Professional Documents
Culture Documents
Outline
What is network? Basic requirements of a network Components of a network Protocols Classification of computer networks TCP/IP protocol stack Applications
2
What is a network?
A computer network is "A set of data processing nodes that are interconnected for the purpose of data communication".
Components of network
Message Sender Receiver Protocol Medium
Protocols
Set of rules governing data communication. Integration of three basic functions:
What is communicated? How is it communicated? When is it communicated?
10
11
Mesh network
Point to point dedicated link between any two nodes Elimination of traffic problem Provides security and privacy of data Robust Not Scalable
Interface problem
12
Mesh network
13
Star network
Each node is connected to the central controller. It does not allow direct traffic between devices. Robust, provided the controller remains active Scalable
14
Star network
15
Bus network
One long cable act as a backbone to link all the devices in a network. Nodes are connected to bus cable by the drop lines and taps. No security and privacy to data. Broadcasting of data
16
Bus network
17
Ring network
Each device has a dedicated point to point connection only to the two devices on either side of it. No broadcasting of data. Scalable
18
Ring network
19
Physical Layer
Task
Transmit raw bits over communication channel
22
23
Network Layer
Task
Host to host delivery Routing Congestion control
25
Internet Protocol - IP
Fig.: IP Addressing
CORAL TELECOM LTD. 27
IP Example
28
Transport Layer
Task
Process to process message delivery
29
Application Layer
Task
Provides services to users
33
Accessing Website
Accessing Website
3
2 8 9 7 10 11 6 5 4
Networking Devices
HUB Bridge Switch
Router
Switching is done on the basis of the source and destination Ethernet addresses
36
Questions
What is difference between IP address and Ethernet Address? What is a Public and Private IP? How is data sent over internet? How are IP addresses allocated to my PC? What is difference between switch and router?
CORAL TELECOM LTD. 37
Questions
What is a layer 2 switch? Where and why do we use NAT? What is the significance of subnet mask? What is the difference between broadcast and Multicast? What is streaming?
38
IP Addresses
32 bits in existing IP (IPv4), 128 bits in IPv6 (future). Typically written in form xxx.xxx.xxx.xxx (e.g. 192.168.0.1)
Binary Representation:
11000000 10101000 00000000 00000001
IP Addresses
Hierarchical Division in IP Address:
40
Subnet Mask
Define which bits are used to describe the Network Part and which for hosts Different Representations:
decimal dot notation: 255.255.255.0 binary: 11111111 11111111 11111111 00000000 hexadecimal: 0xFFFFFF00 number of network bits: /24
41
Subnet Mask
For E.g.
IP IP (Binary) Netmask (Binary) 192 168 0 1 11000000 10101000 00000000 00000001 255 11111111 255 11111111 Network 255 11111111 0 00000000 Host
Broadcast
Allocating IP Addresses
The Subnet mask is used to define size of a network E.g. a subnet mask of 255.255.255.0 or /24 implies 3224=8 host bits
2^8 minus 2 = 254 possible hosts
43
MAC Address
MAC Address Media Access Control Address A hardware address that uniquely identifies each node of a network 48 bit address MAC Address are also called as Ethernet Address MAC address are unique and they are allotted by the manufacturer of the Ethernet device MAC address cannot be modified by the user
CORAL TELECOM LTD. 45
Router
A specialized device (computer) connected to more than one to transfer data packets from one network to another. IP networks are packet-switched networks, which means that the packets can take different routes between a source and a destination host. The whole Internet consists of a number of networks connected to each other via routers.
46
Functions of Router
Routers operate at the Network Layer (OSI layer 3) Layer 3: Network layer (e.g. IP)
Unreliable
if packet gets lost, network layer doesnt care higher layers can resend lost packets
OSI Model Layers
7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical
47
Functions of Router
Layer 3: Network layer (e.g. IP)
Makes routing decisions
how can the packet be sent closer to its destination? routers can talk to each other to exchange information about network topology
OSI Model Layers
7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical
The addresses used by the IP protocol are 32-bit numbers. IP addresses are split up into four 8-bit numbers called octets. For example, 193.12.15.1.
48
Router (Example)
The first networks is identified by the IP-number 193.12.15.0 and the other network is identified by the IP-number 10.5.17.0. On every network there are two hosts. Observe that the first three octets in the IP-numbers are the same as in the IP-number of the networks. The router that connects the two networks has two interfaces with IP-numbers that belong to each respective network.
49
Routing Decision
The router algorithm includes four different steps.
The first question is if the destination host is on a network that is directly connected to the router. If the answer to this question is yes the router makes a direct delivery to the destination host. Otherwise the next question is if the destination host is to be found in the routing table. If the answer is yes, then the router sends the packets to a router that is closer to the destination host. Otherwise the router looks to see if the network, to which the destination host is connected, is to be found in the routing table. If the answer is yes, then the router sends the packets to a router that is closer to the destination host. The last chance for the router is to use a default router to send the packet to. Now it is up to the default router to find the destination host. The default router is sometimes also called the default gateway.
50
Routing Table
How does the router choose where to send the packets? The router keeps the routing information in a table. This information tells the router how to reach remote networks and hosts. A catchall entry, also called the default router must generally be supplied. All packets to an unknown network or host are sent to the default router. In the picture you see a router with its specific routing table. If the packets are to be delivered to the host with IP-number 192.1.5.10, the router sees that the destination host belongs to the network 192.1.5.0. The routing table says that this network can be reached via the router 192.1.8.2.
51
Administrative Distances
The administrative distance (AD) is used to rate the trustworthiness of routing information received on a router from a neighbor router. An administrative distance is an integer from 0 to 255, where 0 is the most trusted and 255 means no traffic will be passed via this route. Lowest AD will be placed in the routing table
52
Static Routing
Static routing is the term used to refer to the manual method used to set up routing. Static Route has default administrative distance of 1 Advantages:
Easy to predict and understand in small networks Simple to setup
Disadvantages:
An administrator enters routes into the router using configuration commands. Requires extensive planning and has a high management overhead When there is a change in the network or a failure occurs between two statically defined nodes, traffic will not be rerouted.
53
54
Routing Protocols
Two groups of routing protocols:
Interior Gateway Protocol, IGP which is used inside a local network. This network is also called an autonomous system or AS. Exterior Gateway Protocols, EGP, and is used between autonomous systems. EGP, is normally used by the Internet service providers.
55
56
57
RIP V 1/2
RIP version 1 uses only classful routing, which means that all devices in the network must use the same subnet mask. RIP version 1 doesnt send updates with subnet mask information in tow. RIP version 2 provides something called prefix routing, and does send subnet mask information with the route updates. This is called classless routing.
58
RIP (Example)
This picture shows three routers using RIP. The router B, for example was originally configured with the information about the directly connected networks. The rest of the information in the routing table has been learned from the other routers in the network.
59
60
61
OSPF-Network Hierarchy
OSPF is supposed to be designed in a hierarchical fashion, which basically means that you can separate the larger internetwork (AS) into smaller internetworks called areas. OSPF must have an area 0 called Backbone Area, and all routers should connect to this area if at all possible Routers that connect other areas to the backbone within an AS are called Area Border Routers (ABRs). An areas topology is invisible to entities outside the area. OSPF backbone is responsible for inter area communication. It consists of all Area Border Routers, networks not wholly contained in any area, and their attached routers. An ASBR is a router that is connected to more than one AS and that exchanges routing information with routers in other ASs. ASBRs typically also run a non-IGP routing protocol (e.g., BGP), or use static routes, or both. An ASBR is used to distribute routes received from other ASs throughout its own AS.
OSPF-Features
OSPF provides the following features:
Consists of areas and autonomous systems Minimizes routing update traffic Allows scalability Supports VLSM/CIDR Has unlimited hop count Allows multi-vendor deployment (open standard)
64
Redundancy
Redundancy means having more than one possible path to reach the destination host. In the picture you can see that there are two alternative ways between the host A and host B which gives us redundancy. On the Internet for example, there are many alternative ways to reach a host or a network, which means that Internet has a lot of redundancy.
65
Dynamic Update
To use all the benefits of a secure and redundant network structure a routing protocol is needed. The routing protocol must be used so that the routers can exchange information continuously about the status of the links between the different routers. This means that the router information is dynamically updated. In the picture you can see that a path between routers has been broken. With the help of routing protocols the information about the broken link is sent to other routers in the network. This means that the routers will send the packets using an alternative path.
66
Some Terminologies
DHCP - Dynamic Host Control Protocol
DHCP automatically configures the PC's IP address, the gateway address and also the DNS address
Gateway
a network point that acts as an entrance to another network
67
Some Terminologies
Broadcast
Packets are transmitted to all user terminals in a network
Multicast
Packets transmitted to selected multiple recipients who have joined the appropriate multicast group.
Unicast
Packets transmitted to a single user.
Streaming
Playing video or sound in real time as it is downloaded over the Internet
68
Some Terminologies
PPP Point-to-Point Protocol
Protocol encapsulating a connection to a TCP/IP network through a modem and a telephone line
69
Thank You!
70