Professional Documents
Culture Documents
ITEU3 ND 2019
ITEU3 ND 2019
UNIT – III
NETWORKING ESSENTIALS
COMPILED BY
VERIFIED BY
1
UNIT III NETWORKING ESSENTIALS 9
2
UNIT – III
NETWORKING ESSENTIALS
3
PART – A
1. List out the advantages and limitations of WiFi.(NOV/DEC2019)
2. List out the networking components. (NOV/DEC2019)
3. What is the purpose of DNS server (APR/MAY2019)
4. You want to implement a mechanism that automates the IP configurations,
which protocol will you use to accomplish this? (APR/MAY2019)
5. How many bits does IPV6 address contain? How it is different from IPV4 ?
[APR/MAY2018]
6. Differentiate WiFi and WiMax? [APR/MAY2018]
7. Define Computer Network.
8. List out the Advantages of computer network.
9. Define Server.
10. Define communication channel.
11. Define network switch.
12. What are the types of media transmitters?
13. List out the merits of TCP/IP model.
14. List out the demerits of TCP/IP model.
15. What are the types of service?
16. What are the Switching techniques?
17. Define Path selection.
18. What is Network Interface Card?
19. Define PCF.
20. Define the error rate measurements.
PART – B
4
3. Explain detail about in Type of Networks.
4. With a neat diagram explain OSI model. (OR) How do layers of Internet
model correlate with OSI model?
5. Explain in detail about TCP/IP architecture and also brief the various
protocols used in this model (7) [APR/MAY2019]Explain in detail the TCP/IP
Reference model. [OR] Show how data flows through different layers in
TCP/IP network. Calculate the number of times encapsulation and de-
capsulation take place.[6marks]
6. Explain in detail the Wireless Local Area Network.
7. List out detail about Network components.
5
PART – A
6
3. What is the purpose of DNS server (APR/MAY2019)
4. You want to implement a mechanism that automates the IP configurations,
which protocol will you use to accomplish this? (APR/MAY2019)
5. How many bits does IPV6 address contain? How it is different from IPV4 ?
[APR/MAY2018]
An IP address is binary numbers but can be stored as text for human
readers. For example, a 32-bit numeric address (IPv4) is written in decimal as
four numbers separated by periods. Each number can be zero to 255.
For example, 1.160.10.240 could be an IP address.
IPv6 addresses are 128-bit IP address written in hexadecimal and
separated by colons.
An example IPv6 address could be written like
this: 3ffe:1900:4545:3:200:f8ff:fe21:67cf
Wi-Fi typically provides local network access for a few hundred feet with the
speed of up to 54 Mbps, a single WiMAX antenna is expected to have a range of
up to 40 miles with the speed of 70 Mbps or more. As such, WiMAX can bring
the underlying Internet connection needed to service local Wi-Fi networks.
7
network-connected peripheral devices like printers, scanners and copiers,etc.,
sharing of programming/files
sharing of data
sharing of information
Sharing a single internet connection.
sharing software between multiple users, saves money.
it is cost-efficient and can help protect your systems.
5. Define Server.
That provides a specific kind of service to client software running on the same
computer or other computers on a network.
It has a advanced features like the ability to form tables that keep updated about
all the computer or device and on which port it is on.
8
8. What are the types of media transmitters?
Coaxial cable
Fiber-optic Cable
Wireless
It operates independently
It is scalable
9
12. What are the Switching techniques?
There are four typical switching techniques available for digital traffic.
Circuit Switching
Packet Switching
Message Switching
Cell Switching
Path selection involves applying a routing metric to multiple routes to select the
best route.
10
PCF method is used in infrastructure network.
Sinal- to Noise ratio(SNR ratio)- is a relative measure of the received signal and this
noise.
Bit error rate(BER) – the probability that a transmitted bit s received in error at the
receiver.
PART – B
11
Following figure shows the types of switching:
Circuit Switching
12
This is called as setup phase in which a circuit is reserved on each link, and the
combination of circuits or channels defines a dedicated path.
After the establishment of the dedicated circuit, the data transfer can take place.
After all data has been transferred, the circuit is torn down.
Packet Switching:
In packet switching, messages are divided into packets of fixed or variable size.
The size of packet is decided by the network and the governing protocol.
Resource allocation for a packet is not done in packet switching.
Resources are allocated on demand.
The resource allocation is done on first-come, first-served basis.
Each switching node has a small amount of buffer space to hold packets
temporarily.
If the outgoing line is busy, the packet stays in queue until the line becomes
available.
Packet switching method uses two routing methods:
13
2. Virtual Circuit Packet Switching
Virtual circuit packet switching is normally done at the data link layer.
Virtual circuit packet switching establishes a fixed path between a source and a
destination to transfer the packets.
It is also called as connection oriented network.
A source and destination have to go through three phases in a virtual
circuit packet switching:
I. Setup phase
ii. Data transfer phase
iii. Connection release phase
14
Message Switching
15
2. Discuss on the different network topology and give example for each.(6)
[APR/MAY 2019] OR Explain the various Network
Topologies.[APR/MAY2018]
1. Physical topology
2. Logical topology
Physical Topologies
The physical topology is the physical shape or layout of the wires that can be
visible in a network. The Physical topology defines how devices are
interconnected with or without wires. Physical topology is further divided into two
sections.
1. Point-to-point connections
2. Multipoint connections
Point-to-point connections
16
to- point connection is talking over telephone between two persons where anyone
else is not allowed to use the phone on either side.
Multipoint Connection
Logical Topology
A logical topology defines how devices communicate with each other across the
physical topology. The physical and logical topologies are independent of each
other. The physical topology refers to the physical layout of the wires where the
logical topology refers to how data moves through the network. There are five
types of logical topology that are used in a network.
Star topology
Hierarchical topology
Bus topology
Mesh topology
Ring topology
Star Topology
Star topology is the most popular network topology that is used in many business
and home networks today. A star topology is established with a central
connection point called a hub node. The hub may be an actual hub device or a
network switch or a network router. Network devices generally connect to the hub
with Unshielded Twisted Pair (UTP) Ethernet cables also known as RJ45 cables.
The main benefit of a star network is that failure in any start network cable will
17
only take down one computer’s network access but not the entire LAN. However,
if the hub node fails, the entire network will be down in a start network.
Star Network
Hierarchical Topology
The hierarchical topology is also known as tree topology. In a tree topology, a central
‘root’ node (top level of the hierarchy) is connected to one or more other nodes that are
one level lower in the hierarchy with a point-to-point physical link. The second level
node may also have connected to one or more other nodes that are one level down in
the hierarchy with another point-to-point link. The top level node i.e root node is the only
node that has no other node above it in the hierarchy.
Multiple star networks can be connected with tree network where each hub node of a star network
functions as the node of a tree network.
18
Tree Network
Bus Topology
In a bus network, a common backbone is connected to all network devices. The high capacity bus
backbone (generally a single cable) functions as a shared communications medium and it joins networks
and central devices. If any network device wants to communicate with another network device within a
bus network, the device sends a broadcast message onto the backbone. All other devices will see the
broadcast message but only the desired recipient will accepts and process the message.
The performance of a bus network will be visual negatively if more than few dozen computers are
connected to this network. In addition, failure of the backbone cable will damage the whole network.
Bus Network
Mesh Topology
19
In a mesh network, every network device is connected to every other network device with a point-to-
point connection. This topology is mostly used in WAN and wireless networks. The route concept is
introduced by mesh topology and this topology is used by routers to determine the best path. Mesh
network also provides physical link redundancy in the event of a link failure. As each device is
connected to all other devices in a mesh network, this topology is the most expensive and difficult to
maintain.
Two types of mesh topology are possible. If every device is connected to all other devices, it is called full
mesh. On the other hand, partial mesh also possible where some devices are connected to only
indirectly to others.
Ring Topology
20
In a ring network, every network device is connected to two neighbor devices with a point-to-point
connection for communication purpose. All devices in a ring network make a loop. If any cable or device
is fail, the loop will break and also break down the entire ring network. In the ring network, messages
travel through the loop in the same direction (effectively either clockwise or counterclockwise). FDDI,
SONET or Token Ring technology is used to implement a ring network. A Token is passed from one
computer to another which enables each computer to have equal access to the network.
Ring Network
Network topology plays an important role in computer network design theory. You can probably build a
small network without having better knowledge on the network topology but if you have better
understanding, you will be able to understand basic networking concept like network broadcasting,
switching and routing.
Computers in a network are connected in some logical manner, referred to as network topology
or network architecture. Learn about the different types of network architecture.
21
3. Explain detail about in Type of Networks.
Computer Networks fall into three classes regarding the size, distance and the
structure namely: LAN (Local Area Network), MAN (Metropolitan Area Network), WAN
(Wide Area Network). Before we discussing about type of network we can discuss about
what is a network.
Types of Networks
Personal area networks typically involve a mobile computer, Personal area networks
can be constructed with cables or wirelessly. Personal area networks generally cover a
Network range of less than 10 meters (about 30 feet).
PAN (Personal Area Network) first was developed by Thomas Zimmerman and other
researchers at M.I.T.'s Media Lab and later supported by IBM's Almaden research lab.
A Local Area Network is a privately owned computer network covering a small Networks
geographical area, like a home, office, or groups of buildings e.g. a school Network. A
LAN is used to connect the computers and other network devices so that the devices
can communicate with each other to share the resources. The resources to be shared
can be a hardware device like printer, software like an application program or data. The
size of LAN is usually small. The various devices in LAN are connected to central
devices called Hub or Switch using a cable.
Now-a-days LANs are being installed using wireless technologies. Such a system
makes use of access point or APs to transmit and receive data. One of the computers in
a network can become a server serving all the remaining computers called Clients.
22
For example, a library will have a wired or wireless LAN Network for users to
interconnect local networking devices e.g., printers and servers to connect to the
internet.
LAN offers high speed communication of data rates of 4 to 16 megabits per second
(Mbps). IEEE has projects investigating the standardization of 100 Gbit/s, and possibly
40 Gbit/s. LANs Network may have connections with other LANs Network via leased
lines, leased services.
Types of LAN
There are basically two types of Local Area Networks namely: ARCnet and Ethernet.
23
IEEE has projects investigating the standardization of 100 Gbit/s, and possibly 40
Gbit/s. LANs Network may have connections with other LANs Network via leased
lines, leased services.
24
A MAN can be created as a single network such as Cable TV Network, covering
the entire city or a group of several Local Area Networks (LANs).
It this way resource can be shared from LAN to LAN and from computer to
computer also. MANs are usually owned by large organizations to interconnect
its various branches across a city.
MAN is based on IEEE 802.6 standard known as DQDB (Distributed Queue Dual
Bus).
DQDB uses two unidirectional cables (buses) and all the computers are
connected to these two buses. Each bus has a specialized device that initiates
the transmission activity.
This device is called head end. Data that is to be sent to the computer on the
right hand side of the sender is transmitted on upper bus.
Data that is to be sent to the left hand side of the sender is transmitted on lower
bus.
25
Computers connected to a Wide Area Networks are often connected through
public networks, such as the telephone system.
They can also be connected through leased lines or satellites.
The largest WAN in existence is the Internet. Some segments of the Internet, like
VPN based extranets, are also WANs in themselves.
Finally, many WANs are corporate or research networks that utilize leased lines.
Numerous WANs have been constructed, including public packet networks, large
corporate networks, military networks, banking networks, stock brokerage
networks, and airline reservation networks.
Organizations supporting WANs using the Internet Protocol are known as
Network Service Providers (NSPs). These form the core of the Internet.
By connecting the NSP WANs together using links at Internet Packet
Interchanges (sometimes called "peering points") a global communication
infrastructure is formed.
26
4. With a neat diagram explain OSI model. (OR) How do layers of Internet model
correlate with OSI model?
The Open Systems Interconnect (OSI) model has seven layers. This article
describes and explains them, beginning with the 'lowest' in the hierarchy (the physical)
and proceeding to the 'highest' (the application). The layers are stacked this way:
1.Physical layer
3.Network layer
4.Transport layer
5.Session layer
6.Presentation layer
7.Application layer
27
PHYSICAL LAYER
The physical layer, the lowest layer of the OSI model, is concerned with the
transmission and reception of the unstructured raw bit stream over a physical medium.
It describes the electrical/optical, mechanical, and functional interfaces to the physical
medium, and carries the signals for all of the higher layers. It provides:
Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the
PC to better accommodate the characteristics of the physical medium, and to aid
in bit and frame synchronization. It determines:
28
DATA LINK LAYER
The data link layer provides error-free transfer of data frames from one node to another
over the physical layer, allowing layers above it to assume virtually error-free
transmission over the link. To do this, the data link layer provides:
Link establishment and termination: establishes and terminates the logical link
between two nodes.
Frame traffic control: tells the transmitting node to "back-off" when no frame
buffers are available.
Frame sequencing: transmits/receives frames sequentially.
Frame acknowledgment: provides/expects frame acknowledgments. Detects and
recovers from errors that occur in the physical layer by retransmitting non
acknowledged frames and handling duplicate frame receipt.
Frame delimiting: creates and recognizes frame boundaries.
Frame error checking: checks received frames for integrity.
Media access management: determines when the node "has the right" to use the
physical medium.
NETWORK LAYER
The network layer controls the operation of the subnet, deciding which physical path the
data should take based on network conditions, priority of service, and other factors. It
provides:
29
Frame fragmentation: if it determines that a downstream router's maximum
transmission unit (MTU) size is less than the frame size, a router can fragment a
frame for transmission and re-assembly at the destination station.
Logical-physical address mapping: translates logical addresses, or names, into
physical addresses.
Subnet usage accounting: has accounting functions to keep track of frames
forwarded by subnet intermediate systems, to produce billing information.
Communications Subnet
The network layer software must build headers so that the network layer software
residing in the subnet intermediate systems can recognize them and use them to route
data to the destination address.
This layer relieves the upper layers of the need to know anything about the data
transmission and intermediate switching technologies used to connect systems. It
establishes, maintains and terminates connections across the intervening
communications facility (one or several intermediate systems in the
communicationsubnet).
In the network layer and the layers below, peer protocols exist between a node and its
immediate neighbor, but the neighbor may be a node through which data is routed, not
the destination station. The source and destination stations may be separated by many
intermediate systems.
TRANSPORT LAYER
The transport layer ensures that messages are delivered error free, in sequence, and
with no losses or duplications.
It relieves the higher layer protocols from any concern with the transfer of data between
them and their peers.
30
The size and complexity of a transport protocol depends on the type of service it can get
from the network layer.
For a reliable network layer with virtual circuit capability, a minimal transport layer is
required.
If the network layer is unreliable and/or only supports datagrams, the transport protocol
should include extensive error detection and recovery.
Message segmentation: accepts a message from the (session) layer above it,
splits the message into smaller units (if not already small enough), and passes
the smaller units down to the network layer. The transport layer at the destination
station reassembles the message.
Message acknowledgment: provides reliable end-to-end message delivery with
acknowledgments.
Message traffic control: tells the transmitting station to "back-off" when no
message buffers are available.
Session multiplexing: multiplexes several message streams, or sessions onto
one logical link and keeps track of which messages belong to which sessions
(see session layer).
Typically, the transport layer can accept relatively large messages, but there are strict
message size limits imposed by the network (or lower) layer.
Consequently, the transport layer must break up the messages into smaller units, or
frames, prepending a header to each frame.
The transport layer header information must then include control information, such as
message start and message end flags, to enable the transport layer on the other end to
recognize message boundaries.
In addition, if the lower layers do not maintain sequence, the transport header must
contain sequence information to enable the transport layer on the receiving end to get
31
the pieces back together in the right order before handing the received message up to
the layer above.
End-to-end layers
Unlike the lower "subnet" layers whose protocol is between immediately adjacent
nodes, the transport layer and the layers above are true "source to destination" or end-
to-end layers, and are not concerned with the details of the underlying communications
facility.
Transport layer software (and software above it) on the source station carries on
a conversation with similar software on the destination station by using message
headers and control messages.
SESSION LAYER
The session layer allows session establishment between processes running on different
stations. It provides:
PRESENTATION LAYER
The presentation layer formats the data to be presented to the application layer. It
can be viewed as the translator for the network. This layer may translate data from
a format used by the application layer into a common format at the sending station,
32
then translate the common format to a format known to the application layer at the
receiving station.
The presentation layer provides:
Data encryption: encrypt data for security purposes. For example, password
encryption.
APPLICATION LAYER
The application layer serves as the window for users and application processes to
access network services. This layer contains a variety of commonly needed functions:
5. Explain in detail about TCP/IP architecture and also brief the various protocols
used in this model (7)[APR/MAY2019]Explain in detail the TCP/IP Reference
model. [OR] Show how data flows through different layers in TCP/IP network.
33
Calculate the number of times encapsulation and de-capsulation take
place.[6marks]
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network
model used in the current Internet architecture as well. Protocols are set of rules which
govern every possible communication over a network. These protocols describe the
movement of data between the source and destination or the internet. They also offer
simple naming and addressing schemes.
TCP/IP that is Transmission Control Protocol and Internet Protocol was developed by
Department of Defence's Project Research Agency (ARPA, later DARPA) as a part of a
research project of network interconnection to connect remote machines.
The features that stood out during the research, which led to making the TCP/IP
reference model were:
Support for a flexible architecture. Adding more machines to a network was easy.
The network was robust, and connections remained intact untill the source and
destination machines were functioning.
The overall idea was to allow one application on one computer to talk to(send data
packets) another application running on different computer.
Below we have discussed the 4 layers that form the TCP/IP reference model:
34
3. Varies from host to host and network to network.
The TCP/IP specifications described a lot of applications that were at the top of the
protocol stack. Some of them were TELNET, FTP, SMTP, DNS etc.
35
2. FTP(File Transfer Protocol) is a protocol, that allows File transfer amongst
computer users connected over a network. It is reliable, simple and efficient.
3. SMTP(Simple Mail Transport Protocol) is a protocol, which is used to transport
electronic mail between a source and destination, directed via a route.
4. DNS(Domain Name Server) resolves an IP address into a textual address for
Hosts connected over a network.
5. It allows peer entities to carry conversation.
6. It defines two end-to-end protocols: TCP and UDP
o TCP(Transmission Control Protocol): It is a reliable connection-oriented
protocol which handles byte-stream from source to destination without
error and flow control.
o UDP(User-Datagram Protocol): It is an unreliable connection-less
protocol that do not want TCPs, sequencing and flow control. Eg: One-
shot request-reply kind of service.
1. It operated independently.
2. It is scalable.
3. Client/server architecture.
4. Supports a number of routing protocols.
5. Can be used to establish a connection between two computers.
Demerits of TCP/IP
36
Comparison of OSI and TCP/IP Reference Model
Now it's time to compare both the reference model that we have learned till now. Let's
start by addressing the similarities that both of these models have.
Following are some similarities between OSI Reference Model and TCP/IP Reference
Model.
37
6. Explain in detail the WIRELESS LOCAL AREA NETWORK.
CDMA
38
Types of wireless LANs
The IEEE 802.11 has two basic modes of operation: infrastructure and ad hoc mode.
In infrastructure mode, mobile units communicate through an access point that serves
as a bridge to other networks (such as Internet or LAN).
Wired Equivalent Privacy (WEP, now insecure), Wi-Fi Protected Access (WPA,
WPA2), to secure wireless computer networks. Many access points will also offer Wi-Fi
39
Protected Setup, a quick (but now insecure) method of joining a new device to an
encrypted network
WIRELESS COMMUNICATION
Infrastructure
40
An ad hoc network (not the same as a WiFi Direct network[3]) is a network where
stations communicate only peer to peer (P2P).
There is no base and no one gives permission to talk.
This is accomplished using the Independent Basic Service Set (IBSS).
A WiFi Direct network is another type of network where stations communicate
peer to peer.
In a Wi-Fi P2P group, the group owner operates as an access point and all other
devices are clients.
There are two main methods to establish a group owner in the Wi-Fi Direct
group. In one approach, the user sets up a P2P group owner manually.
This method is also known as Autonomous Group Owner (autonomous GO). In
the second method, also called negotiation-based group creation, two devices
compete based on the group owner intent value.
The device with higher intent value becomes a group owner and the second
device becomes a client.
Group owner intent value can depend on whether the wireless device performs a
cross-connection between an infrastructure WLAN service and a P2P group,
remaining power in the wireless device, whether the wireless device is already a
group owner in another group and/or a received signal strength of the first
wireless device.
A peer-to-peer network allows wireless devices to directly communicate with
each other.
Wireless devices within range of each other can discover and communicate
directly without involving central access points.
This method is typically used by two computers so that they can connect to each
other to form a network.
This can basically occur in devices within a closed range.
If a signal strength meter is used in this situation, it may not read the strength
accurately and can be misleading, because it registers the strength of the
strongest signal, which may be the closest computer.
41
IEEE 802.11 defines the physical layer (PHY) and MAC (Media Access Control)
layers based on CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance).
The 802.11 specification includes provisions designed to minimize collisions,
because two mobile units may both be in range of a common access point, but
out of range of each other.
PEER-TO-PEER
Hub
Repeater
Modem
NIC
Bridge
Basic switch
Basic router
Basic firewall
Hub A hub is basically a multiport repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different
stations. Hubs cannot filter data, so data packets are sent to all connected devices. In
42
other words, collision domain of all hosts connected through Hub remains one. Also,
they do not have intelligence to find out best path for data packets which leads to
inefficiencies and wastage.
Repeater A repeater operates at the physical layer. Its job is to regenerate the signal
over the same network before the signal becomes too weak or corrupted so as to
extend the length to which the signal can be transmitted over the same network. An
important point to be noted about repeaters is that they do not amplify the signal. When
the signal becomes weak, they copy the signal bit by bit and regenerate it at the original
strength. It is a 2 port device.
Modem is abbreviation for Modulator – Demodulator. Modems are used for data
transfer from one computer network to another computer network through telephone
lines. The computer network works in digital mode, while analog technology is used for
carrying massages across phone lines.
NIC A network interface card (NIC) is a circuit board or card that is installed in a
computer so that it can be connected to a network.
A network interface card provides the computer with a dedicated, full-time connection to
a network. Personal computers and workstations on a local area network (LAN) typically
contain a network interface card specifically designed for the LAN transmission
technology
Bridge – A bridge operates at data link layer. A bridge is a repeater, with add on
functionality of filtering content by reading the MAC addresses of source and
destination. It is also used for interconnecting two LANs working on the same protocol.
It has a single input and single output port, thus making it a 2 port device.
Switch – A switch is a multi port bridge with a buffer and a design that can boost its
efficiency (large number of ports imply less traffic) and performance. Switch is data link
layer device. Switch can perform error checking before forwarding data, that makes it
43
very efficient as it does not forward packets that have errors and forward good packets
selectively to correct port only. In other words, switch divides collision domain of hosts,
but broadcast domain remains same.
Routers – A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs
and WANs together and have a dynamically updating routing table based on which they
make decisions on routing the data packets. Router divide broadcast domains of hosts
connected through it.
NETWORK COMPONENTS
Basic firewall - In computing, a firewall is a network security system that monitors and
controls incoming and outgoing network traffic based on predetermined security rules. A
firewall typically establishes a barrier between a trusted internal network and untrusted
external network, such as the Internet.
44
FIREWALL
45