushed down fully? Cut off the
suspected bad connector and re-crimp it. If you still have a problem, then repeat the
process at both ends.
Almost all patch cables that are made with stranded wire. Stranded wire is
normally specified for use in patch cables due to its superior flexibility.
Networking Essentials – Introduction to Structured Cabling 89
Lines patched as data ports into a network switch require simple straight-through
patch cables at the other end to connect a computer. Voice patches to PBXs in most
countries require an adapter at the remote end to translate the configuration on 8P8C
modular connectors into the local standard telephone wall socket.
It is common to color code patch panel cables to identify the type of connection,
though structured cabling standards do not require it, except in the demarcation wall field.
Cabling standards demand that all eight connectors in Cat5/5e/6 cable are connected,
resisting the temptation to 'double-up' or use one cable for both voice and data.
Entrance Facilities are where the building interfaces with the outside world.
Equipment Rooms host equipment which serves the users inside the building.
Telecommunications Rooms house telecommunication equipment which
connects the backbone and the horizontal cabling subsystems.
Backbone Cabling connects between the entrance facilities, equipment rooms
and telecommunications rooms.
Horizontal Cabling connects telecommunications rooms to individual outlets on
the floor.
Work-Area Components connect end-user equipment to outlets of the
horizontal cabling system.
Entrance Facility:
The service entrance is the point at which the network service cables enter or
leave a building. It includes the penetration through the building wall and continues to the
entrance facility. The entrance facility can house both public and private network service
cables. The entrance facility provides the means for terminating the backbone cable. The
entrance facility generally includes electrical protection, ground, and demarcation point.
Networking Essentials – Introduction to Structured Cabling 90
The main equipment room serves the entire building and contains the network
interfaces, uninterruptible power supplies (UPS), data equipment (e.g., servers, shared
peripheral devices and storage devices) and telecommunication equipment (e.g., PBX,
Voicemail, IVR).
The Intermediate Distribution Frame (IDF) typically serves the needs of a floor.
The IDF provides space for network equipment and cable terminations (e.g., cross-
connect blocks and patch panels). It serves as the main cross-connect between the
backbone cabling and the horizontal distribution system).
The horizontal distribution system distributes the signals from the Intermediate
Distribution Frame (IDF) to the work areas. The horizontal distribution system consists of:
Cables
Cross-connecting blocks
Patch panels
Jumpers
Connecting hardware
Pathways (supporting structures such as cable trays, conduits, and hangers
that support the cables from the IDF to the work areas).
Your network is one of your company's most valuable assets. It's the central
nervous system of your organization and it's growing along with your network
management problems. Your challenge is to harness the power of exploding technology
and make it work for you. Every minute spent tracking data, reconfiguring your cable plant
or searching for the source of a problem means loss of time and productivity and loss of
profit. Cable plant documentation software can help maintain the integrity of the network
by tracking the continuity through equipment, patch cords, cross-connects connectors,
cables, and outlets. It encompasses the design and maintenance of the cable plant.
Cable plant documentation can be an ally against the ravages of system downtime, giving
you the power to configure your cable plant so you have fewer network problems.
It will describe how to make a File/Folder or any Drive make available over
network using Windows 7 and later Windows operating system’s built-in sharing abilities.
Double click on “Computer” icon at windows desktop. A new window will open,
where you can see all the partitioned hard disk drives and also no sharing symbols on
any drive.
Now, if you want to share “Local Disk (D:)” over network then right click on it, then
click on “Properties” option from drop down list.
Networking Essentials – File Sharing 92
When the properties page will open, then go to the “Sharing” tab and you can see
there “Not Shared” in the Network File and Folder Sharing section. Here you click to open
the “Advanced Sharing” tab under the advanced sharing section.
In the advanced sharing windows do a tick mark on the check box of “Share this
folder” and click to open the “Permissions” tab.
In the permission window do a tick mark on “Full Control” option and other options
will be marked automatically under “Allow” column of “Permissions for Everyone” section.
Then press “Apply” and “Ok” button on every opened window to make changes.
Networking Essentials – File Sharing 93
Now you can see “Shared” and “Network path” in the Network File and Folder
Sharing section. Here the sharing of “Local Disk (D:)” is almost done, but some security
settings needed to be enabled for accessing the shared drive over network. Now click on
the “Security” tab on the properties window of “Local Disk (D:)”.
In the security tab you can see that “Everyone” is not listed in the “Group or user
names:” section. To add “Everyone” here, click on “Edit” button.
A new window will be opened “Select Users or Groups”, when click on “Add”
button. Here click on “Advanced” button only.
You can see a list of users in the “Search results” field, when “Find Now” button
clicked. Select “Everyone” from the list and press “Ok”.
Networking Essentials – File Sharing 95
Now you can see “Everyone” in the “Enter the object names to select” section.
Click on “Ok”.
Now, you can see a new user “Everyone” added in the “Group or user names” list.
In the permission window do a tick mark on “Full Control” option and other options will be
marked automatically under “Allow” column of “Permissions for Everyone” section. Then
press “Apply” and “Ok” button to make changes.
Then Click on “Apply” and “Close” button to make changes in the properties of
“Local Disk (D:)”. Finally, you can see the sharing symbol on “Local Disk (D:)” and this
drive has been fully shared over network for everyone to access it.
Networking Essentials – File Sharing 96
Besides above, due to the user-based security of Windows 7/Windows 10, you
may run into difficulties accessing your file/printer from other computers. The problem is
that Windows 7/Windows 10 will not allow access to the file/printer without a legitimate
user account and password. For e.g., when you are trying to connect to a shared
file/printer over the network, either you will get a dialog box which will allows you to enter
username & password or you will get an error message with to contact Administrator.
Windows 7/Windows 10 contains a 'Guest' account, which will allow remote users
to access shared file/printer; but this account is disabled on Windows 7/Windows 10. To
enable this and to access file/printer on the network go through the following steps.
Go to the main PC, whose file/folder has been shared and also attached with the
shared printer. Click on “Start Menu” and open the “Control Panel”.
Then open the “Administrative Tools” from the Control Panel window.
Now, open the “Computer Management” from the Administrative Tools window.
Networking Essentials – File Sharing 97
Go to the “User” tab which is located under the “Local Users and Groups” of the
“System Tools” group in Computer Management window. In the right-side pane of the
“User” tab go to the “Guest” account and right click on it. From the dropdown list click on
“Properties”.
When the properties page of “Guest” account will open, then remove the tick mark
of “User cannot change password” and “Account is disabled”. Then press Apply and Ok.
Now you can see that the “Guest” account has been enabled.
After enabling the “Guest” account, you will return back to the “Administrative
Tools” window and will open the “Local Security Policy” option.
Networking Essentials – File Sharing 98
When the “Local Security Policy” window will open, go to the “User Rights
Assignment” tab, which is under “Local Policies” of Security Settings group. Scroll down
to the “Deny access to this computer from the network” option of the right-side pane of
“User Rights Assignment”. Then double click to open the properties of this “Deny access
to this computer from the network”.
In properties window, remove the user “Guest” from the list. Then press “Apply”
and “Ok” to change the settings.
Finally, you will open the “Network and Sharing Center” and will make sure that
your network is in “Work Network or Home Network”.
Networking Essentials – Printer Sharing 99
It will describe how to make a printer available over local area network using
Windows7/Windows10's built-in sharing abilities. Since most of us use USB or parallel
connected printers, now assume that we have a printer correctly installed on a
Windows7/Windows10 computer and a working network connection to other computers
on LAN.
Now, share your current printer to make it available for other computers on your
Local Area Network (wired or wireless).
Go to Start menu and click on Devices and Printers. A new window will open.
Right click on the printer you would like to share and click on Printer properties
from the drop-down list. Printer properties page will open.
Networking Essentials – Printer Sharing 100
In printer properties page go to the Sharing tab, then make a tick mark on check
box of Sharing this printer option.
Click on the Additional Drivers button to install additional drivers, if this printer is
shared with users running different version of Windows, so that the users does not have
to find the printer drivers when they connect to the shared printer.
A new Additional Drivers pop-up will open. Now, you can install additional drivers
so that users running different version of Windows can download them automatically
when they'll first attempt to connect to the printer. Once you'll click on 'ok', you'll be
prompted for the location of the printer drivers on your system.
Networking Essentials – Printer Sharing 101
Then press Apply & Ok to accept the changes. Now the selected printer will be
available on the network for other computers to access it.
When the “Devices” window will open, you'll go to the “Devices and printers”
option, which will be found under the “Related settings” of “Printer & Scanner” tab.
Networking Essentials – Printer Sharing 102
Now Devices and printers page will be opened. Here you’ll right click on the
printer to be shared and click on the printer properties from the drop-down list.
In printer properties page go to the Sharing tab, then make a tick mark on check
box of Sharing this printer option.
Click on the Additional Drivers button to install additional drivers, if this printer is
shared with users running different version of Windows, so that the users does not have
to find the printer drivers when they connect to the shared printer.
Networking Essentials – Printer Sharing 103
A new Additional Drivers pop-up will open. Now, you can install additional drivers
so that users running different version of Windows can download them automatically
when they'll first attempt to connect to the printer. Once you'll click on 'ok', you'll be
prompted for the location of the printer drivers on your system.
Then press Apply & Ok to accept the changes. Now the selected printer will be
available on the network for other computers to access it.
After sharing the printer, now install the shared printer on the other computers
(client/node computers) of Local Area Network.
Go to the “Devices and printers” window in Control Panel, then click on “Add a
printer” tab.
Then click on “Add a network, wireless or Bluetooth printer” option, when the Add
printer pop-up will show.
Networking Essentials – Printer Sharing 104
Then you'll see the network printer searching wizard pop-up, where you will select
the appropriate printer and press the Next button to proceed.
Here you'll see a “windows printer installation” pop-up, which will be searching,
downloading and installing the drivers of the selected printer automatically.
After installation of drivers, a successfully added of printer window will show. Here
you may change the name of the printer (optional) as your choice or you can leave it, as it
is. Then press "Next" to proceed.
Networking Essentials – Printer Sharing 105
Finally, you'll got the finish wizard window, where you may set the printer as
default printer or not by clicking/clearing a tick mark on the check box. Then click on
“Finish” button.
Now, you can see the shared printer with location details in your printer list at
“Devices and printers” windows.
The client/node computer is now able to print through network on shared printer.
Networking Essentials – Installation & Configuration of Network Printer 106
Printer is output Device which gives the output in user acceptable format. In
computing, a printer is a peripheral which produces a hard copy (permanent readable text
and/or graphics) of documents stored in electronic form, usually on physical print media
such as paper or transparencies. Many printers are primarily used as local peripherals,
and are attached by a printer cable or, in most new printers, an USB cable to a computer
which serves as a document source. Some printers, commonly known as network
printers, have built-in network interfaces (typically wireless and/or Ethernet), and can
serve as a hardcopy device for any user on the network. Individual printers are often
designed to support both local and network connected users at the same time. In
addition, some printers are combined with a scanner and/or fax machine in a single unit,
and can function as photocopiers. Printers that include non-printing features are
sometimes called Multifunction printers (MFP), Multi-Function Devices (MFD), or All-In-
One (AIO) printers. Most MFPs include printing, scanning, and copying among their
features.
To configure the network printer, first thing you need to do is plug in the Ethernet
connection and power on the printer. All network capable printers are default to DHCP
mode, which can be automatically acquires an IP address on any DHCP-enabled
network. Even tiny home networks with inexpensive routers have automatic DHCP-
assigned IP addresses. Once the printer comes online, it will automatically obtain the first
available IP address from the DHCP pool.
Next, you need to figure out what IP address the printer automatically obtained.
There are multiple ways to do this. The surest way is to get the printer to tell you what the
address is by printing out a network configuration printer report.
If you don't want to or can't physically touch the printer because it's in some
remote location, that's not a problem. If you happen to know what the DHCP range is or
you can look at the DHCP server itself, you'll quickly be able to see what IP address the
printer obtained. If it's a relatively empty network, you can ping the first available IP in the
DHCP range and find the printer that way.
If you want to change the IP address to static, you can do it via printer’s settings
option. For details, the illustration of HP LaserJet Pro MFP M226dn printer is shown
below.
Networking Essentials – Installation & Configuration of Network Printer 107
Go to the printer’s LCD panel and press the setting button. Setup Menu will be
displayed on the screen.
Now you press the right arrow button until the Network Setup displayed in the
LCD panel under setup menu. Then you press the OK button.
When you see the IPv4 Config Method under the network setup wizard, then
press OK.
Here you can see the Auto IP option in the LCD panel. On the selection of Auto
IP, the printer will be assigned IP address automatically by any DHCP server; which can
be either a dedicated DHCP server or any access point router.
Networking Essentials – Installation & Configuration of Network Printer 108
If you want to put fixed IP address, then press right arrow key for manual option.
When manual option shown in display of LCD panel, then press ok.
Now IP address field shown in the display of LCD panel. Here you put IP address
by using numbers keys and press ok.
Again, press ok when showing “yes” on the LCD panel for confirmation.
Now Subnet Mask field shown in the LCD panel, here you put the subnet mask by
using number keys and press ok. Again, press ok for confirmation when showing yes on
the display.
Networking Essentials – Installation & Configuration of Network Printer 109
And now using the number keys put the default gateway and press OK twice for
submission and confirmation.
Finally, fixed IP address has been installed on the printer and it's available online
over the network. After the above process, now it's time to install network printer on all
PCs.
Now go to the PC, where you want to install the network printer and place the
supplied installer media into the CD/DVD Rom or download the proper installer file from
the printer manufacturer website.
Double click on the installer file to extract and run the installer file.
Networking Essentials – Installation & Configuration of Network Printer 110
In the “software selection” page just click on the “Next” button with default settings
or click on “customize software selection” to choose the packages you needed.
On the license agreement page, accept the agreement and click on “Next” to
proceed.
On "Connect the Product" tab select the option “Connect through network” and
“Automatically find my product on the network”. Press Next to proceed.
After searching the local network for available printer, a list of the network printers
shown in the “Network product(s) found page. Here you select the appropriate printer and
press “Next” to install it.
On the finish page uncheck the “HP connected” and “Register this product with
HP” options and click on “Finish” button.
Thin client is also used to describe software applications that use the client-server
model where the server performs all the processing. In client-server applications, a client
designed to be especially small so that the bulk of the data processing occurs on the
server.
Although the term thin client usually refers to software, it is increasingly used for
computers, such as network computers and Net PCs, which are designed to serve as the
clients for client-server architectures. The most common sort of modern thin client is a
low-end microcomputer which concentrates solely on providing a graphical user interface
to the end-user. The remaining functionality, in particular the operating system, is
provided by the server.
Startup Process
Thin clients will usually be set up on their own private network, separate from
other machines. One network card of the server will be on the thin client network, and the
other network card will connect to the regular network as usual. It is important that the two
network cards are not switched; the card on the private network will have usually had a
DHCP service running, which will interfere with the regular network which will already
have DHCP service.
Networking Essentials – Introduction to Thin Client 114
Resource Utilization
All of the computing power, memory and hard drive space are on the server side.
These resources will be shared among all thin clients. These resources are easier to
allocate due to their centralized location.
On a thin client server, programs only need to be loaded into memory once,
regardless of the number of people using the program at the time. A web browser in
operation on 16 different workstations will have a total memory footprint of 16 times the
ordinary amount since it was loaded in 16 different locations. If this same web browser
were on a thin client server, the program itself would only be in memory once, only
requiring additional space to hold user specific data.
Similarly, other resources such as the CPU can be more fully utilized when all of
the power is in a central location.
Data Centralization
The server will have direct access to all hard drives in the system. Instead of
having data spread among a number of workstations like in the traditional computing
model, all user data will be stored on the server. This makes the process of finding and
making backup copies of the data much simpler, improving data integrity. If any single
workstation's hard drive fails in a traditional computer lab, data loss is much more likely
since workstations are not backed up as often as servers. A server can survive such an
incident through redundant hard drives (RAID arrays) and automated backups, both of
which are easier to implement in one location than in many.
If a hardware failure occurs on a thin client, no saved data is lost; the client can
easily be replaced with another machine set up for network booting. In the meantime, the
user can log into another thin client and be able to access the same environment they
had on the previous machine.
While the server must be robust enough to handle several client sessions at once,
the clients can be made out of much cheaper hardware than a fat client can. This reduces
the power consumption of those clients, and makes the system marginally scalable: it is
relatively cheap to add on a couple more client terminals. The thin clients themselves in
general have a very low total cost of ownership, but some of that is offset by requiring a
robust server infrastructure with backups and so-forth. This is also reflected in terms of
power consumption: the thin clients are generally very low-power and might not even
require cooling fans, but the servers are higher-power and require an air-conditioned
server room.
On the other hand, while the total cost of ownership is low, the individual
performance of the clients is also low. Thin clients, for example, are not suited to any real
form of distributed computing. The costs of compiling software, rendering video or any
other computationally intensive task will be shared by all clients via the server.
Networking Essentials – Introduction to Thin Client 115
Client simplicity
Since the clients are made from low-cost hardware with few moving parts, they
can operate in more hostile environments than conventional computers. However, they
inevitably need a network connection to their server, which must be isolated from such
hostile environments. Since thin clients are cheap, they offer a low risk of theft in general,
and are easy to replace when they are stolen or broken. Since they don't have any
complicated boot images, the problem of boot image control is centralized to the central
servers.
On the other hand, to achieve this simplicity, thin clients are generally highly
integrated systems. This means that they may lag behind thick clients in terms of
extensibility and accessibility. For example, if the server does not have support for
independent audio streams, or the communication protocols don't transfer such streams,
one simply cannot receive audio from the server. Similarly, if the client lacks USB ports,
or if there is some communication failure of its USB signals over the network, the client
might be wholly unable to support an unexpected USB peripheral.
Ultra-thin clients
Traditionally, a thin client ran a full operating system for the purposes of
connecting to other computers. A newer trend is sometimes called an ultra-thin client or a
zero client, who no longer runs a full operating system: the kernel instead merely
initializes the network, begins the networking protocol, and handles display of the server's
output.
Web thin clients (running a Web OS) rely on the web-based software for the
application and data storage, thus eliminating the single point of failure and the need for
OS/application/data aggregation and licensing required by traditional thin client.
Networking Essentials – Introduction to Wireless Networking 116
Even at home, people have changed the way they live and learn. The Internet has
become a standard in homes, right along with TV and phone service. Even the method of
accessing the Internet has quickly moved from temporary modem dialup service to
dedicated digital subscriber line (DSL) or cable service, which is always connected and is
faster than dialup.
The most tangible benefit of wireless is the cost reduction. Two situations illustrate
cost savings. First, with a wireless infrastructure already in place, savings are realized
when moving a person from one location in an office to another, when reorganizing a lab,
or when moving from temporary locations or project sites. On average, the IT cost of
moving an employee from one location to another where wiring changes are required.
The second situation to consider is when a company moves into a new building that does
not have a wired infrastructure. In this case, the savings from wireless is even more
noticeable because running cables through walls, ceilings, and floors is a labor-intensive
process.
Besides the increase in productivity, WLAN also means better quality in daily work
(better responsiveness to customers, a better can-do attitude from employees, and so on)
and other benefits that cannot be easily measured.
In its most simplistic form, a WLAN is a LAN that uses radio frequency (RF) to
communicate instead of using a wire. As shown in the following figure, wireless clients
connect to wireless access points (WAPs).
Networking Essentials – Introduction to Wireless Networking 117
Although WLANs and LANs both provide connectivity between the end users, they
have some key differences that include both physical and logical differences between the
topologies. In WLANs, radio frequencies are used as the physical layer of the network.
Differences also exist in the way the frame is formatted and in the transmission methods,
detailed as follows:
WLANs use carrier sense multiple access with collision avoidance (CSMA/CA)
instead of carrier sense multiple access collision detect (CSMA/CD), which is
used by Ethernet LANs. Collision detection is not possible in WLANs, because
a sending station cannot receive at the same time that it transmits and,
therefore, cannot detect a collision. Instead, WLANs use the Ready to Send
(RTS) and Clear to Send (CTS) protocols to avoid collisions.
WLANs use a different frame format than wired Ethernet LANs use. WLANs
require additional information in the Layer 2 header of the frame.
Radio waves cause problems not found in LANs, such as the following:
Privacy issues occur because radio frequencies can reach outside the facility.
In WLANs, mobile clients connect to the network through an access point, which
is the equivalent of a wired Ethernet hub. These connections are characterized as
follows:
Radio frequencies range from the AM radio band to frequencies used by cell
phones. This section identifies the characteristics of the radio frequency transmissions
used by WLANs.
Radio frequencies are radiated into the air by antennas that create radio waves.
When radio waves are propagated through objects, they might be absorbed, scattered, or
reflected. This absorption, scattering, and reflection can cause areas of low signal
strength or low signal quality. Understanding these phenomena and the causes is
important when you are building and designing WLAN networks.
Reflection: Occurs when RF waves bounce off objects (for example, metal or
glass surfaces)
The following rules apply for data transmission over radio waves:
Higher data rates have a shorter range because the receiver requires a
stronger signal with a better signal-to-noise ratio (SNR) to retrieve the
information.
Higher transmit power results in a greater range. To double the range, the
power has to be increased by a factor of four.
Wireless Standards:
WLAN standards that are currently supported by major vendors were developed
by the working group 11 of the Institute of Electrical and Electronics Engineers (IEEE)
802 committee.
IEEE standards define the physical layer and the Media Access Control (MAC)
sub-layer of the data link layer of the OSI model. The original 802.11 wireless standard
was completed in June, 1997. It was revised in 1999 to create IEEE 802.11a/b and then
reaffirmed in 2003 as IEEE 802.11g.
By design, the standard does not address the upper layers of the OSI model.
IEEE 802.11b was defined using Direct Sequence Spread Spectrum (DSSS). DSSS uses
just one channel that spreads the data across all frequencies defined by that channel.
The following table shows the different standards and how they compare.
Networking Essentials – Introduction to Wireless Networking 119
IEEE 802.11 divided the 2.4 GHz ISM band into 14 channels, but local regulatory
agencies such as the FCC designate which channels are allowed, such as channels 1
through 11. Each channel in the 2.4 GHz ISM band is 22 MHz wide with 5 MHz
separation, resulting in overlap with channels before or after a defined channel.
Therefore, a separation of 5 channels is needed to ensure unique non-overlapping
channels.
The year that the 802.11b standard was adopted, IEEE developed another
standard known as 802.11a. This standard was motivated by the goal of increasing data
rates by using a different OFDM spread spectrum and modulation technology and using
the less crowded frequency of 5 GHz UNII. The 2.4 GHz ISM band was widely used for
all WLAN devices, such as Bluetooth, cordless phones, monitors, video, and home
gaming consoles, and it also happens to be the same frequency used by microwave
ovens. 802.11a was not as widely known because materials for chip manufacturing were
less readily available and initially resulted in higher cost. Most applications satisfied the
requirements following the cheaper and more accessible standards of 802.11b.
Then the development by IEEE maintains usage of the 802.11 MAC and obtains
higher data rates in the 2.4 GHz ISM band. The IEEE 802.11g amendment uses the
newer OFDM from 802.11a for higher speeds, yet is backward compatible with 802.11b
using DSSS, which was already using the same ISM frequency band. DSSS data rates of
1, 2, 5.5, and 11 Mbps are supported, as are OFDM data rates of 6, 9, 12, 18, 24, 48, and
54 Mbps. IEEE requires only mandatory data rates of OFDM using 6, 12, and 24 Mbps,
regardless whether it is 802.11a or 802.11g OFDM.
Wireless Components
WAPs provide connectivity between wireless client devices and the wired network.
The access point usually connects to a router via a wired network as a standalone device.
Implementing a WLAN
Implementing a WLAN involves more than selecting the desired standard and
selecting a security mechanism. Access point placement can have more effect on
throughput than standards. You need to understand how the efficiency of a WLAN is
affected by such issues as topology, distance, and access point location.
Upon completing this lesson, you will be able to describe the factors affecting the
implementation of a WLAN.
Ad hoc mode: Independent Basic Service Set (IBSS) is the ad hoc topology
mode. Mobile clients connect directly without an intermediate access point.
Operating systems such as Windows have made this peer-to-peer network
easy to set up. This setup can be used for a small office (or home office) to
allow a laptop to be connected to the main PC or for several people to simply
share files. The coverage is limited. Everyone must be able to hear everyone
else. An access point is not required. A drawback of peer-to-peer networks is
that they are difficult to secure.
Basic Service Set (BSS): The communication devices that create a BSS
are mobile clients using a single access point to connect to each other or
to wired network resources. The Basic Service Set Identifier (BSSID) is the
Layer 2 MAC address of the BSS access point's radio card. While the BSS
is the single building block for wireless topology and the BSS access point
is uniquely identified through a BSSID, the wireless network itself is
advertised through a SSID, which announces the availability of the
wireless network to mobile clients. The SSID is a wireless network name
that is user configurable and can be made up of as many as 32 case-
sensitive characters.
BSA Topology
Networking Essentials – Introduction to Wireless Networking 122
The access point attaches to the Ethernet backbone and communicates with all
the wireless devices in the cell area. The access point is the master for the cell and
controls traffic flow to and from the network. The remote devices do not communicate
directly with each other; they communicate only with the access point. The access point is
user-configurable with its unique RF channel and wireless SSID name.
The access point broadcasts the name of the wireless cell in the SSID through
beacons. Beacons are broadcasting that access points send to announce the available
services. It is used to logically separate WLANs. It must match exactly between the client
and the access point. However, clients can be configured without an SSID (null-SSID),
then detect all access points, and learn the SSID from the beacons of the access points.
A common example of the discovery process is the one used by the integrated Windows
Zero Configuration (WZC) utility when a wireless laptop is used at a new location. The
user is shown a display of the newly found wireless service and asked to connect or
supply appropriate keying material to join. SSID broadcasts can be disabled on the
access point, but this approach does not work if the client needs to see the SSID in the
beacon.
If a single cell does not provide enough coverage, any number of cells can be
added to extend the range. This range is known as an Extended Service Area (ESA). The
following figure shows an ESA topology.
ESA Topology
Lastly, here is an example of how to activate a secured wi-fi access point router.
Networking Essentials – Introduction to Wireless Networking 123
References:
1. https://www.ciscopress.com/articles
2. https://searchnetworking.techtarget.com
3. https://core.ac.uk
4. https://www.tutorialspoint.com