Professional Documents
Culture Documents
Unit 5
Unit 5
Points
Of LAN
Difference
A LAN (local
area
Definition
network) is a group of
computers and network
devices
connected
together, usually within
the same building.
Area
Occupied
Speed
Cost
Technology
Transmission
medium
MAN
WAN
Data Rate
Internetworking
devices used
Problems And Fewer problems
Errors
Small office or
Examples
internet cafe
Moderate
Explanation:
Unit5
Page1
The OSI model defines internetworking in terms of a vertical stack of seven layers. The upper layers of
the OSI model represent software that implements network services like encryption and connection
management. The lower layers of the OSI model implement more primitive, hardware-oriented functions
like routing, addressing, and flow control.
In the OSI model, data communication starts with the top layer at the sending side, travels down the OSI
model stack to the bottom layer, then traveses the network connection to the bottom layer on the receiving
side, and up its OSI model stack.
The OSI model was introduced in 1984. Although it was designed to be an abstract model, the OSI
model remains a practical framework for today's key network technologies like Ethernet and protocols
like IP.
Layer 1 - Physical
Physical layer defines the cable or physical medium itself, e.g., thinnet, thicknet, unshielded twisted pairs
(UTP). All media are functionally equivalent. The main difference is in convenience and cost of
installation and maintenance. Converters from one media to another operate at this level.
Layer 2 - Data Link
Data Link layer defines the format of data on the network. A network data frame, aka packet, includes
checksum, source and destination address, and data. The largest packet that can be sent through a data
link layer defines the Maximum Transmission Unit (MTU). The data link layer handles the physical and
logical connections to the packet's destination, using a network interface. A host connected to an Ethernet
would have an Ethernet interface to handle connections to the outside world, and a loopback interface to
send packets to itself.
Ethernet addresses a host using a unique, 48-bit address called its Ethernet address or Media Access
Control (MAC) address. MAC addresses are usually represented as six colon-separated pairs of hex
digits, e.g., 8:0:20:11:ac:85. This number is unique and is associated with a particular Ethernet device.
Hosts with multiple network interfaces should use the same MAC address on each. The data link layer's
protocol-specific header specifies the MAC address of the packet's source and destination. When a packet
is sent to all hosts (broadcast), a special MAC address (ff:ff:ff:ff:ff:ff) is used.
Layer 3 - Network
NFS uses Internetwork Protocol (IP) as its network layer interface. IP is responsible for routing, directing
datagrams from one network to another. The network layer may have to break large datagrams, larger
than MTU, into smaller packets and host receiving the packet will have to reassemble the fragmented
datagram. The Internetwork Protocol identifies each host with a 32-bit IP address. IP addresses are
written as four dot-separated decimal numbers between 0 and 255, e.g., 129.79.16.40. The leading 1-3
bytes of the IP identify the network and the remaining bytes identifies the host on that network. The
network portion of the IP is assigned by InterNIC Registration Services, under the contract to the National
Science Foundation, and the host portion of the IP is assigned by the local network administrators. For
large sites, the first two bytes represents the network portion of the IP, and the third and fourth bytes
identify the subnet and host respectively.
Unit5
Page2
Even though IP packets are addressed using IP addresses, hardware addresses must be used to actually
transport data from one host to another. The Address Resolution Protocol (ARP) is used to map the IP
address to it hardware address.
Layer 4 - Transport
Transport layer subdivides user-buffer into network-buffer sized datagrams and enforces desired
transmission control. Two transport protocols, Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP), sits at the transport layer. Reliability and speed are the primary difference between these
two protocols. TCP establishes connections between two hosts on the network through 'sockets' which are
determined by the IP address and port number. TCP keeps track of the packet delivery order and the
packets that must be resent. Maintaining this information for each connection makes TCP a stateful
protocol. UDP on the other hand provides a low overhead transmission service, but with less error
checking. NFS(Network File System) is built on top of UDP because of its speed and statelessness.
Statelessness simplifies the crash recovery.
Layer 5 - Session
The session protocol defines the format of the data sent over the connections. The NFS uses the Remote
Procedure Call (RPC) for its session protocol. RPC may be built on either TCP or UDP. Login sessions
uses TCP whereas NFS and broadcast use UDP.
Unit5
Page3
Layer 6 - Presentation
External Data Representation (XDR) sits at the presentation level. It converts local representation of data
to its canonical form and vice versa. The canonical uses a standard byte ordering and structure packing
convention, independent of the host.
Layer 7 - Application
Provides network services to the end-users. Mail, ftp, telnet, DNS, NIS, NFS are examples of network
applications.
The TCP/IP Reference Model
TCP/IP originated out of the investigative research into networking protocols that the US Department of
Defense (DoD) initiated in 1969. In 1968, the DoD Advanced Research Projects Agency (ARPA) began
researching the network technology that is called packet switching.
The original focus of this research was that the network be able to survive loss of subnet hardware, with
existing conversations not being broken off. In other words, DoD wanted connections to remain intact as
long as the source and destination nodes were functioning, even if some of the machines or transmission
lines in between were suddenly put out of operation. The network that was initially constructed as a result
of this research to provide a communication that could function in wartime., then called ARPANET,
gradually became known as the Internet. The TCP/IP protocols played an important role in the
development of the Internet. In the early 1980s, the TCP/IP protocols were developed. In 1983, they
became standard protocols for ARPANET.
Because of the history of the TCP/IP protocol suite, it's often referred to as the DoD protocol suite or the
Internet protocol suite.
Page4
Access protocol is a set of rules that defines how the hosts access the shared medium. Access protocol
have to be simple, rational and fair for all the hosts.
Functions performed at this level include encapsulation of IP datagrams into the frames transmitted by the
network, and mapping of IP addresses to the physical addresses used by the network. One of TCP/IP's
strengths is its universal addressing scheme. The IP address must be converted into an address that is
appropriate for the physical network over which the datagram is transmitted.
Internet layer Provides services that are roughly equivalent to the OSI Network layer. The primary
concern of the protocol at this layer is to manage the connections across networks as information is
passed from source to destination. The Internet Protocol (IP) is the primary protocol at this layer of the
TCP/IP model.
Transport layer It is designed to allow peer entities on the source and destination hosts to carry on a
conversation, just as in the OSI transport layer. Two end-to-end transport protocols have been defined
here TCP and UDP.
Application Layer includes the OSI Session, Presentation and Application layers as shown in the
Figure . An application is any process that occurs above the Transport Layer. This includes all of the
processes that involve user interaction. The application determines the presentation of the data and
controls the session. There are numerous application layer protocols in TCP/IP, including Simple Mail
Transfer Protocol (SMTP) and Post Office Protocol (POP) used for e-mail, Hyper Text Transfer Protocol
(HTTP) used for the World-Wide-Web, and File Transfer Protocol (FTP). Most application layer
protocols are associated with one or more port number.
Unit5
Page5
Unit5
Page6
Star
A star topology is designed with each node (file server, workstations, and peripherals) connected directly
to a central network hub, switch, or concentrator.
Data on a star network passes through the hub, switch, or concentrator before continuing to its
destination. The hub, switch, or concentrator manages and controls all functions of the network. It also
acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can
also be used with coaxial cable or fiber optic cable.
Unit5
Page7
Ring topology
Alternatively referred to as a ring network, the ring topology is a computer network configuration where
each network computer and device are connected to each other forming a large circle (or similar shape).
Each packet is sent around the ring until it reaches its final destination. Today, the ring topology is
seldom used. Below is a visual example of a simple computer setup on a network using a ring topology.
Unit5
Page8
Hybrid Topology
Hybrid, as the name suggests, is mixture of two different things. Similarly in this type of topology we
integrate two or more different topologies to form a resultant topology which has good points(as well as
weaknesses) of all the constituent basic topologies rather than having characteristics of one specific
topology. This combination of topologies is done according to the requirements of the organization.
For example, if there exists a ring topology in one office department while a bus topology in another
department, connecting these two will result in Hybrid topology. Remember connecting two similar
topologies cannot be termed as Hybrid topology. Star-Ring and Star-Bus networks are most common
examples of hybrid network.
Page9
4) Effective: Hybrid topology is the combination of two or more topologies, so we can design it in such a
way that strengths of constituent topologies are maximized while there weaknesses are neutralized. For
example we saw Ring Topology has good data reliability (achieved by use of tokens) and Star topology
has high tolerance capability (as each node is not directly connected to other but through central device),
so these two can be used effectively in hybrid star-ring topology.
Mesh Topology
In a mesh network topology, each of the network node, computer and other devices, are
interconnected with one another. Every node not only sends its own signals but also relays data from
other nodes. In fact a true mesh topology is the one where every node is connected to every other
node in the network. This type of topology is very expensive as there are many redundant
connections, thus it is not mostly used in computer networks. It is commonly used in wireless
networks.
Unit5
Page10
Unit5
Page11
Most of the Net Applications use the Client Server architecture. These terms refer to the two processes or
two applications which will be communicating with each other to exchange some information. One of the
two processes acts as a client process and another process acts as a server.
Client Process:
This is the process which typically makes a request for information. After getting the response this
process may terminate or may do some other processing.
For example: Internet Browser works as a client application which sends a request to Web Server to get
one HTML web page.
Server Process:
This is the process which takes a request from the clients. After getting a request from the client, this
process will do required processing and will gather requested information and will send it to the requestor
client. Once done, it becomes ready to serve another client. Server process are always alert and ready to
serve incoming requests.
For example: Web Server keeps waiting for requests from Internet Browsers and as soon as it gets any
request from a browser, it picks up a requested HTML page and sends it back to that Browser.
Notice that the client needs to know of the existence and the address of the server, but the server does not
need to know the address or even the existence of the client prior to the connection being established.
Once a connection is established, both sides can send and receive information.
Page12
2-tier architectures: In this architecture, client directly interact with the server. This type of
architecture may have some security holes and performance problems. Internet Explorer and Web
Server works on two tier architecture.
3-tier architectures: In this architecture, one more software sits in between client and server.
This middle software is called middleware. Middleware are used to perform all the security
checks and load balancing in case of heavy load. A middleware takes all requests from the client
and after doing required authentication it passes that request to the server. Then server does
required processing and sends response back to the middleware and finally middleware passes
this response back to the client. If you want to implement a 3-tier architecture then you can keep
any middle ware like Web Logic or WebSphere software in between your Web Server and Web
Browsers.
Unit5
Quick and easy to put together, even by someone who doesn't have much experience.
Ideal for demonstrating how a site will look.
Cache friendly, one copy can be shown to many people.
Page13
Disadvantages
Dynamic Pages
Typically written in various scripting languages or technologies such as ASP, PHP, Perl or JSP.
Advantages
Disadvantages
Unit5
Page14