Gennf301 Network Fundamentals Notes
Gennf301 Network Fundamentals Notes
✓ Definition of network
A computer network is any set of computers or devices connected to each other with the
ability to exchangedata.
✓ Advantages of network
• A user can logon to a computer anywhere on the network and access their work files from the file
server
• Computers can be managed centrally
• Time
• Sharing printers, modems etc saves money and time
• Security
• It is easy and convenient to monitor users –
• Peripherals such as printers can be shared amongst many different users.
• Software can be shared among different users.
• Communication across the network is cheap and fast.
✓ Disadvantages of network
1. Cabling can be expensive to install and replace.
2. A fault with the server will prevent the whole network from working.
3. Security measures are needed to restrict access to the network.
4. WANs are vulnerable to hackers and viruses.
5. If something goes wrong with the file server the whole network is unable to operate
6. The technical skills needed to manage a network are much higher than working on a stand-alone
computer
7. Users may use too much bandwidth - for example when listening to music files or
watching video clips -preventing others from using the network facilities properly
Page 1 of 54
✓ Application of network
• Communication and Collaboration
Social Media: Platforms like Facebook, Instagram, and Twitter connect people worldwide, facilitating
communication, sharing information, and building communities.
Email: One of the most fundamental network applications, email allows for efficient communication and
information exchange.
Instant Messaging: Apps like WhatsApp, Messenger, and Telegram provide real-time text, voice, and
video communication.
Video Conferencing: Tools like Zoom, Google Meet, and Microsoft Teams enable face-to-face meetings,
regardless of location.
• Information Access and Sharing
Internet: The global network of networks provides access to a vast amount of information, including
websites, online resources, and databases.
Cloud Computing: Networks enable the storage and access of data and applications on remote servers,
providing scalability and flexibility.
File Sharing: Networks allow for the sharing of files, documents, and other digital content between devices.
• Business and Industry
Intranets: Private networks within organizations facilitate communication, collaboration, and information
sharing among employees.
Extranets: Networks that connect an organization with its partners, suppliers, and customers.
E-commerce: Online businesses rely on networks to sell products and services, process payments, and
manage inventory.
Remote Work: Networks enable employees to work from anywhere, improving flexibility and productivity.
• Entertainment and Media
Streaming Services: Platforms like Netflix, Hulu, and Spotify deliver movies, TV shows, and music over
the internet.
Gaming: Online gaming allows players to compete and collaborate with others from around the world.
Social Media Influencers: Networks enable individuals to build large followings and monetize their
content.
• Education and Research
Online Learning: Networks provide access to online courses, tutorials, and educational resources.
Research Collaboration: Scientists and researchers can collaborate and share data through networks.
Distance Education: Universities and colleges offer online degree programs and courses.
• Government and Public Services
E-Government: Governments use networks to deliver services to citizens, such as online registration, tax
filing, and permits.
Page 2 of 54
Public Safety: Networks are essential for emergency response, law enforcement, and public safety services.
✓ Network classification
Each computer acts as both client and server. This arrangement is suitable in small office network.
Advantages Disadvantages
inexpensive security
easy to set up Scattering data
easy maintenance
No need for a network operating system
Does not need an expensive server because
individual workstations are used to access the files
Page 3 of 54
Advantages Disadvantages
▪ All files are stored in a central location ▪ A specialist network operating system
▪ Network peripherals are controlled needed
centrally ▪ The server is expensive to purchase
▪ Backups and network security is ▪ Specialist staff such as a network
control centrally manager needed
▪ Users can access shared data which ▪ If any part of the network fails a lot of
i centrally controlled disruption can occur
▪ Client: Computer that uses the services that a server provides. The client is less powerful
than server.
▪ Server: Powerful computer that provides services to other computers on the net
Other Type
• Wireless LANs and WANs(WLAN & WWAN) are the wireless equivalent of the LAN
and WAN. Using acommunications channel that combines many types of media such as
telephone lines, cables, and air waves
• PAN (personal area network) ex : Bluetooth
✓ Network Technologies
Networking technology allows for the exchange of data between large and small information systems
used primarily by businesses and educational institutions.
• IEEE802.3 Ethernet
➢ Ethernet is the most widely used standard for wired networks.
Page 4 of 54
➢ Ethernet operates in the data link layer and the physical layer. It is a family of
networking technologies that are defined in the IEEE 802.2 and 802.3 standards.
➢ Ethernet standards define both the Layer 2 protocols and the Layer 1 technologies. For
the Layer 2 protocols, as with all 802 IEEE standards, Ethernet relies on the two
separate sub layers of the data link layer to operate, the Logical Link Control (LLC)
and the MAC sub layers.
• WI-FI(802.11)
One of the most common networking standards used with wireless LANs is WI-
FI(802.11) a family ofwireless networking standard that use the IEEE802.11 standard
– Access method: Carrier Sense Multiple
Access/Collision Avoidance(CSMA/CA ), a variation
of CSMA/CD.
– Topology: physical wireless, logical bus
✓ Definition of topology
A network topology is the physical and logical arrangement of nodes and connections in a network.
Administrators can use network topology diagrams to determine the best placements for each node
and the optimalpath for traffic flow.
With a well-defined and planned-out network topology, an organization can more easily locate faults and
fix issues,improving its data transfer efficiency.
Physical – The physical network topology refers to the actual connections (wires, cables,
etc.) of how the network is arranged.
Logical – The logical network topology is a higher-level idea of how the network is set up,
including which nodes connect to each other and in which ways, as well as how data is transmitted
through the network.
Physical Topology
1. BUS Topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology.
Page 5 of 54
When a sender sends a message, all other computers can hear it, but only the receiver accepts it(verifying
the mac address attached with the data frame) and others reject it. Bus technology is mainly suited for
small networks like LAN, etc.
In this topology, the bus acts as the backbone of the network, which joins every computer and
peripherals in the network. Both ends of the shared channel have line terminators.
The data is sent only in one direction and as soon as it reaches the end, the terminator removes the
data from the communication line (to prevent signal bounce and data flow disruption).
Taps are the connectors, while droplines are the cables connecting the bus with the computer. In other
words, there is only a single transmission line for all nodes.
2. Ring Topology
Ring topology is a topology in which each computer is connected to exactly two other
computers to form the ring. The message passing is unidirectional and circular in nature.
Page 6 of 54
This network topology is deterministic in nature, i.e., each computer is given access for
transmission at a fixed time interval. All the nodes are connected in a closed-loop. This topology
mainly works on a token-based system and the token travels in a loop in one specific direction.
In a ring topology, if a token is free then the node can capture the token and attach the data and
destination address to the token, and then leaves the token for communication. When this token
reaches the destination node, the data is removed by the receiver and the token is made free to carry
the next data.
1. Easy Installation.
2. Less Cabling Required.
3. Reduces chances of data collision(unidirectional).
4. Easy to troubleshoot(the faulty node does not pass the token).
5. Each node gets the same access time.
Following are the disadvantages of Ring topology:
Page 7 of 54
In a star topology, hub and switch act as a server, and the other connected devices act as clients.
Only one input-output port and one cable are required to connect a node to the central device. This
topology is better in terms of security because the data does not pass through every node.
1. Centralized control.
2. Less Expensive.
3. Easy to troubleshoot(the faulty node does not give response).
4. Good fault tolerance due to centralized control on nodes.
5. Easy to scale(nodes can be added or removed to the network easily).
6. If a node fails, it will not affect other nodes.
7. Easy to reconfigure and upgrade(configured using a central device).
Following are the disadvantages of Star topology:
4. Mesh Topology
Mesh topology is a computer network topology in which nodes are interconnected with each other. In
other words, direct communication takes place between the nodes in the network.
Page 8 of 54
There are mainly two types of Mesh:
1. Full Mesh: In which each node is connected to every other node in the network.
2. Partial Mesh: In which, some nodes are not connected to every node in the network.
Lets say we have n devices in the network then each device must be connected with (n-1)
devices of the network. Number of links in a mesh topology of n devices would be n(n-
1)/2.
Page 9 of 54
1. Very high cabling required.
2. Cost inefficient to implement.
3. Complex to implement and takes large space to install the network.
4. Installation and maintenance are very difficult.
5. Tree Topology:
Tree topology is a computer network topology in which all the nodes are directly or indirectly
connected to the main bus cable. Tree topology is a combination of Bus and Star topology.
In a tree topology, the whole network is divided into segments, which can be easily managed and
maintained. There is a main hub and all the other sub-hubs are connected to each other in this
topology.
Page 10 of 54
3. Hub cabling is also required.
4. A large network using tree topology is hard to manage.
5. It requires very high maintenance.
6. If the main bus fails, the network will fail.
6.Hybrid Topology:
A Hybrid topology is a computer topology which is a combination of two or more topologies. In
practical use, they are the most widely used.
In this topology, all topologies are interconnected according to the needs to form a hybrid. All the
good features of each topology can be used to make an efficient hybrid topology.
1. Complex design.
2. Expensive to implement.
3. Multi-Station Access Unit(MSAL) required.
Page 11 of 54
Some points need to be considered when selecting a physical topology:
• Ease of Installation.
• Fault Tolerance.
• Implementation Cost.
• Cabling Required.
• Maintenance Required.
• Reliable Nature.
• Ease of Reconfiguration and upgradation.
✓ Media: Network media is the actual path over which an electrical signal travels as it
moves fromone component to another.
Transmission medium is of two types:
(i) Physical or Wired or Guided: For example, Twisted Pair Cable, Coaxial Cable and Optical Fiber
Cable.
(ii) Logical or Wireless or Unguided: For example, Radio waves, Microwaves and Infrared.
✓ Data: In general, a message is any grouping of information at the application layer (layer
7) of theOpen Systems Interconnection (OSI) reference model that is exchanged between
applications for various purposes.
✓ Protocol: A network protocol is an established set of rules that determine how data is
transmittedbetween different devices in the same network.
✓ Devices: The devices which are used for communication between different hardware’s used in the
computer network are known as network devices. These devices are also known as physical
devices, networkinghardware, and network equipment otherwise computer networking devices.
Page 12 of 54
Content/Topic 4: Classification of network devices
✓ Interconnection devices
✓ Access devices
✓ End devices
A) Interconnection devices
Interconnection device is any device that can enable computers to exchange data on a network.
1) Repeater : Repeaters are non-intelligent network devices that receive a signal through one
port.
They regenerate that signal and then transmit the signal again on all remaining
ports.
To extend the length of a network, repeaters can be used to connect
network segments (a portion of a computer network) but they can’t be used
to connect different networks usingdifferent access methods.
Repeaters reduce the loss of signal along a cable (known as
attenuation) which in turnprovides a more stable connection to the
devices connected the repeater.
2) Bridge
They are used to connect two or more LANs of the same type, e.g. Ethernet to Ethernet.
Unlike repeaters, a bridge can extend the capacity as well as the length of a network
because each port on abridge has a MAC address.
3) Switch
A network switch connects devices (such as computers, printers, wireless access
points) in a networkto each other, and allows them to 'talk' by exchanging data packets.
4) Router:
The router is a physical or virtual internetworking device that is designed to receive,
analyze, and forward data packets between computer networks. A router examines a
destination IP address of a given data packet, and it uses the headers and forwarding
tables to decide the best way to transfer thepackets.
B) Access devices
Network access device is any device that help a user (end device) to get connected on a network.
Page 13 of 54
There are the following two types of NICs -
1. Ethernet NIC
It is made by ethernet cables. This type of NIC is most widely used in the LAN, MAN, and WAN
networks.
It is a wireless network that allows us to connect the devices without using the cables. These types of
NICsare used to design a Wi-Fi connection.
The NIC also contains a MAC address (also known as a hardware address) which is a unique, 48-bit
identifier used bymany networking protocols including Ethernet and 802.11 wireless.
ii) Hub
Hubs are used in Ethernet networks to connect multiple Ethernet devices together, forming a network
segment (groupof computers that is a portion of a network). A hub, like a repeater has no intelligence so
simply broadcasts all networkdata across all ports.
Access point An access point is a device that creates a wireless local area network, or WLAN,
usually in an office or large building. An access point connects to a wired router, switch, or
hub via an Ethernet cable, andprojects a Wi-Fi signal to a designated area.
C) End devices
The network devices that people are most familiar with are called end devices. These devices form
the interfacebetween the human network and the underlying communication network. Some
examples of end devices are:
Page 14 of 54
Content/Topic 5: Description network models
The networking model describes the architecture, components, and design used to establish
communicationbetween the source and destination systems.
There are two basic types of networking models:
Protocol model - This model closely matches the structure of a particular protocolsuite.
The hierarchical set of related protocols in a suite typically represents all the
functionality required
to interface the human network with the data network. The TCP/IP model is a protocol
model, because it describes the functions that occur at each layer of protocols within the
TCP/IP suite.
Reference model
A layered model, such as the TCP/IP model, is often used to help visualize the interaction
between various protocols. A layered model depicts the operation of the protocols occurring
within each layer, as well as the interaction of protocols with the layers above and below each
layer.
There are benefits to using a layered model to describe network protocols and operations. Using a layered
model:
➢ Assists in protocol design, because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above and below.
➢ Fosters competition because products from different vendors can work together.
➢ Prevents technology or capability changes in one layer from affecting other layers above and
below.
➢ Provides a common language to describe networking functions and capabilities.
OSI Model
OSI stands for Open System Interconnect. It is an open standard for establishing
communication between systems.
Application Layer: The entire process begins at the end user’s device. This can be a
phone, laptop, server, etc. The application layer provides the interface for data
exchange between the program and the user. For example, Facebook’s web
application/mobile application is the interface through which we like, share, comment,and
perform various other activities.
Page 15 of 54
Presentation Layer: The presentation layer ensures the translation of characters from the
original format in the host system to the format of the receiving system. It also addsencryption
and decryption features. Data compression is handled at this layer.
Session Layer: The inclusion of this layer enables maintaining sessions during browsing.
This helps with implementing authentication, authorization, synchronization,and dialog
control. Let us consider examples to appreciate the significance of the session layer.
o Authentication: Once a user logs in, he/she should remain logged in until he/shelogs
out. Obtaining the status of a user’s authentication happens at this layer.
o Authorization: Access rights to specific parts of a website are given to super-
users and admins.
o Dialog Control: Allows various systems running applications like WebEx to
communicate. The challenge here is to send and receive data simultaneously, thatis
overcome by half-duplex or full-duplex protocols under the session layer.
o Synchronization: The digital experience relies on audio and video being
synchronized. The session layer ensures the timestamps of the audio and video
received are in the right order.
Transport Layer: The transport layer is the fourth layer in the OSI model and enablesthe
following services:
o Reliability: This layer ensures that a packet sent is received without corruption. Ifnot,
the packet is resent. This may add a delay. But, it is suitable for applications where
data integrity is a must.
o Flow-Control: The rate of sending information is limited by the buffer size andthe
receiver capacity. The delays caused due to propagation, queueing, and
transmission are taken into account by the flow-control algorithms.
o Congestion Control: In routers, the entry of packets can be decided based on the
current traffic.
o Multiplexing and Demultiplexing: Before the transport layer, the ports do not play a
major role. The ports can be thought of as multiple inputs to the same network
channel. The transport Layer enables multiplexing of various application inputs. On
the receiving end, the transport layer sends the packets tocorresponding ports. This
action is similar to that of demux.
Page 16 of 54
Network Layer: The network layer is one of the most important layers. It enablesmany
features such as:
o Address Assignment: IP addresses are assigned to the host. There are two waysof
assigning addresses: Static and Dynamic. Static addresses are assigned
manually and do not change under any circumstances. Dynamic IP’s, on the otherhand, are
assigned on an as-needed basis.
o Routing: Selecting the route can be done manually or automatically. Today, mostof it
is automatic. There are two predominant algorithms used for routing: Distance Vector
Routing and Link State Routing.
o Fragmentation: Within the transport layer, there is a constraint on the maximum
allowable size for data. Therefore, bits are segmented accordingly in the transportlayer.
Fragmentation is the same process applied to the segmented packets received from the
transport layer. The aim is to accommodate datagrams receivedfrom the transport layer
into frames.
Data Link Layer: The main responsibility of the Data Link Layer(DLL) is ensuringFlow
Control, Error Control, Access Control, Framing, and the reading of physical addresses.
We will go over each of the processes in detail:
o Framing: The process of taking a packet from the layer above and adding a frameto
the packet is called framing. The frame includes data such as the end of the packet,
message length, etc. to achieve accurate information at the receiving end.
o Flow Control: DLL restricts the size of the traffic and waits for the receiver to
acknowledge the first batch of frames before sending the next batch.
o Error Control: Due to long-distance transmission, sometimes the bits of
information might get corrupted. The corruption of bits leads to poor service.
Listed below are a couple approaches to handling data corruption.
▪ Discarding the data corruption bits
▪ Repairing the corrupted bits
Page 17 of 54
o There are other error correction algorithms like Cyclic Redundancy
Check, Checksum, Parity Bits, etc.
Physical Layer: This layer deals with electrical, mechanical, functional, and
procedural characteristics of physical links.
Network topology comes under this layer. One prominent aspect of the physical layer isencoding.
Encoding refers to the representation of data. The objective of encoding is to ensure themaximum
probability that the message, being transmitted is sent without any errors.
TCP/IP Model
The network of networks that we refer to as the Internet is based on the TCP/IP model. Therefore, it is
also referred to as the TCP/IP Protocol Suite. It is a four-layered architecturespecifically built for the
internet.
Page 18 of 54
TCP/IP model uses TCP in the transport layer and IP in the network layer. The four layers ofthe
network model are as follows.
Application Layer: In the TCP/IP Model, the Application layer encompasses the firstthree
layers in the OSI model, that is, Application layer, Presentation layer, and the Session
Layer.
Transport Layer: This layer is the same as the one mentioned in the OSI model.
Transmission Control Protocol (TCP) is used in this model. TCP ensures reliability andhelps
avoids congestion in networks.
Network Layer: Internet Protocol (IP) is used predominantly in this layer. Until recently,
IPv4 was the most common protocol in use. It provided 32 bits for assigning addresses. It
supported around 4.29 million unique devices, and therefore IPv6 was introduced. IPv6 is
the protocol that allows 4.3 billion devices. It has 128 bits assignedfor the network address.
Network Interface: It enables the transmission of data. The layer corresponds to thedata
link layer and the physical layer in the OSI Model.
Page 19 of 54
Learning Outcome 2: Apply network protocols and communications
NetBEUI
NetBEUI: Pronounced net-booey, NetBEUI is short for NetBios Extended User Interface.
It is an enhanced version of the NetBIOS protocol used by network operating systems
such as LAN Manager, LAN Server, Windows for Workgroups, Windows 95 and
Windows NT
NetBEUI is also self-tuning and implements flow control and error detection. It defines a
framing mechanism at the transport layer and implements the LLC2 protocol of the Open
Systems Interconnection (OSI) reference model for networking.
TCP/IP
Transmission Control Protocol (TCP) is the transport protocol that manages the
individual conversations between web servers and web clients. TCP divides the HTTP
messages into smaller pieces, called segments. These segments are sent between the web
server and client processes running at the destination host. TCP is also responsible for
controlling the size and rate at which messages are exchanged between the server and the
client.
Internet Protocol
IP is responsible for taking the formatted segments from TCP, encapsulating them into
packets, assigning them the appropriate addresses, and delivering them across the best
path to the destination host.
Novell NetWare
- A local-area network (LAN)operating system developed by Novell Corporation.
- It provides users and programmers with a consistent interface that is independent
of the actual hardware used to transmit messages.
- NetWare is a computer network operating system developed by Novell, Inc. It
initially used cooperative multitasking to run various services on a personal
computer, using the IPX network protocol.
IPX/SPX (IPX): Short for Internetwork Packet Exchange, a networking protocol
used by theNovell NetWare operating systems. Like UDP/IP, IPX is a datagram
protocol used for connectionless communications.
IPX provides datagram services over packet-switched
internetworks. IPX and IP are connectionless datagram
protocols.
Page 20 of 54
Its basic operation is similar to IP (Internet Protocol), but its addressing scheme,
packet structure,and general scope are different
(SPX): Short for Sequenced Packet Exchange, a transport layer protocol (layer 4
of the OSIModel) used in Novell Netware networks.
The SPX layer sits on top of the IPX layer (layer 3) and provides connection-
oriented servicesbetween two nodes on the network. SPX is used primarily by
client/server applications.
AppleTalk
AppleTalk's purpose was to allow multiple users to share resources, such as
files and printers. AppleTalk includes a number of features that allow local area
networks to be connected with noprior setup or the need for a centralized router
or server of any sort.
OSI : The OSI model is the most widely known internetwork reference model. It is
used for data network design, operation specifications, and troubleshooting.
CISCO
Page 21 of 54
Content/Topic 2: Identification of Network standards
✓ Importance of standards
The primary reason for standards is to ensure that hardware and software produced by
different vendorscan work together.
to develop networks that easily share information.
Standards also mean that customers are not locked into one vendor.
They can buy hardware and software from any vendor whose equipment meets the
standard. In this way,standards help to promote more competition and hold down prices.
The use of standards makes it much easier to develop software and hardware that link
different networks because software and hardware can be developed one layer at a time.
Some of the benefits of having approved and established standards for activities, products or services
are listedbelow:
Let's look at some of the ramifications that may occur without standards:
Page 22 of 54
✓ Internet standards
Internet standard (STD) is a specification that has been approved by the Internet Engineering
Task Force (IETF). Such standard helps to promote a consistent and universal use of the
internet worldwide.
✓ Types of standards
1. De Facto standards
De facto means by tradition or by facts. These standards are developed without any
formal planning.These standards come into existence due to historical developments.
These standards are still being used by many organizations in the world. Here are a
few examples of de facto standards:
These standards are critically assessed before being approved. An example of a de jure
standard is the
ASCII character set. Some de jure hardware standards include USB, FireWire and
HDMI.
✓ Standards organizations
Page 23 of 54
Page 24 of 54
ANSI (American National Standards Institute)
• Established in 1918
• Standards for wide range of products
• Computer industry standards:
– Screen-display attributes
– Digital telecommunications
– Fiber-optic cable transmissions
ITU-Formally CCITT: The standardization efforts of ITU started in 1865 with the formation of the
International Telegraph Union (ITU). ITU became a specialized agency of the United Nations in
1947.
The International Telegraph and Telephone Consultative Committee (French: Comité Consultatif
International, CCITT) was created in 1956, and was renamed ITU-T in 1993. Téléphoniqueet
Télégraphique.
(EIA): Electronic Industries Alliance (EIA): Trade organization composed of representatives from
electronics manufacturing firms across US – Sets standards for its members – Helps write ANSI
standards – Lobbies for legislation favorable to growth of computer and electronics industries
ITU• International Telecommunication Union• Regulates international telecommunications: –
Radio and TV frequencies – Satellite and telephony specifications – Networking infrastructure –
Tariffs applied to global communications• Typically, documents pertain more to global
telecommunications issues than to industry technical specifications
EIA: Founded in 1924, the EIA is a U.S. organization of electronics manufacturers. The primary EIA
standards for telecommunication define the serial interface between modems and computers. The
most popular are the RS-232-C, RS- 449, RS-422, and RS-423 serial interfaces.
Telcordia Is a standard uses a series of models for various categories of electronic, electrical and
electro-mechanical components to predict steady-state failure rates which environmental conditions,
quality levels, electrical stress conditions and various other parameters affect.
Page 25 of 54
Content/Topic 3: Description of Network Media and Transmission
Network media refers to the communication channels used to interconnect nodes on a computer
network. Typical examples of network media include copper coaxial cable, copper twisted pair
cables and optical fiber cables used in wired networks, and radio waves used in wireless data
communications networks.
Logical (Wireless)
The term logical media is used to refer to any type of electrical or electronic operation which is done
without the use of “hard wired” connections. It is also referred to as Wireless or unbounded
transmission media. Features:
▪ The signal is broadcasted through air
▪ Less Secure
▪ Used for larger distances
Microwaves
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly
aligned with each other. The distance covered by the signal is directly proportional to the
height of the antenna. Frequency Range: 1GHz – 300GHz. These are majorly used for mobile
phone communication and television distribution.
Infrared
Infrared waves are used for very short distance communication. They cannot penetrate
through obstacles. This prevents interference between systems. Frequency Range: 300GHz –
400THz. It is used in TV remotes, wireless mouse, keyboard, printer, etc.
Physical
Physical media refers to the physical materials that are used to transmit information in data
communications. These physical media are generally physical objects made of materials such
as copper or glass. They can be touched and felt, and have physical properties such as weight
and color. Features:
▪ High Speed
▪ Secure
▪ Used for comparatively shorter distances
Page 26 of 54
1. Copper media
There are three main types of copper media used in networking:
Unshielded Twisted-Pair (UTP)
Shielded Twisted-Pair (STP)
Coaxial
Coaxial Cable
Coaxial cable, or coax as it is commonly referred to, has been around for a long time. Coax
found success in both TV signal transmission as well as in network implementations.
Coax is constructed with a copper core at the center that carries the signal, plastic insulation,
braided metal shielding, and an outer plastic covering. Coaxial cable is constructed in this way
to add resistance to attenuation (the loss of signal strength as it travels over distance), crosstalk
(the degradation of a signal caused by signals from other cables running close to it), and EMI
(electromagnetic interference).
Advantages:
▪ High Bandwidth
▪ Thicknet. It supports data transfer over longer distances than thinnet. The maximum
length of thinnet is 500 meters
Pairs of copper wires are encased in color-coded plastic insulation and twisted together.
An outer jacket, called poly-vinyl chloride (PVC), protects the bundles of twisted pairs.
Page 27 of 54
2. Twisted-Pair Cabling
A pair of twisted wires forms a circuit that transmits data.
The twisted wires provide protection against crosstalk (electrical noise) because of the cancellation effect
Each pair is wrapped in metallic foil to better shield the wires from electrical noise and then the fourpairs
of wires are then wrapped in an overall metallic braid or foil.
Reduces electrical noise from within the cable.
Reduces EMI and RFI from outside the cable
BENEFITS/DISADVANTAGES
Shielded Twisted Pair
– Provides resistance to EMI and radio frequency
– Must be grounded at both end for high frequency signals
– Cancellation and twisting of wires, shielding reduces internal and external sources ofinterference.
Page 28 of 54
– More expensive than UTP
– Cable length 100m
ScTP: Screened twisted-pair (ScTP) cabling is a hybrid of UTP and STP cable. ScTP cable
typically consists of four pairs of 100 ohm, 24 AWG wire that are unshielded, but surrounded
by a shield of foil and includes a single drain wire used for grounding.
ScTP is less susceptible to noise because of the foil shield.
Advantages:
o Cheaper and far easier to splice
o Less susceptible to electrical interference caused by nearby equipment or wires.
o In turn are less likely to cause interference themselves.
o Because it is electrically "cleaner", STP wire can carry data at a faster speed.
Disadvantages:
o STP wire is that it is physically larger and more expensive than twisted pair wire.
o STP is more difficult to connect to a terminating block.
3. Fiber-Optic Cable
▪ A glass or plastic strand that transmits information using light and is made up of one or
more optical fibersenclosed together in a sheath or jacket.
▪ Not affected by electromagnetic or radio frequency interference.
▪ Signals are clearer, can go farther, and have greater bandwidth than with copper cable.
▪ Usually more expensive than copper cabling and the connectors are more costly and harder to
assemble.
Page 29 of 54
Two types of glass fiber-optic cable:
• Single-mode
—Single-mode fiber cable allows only one mode of light to propagate through the fiber.
—It is capable of higher bandwidth and greater distances than multimode, and it is often used for campus
backbones.
— This type of fiber uses lasers as the light-generating method.
—Single-mode cable is much more expensive than multimode cable.
—Its maximum cable length is more than 10 km.
• Multimode
—Multimode fiber cable allows multiple modes of light to propagate through the fiber.
—It is often used for workgroup applications and intra building applications such as risers.
—It uses light-emitting diodes (LEDs) as a light-generating device.
—The maximum cable length is 2 km.
Fiber optics has several advantages over traditional metal communications lines:
▪ Fiber optic cables have a much greater bandwidth than metal cables.
▪ An optical fiber offers low power loss
▪ Fiber optic cables are immune to electromagnetic interference.
▪ Fiber optic cables are much thinner and lighter than metal wires.
▪ Since the fiber is a dielectric, it does not present a spark hazard.
▪ Fiber optic cables are less susceptible than metal cables to interference
▪ Data can be transmitted digitally (the natural form for computer data) rather than analogically.
The main disadvantage of fiber optics is that the cables are expensive to install. In addition, they are
more fragilethan wire and are difficult to split.
transmission on optical fiber requires repeating at distance intervals.
Cables are expensive to install but last longer than copper cables.
Fibers can be broken or have transmission loses when wrapped around curves of only a
few centimetresradius
Optical fibers require more protection around the cable compared to copper.
Page 30 of 54
✓ Baseband and broadband transmission technologies
Baseband Transmission is a transmission technique that one signal requires the entire
bandwidth of the channel to send data. Broadband Transmission is a transmission technique
that many signals with multiple frequencies transmit data through a single channel
simultaneously.
Page 31 of 54
✓ Wireless Transmission Techniques
Wireless transmission techniques are essential for connecting devices without physical cables. They provide
flexibility, mobility, and ease of installation. Here are some common techniques:
3. Microwave Transmission
o High-frequency RF waves: Transmit data over long distances.
o Line-of-sight: Requires a clear path between transmitter and receiver.
o Applications: Satellite communication, point-to-point links.
6. Ultrasound Transmission
o Sound waves: Transmit data through the air or underwater.
o Short range: Suitable for underwater communication or medical applications.
o Applications: Underwater sensors, medical imaging.
Page 32 of 54
Learning Outcome 3: Apply IP addressing (IP v4&IPv6)
▪ An IP address is represented as a 32-bit binary number, divided into four octets (groups of
eightbits):
Example: 10111110.01100100.00000101.00110110
▪ An IP address is also represented in a dotted decimal
format.Example: 190.100.5.54
▪ When a host is configured with an IP address, it is entered as a dotted decimal number,
such as192.168.1.5.
Unique IP addresses on a network ensure that data can be sent to and received from the correct network
device
✓ IP terminologies
Client: A client is any computer hardware or software device that requests access to a service
provided by aserver.
server : A computer that provides data, services, or resources that can be accessed by other
computers on thenetwork.
Port: A logical connecting point for a process. Data is transmitted between processes through ports (or
sockets).
Page 33 of 54
Node: A node is any physical device within a network of other tools that's able to send,
receive, or forwardinformation.
Packet: A generic term used to define a unit of data including routing and other information that is sent
through aninternet.
Gateway address: Usually the address of the default route to be
used to reacha network that is not specifically known.
Medium: The communications link or network that carries protocol messages.
Message: The structured data communicated by a protocol. Parameters of a message
typically include themessage type, sequence number, control flags, and user data.
subnetting, which is a logical division of a network.
Address - The unique number ID assigned to one host or interface in a network.
Subnet - A portion of a network that shares a particular subnet address.
Subnet mask - A 32-bit combination used to describe which portion of an
address refers tothe subnet and which part refers to the host.
Interface - A network connection.
✓ IP addressing classification
▪ Class A (1 – 126)
Large networks, implemented by large companies and some countries
▪ Class B (128 – 191)
Medium-sized networks, implemented by universities
▪ Class C (192 – 223)
Small networks, implemented by ISP for customer subscriptions
▪ Class D(224 – 239)
Special use for multicasting
Class D addresses do not use a subnet mask.
▪ Class E
Used for experimental testing
Page 34 of 54
✓ IP addresses grouping
IP addresses grouping: Rules for Grouping IP Addresses. The original specifications for TCP/IP
grouped IP addresses into sets of consecutive addresses called IP networks. The addresses in a
single IP network have the same numeric value in the first part of all addresses in the network.
✓ IP addressing scheme
IP Addressing Scheme. The IP header has 32 bits assigned for addressing a desired device on the
network. An IP address is a unique identifier used to locate a device on the IP network. To make the
system scalable, the address structure is subdivided into the network ID and the host ID.
Page 35 of 54
Basic structure of an IP address
The basic structure of an IP address is like xxx.xxx.xxx.xxx, where each xxx can be any number between
0 and 255.
Each of these parts is stored in 8 bits. So, the maximum number of possible combinations for each
group of numberis 256 (i.e. each group can have any one value from the range of 0 to 255).
Each address can be technically divided into two parts. One of these parts is the network part, which
represents theclass of IP address that is being used in the network.
The other one is the host part, which represents the unique ID of the device in the network.
here 192.168.10 is the network part, and represents the network. The number 14 represents the
unique ID of thedevice in the network.
You can find out the IP address of your PC when you are connected to a network. Here’s how:
192.168.12.162
Page 36 of 54
The default subnet masks for three classes of IP addresses:
255.0.0.0 is the subnet mask
for Class A
255.255.0.0 is the subnet
mask for Class B
255.255.255.0 is the subnet
mask for Class C
For example, if the subnet mask is 255.255.255.0, there are 24 bits set to 1 in the binary version of the
subnet mask, so the prefix length is 24 bits or /24. The prefix and the subnet mask are different ways of
representing the same thing - the network portion of an address.
✓ Prefix length
The prefix length is another way of expressing the subnet mask. The prefix length is the number of bits
set to 1 in the subnet mask. It is written in “slash notation”, a “/” followed by the number of bits set to 1.
For example, if the subnet mask is 255.255.255.0, there are 24 bits set to 1 in the binary version of the
subnet mask, so the prefix length is 24 bits or /24. The prefix and the subnet mask are different ways of
representing the same thing - the network portion of an address.
Among them, public and private addresses are based on their location of the network private,
which should be used inside a network while the public IP is used outside of anetwork.
Public IP Addresses
• It is an IP address available for everyone to see.
• Public IP’s let the general public find out information about your computer and
are available to see it, for example a web server.
• User has no control over the IP address (public) that is assigned to the computer.
Page 37 of 54
• The public IP address is assigned to the computer by the Internet Service Provider
Private IP Addresses
A private IP address is a unique IP number assigned to every device that connects to your home
internet network, which includes devices like computers, tablets, smartphones, which is used in your
household.
It also likely includes all types of Bluetooth devices you use, like printers or printers, smart devices
like TV, etc. With a rising industry of internet of things (IoT) products, the number of private IP
addresses you are likely to have in your own home is growing.
A private IP address is an IP address used on a private network (e.g. a home network) that is not
routable through the public internet.
A public IP address can be either static or dynamic. A static public IP address does not change and is
used primarily for hosting web pages or services on the Internet. On the other hand, a dynamic public
IP address is chosen from a pool of available addresses and changes each time one connects to the
Internet.
Most Internet users will only have a dynamic IP assigned to their computer which goes off when the
computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP
Hosts that do not require access to the Internet can use private addresses
Dynamic IP address:
Dynamic IP addresses always keep changing. It is temporary and are allocated to a device every time it
connects to the web. Dynamic IPs can trace their origin to a collection of IP addresses that are shared
across many computers.
Static IP Addresses
A static IP address is an IP address that cannot be changed. In contrast, a dynamic IP address will be
assigned by a Dynamic Host Configuration Protocol (DHCP) server, which is subject to change.
Static IP address never changes, but it can be altered as part of routine network administration.
Dedicated IP Addresses:
Dedicated IP address is assigned uniquely to each website. Dedicated IP addresses helps you avoid
any potential backlists because of bad behavior from others on your server. The dedicated IP address
also gives you the option of pulling up your website using the IP addressalone, instead of your
domain name. It also helps you to access your website when you are waiting on a domain transfer.
Automatic method-
DHCP
DHCP short for Dynamic Host Configuration Protocol is a protocol which helps to
dynamically assign IPaddresses, instead of having static IP addresses .When a machine
connects to a network it receive a IP address.
The server that manages this dynamically assigned IP addresses is called Dynamic Host
ConfigurationProtocol (DHCP) server.
Static addressing method
Address does not change - good for web servers, email servers and other Internet servers.
Use DNS to map domain name to IP address, and use domain name to address the static IP
address.
Expensive than dynamic IP address - ISPs generally charge additional fee for static IP addresses.
Page 39 of 54
Need additional security - Since same IP is assigned to a machine, hackers try brute
force attack on themachine over period of time.
Dynamic method
✓ Introduction to IPv4
Internet Protocol Version 4 (IPv4) is the fourth revision of the Internet Protocol (IP) used to
facilitate communication over a network through an addressing system
- It is currently the most popular Internet protocol used to connect devices to the Internet.
- IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses
(just over 4 billionaddresses).
- Each device connecting to the Internet requires an IP address.
-That means that each device including cell phones, office phones, game consoles and
computers each need their own IP address in order to connect and communicate over the
Internet
Page 40 of 54
✓ Anatomy of IPv4 address
32 bit address
IPv4 is a 32 bit address(binary patterns). Because it consists of 4 octet(1 octet = 1byte/8 bits)
so with a simple calculation: 4octets*8bits = 32 bits.
There are three types of addresses within the address range of each IPv4 network:
✓ Network address
✓ Host addresses
✓ Broadcast address
• Network Address
In each IPv4 addresses, some portion(high-order bits) represents Network address. It
is a group ofhosts that have identical bit patterns.
• Host Address
Every devices has a uniques IP address. Host address belongs in a certain Network
address.(usually in the rightmost in the IP address)
• Broadcast Address
The IPv4 broadcast address is a special address for each network that allows
communication to all the hosts in that network.
▪ To define the network and host portions of an address, a devices use a separate 32-bit
pattern called a subnet mask
▪ The subnet mask does not actually contain the network or host portion of an IPv4
address, it just says where to look for these portions in a given IPv4 address
Page 41 of 54
Valid Subnet Masks
EXERCISES
Q: What are the maximum networks and hosts in a class A, B and C network?
For Class A, there are 126 possible networks
and 16,777,214 hosts For Class B, there are
16,384 possible networks and 65,534 hosts For
Class C, there are 2,097,152 possible networks
and 254 hosts
✓ Calculation of IP addresses
Subnetting allows you to create multiple logical networks that exist within a single Class A,
B, or Cnetwork.
Class A, B, or C network.
CIDR
Classless Interdomain Routing (CIDR) was introduced in order to improve both address space
utilization and routing scalability in the Internet. It was needed because of the rapid growth of the
Internet and growth of the IP routing tables held in the Internet routers.
Summarization
Route summarization - Also known as prefix aggregation, routes are summarized into a single route
to help reduce the size of routing tables. For instance, one summary static route can replace several
specificstatic route statements.
Super-netting - Occurs when the route summarization mask is a smaller value than the default traditional
classful mask.
Page 42 of 54
Note: A supernet is always a route summary, but a route summary is not always a supernet.
Calculating IPV4 Summary network
Step 2. Count the number of far-left matching bits to determine the mask for the summary route.
Step 3. Copy the matching bits and then add zero bits to determine the summarized network address.
Fixed-length subnet mask (FLSM) is a subnet deployment strategy in which a block of IP addresses
is split into several subnets of identical length. It is also known as classful subnetting.
Variable-length subnet mask (VLSM) refers to a strategy that allows all the subnetworks to
have variable sizes. Network administrators can use VLSM subnetting to divide an IP address space into
subnets ofvarious lengths and assign them based on the needs of the network. It is also called classless
subnetting.
In FLSM all subnets use same subnet mask, this lead to inefficiencies.
With classful subnetting, all subnets have the identical number of host addresses. This could present
issues if you need certain subnets to have a small number of IP addresses, and you need other
subnets to have a large number of IP addresses. The solutions listed below; to
solving this issue does not however optimize the network configuration. This is mostly due to IP
addresses being wasted:
Variable length subnet masks (VLSMs) allow subnets to be further subnetted, and also
enable routers to handle different subnet masks.
VLSMs provide the flexibility needed to optimize the network configuration by allowing
you to configure network subnets that meet the requirements of your organization. No IP
addresses are wasted.
VLSMs (nonclassfulsubnetting) can be defined as the process whereby which subnets
are divided into smaller segments of various sizes.
Page 43 of 54
The differences between FLSM and VLSM are as follows:
CIDR, which stands for Classless Inter-Domain Routing, is an IP addressing scheme that
improves the allocation of IP addresses. It replaces the old system based on classes A, B,
and
C. This scheme also helped greatly extend the life of IPv4 as well as slow the growth of
routingtables.
Page 44 of 54
CIDR IP address would look like the following:
192.255.255.255/12
Page 45 of 54
Let’s see the difference between classful routing and classless routing:
Page 46 of 54
✓ IP addresses Diagnostic tools
Testing IP addresses
• Diagnostic tools: Computer diagnostics tools are pieces of software that give you the
knowledge you need to be able to potentially repair your own computer. These tools
are made to find problems that may be disrupting
your computer's normal performance. Once a problem is found, you can
then plan your repair The diagnostic tools listed and discussed are the followings:
ifconfig: Provides information about the basic configuration of the interface. It is useful for detecting
bad IP addresses,
incorrect subnet masks, and improper broadcast addresses.
arp: Provides information about Ethernet/IP address translation. It can be used to detect systems on
the local network that are configured with the wrong IP address
netstat: Provides a variety of information. It is commonly used to display detailed statistics about
each network interface, the network sockets, and the network routing table.
ping: Indicates whether a remote host can be reached. ping also displays statistics about packet loss and
delivery time.
Dig: Also provides information about name service and is similar to nslookup.
Traceroute: Prints information about each routing hop that packets take going from your system to a
remote system.
✓ IP address translation
IP address translation: NAT allows internal hosts to be translated to a public address for Internet
access. Network Address Translation (NAT) is the process where a network device, usually a Router
translate private IP into public IP.
✓ IP addressing forms
Data is transported over a network by three simple methods i.e. Unicast, Broadcast, and Multicast.
So let’s begin to
summarize the difference between these three:
• Unicast: from one source to one destination i.e. One-to-One
• Broadcast: from one source to all possible destinations i.e. One-to-All
• Multicast: from one source to multiple destinations stating an interest in receiving the traffic
i.e. One-to-Many
Internet protocol version 6 is the most recent version of the internet protocol, it is communications
protocol that provides an identification and location system for computers on networks
Page 47 of 54
The Need for IPv6
IPv6 is designed to be the successor to IPv4
Depletion of IPv4 address space has been the motivating factor for moving to IPv6
Projections show that all five RIRs (Regional Internet Registry) will run out of IPv4
addresses between 2015 and 2020
With an increasing Internet population, a limited IPv4 address space, issues with NAT and
an Internet of things, the time has come to begin the transition to IPv6!
IPv4 has theoretical maximum of 4.3 billion addresses plus private addresses in combination with
NAT
IPv6 larger 128-bit address space providing for 340 undecillion addresses
IPv6 fixes the limitations of IPv4 and include additional enhancements such as ICMPv6
Page 48 of 54
✓ IPv4 and IPv6 Coexistence
The migration techniques can be divided into
three categories: #1 Dual-stack
Dual-stack: Allows IPv4 and IPv6 to coexist on the same network. Devices run both IPv4
and IPv6 protocol stacks simultaneously.
#2: Tunnelling
Tunnelling: A method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is
encapsulated inside an IPv4 packet.
#3 Translation
Page 49 of 54
Translation: Network Address Translation 64 (NAT64) allows IPv6-enabled devices to
communicate with IPv4- enabled devices using a translation technique similar to NAT for IPv4.
An IPv6 packet is translated to an IPv4 packet, and vice versa.
IPv6 addresses are 128 bits in length and written as a string of hexadecimal values. Every 4 bits is
represented by a single hexadecimal digit; for a total of 32 hexadecimal values. IPv6 addresses are not
case sensitive and can be written in either lowercase or uppercase.
Unlike IPv4 addresses that are expressed in dotted decimal notation, IPv6 addresses are represented
using hexadecimal values
IPv4 address space (32 bits):
232 =
4294967296
addresses IPv6
address space
(128 bits):
2128 = 340282366920938463463374607431768211456 addresses
Preferred Format
The preferred format for writing an IPv6 address is x:x:x:x:x:x:x:x, with each “x” consisting of four
hexadecimalvalues. When referring to 8 bits of an IPv4 address we use the term octet. In IPv6, a
hextet is the unofficial termused to refer to a segment of 16 bits or four hexadecimal values. Each
“x” is a single hextet, 16 bits or four hexadecimal digits.
Page 50 of 54
IPv6 Address Representation
Look at the binary bit patterns that match the decimal and hexadecimal values
Page 51 of 54
0A00 can be represented as A00
00AB can be represented as AB
# Examples 2
Page 52 of 54
IPv6 addressing structure
TYPES OF IPv6
The three types of IPv6 addresses are: unicast, anycast, and multicast.
Page 53 of 54
IPv6 Summary Network
Summarizing IPv6 networks into a single IPv6 prefix and prefix-length can be done in
seven steps asshown in Figures 1 to 7:
Step 1. List the network addresses (prefixes) and identify the part where the addresses differ.
Step 4. Count the number of far left matching bits to determine the prefix-length for the
summary route.
Step 5. Copy the matching bits and then add zero bits to determine the summarized
network address(prefix).
Step 7. Append the prefix of the summary route (result of Step 4).
Page 54 of 54