You are on page 1of 36

Training, Teaching and Learning Materials Development

Nefas Silk Polytechnic College


Under

Ethiopian TVET-System
Hardware and Network Servicing
Level IV
Unit of Competence: Build Internet Infrastructure
Module Title : Building Internet Infrastructure

LG Code : ICT HNS4 M07 LO1 29


TTLM Code : ICT HNS4 TTLM07 0917

LO1. Plan and design internet infrastructure


Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 1 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

INTRODUCTION Learning Guide # 29


This learning guide is developed to provide you the necessary information regarding the following content
coverage and topics –
 Overview of Network Infrastructure Design
 Planning, Implementing and Maintaining Network Infrastructure
 OSI Reference Model and Protocols of Network Infrastructure

This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –

 Identify and selected in line with business and end-user requirements, within budget limitations of
Internet infrastructure
 Evaluated for satisfactory performance and confirmed that the service meets business and end-
user requirements of the internet service.
 Ensured Hardware, software, network and security requirements in accordance with agreed
business and end-user specifications of the internet service.
 Determined Internet protocol address allocation based on the number of addresses needed.

Learning Activities
1. Read the specific objectives of this Learning Guide.
2. Read the information written in the “Information Sheets 1 - 3
3. Accomplish the “Self-check” in your Instructor will give you

 Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher
shall advice you on additional work. But if satisfactory you can proceed to the next topic.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 2 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

Information Sheet 1 Overview of Network Infrastructure Design

1.1 Overview of Network Infrastructure Design


 Network Infrastructure: - is a set of physical and logical components that provide
connectivity, security, routing, management, access, and other integral features on a network.
 During a network’s planning phase, engineers select the hardware and software components
that will compose the network infrastructure and specify the particular location, installation,
and configuration of those components.
 In most cases, the elements of a network infrastructure are both inherited and designed.
 If you are building a network that will be connected to the Internet, for example, certain aspects
of the network, such as the use of the TCP/IP protocol suite, are inherited from the Internet.
 Other network elements, such as the physical layout of basic network components, are
chosen by design when the network is first conceived and are then inherited by later versions
of the network as it evolves.
 It is rare for an engineer to have the opportunity to design a network from scratch, with no pre-
existing influences.
 Nearly always, the engineer must incorporate some existing elements into the network design,
such as specific applications, operating systems, protocols, or hardware components.
 Implementing a network infrastructure is the process of evaluating, purchasing, and
assembling the specified components, and installing them in the manner prescribed by the
design plan.
 The implementation process begins with engineers installing the network’s hardware
infrastructure, including computers, cables, and connectivity devices such as hubs, switches,
and routers, as well as printers and other peripherals.
 Once the hardware is in place, the engineers install and configure the operating systems,
applications, and other software.
 The operating systems running on the computers are the primary software components in the
network infrastructure, because they incorporate the protocols and other routines that make
network communications possible.
 In addition to the standard communication protocols common to all network operating
systems, the Microsoft Windows Server 2008 family also includes a collection of applications
and services that implement important security and special communications capabilities on
the network.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 3 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 The significance of the network infrastructure does not end when the construction of the
network is complete, however.
 The personnel responsible for maintaining the network must have an intimate knowledge of
the network’s infrastructure to expand the network, perform upgrades, and troubleshoot
problems.

1.2 Identifying and selecting Internet infrastructures requirements

In this topic, we will discuss about the appropriate solutions


 Identify important factors in network design
 Find appropriate structure

1.2.1 Identify important factors in network design


When designing a new computer network, whether for small size or bigger one, it's important to
weigh the needs and desires of those who will be using the network with the budget of those who
will be paying for it. Some important things to consider that may not be on anyone's wish list include
balancing security issues with the desire for easy access to information; building redundancy
into the network in anticipation of breakdowns; and standardizing hardware and software to keep
maintenance costs in check. In case something terrible happens, a disaster recovery plan should
be in place. In case things go well for the organization, room for future growth should be built into
the network design.

The Important things to consider include balancing security issues with the desire for easy access
to information; building redundancy into the network in anticipation of breakdowns; and
standardizing hardware and software to keep maintenance costs in check.

 Connectivity and Security:


Network connectivity today means more than Ethernet cables and wireless access points.
People today are more connected while mobile than ever before and many of them want
access to company email and data while they are out of the office. Balancing those needs
while maintaining security is a challenge that needs to be addressed in the design phase of
any network.

This includes where data is stored, either in-house or offsite with cloud-based solutions, what
types of information should be accessible, who should be able to access it, and which types
of devices should be included. Firewalls and access servers need to be secure without
slowing down operations.
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 4 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 Redundancy and Backing Up


Redundancy means having backup devices in place for any mission-critical components in
the network. Even small organizations should consider using two servers. Two identical
servers, for example, can be configured with fail-safes so that one will take over if the other
fails or requires maintenance. A good rule of thumb is to have redundant components and
services in place for any part of a network that cannot be down for more than an hour.

If an organization hosts its own Web servers, or cannot be without Internet connectivity, a
second connection should be in place. Having an extra switch, wireless router, and a spare
laptop onsite is a good practice for ensuring that downtime is kept to a minimum.

 Standardization of Hardware and Software


Standardization of the hardware and software used in a network is important for ensuring the
network runs smoothly. It also reduces costs associated with maintenance, updates and
repairs. Conducting a full audit of the current computer systems, software and peripherals
will help to determine which should be standardized.

A CEO or director may require special consideration, but if 90 percent of the employees use
the same notebooks, with the same word processing and email programs, a software or
hardware patch across the organization can be conducted much less expensively than if
everyone used a different computer model with different software installed on each.

 Disaster Recovery Plan


A detailed disaster recovery plan should be a part of any network design. This includes, but
is not limited to, provisions for back-up power and what procedures should be followed if the
network or server crashes. It should also include when data is backed up, how it is backed
up and where copies of the data are stored. A comprehensive disaster recovery plan includes
office disasters, building disasters, and metropolitan-wide disasters.

In most cases, important data should be backed up daily. Many organizations do a full weekly
backup, with daily incremental backups that copy any files that have been modified since the
last weekly backup. Backup files should be stored in a secure location off-site in the event of
a building disaster, such as a fire.

 Future Growth of the Organization


While it is not always possible to anticipate how large an organization may be five years in
the future, some allowances for future growth must be built into the network design. For

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 5 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

example, Microsoft Small Business Server can be an excellent choice for many small
organizations. However, if your office already has sixty employees, Small Business Server
could soon be a wasted investment, as it has a limit of only 75 users. Network design should
factor in at least 20 percent growth per year, including everything from switch ports to data
backup systems.

1.2.2 Find appropriate structure


Internet infrastructures design considerations/requirements are
 Budget
 Nature of applications
 Availability of expertise /know-how or skill to implement the infrastructure
 Fault tolerance in terms of applications, system and network access
 Ease of configuration
 Management
Internet infrastructures structure will vary based on the size of the network infrastructures
There are three network/internet infrastructures sizes.
I. Small sized Network (<80 users)
II. Medium sized Network (<500 users)
III.Large size network (>500 users)
So, based on the network size the network structure, design, requirement, implementation will have
varied. Example: -
I. Requirements for small sized Network (<80 users)
• Low cost equipment
• Shared bandwidth for most users, switched for a selective few
• A central switch acting as a backbone
• Flat network design
• Little fault tolerance
• Minimal management required
• High growth provisioning of 20-50%
II. Requirements for Medium sized Network (<500 users)
• medium cost/ fixed annual budget for IT expenditure
• MIS (management information system) department taking care of the information system
• Develop own in-house applications
• Availability of one or a few dedicated network engineers

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 6 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

• Invest in server/host fault tolerance features


• May provide dial-in service to mobile workers/ remote access
III.Requirements for Large Sized Network
• Internetwork of networks, with a mix of technologies such as Ethernet,
• Token-ring, FDDI (Fiber Distributed Data Interface) and ATM (asynchronous Transition Mode).
• Involves multiprotocol such as TCP/IP, IPX, SNA or NetBIOS.
• Fault tolerance features for mission-critical applications, such as hardware redundancies,
network path redundancies and extensive investment on backup services.
• Fairly large MIS department to take care of the information system
• In-house application development teams that constantly look at the deployment of new
Internet technologies such as Java and multimedia applications.
• Availability of experts in areas such as system management, network infrastructure and
management.
• Substantial amount of company’s annual budget is spent on IT investment.

1.3 Physical Vs. Logical Network Infrastructure


A. Physical Network Infrastructure: -
The physical design of the network, along with hardware components such as cabling,
routers, switches, hubs, servers, and workstations.
 The hardware you select when planning the network’s physical infrastructure is frequently
dependent on elements of the network’s logical infrastructure.
 For example, if you decide to use Ethernet for your network’s data-link layer protocol, you
are limited to certain specific cable types supported by Ethernet, and the network’s
connectivity components—hubs, routers, and switches—must be designed for use with
Ethernet as well.
 For a small network, the physical infrastructure can be very simple—computers, a hub, and
a few cables are generally all you need.
 For medium-to-large networks, however, the physical infrastructure can be extraordinarily
complex.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 7 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

Fig.-1: Sample Example of Physical diagram for small sized network

B. Logical Network Infrastructure: -


comprises the many software elements that connect, manage, and secure hosts on the
network.
 The logical infrastructure allows communication between computers over the pathways
described in the physical topology.
 The logical infrastructure of a network consists of both abstract software elements, such
as networking protocols, and concrete elements, such as specific software products.
 In addition to basic communication protocols such as TCP/IP, the abstract elements of the
logical infrastructure can include security technologies such as digital certificates and
the IP Security (IPSec) protocols.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 8 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

Fig.-2: Sample example of logical design for small sized network

1.4 Ensure infrastructure requirements of agreed business and


user specification
To ensure business requirements agreed, given these concepts, how do we describe requirements
for a network?
 Need a process to filter or classify requirements
• Network requirements (often have high, medium, low priorities)
• Future requirements (planned upgrades)
• Rejected requirements (remember for future ref.)
• Informational requirements (ideas, not required)

1.4.1Requirement analysis
 Requirements can come from many aspects of the network system
• User Requirements
• Application Requirements
• Device Requirements
• Network Requirements
• Other Requirements
A. User Requirements
 User requirements are often qualitative and very high level
 What is ‘fast enough’ for download? System response
(RTT)?
 How good does video need to be?

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 9 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 What’s my budget?
B. Application Requirements
 What types of apps are we using?
 Mission-critical
 Rate-critical
 Real-time and/or interactive
 How sensitive are apps to RMA (reliability, maintainability, availability)?
 What capacity is needed?  What delay time is acceptable?
 What groups of apps are being used?
 Telemetry/command and control remote  Teleservice – VOIP, teleconference
devices  Operations, admin, maintenance, and
 Visualization and simulation provisioning (OAM&P) – DNS, SMTP,
 Distributed computing SNMP
 Web development, access, and use  Client-server – ERP, SCM, CRM
 Bulk data transport – FTP
 Where are the apps located?
 Are some only used in certain locations?
C. Device Requirements
 What kinds of devices are on your network?
 Generic computing devices include normal PCs, Macs, laptops, handheld computers,
workstations
 Servers include all flavors of server – file, print, app/computation, and backup
 Specialized devices include extreme servers (supercomputers, massively parallel servers),
data collection systems (POS terminals), industry-specific devices, networked devices
(cameras, tools), stoplights, ATMs, etc.
 We want an understanding of the device’s performance – its ability to process data from the
network
 Device I/O rates  Delay time for performing a given app
function

 Performance results from many factors


Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 10 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 Storage performance, that is, flash,  Bus performance (bus capacity and
disk drive, or tape performance arbitration efficiency)
 Processor (CPU) performance  OS performance (effectiveness of
 Memory performance (access times) the protocol stack and APIs)
 Device driver performance
 The device locations are also critical
 Often generic devices can be grouped by their quantity
 Servers and specialized stuff are shown individually
D. Network Requirements
 Issues with network integration include
 Scaling dependencies – how will the size of the existing network affect the new one?
i. Will the existing network change structure, or just add on a new wing/ extension?
 Location dependencies – interaction between old and new networks could change the
location of key components
 Performance constraints – existing network could limit performance of the new one
 Network, system, and support service dependencies
i. Addressing, security, routing protocols and network management can all be affected by
the existing network
 Interoperability dependencies
i. Changes in technology or media at the interfaces between networks need to be
accounted for, as well as QoS guarantees, if any
 Network obsolescence – do protocols or technologies become obsolete during transition?
 Network management and security issues need to be addressed throughout development
 How will the network be monitored for events?
 Monitoring for network performance?
i. What is the hierarchy for management data flow?
 Network configuration?
 Troubleshoot support?
 Security analysis can include the severity (effect) of an attack, and its probability of
occurrence

E. Other Requirements
 Requirements can come from other outside sources – your customer, legal requirements,
larger scale organization (enterprise) requirements, etc.
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 11 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 Additional requirements can include


 Operational suitability – how well can the customer configure and monitor the system?
 Supportability – how well can the customer maintain the system?
 Confidence – what is the data loss rate when the system is running at its required
throughput?
 Financial requirements can include not only the initial system cost, but also ongoing
maintenance costs
 System architecture may be altered to remain within cost constraints
 This is a good reason to present the customer with design choices, so they see the
impact of cost versus performance.
 Enterprise requirements typically include integration of your network with existing
standards for voice, data, or other protocols

1.4.2 Requirements Spec and Map


 A requirements specification is a document which summarizes the requirements for
(here) a network
i. Often it becomes a contractual obligation, so assumptions, estimates, etc. should be
carefully spelled out
 Requirements are classified by Status, as noted earlier (core/current, future, rejected,
or informational requirement)
 Priority can provide additional numeric distinction within a given Status (typically
on a 1-3 or 1-5 scale)
 Sources for Gathering requirements can be identified, or give basis for Deriving it
 Type is user, app, device, network or other

Requirements Specification/ sample specification form/

ID/Name Date Type Description Gathered/Derived Locations Status Priority

• Requirements Mapping can show graphically where stuff is, what kind of apps are used,
and existing connectivity

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 12 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

• So, how do we determine what the requirements are for our network?
• Collect requirements service metrics, and delays to help develop and
map requirements

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 13 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

Planning, Implementing and Maintaining


Information Sheet 2
Network Infrastructure

2.1 Planning a Network Infrastructure


 Planning the infrastructure is by far the most complicated part of building a network because
during this phase you create the blueprint you will use to implement the network and maintain
it later. Example using Visio, Packet Tracer, EdrawMax
 A complete network infrastructure plan consists of a great deal more than a physical
infrastructure layout and a list of hardware and software products.
 To plan the infrastructure properly, a network designer must consider the requirements of the
network’s users, its owners, and its hardware and software components.
 What tasks do the network users have to accomplish?
 In addition to selecting applications, a network designer must also be conscious of the
services the network’s users need for their computers to function properly
 Security is also an omnipresent consideration in planning a network infrastructure.
 The designer must attempt to anticipate all possible dangers to the network and plan a suitable
security infrastructure to protect it from those dangers.
 The security infrastructure might include advanced configuration of the operating systems,
services, and applications, as well as the use of additional components, such as IPSec and
digital certificates.
2.2 Implementing a Network Infrastructure
 The network infrastructure plan planned should be implemented at this stage.
 The process of implementing the technologies outlined in a network infrastructure plan
typically involves a number of disciplines.
 The elements of the implementation process focus largely on the selection of protocols,
operating systems, applications, and security mechanisms that satisfy the requirements of a
network’s owners, administrators, and users, as determined in the planning process.
 This course focuses on the deployment of TCP/IP protocols (selecting IP addresses & subnet
mask), the DNS (DNS name space) and WINS name-resolution mechanisms, and the IPsec
(Creating IPsec policies) protocol extensions technologies on a medium-to-large network,
and it concentrates more on the organizational elements of the deployment than on the
process of configuring an individual computer.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 14 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

2.3 Maintaining a Network Infrastructure

 To maintain the network properly, administrators must have an intimate knowledge of the
infrastructure and the technologies used to implement it.
 Network infrastructure maintenance includes tasks such as updating operating systems
and applications, monitoring ongoing processes, and troubleshooting problems.
 Keeping the network’s operating systems and applications updated is more complicated than
simply downloading the latest patch releases and installing them on all the computers.
 For a large and complex network infrastructure, you must be careful to test each release
before deploying it on the production network.
 Administrators must monitor many services that are essential to a large network at regular
intervals to ensure they are operating properly.
 This monitoring can include regular examination of logs, function testing, and network traffic
analysis.
 The network administrator must be capable of configuring these services to log the
appropriate information and of using Windows Server 2008 tools such as Network Monitor
and the Performance console.
 Troubleshooting is one of the primary maintenance functions of a network administrator.
 Although much of the infrastructure design and implementation process revolves around the
creation of a robust network, problems do occur, and in a large organization, network failures
can mean reduced productivity and loss of revenue.
2.4 Determining Internet protocol Addresses

2.4.1 Internet protocols


 What is the Internet Protocol (IP)?
The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data
so that they can travel across networks and arrive at the correct destination. Data traversing the
Internet is divided into smaller pieces, called packets. IP information is attached to each packet,
and this information helps routers to send packets to the right place. Every device or domain that
connects to the Internet is assigned an IP address, and as packets are directed to the IP address
attached to them, data arrives where it is needed.
Once the packets arrive at their destination, they are handled differently depending on which
transport protocol is used in combination with IP. The most common transport protocols are TCP
and UDP.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 15 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 What is a network protocol?


In networking, a protocol is a standardized way of doing certain actions and formatting data so that
two or more devices are able to communicate with and understand each other.
To understand why protocols are necessary, consider the process of mailing a letter. On the
envelope, addresses are written in the following order: name, street address, city, state, and zip
code. If an envelope is dropped into a mailbox with the zip code written first, followed by the street
address, followed by the state, and so on, the post office won't deliver it. There is an agreed-upon
protocol for writing addresses in order for the postal system to work. In the same way, all IP data
packets must present certain information in a certain order, and all IP addresses follow a
standardized format.
 What is an IP address? How does IP addressing work?
An IP address is a unique identifier assigned to a device or domain that connects to the Internet.
Each IP address is a series of characters, such as '192.168.1.1'. Via DNS resolvers, which translate
human-readable domain names into IP addresses, users are able to access websites without
memorizing this complex series of characters. Each IP packet will contain both the IP address of
the device or domain sending the packet and the IP address of the intended recipient, much like
how both the destination address and the return address are included on a piece of mail.
 IPv4 vs. IPv6
IPv4 IPv6
 IPv4 stands for Internet Protocol version 4. It is  IPv6 is the next generation Internet Protocol (IP) address
the underlying technology that makes it possible standard intended to supplement and eventually replace
for us to connect our devices to the web. IPv4, the protocol many Internet services still use today.
Whenever a device accesses the Internet, it is Every computer, mobile phone, home automation
assigned a unique, numerical IP address such as component, IoT sensor and any other device connected
99.48.227.227. To send data from one computer to the Internet needs a numerical IP address to
to another through the web, a data packet must communicate between other devices. The original IP
be transferred across the network containing the address scheme, called IPv4, is running out of addresses
IP addresses of both devices. due to its widespread usage from the proliferation of so
 IPv4 uses a 32-bit address for its Internet many connected devices.
addresses. That means it can provide support for  IPv6 (Internet Protocol version 6) is the sixth revision to
2^32 IP addresses in total around 4.29 billion. the Internet Protocol and the successor to IPv4. It
That may seem like a lot, but all 4.29 billion IP functions similarly to IPv4 in that it provides the unique IP
addresses have now been assigned, leading to addresses necessary for Internet-enabled devices to
the address shortage issues we face today. communicate. However, it does have one significant
difference: it utilizes a 128-bit IP address.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 16 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 IPv6 utilizes 128-bit Internet addresses. Therefore, it can


support 2^128 Internet addresses
340,282,366,920,938,463,463,374,607,431,768,211,456
of them to be exact. The number of IPv6 addresses is
1028 times larger than the number of IPv4 addresses. So
there are more than enough IPv6 addresses to allow for
Internet devices to expand for a very long time.

 What is an IP packet?
IP packets are created by adding an IP header to each packet of data before it is sent on its way.
An IP header is just a series of bits (ones and zeros), and it records several pieces of information
about the packet, including the sending and receiving IP address. IP headers also report:
 Header length
 Packet length
 Time to Live (TTL), or the number of network hops a packet can make before it is discarded
 Which transport protocol is being used (TCP, UDP, etc.)
In total there are 14 fields for information in IPv4 headers, although one of them is optional.
 How does IP routing work?
The Internet is made up of interconnected large networks that are each responsible for certain
blocks of IP addresses; these large networks are known as autonomous systems (AS). A variety of
routing protocols, including BGP, help route packets across ASes based on their destination IP
addresses. Routers have routing tables that indicate which ASes the packets should travel through
in order to reach the desired destination as quickly as possible. Packets travel from AS to AS until
they reach one that claims responsibility for the targeted IP address. That AS then internally routes
the packets to the destination.

- Time to Live (TTL)- amount of time or “hops” that a packet is set to exist inside a network before being discarded by a router
- AS- The Internet is a network of networks*, and autonomous systems are the big networks that make up the Internet
- Border Gateway Protocol (BGP) is the postal service of the Internet. Similarly, when someone submits data across the Internet,
BGP is responsible for looking at all of the available paths that data could travel and picking the best route
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 17 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

Fig.1- Protocols attach packet headers at different layers of the OSI model:

Packets can take different routes to the same place if necessary, just as a group of people driving
to an agreed-upon destination can take different roads to get there.

 What is TCP/IP?
The Transmission Control Protocol (TCP) is a transport protocol, meaning it dictates the way data
is sent and received. A TCP header is included in the data portion of each packet that uses TCP/IP.
Before transmitting data, TCP opens a connection with the recipient. TCP ensures that all packets
arrive in order once transmission begins. Via TCP, the recipient will acknowledge receiving each
packet that arrives. Missing packets will be sent again if receipt is not acknowledged.
TCP is designed for reliability, not speed. Because TCP has to make sure all packets arrive in order,
loading data via TCP/IP can take longer if some packets are missing.
TCP and IP were originally designed to be used together, and these are often referred to as the
TCP/IP suite. However, other transport protocols can be used with IP.
 What is UDP/IP?
The User Datagram Protocol, or UDP, is another widely used transport protocol. It's faster than
TCP, but it is also less reliable. UDP does not make sure all packets are delivered and in order, and
it doesn't establish a connection before beginning or receiving transmissions.
2.4.2 Using IP address Version 4
• A unique identifier for a computer or device (host) on a TCP/IP network
• A 32-bit binary number usually represented as 4 decimal numbers separated by a period
Example:
206 .40 .185. 73
11001110.00101000. 10111001.01001001
• Each address is 32 bits’ wide
• Valid addresses can range from 0.0.0.0 to 255.255.255.255
WHY?
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 18 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

Because 11111111b = 25510


• Theoretically, a total of » 4.3 billion addresses are available
WHY?
Because 232 = 4,294,967,29610
 Two addresses in one…
• Each address consists of two parts
1. The network address
2. The host address
• Other systems may use more than one address (Ex: IPX)
 The Five Network Classes
1. Class A – begins with 0
• 00000001 (110) to 01111111 (12610)
2. Class B – begins with 10
• 10000000 (12810) to 10111111 (19110)
3. Class C – begins with 110
• 11000000 (19210) to 11011111 (22310)
01111111 = 12710
Addresses beginning with 127 are reserved for loopback (127.0.0.1 is YOU)
4. Class D – begins with 1110
• 22410 to 23910
• Reserved for multicasting
5. Class E – begins with 1111
• 24010 to 25410
• Reserved for future use
These classes D and E should not be used for host addressing

 Which part belongs to the network and which part belongs to the node/host?
Class A – XXXXXXXX.yyyyyyyy.yyyyyyyy.yyyyyyyy
Class B – XXXXXXXX.XXXXXXXX.yyyyyyyy.yyyyyyyy
Class C – XXXXXXXX.XXXXXXXX.XXXXXXXX.yyyyyyyy
Where: -
X = Network and
y = node

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 19 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

Or

 IP Addresses*
Class 1st Octet Networks Ids Host IDs

A 1-126 27 = 126 224 = 16M

B 128-191 214 = 16K 216 = 64K

C 192-223 221 = 2M 28 = 255

NB. Numbers not exact

 There are three IP network addresses reserved for private networks


10.0.0.0/8
172.16.0.0/12
192.168.0.0/16

- Private address ranges

Class Internal address range


A 10.0.0.0 to 10.255.255.255
B 172.16.0.0 to 172.31.255.255
C 192.168.0.0 to 192.168.255.255

 These can be used by anyone setting up an internal network.


 Routers will never forward packets coming from these addresses.
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 20 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 Connecting a network using private addresses to the Internet requires translation of the
private addresses to public addresses using Network Address Translation (NAT).
2.4.3 Sub-netting
…can be done for a variety of reasons
o To manage organization with different departments
o Use of different physical media
o Preservation of address space /no loss of ip address per network
o Security
o The most common reason is to control network traffic
In an Ethernet network, all nodes on a segment see all packets transmitted by other nodes on that
segment. Performance can be adversely affected under heavy traffic loads. So, a router is used to
connect IP networks to minimize the amount of traffic each segment must receive. Applying a subnet
mask allows you to identify the network and node parts of the address. A router will then determine
whether the address is local or remote.
In subnet masking: -
 Network bits are masked as 1s
 Node bits are masked as 0s
Example:
 Class A – 255.0.0.0
11111111.00000000.00000000.00000000
 Class B – 255.255.0.0
11111111.11111111.00000000.00000000
 Class C – 255.255.255.0
11111111.11111111.11111111.00000000
 Subnet masking
Performing a bitwise logical AND between the IP address and the subnet mask results in the
network address
Ex: Class - B 140.179.240.200
10001100.10110011.11110000.11001000
11111111.11111111.00000000.00000000
10001100.10110011.00000000.00000000
Network Address = 140.179.000.000
 A Few Rules…
Each device on a node has a unique MAC address
Each device on a node needs a unique IP address
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 21 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

All devices on the same physical segment share a common network ID (subnet mask)
Each physical segment has a unique Network ID (subnet mask)

 Address Resolution Protocol (ARP)


Before an IP packet can be forwarded to another host, the MAC address (usually 6 bytes written
in hex (Ex: 02-FE-87-4A-8C-A9) of the receiving machine must be known ARP determines the
MAC addresses that correspond to an IP address.
A router will choose direct paths for the network packets based on the addressing of the IP frame
it is handling (different routes to different networks)

 Direct and Indirect Routing


Direct – when nodes are on the same network
Indirect – used when the network numbers of the source and destination do not match
o Packet must be forwarded by a node that knows host to reach the destination (a router)

2.4.4 Internet protocol address allocation process


IP address allocation is part of proper network design, which is crucial to the performance and
expandability of a network. Learn how to properly allocate IP addresses for a new network and your
options if you run out of IP addresses. When you are designing or expanding your network, it is important
to know how to manage IP address allocation properly, based we see sub netting in 2.4.3

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 22 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

OSI Reference Model and Protocols of


Information Sheet 3
Network Infrastructure

3.1 OSI Reference Model


 OSI stands for Open System Interconnection is a reference model that describes how
information from a software application in one computer moves through a physical medium
to the software application in another computer.
 OSI consists of seven layers, and each layer performs a particular network function.
 OSI model was developed by the International Organization for Standardization (ISO) in
1984, and it is now considered as an architectural model for the inter-computer
communications.
 OSI model divides the whole task into seven smaller and manageable tasks. Each layer is
assigned a particular task.
 Each layer is self-contained, so that task assigned to each layer can be performed
independently.
Characteristics of OSI Model:

 The OSI model is divided into two layers: upper layers and lower layers.
 The upper layer of the OSI model mainly deals with the application related issues, and they
are implemented only in the software. The application layer is closest to the end user. Both
the end user and the application layer interact with the software applications. An upper layer
refers to the layer just above another layer.
 The lower layer of the OSI model deals with the data transport issues. The data link layer
and the physical layer are implemented in hardware and software. The physical layer is the
lowest layer of the OSI model and is closest to the physical medium. The physical layer is
mainly responsible for placing the information on the physical medium.
Functions of the OSI Layers
There are the seven OSI layers. Each layer has different functions. A list of seven layers are given
below:
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 23 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

1- Physical layer

 The main functionality of the physical layer is to transmit the individual bits from one node to
another node.
 It is the lowest layer of the OSI model.
 It establishes, maintains and deactivates the physical connection.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 24 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 It specifies the mechanical, electrical and procedural network interface specifications.

Functions of a Physical layer:


 Line Configuration: It defines the way how two or more devices can be connected
physically.
 Data Transmission: It defines the transmission mode whether it is simplex, half-duplex or
full-duplex mode between the two devices on the network.
 Topology: It defines the way how network devices are arranged.
 Signals: It determines the type of the signal used for transmitting the information.

2- Data-Link Layer

 This layer is responsible for the error-free transfer of data frames.


 It defines the format of the data on the network.
 It provides a reliable and efficient communication between two or more devices.
 It is mainly responsible for the unique identification of each device that resides on a local
network.
 It contains two sub-layers:
o Logical Link Control Layer
 It is responsible for transferring the packets to the Network layer of the receiver
that is receiving.
 It identifies the address of the network layer protocol from the header.
 It also provides flow control.
o Media Access Control Layer
 A Media access control layer is a link between the Logical Link Control layer
and the network's physical layer.
 It is used for transferring the packets over the network.
Functions of the Data-link layer
 Framing: The data link layer translates the physical's raw bit stream into packets known as
Frames. The Data link layer adds the header and trailer to the frame. The header which is
added to the frame contains the hardware destination and source address.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 25 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned in the
header.
 Flow Control: Flow control is the main functionality of the Data-link layer. It is the technique
through which the constant data rate is maintained on both the sides so that no data get
corrupted. It ensures that the transmitting station such as a server with higher processing
speed does not exceed the receiving station, with lower processing speed.
 Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any error seems to occurr, then the
receiver sends the acknowledgment for the retransmission of the corrupted frames.
 Access Control: When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has control
over the link at a given time.

3- Network Layer

 It is a layer 3 that manages device addressing, tracks the location of devices on the network.
 It determines the best path to move data from source to the destination based on the network
conditions, the priority of service, and other factors.
 The Data link layer is responsible for routing and forwarding the packets.
 Routers are the layer 3 devices, they are specified in this layer and used to provide the routing
services within an internetwork.
 The protocols used to route the network traffic are known as Network layer protocols.
Examples of protocols are IP and Ipv6.
Functions of Network Layer:

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 26 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 Internetworking: An internetworking is the main responsibility of the network layer. It


provides a logical connection between different devices.
 Addressing: A Network layer adds the source and destination address to the header of the
frame. Addressing is used to identify the device on the internet.
 Routing: Routing is the major component of the network layer, and it determines the best
optimal path out of the multiple paths from source to the destination.
 Packetizing: A Network Layer receives the packets from the upper layer and converts them
into packets. This process is known as Packetizing. It is achieved by internet protocol (IP).

4- Transport Layer

 The Transport layer is a Layer 4 ensures that messages are transmitted in the order in which
they are sent and there is no duplication of data.
 The main responsibility of the transport layer is to transfer the data completely.
 It receives the data from the upper layer and converts them into smaller units known as
segments.
 This layer can be termed as an end-to-end layer as it provides a point-to-point connection
between source and destination to deliver the data reliably.
The two protocols used in this layer are:
 Transmission Control Protocol
o It is a standard protocol that allows the systems to communicate over the internet.
o It establishes and maintains a connection between hosts.
o When data is sent over the TCP connection, then the TCP protocol divides the data
into smaller units known as segments. Each segment travels over the internet using
multiple routes, and they arrive in different orders at the destination. The transmission
control protocol reorders the packets in the correct order at the receiving end.
 User Datagram Protocol
o User Datagram Protocol is a transport layer protocol.
o It is an unreliable transport protocol as in this case receiver does not send any
acknowledgment when the packet is received, the sender does not wait for any
acknowledgment. Therefore, this makes a protocol unreliable.
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 27 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

Functions of Transport Layer:


 Service-point addressing: Computers run several programs simultaneously due to this
reason, the transmission of data from source to the destination not only from one computer
to another computer but also from one process to another process. The transport layer adds
the header that contains the address known as a service-point address or port address. The
responsibility of the network layer is to transmit the data from one computer to another
computer and the responsibility of the transport layer is to transmit the message to the correct
process.
 Segmentation and reassembly: When the transport layer receives the message from the
upper layer, it divides the message into multiple segments, and each segment is assigned
with a sequence number that uniquely identifies each segment. When the message has
arrived at the destination, then the transport layer reassembles the message based on their
sequence numbers.
 Connection control: Transport layer provides two services Connection-oriented service and
connectionless service. A connectionless service treats each segment as an individual
packet, and they all travel in different routes to reach the destination. A connection-oriented
service makes a connection with the transport layer at the destination machine before
delivering the packets. In connection-oriented service, all the packets travel in the single
route.
 Flow control: The transport layer also responsible for flow control but it is performed end-
to-end rather than across a single link.
 Error control: The transport layer is also responsible for Error control. Error control is
performed end-to-end rather than across the single link. The sender transport layer ensures
that message reach at the destination without any error.

5- Session Layer

 It is a layer 3 in the OSI model.


 The Session layer is used to establish, maintain and synchronizes the interaction between
communicating devices.
Functions of Session layer:
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 28 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 Dialog control: Session layer acts as a dialog controller that creates a dialog between two
processes or we can say that it allows the communication between two processes which can
be either half-duplex or full-duplex.
 Synchronization: Session layer adds some checkpoints when transmitting the data in a
sequence. If some error occurs in the middle of the transmission of data, then the
transmission will take place again from the checkpoint. This process is known as
Synchronization and recovery.

6- Presentation Layer

 A Presentation layer is mainly concerned with the syntax and semantics of the information
exchanged between the two systems.
 It acts as a data translator for a network.
 This layer is a part of the operating system that converts the data from one presentation
format to another format.
 The Presentation layer is also known as the syntax layer.
Functions of Presentation layer:
 Translation: The processes in two systems exchange the information in the form of
character strings, numbers and so on. Different computers use different encoding methods,
the presentation layer handles the interoperability between the different encoding methods.
It converts the data from sender-dependent format into a common format and changes the
common format into receiver-dependent format at the receiving end.
 Encryption: Encryption is needed to maintain privacy. Encryption is a process of converting
the sender-transmitted information into another form and sends the resulting message over
the network.
 Compression: Data compression is a process of compressing the data, i.e., it reduces the
number of bits to be transmitted. Data compression is very important in multimedia such as
text, audio, video.

7- Application Layer

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 29 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 An application layer serves as a window for users and application processes to access
network service.
 It handles issues such as network transparency, resource allocation, etc.
 An application layer is not an application, but it performs the application layer functions.
 This layer provides the network services to the end-users.
Functions of Application layer:
 File transfer, access, and management (FTAM): An application layer allows a user to
access the files in a remote computer, to retrieve the files from a computer and to manage
the files in a remote computer.
 Mail services: An application layer provides the facility for email forwarding and storage.
 Directory services: An application provides the distributed database sources and is used to
provide that global information about various objects.
Summary
 The OSI Model is a logical and conceptual model that defines network communication which
is used by systems open to interconnection and communication with other systems
 In OSI model, layer should only be created where the definite levels of abstraction are
needed.
 OSI layer helps you to understand communication over a network
 In 1984, the OSI architecture was formally adopted by ISO as an international standard
Layer Name Function Protocols
L-7 Application To allow access to network resources. SMTP, HTTP, FTP, POP3,
SNMP
L- 6 Presentation To translate, encrypt and compress data. MPEG, ASCH, SSL, TLS
L-5 Session To establish, manage, and terminate the NetBIOS, SAP
session
L-4 Transport The transport layer builds on the network TCP, UDP
layer to provide data transport from a
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 30 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

process on a source machine to a


process on a destination machine.
L-3 Network To provide internetworking To move IPV5, IPV6, ICMP, IPSEC,
packets from source to destination ARP, MPLS.
L-2 Data Link To organize bits into frames To provide RAPA, PPP, Frame Relay,
hop-to-hop delivery ATM, Fiber Cable, etc.
L- 1 Physical To transmit bits over a medium To RS232, 100BaseTX, ISDN,
provide mechanical and electrical 11.
specifications

3.2 ICT/IP Model


 The TCP/IP model was developed prior to the OSI model.

 The TCP/IP model is not exactly similar to the OSI model.

 The TCP/IP model consists of four layers: the application layer, transport layer, Internet
layer and network layer.

 The first four layers provide physical standards, network interface, internetworking, and
transport functions that correspond to the first four layers of the OSI model and these four
layers are represented in TCP/IP model by a single layer called the application layer.

 TCP/IP is a hierarchical protocol made up of interactive modules, and each of them


provides specific functionality.

Here, hierarchical means that each upper-layer protocol is supported by two or more lower-level
protocols.

Functions of TCP/IP layers:

1- Network Access Layer

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 31 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 A network layer is the lowest layer of the TCP/IP model.

 A network layer is the combination of the Physical layer and Data Link layer defined in the
OSI reference model.

 It defines how the data should be sent physically through the network.

 This layer is mainly responsible for the transmission of the data between two devices on
the same network.

 The functions carried out by this layer are encapsulating the IP datagram into frames
transmitted by the network and mapping of IP addresses into physical addresses.

 The protocols used by this layer are Ethernet, token ring, FDDI, X.25, frame relay.

2- Internet Layer
 An internet layer is the second layer of the TCP/IP model.

 An internet layer is also known as the network layer.

 The main responsibility of the internet layer is to send the packets from any network, and
they arrive at the destination irrespective of the route they take.

Following are the protocols used in this layer are:

IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP
suite.

Following are the responsibilities of this protocol:

Video Player is loading.

 IP Addressing: This protocol implements logical host addresses known as IP addresses.


The IP addresses are used by the internet and higher layers to identify the device and to
provide internetwork routing.

 Host-to-host communication: It determines the path through which the data is to be


transmitted.

 Data Encapsulation and Formatting: An IP protocol accepts the data from the transport
layer protocol. An IP protocol ensures that the data is sent and received securely, it
encapsulates the data into message known as IP datagram.

 Fragmentation and Reassembly: The limit imposed on the size of the IP datagram by
data link layer protocol is known as Maximum Transmission unit (MTU). If the size of IP
datagram is greater than the MTU unit, then the IP protocol splits the datagram into smaller
units so that they can travel over the local network. Fragmentation can be done by the
sender or intermediate router. At the receiver side, all the fragments are reassembled to
form an original message.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 32 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 Routing: When IP datagram is sent over the same local network such as LAN, MAN,
WAN, it is known as direct delivery. When source and destination are on the distant
network, then the IP datagram is sent indirectly. This can be accomplished by routing the IP
datagram through various devices such as routers.

ARP Protocol

 ARP stands for Address Resolution Protocol.

 ARP is a network layer protocol which is used to find the physical address from the IP
address.

 The two terms are mainly associated with the ARP Protocol:

o ARP request: When a sender wants to know the physical address of the device, it
broadcasts the ARP request to the network.

o ARP reply: Every device attached to the network will accept the ARP request and
process the request, but only recipient recognize the IP address and sends back its
physical address in the form of ARP reply. The recipient adds the physical address
both to its cache memory and to the datagram header

ICMP Protocol

 ICMP stands for Internet Control Message Protocol.

 It is a mechanism used by the hosts or routers to send notifications regarding datagram


problems back to the sender.

 A datagram travels from router-to-router until it reaches its destination. If a router is unable
to route the data because of some unusual conditions such as disabled links, a device is on
fire or network congestion, then the ICMP protocol is used to inform the sender that the
datagram is undeliverable.

 An ICMP protocol mainly uses two terms:

o ICMP Test: ICMP Test is used to test whether the destination is reachable or not.

o ICMP Reply: ICMP Reply is used to check whether the destination device is
responding or not.

 The core responsibility of the ICMP protocol is to report the problems, not correct them.
The responsibility of the correction lies with the sender.

 ICMP can send the messages only to the source, but not to the intermediate routers
because the IP datagram carries the addresses of the source and destination but not of the
router that it is passed to.

3- Transport Layer
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 33 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

The transport layer is responsible for the reliability, flow control, and correction of data which is
being sent over the network.

The two protocols used in the transport layer are User Datagram protocol and Transmission
control protocol.

 User Datagram Protocol (UDP)

o It provides connectionless service and end-to-end delivery of transmission.

o It is an unreliable protocol as it discovers the errors but not specify the error.

o User Datagram Protocol discovers the error, and ICMP protocol reports the error to
the sender that user datagram has been damaged.

o UDP consists of the following fields:


Source port address: The source port address is the address of the application
program that has created the message.
Destination port address: The destination port address is the address of the
application program that receives the message.
Total length: It defines the total number of bytes of the user datagram in bytes.
Checksum: The checksum is a 16-bit field used in error detection.

o UDP does not specify which packet is lost. UDP contains only checksum; it does not
contain any ID of a data segment.

 Transmission Control Protocol (TCP)

o It provides a full transport layer services to applications.

o It creates a virtual circuit between the sender and receiver, and it is active for the
duration of the transmission.

o TCP is a reliable protocol as it detects the error and retransmits the damaged
frames. Therefore, it ensures all the segments must be received and acknowledged

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 34 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

before the transmission is considered to be completed and a virtual circuit is


discarded.

o At the sending end, TCP divides the whole message into smaller units known as
segment, and each segment contains a sequence number which is required for
reordering the frames to form an original message.

o At the receiving end, TCP collects all the segments and reorders them based on
sequence numbers.

4- Application Layer
 An application layer is the topmost layer in the TCP/IP model.

 It is responsible for handling high-level protocols, issues of representation.

 This layer allows the user to interact with the application.

 When one application layer protocol wants to communicate with another application layer, it
forwards its data to the transport layer.

 There is an ambiguity occurs in the application layer. Every application cannot be placed
inside the application layer except those who interact with the communication system. For
example: text editor cannot be considered in application layer while web browser using
HTTP protocol to interact with the network where HTTP protocol is an application layer
protocol.

Following are the main protocols used in the application layer:

 HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the
data over the world wide web. It transfers the data in the form of plain text, audio, video. It
is known as a Hypertext transfer protocol as it has the efficiency to use in a hypertext
environment where there are rapid jumps from one document to another.

 SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used for
managing the devices on the internet by using the TCP/IP protocol suite.

 SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports
the e-mail is known as a Simple mail transfer protocol. This protocol is used to send the
data to another e-mail address.

 DNS: DNS stands for Domain Name System. An IP address is used to identify the
connection of a host to the internet uniquely. But, people prefer to use the names instead of
addresses. Therefore, the system that maps the name to the address is known as Domain
Name System.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 35 of 36
By : Meresa H.
Training, Teaching and Learning Materials Development

 TELNET: It is an abbreviation for Terminal Network. It establishes the connection between


the local computer and remote computer in such a way that the local terminal appears to be
a terminal at the remote system.

 FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for
transmitting the files from one computer to another computer.

Date April 21, 2021


Plan and Design Internet Infrastructure TTLM Page 36 of 36
By : Meresa H.

You might also like