Networking Principle and Layered Architecture
Networking Principle and Layered Architecture
Networking Principle and Layered Architecture
• Message
The message is the information (data) to be communicated. Popular forms of
information include text, numbers, pictures, audio, and video.
• Sender
The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
• Receiver
The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
• Transmission medium
The transmission medium is the physical path by which a message travels from
sender to receiver. Some examples of transmission media include twisted-pair wire,
coaxial cable, fiber-optic cable, and radio waves.
• Protocol
A protocol is a set of rules that govern data communications. It represents an
agreement between the communicating devices. Without a protocol, two devices
may be connected but not communicating, just as a person speaking French cannot
be understood by a person who speaks only Japanese.
Data flow (simplex, half-duplex, and full-duplex)
Data flow - Simplex
• In half-duplex mode, each station can both transmit and receive, but not
at the same time. : When one device is sending, the other can only
receive, and vice versa
• The half-duplex mode is like a one-lane road with traffic allowed in both
directions. When cars are traveling in one direction, cars going the other
way must wait. In a half-duplex transmission, the entire capacity of a
channel is taken over by whichever of the two devices is transmitting at
the time
• Walkie-talkies are examples of half-duplex systems.
• The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time; the entire capacity of
the channel can be utilized for each direction.
Data flow - Full-Duplex
Performance
Depends on Network Elements
Measured in terms of Delay and Throughput
Reliability
Failure rate of network components
Measured in terms of availability/robustness
Security
Data protection against corruption/loss of data due to:
Errors
Malicious users
Line Configuration – Type of Connection
Line Configuration – Point to Point
Network Topology
• The term physical topology refers to the way in which a network is laid out
physically.
• Two or more devices connect to a link; two or more links form a topology.
• The topology of a network is the geometric representation of the relationship
of all the links and linking devices (usually called nodes) to one another.
Categories of Network Topology
A fully connected mesh topology (five devices)
Mesh topology
Advantages
•First, the use of dedicated links guarantees that each connection can carry its
own data load, thus eliminating the traffic problems that can occur when links
must be shared by multiple devices.
•Second, a mesh topology is robust. If one link becomes unusable, it does not
incapacitate the entire system.
•Third, there is the advantage of privacy or security. When every message
travels along a dedicated line, only the intended recipient sees it. Physical
boundaries prevent other users from gaining access to messages.
•Finally, point-to-point links make fault identification and fault isolation easy.
Traffic can be routed to avoid links with suspected problems. This facility enables
the network manager to discover the precise location of the fault and aids in
finding its cause and solution.
Mesh topology
Disadvantages
•The amount of cabling and the number of I/O ports required.
•First, because every device must be connected to every other device,
installation and reconnection are difficult.
•Second, the sheer bulk of the wiring can be greater than the available space
(in walls, ceilings, or floors) can accommodate.
•Finally, the hardware required to connect each link (I/O ports and cable) can
be prohibitively expensive.
•For these reasons a mesh topology is usually implemented in a limited
fashion, for example, as a backbone connecting the main computers of a
hybrid network that can include several other topologies.
•One practical example of a mesh topology is the connection of telephone
regional offices in which each regional office needs to be connected to every
other regional office.
A star topology connecting four stations
Star topology
Advantages
•A star topology is less expensive than a mesh topology.
•In a star, each device needs only one link and one I/O port to connect it to any
number of others.
•This factor also makes it easy to install and reconfigure.
•Far less cabling needs to be housed, and additions, moves, and deletions involve
only one connection: between that device and the hub. Other advantages include
robustness.
•If one link fails, only that link is affected.
•All other links remain active.
•This factor also lends itself to easy fault identification and fault isolation.
•As long as the hub is working, it can be used to monitor link problems and bypass
defective links.
Star topology
Disadvantages
•One big disadvantage of a star topology is the dependency of the whole topology
on one single point, the hub.
• If the hub goes down, the whole system is dead.
•Although a star requires far less cable than a mesh, each node must be linked to a
central hub.
•For this reason, often more cabling is required in a star than in some other
topologies (such as ring or bus).
The star topology is used in local-area networks (LANs)
A bus topology connecting three stations
Bus topology
Advantages
•Advantages of a bus topology include ease of installation.
•Backbone cable can be laid along the most efficient path, then connected to the
nodes by drop lines of various lengths.
•In this way, a bus uses less cabling than mesh or star topologies.
•In a star, for example, four network devices in the same room require four lengths
of cable reaching all the way to the hub.
•In a bus, this redundancy is eliminated. Only the backbone cable stretches through
the entire facility.
•Each drop line has to reach only as far as the nearest point on the backbone.
Bus topology
Disadvantages
•Disadvantages include difficult reconnection and fault isolation.
•A bus is usually designed to be optimally efficient at installation.
•It can therefore be difficult to add new devices.
•Signal reflection at the taps can cause degradation in quality.
•This degradation can be controlled by limiting the number and spacing of devices
connected to a given length of cable.
•Adding new devices may therefore require modification or replacement of the
backbone.
•In addition, a fault or break in the bus cable stops all transmission, even between
devices on the same side of the problem.
•The damaged area reflects signals back in the direction of origin, creating noise in
both directions.
Bus topology was the one of the first topologies used in the design of early local
area networks. Traditional Ethernet LANs uses bus topology
A ring topology connecting six stations
Ring topology
Advantages
•A ring is relatively easy to install and reconfigure.
•Each device is linked to only its immediate neighbors (either physically or
logically). To add or delete a device requires changing only two connections.
•The only constraints are media and traffic considerations (maximum ring length
and number of devices).
•In addition, fault isolation is simplified. Generally, in a ring a signal is circulating at
all times.
•If one device does not receive a signal within a specified period, it can issue an
alarm.
•The alarm alerts the network operator to the problem and its location
Ring topology
Disadvantages
•However, unidirectional traffic can be a disadvantage.
•In a simple ring, a break in the ring (such as a disabled station) can disable the
entire network.
•This weakness can be solved by using a dual ring or a switch capable of closing
off the break.
•Ring topology was prevalent when IBM introduced its local-area network, Token
Ring.
•Today, the need for higher-speed LANs has made this topology less popular.
A hybrid topology: a star backbone with three bus networks
Categories of Networks
TCP/IP
Cerf and Kahn’s landmark 1973 paper outlined the protocols to achieve end-to-end
delivery of data
In October 1977, an internet consisting of three different networks (ARPANET, packet
radio, and packet satellite) was successfully demonstrated. Communication between
networks was now possible.
MILNET
In 1983, ARPANET split into two networks: Military Network (MILNET) for military users
and ARPANET for nonmilitary users
CSNET
In 1981, Computer Science Network (CSNET) was a network sponsored by the National
Science Foundation (NSF). The network was conceived by universities that were ineligible
to join ARPANET due to an absence of ties to the Department of Defense. CSNET was a
less expensive network; there were no redundant links and the transmission rate was
slower.
Evolution of Networks
NSFNET
With the success of CSNET, the NSF in 1986 sponsored the National Science Foundation
Network (NSFNET), a backbone that connected five supercomputer centers located
throughout the United States. Community networks were allowed access to this
backbone, with a 1.544-Mbps data rate, thus providing connectivity throughout the United
States.
ANSNET
In 1991, the U.S. government decided that NSFNET was not capable of supporting the
rapidly increasing Internet traffic. Three companies, IBM, Merit, and Verizon, filled the
void by forming a nonprofit organization called Advanced Network & Services (ANS) to
build a new, high-speed Internet backbone called Advanced Network Services Network
(ANSNET).
World Wide Web
The 1990s saw the explosion of Internet applications due to the emergence of the World
Wide Web (WWW). This invention has added the commercial applications to the Internet.
PROTOCOLS
Syntax
Structure or format of the data
Indicates how to read the bits - field delineation
Semantics
Interprets the meaning of the bits
Knows which fields define what action
Timing
When data should be sent and what
Speed at which data should be sent or speed at which it is
being received.
STANDARDS AND ADMINISTRATION
Internet Standards
An Internet standard is a thoroughly tested specification that is useful to and
status.
A specification begins as an Internet draft.
An Internet draft is a working document (a work in progress) with no official status
parties.
RFCs go through maturity levels and are categorized according to their
requirement level.
STANDARDS AND ADMINISTRATION
Maturity Levels
Proposed Standard
A proposed standard is a specification that is stable, well understood, and of
sufficient interest to the Internet community. At this level, the specification is
usually tested and implemented by several different groups.
Draft Standard
A proposed standard is elevated to draft standard status after at least two
successful independent and interoperable implementations. Barring difficulties, a
draft standard, with modifications if specific problems are encountered, normally
becomes an Internet standard.
Internet Standard
A draft standard reaches Internet standard status after demonstrations of
successful implementation.
STANDARDS AND ADMINISTRATION
Maturity Levels
Historic
The historic RFCs are significant from a historical perspective. They either have
been superseded by later specifications or have never passed the necessary
maturity levels to become an Internet standard.
Experimental
An RFC classified as experimental describes work related to an experimental
situation that does not affect the operation of the Internet. Such an RFC should
not be implemented in any functional Internet service.
Informational
An RFC classified as informational contains general, historical, or tutorial
information related to the Internet. It is usually written by someone in a non-
Internet organization, such as a vendor.
STANDARDS AND ADMINISTRATION
Requirement Levels
Required
An RFC is labeled required if it must be implemented by all Internet systems to achieve minimum
conformance. For example, IP is required protocols.
Recommended
An RFC labeled recommended is not required for minimum conformance; it is recommended
because of its usefulness. For example, FTP is a recommended protocol.
Elective
An RFC labeled elective is not required and not recommended. However, a system can use it for
its own benefit
Limited Use
An RFC labeled limited use should be used only in limited situations. Most of the experimental
RFCs fall under this category.
Not Recommended
An RFC labeled not recommended is inappropriate for general use. Normally a historic
(deprecated) RFC may fall under this category.
STANDARDS AND ADMINISTRATION
Internet Administration
STANDARDS AND ADMINISTRATION
ISOC
The Internet Society (ISOC) is an international, nonprofit organization formed in 1992
administrative bodies
IAB
The Internet Architecture Board (IAB) is the technical advisor to the ISOC.
The main purposes of the IAB are to oversee the continuing development of the
Task Force (IETF) and the Internet Research Task Force (IRTF).
STANDARDS AND ADMINISTRATION
IETF
The Internet Engineering Task Force (IETF) is a forum of working groups managed by the
problems.
IETF also develops and reviews specifications intended as Internet standards. The working
groups are collected into areas, and each area concentrates on a specific topic. Currently nine
areas have been defined.
The areas include applications, protocols, routing, network management next generation
Signals that carry information within a network can travel a fixed distance before attenuation
In the past, when Ethernet LANs were using bus topology, a repeater was used to connect two
In a star topology, a repeater is a multiport device, often called a hub, that can be used to serve
not check the link-layer address of the received frame. They just regenerate the corrupted bits
and send them out from every port.
CONNECTING DEVICES
CONNECTING DEVICES
Switch
A link-layer switch (or switch) operates in both the physical and the data-link layers. As a
As a link-layer device, the router checks the physical addresses (source and destination)
form an internetwork.
CONNECTING DEVICES
Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of the source and
destination. It is also used for interconnecting two LANs working on the same protocol.
It has a single input and single output port, thus making it a 2 port device.
Switch – A switch is a multiport bridge
Gateway – A gateway, as the name suggests, is a passage to connect two networks that
may work upon different networking models. They work as messenger agents that take
data from one system, interpret it, and transfer it to another system. Gateways are also
called protocol converters and can operate at any network layer.
Network Models
PROTOCOL LAYERING
When communication is simple, we may need only one simple protocol; when the
communication is complex, we may need to divide the task between different layers, in
which case we need a protocol at each layer, or protocol layering.
TCP/IP PROTOCOL
TCP/IP is a protocol suite (a set of protocols organized in different layers) used in the
Internet today.
It is a hierarchical protocol made up of interactive modules, each of which provides
a specific functionality.
The term hierarchical means that each upper level protocol is supported by the
services provided by one or more lower level protocols.
The original TCP/IP protocol suite was defined as four software layers built upon the
hardware.
Today, however, TCP/IP is thought of as a five-layer model.
TCP/IP PROTOCOL
TCP/IP PROTOCOL
TCP/IP PROTOCOL
Logical connections between layers of the TCP/IP protocol suite
TCP/IP PROTOCOL
Identical objects in the TCP/IP protocol suite
TCP/IP PROTOCOL
Physical Layer
Physical layer is responsible for carrying individual bits in a frame across the link.
We need to know that the transmission medium does not carry bits; it carries electrical
or optical signals.
So the bits received in a frame from the data-link layer are transformed and sent
responsible for taking the datagram and moving it across the link.
The link can be a wired LAN with a link-layer switch, a wireless LAN, a wired WAN, or a
wireless WAN.
We can also have different protocols used with any link type.
In each case, the data-link layer is responsible for moving the packet through the link.
The data-link layer takes a datagram and encapsulates it in a packet called a frame.
Some link-layer protocols provide complete error detection and correction, some
the path are responsible for choosing the best route for each packet.
The network layer is responsible for creating a connection between the source
computer and the destination computer. The communication at the network layer is
host-to-host. However, since there can be several routers from the source to the
destination, the routers in the path are responsible for choosing the best route for each
packet.
IP is a connectionless protocol that provides no flow control, no error control, and no
The transport layer at the source host gets the message from the application layer,
establishes a logical connection between transport layers at two hosts before transferring
data.
It creates a logical pipe between two TCPs for transferring a stream of bytes. TCP provides
flow control (matching the sending data rate of the source host with the receiving data rate
of the destination host to prevent overwhelming the destination), error control (to
guarantee that the segments arrive at the destination without error and resending the
corrupted ones), and congestion control to reduce the loss of segments due to congestion
in the network.
TCP/IP PROTOCOL
Application Layer
the logical connection between the two application layers is endto-end. The two
application layers exchange messages between each other as though there were a
bridge between the two layers. However, we should know that the communication is
done through all the layers.
The Hypertext Transfer Protocol (HTTP) is a vehicle for accessing the World Wide Web
(WWW).
The Simple Mail Transfer Protocol (SMTP) is the main protocol used in electronic mail
(e-mail) service.
The File Transfer Protocol (FTP) is used for transferring files from one host to another,
etc.
TCP/IP PROTOCOL
TCP/IP PROTOCOL
TCP/IP PROTOCOL
OSI MODEL
An ISO standard that covers all aspects of network communications is the Open
Systems Interconnection (OSI) model. It was first introduced in the late 1970s.
An open system is a set of protocols that allows any two different systems to
communicate regardless of their underlying architecture.
The purpose of the OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying hardware
and software.
The OSI model is not a protocol; it is a model for understanding and designing a
network architecture that is flexible, robust, and interoperable.
OSI MODEL
OSI MODEL
Session Layer
This layer is responsible for the establishment of connection, maintenance of sessions,
Session establishment, maintenance, and termination: The layer allows the two
synchronization points in the data. These synchronization points help to identify the
error so that the data is re-synchronized properly, and ends of the messages are not cut
prematurely and data loss is avoided.
Dialog Controller: The session layer allows two systems to start communication with