KEMBAR78
Networking Essentials | PDF | Osi Model | Internet Protocol Suite
0% found this document useful (0 votes)
605 views128 pages

Networking Essentials

This document provides an introduction to basic networking concepts for beginners. It defines what a computer network is as an interconnected collection of independent computers that can exchange information. The key components of a computer network are hardware like servers, workstations, networking cables, and network interface cards, as well as software like network operating systems and LAN software. Computer networks allow resources like files, printers, and applications to be shared across multiple computers. They provide benefits to organizations like resource sharing, high reliability through redundancy, and cost savings.

Uploaded by

jotalopecinco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
605 views128 pages

Networking Essentials

This document provides an introduction to basic networking concepts for beginners. It defines what a computer network is as an interconnected collection of independent computers that can exchange information. The key components of a computer network are hardware like servers, workstations, networking cables, and network interface cards, as well as software like network operating systems and LAN software. Computer networks allow resources like files, printers, and applications to be shared across multiple computers. They provide benefits to organizations like resource sharing, high reliability through redundancy, and cost savings.

Uploaded by

jotalopecinco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 128

 

 
 
 
 
  A Simple Guide for Beginners
 

NETWORKING  
 
 

ESSENTIALS
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
PREFACE 
 
 
In  today’s  information  technology  world,  networking  is  very 
much essential for any computer professional, either he/she is in the field 
of computer hardware & networking profession or any other computer 
technology. Now‐a‐days computer is widely used in all most every office 
of companies from different sectors & sizes and even if shops & in home 
users  also.  Networking  is  successfully  used  there  in  various  forms.  In 
home users and small shops networking is used in the form of internet 
through wi‐fi router and for printing documents through wireless printer. 
 
This book is a step‐by‐step guide for the beginners of computer 
hardware  &  networking  profession  and  for  those  who  want  to 
understand  how  computer  networking  works.  The  book  covers  basic 
networking concepts, reference models, basics of IP address, networking 
devices, cabling & crimping, file & printer sharing and many more. This 
book is based on my knowledge and experience. When writing this book, 
I aim to provide some basic information about the computer networking 
for beginners. 
 
 
 
Pradeep Patra
Contents

Chapter Topic Page No.

1. Basic Networking Concepts 1–7

2. Reference models 8 – 16

3. Network Standardization 17 – 21

4. Data Transmission Modes 22 – 24

5. Network Topologies 25 – 28

6. Protocols 29 – 42

7. Port Number 43 – 43

8. IP Address 44 – 48

9. Subnet Mask 49 – 49

10. Default Gateway 50 – 50

11. TCP/IP Tools 51 – 58

12. Networking Devices 59 – 70

13. Transmission Medium 71 – 78

14. Connectors 79 – 80

15. Cabling & Crimping 81 – 88

16. Introduction to Structured Cabling 89 – 90

17. File Sharing 91 – 98

18. Printer Sharing 99 – 105

19. Installation & Configuration of Network Printer 106 – 112

20. Introduction to Thin Client 113 – 115

21. Introduction to Wireless Networking 116 – 123


Networking Essentials – Basic Networking Concepts 1

Chapter 1: BASIC NETWORKING CONCEPTS

Definition of a Network:

A network is a group of various people or components connected together in such


a way that, it is possible to distribute or collect information over the entire group.

What is Computer Network?

The term “Computer Network” is used to mean an interconnected collection of


independent computers. Two computers are said to be interconnected, if they are able to
exchange information. The connection can be wired or wireless. With a network the user
must clearly log into a machine, submit jobs remotely, move files around the computers.

Distribution or exchange of information is very important for any group activity to


work or function efficiently and effectively. Computer network have become an important
tool of communication, with an added advantage of being able to store large amount of
data and also being able to deliver it as and when demanded.

A computer network can do many things, which are listed below, that a stand-
alone machine cannot do:

1. Share a single copy of a file among all the users, even concurrently.
2. Transfer files from computer to computer or from one computer to the server.
3. Share applications over the entire network. A multi-user license costs much
less than buying a standalone license.
4. Share resources like printers, hard disks, CD-ROM drives, modems, etc.
5. Use e-mail for communications, inter-office notes, creating an almost
paperless office.

Components of a computer network:

A computer network is a combination of two type of components, i.e., Hardware


components and Software components.

Hardware Components are:

• Servers: Servers are faster computers that run various software, share its
resources, store & process information and also provide a human interface for
the users to be able to use the networked computers.

• Workstation: A node, which is more powerful and can handle local


information processing is called a workstation. The workstation works only for
the person sitting in front of it, where as a server serves all the people on the
network to share its resources. A workstation usually has an inexpensive,
small hard disk to carry out local tasks. Some workstations, called diskless
workstations, have no disk drive of their own. Such workstations also called
dumb terminals and they rely completely on the LAN for their access. The
network operating system lets the nodes work as if all the resources at the
server belong to the node itself.
Networking Essentials – Basic Networking Concepts 2

• LAN Cable: This is the medium or channel over which the information travels
from computer to computer. The information travels from one computer onto
the medium and then from the medium to another computer in the form that it
can be read.

• Network Interface Card: Each computer contains a network interface card.


This card is used to connect the cables to the computers. These cards help
the computer to transfer the data at a faster rate and in the form of packets.
These cards are plugged into the computer motherboard. These cards are
generally called as Ethernet Card or LAN card.

Software components are:

• Network Operating System (NOS): The network requires some software to


control all the information transfer activity on the network, like the traffic police
to control the traffic. The software called NOS handles these tasks. Networks,
which are more complex, require network devices like hubs, switches &
routers to carry out different network functions.

• LAN Software: On the network, each computer is called a node or a


workstation unless there are certain computers designed as servers. LAN
cables connect all the nodes and servers together to form the network. In
addition to its local disk operating system, each node requires networking
software that enables the nodes to communicate with the servers. In return,
the file servers run network software that communicates with the nodes.

Use of Computer Networks:

It is very much important to see why people are interested in computer networks,
in what way it is helpful.

1. Networks for companies: Many organizations have a number of computers in


operations often located far apart. For e.g., a company with many branches may
have computer at each location to keep track of inventories, monitor productivity
and do the payroll. Initially these branches work in isolation with each other’s, but
at some point of time, the management decides to connect them to extract and
correlate information about the entire company for the benefit of the company.

Benefit for the company or organization may be due to many factors like listed in the
following section.

(i) Resource Sharing: The aim is to make all programs, equipment’s,


especially data available to anyone on the network without consider to the
physical location of the resource and the user. For example, Printers are
expensive resources can be shared among many computers, i.e., printer is
installed on a single machine which is networked and used by all machine
connected to that network.
Networking Essentials – Basic Networking Concepts 3

(ii) High Reliability: A second goal is to have alternative sources of supply.


For example: All files could be replicated on two or three machines, so if
one of them is unavailable due to hardware failures, the other copies could
be used. Also, many CPU’s means if one goes down the others may be
able to can take over its work, although at reduced performance. It finds
extensively useful in military, banking, air traffic control, nuclear reactor
safety and many other applications, where the ability to continue operating
in the face of hardware problems is of utmost importance.

(iii) Saving Money: Small computers have much better price/performance


ratio than larger ones. Mainframes are roughly a factor of ten times faster
than personnel computers, but their cost is thousand times more than
personnel computers. This is the fact that many system designers go for
building systems where many personal computers are interconnected with
a larger machine. A system with a model consisting of personal computer
one per user with the sharable data kept on one or more shared file server.
Here the users are called clients and the whole arrangement is called the
client-server model.

In the client-server model communication takes the form of a


request message from the client to the server asking for some work to be
done. The server replies back after doing the work.

(iv) Scalability: It is the ability to increase system performance gradually as


the workload grows just by adding RAM or replacing processor. With the
client-server model, new client and new servers can be added as needed
without any disturbance to the users. That is the network can be expanded
easily.

(v) Communication medium among employees: A computer networks


provides a powerful communication among the widely spread employees.
Using a network, it is easy for two or more people live far apart, write a
report together. Whenever one worker makes changes to an online
document, the other can see the change immediately, instead of waiting
for several days. This speed makes the co-operation among far-flung
workers easy. In the long run the use of computer networks can be used
and prove probably important to enhance human to human communication
in an organization.

2. Networks for people: In 1990’s, computer networks began to start delivering


services to private individuals at home. These services are quite different from the
corporate efficiency discussed in the above section. Below are few exciting uses
for individuals:

(i) Access to remote information: there are many areas where access to
remote information is necessary in our daily life. Here applications involve
interactions between a person and remote database. One area seen is
financial institutions like banks, power supply department etc. Many people
pay their bills; manage bank accounts and handle investment
electronically.

Now a day, we have banking from anywhere. That is a person can


withdraw money, check the balance of his account from anyplace no
matter in which place he has his account.
Networking Essentials – Basic Networking Concepts 4

Newspaper goes online and can be personalized. The magazines,


scientific journals etc. or rather digital library are all available online.
Depending on the cost, size and weight of book sized notebook
computers, printed books may become obsolete.

The most exciting application is access to information like current World


Wide Web, which contains information about arts, business, cooking,
government, health, history, hobbies, science, sports, travel etc.

(ii) Person-to-person communication: The facility like instant messaging


derived from UNIX talk program allows two people to type messages at
each other in real time. The multi-person version of this idea is chat room
in which a group of people can type messages for all to see. Another
application is a peer-to-peer system. To distinguish it from client server
model, there are no fixed clients and servers; i.e., there is no fixed division
into clients and servers. Here individuals can form a group and can
communicate with others in a group. Every user can interact with one or
more other people.

Electronic mail or e-mail is widely used by almost every person. It is one of


the most popular internet applications that contain audio and video as well
as text. Real time e-mail will allow remote users to communicate with no
delay, possibly seeing and hearing each other. This technology makes a
possible to have virtual meetings, called videoconference among far flung
people. This videoconference technology finds extensively helpful for
remote school, getting medical opinions from distant specialist and
numerous other applications.

The discussions in which one person posts a message and all other
subscribers can read the message or one subscriber may put a query and
anyone who knows can answer the query by posting so that all subscribers
can read.

(iii) Interactive entertainment: The most common application is


entertainment. It is a huge and a growing industry. The major and widely
used application is video on demand. It is possible to select any movie or
television program in any country and have it displayed on individual
screen instantly. New films become more interactive, game playing, live
television also becomes interactive with audience participating in quiz
shows, choosing among contestants and so on.

(iv) E-Commerce (Electronic commerce): Home shopping is already popular


and enables users to inspect the online catalogs of thousands of
companies. Some of these catalogs provide the ability to get an instant
video on any product by just clicking on the products name. A customer
can buy a product online. The customer can consult for any technical
support online. Another area in which e-commerce is already being used is
financial institutions. Many people already pay their bills; manage bank
accounts, etc. online.

Now a day, we have electronic flea markets. That is online auctions of


second-hand goods have become a massive industry. Online auctions are
of more of a peer-to-peer system, sort of customer to customer.
Networking Essentials – Basic Networking Concepts 5

Computer networks have become hugely important to people. Universities


uses e-learning national or international. Digital classes in schools are also
now started.

3. Social Issues: The widespread introduction of networking will introduce social,


political problems. As long as like-minded people have interactions with respect to
technical topics or hobbies there will not be any problems. The trouble comes
when the discussion is about politics, religion etc. view may be posted and
messages is not limited to text, high resolution color photographs and even short
video clips can be easily transmitted using computer networks, which can lead to
problems.

Another issue is employee versus employer rights. Many people read and
write mails at work. Some employers have claimed the right to read and possible
censor employees’ mails including those that come from home machines.

Another issue is anonymous messages. It allows ordinary person to


distribute their views in different ways and to different audiences. This might bring
many unsolved social, political and moral issues.

Classification of Computer Networks:

Computer networks may be classified according to the network layer at which they
operate according to some basic reference models that are considered to be standards in
the industry such as the seven-layer OSI reference model and the four layers TCP/IP
model. Few ways of classification are listed below:

¾ By transmission techniques: Computer networks may be classified as broadcast


or point to point networks.

¾ By scale: To the scale or extent of reach of the network, for example as a Personal
Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN)
or Wide Area Network (WAN).

¾ By connection method: Computer networks may be classified according to the


technology that is used to connect the individual devices in the network such as
Power line communication, Ethernet or Wireless LAN.

¾ By functional relationship: Computer networks may be classified according to the


functional relationships which exist between the elements of the network, for e.g.,
Active Networking, Client-server and Peer-to-peer (workgroup) architectures.

¾ By network topology: Computer networks may be classified according to the


network topology upon which the network is based, such as Bus network, Star
network, Ring network, Mesh network, Star-bus network, Tree or Hierarchical
topology network, etc.

¾ By service provided: Computer networks may be classified according to the


services which they provide, such as Storage area networks, Server farms, Process
control networks, Value-added network, Wireless community network, etc.

¾ By Protocol: Computer networks may be classified according to the


communications protocol that is being used on the network.
Networking Essentials – Basic Networking Concepts 6

The most common way of classifications is by transmission techniques, by scale


and by the way the computers are connected. The first two ways are discussed in the
following section.

Based on transmission technology:

ƒ Broadcast links
ƒ Point-to-point links

Broadcast networks have a single communication channel that is shared by the


users on the network. Short messages are commonly called as packets or frames. The
user on the network sends packets; all other machines receive these packets. An address
field within the packet or frame specifies the address of the destination machine. So,
upon receiving the packet, all machines check the address field. Only intended user uses
or processes the packet or frame and others neglect and discard it. As an example, in a
class of 40 students, the teacher puts question to say ‘X’ student (where X is the name of
the student). All the students hear to the question but will not answer as the question is
intended to X only. Hence only X will analyze the question and others will not respond.

Broadcast system generally allows the possibility of addressing a packet to all the
destinations by using a special code in the address field. When this code is transmitted, it
is received and processed by every machine on the network. Again, considering the
above example: A teacher put forth the question in a class to all students, which is the
teacher does not ask to a specific student by any unique name, then, all are supposed to
analyze the question and answer. This mode of operation is referred to broadcasting.
Some broadcasting systems also support transmission to a subset of the users, which is
a group of users. This mode is called as multicasting.

In contrast the point-to-point network consists of many connections between


individual pairs of machines. A packet to be sent from source to destination may have to
first visit one or more intermediate machines. Usually, different routes of different length
are possible. So finding the best path or route is important in point-to-point networks. The
type of transmission with one sender and one receiver is also referred to as unicasting.

Geographically localized networks or smaller networks tend to use broadcasting


whereas lager networks usually are point-to-point networks.

Based on their scale:

Multiple processor system based on physical size is classified below:

Interprocessor Processors
distance located in same
1m Square meter Personal Area Network
10 m Room
100 m Building Local Area Network
1 km Campus
10 km City Metropolitan Area Network
100 km Country
Wide Area Network
1000 km Continent
10,000 km Planet The Internet

Classification of processors by scale


Networking Essentials – Basic Networking Concepts 7

At the top we have Personal Area Networks (PAN) meant for a single person. For e.g., a
wireless network connecting a computer with its mouse, keyboard and a printer can
constitute a personal area network.

Beyond the personal area network, we have longer-range networks which are
broadly classified networks as

• LAN
• MAN
• WAN

Local Area Networks (LAN):

Local Area Networks are generally called LANs. They are privately owned
networks within a single building or campus of up to few kilometers in size. They are used
to connect personal computers and workstations in company offices and factories to
share resources and exchange information. Traditional LANs run at speeds of 10Mbps to
100Mbps, have low delay (microseconds and nanoseconds) and make very few errors.
Newer LANs operate at 10Gbps.

Metropolitan Area Networks (MAN):

A Metropolitan Area Networks referred as MANs covers a city. The best-known


example is cable television network available in many cities. Earlier these were used for
TV reception only but with changes a two-way internet service could be provided. In this
system both television signals and internet being fed into centralized head end for
distribution to people’s home.

Cable television is not the only MAN; today’s developments in high-speed wireless
internet access also resulted in MAN.

Wide Area Network (WAN):

A wide area network is referred as WAN. WAN spans a large geographical area
often a continent or country. WAN contains a collection of machines, traditionally called
as hosts, these hosts can be on LANs and are connected by a subnet. The hosts are
owned by customers or are personal computers. The subnets are owned by a telephone
company or internet service provider. The subnet carries the messages from hosts to
hosts, just as telephone system carries words from speaker to listener. Each host is
connected to a LAN on which a router is present. Sometimes a host may be connected
directly to a router.

In most WANs, the network contains many transmission lines each connecting a
pair of routers. A packet is sent from one router to another via one or more intermediate
routers. The packet is received at each intermediate router in its entirety. That is store the
packet in full until the required output line is free and then forwards it. A subnet that works
according to this principle is called store and forward or packet switched subnet. Not all
WANs are packet switched. A second possibility for a WAN is a satellite system. Satellite
networks are inherently broadcast networks.

Finally, the connection of two or more networks is called an inter-network. The


worldwide internet is a well-known example of inter-network. Distance is important as a
classification metric as different techniques are used at different scales.
Networking Essentials – Reference Models 8

Chapter 2: REFERENCE MODELS

There are two important network architectures. They are ISO-OSI reference
model and TCP/IP reference model. These two are discussed below:

In 1977, the International Organization for Standardization (ISO) began to develop


its OSI networking suite. OSI has two major components: an abstract model of
networking (the Basic Reference Model or seven-layer model) and a set of concrete
protocols.

Parts of OSI have influenced Internet protocol development, but none more than
the abstract model itself, documented in ISO 7498. In this model, a networking system is
divided into layers. Within each layer, one or more entities implement its functionality.
Each entity interacts directly only with the layer immediately beneath it and provides
facilities for use by the layer above it.

In particular, Internet protocols are deliberately not as rigorously architected as the


OSI model, but a common version of the TCP/IP model splits it into four layers. The
Internet Application Layer includes the OSI Application Layer, Presentation Layer and
most of the Session Layer. Its End-to-End Layer includes the graceful close function of
the OSI Session Layer as well as the Transport Layer. Its Internetwork Layer is equivalent
to the OSI Network Layer, while its Interface Layer includes the OSI Data Link and
Physical Layers. These comparisons are based on the original seven-layer protocol
model as defined in ISO 7498, rather than refinements in such things as the Internal
Organization of the Network Layer document.

Protocols enable an entity in one host to interact with a corresponding entity at the
same layer in a remote host. Service definitions abstractly describe the functionality
provided to a (N)-layer by an (N-1) layer, where N is one of the seven layers inside the
local host.

The OSI Reference Model:

This reference model is proposed by International Standard Organization (ISO) as


a first step towards standardization of the protocols used in various layers in 1983. This
model is called Open System Interconnection (OSI) reference model. It is referred OSI as
it deals with connection open systems. That is the systems are open for communication
with other systems. It consists of seven layers.

Layers of OSI Model:

Application 7
Presentation 6
Session 5
Transport 4
Network 3
Data Link 2
Physical 1

ISO – OSI Reference Model


Networking Essentials – Reference Models 9

The ISO-OSI reference model is as shown in the above figure. As such the model
is not network architecture as it does not specify exact services and protocols. It just tells
what each layer should do and where it lies. The bottom most layer is referred as physical
layer.

Each layer of the ISO-OSI reference model is discussed below:

Layer 1 - Physical Layer:

This layer is the bottom most layer that is concerned with transmitting raw bits
over the communication channel (physical medium). The design issues have to do with
making sure that when one side sends a 1 bit, it is received by other side as a 1 bit and
not as a 0 bit. It performs direct transmission of logical information that is digital bit
streams into physical phenomena in the form of electronic pulses. Modulators/
demodulators are used at this layer. The design issue here largely deals with mechanical,
electrical and procedural interfaces and the physical transmission medium, which lies
below this physical layer.

In particular, it defines the relationship between a device and a physical medium.


This includes the layout of pins, voltages and cable specifications. Hubs, repeaters,
network adapters and Host Bus Adapters (HBAs used in Storage Area Networks) are
physical-layer devices. The major functions and services performed by the physical layer
are:

ƒ Establishment and termination of a connection to a communications medium.

ƒ Participation in the process whereby the communication resources are


effectively shared among multiple users. For e.g., contention resolution and
flow control.

ƒ Modulation is a technique of conversion between the representation of digital


data in user equipment and the corresponding signals transmitted over a
communications channel. These are signals operating over the physical
cabling (such as copper and fiber optic) or over a radio link.

Parallel SCSI buses operate in this layer. Various physical-layer Ethernet


standards are also in this layer; Ethernet incorporates both this layer and the data-link
layer. The same applies to other local area networks, such as Token ring, FDDI and IEEE
802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.

Layer 2 - Data Link Layer:

The Data Link Layer provides the functional and procedural means to transfer
data between networks entitles and to detect and possibly correct errors that may occur
in the Physical Layer. That is it makes sure that the message indeed reach the other end
without corruption or without signal distortion and noise. It accomplishes this task by
having the sender break the input data up into the frames called data frames. The DLL of
transmitter then transmits the frames sequentially and processes acknowledgement
frames sent back by the receiver. After processing acknowledgement frame, may be the
transmitter needs to re-transmit a copy of the frame. So therefore, the DLL at receiver is
required to detect duplications of frames.
Networking Essentials – Reference Models 10

The best-known example of this is Ethernet. This layer manages the interaction of
devices with a shared medium. Other examples of data link protocols are HDLC and
ADCCP for point-to-point or packet-switched networks and Aloha for local area networks.
On IEEE 802 local area networks and some non-IEEE 802 networks such as FDDI, this
layer may be split into a Media Access Control (MAC) layer and the IEEE 802.2 Logical
Link Control (LLC) layer. It arranges bits from the physical layer into logical chunks of
data, known as frames.

This is the layer at which the bridges and switches operate. Connectivity is
provided only among locally attached network nodes forming layer 2 domains for unicast
or broadcast forwarding. Other protocols may be imposed on the data frames to create
tunnels and logically separated layer 2 forwarding domain.

Layer 3 - Network Layer:

The Network Layer provides the functional and procedural means of transferring
variable length data sequences from a source to a destination via one or more networks
while maintaining the quality of service requested by the Transport Layer. The Network
Layer performs network routing functions and might also perform fragmentation and
reassembly and report delivery errors. Routers operate at this layer sending data
throughout the extended network and making the Internet possible. This is a logical
addressing scheme values are chosen by the network engineer. The addressing scheme
is hierarchical.

The best-known example of a layer 3 protocol is the Internet Protocol (IP).


Perhaps it’s easier to visualize this layer as managing the sequence of human carriers
taking a letter from the sender to the local post office, trucks that carry sacks of mail to
other post offices or airports, airplanes that carry airmail between major cities, trucks that
distribute mail sacks in a city and carriers that take a letter to its destination. Think of
fragmentation as splitting a large document into smaller envelopes for shipping or in the
case of the network layer, splitting an application or transport record into packets.

The major tasks of network layer are listed

ƒ It controls routes for individual message through the actual topology.


ƒ Finds the best route.
ƒ Finds alternate routes.
ƒ It accomplishes buffering and deadlock handling.

Layer 4 - Transport Layer:

The transport layer provides transparent transfer of data between end users,
providing reliable data transfer while relieving the upper layers of it. The transport layer
controls the reliability of a given link through flow control, segmentation/de-segmentation
and error control. Some protocols are state and connection oriented. This means that the
transport layer can keep track of the segments and retransmit those that fail. The best-
known example of a layer 4 protocol is the Transmission Control Protocol (TCP).

The transport layer is the layer that converts messages into TCP segments of
User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), etc.
packets. Perhaps an easy way to visualize the Transport Layer is to compare it with a
Post Office, which deals with the dispatch and classification of mail and parcels sent. Do
remember, however, that a post office manages the outer envelope of mail. Higher layers
may have the equivalent of double envelopes, such as cryptographic presentation
services that can be read by the addressee only.
Networking Essentials – Reference Models 11

The major tasks of Transport layer are listed below:

ƒ It locates the other party.


ƒ It creates a transport pipe between both end-users.
ƒ It breaks the message into packets and reassembles them at the destination.
ƒ It applies flow control to the packet stream.

Layer 5 - Session Layer:

The Session Layer controls the dialogues/connections (sessions) between


computers. It establishes, manages and terminates the connections between the local
and remote application. It provides for either full-duplex or half-duplex operation and
establishes check pointing, adjournment, termination and restart procedures. The OSI
Model made this layer responsible for “graceful close” of sessions, which is a property of
TCP and also for session check pointing and recovery, which is not usually used in the
Internet protocol suite.

The major tasks of session layer are listed

ƒ It is responsible for the relation between two end-users.


ƒ It maintains the integrity and controls the data exchanged between the end-
users.
ƒ The end-users are aware of each other when the relation is established
(synchronization).
ƒ It uses naming and addressing to identify a particular user.
ƒ It makes sure that the lower layer guarantees delivering the message (flow
control).

Layer 6 - Presentation Layer:

The Presentation Layer transforms the data to provide a standard interface for the
Application Layer. MIME encoding, data encryption and similar manipulation of the
presentation are done at this layer to present the data as a service or protocol developer
sees fit. Examples of this layer are converting an EBCDIC (Extended Binary Coded
Decimal Interchange Code)-coded text file to an ASCII (American Standard Code for
Information Interchange)-coded file or serializing objects and other data structures into
and out of XML.

The major tasks of presentation layer are listed below:

ƒ It translates the language used by the application layer.


ƒ It makes the users as independent as possible and then they can concentrate
on conversation.

Layer 7 - Application Layer:

The Application Layer is the seventh level of the seven-layer OSI model. It
interfaces directly to the users and performs common application services for the
application processes. It also issues requests to the presentation layer. Carefully noted
that, this layer provides services to user-defined application processes and to the end
user, for e.g., it defines a file transfer protocol but the end user must go through an
application process to invoke file transfer. The OSI model does not include human
interfaces.
Networking Essentials – Reference Models 12

Information Exchange among the Layers:

The seven OSI layers use various forms of control information to communicate
with their peer layers in other computer systems. This control information consists of
specific requests and instructions that are exchanged between peer OSI layers.

Control information typically takes one of two forms: headers and trailers. Headers
are prepended to data that has been passed down from upper layers. Trailers are
appended to data that has been passed down from upper layers. An OSI layer is not
required to attach a header or a trailer to data from upper layers.

Headers, trailers and data are relative concepts, depending on the layer that
analyzes the information unit. At the data link layer, however, all the information passed
down by the network layer (the layer 3 header and the data) is treated as data.

Similar to Network Layer now attaches its header (DH) and Trailer (DT) to the data
that received from network layer. In other words, the data portion of an information unit at
a given OSI layer potentially can contain headers, trailers and data from all the higher
layers. This is known as encapsulation. In the following figure shows how the header and
data from one layer are encapsulated into the header of the next lowest layer. In figure
AH, PH, SH, TH, NH refer to the header of application layer to Network layer respectively.
DT & DH refer to Data link layer Trailer & Header.

Application A Data Application B

Application Data AH Application

Presentation Data + AH PH Presentation

Session Data + AH+PH SH Session

Transport Data + AH+PH+SH TH Transport

Network Data +AH+PH+SH+TH NH Network

Data Link DT Data + AH+PH+SH+TH+NH DH Data Link

Physical Bits Physical

Encapsulation of Data in ISO-OSI Reference Model


Networking Essentials – Reference Models 13

The TCP/IP Reference Model:

The TCP/IP reference model is the network model used in the current Internet
architecture. It was created in the 1970s by DARPA (Defense Advanced Research
Projects Agency) for use in developing the Internet’s protocols and the structure of the
Internet is still closely reflected by the TCP/IP model. It has fewer, less rigidly defined
layers than the commonly referenced OSI Model and thus provides an easier fit for real
world protocols. It is considered as the grandfather of the Internet, the ARPANET
(Advanced Research Projects Agency Network). This was a research network sponsored
by the Department of Defense in the United States.

A goal was of continuing the conversation between source and destination even if
transmission went out of operation. The reference model was named after two of its main
protocols, TCP (Transmission Control Protocol) and IP (Internet Protocol). No document
officially specifies the mode. Different names are given to the layers by different
documents and different numbers of layers are shown by different documents. There are
versions of this model with four layers and with five layers.

The original four-layer version of the model has layers as shown in the following
figure.

Application

Transport

Internetworking

Host
to
Network

TCP/IP Reference Model

Each layer of the TCP/IP reference model is discussed below:

Layer 4 – Process Layer or Application Layer:

This is where the “higher level” protocols such as FTP, HTTP, etc. operate. The
original TCP/IP specification described a number of different applications that fit into the
top layer of the protocol stack. These applications include Telnet, FTP, SMTP and DNS.

Telnet is a program that supports the TELNET protocol over TCP. TELNET is a
general two-way communication protocol that can be used to connect to another host and
run applications on that host remotely.

FTP (File Transfer Protocol) is a protocol that was originally designed to promote
the sharing of files among computer users. It shields the user from the variations of file
storage on different architectures and allows for a reliable and efficient transfer of data.
Networking Essentials – Reference Models 14

SMTP (Simple Mail Transport Protocol) is the protocol used to transport electronic
mail from one computer to another through a series of other computers along the route.

DNS (Domain Name System) resolves the numerical address of a network node
into its textual name or vice-versa. It would translate www.google.com to 172.217.26.228
to allow the routing protocols to find the host that the packet is destined for.

Layer 3 – Transport (Host-to-Host) Layer:

This is where flow-control and connection protocols exist, such as TCP. This layer
deals with opening and maintaining connections, ensuring that packets are in fact
received. The transport layer is the interface between the application layer and the
complex hardware of the network. It is designed to allow peer entitles on the source and
destination hosts to carry on conversations. Data may be user data or control data. Two
modes are available, full-duplex and half-duplex. In full-duplex operation, both sides can
transmit and receive data simultaneously, whereas in half-duplex, a side can only send or
receive at one time.

Layer 2 – Internet or Internetworking Layer:

This layer defines IP addresses, with many routing schemes for navigating
packets from one IP address to another. The job of the network layer is to inject packets
into any network and have them travel independently to the destination. The layer defines
IP (Internet Protocol) for its official packet format and protocol. Packet routing is a major
job of this protocol.

Layer 1 – Network Access Layer:

This layer describes the physical equipment necessary for communications, such
as twisted pair cables, the signaling used on that equipment and the low-level protocols
using that signaling. The Host-To-Network layer interfaces the TCP/IP protocol stack to
the physical network. The TCP/IP reference model does not specify in any great detail the
operation of this layer, except that the host has to connect to the network using some
protocol so it can send IP packets over it. As it is not officially defining, it varies from
implementation to implementation, with vendors supplying their own version.

The basic idea of the networking system is to allow one application on a host
computer to talk to another application on a different host computer. The application
forms its request and then passes the packet down to the lower layers, which add their
own control information, either a header or footer, onto the packet. Finally, the packet
reaches the physical layer and is transmitted through the cable onto the destination host.

The packet then travels up through the different layers, with each layer reading,
deciphering and removing the header or footer that was attached by its counterpart on the
originating computer. Finally, the packet arrives at the application it was destined for.
Even though technically each layer communicates with the layer above or below it, the
process can be viewed as one layer talking to its partner on the host.

Interaction with Application, Transport and Internet Layers:

Interaction between the transport layer and the other layers immediately above
and below is shown in the following figure.
Networking Essentials – Reference Models 15

Application
AP AP AP
Layer

Transport TCP UDP


Layer

Internet IP
Layer

Interactions with Application, Transport and Internet Layers

Any program running in the application layer has the ability to send a message
using TCP or UDP, which are the two protocols defined for the transport layer. The
application can communicate with the TCP or the UDP service, whichever it requires.
Both the TCP and UDP communicate with the Internet Protocol in the internet layer. In all
cases communication is a two-way process. The applications can read and write to the
transport layer. The diagram only shows two protocols in the transport layer.

A message to be sent originates in the application layer. This is then passed down
onto the appropriate protocol in the transport layer. These protocols add a header to the
message for the corresponding transport layer in the destination machine for purposes of
reassembling the message. The segment is then passed onto the internet layer where the
Internet Protocol adds a further header. Finally, the segment is passed onto the physical
layer; a header and a trailer are added at this stage. The following figure shows the
structure of the final segment being sent.

LAN/WAN IP TCP/UDP User data LAN/WAN


Header Header Header Trailer

Transmitted segment from TCP/IP Network

The relations of all protocols that reside in corresponding layers are as shown in
the following figure.

Layer (OSI names)

TELNET FTP SMTP DNS Application

Protocols TCP UDP Transport

IP Network

Networks ARPANET SATNET PACKET LAN Physical +


RADIO Data Link

Protocols in TCP/IP Reference Model


Networking Essentials – Reference Models 16

Comparison of OSI and TCP/IP Reference Model:

Concepts central to the OSI model are:

ƒ Services: It tells what the layer does.

ƒ Interfaces: It tells the processes above it how to access it. It specifies what
parameters are and what result to expect.

ƒ Protocols: It provides the offered service. It is used in a layer and are layers own
business.

The TCP/IP did not originally distinguish between the service, interface &
protocols. The only real services offered by the internet layer are SEND IP packets and
RECEIVE IP packets.

The OSI model was devised before the protocols were invented. Data link layer
originally dealt only with point-to-point networks. When broadcast networks came around,
a new sub-layer had to be hacked into the model. With TCP/IP the reverse was true, the
protocols came first and the model was really just a description of the existing protocols.
This TCP/IP model did fit any other protocol stack.

The OSI Model has seven layers and TCP/IP has four layers as shown in the
following figure.

OSI TCP/IP

7 Application Application

6 Presentation Not present in


the model
5 Session
4 Transport Transport
3 Network Internet
2 Data Link Host-To-Network
1 Physical

Comparison of the two reference models

Another difference is in the area of connectionless and connection-oriented


services. The OSI model supports both these services in the network layer but supports
only connection-oriented communication in the transport layer. Whereas the TCP/IP has
supports only connection less communication in the network layer and supports both
these services in the transport layer.
Networking Essentials – Network Standardization 17

Chapter 3: NETWORK STANDARDIZATION


Network standardization is a definition that has been approved by a recognized
standards organization. Standards exist for programming languages, operating systems,
data formats, communication protocols and electrical interfaces.

Two classes of standard organizations

(i) Organizations established by treaty among national governments


(ii) Voluntary, non-treaty organizations

From a user’s standpoint, standards are extremely important in the computer


industry because they allow the combination of products from different manufacturers to
create a customized system. Without standards only hardware and software from the
same company could be used together. In addition, standard user interfaces can make it
much easier to learn how to use new applications.

Most official computer standards are set by one of the following organizations:

ƒ ANSI (American National Standards Institute)


ƒ ITU (International Telecommunication Union)
ƒ IEEE (Institute of Electrical and Electronic Engineers)
ƒ ISO (International Standards Organization)
ƒ VESA (Video Electronics Standards Association)

Benefits of Standardization:

ƒ Allow different computers to communicate.


ƒ Increase the market for product adhering to the standard.

Who’s who in the Telecommunication World?

ƒ PTT (Post, Telegraph & Telephone) administration: nationalized


telecommunication companies (most of the world).

ƒ ITU (International Telecommunication Union): an agency of the UN for


international telecommunication coordination.

ƒ CCITT (Consultative Committee for International Telephony and Telegraphy):


one of the parts of ITU specialized for telephone and data communication
systems.

Who’s who in the Standards World?

ISO is a voluntary, non-treaty organization founded in 1946, with members from


89 member countries. The procedure for ISO to adopt standards:

ƒ First, one of the national standards organizations feels the need for an
international standard in some area.

ƒ A working group is then formed to come up with a CD (Committee Draft).


Networking Essentials – Network Standardization 18

ƒ The CD is then circulated to all the member bodies, which get six months to
criticize it.

ƒ If a substantial majority approves, a revised document, called a DIS (Draft


International Standard) is produced and circulated for comments and voting.

Based on the results of this round, the final text of the IS (International Standard)
is prepared, approved and published.

IEEE (Institute of Electrical and Electronics Engineers) is the largest professional


organization in the world, is another major player in the standards world, e.g., IEEE’s 802
standard for LANs has been taken over by ISO as the basis for ISO 8802.

Who’s who in the Internet Standards World?

The worldwide Internet has its own standardization mechanism, different from
those of ITU-T and ISO. When ARPANET was set up, DoD created an informal
committee. In 1983 the committee was renamed the IAB (Internet Activities Board). Then
the meaning was changed as to Internet Architecture Board. Communication was done
by a series of technical reports called RFCs (Request for Comments). RFCs are stored
on-line and can be fetched by anyone interested in them. They are numbered in
chronological order of creation.

There was another group called IRTF (Internet Research Task force), which was
made subsidiary to IAB along with the IETF (Internet Engineering Task Force). Later, the
Internet society was created. IRTF concentrated on long term research and IETF dealt
with short term engineering issues and was divided into working groups, each with
specific problem to solve.

IEEE Standards:

IEEE has standardized a number of LAN’s and MAN’s under the name of IEEE
802. Few of the standards are listed in the following figure. The most important of the
survivors are 802.3 (Ethernet) and 802.11 (Wireless LAN). Both these two standards
have different physical layers and different MAC sub-layers but converge on the same
logical link control sub layer so they have same interface to the network layer.

IEEE 802 Standards:

IEEE No. Name Title


802.3 Ethernet CSMA/CD Network (Ethernet)
802.4 Token Bus Networks
802.5 Token Ring Networks
802.6 Metropolitan Area Networks
802.11 Wi-Fi Wireless Local Area Networks
802.15.1 Bluetooth Wireless Personal Area Networks
802.15.4 ZigBee Wireless Sensor Networks
802.16 WiMA Wireless Metropolitan Area Networks
List of IEEE standards for LAN and MAN
Networking Essentials – Network Standardization 19

Ethernets:

Ethernet was originally based on the idea of computers communicating over a


shared coaxial cable acting as a broadcast transmission medium. The methods used
show some similarities to radio systems, although there are major differences, such as
the fact that it is much easier to detect collisions in a cable broadcast system than a radio
broadcast. The common cable providing the communication channel was likened to the
ether and it was from this reference that the name “Ethernet” was derived.

From this early and comparatively simple concept, Ethernet evolved into the
complex networking technology that today powers the vast majority of local computer
networks. The coaxial cable was later replaced with point-to-point links connected
together by hubs and/or switches in order to reduce installation costs, increase reliability
and enable point-to-point management and troubleshooting. Star LAN was the first step in
the evolution of Ethernet from a coaxial cable bus to a hub-managed, twisted-pair
network.

Above the physical layer, Ethernet stations communicate by sending each other
data packets, small blocks of data that are individually sent and delivered. As with other
IEEE 802 LANs, each Ethernet station is given a single 48-bit MAC address, which is
used both to specify the destination and the source of each data packet. Network
Interface Cards (NICs) or chips normally do not accept packets addressed to other
Ethernet stations. Adapters generally come programmed with a globally unique address,
but this can be overridden either to avoid an address change when an adapter is replaced
or to use locally administered addresses.

The most kinds of Ethernets used were with the data rate of 10 Mbps. The
following table gives the details of the medium used, number of nodes per segment and
distance it supported along with the application.

Name Cable Max. Seg. Nodes/Seg. Advantages


Original cable; now
10Base5 Thick Coax 500 m 100
obsolete
10Base2 Thin Coax 185 m 30 No hub needed
10Base-T Twisted Pair 100 m 1024 Cheapest system
10Base-F Fiber Optics 2000 m 1024 Best between buildings
Different 10Mbps Ethernets used

Fast Ethernet:

Fast Ethernet is a collective term for a number of Ethernet standards that carry
traffic at the nominal rate of 100 Mbit/s. Of the 100 megabit Ethernet standards
100baseTX is by far the most common and is supported by the vast majority of Ethernet
hardware currently produced. Full duplex fast Ethernet is sometimes referred to as “200
Mbit/s” though this is somewhat misleading as that level of improvement will only be
achieved if traffic patterns are symmetrical. Fast Ethernet was introduced in 1995 and
remained the fastest version of Ethernet for three years before being superseded by
Gigabit Ethernet.
Networking Essentials – Network Standardization 20

A Fast Ethernet adapter can be logically divided into a Medium Access Controller
(MAC) which deals with the higher-level issues of medium availability and a physical layer
interface (PHY). The MAC may be linked to the PHY by a 4 bit 25 MHz synchronous
parallel interface known as MII (Media-Independent Interface). Repeaters (Hubs) are also
allowed and connect to multiple PHYs for their different interfaces.

ƒ 100BASE-T is any of several Fast Ethernet standards for twisted pair cables.
ƒ 100BASE-TX (100 Mbit/s over two-pair Cat5 or better cable).
ƒ 100BASE-T4 (100Mbit/s over four-pair Cat3 or better cable).
ƒ 100BASE-T2 (100 Mbit/s over two-pair Cat3 or better cable).

The segment length for a 100BASE-T cable is limited to 100 meters. Most
networks had to be rewired for 100-megabit speed whether or not they had supposedly
been Cat3 or cat5 cable plants. The vast majority of common implementations or
installations of 100BASE-T are done with 100BASE-TX.

100BASE-TX is the predominant form of Fast Ethernet and runs over two pairs of
Category 5 or above cable. A typical Category 5 cable contains 4 pairs and can therefore
support two 100BASE-TX links. Each network segment can have a maximum distance of
100 meters. In its typical configuration, 100BASE-TX uses one pair of twisted wires in
each direction, providing 100 Mbit/s of throughput in each direction (full-duplex).

The configuration of 100Base-TX networks is very similar to 10BASE-T. When


used to build a local area network, the devices on the network are typically connected to
a hub or switch, creating a star network. Alternatively, it is possible to connect two
devices directly using a crossover cable.

In 100BASE-T2, the data is transmitted over two copper pairs, 4 bits per symbol.
First, a 4 bit symbol is expanded into two 3-bit symbols through a non-trivial scrambling
procedure based on a linear feedback shift register.

100BASE-FX is a version of Fast Ethernet over optical fiber. It uses two strands of
multi-mode optical fiber for receive (RX) and transmit (TX). Maximum length is 400
meters for half-duplex connections or 2 kilometers for full-duplex.

100BASE-SX is a version of Fast Ethernet over optical fiber. It uses two strands of
multi-mode optical fiber for receive and transmit. It is a lower cost alternative to using
100BASE-FX, because it uses short wavelength optics which are significantly less
expensive than the long wavelength optics used in 100BASE-FX. 100BASE-SX can
operate at distances up to 300 meters.

100BASE-BX is a version of Fast Ethernet over a single strand of optical fiber


(unlike 100BASE-FX, which uses a pair of fibers). Single-mode fiber is used, along with a
special multiplexer which splits the signal into transmit and receive wavelengths.

Gigabit Ethernet:

Gigabit Ethernet (GbE) is a term describing various technologies for transmitting


Ethernet packets at a rate of a gigabit per second, as defined by the IEEE 802.3-2005
standard. Half-duplex gigabit links connected through hubs are allowed by the
specification but in the marketplace full-duplex with switches is the norm.
Networking Essentials – Network Standardization 21

Gigabit Ethernet, increasing the speed to 1000 Mbit/s. The initial standard for
Gigabit Ethernet was standardized by the IEEE in June 1998 as IEEE 802.3z. 802.3z is
commonly referred to as 1000BASE-X (where -X refers to either -CX, -SX, -LX or -ZX).

IEEE 802.3ab, ratified in 1999, defines Gigabit Ethernet transmission over


unshielded twisted pair (UTP) Category 5e or 6 cabling and became known as
1000BASE-T. With the ratification of 802.3ab, Gigabit Ethernet became a desktop
technology as organizations could utilize their existing copper cabling infrastructure.

Initially, Gigabit Ethernet was deployed in high-capacity backbone network links


(for instance, on a high-capacity campus network). Fiber Gigabit Ethernet has recently
been overtaken by 10 Gigabit Ethernet which was ratified by the IEEE in 2002 and
provided data rates 10 times that of Gigabit Ethernet. Work on copper 10 Gigabit Ethernet
over twisted pair has been completed, but as of July 2006, the only currently available
adapters for 10 Gigabit Ethernet over copper require specialized cabling.

However, the 10GBase-T standard specifies use of the traditional RJ-45


connectors and longer maximum cable length. Different Gigabit Ethernets are listed in the
following table.

Name Medium
1000BASE-T Unshielded twisted pair
1000BASE-SX Multi-mode fiber
1000BASE-LX Single-mode fiber
1000BASE-CX Balanced copper cabling
1000BASE-ZX Single-mode fiber
Networking Essentials – Data Transmission Modes 22

Chapter 4: DATA TRANSMISSION MODES


There are different ways of transmitting the information. In this section we will
study these various methods with their relative merits and demerits.

Serial & Parallel:

Serial communication is the sequential transmission of the signal elements of a


group representing a character or other entity of data. The characters are transmitted in a
sequence over a single line, rather than simultaneously over two or more lines as in
parallel transmission as shown in the following figure.

Tx Rx
Transmitter Rx Tx Receiver

Ground Ground

Serial Transmission: one bit at a time

The sequential elements may be transmitted with or without interruption. Parallel


communication refers to when data is transmitted byte-by-byte i.e., all bits of one or more
bytes are transmitted simultaneously over separate wires as shown in the following figure.
D0

Transmitter Receiver

D8

Parallel Transmission: Several bits at a time

In serial transmission it sends and receives information in serial format, i.e. one
binary digit (bit) at a time. But in parallel transmission it sends and receives information in
parallel format, i.e. one byte (8 bits) at a time. This concept of serial and parallel
transmission is shown in the following figure.

Parallel Transmission

Serial Transmission

Concept of Serial and Parallel Transmission


Networking Essentials – Data Transmission Modes 23

The comparisons of the serial and parallel transmission modes are listed in the
following table.

Serial mode Parallel mode


Cost Less costly (only one wire) More costly (many wires)
Speed Low (only 1 bit at a time) High (8 bits at a time)
Throughput Low High
Used in Longer distance communication Shorter distance communication

Comparison of serial and parallel transmission mode

Simplex, Half-Duplex & Full-Duplex:

Simplex refers to communications in only one direction from the transmitter to the
receiver as shown in the following figure. There is no acknowledgement of reception from
the receiver, so errors cannot be conveyed to the transmitter. For example, a radio is a
simplex device; TV broadcast is a simplex device.

A B
Simplex

Half-duplex refers to two-way communications but in only one direction at a time


as shown in the following figure. For example, a walkie-talkie is a half-duplex device,
transfer of inventory data from a warehouse to an accounting office is a half-duplex
system.

A B
Half-Duplex

Full-duplex refers to simultaneous two-transmission as shown in the following


figure. For example, certain computer video cards, Telephone, Mobile phone are full-
duplex devices and videoconferencing represents a full-duplex application. Full-duplex
provided maximum function and performance.

A B
Full-Duplex
Networking Essentials – Data Transmission Modes 24

Synchronous & Asynchronous Transmission:

Synchronous Transmission:

Synchronous is any type of communication in which the parties communicating


are “live” or present in the same space and time. A chat room where both parties must be
at their computer connected to the internet and using software to communicate in the chat
room protocols is a synchronous method of communication.

The two ends of a link are synchronized by carrying the transmitter’s clock
information along with date. Bytes are transmitted continuously, if there are gaps then
inserts idle bytes as padding.

Advantage:

ƒ This reduces overhead bits


ƒ It overcomes the two main deficiencies of the asynchronous method, that of
inefficiency and lack of error detection.

Disadvantage:

ƒ For correct operation the receiver must start to sample the line at the correct instant.

Application:

ƒ Used in high-speed transmission.

Asynchronous Transmission:

Asynchronous refers to processes that proceed independently of each other until


one process needs to “interrupt” the other process with a request. Using the client-server
model, the server handles many asynchronous requests from its many clients. The client
is often able to proceed with other work or must wait on the service requested from the
server. E-mail is an example of an asynchronous mode of communication where one
party can send a note to another person and the recipient need not be online to receive
the e-mail.

Advantage:

ƒ The character is self-contained & Transmitter and receiver need not be synchronized
ƒ Transmitting and receiving clocks are independent of each other.

Disadvantage:

ƒ Overhead of start and stop bits


ƒ False recognition of these bits due to noise on the channel

Application:

ƒ If channel is reliable, then suitable for high-speed else low speed transmission
ƒ Most common use is in the ASCII terminals.
Networking Essentials – Network Topologies 25

Chapter 5: NETWORK TOPOLOGIES


Topology is a term used to describe the way in which computers are connected in
network. The physical topology of a network refers to the configuration of cables,
computers and other peripherals. Physical topology should not be confused with logical
topology which is the method used to pass information between workstations. Each
topology is suited to specific tasks and has its own advantages and disadvantages.

The choice of topology is dependent upon

ƒ Type and number of equipment being used


ƒ Planned applications and rate of data transfers
ƒ Required response times
ƒ Cost

It is to find the most economical and efficient way to connect all the users to the
networks resources while providing adequate capacity to handle user demands, maintain
system reliability and minimize delay. Many topologies do exist but most commonly there
are 3 types of basic topologies used for networking computers.

Network Topologies are logical layouts of the network. The term “logic” used here
marks a great significant, which means network topologies depend not on the “physical”
layout of the network. No matter that computers on a network are placed in a linear
format, but if they connected via a hub/switch they are forming a Star Topology, not the
Bus Topology. And here is the important factor where networks differ, visually and
operationally.

Linear Bus Topology:

The type of network topology in which all of the nodes of the network are connected to a
common transmission medium which has exactly two endpoints is called the ‘bus’. That is
transmitted between nodes in the network is transmitted over this common transmission
medium and is able to be received by all nodes in the network virtually simultaneously. It
consists a single main cable connects each node. The bus topology is as shown in the
following figure.

File Server Nodes

Nodes Printer

Linear Bus Topology


Networking Essentials – Network Topologies 26

The network operating system keeps track of unique electronic address for each
node and manages the flow of information. A single cable is dedicated to all the
information traffic; performance can be slow at a times. This topology is often bound in
client-server systems (example, File Server: dedicated solely to the distribution of data
files). This topology is most commonly used, as it can be easily expandable as the
network grows.

Advantages:

ƒ Easy to connect a computer or peripheral to a linear bus.


ƒ Requires less cable length than a Star Topology.

Disadvantages:

ƒ Entire network shuts down if there is a break in the main cable.


ƒ Terminators are required at both ends of the backbone cable.
ƒ Difficult to identify the problem if the entire network shuts down.
ƒ Not meant to be used as a stand-alone solution in a large building.

Ring Topology:

This type of network topology in which each of the nodes of the network is
connected to two other nodes in the network and with the first and last nodes being
connected to each other, forming a ring. Ring Topology looks something like shown in the
following figure. That is the nodes are connected in a circle using cable segments. Each
node is physically connected only to two others.

All data that is transmitted between nodes in the network travels from one node to
the next node in a circular manner and the data generally flows in a single direction.
Performance can be faster. Found in peer-to-peer networks. The operation and working
of LAN using ring topology illustrated in standard IEEE 802.5.

Ring Topology
Networking Essentials – Network Topologies 27

Star Topology:

A Star Topology is designed with each node connected directly to a central


network hub or switch as shown in the following figure. Data on a star network passes
through the hub or switch before continuing to its destination. The hub or switch manages
and controls all functions of the network. It also acts as a repeater for the data flow. This
configuration is common with twisted pair cable; however, it can also be used with coaxial
cable or fiber optic cable.

Nodes
Hub or Switch

Printer
File Server
Star Topology

Advantages:

ƒ Easy to install and wire.


ƒ No disruptions to the network then connecting or removing devices.
ƒ Easy to detect faults and then remove faulty parts.
ƒ Has the advantage of minimum data traffic along the cables (node to server).

Disadvantages:

ƒ It requires more cable length than a linear bus topology.


ƒ If the hub or switch fails, nodes attached are disconnected.
ƒ Star Topology is more expensive than linear bus topology because of the cost of hub
or switch.
ƒ It requires an extremely powerful and expensive file server, plus additional cable.

Tree Topology:

A Tree Topology combines characteristics of linear bus and star topologies. It


consists of groups of star configured workstations connected to a linear bus backbone
cable is as shown in the following figure. Tree topologies allow for the expansion of an
existing network.
Networking Essentials – Network Topologies 28

Nodes

Nodes

Printer
Hub/Switch
Backbone Cable

File Server

Tree Topology

Advantages:

ƒ Point-to-Point wiring for individual segments.


ƒ Supported by several hardware and software vendors.

Disadvantages:

ƒ The type of cabling used limits overall length of each segment.


ƒ If the backbone line breaks, the entire segment goes down.
ƒ More difficult to configure and wire than other topologies.
Networking Essentials – Protocols 29

Chapter 6: PROTOCOLS
Network protocols define a language of rules and conventions for communication
between network devices. A protocol is essentially a “language” that a computer uses to
communicate and the other computer to which it is connected must use the same
language for communication to take place. Computers use many different protocols to
communicate, which has given rise to the OSI reference model, which defines the layers
at which different protocols operate.

Transport Layer Protocols:

The transport layer is the fourth layer of the OSI Reference Model. It provides
transparent transfer of data between end systems using the services of the network layer.
The details of the two transport layer protocols i.e., TCP & UDP are given below:

TCP Protocol:

The Transmission Control Protocol (TCP) is one of the core protocols of the
Internet protocol suite, often simply referred to as TCP/IP. Using TCP, applications on
networked hosts can create connections to one another, over which they can exchange
streams of data using Stream Sockets. The protocol guarantees reliable and in-order
delivery of data from sender to receiver. TCP also distinguishers data for multiple
connections by concurrent applications (e.g., Web server and e-Mail server) running on
the same host.

TCP supports many of the Internet’s most popular application protocols and
resulting applications, including the World Wide Web, e-Mail, File Transfer Protocol and
Secure Shell.

In the Internet protocol suite, TCP is the intermediate layer between the Internet
Protocol (IP) below it and an application above it. Applications often need reliable pipe-
like connections to each other, whereas the Internet Protocol does not provide such
streams, but rather only best effort delivery (i.e., unreliable packets). TCP does the task
of the transport layer in the simplified OSI model of computer networks. The other main
transport-level Internet Protocol is UDP.

Application send streams of octets to TCP for delivery through the network and
TCP divides the byte stream into appropriately sized segments (usually delineated by the
maximum transmission unit (MTU) size of the data link layer of the network to which the
computer is attached). TCP then passes the resulting packets to the Internet Protocol, for
delivery through a network to the TCP module of the entity at the other end, TCP checks
to make sure that no packets are lost by giving each packet a sequence number, which is
also used to make sure that the data is delivered to the entity at the other end in the
correct order. The TCP module at the far end sends back an acknowledgement for
packets which have been successfully received; a timer at the sending TCP will cause a
timeout if an acknowledgement is not received within a reasonable round-trip time (or
RTT), and the (presumably lost) data will then be re-transmitted. The TCP checks that no
bytes are corrupted by using a checksum; one is computed at the sender for each block
of data before it is sent and checked at the receiver.
Networking Essentials – Protocols 30

TCP segment structure:

A TCP segment consists of two sections: header and data.

The header consists of 11 fields, of which only 10 are required. The eleventh field
is optional and aptly named: options.

16–31
+ Bits 0–3 4–7 8–15
0 Source Port Destination Port
32 Sequence Number
64 Acknowledgement Number
Data
96 Reserved Flags Window
Offset
128 Checksum Urgent Pointer
160 Options (optional)

160/192+ Data

TCP Header Format

ƒ Source Port: This field identifies the sending port.

ƒ Destination Port: This field identifies the receiving port.

ƒ Sequence Number: The sequence number has a dual role. If the SYN flag is present
then this is the initial sequence number and the first data byte is the sequence
number plus 1. Otherwise, if the SYN flag is not present then the first data byte is the
sequence number.

ƒ Acknowledgement number: If the ACK flag is set then the value of this field is the
sequence number that the sender of the acknowledgement expects next.

ƒ Data offset: This 4-bit field specifies the size for the TCP header in 32-bit words. The
minimum size header is 5 words and the maximum is 15 words thus giving the
minimum size of 20 bytes and maximum of 60 bytes. This field gets its name from the
fact that it is also the offset from the start of the TCP packet to the data.

ƒ Reserved: 4-bit reserved field for future use and should be set to zero.

ƒ Flags (control bits): This field contains 8 bit flags.

o CWR: Congestion Window Reduced (CWR) flag is set by the sending host to
indicate that it received a TCP segment with the ECE flag set.

o ECE: ECN-Echo flag. Used to indicate that the TCP peer is ECN capable during
3-way handshake.

o URG: Urgent pointer field is significant


Networking Essentials – Protocols 31

o ACK: Acknowledgement field is significant

o PSH: Push function

o RST: Reset the connection

o SYN: Synchronize sequence numbers

o FIN: No more data from sender

ƒ Window: The number of bytes the sender is willing to receive starting from the
acknowledgement field value.

ƒ Checksum: The 16-bit checksum field is used for error-checking of the header and
data.

UDP Protocol:

User Datagram Protocol (UDP) is one of the core protocols of the Internet
Protocol suite. Using UDP, programs on networked computers can send short messages
sometimes known as datagrams (using Datagram Sockets) to one another. UDP is
sometimes called the Universal Datagram Protocol or Unreliable Datagram Protocol.

UDP does not guarantee reliability or ordering in the way that TCP does.
Datagrams may arrive out of order, appear duplicated or go missing without notice.
Avoiding the overhead of checking whether every packet actually arrived makes UDP
faster and more efficient, at least for applications that do not need guaranteed delivery.
Time-sensitive applications often use UDP because dropped packets are preferable to
delayed packets. UDP’s stateless nature is also useful for servers that answer small
queries from huge numbers of clients. Unlike TCP; UDP supports packet broadcast
(sending to all on local network) and multicasting (send to all subscribers).

Common network applications that use UDP include the Domain Name System
(DNS), streaming media applications such as IPTV, Voice over IP (VoIP), Trivial File
Transfer Protocol (TFTP) and online games.

UDP uses ports to allow application-to-application communication. The port field is


16-bits so the valid range is 0 to 65,535. Port 0 is reserved, but is a permissible source
port value if the sending process does not expect messages in response. Ports 1 through
1023 are named “well-known” ports requires root access. Ports 1024 through 49,151 are
registered ports.

Ports 49,152 through 65,535 are ephemeral ports and are used as temporary
ports primarily by clients when communicating to servers.

Packet Structure:

UDP is a minimal message-oriented transport layer protocol. In the Internet


Protocol suite, UDP provides a very simple interface between a network layer below and
a session layer or application layer above, UDP provides no guarantees to the upper
layer protocol for message delivery and a UDP sender retains no state on UDP
messages once sent. For this reason, UDP is sometimes called the Unreliable Datagram
Protocol. UDP adds only application multiplexing and check summing of the header and
payload. If any kind of reliability of the information transmitted is needed, if must be
implemented in upper layers.
Networking Essentials – Protocols 32

+ Bits 0 – 15 16 – 31
0 Source Port Destination Port
32 Length Checksum
64 Data

UDP Header Format

The UDP header consists of only 4 fields. The use of two of those is optional.

ƒ Source Port: This field identifies the sending port when meaningful and should be
assumed to be the port to reply to if needed. If not used, then it should be zero.

ƒ Destination Port: This field identifies the destination port and is required.

ƒ Length: A 16-bit field that specifies the length in bytes of the entire datagram: header
and data. The minimum length is 8 bytes since that’s the length of the header. The
field size sets a theoretical limit of 65,527 bytes for the data carried by a single UDP
datagram.

ƒ Checksum: The 16-bit checksum field is used for error-checking of the header and
data.

CSMA Protocol:

Carrier Sense Multiple Access (CSMA) is a probabilistic Media Access Control


(MAC) protocol in which a node verifies the absence of other traffic before transmitting on
a shared physical medium, such as an electrical bus or a band of electromagnetic
spectrum.

“Carrier Sense” describes the fact that a transmitter listens for a carrier wave
before trying to send. That is, it tries to detect the presence of an encoded signal from
another station before attempting to transmit. If a carrier is sensed, the node waits for the
transmission in progress to finish before initiating its own transmission.

“Multiple Access” describes the fact that multiple nodes send and receive on the
medium. Transmissions by one node are generally received by all other nodes using the
medium.

Collisions:

Concurrent transmission by multiple nodes results in frame collisions. The multiple


transmissions interfere with each other so that all are garbled and receivers are unable to
distinguish the overlapping received signals from each other. It is impossible to entirely
prevent collisions in CSMA networks, but there are three ways to address them.

In pure CSMA, only the carrier sense is used to avoid collisions. If two nodes try to
send a frame at nearly the same, neither detects a carrier so both begin transmitting. The
transmitters do not detect collisions, so transmit the entire frame (thus wasting the
bandwidth used). Receivers cannot distinguish between collisions and other sources of
frame errors, so collision recovery relies on the ability of the communicating nodes to
detect frame errors and invoke an error recovery procedure. For example, the receiver
may not send a required ACK, causing transmitter to time out and retry.
Networking Essentials – Protocols 33

Non-Persistent CSMA:

Non-Persistent CSMA is less greedy. The algorithm is given below:

• Sense the channel.


• If the channel is idle. Then transmit.
• If the channel is busy, then wait a random amount of time and start over.

1 – Persistent CSMA:

1-Persistent CSMA is selfish. The algorithm is given below:

• Sense the channel.


• If the channel is idle, then transmit.
• If the channel is busy, then continue to listen until channel is idle. Now transmit
immediately.

P – Persistent CSMA:

P – Persistent CSMA is a slotted approximation. The algorithm is given below:

• Sense the channel.


• If the channel is idle, then with probability p transmits and with probability (1-p)
delay for one time slot and start over.
• If the channel is busy, then delay one time-slot and start over.

P – Persistent CSMA details the time slot is usually set to the maximum
propagation delay. As p decreases, stations wait longer to transmit but the number of
collisions decreases. Considerations for the choice of p: (n x p) must be < 1 for stability,
where n is maximum number of stations.

In all three cases a collision is possible. CSMA determines collisions by the lack of
an ACK which results in a TIMEOUT. This is extremely expensive with respect to
performance. If a collision occurs, THEN wait a random amount of time and start over.

CSMA/CD Protocol:

In computer networking, Carrier Sense Multiple Access with Collision Detection


(CSMA/CD) is a network control protocol in which a carrier sensing scheme is used. A
transmitting data station that detects another signal while transmitting a frame, stops
transmitting that frame, transmits a jam signal and then waits for a random time interval.
The random time interval also known as “back off delay” is determined using the
truncated binary exponential back off algorithm. This delay is used before trying to send
that frame again; CSMA/CD is a modification of pure Carrier Sense Multiple Access
(CSMA).
Networking Essentials – Protocols 34

Collision detection is used to improve CSMA performance by terminating


transmission as soon as a collision is detected and reducing the probability of a second
collision on retry. Methods for collision detection are media dependent, but on an
electrical bus such as Ethernet, collisions can be detected by comparing transmitted data
with received data. If they differ, another transmitter is overlaying the first transmitter’s
signal (a collision), and transmission terminates immediately. The general flow chart of
CSMA/CD protocol is as shown in the following figure. Here the collision recovery
algorithm is nothing but a binary exponential algorithm that determines the waiting time
for retransmission. If the number of collisions for the frame hits 16, then the frame is
considered as not recoverable.

There is data from


Start user to send

Assemble a frame MAC Addresses


are used

Attempt 1

Is some other station


transmitting? Yes
No Recovered
Transmit 1st bit of the
frame

Yes Collision
Collision detected? recovery
sub-algorithm
No
Transmit
No
next bit of Transmission finished? Not
the frame Recovered
Yes
End End

Frame transmitted Frame transmission failed


successfully (too many collisions)

Simplified Algorithm of CSMA/CD

High Level Data Link Control Protocol (HDLC):

This is most commonly used standard that is implemented at the Data link layer. It
is a bit-oriented protocol. It is developed by ISO as a superset of SDLC. The frame format
for HDLC is as shown in the following figure and control field of 8 bits is expanded as
shown in the following figure.

Bits 8 8 8 ≥0 16 8

01111110 Address Control Data Checksum 0 1 1 1 1 1 1 0

HDLC Frame Format


Networking Essentials – Protocols 35

Bits 1 3 1 3

(a) 0 Seq P/F Next

(b) 1 0 Type P/F Next

(c) 1 1 Type P/F Modifier

Control field for (a) an information frame, (b) A supervisory frame


and (c) An unnumbered frame

HDLC can be used for point to multipoint connections, but is now used almost
exclusively to connect one device to another, using what is known as Asynchronous
Balanced Mode (ABM). The other modes are Normal response Mode and Asynchronous
Response Mode.

HDLC frames can be transmitted over synchronous or asynchronous links. Those


links have no mechanism to mark the beginning or end of a frame, so the beginning and
end of each frame has to be identified. This is done by using a frame delimiter, or flag,
which is a unique sequence of bits that is guaranteed not to be seen inside a frame. This
sequence is ‘0 1 1 1 1 1 1 0 ’ or in hexadecimal notation, 7E. Each frame begins and ends
with a frame delimiter. It consists of three different frames.

(i) I Frames: This frame has the control field as shown in above figure (a). These are
used to transport user data from the network layer. They also include flow and error
control information piggybacked on data. Seq, which defines the sequence number of
frames that is transmitted from source to destination. P/F, which defines Poll/final
field, and is a single bit with dual purpose. It is called Poll when used by the primary
station to obtain a response from a secondary station and Final when used by the
secondary station to indicate a response or the end of transmission. Next field also
defines the sequence number of a frame, but gives a number that the source machine
is expecting from the destination machine in a two-way communication system.

(ii) Supervisory Frames: This frame has the control field as shown in above figure (b).
These frames are used for flow and error control whenever piggybacking is
impossible or inappropriate. For example, when primary field has to send only
command or response or acknowledge and not data. S-Frame does not have
information fields. The type field is used for retransmission.

There are four types defined in this frame. They are:

(a) Receive ready: used when there is no reverse traffic. It is an acknowledgement


frame used to indicate the next frame expected.

(b) Reject: It is also an acknowledgement frame, indicating transmission error has


been detected. This frame is used to indicate the “next” field is the first frame in
sequence not received correctly.
Networking Essentials – Protocols 36

(c) Receiver not ready: It acknowledges all frames up to but not including next.

(d) Selective reject: It calls for retransmission of only that frame specified in the next
field.

(iii) U-Frames: This frame has the control field as shown in above figure (c). These are
used for link management. They are used to exchange session management and
control information between connected devices. U-frame contains an information field
used for system management information and not user data.

Point-to-Point Protocol (PPP):

A data-link layer TCP/IP protocol used for WAN connections, especially dial-up
connections to the Internet and other service providers. Unlike its progenitor, the SLIP,
PPP includes support for multiple network layer protocols, link quality monitoring
protocols and authentication protocols. PPP is used for connections between two
computers only and therefore does not need many of the features found in LAN protocols,
such as address fields for each packet and a MAC mechanism.

Point-to-Point Tunneling Protocol (PPTP):

A data-link layer protocol used to provide secured communications for VPN


connections. VPNs are private network connections that use the Internet as a network
medium. The secure the data as it is transmitted across the Internet, the computers use a
process called tunneling, in which the entire data-link layer frame generated by an
application process is encapsulated within an IP datagram. This arrangement violates the
rules of the OSI reference model, but it enables the entire PPP frame generated by the
user application to be encrypted inside an IP datagram.

Post Office Protocol, version3 (POP3):

This is an application layer protocol used for to retrieve e-mail files from an e-mail
server. Whenever you connect to a POP3 e-mail server, all messages addressed to your
e-mail address are downloaded into your e-mail application. Once e-mail files are
downloaded, you can view, modify and/or delete the messages without further assistance
from the POP3 server. POP3 can be used with or without SMTP.

Internet Mail Access Protocol, version4 (IMAP4):

IMAP is similar to POP3, but supporting additional features. IMAP4 allows


downloading e-mail, looking at or downloading the message header, store messages at
hierarchical structure and link to documents. It also provides search commands that allow
locating messages based on their subject, header or content. IMAP4 also allows users to
manipulate their e-mail and e-mail folders while disconnected from their main messaging
system and to synchronize to their message store once the connection is re-established.
IMAP4 also contains authentication components, which supports the Kerberos
authentication method.
Networking Essentials – Protocols 37

Simple Mail Transfer Protocol (SMTP):

As its name implies, SMTP is used to send e-mail. One thing to remember is how
SMTP compares with POP3, which can be used with or without POP3. SMTP uses the
spooled or queued method to deliver e-mail. An e-mail is sent to destination and is
spooled to a hard disk drive. The destination e-mail server regularly checks the spooled
e-mail queue for new e-mails and when it finds new e-mails forwards or sends them to
their destinations.

Most internet-based e-mail services use SMTP to send e-mails along-with wither
POP3 or IMAP4 to receive e-mails. SMTP is generally used to send messages between
mail servers. This is why you need to specify both the POP3 and SMTP server IP
address when you configure your e-mail application.

Simple Network Management Protocol (SNMP):

An application layer TCP/IP protocol and query language used to transmit


information about the status of network components to a central network management
console. Components embedded into network hardware and software products called
SNMP agents are responsible for collecting data about the activities of the products they
service storing the data in a Management Information Base (MIB) and transmitting that
data to the console at regular intervals using SNMP messages.

Telecommunications Network Protocol (Telnet):

Telnet stands for Telephone Network, so called because most Telnet sessions
occur over a dial-up network. Telnet is a terminal emulation program often used to
connect a remote computer to a Web server but can connect to any kind of server. Once
the connection is established, you enter and execute commands using a command
prompt. Telnet depends on TCP for transport service and reliable delivery. To start a
Telnet session, using a Telnet client, you must log on to a Telnet server by entering a
valid username and password. When you access another computer and run a program, it
is the processor in the remote computer that executes that program. However, all
versions of Windows include a Telnet client.

Hypertext Transfer Protocol (HTTP):

This is an application layer protocol, which is the basis for World Wide Web (www)
communications. Web browsers generate HTTP GET request messages containing URLs
and transmit them to web servers, which reply with one or more HTTP response
messages containing the requested files. HTTP traffic is encapsulated using the TCP at
the transport layer and the IP at the network layer. Each HTTP transaction requires a
separate TCP connection. HTTP resides in the application layer of the OSI model, uses
little bandwidth and supports the use of both text and graphics.

Secure Hypertext Transfer Protocol (HTTPS):

HTTPS is the secure version of the HTTP. HTTPS offer secure message-oriented
communications and is designed for use with HTTP. HTTPS allows browsers and servers
sign, authenticate and encrypt an HTTP network packet. HTTPS uses the Secure Socket
Layer (SSL) and Transport Layer Security (TLS) protocols for security.
Networking Essentials – Protocols 38

Internet Control Message Protocol (ICMP):

A network layer TCP/IP protocol that carries administrative messages, particularly


error messages and informational queries. ICMP error messages are primarily generated
by intermediate systems that because the packets they route travel no higher than the
network layer, have no other means of signaling errors to the end system that transmitted
the packet. Typically, ICMP error messages inform the sender that the network or host to
which a packet is addressed could not be found or that the Time to Live (TTL) value for a
packet has expired. ICMP query messages request information from other computers and
are the basis for TCP/IP utilities like Ping, which is used to test the ability of one computer
on a network to communicate with another.

Internet Protocol (IP):

This is the primary network layer protocol in the TCP/IP suite. IP is the protocol
that is ultimately responsible for end-to-end communications on a TCP/IP internetwork
and it includes functions such as addressing, routing and fragmentation. IP packages
data that it receives from transport layer protocols into data units called datagram by
applying a header containing the information needed to transmit the data to its
destination. The IP addressing system uses 32-bit addresses to uniquely identify the
computers on a network and specifies the address of the destination system as part of
the IP header. IP is also responsible for routing packets to their destinations on other
networks by forwarding them to other routers on the network. When a datagram is too
large to be transmitted over a particular network, IP breaks it into fragments and transmits
each in a separate packet.

IP Security (IPSec):

IPSec is a security protocol that provides authentication and encryption over the
Internet. It operates at the Network layer and secures all packets operating in the upper
OSI layer. It works with IPv4 and IPv6 and has broad industry support. IPSec uses either
Authentication Header (AH) or Encapsulating Security Payload (ESP) to ensure sender
authentication and data encryption. It is most often used to secure VPN on the Internet
using digital certificates sent from the server to authenticate the sender.

Layer 2 Tunneling Protocol (L2TP):

L2TP was designed by the Internet Engineering Task Force (IETF) to support
non-TCP/IP protocols using VPNs over the Internet. L2TP combines the best features of
two tunneling protocol: PPTP (Point-to-Point Tunneling Protocol) and L2F (Layer 2
Forwarding). As the name implies, it operates at Layer 2 of the OSI reference model.
L2TP uses packet-switched network connections, making it possible for endpoints to be
located on different nodes. It supports a number of protocols, including IP and AppleTalk.
L2TP is a good protocol to use when you have two non-TCP/IP networks that must have
internet access.

Lightweight Directory Access Protocol (LDAP):

LDAP is a set of session layer protocols used to access X.500 information


directories. It is based on the earlier X.500 standard but is simpler and also supports
TCP/IP. Both Microsoft’s Active Directory and Novell’s eDirectory are based on the X.500
standard. LDAP provides directory services on a network. LDAP is used for management
applications and browser applications that need simple read/write interactive access to
the X.500 directory. This is the primary access protocol for the Active Directory service.
Networking Essentials – Protocols 39

Address Resolution Protocol (ARP):

ARP is a network layer protocol that resolves network (IP) addresses into
hardware (MAC) addresses. ARP uses the address resolution cache table built into every
NIC. This table maps IP addresses to MAC addresses on the network. Whenever a node
needs to send a packet, it checks the address resolution cache table to see if the MAC
address information for the destination is there. If so, that destination address will be
used. If not, an ARP broadcast request is issued.

ARP is a low-level protocol usually implemented in the device drivers of network


operating systems. ARP is most commonly utilized on Ethernet networks. Before
transmitting an IP datagram, TCP/IP clients broadcast an ARP request message
containing the IP address of the destination computer of the local network. The computer
using that IP address must then respond with an ARP reply message containing its
hardware address. With the information in the reply message, the computer can
encapsulate the IP datagram in the appropriate data-link layer frame and transmit it to the
destination system.

Reverse Address Resolution Protocol (RARP):

RARP uses a host MAC address to discover its IP address. The host broadcasts
its MAC physical address and a RARP server replies with the host’s IP address.

Dynamic Host Configuration Protocol (DHCP):

This is a service that automatically configures the TCP/IP client computers on a


network by assigning them unique IP address and other configuration parameters. DHCP
servers can assign IP address to clients from a pool and reclaim them when a lease of a
set duration expires. Virtually all operating systems include a DHCP client and most of the
major server operating systems, such as MS Windows 2016 Server, MS Windows 2012
Server, MS Windows 2008 Server, MS Windows 2003 Server, MS Windows 2000 Server,
Windows NT Server, Novell Netware and many forms of UNIX include DHCP server
software. DHCP is a cross-platform service that can support various operating systems
with a single server.

Bootstrap Protocol (BOOTP):

A server application that can supplies client computers with IP address, other
TCP/IP configuration parameters and executable boot files. As the progenitor to the
DHCP, BOOTP provides the same basic functions, except that it does not allocate IP
addresses from a pool and reclaim them after a specified length of time. Administrators
must supply the IP address and other settings for each computer to be configured by the
BOOTP server.

File Transfer Protocol (FTP):

The FTP is an application layer protocol that allows a user to upload or download
files between hosts. FTP is the simplest way to exchange file between computers on the
Internet and is used on the Web to download files. It’s often compared to HTTP, which
transfers Web pages, and to SMTP, which transfers e-mails.
Networking Essentials – Protocols 40

FTP operates as a protocol when used by applications. However, FTP also can
operate as a program. Users can use FTP to access directories and files and to perform
directory operations such as relocating directories or files. FTP is limited to listening and
manipulating directories, typing file contents and transferring files between computers.
FTP cannot execute remote files as programs. When paired with Telnet, FTP allows for
seamless login to an FTP server for file transfers. FTP also offers authentication security.

Trivial File Transfer Protocol (TFTP):

TFTP is also similar to FTP in that it facilitates file transfer between computers.
The difference between FTP and TFTP is speed. FTP uses TCP, which is reliable but has
high overhead, and TFTP uses UDP, which uses much less bandwidth, offering greater
speeds but less reliably.

Secure File Transfer Protocol (SFTP):

SFTP is an interactive command-line application and file transfer program, similar


to FTP. The SFTP utility comes with SSH or Secure Shell suite to provide encryption over
insecure networks such as the Internet. It can also use public key authentication and file
compression. SFTP connects and logs into the specified host, and then uses an
interactive command prompt for file transfers. SFTP is used when you want to eliminate
the security risk involved in using standard FTP file transfers. Because of the security
risks, you should only use FTP for anonymous logins.

Secure Shell (SSH):

SSH is an application program used to log into another computer on a network,


execute commands, and transfer files back and forth. SSH offers secure data transfers as
compared to using rlogin, telnet or FTP. Actually, SSH is a suite of protocols; slogin, ssh
and scp requires that the server and client are both running SSH software. It uses strong
authentication methods and secure communications. Because the entire session is
encrypted, SSH protects against network attacks. SSH uses the RSA public-key
encryption technology authentication method and can be used on Windows, UNIX and
Mac computers.

Network Time Protocol (NTP):

NTP is an internet standard application protocol that sets computer clocks to a


standard time source. An NTP designated server on a LAN is often deployed to
periodically connect to an NTP server on the internet, assuring accurate synchronization
of the LAN NTP server’s time clock down to the millisecond. The LAN NTP server then
clocks and, if necessary, adjusts all other servers and client computers time clocks
assuring accurate time and date stamping of client files.

Network News transport Protocol (NNTP):

NNTP is an application layer protocol used for the distribution, inquiry, retrieval
and posting of news articles and USENET messages. USENET is a bulletin board system
that contains more than 14,000 forums, called newsgroups. Millions of people around the
world use NNTP to view, access and use their favorite newsgroup forums.
Networking Essentials – Protocols 41

Secure Copy Protocol (SCP):

SCP is based upon and is very similar to SFTP. It uses SSH for safe, secure
copying files between local and a remote computer. SCP requires the local computer
running SCP client software.

Internet Group Multicast Protocol (IGMP):

IGMP is a network layer protocol that is used by an internet computer to report its
multicast group membership to adjacent routers. Multicasting allows an internet computer
to send content to multiple computers. Multicasting is used to send out company
newsletters to an e-mail distribution list and to broadcast high–bandwidth programs using
streaming media to a multicast group membership audience.

Line Printer Remote (LPR):

LPR is a printer protocol, originally developed for and used on UNIX systems.
Today, it’s the de-facto printing protocol used to print across different NOS platforms. The
LPR client sends a print request to the IP address of the LPD print server. The LPD print
sever queues and prints the file. To enable LPR, LPR must be installed on the client
computer.

Authentication Protocols:

Challenge Handshake Authentication Protocol (CHAP):

Challenge is an authentication protocol that uses a hashed algorithm called


Message Digest 5 (MD5) that provides client response encryption. Remote Access
Service servers, some Network Access servers and some Proxy servers support using
CHAP. CHAP is supported on PPP connections and requires authentications not only
when initially making the connection, but also during the session. Failure to authenticate
will result in session being ended. CHAP is a weak, one-way authentication protocol.

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP):

ƒ MS-CHAP v1: It offers more security than CHAP and is an authentication


protocol that uses a challenge handshake process. A Remote Access Server
sends a challenge to the remote client. The remote access client sends back a
response containing the user name and a non-reversible, encrypted password
challenge string. The RAS checks the response determining its validity and, if
valid, authenticates the user. Microsoft CHAP v1 is supported on Windows
NT4 Server, Windows 2000 Server and Windows 2003 Servers.

ƒ MS-CHAP v2: It is an authentication protocol that offers strong security than


MS-CHAP v1 by providing mutual authentication. Using two-way or mutual
authentication, the client’s username and password are validated by the RAS.
The Windows 2000 family, Windows XP and Windows Server 2003 all support
using MS-CHAP v2. Note that MS-CHAP v2 authentication is not compatible
with MS-CHAP v1.
Networking Essentials – Protocols 42

Password Authentication Protocol (PAP):

PAP is the weakest authentication protocol that sends the username and
password in clear text (no encryption) over the network to be verified by the RAS. PAP
should only be used as a last resort only if the RAS does not support stronger
authentication protocols. Most all NOS remote servers support PAP.

Remote Authentication Dial-in User Service (RADIUS):

RADIUS is an industry standard authentication protocol that provides


authentication, authorization and accounting services. A RADIUS client such as a dial-up
server, RADIUS Proxy Server or VPN Server sends username, password and connection
information in a RADIUS message to a RADIUS Server. The RADIUS Server sends a
RADIUS message response that authorizes and authenticates the RADIUS client.

Kerberos:

Kerberos is more than a strong, secure network authentication protocol. It’s a full-
fledged security system designed to provide strong authentication for client-server
applications by using secret-key cryptography. Created at MIT, Kerberos establishes a
user’s identity as soon as he or she logs on to a network where Kerberos supported. A
unique key (ticket) is issued to each user after the user logs on to the network. All
network messages that the user sends over the network contain this unique key used to
identify the user-sender. The user identification and security credentials contained in the
embedded ticket are used throughout the entire network session. The encryption used by
the Kerberos is freely available. The source code can also be downloaded via the
Internet. The Windows 2000 family, Windows XP, Windows Server 2003 and above,
UNIX, Novell and Linux all support Kerberos.

Extensible Authentication Protocol (EAP):

EAP is a general protocol that provides support for several different authentication
protocols such as EAP-TLS (EAP-Transport Level Security), MS-CHAP, Kerberos,
certificates, public key authentication and smart cards. It is often used by wireless devices
to connect to a RADIUS authentication server. A wireless client requests a WAN
connection from an AP, which requests the identity of the user and transmits the user
identity to an authentication server such as RADIUS. The RADIUS Server asks the AP for
proof of identity, gets it, and sends it back to the Server.

EAP-TLS uses certificates for user authentication such as smart cards. Smart
cards are often used with laptop and notebook PCs to provide remote access
authentication. EAP-TLS provides mutual authentication, negotiation of encryption type
and is the strongest authentication protocol method.
Networking Essentials – Port Number 43

Chapter 7: PORT NUMBER

A port number is a way to identify a specific process to which an Internet or other


network message is to be forwarded when it arrives at a server. For the Transmission
Control Protocol and the User Datagram Protocol, a port number is a 16-bit integer that is
put in the header appended to a message unit. This port number is passed logically
between client and server transport layers and physically between the transport layer and
the Internet Protocol layer and forwarded on.

For example, a request from a client to a server on the Internet may request a file
be served from that host's File Transfer Protocol (FTP) server or process. In order to pass
your request to the FTP process in the remote server, the Transmission Control Protocol
(TCP) software layer in your computer identifies the port number of 21 (which by
convention is associated with an FTP request) in the 16-bit port number integer that is
appended to your request. At the server, the TCP layer will read the port number of 21
and forward your request to the FTP program at the server.

Some services or processes have conventionally assigned permanent port


numbers. These are known as well-known port numbers. In other cases, a port number is
assigned temporarily (for the duration of the request and its completion) from a range of
assigned port numbers. This is called an ephemeral port number.

Well-known Port Number:

The well-known port numbers are the port numbers that are reserved for
assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for
use by the application end points that communicate using the Internet's Transmission
Control Protocol (TCP) or the User Datagram Protocol (UDP). Each kind of application
has a designated (and thus "well-known") port number. For example, a remote job entry
application has the port number of 5; the Hypertext Transfer Protocol (HTTP) application
has the port number of 80; and the Post Office Protocol Version 3 (POP3) application,
commonly used for e-mail delivery, has the port number of 110. When one application
communicates with another application at another host computer on the Internet, it
specifies that application in each data transmission by using its port number.

The port field is 16-bits so the valid range is 0 to 65,535. Port 0 is reserved, but is
a permissible source port value if the sending process does not expect messages in
response. Ports 1 through 1023 are named “well-known” ports requires root access. Ports
1024 through 49,151 are registered ports.

Ports 49,152 through 65,535 are ephemeral ports and are used as temporary
ports primarily by clients when communicating to servers.

On most systems, a well-known port number can only be used by a system (root)
process or by a program run by a privileged user. Before the arrival of ICANN, the well-
known port numbers were administered by the Internet Assigned Numbers Authority
(IANA).
Networking Essentials – IP Address 44

Chapter 8: IP ADDRESS

Addressing is one of the main functions of the Internet Protocol (IP), the one that
is primarily responsible for the protocol suite’s cross-platform interoperability. Every
device on a TCP/IP network must have a unique IP address, which enables any other
device to send traffic directly to it, even devices on remote networks.

An IP Address is a 32-bit binary value that is typically expressed a four 8-bit


decimal numbers, separated by periods, as in 192.168.35.221. This is called dotted
decimal notation. Each of the four 8-bit values is called an octet, or sometimes a quad or
a byte. To convert a binary address into dotted decimal notation, you split the 32-bits into
four 8-bit groups and convert each group separately, as follows:

11000000 10101000 00100011 11011101


192 168 35 221 = 192.168.35.221

An 8-bit binary number can have 256 possible values, which are represented in
decimal form as the numerals 0 to 255. An IP address can never have a value greater
than 255 for one of its octets.

An IP address identifies both a specific TCP/IP device (called a host) and the
network on which the device is located. This is possible because every IP address
consists of two parts: a network identifier and a host identifier. The network identifier
always precedes the host identifier, but the dividing line between the two can be located
anywhere in the 32-bit value. This two-tiered arrangement (a common one on the
Internet) is what makes the administration of IP addresses practical on a large scale.

The Internet is by far the largest TCP/IP network in existence, with millions of
computers located on thousands of networks around the world. Every one of those
computers visible from the Internet has to have a unique IP address. Rather than
undertake the monumental task of creating a central registrar to keep track of each of
these millions of addresses, a body called the Internet Assigned Numbers Authority
(IANA) functions as a registrar for networks, assigning identifiers to networks all over the
world. The administrators of the individual networks are then responsible for assigning
host identifiers to each computer on their networks.

Network Identifiers:

The network identifier indicates the TCP/IP hosts that are located on the same
physical network. All hosts on the same physical network must be assigned the same
network identifier to communicate with each other. If you are running an internetwork that
consists of multiple networks connected by routers, a unique network ID is required for
each network, including each WAN connection (which is a separate network unto itself).

A computer with more than one network interface must have a separate IP
address for each interface. When a TCP/IP network is to be connected to the Internet, it
must use a network address assigned by the IANA. This is to prevent the existence of
duplicate IP addresses in the Internet. Today, virtually all network addresses are
registered with the IANA by ISPs. If a network is not connected to the Internet, it does not
have to use a registered network address.
Networking Essentials – IP Address 45

Host Identifiers:

The host identifier is a value assigned to a specific network interface connected to


a network. Every host identifier assigned to a network interface on a given network must
be unique. In other words, you can have duplicate host identifiers on your network, but
only if they have different network identifiers. When two computes on a network have
exactly the same IP address, usually neither of them functions properly. Because, the
operating systems check for a duplicate IP address when the computer starts and if it
finds one, disables the TCP/IP client until a proper address is assigned.

IP Address Classes:

The IANA assigns network addresses in different classes, based on the number of
hosts that the network has to support. In a classfull system, IP addresses can be grouped
in to one of five different classes: A, B, C, D, and E. Each of the four octets of an IP
address represents either the network portion or the host portion of the address,
depending on the address's class.

Only the first three classes (A, B, and C) are used for addressing actual hosts on
IP networks. Class D addresses are used for multicasting, and Class E addresses are
reserved for experimentation. The following sections explore each of the five classes of
addresses.

Class A Addresses:

If the first bit of the first octet of an IP address is a binary 0, then the address is a
Class A address. With that first bit a 0, the lowest number that can be represented is
00000000 (decimal 0), and the highest number that can be represented is 01111111
(decimal 127). Any address that starts with a value between 0 and 127 in the first octet is
a Class A address. These two numbers, 0 and 127, are reserved and cannot be used as
a network address.

Class A addresses were intended to accommodate very large networks, so only


the first octet is used to represent the network number, which leaves three octets (or 24
bits) to represent the host portion of the address. With 24 bits total, 224 combinations are
possible, yielding 16,777,216 possible addresses. Two of those possibilities, the lowest
and highest values (24 zeros and 24 ones), are reserved for special purposes, so each
Class A address can support up to 16,777,214 unique host addresses.

Why are two host addresses reserved for special purposes? Every network
requires a network number, an ID number that is used to refer to the entire range of hosts
when building routing tables. The address that contains all 0s in the host portion is used
as the network number and cannot be used to address an individual node. 46.0.0.0 is a
class A network number. Similarly, every network requires a broadcast address that can
be used to address a message to every host on a network. It is created when you have all
1s in the host portion of the address.

With almost 17 million host addresses available, a Class A network actually


provides too many possibilities for one company or campus. You can imagine an
enormous global network with that many nodes.
Networking Essentials – IP Address 46

How many Class A addresses are there? If only the first octet is used as network
number, and it contains a value between 0 and 127, then 126 Class A networks exist.
There are only 126 Class A addresses, each with almost 17 million possible host
addresses which makes up about half of the entire IPv4 address space! Under this
system, a mere handful of organizations control half of the Internet's addresses.

Class B Addresses:

Class B addresses start with a binary 10 in the first 2 bits of the first octet.
Therefore, the lowest number that can be represented with a Class B address is
10000000 (decimal 128), and the highest number that can be represented is 10111111
(decimal 191). Any address that starts with a value in the range of 128 to 191 in the first
octet is a Class B address.

Class B addresses were intended to accommodate medium-size networks, so the


first two octets are used to represent the network number, which leaves two octets (or 16
bits) to represent the host portion of the address. With 16 bits total, 216 combinations are
possible, yielding 65,536 Class B addresses. Recall that two of those numbers, the
lowest and highest values, are reserved for special purposes, so each Class B address
can support up to 65,534 hosts. Though significantly smaller than the networks created
by Class A addresses, a logical group of more than 65,000 hosts is still unmanageable
and impractical.

There are 16,384 Class B networks. The first octet of a Class B address offers 64
possibilities (128 to 191), and the second octet has 256 (0 to 255). That yields 16,384 (64
* 256) addresses, or 25 percent of the total IP space. Nevertheless, given the popularity
and importance of the Internet, these addresses have run out quickly, which essentially
leaves only Class C addresses available for new growth.

Class C Addresses:

A Class C address begins with binary 110. Therefore, the lowest number that can
be represented is 11000000 (decimal 192), and the highest number that can be
represented is 11011111 (decimal 223). If an IPv4 address contains a number in the
range of 192 to 223 in the first octet, it is a Class C address.

Class C addresses were originally intended to support small networks; the first
three octets of a Class C address represent the network number, and the last octet may
be used for hosts. One octet for hosts yields 256 possibilities; after you subtract the all 0s
network number and all 1s broadcast address; only 254 hosts may be addressed on a
Class C network. Whereas Class A and Class B networks prove impossibly large, Class
C networks can impose too restrictive a limit on hosts.

With 2,097,152 total network addresses containing a mere 254 hosts each, Class
C addresses account for 12.5 percent of the Internet's address space. With Class A and
B exhausted, the remaining Class C addresses are all that is left to be assigned to new
organizations that need IP networks. The figure summarizes the ranges and availability of
three address classes used to address Internet hosts.
Networking Essentials – IP Address 47

Class D Addresses:

A Class D address begins with binary 1110 in the first octet. Therefore, the first
octet range for Class D addresses is 11100000 to 11101111, or 224 to 239. Class D
addresses are not used to address individual hosts. Instead, each Class D address can
be used to represent a group of hosts called a host group, or multicast group.

A multicast is different from a broadcast. Every device on a logical network


receives a broadcast, whereas only devices configured with a Class D address receive a
multicast.

Class E Addresses:

If the first octet of an IP address begins with 1111, then the address is a Class E
address. Class E addresses are reserved for experimental purposes and should not be
used for addressing hosts or multicast groups.

The properties of above three classes (A, B & C) are shown in the following table.

Class A Class B Class C


Subnet Mask 255.0.0.0 255.255.0.0 255.255.255.0
Values of First Bits 0 10 110
Values of First Byte 1 – 127 128 – 191 192 – 223
Number of Network Bits 8 16 24
Number of Host Bits 24 16 8
Number of Networks 126 16,384 2,097,152
Number of Hosts 16,777,214 (224–2) 65,524 (216–2) 254 (28–2)

IP addresses that are registered with the IANA are essential for computers that
are to be visible from the Internet, such as Web, E-Mail servers. However, there are
situations in which computers that access the Internet do not required registered
addresses, such as when you use network address translation (NAT) or a proxy server to
provide users with Internet connectivity. In these cases, you can theoretically use any IP
addresses for your network, as long as you follow the standard addressing rules, such as
having the same network identifier for all the computers on a single LAN. However,
simply choosing network addresses at random can lead to problems. If you happen to
select an address that is already registered to another Internet site, for example, your
users will have problems accessing that site.

To address this problem, the IANA has allocated specific ranges of IP addresses
for use on private networks. These addresses are not registered to any single user, and
therefore will not cause conflicts. The following table lists the private network addresses
for each of the address classes. It is strongly recommended that you use these
addresses when building an unregistered network, whether you are currently connecting
it to the Internet or not.
Networking Essentials – IP Address 48

Class Network Address


A 10.0.0.0 through 10.255.255.255
B 172.16.0.0 through 172.31.255.255
C 192.168.0.0 through 192.168.255.255
IP Address Ranges for Private Networks

Automatic Private IP Addressing (APIPA):

Automatic Private Internet Protocol Addressing (APIPA) is a common alternative


to the use of the Dynamic Host Configuration Protocol (DHCP) to request and retrieve an
Internet Protocol (IP) address for a host. APIPA simplifies the assignment of IP address
and subnet-mask configuration information to hosts in small networks. When APIPA is
used, the operating system allows the assignment of a unique IP address to each station
on a small local area network (LAN). This avoids the administrative overhead of running a
DHCP server or manually setting IP configuration information.

A feature of Microsoft Windows, APIPA is a DHCP failover mechanism. With


APIPA, DHCP clients can obtain IP addresses when DHCP servers are nonfunctional.
APIPA exists in all popular versions of Microsoft Windows except Windows NT.

When a DHCP client boots up, it first looks for a DHCP server in order to obtain
an IP address and subnet mask. If the client is unable to find the information, APIPA
allocates addresses in the private range 169.254.0.1 to 169.254.255.254 that has been
reserved especially for Microsoft. The client also configures itself with a default Class B
subnet mask of 255.255.0.0. Clients verify their address is unique on the LAN using ARP.
When the DHCP server is again able to service requests, clients update their addresses
automatically.

The APIPA service also checks regularly for the presence of a DHCP server. If it
detects a DHCP server on the network, APIPA stops, and the DHCP server replaces the
APIPA networking addresses with dynamically assigned addresses.

APIPA is enabled on all DHCP clients in Microsoft Windows unless the computer's
Registry is modified to disable it. APIPA can be enabled on individual network adapters.

Awareness of the range of addresses used with APIPA is useful in


troubleshooting. While APIPA is employed in many small environments that consist of
100 stations or fewer and no routers, it is normally not found in larger networks. If an IP
address in this range does appear during testing on a large network, verify that the host in
question is properly connected to the network. Also, while a home user can employ
APIPA on their network, the external network interface connected to the Internet should
not have an IP address in the APIPA range, unless a proxy or Network Address
Translation (NAT) device is used for the Internet connection. According to IANA rules, the
private address range APIPA uses is not for use on the public Internet.
Networking Essentials – Subnet Mask 49

Chapter 9: SUBNET MASK


A subnet mask is a 32-bit number that acts as a counterpart to the IP address.
Each bit in the mask corresponds to its counterpart bit in the IP address. If a bit in the IP
address corresponds to a 1 bit in the subnet mask, the IP address bit represents a
network number. If a bit in the IP address corresponds to a 0 bit in the subnet mask, the
IP address bit represents a host number.

Most of the addressing systems used in computer networking use multiple


identifiers for a single device. However, in most of these cases, the identifiers are of fixed
lengths. For example, the hardware addresses assigned to Ethernet and Token Ring
NICs all consist of a 3-byte code that identifies the device’s manufacturer and a 3-byte
code that identifies the specific device. IP addresses are different, however, in that the
network and host identifiers are not always the same length. Depending on the
configuration of your internetwork, you can use addresses that support a large number of
networks with relatively few hosts per network or a few networks with a large number of
hosts on each. This would be done by using addresses with different sized identifiers.

The main problem caused by having identifiers of variable lengths is that there is
no obvious way to determine where the network identifier in an IP address ends and
where the host identifier begins. To resolve this problem, TCP/IP clients always include
what is known as a subnet mask with each address. A subnet mask is a 32-bit binary
value that uses 1s and 0s to designate the network and host identifiers. A 1 indicates a
network identifier bit and a 0 indicates a host identifier bit. As with an IP address, the 32
bits are then converted into dotted decimal notation. For example, if the IP address
192.168.35.221 is paired with a subnet mask of 255.255.255.0, this means that the first
three octets of the IP address (192.168.35) are the network identifier and the last octet
(221) is the host identifier. Because, when you convert the address and mask to binary
form, you see the following:

IP Address : 11000000 10101000 00100011 11011101


(192) (168) (35) (221)

Subnet Mask : 11111111 11111111 11111111 00000000


(255) (255) (255) (0)

The presence of the 1 bit in the mask indicates that the corresponding bits in the
IP address are the network identifier bits.
Networking Essentials – Default Gateway 50

Chapter 10: DEFAULT GATEWAY


A gateway is a node (a router) on a TCP/IP Network that serves as an access
point to another network.

A Default Gateway is the node on the computer network that is chosen when the
IP address does not match any other routes in the Routing Table.

In homes, the gateway is usually the ISP-provided device that connects the user
to the Internet, such as a DSL or cable modem. In enterprises, however, the gateway is
the node that routes the traffic from a workstation to another network segment. The
default gateway is commonly used to be the node connecting the internal networks and
the outside network (Internet). In such a situation, the gateway node could act as a proxy
server and a firewall. The gateway is also associated with both a router, which uses
headers and forwarding tables to determine where packets are sent, and a switch, which
provides the actual path for the packet in and out of the gateway. In other words, it is an
entry point and an exit point in a network.

A default gateway is used by a host when an IP packet's destination address


belongs to someplace outside the local subnet. The default gateway address is usually an
interface belonging to the LAN's border router.
Networking Essentials – TCP/IP Tools 51

Chapter 11: TCP/IP TOOLS

Virtually every operating system with networking capabilities includes support for
the TCP/IP protocols and in most cases; the TCP/IP implementation also includes an
assortment of programs that enable you to gather information about the various protocols
and the network. Traditionally, these utilities run from the command line, although
graphical versions are sometimes supplied. In many cases, a program uses the same
syntax, even on different operating systems. The most common TCP/IP utilities are
discussed below:

Ping:

Ping is the most basic of the TCP/IP utilities. Virtually every TCP/IP
implementation includes a version of it. In all versions of the Windows operating system, it
is called Ping.exe. Ping can tell you if the TCP/IP stack of another system on the network
is functioning normally. The Ping program generates a series of Echo Request messages
using the Internet Control Message Protocol (ICMP) and transmits them to the computer
whose name or IP address you specify on the command line. At its most basic, the syntax
of the Ping.exe program is as follows:

ping target

The target variable contains the IP address or name of a computer on the


network. You can use either DNS names or NetBIOS names in ping commands. The
program resolves the name into an IP address before sending the Echo Request
messages, and it then displays the address in its readout. Most ping implementations
also have command-line switches that enable you to modify the operational parameters
of the program, such as the number of Echo request messages it generates and the
amount of data in each message.

All TCP/IP computers must respond to any echo request messages they receive
that are addressed to them by generating Echo reply messages and transmitting them
back to the sender. The payload data included in the request message is copied to the
replies before they are transmitted. When the pinging system receives the Echo Reply
messages, it produces a display like the following

C:\>ping 192.168.1.1

Pinging 192.168.1.1 with 32 bytes of data:

Reply from 192.168.1.1: bytes=32 time=2ms TTL=64


Reply from 192.168.1.1: bytes=32 time=2ms TTL=64
Reply from 192.168.1.1: bytes=32 time=2ms TTL=64
Reply from 192.168.1.1: bytes=32 time=2ms TTL=64

Ping statistics for 192.168.1.1:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 2ms, Maximum = 2ms, Average = 2ms
Networking Essentials – TCP/IP Tools 52

In the case of the Windows operating systems Ping implementation, the display
shows the IP address of the computer receiving the Echo Requests, the number of bytes
of data included with each request, the elapsed time between the transmission of each
request and the receipt of each reply, and the value of the Time to Live (TTL) field in the
IP header. A successful use of Ping like this one indicates that the target computer’s
networking hardware is functioning properly, as are the protocols, at least as high as the
network layer of OSI reference model. If the Ping test fails, either one or both of the
computers is experiencing a problem with its networking hardware or software or some
device on the network is blocking ICMP traffic.

Tracert.exe:

Tracert.exe is a variant of the ping program that displays the path that packets
take to their destination. Because of the nature of IP routing, paths through an
internetwork can change from minute to minute, and Tracert.exe displays a list of the
routers that are currently forwarding packets to a particular destination.

Tracert.exe uses ICMP Echo request and Echo reply messages just like ping, but
it modifies the messages by changing the value of the TTL field in the IP header of each
message. The TTL field is designed to prevent packets from getting caught in router
loops that keep them circulating endlessly around the network. The computer generating
the packet normally sets a relatively high value for the TTL field; on Windows systems,
the default value if 128. Each router that processes the packet reduces the TTL value by
one. If the value reaches zero, the last router discards the packet and transmits an ICMP
error message back to the original sender.

When you run Tracert.exe with the name or IP address of a target computer, the
program generates its first set of Echo request messages with TTL values of 1. When the
messages arrive at the first router on their path, the router decrements their TTL values to
0, discards the packets and reports the errors to the sender. The ICMP error messages
contain the router’s address, which the Tracert.exe program displays as the first hop in
the path to the destination. Tracert’s second set of Echo Request messages use a TTL
value of 2, causing the second router on the path to discard the packets and generate
error messages. The Echo Request messages in the third set have a TTL value of 3, and
so on. Each set of packets travels one hop farther than the previous set before causing a
router to return error messages to the source. The list of routers displayed by the program
as the path to the destination is the result of these error messages. The following is an
example of the Tracert.exe display

C:\>tracert www.google.com

Tracing route to www.google.com [216.58.197.36]


over a maximum of 30 hops:

1 2 ms 1 ms 1 ms 192.168.1.1
2 69 ms 63 ms 61 ms 10.213.102.110
3 62 ms 60 ms 57 ms 10.213.102.74
4 64 ms 64 ms 70 ms 117.227.128.2
5 71 ms 59 ms 60 ms 117.210.254.17
6 74 ms 67 ms 55 ms 117.216.206.229
7 * * * Request timed out.
8 76 ms 77 ms 225 ms 117.216.207.208
9 58 ms 67 ms 70 ms 117.216.207.209
10 * * * Request timed out.
11 * * * Request timed out.
Networking Essentials – TCP/IP Tools 53

12 * * * Request timed out.


13 * * * Request timed out.
14 * * * Request timed out.
15 127 ms * 253 ms maa03s20-in-f36.1e100.net [216.58.197.36]

Trace complete.

In this example, each of the entries contains the elapsed times between the
transmission and reception of three sets of Echo Request and Echo Reply packets. In this
trace you can clearly see the point at which the packets begin travelling across the Globe.
This is the time to takes the packets to travel the thousands of miles across the Globe.

The syntax for Tracert.exe is as follows:

tracert.exe target

Tracert.exe can be a handy tool for isolating the location of a network


communications problem. Ping simply tells you whether a problem exists; it can’t tell you
where it is. A failure to contact a remote computer, or in any of the routers in between
Tracert.exe can tell you how far your packets are going before they run into the problem.

Pathping.exe:

The Pathping.exe program is a route-tracing tool that combines features of


Ping.exe and Tracert.exe with additional information that neither of these tools provides.
The Pathping command sends packets to each router on the way to a final destination
over a period of time and then computes results based on the packets returned from each
hop. Because the command shows the degree of packet loss at any given router or link, it
is easy to determine which routers or links might be causing network problems.

The syntax for Pathping.exe is as follows:

pathping target

The following is a typical Pathping.exe report. The compiled statics that follow the
hop list indicate packet loss at each individual router.

C:\>pathping www.google.com

Tracing route to www.google.com [216.58.197.36]


over a maximum of 30 hops:

0 PC [192.168.1.2]
1 192.168.1.1
2 10.213.102.110
3 10.213.102.74
4 117.227.128.2
5 117.210.254.17
6 117.216.206.229
7 * * *
Networking Essentials – TCP/IP Tools 54

Computing statistics for 150 seconds...


Source to Here This Node/Link
Hop RTT Lost/Sent = Pct Lost/Sent = Pct Address
0 PC [192.168.1.2]
0/ 100 = 0% |
1 11ms 0/ 100 = 0% 0/ 100 = 0% 192.168.1.1
0/ 100 = 0% |
2 91ms 0/ 100 = 0% 0/ 100 = 0% 10.213.102.110
0/ 100 = 0% |
3 81ms 0/ 100 = 0% 0/ 100 = 0% 10.213.102.74
0/ 100 = 0% |
4 89ms 0/ 100 = 0% 0/ 100 = 0% 117.227.128.2
0/ 100 = 0% |
5 94ms 0/ 100 = 0% 0/ 100 = 0% 117.210.254.17
100/ 100 =100% |
6 --- 100/ 100 =100% 0/ 100 = 0% 117.216.206.229

Trace complete.

When you run Pathping.exe, you first see the result for the route as the program
tests it for problems. This is the same path that is shown by the Tracert.exe program.
Pathping.exe then displays a busy message for the next 150 seconds (this time varies
according to the hop count). During this time, Pathping.exe gathers information from all
the routers previously listed and from the links between them. At the end of this period the
program displays the test results.

The two rightmost columns – This Node/Link Lost/sent=Pct and Address – contain
the most useful information. All links are working normally.

The loss rates displayed for the links (marked as a | in the rightmost column)
indicate losses of packets being forwarded along the path. This loss indicates link
congestion. The loss rates displayed for routers (indicated by their IP addresses in the
rightmost column) indicate that those routers might be overloaded. These congested
routers might also be a factor in end-to-end problems, especially if packets are forwarded
by software routers.

Ipconfig.exe:

The Windows 7 TCP/IP client includes a program called Ipconfig.exe that displays
the current TCP/IP configuration for the computer’s network interface adapters.

When you run Ipconfig.exe at the Windows 7 command line, the following will be
displayed:

C:\>ipconfig

Windows IP Configuration

Wireless LAN adapter Wireless Network Connection 3:

Connection-specific DNS Suffix . :


Link-local IPv6 Address . . . . . : fe80::3821:8fad:e9d2:cf46%19
IPv4 Address. . . . . . . . . . . : 192.168.1.2
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
Networking Essentials – TCP/IP Tools 55

Ethernet adapter Local Area Connection 5:

Media State . . . . . . . . . . . : Media disconnected


Connection-specific DNS Suffix . :

Ethernet adapter Local Area Connection 2:

Media State . . . . . . . . . . . : Media disconnected


Connection-specific DNS Suffix . :

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected


Connection-specific DNS Suffix . :

Tunnel adapter isatap.{FDDB885B-C61E-4571-9C83-A7A68AB66601}:

Media State . . . . . . . . . . . : Media disconnected


Connection-specific DNS Suffix . :

Running the program with /all parameter displays a full list of configuration data.
This utility is often associated with DHCP because there is no easier way on a Windows
system to see what IP address and other parameters the DHCP server has assigned to
your computer. However, these programs also enable you to manually release IP address
obtained through DHCP and renew existing leases. By running IPconfig.exe with the
/release and /renew command-line parameters, you can release or renew the IP address
assignment of one of the network interfaces in the computer or for all the interfaces at
once.

ARP.exe:

The Address Resolution Protocol (ARP) enables a TCP/IP computer to convert IP


addresses to the hardware addresses that data-link layer protocols need to transmit
frames. IP uses ARP to discover the hardware address to which each of its datagrams
will be transmitted. To minimize the amount of network traffic ARP generates, the
computer stores the resolved hardware addresses in a cache in system memory. The
information remains in the cache for a short period of time (usually between 2 and 10
minutes), in case the computer has additional packets to send to the same address.

Windows systems include a command-line utility called Arp.exe that you can use
to manipulate the contents of the ARP cache. For example, you can use Arp.exe to add
the hardware addresses of computers you contact frequently to the cache, thus saving
time and network traffic during the connection process. Address that you add to the cache
manually are static, meaning that they are not deleted after the usually expiration period.
The cache is stored in memory only, however, so it is erased when you reboot the
computer. If you want to preload the cache whenever you boot your system, you can
create a batch file containing Arp.exe commands and execute it from the Windows
Startup group.

The syntax for Arp.exe is as follows:

arp.exe –a
Networking Essentials – TCP/IP Tools 56

The ARP table of a Windows 7 computer, as displayed by Arp.exe –a, appears as


follows:

C:\>arp -a

Interface: 192.168.1.2 --- 0x13


Internet Address Physical Address Type
192.168.1.1 7e-f8-80-73-a4-10 dynamic
192.168.1.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
239.255.255.250 01-00-5e-7f-ff-fa static
255.255.255.255 ff-ff-ff-ff-ff-ff static

Netstat.exe:

Netstat.exe is a command-line program that displays information about the current


network connections of a computer running TCP/IP and about the traffic generated by the
various TCP/IP protocols.

netstat.exe –a

The network connection listing displayed as follows:

C:\>netstat -a

Active Connections

Proto Local Address Foreign Address State


TCP 0.0.0.0:135 PC:0 LISTENING
TCP 0.0.0.0:445 PC:0 LISTENING
TCP 0.0.0.0:49152 PC:0 LISTENING
TCP 0.0.0.0:49153 PC:0 LISTENING
TCP 0.0.0.0:49154 PC:0 LISTENING
TCP 0.0.0.0:49155 PC:0 LISTENING
TCP 0.0.0.0:49156 PC:0 LISTENING
TCP 127.0.0.1:49157 PC:0 LISTENING
TCP 192.168.1.2:139 PC:0 LISTENING
TCP 192.168.1.2:50728 38.113.165.185:https TIME_WAIT
TCP 192.168.1.2:50730 38.113.165.185:https TIME_WAIT
TCP 192.168.1.2:50731 38.99.185.109:https TIME_WAIT
TCP [::]:135 PC:0 LISTENING
TCP [::]:445 PC:0 LISTENING
TCP [::]:49152 PC:0 LISTENING
TCP [::]:49153 PC:0 LISTENING
TCP [::]:49154 PC:0 LISTENING
TCP [::]:49155 PC:0 LISTENING
TCP [::]:49156 PC:0 LISTENING
UDP 0.0.0.0:500 *:*
UDP 0.0.0.0:4500 *:*
UDP 0.0.0.0:5355 *:*
UDP 127.0.0.1:1900 *:*
UDP 127.0.0.1:57412 *:*
UDP 192.168.1.2:137 *:*
UDP 192.168.1.2:138 *:*
Networking Essentials – TCP/IP Tools 57

UDP 192.168.1.2:1900 *:*


UDP 192.168.1.2:57411 *:*
UDP [::]:500 *:*
UDP [::]:4500 *:*
UDP [::]:5355 *:*
UDP [::1]:1900 *:*
UDP [::1]:57410 *:*
UDP [fe80::3821:8fad:e9d2:cf46%19]:546 *:*
UDP [fe80::3821:8fad:e9d2:cf46%19]:1900 *:*
UDP [fe80::3821:8fad:e9d2:cf46%19]:57409 *:*

The interface statistics by command netstat –e, display looks like this:

C:\>netstat -e
Interface Statistics

Received Sent

Bytes 1546812 1329720


Unicast packets 8448 10206
Non-unicast packets 0 3714
Discards 0 0
Errors 0 0
Unknown protocols 0

Nbtstat.exe:

Nbtstat.exe is a Windows command-line program that displays information about


the NetBIOS over TCP/IP connections that Windows uses when communicating with
other Windows computers on the TCP/IP LAN.

nbtstat.exe

Unlike the other utilities, the command-line parameters for Nbtstat.exe are case-
sensitive and should be displayed as follows:

C:\>nbtstat -n

Local Area Connection:


Node IpAddress: [0.0.0.0] Scope Id: []

No names in cache

Local Area Connection 2:


Node IpAddress: [0.0.0.0] Scope Id: []

No names in cache

Local Area Connection 5:


Node IpAddress: [0.0.0.0] Scope Id: []

No names in cache
Networking Essentials – TCP/IP Tools 58

Wireless Network Connection 3:


Node IpAddress: [192.168.1.2] Scope Id: []

NetBIOS Local Name Table

Name Type Status


----------------------------------------------------------------------
PC <20> UNIQUE Registered
PC <00> UNIQUE Registered
WORKGROUP <00> GROUP Registered
WORKGROUP <1E> GROUP Registered
WORKGROUP <1D> UNIQUE Registered
.._MSBROWSE_. <01> GROUP Registered

Telnet.exe:

The Telecommunication Network Protocol (Telnet) is a command-line client/server


program that essentially provides remote control capabilities for computers on a network.
A user on one computer can run a Telnet client program and connect to the Telnet server
on another computer. Once connected, that user can execute commands on the other
system and view the results. It’s important to distinguish this type of remote-control
access from simple access to the remote file system. When you use a Telnet connection
to execute a program on a remote computer, the program actually runs on the remote
computer. By contrast, if you use Windows to connect to a shared drive on another
computer and execute a program, the program runs on your computer.

Telnet was originally designed for use on UNIX systems, and it is still an
extremely important tool for UNIX network administrators. The various Windows operating
systems all include a Telnet client, but only Windows 2000 and later versions have a
Telnet server. The syntax for connecting to a Telnet server is as follows:

telnet target

Telnet uses a text-based command and response syntax that was the model for
several other important application layer protocols, including File Transfer Protocol (FTP),
the Hypertext Transfer Protocol (HTTP) and the Simple Mail transfer Protocol (SMTP).
Because all information transmitted during a Telnet session is in clear text, the protocol
presents a security hazard when used on unsecured networks.

Ftp.exe:

The File Transfer Protocol (FTP) is similar to Telnet, but it is designed for
performing file transfers instead of executing remote commands. FTP includes basic file
management commands that can create and remove directories, rename & delete files
and manage access permissions. All Windows computers have a character-based FTP
client, but FTP server capabilities are built into the Internet Information Services (IIS)
application that is included with the Windows 2000 server and above products. Many
other FTP clients are also available that offer graphical interfaces and other usability
features. Generally speaking, Windows computers don’t need FTP for communications
on a LAN because they can access the shared files on other computers directly.
Networking Essentials – Networking Devices 59

Chapter 12: NETWORKING DEVICES

LANs are connected to one another or to the Internet. To connects LANs, or


segments of LANs, we make use of connecting devices. Connecting devices are
therefore also referred to as networking devices. They can operate at different layers of
the OSI or TCP/IP reference model.

Internetworking refers to the equipment and technologies involved in connecting


either LANs to LANs, WANs to WANs or LANs to WANs. Typical examples of
internetworking devices are Repeaters, Hubs, Switches, Bridges, Routers and Gateways.
Each device operates at all layers below a particular layer of the OSI model, as shown in
the figure. When designing a network, it is important to remember that the capacity of the
internetworking devices tends to limit the overall network capacity.

APPLICATION LAYER APPLICATION GATEWAY


TRANSPORT LAYER TRANSPORT GATEWAY
NETWORK LAYER ROUTER
DATA LINK LAYER BRIDGE, SWITCH
PHYSICAL LAYER REPEATER, HUB

Most devices are connected to each other by medium such as a cable. The device
has a port where it connects to a cable. A port has physical as well as logical
characteristics the physical part being a plug that the cable’s plug can fit into and special
circuitry that handles the data communication, while the logical part is a software entity.

Networking equipment are used to link a number of devices, such as computers,


servers, workstations and printers into a network for the purpose of sharing resources.
Networking of computer systems and other electronic devices has become a necessity for
most working environments. A local area network (LAN) is a local computer network
sharing the resources of a single server within a relatively small geographic area. Most
LANs are confined to a single building or group of buildings. A wide area network (WAN)
is a geographically dispersed telecommunications network that uses phone lines,
microwaves, satellites or a combination of communication channels to connect several
locations. WANs and LANs connected together using technologies such as Plain Old
Telephone Service (POTS) lines or Public Switched Telephone Network (PSTN),
Integrated Services Digital Network (ISDN), Digital Subscriber Lines (DSL), Frame Relay,
Asynchronous Transfer Mode (ATM) or other high-speed services. A networking system
consists of multiple computing devices which include computers, peripherals, interface
cards and other equipment needed to perform data-processing and communications
within the network. Commonly used networking devices includes repeaters, switches,
modems, hubs, firewalls, splitters, multiplexers, routers, bridges, gateways, servers and
the network interface card on computers.
Networking Essentials – Networking Devices 60

Repeaters:

A repeater is a device that has just two ports. It operates at layer 1 that is physical
layer of the OSI model and TCP/IP model. It simply acts as transceivers that receives,
amplifies and retransmits information. Signals that carry information within a network can
travel a fixed distance before attenuation endangers the integrity of the data. A repeater
receives a signal and before it becomes too weak or corrupted, it regenerates the original
bit pattern. The repeater then sends the refreshed signal. Repeaters are unintelligent
devices connected between two LAN segments of the same type.

Repeaters are analog devices that connect two cable segments. Signal appearing
is amplified. Repeaters do not understand frames, packets or headers. Understand only
Volts. Repeaters are used to increase the number of nodes.

Repeaters may introduce side effects where they add cost to the circuit. Also, they
introduce distortion as a result of limited bandwidth, additional noise and also sometimes
they may amplify some other undesirable noise to the signal. Because of these reasons
there is a limit on the use of number of repeaters. Designers attempt to minimize the use
of repeaters to the greatest extent possible.

The location of a repeater on a link is crucial. A repeater must be placed so that a


signal reaches it before any noise changes the meaning of any of its bits. A little noise
can alter the precision of a bit’s voltage without destroying its identity. If the corrupted bit
travels much farther, however accumulated noise can change its meaning completely. At
that point the voltage is not recoverable and the error needs to be corrected. A repeater
placed on the link before the legibility of the signal becomes lost can still read the signal
well enough to determine the intended voltages and replicate them in their original form
as shown in the following figure.

Repeater
Regenerated Corrupted
Signal Signal
Right-to-Left transmission

Regeneration of a signal from corrupted signal

Uses of Repeaters:

Repeaters are used to extend LAN beyond its usual distance limitation.

¾ A Repeater connects segments of a LAN.

A repeater actually does not connect two LANs. It connects two segments of the
same LAN; i.e., the segments connected are still part of one single LAN. A repeater is
not a device that can connect two LANs of different protocols, as it cannot understand
any frames or packets etc. That is here it is used merely to extend the length of a
LAN.

¾ A Repeater forwards every frame and it has no filtering capability. And it is a


regenerator and not an amplifier.
Networking Essentials – Networking Devices 61

Here we can roughly compare a repeater to an amplifier, but the comparison is


inappropriate or inaccurate. An amplifier cannot discriminate between the intended signal
and noise. It just amplifies equally everything fed into it. A repeater does not amplify the
signal. It only regenerates the signal. When it receives a weakened or corrupted signal, it
creates a copy, bit for bit at the original strength.

Traditionally, discussion of networking components would include repeaters, but


today repeaters are a little outdated. Repeaters were once used to increase the usable
length of the cable and they were most commonly associated with co-axial network
configurations, because co-axial networks have now fallen out of favor and because the
functionality of repeaters has been built into other devices, repeaters are rarely used.

Hubs:

It is a thin wire segment with fixed taps. Each tap is provided with reliable
connector (RJ45). Hubs are the simplest network devices and their simplicity is reflected
in their low cost. Small hubs with four or five ports are often referred to as workgroup
hubs. With the requisite cables, they provide everything needed to create a small
network. Hubs with more ports are available for networks that require greater capacity.
Computers connect to a hub via a length of twisted-pair cabling. In addition to ports for
connecting computers, even a very inexpensive hub generally has a port designated as
an uplink port that enables the hub to be connected to another hub to create larger
networks.

The basic function of a hub is to take data from one of the connected devices and
forward it to all the other ports on the hub. This method of operation is very inefficient
because, in most cases, the data is intended for only one of the connected devices. The
following figure is shown how a hub works.

Uplink
Normal Port
Ports HUB
Power

Data is forwarded
Data sent by one node to all connected
nodes

Working of a Hub

Salient Features:

The salient features of Hubs are:

(i) Frames arriving on any of the lines are transmitted in the others.
(ii) All lines coming into a Hub must operate at a same speed.
(iii) Hubs do not amplify the incoming signal.
(iv) Hubs do not understand frames, packets or headers.
Networking Essentials – Networking Devices 62

Classifications:

Hubs are classified as passive and active.

Passive Hubs: These are rare do not need power because they don’t regenerate
the signal.

Active Hubs: These are regenerating a signal before forwarding it to all the ports
on the device. In order to do this, the hub needs a power supply; small workgroup
hubs normally use an external power adapter, but on larger units the power supply
is built in.

Due to the inefficiencies of the hub system and the constantly increasing demand
for more bandwidth, hubs are slowly replaced with switches.

USB Hubs:

Universal Serial Bus (USB) is a standard serial-communication interface for


connecting a host computer to devices such as a printer, scanner, digital camera and
human interface devices (HIDs) including a keyboard, touch panel, track ball and mouse.
USB enables bi-directional isochronous and asynchronous data transfer making it
possible to couple plural peripheral devices to a computing device via a single host
controller and a USB hub.

A USB hub serves as a medium for connecting peripheral devices to a computer


in accordance with a USB standard. A hub typically includes an upstream port that
couples the hub to the host and several downstream ports that couple the hub to another
hub or peripheral. A USB hub consists of two portions; the hub controller and the hub
repeater.

Switches:

A switch is like a hub in that it has multiple ports, but internally it has a table listing
which systems are found on each port and shuttles the packets where they need to go.
Unlike a hub, signals are transmitted only to the port where they need to go, rather than
to all ports. The table needs to be simple enough that there is only one possible path for
any given packet. As a general rule, switches will be faster than hubs because each port
doesn’t have to carry all of the traffic. They also tend to be faster than bridges and more
expensive than either hubs or bridges.

LAN switching has greatly increased network performance by replacing shared


media with dedicated bandwidth. Because of their speed and simplicity, network switches
are replacing hubs and bridges as the dominant form of internetworking. A network switch
routes data transmissions such as Ethernet packets among a plurality of media stations in
a local area network. Data packets are transferred between stations by means of data
network switch media access controllers. A typical network switch for routing data
transmissions (packets) between network buses includes a set of input ports, a set of
output ports and a switch fabric providing data signal paths between the input and output
ports.
Networking Essentials – Networking Devices 63

Switches are fast multi-port bridges that provide an economical way to resolve
network congestion. A multi-port network switch in a packet switching network is coupled
to stations on the network through its multiple ports. Network switch I/O ports often
include buffer memories for storing packets. Both hubs and switches are used in Ethernet
networks.

On the surface, a switch looks much like a hub. Switches can do much more and
offer many more advantages than hubs. As with a hub, computers connect to a switch via
a length of twisted-pair cable. Multiple switches can be used, to create larger networks.
Despite their similarity in appearance and their identical physical connections to
computers, switches offer significant operational advantages over hubs. As discussed
earlier on a hub, data is forwarded to all ports, regardless of whether the data is intended
for the system connected to the port. This arrangement is very inefficient; however, it
requires very little intelligence on the part of the hub, which is why hubs are inexpensive.

Rather than forwarding data to all the connected ports, a switch forwards data
only to the port on which the destination system is connected. It looks at the Media
Access Control (MAC) addresses of the devices connected to it to determine the correct
port. A Mac address is a unique number that is programmed into every NIC. By
forwarding data only to the system to which the data is addressed, the switch decreases
the amount of traffic on each network link dramatically. In effect, the switch literally
channels data between the ports. The following figure illustrates how a switch works.

Switch

Data is forwarded
only to the
Data sent by one node
destination node

Working of a Switch

Ethernet networking, we have seen that collisions occur on the network when two
devices attempt to transmit at the same time. Such collisions cause the performance of
the network to degrade. By channeling data only to the connections that should receive it,
switches reduce the number of collisions that occur on the network. As a result, switches
provide significant performance improvements over hubs.

Switches can also further improve performance over the performance of hubs by
using a mechanism called full-duplex. On a standard network connection, the
communication between the system and the switch or hub is said to be half-duplex, in a
half-duplex connection, data can be either sent or received on the wire, but not at the
same time. Because switches manage the data flow on the connection, a switch can
operate in full-duplex mode – it can send and receive data on the connection at the same
time. In a full-duplex connection, the maximum bandwidth is double that for a half-duplex
connection – for example, 10Mbps become 20Mbps and 100Mbps becomes 200Mbps.
As you can imagine, the difference in performance between a 100Mbps network
connection and a 200Mbps connection is considerable.
Networking Essentials – Networking Devices 64

Switching Methods:

Switches use three methods to deal with data as it arrives:

(i) Cut-through: In a cut-through configuration, the switch begins to forward the


packet as soon as it is received. No error checking is performed on the packet,
so the packet is moved through very quickly. The downside of cut-through is
that because the integrity of the packet is not checked, the switch can
propagate errors.

(ii) Store-and-forward: In a store-and-forward configuration, the switch waits to


receive the entire packet before beginning to forward it. It also performs basic
error checking.

(iii) Fragment-free: Building on the speed advantages of cut-through switching,


fragment-free switching works by reading only the part of the packet that
enables it to identify fragments of a transmission.

Working with Hubs and Switches:

It is important to know how to work with hubs and switches, sometimes in the
same environment.

Hubs and switches have two types of ports: medium dependent interface (MDI)
and medium dependent interface crossed (MDI-X). The two types of ports differ in their
wiring. As the X implies, an MDI-X port’s wiring is crossed; this is because the transmit
wire from the connected device must be wired to the receive line on the other. Rather
than use a crossover cable we also use the simpler straight-through cable to connect
systems to the switch or hub.

On most hubs and switches, a special port called the uplink port allows you to
connect two hubs and switches together to create larger networks. The connection for the
port is not crossed; a straight-through network cable is used to connect the two hubs or
switches together.

Rather than having a dedicated uplink port, some switches and hubs have a port
that you can change between MDI and MDI-X by pushing a button. While using the port
to connect a computer, make sure it is set to MDI-X and while connecting to another hub
or switch, make sure it is set to MDI. In the absence of an uplink port, we can connect two
hubs or switches together by using MDI-X ports, but must use a crossover cable to do so.

Cables connecting Hubs and Switches:

Two types of cables are used to connect devices to hubs and switches; crossover
cables and straight-through cables. The difference between the two types is that in a
crossover cable, two of the wires are crossed; in a straight-through cable, all the wires run
straight through.

Specifically, in a crossover cable, Wires 1 & 3 and Wires 2 & 6 are crossed: Wire
1 at one end becomes Wire 3 at the other end; Wire 2 at one end becomes Wire 6 at the
other end and vice versa in both cases.
Networking Essentials – Networking Devices 65

Managed Hubs and Switches:

Both hubs and switches come in managed and unmanaged versions. A managed
device has an interface through which it can be configured to perform certain special
functions. For example, it may allow for port mirroring, which can be useful for network
monitoring or a low port to be specified to operate at a certain speed. Because of the
extra functionality of a managed device and because of the additional components
required to achieve it, managed devices are considerably more expensive than
unmanaged devices. When you’re specifying switches or hubs, consider the need for
manageability carefully. If a switch will be used to connect servers to the network, a
managed device might make the most sense – the extra functionality might come in
handy. On parts of the network that accommodate client computers, non-managed
devices generally suffice.

Bridges:

Like a repeater, a bridge has just two ports and is used to connect two groups of
computers. The difference is that a bridge has a list of which computers are on each side
and it only passes along packets that need to go to the other side. The cuts down on
network activity; where the two groups have heavy traffic amongst themselves but not too
much with each other.

Bridges are intelligent devices that operate at layer 2 and are used to interconnect
LANs of the same type. Packets received on one port may be retransmitted or forwarded
on another port.

A bridge unlike repeaters will not start retransmission until it has received the
complete packet. As a consequence, stations on either side of a bridge may be
transmitting simultaneously without causing collisions. A bridge, like a repeater, does not
modify the contents of a packet in any way; and a simple bridge retransmits every packet
whether or not this is necessary.

Unlike repeaters, bridges may provide filtering and forwarding services across the
link. A learning bridge examines the source field of every packet it seen on each port and
builds up a picture of which addresses are connected to which ports; therefore, a packet
will not be transmitted to a network segment that has no need to see the information.
Filtering means that if the destination of a packet is the same side of the bridge as its
origin, the bridge ignores it but if the address is on the other segment, the bridge lets it
across or forwards it.

If a bridge sees a packet addressed to a destination that is not in its address table,
the packet is retransmitted on every port except the one it was received on. Bridge also
age address table entries; if a given address has not been communicating in a specified
period of time, then the address is delayed from the address table. The learning bridge
concept works equally well with several interconnected networks, provided that there are
no loops in the system.

Bridges are networking devices that divide up networks. In the days before routers
and switches became popular, bridges were used to divide up networks and thus reduce
the amount of traffic on each network. Network switches have largely replaced them. A
bridge functions by blocking or forwarding data, based on the destination MAC address
written into each frame of data. If the bridge believes the destination address is on a
network other than that from which the data was received, it can forward the data to the
other networks to which it is connected. If the address is not on the other side of the
bridge, the data is blocked from passing. Bridges “learn” the MAC addresses of devices
Networking Essentials – Networking Devices 66

on connected networks by “listening” to network traffic and recording the network from
which the traffic originates. The following figure shows a representation of a bridge.

Data not destined for a


device on the other
network is prevented from
passing over the bridge

Bridge

Working of a Bridge

The advantages of bridges are simple and significant. By preventing unnecessary


traffic from crossing onto other network segments, a bridge can dramatically reduce the
amount of network traffic on a segment. Bridges also make it possible to isolate a busy
network from a not-so-busy one, thereby preventing pollution from busy nodes.

Types of Bridges:

There are three types of bridges are used in networks.

(i) Transparent Bridge: A transparent bridge is invisible to the other devices on the
network. Transparent bridges only perform the function of blocking or forwarding
data based on the MAC address; the devices on the network are oblivious to
these bridges’ existence. Transparent bridges are by far the most popular types of
bridges.

(ii) Translational Bridge: A translational bridge can convert from one networking
system to another. As you might have guesses, it translates the data it receives.
Translational bridges are useful for connecting two different networks, such as
Ethernet and Token Ring networks. Depending on the direction of travel, a
translational bridge can add or remove information and fields from the frame as
needed.

(iii) Source-route Bridge: Source-route bridges were designed by IBM for use on
Token Ring networks. The source-route bridge derives its name from the fact that
the entire route of the frame is embedded within the frame. This allows the bridge
to make specific decisions about how the frame should be forwarded through the
network. The diminishing popularity of Token Ring makes the chances that you’ll
work with a source-route bridge very slim.

As switches become ever cheaper, switches in terms of both functionality and


performance have overtaken bridges. You should expect to be working with switches
more often than with bridges.

Bridges use a method known as the spanning tree algorithm to construct a non-
looping topology by deciding not use certain links in the network. The links are still there
and may come into use if the network is re-configured.
Networking Essentials – Networking Devices 67

Routers:

A router is an intelligent packet sorter, which can look at the ultimate destination
for a packet and analyze the best way to get it there. Where the devices above supply a
physical path for the packets, a router also provides the information on how to get from
one place to another and this information is added to the packet header. This makes it a
much more powerful device for use with complex networks, including the Internet. In fact,
the Internet itself could be described as a network of routers.

A router is often a full-fledged computer system with multiple network cards and
its own operating system. The types of tables and routing protocols used by different
routers are beyond the scope of this unit and will be discussed in advance computer
networks. At this point it is necessary to remember that any router accessing the Internet
must use at least TCP/IP.

Routers operate on Layer 3, the network layer that routes data to different
networks. Routing is important when multiple segments are connected in such a way that
there is more than one possible path between one station and another on the network. A
router determines the next network point to which a packet should be forwarded toward
its destination. It is located at any juncture of networks and it decides which way to send
each information packet based on its current understanding of the state of the networks to
which it is connected. A router creates or maintains a table of the available routes and
their conditions and uses the information along with distance and cost algorithms to
determine the best route for a given packet. Typically, a packet may travel through a
number of network points with routers before arriving at its destination.

Router performance is measured using its packet forwarding rate, which is the
number of packets transferred per second from input to output port. This rate depends on
packet size and how many protocols are being supported. The larger the packet, the
greater the router throughput because each forwarded packet requires reading the packet
header, which consumes time. Routers have protocol intelligence, which enables them to
handle multiple protocols. Many organizations continue to rely upon traditional multi-
protocol routers to provide the foundation for their networking infrastructure. In that case,
the router, is the collapse point for the entire enterprise as the total network response
time depends upon how the router manages all the WAN and LAN connectivity.

WAN
Port
WAN Router

LAN

Router can be a collapse point in the LAN to WAN connectivity

Sometimes, a router is included as part of a network switch. Switching routers


provide the ultimate flexibility and investment protection by allowing users to switch or
route on per port basis. Such architecture enables users to maximize the backbone
design by deploying either switching or routing wherever it is needed in the network.
Integrated Routing and Bridging (IRB) allows users to both route and bridge a protocol in
the same router, with connectivity between all the interfaces.
Networking Essentials – Networking Devices 68

A computer network is a collection of interconnected computing devices that


exchange data and share resources. A router connects computer networks having
different lower hierarchy structures. The router transmits packet data through an optima
path established in connection with a routing table, as well as connects the received
packet to another network or a target node of its own network. An IP router using an
optical switch fabric takes in Internet protocol packets and routes them through an optical
switch to various destination ports of the switch. The router stores a routing table therein
and checks the IP address of each packet transmitted from another node by referring to
the routing table, to determine the next destination or node of the packet and sends out
the packet.

Routers are an increasingly common sight in any network environment, from a


small home office that uses one to connect to an Internet Service Provider (ISP) to a
corporate IT environment where racks of routers manage data communication with
disparate remote sites. Routers make internetworking possible and in view of this, they
warrant detailed attention. Routers are network devices that literally route data around the
network. By examining data as it arrives, the router is able to determine the destination
address for the data then, by using tables of defined routes, the router determines the
best way for the data to continue to its journey.

Unlike bridges and switches, which use the hardware-configured MAC address to
determine the destination of the data, routers use the software configured network
address to make decisions. This approach makes routers more functional than bridges or
switches and it also makes them more complex because they have to work harder to
determine the information. The following figure illustrates the working of a router.

Workstation

1
Server

Workstation

Router Router

Router
1 Data is sent to the Router
2
2 The router determines the
destination address and
forwards it to the next step
in the journey

3 The data reaches its


3 destination

The basic function of a router


Networking Essentials – Networking Devices 69

The basic requirement for a router is that it must have at least two network
interfaces. If they are LAN interfaces, then the router can manage and route the
information between two LAN segments. More commonly, a router is used to provide
connectivity across wide area network (WAN) links.

Dedicated Hardware Vs. Server-Based Routers:

A router can be either a dedicated hardware device or a server system that has at
least two network interfaces installed in it. All common network operating systems offer
the capability to act as routers as part of their functionality. Dedicated hardware routers
offer greater performance levels than server-based solutions.

The following are some of the advantages of dedicated hardware routers

ƒ Typically faster than server-based routers.


ƒ Generally more reliable than server-based routers.
ƒ Easier to harden against attacks than server-based routing solutions.

The following are some of the disadvantages of dedicated hardware routers

ƒ More expensive than server-based router solutions; extra functionality may


have to be purchased.
ƒ Often require specialized skills and knowledge to manage them.

The following are some drawbacks of routers

ƒ They are complex and difficult to install, configure and manage.


ƒ They are protocol dependent and may be unable to handle some protocols
without network reconfiguration.

The capabilities of a router depend on the features it has installed. A basic router
may route only one protocol between two network interfaces of the same type. A more
advanced router may act as a gateway between two networks and to protocols. In
addition, it may offer firewall services, security and authentication or remote access
functionality such as virtual private networking.

Gateways:

A gateway connects a network with another device or network that is radically


different. A more common use of the term applies to the node on a network that provides
access to the Internet or to other domains in a complex LAN. In networks that have more
than one gateway, a workstation will have one of them designated as the ‘default
gateway’ to use if no gateway is otherwise specified. In earlier days a gateway was
referred to what we now call a router and in fact the gateway and router functions are
often combined in the same device.

The key feature of a gateway is that it converts the format of the data. A gateway
operates at/above Layer 4. It spans all seven layers of the OSI Model. It is designed to
link incompatible networks. A gateway typically handles three different protocols: source,
destination and transmission path protocols. A gateway is a network point that acts as an
entrance to another network, and vice-versa. Gateways are most commonly used to
transfer data between private networks and the Internet.
Networking Essentials – Networking Devices 70

Gateways, which are networking devices, and default gateways working with
TCP/IP, perform very different roles on a network. The function of a gateway is very
specific. No matter what their use, gateways slow the flow of data and can therefore
potentially become bottlenecks. The conversion from one data format to another takes
time and so the flow of data through a gateway is always slower than the flow of data
without one.

Other Devices
Modem:

Modem is a contraction of the term’s modulator and demodulator. Modems


perform a simple function; they translate digital signals from a computer into analog
signals that can travel across conventional phone lines. The modem modulates the signal
at the sending end and demodulates at the receiving end. Modems provide a relatively
slow method of communication. A dial-up connection between two computers requires a
modem at each end, both of which support the same communication protocols. Modems
take the form of internal devices that plug into one of a computer’s expansion slots or
external devices that connect to one of the computer’s serial port.

Proxy Server:

A proxy server is a computer that offers a computer network service to allow


clients to make indirect network connections to other network services. A client connects
to the proxy server, and then requests a connection, file, or other resource available on a
different server. The proxy provides the resource either by connecting to the specified
server or by serving it from a cache. In some cases, the proxy may alter the client's
request or the server's response for various purposes.

This is a system that sits in between a workstation and the server that workstation
is accessing. The most common example is for Internet access, where the browser on a
workstation is addressing a server somewhere out on the web, but is actually talking to
the local proxy server.

There are a couple of advantages to this arrangement. For one, the proxy server
will cache recently accessed web pages and the workstation can get them faster from the
proxy’s cache than it could from a remote site. This speed up Internet access for
everyone. The proxy server can also be used to control Internet access, which is a major
issue at some companies. It is a very convenient place to put a firewall too and it is not
unusual to find the gateway, firewall and proxy server functions all combined in the same
box, controlling traffic both into and out of the local area network.

Another advantage is that the local network only requires one IP address from the
Internet Service Provider and that’s used by the proxy server while all of the workstations
that connect to it use one of the 3 ranges of ‘private’ IP addresses. Given the popularity of
the Internet, it is likely that without proxy servers we would be running short of IP
addresses already.

Wireless Access Point (WAPs)

Wireless network devices gain access to the network via WAPs. WAPs are
typically deployed in a small businesses or home offices; they can operate completely
independently of a normal network. When a WAP connects to a wired network, it is often
referred to as a wired access point because it joins the wireless portion of the network
with the wired portion. WAPs process signals and are required power, which is supplied
through an external AC power adapter.
Networking Essentials – Transmission Medium 71

Chapter 13: TRANSMISSION MEDIUM

The successful transmission of data also depends on the type of transmission


medium. The characteristic of the signal varies with the transmission medium. They
define the quality of the signal being transmitted and the characteristics of the signal
being received. Transmission media is the physical path between the transmitter and
receiver. It can be guided or unguided.

Guided & Unguided Transmission Medium:

Guided media provides a guided (by a solid medium) path for propagation of
signals such as twisted pairs, coaxial cables, optical fibers etc. Unguided media employ
an antenna for transmitting through air, vacuum or water. This form of transmission is
referred to as wireless transmission. For example, Broadcast radio, satellite etc.

Selection of transmission media depends on the characteristics and quality of data


transmission are in turn determined by characteristics of the medium and signal. For
guided media the medium itself in determining the limitations of transmission. For
unguided media bandwidth of the signal produced at the transmitting antenna is more
important than characteristics of the transmission characteristics.

In general, signals at lower frequencies are omni-directional (all directions) and at


higher frequencies are directional (focused). The key concern in design of data
transmission system is Data rate and Distance: The greater the data rate and distance,
the better.

Number of factors used to determine data rate and distance

• Bandwidth: Greater the bandwidth of the signal, the higher data rate can be
achieved.

• Transmission impairment: These limit the distance. Twisted pair suffers more
impairment than coaxial cable which in turn suffers more than optical fiber.

• Interference: Overlapping frequency bands can distort/wipeout a signal. It is


more concern for unguided media than guided. For guided, it can be caused
due to nearby cables. Proper shielding of cables can minimize this problem.

• Number of receivers: A point to point links is used or shared link is used with
multiple attachments are used. In shared link each attachment introduces
some attenuation and distortion on the line limiting the distance and/or data
rate.

• For guided the transmission capacity depends on data rate or bandwidth and
depends critically on the distance (whether medium is point-to-point or
multipoint).
Networking Essentials – Transmission Medium 72

Twisted Pair:

They are least expensive and most widely used. They are easier to work with but
limited in terms of data rate and distance. In consists of two insulated cupper wires
arranged in regular spiral pattern. Wire pair acts like a communication link. Usually,
numbers of these pairs are bundled together in a protective sheath in to a cable. Twisting
tends to decrease the crosstalk. On long distance links, the twist length typically varies
from 5-19 cm. The thickness of wires may be 0.4 – 0.9mm. Over long distance, cables
may contain hundreds of pairs. It is most common for both analog and digital signals.
Commonly used in telephone network and is the workhouse for communication within
buildings, for example, individual residential telephone or in an office building.

These were designed to support voice traffic using analog signaling. However, it
can handle digital data traffic at modest data rates. It is also commonly used for digital
signaling with the use of a digital switch or digital PBX with data rate of 64kbps
commonly. It is for LAN supporting PCs’ with commonly 10/100/1000 Mbps. For long
distance twisted pair with 4Mbps or more is used.

Transmission Characteristics:

Twisted pair can be used for both analog and digital transmission. For analog
signals, amplifiers are required about every 5-6km. For digital transmission (analog and
digital signals), repeaters are required every 2-3kms. Other impairments are also severe
for twisted pair. It is susceptible to interference and noise. Impulse noise can also intrude
easily.

Application as LAN Cables:

Unshielded Twisted Pair (UTP) Cable which is typically 1mm thick with a minimum
number of twists per foot. Twisting reduces electrical interference. They run several
kilometers without amplification, repeaters are needed. They are used for transmitting
either analog or digital signals. There are different categories of UTP’s that are used they
are:

ƒ CAT 3 Cable: They are less expensive. It consists of 4 pairs


grouped in plastic sheet to protect the wires. Bandwidth of up to 16
MHz signals can be handled. It supports data rate up to 10 Mbps.

ƒ CAT 5 Cable: They are similar to CAT3, but are with more twists/
cm. They have less crosstalk and provide better quality over long
distance. They are suitable for high-speed communication.
Bandwidth up to 100 MHz signals can be handled. It supports data
rate up to 100 Mbps.

ƒ CAT 6 Cable: They are more improved version than CAT 5. They are
suitable for higher bandwidth up to 250 MHz. It supports data rate up to
10 Gbps.
Networking Essentials – Transmission Medium 73

ƒ CAT 7 Cable: They are still more improved version than CAT 6. They
are suitable for higher bandwidth of up to 600 MHz. It supports data
rate up to 10 Gbps.

Coaxial Cable:

Coaxial cable has traditionally been an important part of the


long-distance telephone network. Today, it faces increasing
competition from optical fiber, terrestrial microwave and satellite.
Using frequency-division multiplexing (FDM), a coaxial cable can
carry over 10,000 voice channels simultaneously.

Coaxial cable, like twisted pair, consists of two


conductors, but constructed differently to permit it to operate over
a wiser range frequency. It consists of hollow outer cylindrical
conductor that surrounds a single inner wire conductor. The inner
conductor is held in place by either regularly spaced insulating
rings or a solid dielectric material. The outer conductor is
covered with jacket or shield. A single coaxial cable has a
diameter of from 1 to 2.5cm. Because of its shielded, concentric construction, coaxial
cable is much less susceptible to interference and crosstalk than twisted pair. Coaxial
cable can be used over long distances and support more stations on a shared line than
twisted pair. Coaxial cable is perhaps the most versatile transmission medium and is
enjoying widespread use in a wide variety of applications. The most important of these
are used in television distribution and Long-distance telephone transmission. Also they
find applications in short-run computer system links and Local Area Networks.

Coaxial cable is spreading rapidly as means of distribution TV signals to individual


homes-cable TV. From its modest beginnings as Community Antenna Television (CATV),
designed to provide service to remote areas, cable TV will eventually reach almost as
many homes and offices as the telephone. A cable TV system can carry dozens or even
hundreds of TV channels at ranges up to a few tens of kilometers. Coaxial cable is also
commonly used for short range connections between devices. Using digital signaling,
coaxial cable can be used to provide high-speed I/O channels on computer systems.

Transmission Characteristics:

Coaxial cable is used to transmit both analog and digital signals. Coaxial cable
has frequency characteristics that are superior to those of twisted pair and can hence be
used effectively at higher frequencies and data rates. Because of its shielded, concentric
construction, coaxial cable is much less susceptible to interference and crosstalk than
twisted pair.

The principal constrains on performance are attenuation, thermal noise and inter-
modulation noise. The latter is present only when several channels (FDM) or frequency
bands are in use on the cable. For long-distance transmission of analog signals,
amplifiers are needed every few kilometers, with closer spacing, required if higher
frequencies are used. The usable spectrum for analog signaling extended to about 500
MHz. For digital signaling, repeaters are needed every kilometer or so, with closer
spacing needed for higher data rates.
Networking Essentials – Transmission Medium 74

Application as LAN Cables:

Coaxial cable has better shielding than twisted pairs and can span longer distance
at higher speeds. There are two types of coaxial cable that are used in LAN.

ƒ Thick coax: These are used for Ethernets but are difficult to work with and are
expensive. It has greater degree of noise immunity and is strong. It requires
vampire tap and a drop cable to connect to the network.

ƒ Thin coax: These are easier to work and less expensive. It carries signal over
shorter distance and is preferred over thick coax as it needs simple BNC
connector. They are flexible, cheaper and idle for office cabling.

Optical Fiber:

An optical fiber is a thin, flexible medium capable of guiding an optical ray. Total
internal reflection is the basic principle on which the transmission of data takes place
through fibers. If the angle of incidence is sufficiently large, then the light in the fiber will
reflect repeatedly in the interface between the materials as shown in the following figure.
The fiber need not be straight but can conduct light even when bent.

Total internal
reflection

Light
Source Total internal reflection

An optical fiber has a cylindrical shape and consists of three concentric sections;
the core, the cladding and the jacket. The core is the inner most sections and consists of
one or more very thin strands, or fibers, made of glass or plastic and is shown in the
following figure. The core has a diameter in the range of 8 to 100μm. Each fiber is
surrounded by its own cladding, a glass or plastic coating that has optical properties
different from those of the core. Various glasses and plastics can be used to make optical
fibers. The lowest losses have been obtained using fibers of ultra-pure fused silica. Ultra
pure fiber is difficult to manufacture; higher loss multi component glass fibers are more
economical and still provide good performance. Plastic fiber is even less costly and can
be used for short-haul links, for which moderately high losses are acceptable.

Core Sheath Jacket


(glass)

Jacket Core Cladding


Cladding (plastic)
(glass)
(a) (b)

(a) Side view of a single fiber (b) View of sheath with three fibers
Networking Essentials – Transmission Medium 75

The interface between the core and cladding acts as a reflector to confine light
that would otherwise escape the core. The outermost layer, surrounding one or a bundle
of cladded fibers, is the jacket. The jacket is composed of plastic and other material
layered to protect against moisture, abrasion, crushing and other environmental dangers.
One of the most significant technological breakthroughs in data transmission has been
the development of practical fiber optic communication systems. Optical fiber already
enjoys considerable use in long-distance telecommunications, and its use in military
applications is growing. The continuing improvements in performance and decline in
prices, together with the inherent advantages of optical fiber, have made it increasingly
attractive for LAN.

Transmission Characteristics:

Optical fiber transmits a signal encoded beam of light by means of total internal
reflection. Total internal reflection can occur in any transparent medium that has higher
index of refraction than the surrounding medium. In effect, the optical fiber acts as a
waveguide for frequencies in the range of about 1014 to 1015 Hz; this covers portions of
infrared and visible spectra.

Light from a source enters the cylindrical glass or plastic core. Rays at shallow
angles are reflected and propagated along the fiber; other rays are absorbed by the
surrounding material. This form of propagation is called step-index multimode referring to
the variety of angles that will reflect.

With multimedia transmission, multiple propagation paths exist, each with a


different path length and hence time to traverse the fiber. This causes signal elements
(light pulses) to spread out in time, which limits the rate at which data can be accurately
received. In other words, the need to leave spacing between the pulses limits data rate.
This type of fiber is best suited for transmission over very short distances. When the fiber
core radius is reduced, fewer angles will reflect. By reducing the radius of the core to the
order of a wavelength, only a single angle or mode can pass: the axial ray. This single
mode propagation provides superior performance for the following reason, because there
is a single transmission path with single mode transmission. The distortion found in
multimode cannot occur. Single mode is typically used for long distance applications,
including telephone and cable television.

Finally, by varying the index of refraction of the core, a third type of transmission,
known a graded index multimode, is possible. This type is intermediate between the other
two in characteristics. The higher refractive index at the center makes the light rays
moving down the axis advance more slowly than those curves helically because of the
graded index, reducing its travel distance. The shortened path and higher speed allow
light at the periphery to arrive at a receiver at about the same time as the straight rays in
the core axis. Graded index fibers are often used in LANs.

Applications:

The advantages of optical fiber over twisted pair and coaxial cable become more
compelling as the demand for all types of information (voice, data, image and video)
increases. Five basic categories of applications have become important for optical fiber;
they are Long-haul trunks, Metropolitan trunks, Rural exchange trunks, Subscriber loops
and Local Area Networks.
Networking Essentials – Transmission Medium 76

• Long-haul transmission: It is becoming increasingly common in the telephone


network. Long-haul routes average about 1500kms in length and offer higher
capacity (typically 20,000 to 60,000 voice channels). These systems compete
economically with microwave. Undersea optical fiber cables have also enjoyed
increasing use.

• Metropolitan trunking: These circuits have an average length of 12km and may
have as many as 1,00,000 voice channels in a trunk group. Most facilities are
installed in underground conduits and are repeater-less, joining telephone
exchange in a metropolitan or city area. Included in this category are routes
that link long haul microwave facilities that terminate at a city perimeter to the
main telephone exchange building downtown.

• Rural exchange trunks: These have circuit lengths ranging from 40 to 60km
and link towns and villages. Most of these systems have fewer than 5000
voice channels. The technology used in these applications competes with
microwave facilities.

• Subscriber loop circuits: These are fibers that run directly from the central
exchange to a subscriber. These facilities are beginning to displace twisted
pair and coaxial cable links as the telephone networks evolve into full-service
networks capable of handling not only voice and data, but also image and
video.

Application as LAN cable:

Standards have been developed and products introduced for optical fiber
networks that have a total capacity of 100Mbps to 1Gbps. Recent achievable bandwidth
is in excess of 50,000Gbps i.e., 50Tbps but current limit is 10Gbps. It can support
hundreds or even thousands of stations in a large office building of a complex of
buildings.

Comparison of fiber optics and copper wire:

The following characteristics distinguish optical fiber from twisted pair or coaxial
cable.

ƒ Greater capacity: The potential bandwidth and hence data rate of optical fiber
is immense, data rates of hundreds of Gbps over tens of kilometers have been
demonstrated. Compare this to the practical maximum of hundreds of Mbps
over about 1km for coaxial cable and just a few Mbps over 1km or up to
100Mbps to 1Gbps over a few tens of meters for twisted pair.

ƒ Smaller size and lighter weight: Optical fibers are considerably thinner than
coaxial cable or bundled twisted-pair cable at least an order of magnitude
thinner for comparable information transmission capacity. For cramped
conduits in buildings and underground along public rights-of-way, the
advantage of small size is considerable. The corresponding reduction in
weight reduces structural support requirements.

ƒ Lower attenuation: Attenuation is significantly lower for optical fiber than for
coaxial cable or twisted pair and is constant over a wide range.
Networking Essentials – Transmission Medium 77

ƒ Electromagnetic Isolation: Optical fiber systems are not affected by external


electromagnetic fields. Thus, the systems are not vulnerable to interference,
impulses noise or crosstalk. By the same token, fibers do not radiate energy,
so there is little interference with other equipment and there is a high degree of
security from eavesdropping. In addition, fiber is inherently difficult to tap.

ƒ Greater repeater spacing: Fewer repeaters mean lower cost and fewer
sources of error. The performance of optical fiber systems from this point of
view has been steadily improving. Repeater spacing in the tens of kilometers
for optical fiber is common and repeater spacing of hundreds of kilometers
have been demonstrated. Coaxial and Twisted Pair systems generally have
repeaters every few kilometers.

Wireless Transmission

For unguided media, transmission and reception are achieved by means of an


antenna. The antenna radiates electromagnetic energy into the medium (usually air) for
transmission and for reception the antenna picks up electromagnetic waves from the
surrounding medium.

Electric Magnetic Spectrum:

There are basically two types of configurations for wireless transmission:


directional and omni-direction. For the directional configuration, the transmitting antenna
puts out a focused electromagnetic beam; the transmitting and receiving antennas must
therefore be carefully aligned. In the omni-directional case, the transmitted signal spreads
out in all directions and can be received by many antennas. In general, the higher the
frequency of a signal, the more it is possible to focus into a directional beam.

Three general ranges of frequencies are of interest for wireless transmission.

(i) Frequencies in the range of about 2GHz (1GHz = 109Hz) to 40GHz are
referred to as microwave frequencies.

At these frequencies, highly directional beams are possible and microwave is


quite suitable for point-to-point transmission. Microwave is also used for
satellite communications.

(ii) Frequencies in the range of 30MHz to 1GHz is suitable for omni-directional


applications.

We will refer to this range as the broadcast radio range. Microwave covers
part of UHF and the entire SHF band, and broadcast radio covers the VHF
and part of the UHF band.

(iii) Another important frequency range, for local applications, is the infrared
portion of the spectrum. This cover, roughly from 3 x 1011Hz to 2 x 1014Hz.

Infrared is useful to local point-to-point and multipoint applications within


confined areas, such as a single room.
Networking Essentials – Transmission Medium 78

Radio Transmission:

Radio is a transmission medium with a large field of applications and a medium


that provides the user with great flexibility (for example, cordless telephones). Radio can
be used locally, intercontinental, and for fixed as well as mobile communication between
network nodes or between users and network nodes. In this subsection, we deal with
radio link and satellite connections.

Radio Link:

In radio link connections, transmission is affected via a chain of radio transmitters


and radio receivers. The radio link is used for analog as well as for digital transmission.

At regular intervals, the signal is received and forwarded to the next link station.
The link station may be either active or passive. An active link station amplifies or
regenerates the signal. A passive link station generally consists of two directly
interconnected parabolic antennas without any amplifying electronics between them.
Each radio link needs two radio channels: one for each direction. A few MHz spacing is
needed between the transmitter frequency and the receiver frequency. The same
parabolic antenna and waveguide are used for both directions.

Microwave Transmission:

Microwave transmission refers to the technique of transmitting information over a


Microwave link. Since microwaves are highly susceptible to attenuation by the
atmosphere (especially during wet weather), the use of microwave transmission is limited
to a few contexts.

Properties:

• It is only suitable over Line-of-Sight transmission links.


• Provides good bandwidth.
• Affected by rain, vapor, dust, snow, cloud, mist and fog, heavy moisture.
• Not suitable for links where an obstacle is in between the transmitter and receiver.

Uses:

• Backbone carriers in cellular networks.


• Communication with satellites.
• Microwave relay links for telephone service providers.
Networking Essentials – Connectors 79

Chapter 14: CONNECTORS

A Connector is a conductive device for joining electrical circuits together. The


connection may be temporary, as for portable equipment, or may require tool for
assembly and removal, or may be a permanent electrical joint between two wires or
devices. Connector is best known for providing the physical link between two
components. Some examples of the use of a connector might be a connector linking a
cable and a network interface card or NIC card, a connector linking a transceiver and a
cable or even a connector linking two cable segments.

RJ-11:

RJ-11 stands for Registered Jack-11. This is a four-wire connector


used mainly to connect telephone equipment. A phone circuit uses two
wires; The RJ-11 jack uses four wires. The RJ-11 connector looks very
similar to the RJ-45 connector. Be careful not to confuse the RJ-11 with
the RJ-45 connector, which holds eight wires and is slightly larger. The
RJ-11 connector is used in computers to connect a phone line to a
computer modem.

RJ-45:

RJ-45 connectors are used on 10BASE-T and 100BASE-T


networks and are defined in IEEE 802.3 standards. The RJ-45 connector
is used with CAT5, CAT5e and CAT6 cables. RJ-45 connectors connect
computers in LANs to hubs and switches. The RJ-45 is a connector for
digital transmission over 4-pair copper wire, either untwisted or twisted.
The interface has eight wires or pins.

F-Type:

An F-Type media connector is a threaded, coaxial signal


connector typically used in consumer applications, such as a coaxial
cable connection to a TV or VCR. An F-Type media connector is
inexpensive because the pin of the connector is actually the center
conductor in the coaxial cable.

ST:

ST stands for Straight Tip. This is a fiber-optic cable connector


you’ll see in 100BASE-FX networking environments. This is one of two
commonly used fiber optic connectors. It uses a BNC attachment
mechanism much like what you see in F-Type connectors.
Networking Essentials – Connectors 80

SC:

SC stands for Standard Connector or Subscriber Connector.


This fiber-optic cable connector is sometimes called a square
connector because of its shape. SC connectors are latched and
require a button or release to disconnect it. SC connectors work with
both single-mode and multimode optical fibers and last for around
1,000 connections/disconnections. Although not as common as ST
connectors, they are seeing increased use in 100BASE CX and
100BASE-LX LAN connections.

IEEE 1394 (FireWire):

IEEE 1394 is an interface standard initiated by the Institute


of Electrical and Electronics Engineers for very fast, 200 Mbps,
400Mbps (1394a) and 800Mbps (1394b) digital data transfer,
especially of streaming video. IEEE 1394 connectors are used to
transmit and receive data between FireWire devices. Digital
Camcorders commonly use a FireWire connection to transfer
digital images through a FireWire port on a PC or Macintosh.
FireWire is a registered trademark of Apple Computer, Inc. FireWire connectors come
into two varieties, 4-pin and 6-pin and are used to connect to 4-pin square FireWire
receptacle or 6-pin rectangle FireWire receptacle.

Fiber LC (Local Connector):

Fiber-optic LC connectors are made of Zirconia ceramic ferrule.


They have an RJ-45 push-pull style housing and latching mechanism. LC
connectors are half the size of standard connectors and are used on private
and public Ethernet networks. Fiber patch cords using LC connectors are
used to connect fiber-optic Ethernet network devices.

MT-RJ:

MT-RJ stands for Mechanical Transfer Registered Jack. MT-


RJ is a multimode or single mode fiber-optic connector used to
connect MT-RJ, ST, SC and LC types if fiber-optic cable in Ethernet
networking environments.

USB:

USB stands for Universal Serial Bus. USB is a PC


standard interface that connects at speeds of 12Mbps (USB 1.1)
or 480Mbps (USB 2). USB ‘A’ connectors media cables are used
to connect to your USB port on the back or front on your PC.
Various male and female ‘mini’ connectors are used to connect
digital devices, such as digital cameras to USB A ports.
Networking Essentials – Cabling & Crimping 81

Chapter 15: CABLING & CRIMPING

Network cables are used to connect and transfer data & information between
computers, switches, routers etc. These cables are essentially the carrier or media
through which data flows.

In local area networks; typically, office environments, retail and commercial sites;
the most commonly used types of communication cables are “twisted pair cable”. Twisted
pair cable is used in many ethernet networks, comprising of four pairs of thin wires or
conductors. These ‘wires’ or ‘conductors’ are contained inside of the insulation or outer
sheath of the cable. Each pair is twisted into several additional twists. These twists are
designed to prevent interference from other devices and indeed from other adjacent
cables.

For cabling, we need UTP (Unshielded Twisted Pair) cable of at least Category 5
(Cat 5). Cat 5 is required for basic 10/100 Mbps functionality, we will need Cat 5e for
gigabit (1000 Mbps/1 Gbps) operation and Cat 6 or higher gives us a measure of future
proofing. Bulk cable comes in many types; there are 2 basic categories, solid and braided
cable. Braided cable tends to work better in patch applications for desktop use. It is more
flexible than solid cable and easier to work with, but really meant for shorter lengths. Solid
cable is meant for longer runs in a fixed position. Plenum rated cable must be used
whenever the cable travels through an air circulation space, e.g., above a false ceiling or
below a raised floor.

The internals of the cable look like are here under:

Inside the cable, there are 8 color coded wires. These wires are twisted into 4
pairs of wires; each pair has a common color theme. One wire in the pair being a solid or
primarily solid colored wire and the other being a primarily white wire with a colored stripe
(Sometimes cables won't have any color on the striped wire, the only way to tell which
wire it is twisted around). Examples of the naming schemes used are: Orange for the
solid-colored wire and Orange/White for the striped cable. The twists are extremely
important. They are there to counteract noise and interference. It is important to wire
according to a standard to get proper performance from the cable. The TIA/EIA-568
specifies two wiring standards for an 8-position modular connector such as RJ45. The
two wiring standards, T568A and T568B vary only in the arrangement of the colored
pairs. It might be determined by the need to match existing wiring, jacks or personal
preference, but it should maintain consistency.
Networking Essentials – Cabling & Crimping 82

RJ45 Connectors and Jacks:

The RJ45 connector is an 8-position modular connector that looks like a large
phone plug. There are a couple variations available. The primary variation you need to
pay attention to is whether the connector is intended for braided or solid wire. For
braided/stranded wires, the connector has sharp pointed contacts that actually pierce the
wire. For solid wires, the connector has pins which cut through the insulation and make
contact with the wire by grasping it from both sides. The connector is the weak point in an
Ethernet cable, choosing the wrong one will often cause grief later.

RJ45 jacks come in a variety styles intended for several different mounting
options. The choice is one of requirements and preference. RJ45 jacks are designed to
work only with solid cable. Most jacks come labeled with color codes for either T568A or
T568B or both.

The diagram and pin out is shown here under:

Pin #1 in the Connector and Jack

RJ45 Connector and Jack Pin Out

Ethernet Cable Pin Outs:

There are two basic cable pin outs. A straight through cable; most commonly used
to connect a host to a client, i.e., computers, printers and other network client devices to a
hub or switch. A cross over cable; most commonly used to connects to hosts directly, i.e.,
a computer directly to another computer, a switch directly to another switch or a router
directly to another router. It is to be noted that, while in the past when connecting two
devices directly a crossover cable was required. Now-a-days, most devices have auto-
sensing technology that detects the cable & device and crosses pairs when needed.

Besides above two cable pin outs, there is another one namely rollover cable. A
rollover cable most commonly used to connect to a device’s console port to configuring
the device. Unlike straight-through and crossover cables, rollover cables are not intended
to carry data but instead create an interface with a device.

For cabling we require the followings:

Cable – Bulk; Category Wire Cutters - to cut & strip RJ45 Crimper
(Cat) 5, 5e, 6 or higher cable the cable if necessary
Networking Essentials – Cabling & Crimping 83

Punch Down Tool RJ45 Jacks RJ45 Plugs

Wire Stripper Cable Tester

Straight-Through Cable (both ends are the same):

Wire Color Wire Diagram


RJ45 Pin # Signal
(T568A) (T568A)
1 Green/White Transmit+
2 Green Transmit-
3 Orange/White Receive+
4 Blue Unused
5 Blue/White Unused
6 Orange Receive-
7 Brown/White Unused
8 Brown Unused
Straight-Through Cable Pin Out for T568A
Networking Essentials – Cabling & Crimping 84

Wire Color Wire Diagram


RJ45 Pin # Signal
(T568B) (T568B)
1 Orange/White Transmit+
2 Orange Transmit-
3 Green/White Receive+
4 Blue Unused
5 Blue/White Unused
6 Green Receive-
7 Brown/White Unused
8 Brown Unused
Straight-Through Cable Pin Out for T568B

Cross Over Cable (T568B/T568A):


RJ45 Pin Diagram RJ45 Pin Diagram
Wire Color Wire Color
# (END 1) End #1 # (END 2) End #2
1 Orange/White 1 Green/White
2 Orange 2 Green
3 Green/White 3 Orange/White
4 Blue 4 Blue
5 Blue/White 5 Blue/White
6 Green 6 Orange
7 Brown/White 7 Brown/White
8 Brown 8 Brown
Cross Over Cable Pin Outs

Roll Over Cable (T568B):


RJ45 Pin Diagram RJ45 Pin Diagram
Wire Color Wire Color
# (END 1) End #1 # (END 2) End #2
1 Orange/White 1 Brown
2 Orange 2 Brown/White
3 Green/White 3 Green
4 Blue 4 Blue/White
5 Blue/White 5 Blue
6 Green 6 Green/White
7 Brown/White 7 Orange
8 Brown 8 Orange/White
Roll Over Cable Pin Outs
Networking Essentials – Cabling & Crimping 85

How to wire Ethernet Cables:

1. Strip off about 2 inches of the cable sheath.

2. Untwist the pairs - don't untwist them beyond what you have exposed, the more
untwisted cable you have the worse the problems you can run into.

3. Align the colored wires according to the diagrams above.

4. Trim all the wires to the same length, about 1/2" to 3/4" leave from the sheath open.

5. Insert the wires into the RJ45 connector - make sure each wire is fully inserted to the
front of the RJ45 connector and in the correct order. The sheath of the cable should
extend into the RJ45 connector by about 1/2" and to be held in proper place in the
crimping tool. Then crimp the RJ45 connector with the crimping tool.

6. Verify the wires ended up the right order and that the wires extend to the front of the
RJ45 connector and make good contact with the metal contacts in the RJ45
connector.

7. Cut the cable to length - make sure it is more than long enough for your needs.

8. Repeat the above steps for the second RJ45 plug.

Notes: For details, go through the “process of making patch cable” illustrated below.

How to wire fixed Ethernet Cables:

1. Laying the full length of cable in place from endpoint to endpoint, make sure to leave
excess.

2. At one end, cut the wire to length leaving enough length to work, but not too much
excess.

3. Strip off about 2 inches of the cable sheath.

4. Align each of the colored wires according to the layout of the


jack.

5. Use the punch down tool to insert each wire into the jack.

6. Repeat the above steps for the second RJ45 jack.

If a cable tester is available, use it to verify the proper connectivity of the cable. If
your cable doesn't show proper connectivity, look closely at each end and see if you can
find the problem. Often a wire ended up in the wrong place or one of the wires is making
poor contact or no contact. Also, double check the color coding to verify it is correct. If
you see a mistake or problem, cut the cable at end off and start again. A cable tester is
invaluable at identifying and highlighting these issues.

When sizing cables remember that an end-to-end connection should not extend
more than 100m (~328ft). Try to minimize the cable length, the longer the cable becomes,
the more it may affect performance. This is usually noticeable as a gradual decrease in
speed and increase in latency.
Networking Essentials – Cabling & Crimping 86

Power over Ethernet (PoE):

Power over Ethernet has been implemented in many variations before IEEE
standardized 802.3af. 802.3af specifies the ability to supply an endpoint with 48V DC at
up 350mA or 16.8W. The endpoint must be capable of receiving power on either the data
pairs [Mode A] or the unused pairs [Mode B] in 100Base-TX. PoE can be used with any
Ethernet configuration, including 10Base-T, 100Base-TX and 1000Base-T. Power is only
supplied when a valid PoE endpoint is detected by using a low voltage probe to look for
the PoE signature on the endpoint. PoE power is typically supplied in one of two ways,
either the host Ethernet switch provides the power, or a "midspan" device is plugged in
between the switch and endpoints and supplies the power. No special cabling is required.

Wire Color Wire Diagram


RJ45 Pin # Signal PoE
(T568A) (T568A)
1 Green/White Transmit+ Mode A +
2 Green Transmit- Mode A +
3 Orange/White Receive+ Mode A -
4 Blue Unused Mode B +
5 Blue/White Unused Mode B +
6 Orange Receive- Mode A -
7 Brown/White Unused Mode B -
8 Brown Unused Mode B -

Power over Ethernet Power Delivery

Cable Category Details:

Cable Category Bandwidth (MHz) Common Uses


1 None Telephone Wiring/For ISDN
2 1 Token-Ring/4 Mbps
3 16 10 Mbps
4 20 Token-Ring/16 Mbps
5 100 10/100 Mbps
5e 100 1000 Mbps/1 Gbps
6 250 1000 Mbps/1 Gbps
6a 500 10 Gbps
7 600 10 Gbps
Networking Essentials – Cabling & Crimping 87

Making Patch Cable:

1. For patch cables, T568-B wiring is by far, the most common method.

2. There is no difference in connectivity between T568B and T568A cables. Both wiring
would work fine on any system.

3. For a straight through cable, both ends to be identical.

4. For a crossover cable, one end to be T568A and the other end T568B wiring.

Process of Making Patch Cable: -

1. Cut the cable to the length that you need.

2. Skin the cable about 2” down; for fast and dependable


“skinning” use cable stripper.

3. A cat 6 cable has a center spine that needs to be


removed.

4. Pull on the spine and fold the pairs back. Then cut the
spine as close to the cables end as possible.

5. Remove all of the twists in the cable’s pairs. Un-twist


each pair, and straighten each wire between the fingers.

6. Bring all of the wires together, until they touch. Hold the
sorted wires together tightly. At this point, recheck the
wiring sequence with the diagram.
Networking Essentials – Cabling & Crimping 88

7. Place the wires in the order of one of the two diagrams


shown above (T568B or T568A). Here we have chosen
the T568B diagram which is by far the most popular. If
you are unsure, go with the T568B wiring.

8. Check the wire sequence one more time, then make a


straight cut. A perfectly straight cut is essential here.

9. Insert the cable in to the RJ45 connector, hold with the


copper connectors up and the locking clip facing down.

10. Push the connector all of the way in and then squeeze
down the crimping tool. Remove the connector from the
crimping tool.

11. Repeat the procedure on the other end of the cable using the same wiring diagram. If
you wish to make a crossover cable, then use the other diagram (in this case T568-A).

12. Test the cable using a good quality LAN cable tester.

Note: If the completed assembly does not pass continuity, you may have a problem in
one, or both ends. First try giving each end another crimp. If that does not work, then
carefully examine each end. Are the wires in the proper order? Do all of the wires fully
extend to the end of the connector? Are all of the pins pushed down fully? Cut off the
suspected bad connector and re-crimp it. If you still have a problem, then repeat the
process at both ends.

Almost all patch cables that are made with stranded wire. Stranded wire is
normally specified for use in patch cables due to its superior flexibility.
Networking Essentials – Introduction to Structured Cabling 89

Chapter 16: INTRODUCTION TO STRUCTURED CABLING


Structured cabling is building or campus telecommunications cabling infrastructure
that consists of a number of standardized smaller elements called subsystems.
Structured cabling is the design, documentation and management of the lowest layer of
the OSI network model, the physical layer. The physical layer is the foundation of any
network whether it is data, voice, video or alarms, and defines the physical media upon
which signals or data is transmitted through the network.

Approximately 70% of your network is composed of passive devices such as


cable, cross-connect blocks, and patch panels. Documenting these network components
is critical to keeping a network finely tuned. The physical medium can be copper cable
(e.g., cat 5e, cat 6 etc.), coaxial cable, optical fiber, wireless or satellite.

Structured cabling design and installation is governed by a set of standards that


specify wiring data centers, offices, and apartment buildings for data or voice
communications, using category 5 (CAT 5e) or category 6 cable (CAT 6) and modular
sockets. These standards define how to lay the cabling in a star formation, such that all
outlets terminate at a central patch panel (which is normally 19-inch rack-mounted), from
where it can be determined exactly how these connections will be used. Each outlet can
be 'patched' into a data network switch (normally also rack mounted alongside) or
patched into a 'telecoms patch panel' which forms a bridge into a private branch
exchange (PBX) telephone system, thus making the connection a voice port.

Lines patched as data ports into a network switch require simple straight-through
patch cables at the other end to connect a computer. Voice patches to PBXs in most
countries require an adapter at the remote end to translate the configuration on 8P8C
modular connectors into the local standard telephone wall socket.

It is common to color code patch panel cables to identify the type of connection,
though structured cabling standards do not require it, except in the demarcation wall field.
Cabling standards demand that all eight connectors in Cat5/5e/6 cable are connected,
resisting the temptation to 'double-up' or use one cable for both voice and data.

Structured cabling falls into six subsystems:

ƒ Entrance Facilities are where the building interfaces with the outside world.
ƒ Equipment Rooms host equipment which serves the users inside the building.
ƒ Telecommunications Rooms house telecommunication equipment which
connects the backbone and the horizontal cabling subsystems.
ƒ Backbone Cabling connects between the entrance facilities, equipment rooms
and telecommunications rooms.
ƒ Horizontal Cabling connects telecommunications rooms to individual outlets on
the floor.
ƒ Work-Area Components connect end-user equipment to outlets of the
horizontal cabling system.

Entrance Facility:

The service entrance is the point at which the network service cables enter or
leave a building. It includes the penetration through the building wall and continues to the
entrance facility. The entrance facility can house both public and private network service
cables. The entrance facility provides the means for terminating the backbone cable. The
entrance facility generally includes electrical protection, ground, and demarcation point.
Networking Essentials – Introduction to Structured Cabling 90

Main Equipment Room:

The main equipment room serves the entire building and contains the network
interfaces, uninterruptible power supplies (UPS), data equipment (e.g., servers, shared
peripheral devices and storage devices) and telecommunication equipment (e.g., PBX,
Voicemail, IVR).

Backbone Distribution System:

A backbone distribution system provides connection between entrance facilities,


equipment rooms, and telecommunication rooms. In a multi-floor building the backbone
distribution system is composed of the cabling and pathways between floors and between
multiple Intermediate Distribution Frame (IDF) rooms. In a campus environment the
backbone distribution system is composed of the cabling and pathways between
buildings.

Intermediate Distribution Frame (IDF):

The Intermediate Distribution Frame (IDF) typically serves the needs of a floor.
The IDF provides space for network equipment and cable terminations (e.g., cross-
connect blocks and patch panels). It serves as the main cross-connect between the
backbone cabling and the horizontal distribution system).

Horizontal Distribution System:

The horizontal distribution system distributes the signals from the Intermediate
Distribution Frame (IDF) to the work areas. The horizontal distribution system consists of:

ƒ Cables
ƒ Cross-connecting blocks
ƒ Patch panels
ƒ Jumpers
ƒ Connecting hardware
ƒ Pathways (supporting structures such as cable trays, conduits, and hangers
that support the cables from the IDF to the work areas).

Cable Plant Documentation:

Your network is one of your company's most valuable assets. It's the central
nervous system of your organization and it's growing along with your network
management problems. Your challenge is to harness the power of exploding technology
and make it work for you. Every minute spent tracking data, reconfiguring your cable plant
or searching for the source of a problem means loss of time and productivity and loss of
profit. Cable plant documentation software can help maintain the integrity of the network
by tracking the continuity through equipment, patch cords, cross-connects connectors,
cables, and outlets. It encompasses the design and maintenance of the cable plant.
Cable plant documentation can be an ally against the ravages of system downtime, giving
you the power to configure your cable plant so you have fewer network problems.

The Cable Plant Documentation Can:

ƒ Reduce the time it takes to modify the original installation.


ƒ Minimize network downtime.
ƒ Increase the life of a cabling plant.
ƒ Reduces the number of technicians needed to handle problems.
Networking Essentials – File Sharing 91

Chapter 17: FILE SHARING


The term File Sharing almost always means sharing files in a network, even if in a
small local area network. File sharing allows a number of people to use the same file able
to read or view it, write to or modify it, copy it or print it. File sharing is the accessing or
sharing of files by one or more users; it is performed on computer networks as an easy
and quick way to transmit data.

It will describe how to make a File/Folder or any Drive make available over
network using Windows 7 and later Windows operating system’s built-in sharing abilities.

File Sharing in Windows 7:

Double click on “Computer” icon at windows desktop. A new window will open,
where you can see all the partitioned hard disk drives and also no sharing symbols on
any drive.

Now, if you want to share “Local Disk (D:)” over network then right click on it, then
click on “Properties” option from drop down list.
Networking Essentials – File Sharing 92

When the properties page will open, then go to the “Sharing” tab and you can see
there “Not Shared” in the Network File and Folder Sharing section. Here you click to open
the “Advanced Sharing” tab under the advanced sharing section.

In the advanced sharing windows do a tick mark on the check box of “Share this
folder” and click to open the “Permissions” tab.

In the permission window do a tick mark on “Full Control” option and other options
will be marked automatically under “Allow” column of “Permissions for Everyone” section.
Then press “Apply” and “Ok” button on every opened window to make changes.
Networking Essentials – File Sharing 93

Now you can see “Shared” and “Network path” in the Network File and Folder
Sharing section. Here the sharing of “Local Disk (D:)” is almost done, but some security
settings needed to be enabled for accessing the shared drive over network. Now click on
the “Security” tab on the properties window of “Local Disk (D:)”.

In the security tab you can see that “Everyone” is not listed in the “Group or user
names:” section. To add “Everyone” here, click on “Edit” button.

In the edit window of security settings click on “Add” button.


Networking Essentials – File Sharing 94

A new window will be opened “Select Users or Groups”, when click on “Add”
button. Here click on “Advanced” button only.

Click on “Find Now” button, when “Advanced” window opened.

You can see a list of users in the “Search results” field, when “Find Now” button
clicked. Select “Everyone” from the list and press “Ok”.
Networking Essentials – File Sharing 95

Now you can see “Everyone” in the “Enter the object names to select” section.
Click on “Ok”.

Now, you can see a new user “Everyone” added in the “Group or user names” list.
In the permission window do a tick mark on “Full Control” option and other options will be
marked automatically under “Allow” column of “Permissions for Everyone” section. Then
press “Apply” and “Ok” button to make changes.

Then Click on “Apply” and “Close” button to make changes in the properties of
“Local Disk (D:)”. Finally, you can see the sharing symbol on “Local Disk (D:)” and this
drive has been fully shared over network for everyone to access it.
Networking Essentials – File Sharing 96

Besides above, due to the user-based security of Windows 7/Windows 10, you
may run into difficulties accessing your file/printer from other computers. The problem is
that Windows 7/Windows 10 will not allow access to the file/printer without a legitimate
user account and password. For e.g., when you are trying to connect to a shared
file/printer over the network, either you will get a dialog box which will allows you to enter
username & password or you will get an error message with to contact Administrator.

Windows 7/Windows 10 contains a 'Guest' account, which will allow remote users
to access shared file/printer; but this account is disabled on Windows 7/Windows 10. To
enable this and to access file/printer on the network go through the following steps.

Go to the main PC, whose file/folder has been shared and also attached with the
shared printer. Click on “Start Menu” and open the “Control Panel”.

Then open the “Administrative Tools” from the Control Panel window.

Now, open the “Computer Management” from the Administrative Tools window.
Networking Essentials – File Sharing 97

Go to the “User” tab which is located under the “Local Users and Groups” of the
“System Tools” group in Computer Management window. In the right-side pane of the
“User” tab go to the “Guest” account and right click on it. From the dropdown list click on
“Properties”.

When the properties page of “Guest” account will open, then remove the tick mark
of “User cannot change password” and “Account is disabled”. Then press Apply and Ok.
Now you can see that the “Guest” account has been enabled.

After enabling the “Guest” account, you will return back to the “Administrative
Tools” window and will open the “Local Security Policy” option.
Networking Essentials – File Sharing 98

When the “Local Security Policy” window will open, go to the “User Rights
Assignment” tab, which is under “Local Policies” of Security Settings group. Scroll down
to the “Deny access to this computer from the network” option of the right-side pane of
“User Rights Assignment”. Then double click to open the properties of this “Deny access
to this computer from the network”.

In properties window, remove the user “Guest” from the list. Then press “Apply”
and “Ok” to change the settings.

Finally, you will open the “Network and Sharing Center” and will make sure that
your network is in “Work Network or Home Network”.
Networking Essentials – Printer Sharing 99

Chapter 18: PRINTER SHARING


Printer is an output Device, which gives the output in user acceptable format. In
computing, a printer is a peripheral which produces a hard copy (permanent readable text
and/or graphics) of documents stored in electronic form, usually on physical print media
such as paper or transparencies. Many printers are primarily used as local peripherals,
and are attached by a printer cable or, in most new printers, a USB cable to a computer
which serves as a document source. Individual printers are often designed to support
both local and network connected users at the same time. In addition, some printers are
combined with a scanner and/or fax machine in a single unit, and can function as
photocopiers. Printers that include non-printing features are sometimes called Multi-
Function Printers (MFP), Multi-Function Devices (MFD), or All-In-One (AIO) printers. Most
MFPs include printing, scanning, and copying among their features.

It will describe how to make a printer available over local area network using
Windows7/Windows10's built-in sharing abilities. Since most of us use USB or parallel
connected printers, now assume that we have a printer correctly installed on a
Windows7/Windows10 computer and a working network connection to other computers
on LAN.

Now, share your current printer to make it available for other computers on your
Local Area Network (wired or wireless).

Printer Sharing in Windows 7:

Go to Start menu and click on Devices and Printers. A new window will open.

Right click on the printer you would like to share and click on Printer properties
from the drop-down list. Printer properties page will open.
Networking Essentials – Printer Sharing 100

In printer properties page go to the Sharing tab, then make a tick mark on check
box of Sharing this printer option.

Click on the Additional Drivers button to install additional drivers, if this printer is
shared with users running different version of Windows, so that the users does not have
to find the printer drivers when they connect to the shared printer.

A new Additional Drivers pop-up will open. Now, you can install additional drivers
so that users running different version of Windows can download them automatically
when they'll first attempt to connect to the printer. Once you'll click on 'ok', you'll be
prompted for the location of the printer drivers on your system.
Networking Essentials – Printer Sharing 101

Then press Apply & Ok to accept the changes. Now the selected printer will be
available on the network for other computers to access it.

Printer Sharing in Windows 10:

Go to Start menu and click on Settings.

Settings page will open. Here you click on Devices.

When the “Devices” window will open, you'll go to the “Devices and printers”
option, which will be found under the “Related settings” of “Printer & Scanner” tab.
Networking Essentials – Printer Sharing 102

Now Devices and printers page will be opened. Here you’ll right click on the
printer to be shared and click on the printer properties from the drop-down list.

In printer properties page go to the Sharing tab, then make a tick mark on check
box of Sharing this printer option.

Click on the Additional Drivers button to install additional drivers, if this printer is
shared with users running different version of Windows, so that the users does not have
to find the printer drivers when they connect to the shared printer.
Networking Essentials – Printer Sharing 103

A new Additional Drivers pop-up will open. Now, you can install additional drivers
so that users running different version of Windows can download them automatically
when they'll first attempt to connect to the printer. Once you'll click on 'ok', you'll be
prompted for the location of the printer drivers on your system.

Then press Apply & Ok to accept the changes. Now the selected printer will be
available on the network for other computers to access it.

After sharing the printer, now install the shared printer on the other computers
(client/node computers) of Local Area Network.

Client/Node Computer configuration:

Go to the “Devices and printers” window in Control Panel, then click on “Add a
printer” tab.

Then click on “Add a network, wireless or Bluetooth printer” option, when the Add
printer pop-up will show.
Networking Essentials – Printer Sharing 104

Then you'll see the network printer searching wizard pop-up, where you will select
the appropriate printer and press the Next button to proceed.

Here you'll see a “windows printer installation” pop-up, which will be searching,
downloading and installing the drivers of the selected printer automatically.

After installation of drivers, a successfully added of printer window will show. Here
you may change the name of the printer (optional) as your choice or you can leave it, as it
is. Then press "Next" to proceed.
Networking Essentials – Printer Sharing 105

Finally, you'll got the finish wizard window, where you may set the printer as
default printer or not by clicking/clearing a tick mark on the check box. Then click on
“Finish” button.

Now, you can see the shared printer with location details in your printer list at
“Devices and printers” windows.

The client/node computer is now able to print through network on shared printer.
Networking Essentials – Installation & Configuration of Network Printer 106

Chapter 19: INSTALLATION & CONFIGURATION OF


NETWORK PRINTER

Printer is output Device which gives the output in user acceptable format. In
computing, a printer is a peripheral which produces a hard copy (permanent readable text
and/or graphics) of documents stored in electronic form, usually on physical print media
such as paper or transparencies. Many printers are primarily used as local peripherals,
and are attached by a printer cable or, in most new printers, an USB cable to a computer
which serves as a document source. Some printers, commonly known as network
printers, have built-in network interfaces (typically wireless and/or Ethernet), and can
serve as a hardcopy device for any user on the network. Individual printers are often
designed to support both local and network connected users at the same time. In
addition, some printers are combined with a scanner and/or fax machine in a single unit,
and can function as photocopiers. Printers that include non-printing features are
sometimes called Multifunction printers (MFP), Multi-Function Devices (MFD), or All-In-
One (AIO) printers. Most MFPs include printing, scanning, and copying among their
features.

To configure the network printer, first thing you need to do is plug in the Ethernet
connection and power on the printer. All network capable printers are default to DHCP
mode, which can be automatically acquires an IP address on any DHCP-enabled
network. Even tiny home networks with inexpensive routers have automatic DHCP-
assigned IP addresses. Once the printer comes online, it will automatically obtain the first
available IP address from the DHCP pool.

Next, you need to figure out what IP address the printer automatically obtained.
There are multiple ways to do this. The surest way is to get the printer to tell you what the
address is by printing out a network configuration printer report.

If you don't want to or can't physically touch the printer because it's in some
remote location, that's not a problem. If you happen to know what the DHCP range is or
you can look at the DHCP server itself, you'll quickly be able to see what IP address the
printer obtained. If it's a relatively empty network, you can ping the first available IP in the
DHCP range and find the printer that way.

Changing the IP address:

If you want to change the IP address to static, you can do it via printer’s settings
option. For details, the illustration of HP LaserJet Pro MFP M226dn printer is shown
below.
Networking Essentials – Installation & Configuration of Network Printer 107

Go to the printer’s LCD panel and press the setting button. Setup Menu will be
displayed on the screen.

Now you press the right arrow button until the Network Setup displayed in the
LCD panel under setup menu. Then you press the OK button.

When you see the IPv4 Config Method under the network setup wizard, then
press OK.

Here you can see the Auto IP option in the LCD panel. On the selection of Auto
IP, the printer will be assigned IP address automatically by any DHCP server; which can
be either a dedicated DHCP server or any access point router.
Networking Essentials – Installation & Configuration of Network Printer 108

If you want to put fixed IP address, then press right arrow key for manual option.
When manual option shown in display of LCD panel, then press ok.

Now IP address field shown in the display of LCD panel. Here you put IP address
by using numbers keys and press ok.

Again, press ok when showing “yes” on the LCD panel for confirmation.

Now Subnet Mask field shown in the LCD panel, here you put the subnet mask by
using number keys and press ok. Again, press ok for confirmation when showing yes on
the display.
Networking Essentials – Installation & Configuration of Network Printer 109

And now using the number keys put the default gateway and press OK twice for
submission and confirmation.

Finally, fixed IP address has been installed on the printer and it's available online
over the network. After the above process, now it's time to install network printer on all
PCs.

Now go to the PC, where you want to install the network printer and place the
supplied installer media into the CD/DVD Rom or download the proper installer file from
the printer manufacturer website.

Double click on the installer file to extract and run the installer file.
Networking Essentials – Installation & Configuration of Network Printer 110

In the “software selection” page just click on the “Next” button with default settings
or click on “customize software selection” to choose the packages you needed.

On the license agreement page, accept the agreement and click on “Next” to
proceed.

On "Prepare to Install" tab simply click on “Next” to proceed.


Networking Essentials – Installation & Configuration of Network Printer 111

On "Connect the Product" tab select the option “Connect through network” and
“Automatically find my product on the network”. Press Next to proceed.

After searching the local network for available printer, a list of the network printers
shown in the “Network product(s) found page. Here you select the appropriate printer and
press “Next” to install it.

After successfully installation of the printer driver & software, at product


configuration page move forward by pressing “Next” button with default settings.
Networking Essentials – Installation & Configuration of Network Printer 112

In configure product option if an error message displayed “Printer Communication


Failure”, here you can press on “Exit” to left it. It may be configured later.

On the finish page uncheck the “HP connected” and “Register this product with
HP” options and click on “Finish” button.

The computer is now ready to print on network printer through network.


Networking Essentials – Introduction to Thin Client 113

Chapter 20: INTRODUCTION TO THIN CLIENT

A thin client, sometimes called a lean client or


slim client, is a low-cost, centrally-managed computer.
A thin client is a device that does not have a hard disk
drive. They can range from "stateless" (which means
that they act as only a keyboard, mouse, and display
with all the graphics, processing and data input being
controlled on a main server), to diskless (meaning
processing is performed on the thin client). With thin
clients, applications reside on a central server. This
makes it a snap to upgrade or to deploy those
applications on a massive scale. The term derives from the fact that small computers in
networks tend to be clients and not servers. Since the idea is to limit the capabilities of
these computers to only essential applications, they tend to be purchased and remain
"thin" in terms of the client applications they include. In general, they are not as
vulnerable to malware attacks, have a longer life cycle, use less power and are less
expensive to purchase.

Thin client is also used to describe software applications that use the client-server
model where the server performs all the processing. In client-server applications, a client
designed to be especially small so that the bulk of the data processing occurs on the
server.

Although the term thin client usually refers to software, it is increasingly used for
computers, such as network computers and Net PCs, which are designed to serve as the
clients for client-server architectures. The most common sort of modern thin client is a
low-end microcomputer which concentrates solely on providing a graphical user interface
to the end-user. The remaining functionality, in particular the operating system, is
provided by the server.

Startup Process

A typical thin client only needs enough memory to


power its display and a network card to communicate with
the server. Most computers manufactured since 1998 are
Pre-boot Execution Environment (PXE) capable, meaning
that they can use their network card as a boot media,
similar to starting up from a CD or hard drive. The server
is set up to recognize the PXE startup signal and will send
enough software to allow the computer to act as a thin
client. Once fully booted, users can log into the thin client,
and can use the Operating System and Applications
installed on the server.

Thin clients will usually be set up on their own private network, separate from
other machines. One network card of the server will be on the thin client network, and the
other network card will connect to the regular network as usual. It is important that the two
network cards are not switched; the card on the private network will have usually had a
DHCP service running, which will interfere with the regular network which will already
have DHCP service.
Networking Essentials – Introduction to Thin Client 114

Resource Utilization

All of the computing power, memory and hard drive space are on the server side.
These resources will be shared among all thin clients. These resources are easier to
allocate due to their centralized location.

On a thin client server, programs only need to be loaded into memory once,
regardless of the number of people using the program at the time. A web browser in
operation on 16 different workstations will have a total memory footprint of 16 times the
ordinary amount since it was loaded in 16 different locations. If this same web browser
were on a thin client server, the program itself would only be in memory once, only
requiring additional space to hold user specific data.

Similarly, other resources such as the CPU can be more fully utilized when all of
the power is in a central location.

Data Centralization

The server will have direct access to all hard drives in the system. Instead of
having data spread among a number of workstations like in the traditional computing
model, all user data will be stored on the server. This makes the process of finding and
making backup copies of the data much simpler, improving data integrity. If any single
workstation's hard drive fails in a traditional computer lab, data loss is much more likely
since workstations are not backed up as often as servers. A server can survive such an
incident through redundant hard drives (RAID arrays) and automated backups, both of
which are easier to implement in one location than in many.

If a hardware failure occurs on a thin client, no saved data is lost; the client can
easily be replaced with another machine set up for network booting. In the meantime, the
user can log into another thin client and be able to access the same environment they
had on the previous machine.

Cheap client hardware

While the server must be robust enough to handle several client sessions at once,
the clients can be made out of much cheaper hardware than a fat client can. This reduces
the power consumption of those clients, and makes the system marginally scalable: it is
relatively cheap to add on a couple more client terminals. The thin clients themselves in
general have a very low total cost of ownership, but some of that is offset by requiring a
robust server infrastructure with backups and so-forth. This is also reflected in terms of
power consumption: the thin clients are generally very low-power and might not even
require cooling fans, but the servers are higher-power and require an air-conditioned
server room.

On the other hand, while the total cost of ownership is low, the individual
performance of the clients is also low. Thin clients, for example, are not suited to any real
form of distributed computing. The costs of compiling software, rendering video or any
other computationally intensive task will be shared by all clients via the server.
Networking Essentials – Introduction to Thin Client 115

Client simplicity

Since the clients are made from low-cost hardware with few moving parts, they
can operate in more hostile environments than conventional computers. However, they
inevitably need a network connection to their server, which must be isolated from such
hostile environments. Since thin clients are cheap, they offer a low risk of theft in general,
and are easy to replace when they are stolen or broken. Since they don't have any
complicated boot images, the problem of boot image control is centralized to the central
servers.

On the other hand, to achieve this simplicity, thin clients are generally highly
integrated systems. This means that they may lag behind thick clients in terms of
extensibility and accessibility. For example, if the server does not have support for
independent audio streams, or the communication protocols don't transfer such streams,
one simply cannot receive audio from the server. Similarly, if the client lacks USB ports,
or if there is some communication failure of its USB signals over the network, the client
might be wholly unable to support an unexpected USB peripheral.

Ultra-thin clients

Traditionally, a thin client ran a full operating system for the purposes of
connecting to other computers. A newer trend is sometimes called an ultra-thin client or a
zero client, who no longer runs a full operating system: the kernel instead merely
initializes the network, begins the networking protocol, and handles display of the server's
output.

Web thin clients

Web thin clients (running a Web OS) rely on the web-based software for the
application and data storage, thus eliminating the single point of failure and the need for
OS/application/data aggregation and licensing required by traditional thin client.
Networking Essentials – Introduction to Wireless Networking 116

Chapter 21: INTRODUCTION TO WIRELESS NETWORKING


Wireless networking technology has developed like most new technologies;
business needs drive technology developments, which in turn drive new business needs,
which in turn drive new technology developments. To keep this cycle from spinning out of
control, several organizations have stepped forward to establish WLAN standards and
certifications. This lesson describes the trends and standards that impact WLAN
development.

The Business Case for WLAN Service:

Productivity is no longer restricted to a fixed work location or a defined time


period. People now expect to be connected at any time and place, from the office to the
airport or even the home. Traveling employees used to be restricted to pay phones for
checking messages and returning a few phone calls between flights. Now employees can
check e-mail, voice mail, and the web status of products on personal digital assistants
(PDA) while walking to a flight.

Even at home, people have changed the way they live and learn. The Internet has
become a standard in homes, right along with TV and phone service. Even the method of
accessing the Internet has quickly moved from temporary modem dialup service to
dedicated digital subscriber line (DSL) or cable service, which is always connected and is
faster than dialup.

The most tangible benefit of wireless is the cost reduction. Two situations illustrate
cost savings. First, with a wireless infrastructure already in place, savings are realized
when moving a person from one location in an office to another, when reorganizing a lab,
or when moving from temporary locations or project sites. On average, the IT cost of
moving an employee from one location to another where wiring changes are required.
The second situation to consider is when a company moves into a new building that does
not have a wired infrastructure. In this case, the savings from wireless is even more
noticeable because running cables through walls, ceilings, and floors is a labor-intensive
process.

Finally, another advantage of using a WLAN is the increase in employee


satisfaction brought on by having mobility in their working environment, leading to fewer
turnovers and the cost savings of not hiring as many new employees. Employee
satisfaction also results in better customer support, which can't be easily quantified, but is
a major benefit.

Besides the increase in productivity, WLAN also means better quality in daily work
(better responsiveness to customers, a better can-do attitude from employees, and so on)
and other benefits that cannot be easily measured.

Differences between WLANs and LANs:

In its most simplistic form, a WLAN is a LAN that uses radio frequency (RF) to
communicate instead of using a wire. As shown in the following figure, wireless clients
connect to wireless access points (WAPs).
Networking Essentials – Introduction to Wireless Networking 117

Although WLANs and LANs both provide connectivity between the end users, they
have some key differences that include both physical and logical differences between the
topologies. In WLANs, radio frequencies are used as the physical layer of the network.
Differences also exist in the way the frame is formatted and in the transmission methods,
detailed as follows:

ƒ WLANs use carrier sense multiple access with collision avoidance (CSMA/CA)
instead of carrier sense multiple access collision detect (CSMA/CD), which is
used by Ethernet LANs. Collision detection is not possible in WLANs, because
a sending station cannot receive at the same time that it transmits and,
therefore, cannot detect a collision. Instead, WLANs use the Ready to Send
(RTS) and Clear to Send (CTS) protocols to avoid collisions.

ƒ WLANs use a different frame format than wired Ethernet LANs use. WLANs
require additional information in the Layer 2 header of the frame.

Radio waves cause problems not found in LANs, such as the following:

ƒ Connectivity issues occur because of coverage problems, RF transmission,


multipath distortion, and interference from other wireless services or other
WLANs.

ƒ Privacy issues occur because radio frequencies can reach outside the facility.

In WLANs, mobile clients connect to the network through an access point, which
is the equivalent of a wired Ethernet hub. These connections are characterized as
follows:

ƒ There is no physical connection to the network.

ƒ The mobile devices are often battery-powered, as opposed to plugged-in LAN


devices.

WLANs must meet country-specific RF regulations. The aim of standardization is


to make WLANs available worldwide. Because WLANs use radio frequencies, they must
follow country-specific regulations of RF power and frequencies. This requirement does
not apply to wired LANs.
Networking Essentials – Introduction to Wireless Networking 118

Radio Frequency Transmission:

Radio frequencies range from the AM radio band to frequencies used by cell
phones. This section identifies the characteristics of the radio frequency transmissions
used by WLANs.

Radio frequencies are radiated into the air by antennas that create radio waves.
When radio waves are propagated through objects, they might be absorbed, scattered, or
reflected. This absorption, scattering, and reflection can cause areas of low signal
strength or low signal quality. Understanding these phenomena and the causes is
important when you are building and designing WLAN networks.

The transmission of radio waves is influenced by the following factors:

ƒ Reflection: Occurs when RF waves bounce off objects (for example, metal or
glass surfaces)

ƒ Scattering: Occurs when RF waves strike an uneven surface (for example, a


rough surface) and are reflected in many directions

ƒ Absorption: Occurs when RF waves are absorbed by objects (for example,


walls)

The following rules apply for data transmission over radio waves:

ƒ Higher data rates have a shorter range because the receiver requires a
stronger signal with a better signal-to-noise ratio (SNR) to retrieve the
information.

ƒ Higher transmit power results in a greater range. To double the range, the
power has to be increased by a factor of four.

ƒ Higher data rates require more bandwidth. Increased bandwidth is possible


with higher frequencies or more complex modulation.

ƒ Higher frequencies have a shorter transmission range because they have


higher degradation and absorption. This problem can be addressed by more
efficient antennas.

Wireless Standards:

WLAN standards that are currently supported by major vendors were developed
by the working group 11 of the Institute of Electrical and Electronics Engineers (IEEE)
802 committee.

IEEE standards define the physical layer and the Media Access Control (MAC)
sub-layer of the data link layer of the OSI model. The original 802.11 wireless standard
was completed in June, 1997. It was revised in 1999 to create IEEE 802.11a/b and then
reaffirmed in 2003 as IEEE 802.11g.

By design, the standard does not address the upper layers of the OSI model.
IEEE 802.11b was defined using Direct Sequence Spread Spectrum (DSSS). DSSS uses
just one channel that spreads the data across all frequencies defined by that channel.
The following table shows the different standards and how they compare.
Networking Essentials – Introduction to Wireless Networking 119

Standard 802.11b 802.11a 802.11g


Frequency
2.4 GHz 5 GHz 2.4 GHz
band
Number of
3 Up to 23 3
channels
Direct Orthogonal
Orthogonal Direct Sequence
Sequence Frequency
Frequency Division Spread
Transmission Spread Division
Multiplexing Spectrum
Spectrum Multiplexing
(OFDM) (DSSS)
(DSSS) (OFDM)
Data Rates 6, 9, 12, 18, 24, 36, 6, 9, 12, 18, 24,
1, 2, 5.5, 11 1, 2, 5.5, 11
in Mbps 48, 54 36, 48, 54

IEEE 802.11 divided the 2.4 GHz ISM band into 14 channels, but local regulatory
agencies such as the FCC designate which channels are allowed, such as channels 1
through 11. Each channel in the 2.4 GHz ISM band is 22 MHz wide with 5 MHz
separation, resulting in overlap with channels before or after a defined channel.
Therefore, a separation of 5 channels is needed to ensure unique non-overlapping
channels.

Recall that wireless uses half-duplex communication, so the basic throughput is


only about half of the data rate. Because of this, the IEEE 802.11b main development
goal is to achieve higher data rates within the 2.4-GHz ISM band to continue to increase
the Wi-Fi consumer market and encourage consumer acceptance of Wi-Fi.

802.11b defined the usage of DSSS with newer encoding or modulation of


Complementary Code Keying (CCK) for higher data rates of 5.5 and 11 Mbps. 802.11b
still uses the same 2.4 GHz ISM band and is backward compatible with prior 802.11 and
its associated data rates of 1 and 2 Mbps.

The year that the 802.11b standard was adopted, IEEE developed another
standard known as 802.11a. This standard was motivated by the goal of increasing data
rates by using a different OFDM spread spectrum and modulation technology and using
the less crowded frequency of 5 GHz UNII. The 2.4 GHz ISM band was widely used for
all WLAN devices, such as Bluetooth, cordless phones, monitors, video, and home
gaming consoles, and it also happens to be the same frequency used by microwave
ovens. 802.11a was not as widely known because materials for chip manufacturing were
less readily available and initially resulted in higher cost. Most applications satisfied the
requirements following the cheaper and more accessible standards of 802.11b.

Then the development by IEEE maintains usage of the 802.11 MAC and obtains
higher data rates in the 2.4 GHz ISM band. The IEEE 802.11g amendment uses the
newer OFDM from 802.11a for higher speeds, yet is backward compatible with 802.11b
using DSSS, which was already using the same ISM frequency band. DSSS data rates of
1, 2, 5.5, and 11 Mbps are supported, as are OFDM data rates of 6, 9, 12, 18, 24, 48, and
54 Mbps. IEEE requires only mandatory data rates of OFDM using 6, 12, and 24 Mbps,
regardless whether it is 802.11a or 802.11g OFDM.

Wireless Components

The main components of wireless networks are as follows:

ƒ Wireless access points


ƒ Wireless client devices
Networking Essentials – Introduction to Wireless Networking 120

Wireless Access Points:

WAPs provide connectivity between wireless client devices and the wired network.
The access point usually connects to a router via a wired network as a standalone device.

Wireless Client Devices:

A wireless client device is equipped with a wireless interface card (WIC) or


wireless USB receiver; which the device uses to communicate over RF with WAPs.

Implementing a WLAN

Implementing a WLAN involves more than selecting the desired standard and
selecting a security mechanism. Access point placement can have more effect on
throughput than standards. You need to understand how the efficiency of a WLAN is
affected by such issues as topology, distance, and access point location.

Upon completing this lesson, you will be able to describe the factors affecting the
implementation of a WLAN.

802.11 Topology Building Blocks:

The following figure shows the original standard-defined 802.11 topologies:


workgroup (ad hoc), infrastructure, and Extended Services Set. The other topologies such
as repeaters, bridges, and workgroup bridges are vendor-specific extensions.

802.11 Building Blocks


Networking Essentials – Introduction to Wireless Networking 121

The following list describes these different building blocks.

ƒ Ad hoc mode: Independent Basic Service Set (IBSS) is the ad hoc topology
mode. Mobile clients connect directly without an intermediate access point.
Operating systems such as Windows have made this peer-to-peer network
easy to set up. This setup can be used for a small office (or home office) to
allow a laptop to be connected to the main PC or for several people to simply
share files. The coverage is limited. Everyone must be able to hear everyone
else. An access point is not required. A drawback of peer-to-peer networks is
that they are difficult to secure.

ƒ Infrastructure mode: In infrastructure mode, clients connect through an


access point. There are two infrastructure modes:

ƒ Basic Service Set (BSS): The communication devices that create a BSS
are mobile clients using a single access point to connect to each other or
to wired network resources. The Basic Service Set Identifier (BSSID) is the
Layer 2 MAC address of the BSS access point's radio card. While the BSS
is the single building block for wireless topology and the BSS access point
is uniquely identified through a BSSID, the wireless network itself is
advertised through a SSID, which announces the availability of the
wireless network to mobile clients. The SSID is a wireless network name
that is user configurable and can be made up of as many as 32 case-
sensitive characters.

ƒ Extended Services Set (ESS): The wireless topology is extended with


two or more BSSs connected by a distribution system (DS) or a wired
infrastructure. An ESS generally includes a common SSID to allow
roaming from access point to access point without requiring client
configuration.

BSA Wireless Topology

A Basic Service Area (BSA) is the physical area of RF coverage provided by an


access point in a BSS. This area is dependent on the RF created with variations caused
by access point power output, antenna type, and physical surroundings affecting the RF.
While the BSS is the topology building block and the BSA is the actual coverage pattern,
the two terms are used interchangeably in basic wireless discussions. The following
figure shows a BSA topology.

BSA Topology
Networking Essentials – Introduction to Wireless Networking 122

The access point attaches to the Ethernet backbone and communicates with all
the wireless devices in the cell area. The access point is the master for the cell and
controls traffic flow to and from the network. The remote devices do not communicate
directly with each other; they communicate only with the access point. The access point is
user-configurable with its unique RF channel and wireless SSID name.

The access point broadcasts the name of the wireless cell in the SSID through
beacons. Beacons are broadcasting that access points send to announce the available
services. It is used to logically separate WLANs. It must match exactly between the client
and the access point. However, clients can be configured without an SSID (null-SSID),
then detect all access points, and learn the SSID from the beacons of the access points.
A common example of the discovery process is the one used by the integrated Windows
Zero Configuration (WZC) utility when a wireless laptop is used at a new location. The
user is shown a display of the newly found wireless service and asked to connect or
supply appropriate keying material to join. SSID broadcasts can be disabled on the
access point, but this approach does not work if the client needs to see the SSID in the
beacon.

If a single cell does not provide enough coverage, any number of cells can be
added to extend the range. This range is known as an Extended Service Area (ESA). The
following figure shows an ESA topology.

ESA Topology

It is recommended that ESA cells have 10 to 15 percent overlap to allow remote


users to roam without losing RF connections. For wireless voice networks, an overlap of
15 to 20 percent is recommended. Bordering cells should be set to different non-
overlapping channels for best performance.

Lastly, here is an example of how to activate a secured wi-fi access point router.
Networking Essentials – Introduction to Wireless Networking 123

1. This is the rear view of a wi-fi router, where


there are five RJ45 ports; one of them is in
blue color and rest fours are in yellow color.
The blue color RJ45 port is the WAN port,
internet connection from ISP’s router will
connect here and the rest four will be used for
connection to LAN switch, another wi-fi
router, computer, network printer etc.

To configure this router, power on it, connect


the internet cable at WAN port and connect a
RJ45 patch cord with computer to any of the
LAN port.

2. To open the configuration page, type the


routers IP address at web browser and
enter the username and password. (For
your information, to know the default IP
address and username/password, you
can find it at the below of the router.)
Then go to the “Wireless Settings” page,
enter the wireless network name as per
your choice and enable the wireless
router radio and SSID broadcast. You
can leave the other options with default
settings. To save the configuration, click
on save button.

3. Now go to the “Wireless Security” page


and select the WPA/WPA2-Personal
option, enter the password as per your
choice and leave the other options with
default settings or change the
“Encryption” type as per your
requirements, to TKIP or AES. To save
the configuration, click on save button.

4. Reboot the router after saving the


configuration.

Now a secured wi-fi router is ready to access by any wireless device.


124

References:

1. https://www.ciscopress.com/articles
2. https://searchnetworking.techtarget.com
3. https://core.ac.uk
4. https://www.tutorialspoint.com

You might also like