Professional Documents
Culture Documents
Network Basics PDF
Network Basics PDF
Network Basics PDF
Network basics
0.1 Introduction
In today’s high-tech environment, information is our most valued resource. From a
historical point of view, people have always found ways to share information, whether
it be by smoke signals, mail or classic telephone links. Today’s information networks
are just the next step in this evolution. Understanding the devices and concepts that
make up this system is therefore imperative, so that all information and ideas can be
exchanged smoothly, without fault and efficiently.
This chapter will familiarize
you with the basics of
network design. We will
cover the various devices
that exist on a network,
their roles and how they
communicate with each
other. We will also take a
look at the ISO/OSI model,
a specialized system that
allows for interoperability
between various devices in
a network. Lastly, we will
learn how to read and
create IP addresses.
If you are already familiar with these topics, feel free to skip this chapter and continue
with the next one, Simple Network Design. Note however, that information entailed in
this chapter is considered basic network knowledge and will not be explained in the
next one.
0.2 What is a network?
When most people talk about a network they talk about two or more devices
connected by a common medium. Because of this connection, devices can share
data or provide various services to each other. Many factors influence the size of the
network:
Every fragment is an individual data unit and is handled separately by the transport
layer.
The transport layer serves the following functions:
- Division and reassembly of data
- Identifying individual applications
- Assure quality of data delivery
At the start of this chapter we asked an interesting question: How does your
computer separate data coming from, for example, your e-mail from data belonging
to a video you are downloading? In other words: how come the information from an
e-mail doesn’t get mixed up in your video? As you can see above, identifying these
individual applications is the task of the transport layer. To this end, every fragment is
marked with a special number called a port number. A port number is a 16-bit
identifier, which means these numbers range from 0 to 65535. Every fragment is
marked with two port numbers.
The source port number is simply a random number greater than 1023. Simple.
The destination port number defines which application or protocol you are currently
using. Every one of these applications has its own unique port number.
For example: if you are requesting a web page in your browser, all fragments leaving
the transport layer will be marked with a destination port number of 80, as this is the
port number for the HTTP protocol (which we mentioned in the application layer
section). Fragments belonging to the Simple Mail Transfer Protocol (SMTP) are
marked with a destination port number of 25. Requesting the download of a file using
File Transfer Protocol (FTP) will use the number 21.
The transport layer also makes
sure the data sent to another
device is received with sufficient
quality. To handle quality
assurance, the transport layer
has two powerful protocols at its
disposal.
Transport Control Protocol
(TCP) is one of them. This
protocol is what we call a
connection-oriented protocol.
This means that when sending
data, the sender and the
receiver are in a constant
connection. Apart from the
actual data, the two end devices
also exchange frequent control Exhibit n.10: Primary principle of TCP and UDP
messages to make sure that
every single bit of data has been successfully sent and received. If not, then that data
is simply sent again. To start a connection, the two end devices exchange a special
set of control messages called a Three-way handshake. Once all fragments are sent,
the connection is closed using a Two-way handshake. TCP is a reliable protocol,
perfect for applications which require complete, high-quality data. FTP is one of them.
If you downloaded a document, for example, and parts of the document would be lost
in transmission, then the whole document would probably be unusable.
User Datagram Protocol (UDP) is the complete opposite of TCP, therefore it is
referred to as a connectionless or best-effort service. UDP exchanges only very few
control messages and fragments that are lost in transmission are not resent again.
This makes for a fast and effective protocol ideal for certain applications, like video
chat. If some parts of the video are missing, or a few seconds of video are in bad
quality, the overall readability suffers only very little. Such video streaming would be
impossible using TCP, as too much time would be lost in exchanging control messages
and resending damaged or lost data.
- The application layer handles interaction with the, chooses the correct protocol to
satisfy his requirements and passes created data to the presentation layer
- At the presentation layer, the data is converted, compressed and encrypted
- The session layer maintains the dialogue between interacting applications
- The transport layer divides the data into fragments and marks each fragment with
port numbers, according to the protocol used in the application layer, either TCP or
UDP are used to ensure sufficient transport quality
- The network layer adds a source and destination IP address to the packet
- The data link layer adds a source and destination MAC address to the frame and
decides when to place the frame on the medium
- The physical layer encodes the frame and converts it into signals which are then
placed on the medium
Using the addresses added by the network and data link layer, the frame can navigate
its way through the network. At the destination device, the frame is decoded, stripped
of all control information and the original information is restored using the rest of the
frames of the original message. The original information is the presented to the correct
application thanks to the destination port number.
0.7 Layer 3 addressing
Earlier we mentioned that the third layer of the ISO/OSI model uses a type of address
called an IP address which uniquely identifies every device on the network. To properly
understand the later concepts of networking, we must first find out how to read these
addresses.
There are two versions of IP addresses, according to the version of the IP protocol
used. For now, we will focus on the older IPv4 address type.
Wireless ad-hoc networks can be employed in a variety of ways. Due to their fast
construction and resiliency, the individual nodes are often allowed movement during
the communication, which is known as a Mobile Ad-hoc Network (MANET). This has
practical applications in factory production, disaster recovery or military usage. Another
type of wireless ad-hoc networks are Vehicular Ad-hoc Networks (VANET), which uses
vehicles as routers. This way, vehicles can even interact with roadside equipment.
When compared to MANETs, the nodes in a VANET move in a considerably more
organized fashion.
0.9.2 Wireless sensor networks
Sensor networks are another type of ad-hoc networks. The main difference here is
that whereas standard networks interact with humans, sensor networks interact with
the environment. Nodes in a sensor network are equipped to measure/influence the
environment, process this information and then communicate it wirelessly.