8 chapter 08 computer network

32
102 Chapter-08 Computer Networks Source: http://www.futurerayz.com/career-in-networking/

Upload: jobaiyer

Post on 16-Sep-2015

7 views

Category:

Documents


1 download

DESCRIPTION

MIS

TRANSCRIPT

  • 102

    Chapter-08

    Computer Networks

    Source: http://www.futurerayz.com/career-in-networking/

  • Management Information Systems Page 103

    Chapter 8 Computer Network

    8.1 Introduction to Computer Network

    A computer network or data network is a telecommunications network that allows

    computers to exchange data. In computer networks, networked computing devices

    (network nodes) pass data to each other along data connections. The connections

    (network links) between nodes are established using either cable media or wireless

    media. The best-known computer network is the Internet.

    Network devices that originate, route and terminate the data are called network nodes.

    Nodes can include hosts such as servers and personal computers, as well as networking

    hardware. Two devices are said to be networked when a device is able to exchange

    information with another device.

    Computer networks support applications such as access to the World Wide Web, shared

    use of application and storage servers, printers, and fax machines, and use of email and

    instant messaging applications. This article discusses computer network technologies and

    classifies them according to the following characteristics: the physical media used to

    transmit signals, the communications protocols used to organize network traffic, along

    with the network's size, its topology and its organizational intent.

    A network is a group of devices connected to each other. Networks may be classified into

    a wide variety of characteristics, such as the medium used to transport the data,

    communications protocol used, scale, topology, benefit, and organizational scope.

    Information and communication are two of the most important strategic issues for the

    success of every enterprise. While today nearly every organization uses a substantial

    number of computers and communication tools (like telephone or fax), they are often still

    isolated. While managers today are able to use applications like wordprocessors or

    spreadsheets, not very many of them use computer-based tools to communicate with

    other departments or information retrieval programs.

    To overcome these obstacles in an effective usage of information technology, computer

    networks are necessary. They are a new kind (one might call it paradigm) of organization

    of computer systems produced by the need to merge computers and communications. At

    the same time they are the means to converge the two areas; the unnecessary distinction

    between tools to process and store information and tools to collect and transport

    information can disappear. Computer networks can manage to put down the barriers

    between information held on several (not only computer) systems. Only with the help of

    computer networks can a borderless communication and information environment be

    built.

    Computer networks allow the user to access remote programs and remote databases either

    of the same organization or from other enterprises or public sources. Computer networks

    provide communication possibilities faster than other facilities. Because of these optimal

    information and communication possibilities, computer networks may increase the

  • Management Information Systems Page 104

    Chapter 8 Computer Network

    organizational learning rate, which many authors declare as the only fundamental

    advantage in competition.

    Besides this major reason why any organization should not fail to have a computer

    network, there are other reasons as well:

    cost reduction by sharing hard- and software resources

    high reliability by having multiple sources of supply

    cost reduction by downsizing to microcomputer-based networks instead of using

    mainframes

    greater flexibility because of possibility to connect devices from various vendors

    8.2 What is Computer Network? Write importance of computer network in

    modern Information Technology (IT).

    A computer network is a group of computers connected to each other electronically. This means that the computers can "talk" to

    each other and that every computer in the network can send

    information to the others. Usually, this means that the speed of the connection is fast - faster than a normal connection to the Internet.

    Some basic types of computer networks include:1

    A local area network (often called a LAN) connects two or more computers, and

    may be called a corporate network in an office or business setting.

    An "internetwork", sometimes called a Wide Area Network (because of the wide

    distance between networks) connects two or more smaller networks together. The

    largest internetwork is called the Internet. 2

    Figure 8.1 Cisco, Networking Academy, Communicating over the Network, Network Fundamentals, p.42

  • Management Information Systems Page 105

    Chapter 8 Computer Network

    Computers can be part of several different networks. Networks can also be parts of bigger

    networks. The local area network in a small business is usually connected to the

    corporate network of the larger company. Any connected machine at any level of the

    organization may be able to access the Internet, for example to demonstrate computers in

    the store, display its catalogue through a web server, or convert received orders into

    shipping instructions.

    Microsoft Windows, Linux and most other operating systems use TCP/IP for networking.

    Apple Macintosh computers used Appletalk in the past, but it uses TCP/IP now.

    To set up a network an appropriate media is required. This can be wired or wireless.

    Twisted-pair, co-axial or fiber-optic are examples of cable and infra-red, blue-tooth,

    radio-wave, micro-wave etc. are wireless media used for networking. When you are

    working with a mere LAN, computers, media and peripherals are sufficient. But when

    you are working with a wider range you have use some additional devices like bridge,

    gateway or router to connect different small or large networks. And obviously a protocol

    must be maintained.

    To set up a network you have to select an appropriate topology to arrange the hardware

    devices using the media. Topologies generally used are bus-topology, ring-topology, star-

    topology, tree-topology, object-oriented topology etc. Among these star-topology and

    tree-topology are most popular nowadays.[

    A computer network, or simply a network, is a collection of computers and other

    hardware interconnected by communication channels that allow sharing of resources and

    information. Where at least one process in one device is able to send/receive data to/from

    at least one process residing in a remote device, then the two devices are said to be in a

    network. 3

  • Management Information Systems Page 106

    Chapter 8 Computer Network

    Figure 8.2 http://rashid007.blogspot.com/2011/03/what-is-computer-network.html

    8.3 Define Computer Network. Write different types of Network in business.

    A combination of two or more computers connected through a communication system

    that allows exchange of information between computers is termed as Computer Network

    It is classified into:

    a) LAN

    b) WAN

    d) Internet

    LAN is the full form of Local Area Network. It is the connection of computers inside a building or a Lab. Connected computers in a Computer lab, computers in a

    Bank or in a Hospital. This will be a private network owned by a company or an

    institutions etc.

    WAN is Wide Area Network.overall Connection of computers in a city/town. For example, the network of different branches of a company in a city. This is a private

    network

    MAN is the full form of Metropolitan Area Network. The network of computers in metropolitan city. The network of computers of different branches of a company

    inside a metropolitan city. This will be a private network.

    Internet is a public network. It is the collection of inter connected networks. It is a network of networks which is capable of communicating with computers on other

    network and sending data, files and other information back and forth. The internet

    connects tens of thousands of independent networks into a vast global Internet. It is

    probably the Largest Wide Area Network.

    Figure 8.3 http://simple.wikipedia.org/wiki/ring_topology

  • Management Information Systems Page 107

    Chapter 8 Computer Network

    8.4 Define Network Topology. Write different types of Network Network

    Topologies.

    A network topology is the arrangement of computers, cables, and others components on a

    network. Network topology is a map of the physical network. Network topology is the

    arrangement of the various elements of a computer network. Essentially, it is the

    topological structure of a network, and may be depicted physically or logically. Physical

    topology refers to the placement of the network's various components, including device

    location and cable installation, while logical topology shows how data flows within a

    network, regardless of its physical design. Distances between nodes, physical

    interconnections, transmission rates, and/or signal types may differ between two

    networks, yet their topologies may be identical.4

    Five most common topologies are:

    1) Bus 2) Star 3) Ring 4) Mesh 5) Hybrid Topology

    Figure 8.4 http://simple.wikipedia.org/wiki/ring_topology

    A good example is a local area network (LAN): Any given node in the LAN has one or

    more physical links to other devices in the network; graphically mapping these links

    results in a geometric shape that can be used to describe the physical topology of the

    network. Conversely, mapping the data flow between the components determines the

    logical topology of the network.

  • Management Information Systems Page 108

    Chapter 8 Computer Network

    1. Bus Topology- Computers are connected to a common, shared cable.

    Figure 8.5 http://rashid007.blogspot.com/2011/03/what-is-computer-network.html

    In a bus topology all of the computers in a network are attached to a continuous cable.

    And all the devices on a bus topology are connected by one single cable. When one

    computer sends a signal up the wire, all the computers on the network receive the

    information, but only one accepts the information. The rest regrets the message. One

    computer can send a message at a time. A computer must wait until the bus is free before

    it can transmit. When the signal reaches the end of the wire, it bounces back and travels

    back up the wire. When a signal echoes back and forth along an unterminated bus, it is

    called ringing. To stop the signals from ringing, attach terminators at either end of the

    segment. The terminators absorb the electrical energy and stop the reflection.

    Advantage of network topology

    The bus is simple, reliable in small network, easy to use and understand

    Requires the least amount of cable to connect the computers and less expensive

    Easy to extend the bus

    2. Star Topology:

    All the cables run from the computers to a central location, where they are all connected

    by a device called a hub or switch. Each computer on a star network communicates with

    a central hub/switch that resends the message either to all the computers or only to the

    destination computers.

  • Management Information Systems Page 109

    Chapter 8 Computer Network

    Figure 8.6 http://1.bp.blogspot.com/-f1_JocDm57Y/UA-rnslcCCI/aaa /jVQ9wo3hIgE/s1600/star+topology.jpg

    Hub can be active or passive in the star network Active hub regenerates the electrical

    signal and sends it to all the computers connected to it. Passive hub does not amplify or

    regenerate signal and does not require electrical power to run. We can expand a star

    network by placing another star hub.

    Advantages:

    Easy to modify and add new computers to a star net

    Center of a star net is a good place to diagnose network faults

    Single computer failure do not necessarily bring down the whole net

    Several cable types can be used with the hub

    3. Ring Topology:

    Figure 8.7 http://1.bp.blogspot.com/-5yh0peyUJig/UA-t77rV09I/AAAAAAAAAIM/ceKhsjWCCPs/s1600/ RingTopology%255B1%255D.jpg

    In a ring topology, computers are connected on a single circle of cable. Unlike the bus

    topology, there are no terminated ends. Each computer is connected to the next computer

    with the last one connected to the first. Every computer is connected to the next computer

    in the ring, and each retransmits what it receives from the previous computer. The

    message flow around the ring in one direction. Some ring networks do token passing. It

  • Management Information Systems Page 110

    Chapter 8 Computer Network

    passes around the ring until a computer wishes to send information to another computer.

    The computer adds an electronic address and data and sends it around the ring. Each

    computer in sequence receives the token and the information and passes them to the next

    until either the electronic address matches the address of the computer or the token

    returns to the origin. The receiving computer returns a message to the originator

    indicating that the message has been received. The sending computer then creates another

    token and place it on the network, allowing another station to capture the token and being

    transmitted.

    Advantages:

    In a ring topology, each computer acts as a repeater, regenerating the signal and

    sending it on to the next computer.

    No computer can monopolize the network

    The fair sharing of the network allows the net to degrade gracefully as more user

    are added.

    4. Mesh Topology:

    The mesh topology connects all devices (nodes) to each other for redundancy and fault

    tolerance. It is used in WANs to interconnect LANs and for mission critical networks like

    those used by banks and financial institutions. Implementing the mesh topology is

    expensive and difficult.

    Figure 8.8 http://1.bp.blogspot.com/-L0hOL9Cq4yg/UA-vxKhZNqI/AAAAAAAAAIc/kiEk8AW dqJc/s1600/Mesh-Topology.jpg

    Advantages mesh topology:

    Fault tolerance

    Guaranteed communication channel capacity

    Easy to troubleshoot.

    Communications protocols define the rules and data formats for exchanging information

    in a computer network, and provide the basis for network programming. Well-known

    communications protocols include two Ethernet, a hardware and link layer standard that

    is ubiquitous in local area networks, and the Internet protocol suite, which defines a set of

  • Management Information Systems Page 111

    Chapter 8 Computer Network

    protocols for internetworking, i.e. for data communication between multiple networks, as

    well as host-to-host data transfer, and application-specific data transmission formats.5

    Figure 8.8 http://1.bp.blogspot.com/-f1_JocDm57Y/UA-rnslcCCI/aaa /jVQ9wo3hIgE/s1600

    Computer networking is sometimes considered a sub-discipline of electrical engineering,

    telecommunications, computer science, information technology or computer engineering,

    since it relies upon the theoretical and practical application of these disciplines.

    8.5 What are the differences between Physical and Logical topologies?

    Explain with figure.

    There are two basic categories of network topologies:

    1. Physical topologies 2. Logical topologies

    Figure 8.9 Physical Topology :Source: http://en.wikipedia.org/wiki/Token_Ring

  • Management Information Systems Page 112

    Chapter 8 Computer Network

    Network Topology is the particular shape or manner the clients or nodes are arranged. for

    example if someone says that the computers are arranged in a star network it doesn't

    mean that the computers are arranged physically in star but logically arranged based on

    the tasks it can carry out and how it does so.

    Figure 8.10 http://en.wikipedia.org/wiki/physical_topology

    Physical Topologie

    The logical topology, in contrast, is the way that the signals act on the network media, or

    the way that the data passes through the network from one device to the next without

    regard to the physical interconnection of the devices. A network's logical topology is not

    necessarily the same as its physical topology. For example, the original twisted pair

    Ethernet using repeater hubs was a logical bus topology with a physical star topology

    layout. Token Ring is a logical ring topology, but is wired a physical star from the Media

    Access Unit.6

    Figure 8.11 http://en.wikipedia.org/wiki/logical_topology

    Logical Topology

  • Management Information Systems Page 113

    Chapter 8 Computer Network

    The logical classification of network topologies generally follows the same classifications

    as those in the physical classifications of network topologies but describes the path that

    the data takes between nodes being used as opposed to the actual physical connections

    between nodes. The logical topologies are generally determined by network protocols as

    opposed to being determined by the physical layout of cables, wires, and network devices

    or by the flow of the electrical signals, although in many cases the paths that the electrical

    signals take between nodes may closely match the logical flow of data, hence the

    convention of using the terms logical topology and signal topology interchangeably.

    Logical topologies are often closely associated with Media Access Control methods and

    protocols. Logical topologies are able to be dynamically reconfigured by special types of

    equipment such as routers and switches.

    8.6 What is the Point-to-Point Topology? Explain with figure.

    Figure 8.12 http://en.wikipedia.org/wiki/Token_Ring

    The simplest topology is a permanent link between two endpoints. Switched point-to-

    point topologies are the basic model of conventional telephony. The value of a permanent

    point-to-point network is unimpeded communications between the two endpoints. The

    value of an on-demand point-to-point connection is proportional to the number of

    potential pairs of subscribers, and has been expressed as Metcalfe's Law.

    Figure 8.13 http://en.wikipedia.org/wiki/Token_Ring

  • Management Information Systems Page 114

    Chapter 8 Computer Network

    Switched:

    Using circuit-switching or packet-switching technologies, a point-to-point circuit

    can be set up dynamically, and dropped when no longer needed. This is the basic

    mode of conventional telephony.

    Figure 8.14 http://en.wikipedia.org/wiki/Token_Ring

    8.7 What are the Network Technologies? Write different types of

    network technologies. Explain.

    Network technologies refer to the hardware and software used to connect a group of two

    or more computers. In scope, it can encompass setting up peer-to-peer connection,

    through local area networks (LAN) and even includes an understanding of how the internet and the World Wide Web function.

    7

    There are different types of the Network technologies in the world like :-

    a) Ethernet b) Local Talk c) Token Ring d) FDDI e) ATM

  • Management Information Systems Page 115

    Chapter 8 Computer Network

    The following is some common-used network symbols to draw different

    kinds of network protocols.

    In today's business world, reliable and efficient access to information has become an

    important asset in the quest to achieve a competitive advantage. File cabinets and

    mountains of papers have given way to computers that store and manage information

    electronically. Coworkers thousands of miles apart can share information

    instantaneously, just as hundreds of workers in a single location can simultaneously

    review research data maintained online.

    Computer networking technologies are the glue that binds these elements together. The

    public Internet allows businesses around the world to share information with each other

    and their customers. The global computer network known as the World Wide Web

    provides services that let consumers buy books, clothes, and even cars online, or auction

    those same items off when no longer wanted.

    In this article, we will take a very close look at networking, and in particular the Ethernet

    networking standard, so you can understand the actual mechanics of how all of these

    computers connect to one another.

    Figure 8.15 http://computer.howstuffworks.com/home-network.htm

  • Management Information Systems Page 116

    Chapter 8 Computer Network

    Ethernet

    Figure 8.16 http://computer.howstuffworks.com/home-network.htm

    The Ethernet Technology is by far the most widely used. Ethernet uses an access method

    called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system

    where each computer listens to the cable before sending anything through the network. If

    the network is clear, the computer will transmit. If some other node is already

    transmitting on the cable, the computer will wait and try again when the line is clear.

    Sometimes, two computers attempt to transmit at the same instant. When this happens a

    collision occurs. Each computer then backs off and waits a random amount of time before

    attempting to retransmit. With this access method, it is normal to have collisions.

    However, the delay caused by collisions and retransmitting is very small and does not

    normally effect the speed of transmission on the network.

    The Ethernet Technology allows for linear bus, star, or tree topologies. Data can be

    transmitted over wireless access points, twisted pair, coaxial, or fiber optic cable at a

    speed of 10 Mbps up to 1000 Mbps.

    Fast Ethernet

    To allow for an increased speed of transmission, the Ethernet Technology has developed

    a new standard that supports 100 Mbps. This is commonly called Fast Ethernet. Fast

    Ethernet requires the use of different, more expensive network concentrators/hubs and

    network interface cards. In addition, category 5 twisted pair or fiber optic cable is

    necessary. Fast Ethernet is becoming common in schools that have been recently wired.

  • Management Information Systems Page 117

    Chapter 8 Computer Network

    Figure 8.17 http://computer.howstuffworks.com/fast_ethernet

    To allow for an increased speed of transmission, the Ethernet Technology has developed

    a new standard that supports 100 Mbps. This is commonly called Fast Ethernet. Fast

    Ethernet requires the use of different, more expensive network concentrators/hubs and

    network interface cards. In addition, category 5 twisted pair or fiber optic cable is

    necessary. Fast Ethernet is becoming common in schools that have been recently wired.

    Local Talk

    Local Talk is a network Technology that was developed by Apple Computer, Inc. for

    Macintosh computers. The method used by Local Talk is called CSMA/CA (Carrier

    Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except that

    a computer signals its intent to transmit before it actually does so. Local Talk adapters

    and special twisted pair cable can be used to connect a series of computers through the

    serial port. The Macintosh operating system allows the establishment of a peer-to-peer

    network without the need for additional software. With the addition of the server version

    of AppleShare software, a client/server network can be established.

    The Local Talk Technology allows for linear bus, star, or tree topologies using twisted

    pair cable. A primary disadvantage of Local Talk is speed. Its speed of transmission is

    only 230 Kbps.

    Token Ring

    The Token Ring Technology was developed by IBM in the mid-1980s. The access

    method used involves token-passing. In Token Ring, the computers are connected so that

    the signal travels around the network from one computer to another in a logical ring. A

    single electronic token moves around the ring from one computer to the next. If a

    computer does not have information to transmit, it simply passes the token on to the next

    workstation. If a computer wishes to transmit and receives an empty token, it attaches

    data to the token. The token then proceeds around the ring until it comes to the computer

    for which the data is meant. At this point, the data is captured by the receiving computer.

    The Token Ring Technology requires a star-wired ring using twisted pair or fiber optic

    cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due to the increasing

    popularity of Ethernet, the use of Token Ring in school environments has decreased.

  • Management Information Systems Page 118

    Chapter 8 Computer Network

    FDDI Fiber Distributed Data Interface (FDDI) is a network Technology that is used primarily to

    interconnect two or more local area networks, often over large distances. The access

    method used by FDDI involves token-passing. FDDI uses a dual ring physical topology.

    Transmission normally occurs on one of the rings; however, if a break occurs, the system

    keeps information moving by automatically using portions of the second ring to create a

    new complete ring. A major advantage of FDDI is speed. It operates over fiber optic

    cable at 100 Mbps.

    Figure 8.18 http://techsoftcomputing.com/internetworking/FDDI.html

    ATM

    Asynchronous Transfer Mode (ATM) is a network Technology that transmits data at a

    speed of 155 Mbps and higher. ATM works by transmitting all data in small packets of a

    fixed size; whereas, other Technologies transfer variable length packets. ATM supports a

    variety of media such as video, CD-quality audio, and imaging. ATM employs a star

    topology, which can work with fiber optic as well as twisted pair cable.

    ATM is most often used to interconnect two or more local area networks. It is also

    frequently used by Internet Service Providers to utilize high-speed access to the Internet

    for their clients. As ATM technology becomes more cost-effective, it will provide

    another solution for constructing faster local area networks.

    Gigabit Ethernet

    The most recent development in the Ethernet standard is a Technology that has a

    transmission speed of 1 GBPS. Gigabit Ethernet is primarily used for backbones on a

    network at this time. In the future, it will probably be used for workstation and server

    connections also. It can be used with both fiber optic cabling and copper. The

    1000BaseTX, the copper cable used for Gigabit Ethernet, is expected to become the

    formal standard in 1999.

  • Management Information Systems Page 119

    Chapter 8 Computer Network

    Compare the Network Technologies

    Technologies Cable Speed Topology

    Ethernet Twisted Pair, Coaxial,

    Fiber 10 Mbps Linear Bus, Star, Tree

    Fast Ethernet Twisted Pair, Fiber 100 Mbps Star

    Local Talk Twisted Pair .23 Mbps Linear Bus or Star

    Token Ring Twisted Pair 4 Mbps - 16

    Mbps Star-Wired Ring

    FDDI Fiber 100 Mbps Dual ring

    ATM Twisted Pair, Fiber 155-2488 Mbps Linear Bus, Star, Tree

    Fiber Distributed Data Interface (FDDI)

    Fiber Distributed Data Interface (FDDI) provides a 100 Mbit/s optical standard for data

    transmission in a local area network that can extend in range up to 200 kilometers

    (120 mi). Although FDDI logical topology is a ring-based token network, it does not use

    the IEEE 802.5 token ring Technology as its basis; instead, its protocol is derived from

    the IEEE 802.4 token bus timed token Technology. In addition to covering large

    geographical areas, FDDI local area networks can support thousands of users. As a

    standard underlying medium it uses optical fiber, although it can use copper cable, in

    which case it may be referred to as CDDI (Copper Distributed Data Interface). FDDI

    offers both a Dual-Attached Station (DAS), counter-rotating token ring topology and a

    Single-Attached Station (SAS), token bus passing ring topology.

    Figure 8.19 http://computer.howstuffworks.com/fddi

  • Management Information Systems Page 120

    Chapter 8 Computer Network

    FDDI was considered an attractive campus backbone technology in the early to mid

    1990s since existing Ethernet networks only offered 10 Mbit/s transfer speeds and Token

    Ring networks only offered 4 Mbit/s or 16 Mbit/s speeds. Thus it was the preferred

    choice of that era for a high-speed backbone, but FDDI has since been effectively

    obsolesced by fast Ethernet which offered the same 100 Mbit/s speeds, but at a much

    lower cost and, since 1998, by Gigabit Ethernet due to its speed, and even lower cost, and

    ubiquity.

    Figure 8.20 http://computer.howstuffworks.com/fddi.htm

    FDDI, as a product of American National Standards Institute X3T9.5 (now X3T12),

    conforms to the Open Systems Interconnection (OSI) model of functional layering of

    LANs using other Technologys. FDDI-II, a version of FDDI, adds the capability to add

    circuit-switched service to the network so that it can also handle voice and video signals.

    Work has started to connect FDDI networks to the developing Synchronous Optical

    Network (SONET).

    Figure 8.21 http://computer.howstuffworks.com/home-network.htm

    A FDDI network contains two rings, one as a secondary backup in case the primary ring

    fails. The primary ring offers up to 100 Mbit/s capacity. When a network has no

    requirement for the secondary ring to do backup, it can also carry data, extending

    capacity to 200 Mbit/s. The single ring can extend the maximum distance; a dual ring can

    extend 100 km (62 mi). FDDI has a larger maximum-frame size (4,352 bytes) than

    standard 100 Mbit/s Ethernet which only supports a maximum-frame size of 1,500 bytes,

    allowing better throughput.

  • Management Information Systems Page 121

    Chapter 8 Computer Network

    Figure 8.22 http://computer.howstuffworks.com/fddi_ring

    Designers normally construct FDDI rings in the form of a "dual ring of trees" (see

    network topology). A small number of devices (typically infrastructure devices such as

    routers and concentrators rather than host computers) connect to both rings - hence the

    term "dual-attached". Host computers then connect as single-attached devices to the

    routers or concentrators. The dual ring in its most degenerate form simply collapses into a

    single device. Typically, a computer-room contains the whole dual ring, although some

    implementations have deployed FDDI as a Metropolitan area network.

    Token Ring

    Token ring local area network (LAN) technology is a Technology which resides at the

    data link layer (DLL) of the OSI model. It uses a special three-byte frame called a token

    that travels around the ring. Token-possession grants the possessor permission to transmit

    on the medium. Token ring frames travel completely around the loop.

    Figure 8.23 http://computer.howstuffworks.com/token_ring.htm

  • Management Information Systems Page 122

    Chapter 8 Computer Network

    8.8 What is Protocols? Write different types of Network Protocols.

    Explain with figure.

    A protocol is a set of rules that governs the communications between computers on a

    network. These rules include guidelines that regulate the following characteristics of a

    network: access method, allowed physical topologies, types of cabling, and speed of data

    transfer.

    Telnet Telephone Network

    WWW

    HTTP Hyper Text Transfer Protocol

    HTTPS Secure Hyper Text Transfer Protocol

    SFTP Secure File Transfer Protocol

    SSL Secure Socket Layer

    TLS Transport Layer Security

    POP post office protocol

    SSH Secure Shell

    FTP File Transfer Protocol

    SMTP Simple Mail Transfer Protocol

    Bluetooth protocols

    Fiber Channel network protocols

    Internet Protocol Suite or TCP/IP model or TCP/IP stack

    OSI protocols family of information exchange standards developed jointly by the

    ISO and the ITU-T

    Routing protocols

    List of IP protocol numbers, protocol numbers used in the Protocol field of the

    IPv4 header and the Next Header field of IPv6 header

    Yahoo! Messenger Protocol, underlying protocol used by the Yahoo messenger

    RTPS protocol, an interoperability protocol

    Telnet

    Telnet is a network protocol used on the Internet or local area networks to provide a

    bidirectional interactive text-oriented communication facility using a virtual terminal

    connection. User data is interspersed in-band with Telnet control information in an 8-bit

    byte oriented data connection over the Transmission Control Protocol (TCP).8

    Telnet was developed in 1969 beginning with RFC 15, extended in RFC 854, and

    standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of

    the first Internet standards.

    Historically, Telnet provided access to a command-line interface (usually, of an operating

    system) on a remote host. Most network equipment and operating systems with a TCP/IP

    stack support a Telnet service for remote configuration (including systems based on

  • Management Information Systems Page 123

    Chapter 8 Computer Network

    Windows NT). Because of security issues with Telnet, its use for this purpose has waned

    in favor of SSH.

    The term telnet may also refer to the software that implements the client part of the

    protocol. Telnet client applications are available for virtually all computer platforms.

    Telnet is also used as a verb. To telnet means to establish a connection with the Telnet

    protocol, either with command line client or with a programmatic interface. For example,

    a common directive might be: "To change your password, telnet to the server, log in and

    run the passed command." Most often, a user will be telnetting to a Unix-like server

    system or a network device (such as a router) and obtain a login prompt to a command

    line text interface or a character-based full-screen manager.

    Hypertext Transfer Protocol

    Hypertext is a multi-linear set of objects, building a network by using logical links (the

    so-called hyperlinks) between the nodes (e.g. text or words). HTTP is the protocol to

    exchange or transfer hypertext.

    The standards development of HTTP was coordinated by the Internet Engineering Task

    Force (IETF) and the World Wide Web Consortium (W3C), culminating in the

    publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June

    1999), which defines HTTP/1.1, the version of HTTP in common use.

    HTTP Secure

    For secure communication over a computer network, with especially wide deployment on

    the Internet. Technically, it is not a protocol in itself; rather, it is the result of simply

    layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus

    adding the security capabilities of SSL/TLS to standard HTTP communications.

    In its popular deployment on the internet. HTTPS provides authentication of the web site

    and associated web server that one is communicating with, which protects against Man-

    in-the-middle attacks. Additionally, it provides bidirectional encryption of

    communications between a client and server, which protects against eavesdropping and

    tampering with and/or forging the contents of the communication.9 In practice, this

    provides a reasonable guarantee that one is communicating with precisely the web site

    that one intended to communicate with (as opposed to an impostor), as well as ensuring

    that the contents of communications between the user and site cannot be read or forged

    by any third party.

    A site must be completely hosted over HTTPS, without having some of its contents

    loaded over HTTP, or the user will be vulnerable to some attacks and surveillance. E.g.

    Having scripts etc. loaded insecurely on a HTTPS page makes the user vulnerable to

    attacks. Also having only a certain page that contains sensitive information (such as a

    log-in page) of a website loaded over HTTPS, while having the rest of the website loaded

    over plain HTTP will expose the user to attacks. E.g. if the user first accesses the front

  • Management Information Systems Page 124

    Chapter 8 Computer Network

    page of the website with HTTP where he only after that clicks an HTTPS link to the log-

    in page, the session has already been compromised. On a site that has sensitive

    information somewhere on it, every time that site is accessed with HTTP instead of

    HTTPS, the user and the session will get exposed. Similarly, cookies on a site served

    through HTTPS have to have the secure attribute enabled.10

    SSH File Transfer Protocol

    In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, Secure

    FTP, or SFTP) is a network protocol that provides file access, file transfer, and file

    management functionalities over any reliable data stream. It was designed by the Internet

    Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH)

    version 2.0 to provide secure file transfer capability, but is also intended to be usable with

    other protocols. The IETF of the Internet Draft states that even though this protocol is

    described in the context of the SSH-2 protocol, it could be used in a number of different

    applications, such as secure file transfer over Transport Layer Security (TLS) and transfer

    of management information in VPN applications.11

    This protocol assumes that it is run over a secure channel, such as SSH, that the server

    has already authenticated the client, and that the identity of the client user is available to

    the protocol.

    Transport Layer Security (TLS)

    Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are

    cryptographic protocols that provide communication security over the Internet.[1] TLS

    and SSL encrypt the segments of network connections at the Application Layer for the

    Transport Layer, using asymmetric cryptography for key exchange, symmetric

    encryption for confidentiality, and message authentication codes for message integrity.

    Several versions of the protocols are in widespread use in applications such as web

    browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP).

    TLS is an IETF standards track protocol, last updated in RFC 5246, and is based on the

    earlier SSL specifications developed by Netscape Communications.12

    File Transfer Protocol (FTP)

    File Transfer Protocol (FTP) is a standard network protocol used to transfer files from

    one host or to another host over a TCP-based network, such as the Internet.

    FTP is built on a client-server architecture and uses separate control and data connections

    between the client and the server.[1] FTP users may authenticate themselves using a

    clear-text sign-in protocol, normally in the form of a username and password, but can

    connect anonymously if the server is configured to allow it. For secure transmission that

    hides (encrypts) the username and password, and encrypts the content, FTP is often

  • Management Information Systems Page 125

    Chapter 8 Computer Network

    secured with SSL/TLS ("FTPS"). SSH File Transfer Protocol ("SFTP") is sometimes also

    used instead.

    Bluetooth protocols

    Wireless data exchange standard Bluetooth uses a variety of protocols. Core protocols are

    defined by the trade organization Bluetooth SIG. Additional protocols have been adopted

    from other standards bodies. This article gives an overview of the core protocols and

    those adopted protocols that are widely used.

    The Bluetooth protocol stack is split in two parts: a "controller stack" containing the

    timing critical radio interface, and a "host stack" dealing with high level data. The

    controller stack is generally implemented in a low cost silicon device containing the

    bluetooth radio and a microprocessor. The host stack is generally implemented as part of

    an operating system, or as an installable package on top of an operating system. For

    integrated devices such as bluetooth headsets, the host stack and controller stack can be

    run on the same microprocessor to reduce mass production costs; this is known as a

    hostless system.

    Internet protocol suite: TCP/IP

    The Internet protocol suite is the set of communications protocols used for the Internet

    and similar networks, and generally the most popular protocol stack for wide area

    networks. It is commonly known as TCP/IP, because of its most important protocols:

    Transmission Control Protocol (TCP) and Internet Protocol (IP), which were the first

    networking protocols defined in this standard. It is occasionally known as the DoD model

    due to the foundational influence of the ARPANET in the 1970s (operated by DARPA,

    an agency of the United States Department of Defense).

    TCP/IP provides end-to-end connectivity specifying how data should be formatted,

    addressed, transmitted, routed and received at the destination. It has four abstraction

    layers, each with its own protocols. From lowest to highest, the layers are:

    1. The link layer (commonly Ethernet) contains communication technologies for a local network.

    2. The internet layer (IP) connects local networks, thus establishing internetworking. 3. The transport layer (TCP) handles host-to-host communication. 4. The application layer (for example HTTP) contains all protocols for specific data

    communications services on a process-to-process level (for example how a web

    browser communicates with a web server).

    The TCP/IP model and related protocols are maintained by the Internet Engineering Task

    Force (IETF).

  • Management Information Systems Page 126

    Chapter 8 Computer Network

    8.8 What is OSI model? Write about OSI protocols

    The Open Systems Interconnection (OSI) protocols are a family of information exchange

    standards developed jointly by the ISO and the ITU-T starting in 1977.

    While the seven-layer OSI model is still often referenced, of the protocols themselves

    only X.400, X.500, and IS-IS have had much lasting impact. The goal of a series of open,

    non-proprietary network protocols is now met by the competing TCP/IP stack.

    OSI protocols stacks are split into seven layers. The layers form a hierarchy of

    functionality starting with the physical hardware components to the user interfaces at the

    software application level. Each layer receives information from the layer above,

    processes it and passes it down to the next layer. Each layer adds its own encapsulation

    information (header) to the incoming information before it is passed to the lower layer.

    Headers generally include address of destination and source, check sums (for error

    control), type of protocol used in the current layer, and other options such as flow control

    options and sequence numbers (used to ensure data is sent in order).

    Layer 1: Physical layer

    This layer deals with the physical plugs and sockets and electrical specification of

    signals. This is the medium over which the digital signals are transmitted. It can be

    twisted pair, coaxial cable, optical fiber, wireless, or other transmission media.

    Layer 2: Data link layer

    The data link layer packages raw bits from the physical layer into frames (logical,

    structured packets for data). It is specified in ITU-T Rec. X.212 [ISO/IEC 8886], ITU-T

    Rec. X.222 and others. This layer is responsible for transferring frames from one host to

    another. It might perform error checking.

    Layer 3: Network layer

    Connectionless Network Service (CLNS) ITU-T Rec. X.213 [ISO/IEC 8348]. SCCP is based on X.213.

    Connectionless Network Protocol (CLNP) ITU-T Rec. X.233 [ISO/IEC 8473-1].

    Connection-Oriented Network Service (CONS) ITU-T Rec. X.213 [ISO/IEC 8348].

    This level is in charge of transferring data between systems in a network, using network-

    layer addresses of machines to keep track of destinations and sources. This layer uses

    routers and switches to manage its traffic (control flow control, error check, routing etc.)

    So here it takes all routing decisions, it deals with end to end data transmission.

    Layer 4: Transport layer

    The connection-mode and connectionless-mode transport services are specified by ITU-T

    Rec. X.214 [ISO/IEC 8072]; the protocol that provides the connection-mode service is

  • Management Information Systems Page 127

    Chapter 8 Computer Network

    specified by ITU-T Rec. X.224 [ISO/IEC 8073], and the protocol that provides the

    connectionless-mode service is specified by ITU-T Rec. X.234 [ISO/IEC 8602].

    Transport Protocol Class 0 (TP0)

    Transport Protocol Class 1 (TP1)

    Transport Protocol Class 2 (TP2)

    Transport Protocol Class 3 (TP3)

    Transport Protocol Class 4 (TP4)

    Transport Fast Byte Protocol ISO 14699

    The transport layer transfers data between source and destination processes. Generally,

    two connection modes are recognized, connection-oriented or connectionless.

    Connection-oriented service establishes a dedicated virtual circuit and offers various

    grades of guaranteed delivery, ensuring that data received is identical to data transmitted.

    Connectionless mode provides only best-effort service without the built-in ability to

    correct errors, which includes complete loss of data without notifying the data source of

    the failure. No logical connection, and no persistent state of the transaction exists

    between the endpoints, lending the connectionless mode low overhead and potentially

    better real-time performance for timing-critical applications such as voice and video

    transmissions.

    Layer 5: Session layer

    Session service ITU-T Rec. X.215 [ISO/IEC 8326]

    Connection-oriented Session protocol ITU-T Rec. X.225 [ISO/IEC 8327-1]

    Connectionless Session protocol ITU-T Rec. X.235 [ISO/IEC 9548-1]

    The session layer controls the dialogues (connections) between computers. It establishes,

    manages and terminates the connections between the local and remote application. It

    provides for full-duplex, half-duplex, or simplex operation, and establishes

    checkpointing, adjournment, termination, and restart procedures. The OSI model made

    this layer responsible for graceful close of sessions, which is a property of the

    Transmission Control Protocol, and also for session checkpointing and recovery, which is

    not usually used in the Internet Protocol Suite. The session layer is commonly

    implemented explicitly in application environments that use remote procedure calls.

    Layer 6: Presentation layer

    Prsentation service ITU-T Rec. X.216 [ISO/IEC 8822]

    Connection-oriented Presentation protocol ITU-T Rec. X.226 [ISO/IEC 8823-1]

    Connectionless Presentation protocol ITU-T Rec. X.236 [ISO/IEC 9576-1]

    This layer defines and encrypts/decrypts data types from the application layer. Protocols

    such as MIDI, MPEG, and GIF are presentation layer formats shared by different

    applications.

  • Management Information Systems Page 128

    Chapter 8 Computer Network

    Layer 7: Application layer

    Internet Protocol address (IP address)

    An Internet Protocol address (IP address) is a numerical label assigned to each device

    (e.g., computer, printer) participating in a computer network that uses the Internet

    Protocol for communication. An IP address serves two principal functions: host or

    network interface identification and location addressing. Its role has been characterized as

    follows: "A name indicates what we seek. An address indicates where it is. A route

    indicates how to get there."13

    The designers of the Internet Protocol defined an IP address as a 32-bit number and this

    system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due

    to the enormous growth of the Internet and the predicted depletion of available addresses,

    a new version of IP (IPv6), using 128 bits for the address, was developed in 1995. IPv6

    was standardized as RFC 2460 in 1998, and its deployment has been ongoing since the

    mid-2000s.

    IP addresses are binary numbers, but they are usually stored in text files and displayed in

    human-readable notations, such as 172.16.254.1 (for IPv4), and

    2001:db8:0:1234:0:567:8:1 (for IPv6).

    The Internet Assigned Numbers Authority (IANA) manages the IP address space

    allocations globally and delegates five regional Internet registries (RIRs) to allocate IP

    address blocks to local Internet registries (Internet service providers) and other entities.

    8.9 What is IP Addresses? Write different classes of IP-Address.

    IP addresses 32 bit addresses (divided into 4 octets) used by the Internet Protocol (OSI

    Layer 3) for delivering packet to a device located in same or remote network. MAC

    address (Hardware address) is a globally unique address which represents the network

    card and cannot be changed. IP address refers to a logical address, which is a

    configurable address used to identify which network this host belongs to and also a

    network specific host number. In other words, an IP V4 address consists of two parts, a

    network part and a host part.

    This can be compared to your home address. A letter addressed to your home address will

    be delivered to your house because of this logical address. If you move to another house,

    your address will change, and letters addressed to you will be sent to your new address.

    But the person who the letter is being delivered to, that is you, is still the same.

    IP addresses are stored internally as binary numbers but they are represented in decimal

    numbers because of simplicity.

    An example of IP address is 192.168.10.100, which is actually

    11000000.10101000.00001010.01100100.

  • Management Information Systems Page 129

    Chapter 8 Computer Network

    For Each network, one address is used to represent the network and one address is used

    for broadcast. Network address is an IP address with all host bits are "0". Broadcast

    address is an IP address with all host bits are "1".

    That means, for a network, the first IP address is the network address and the last IP

    address is the broadcast address.You cannot configure these addresses for your devices.

    All the usable IP addresses in any IP network are between network address and broadcast

    address.

    We can use the following equation for find the number of usable IP addresses in a

    network (We have to use two IP addresses in each network to represent the network id

    and the broadcat id.)

    Number of usable IP addresses = (2n)-2. Where "n" is the number of bits in host part.

    Many IP addresses are reserved and we cannot use those IP address. There are five IP

    address Classes and certain special addresses.

    Default Network

    The IP address of 0.0.0.0 is used for the default network. When a program sends a packet

    to an address that is not added in the on the computer's routing table, the packet is

    forwarded to the gateway for 0.0.0.0, which may able to route it to the correct address.

    Class A -IP addresses

    "Class A" IP addresses are for very large networks. The left most bit of the left most octet

    of a "Class A" network is reserved as "0". The first octet of a "Class A" IP address is used

    to identify the Network and the three remaining octets are used to identify the host in that

    particular network (Network.Host.Host.Host).

    The 32 bits of a "Class A" IP address can be represented as

    0xxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx.

    The minimum possible value for the leftmost octet in binaries is 00000000 (decimal

    equivalent is 0) and the maximum possible value for the leftmost octet is 01111111

    (decimal equivalent is 127). Therefore for a "Class A" IP address, leftmost octet must

    have a value between 0-127 (0.X.X.X to 127.X.X.X).

    The network 127.0.0.0 is known as loopback network. The IP address 127.0.0.1 is used

    by the host computer to send a message back to itself. It is commonly used for

    troubleshooting and network testing.

    Computers not connected directly to the Internet need not have globally-unique IP

    addresses. They need an IP addresses unique to that network only. 10.0.0.0 network

    belongs to "Class A" is reserved for private use and can be used inside any organization.

  • Management Information Systems Page 130

    Chapter 8 Computer Network

    Class B- IP addresses

    "Class B" IP addresses are used for medium-sized networks. Two left most bits of the left

    most octet of a "Class B" network is reserved as "10". The first two octets of a "Class B"

    IP address is used to identify the Network and the remaining two octets are used to

    identify the host in that particular network (Network.Network.Host.Host).

    The 32 bits of a "Class B" IP address can be represented as

    10xxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx.

    The minimum possible value for the leftmost octet in binaries is 10000000 (decimal

    equivalent is 128) and the maximum possible value for the leftmost octet is 10111111

    (decimal equivalent is 191). Therefore for a "Class B" IP address, leftmost octet must

    have a value between 128-191 (128.X.X.X to 191.X.X.X).

    Network 169.254.0.0 is known as APIPA (Automatic Private IP Addresses). APIPA

    range of IP addresses are used when a client is configured to automatically obtain an IP

    address from the DHCP server was unable to contact the DHCP server for dynamic IP

    address.

    Networks starting from 172.16.0.0 to 172.31.0.0 are reserved for private use.

    Class C- IP addresses

    "Class C" IP addresses are commonly used for small to mid-size businesses. Three left

    most bits of the left most octet of a "Class C" network is reserved as "110". The first three

    octets of a "Class C" IP address is used to identify the Network and the remaining one

    octet is used to identify the host in that particular network

    (Network.Network.Networkt.Host).

    The 32 bits of a "Class C" IP address can be represented as

    110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx.

    The minimum possible value for the leftmost octet in binaries is 11000000 (decimal

    equivalent is 192) and the maximum possible value for the leftmost octet is 11011111

    (decimal equivalent is 223). Therefore for a "Class C" IP address, leftmost octet must

    have a value between 192-223 (192.X.X.X to 223.X.X.X).

    Networks starting from 192.168.0.0 to 192.168.255.0 are reserved for private use.

    Class D- IP addresses

    Class D IP addresses are known as multicast IP addresses. Multicasting is a technique

    developed to send packets from one device to many other devices, without any

    unnecessary packet duplication. In multicasting, one packet is sent from a source and is

  • Management Information Systems Page 131

    Chapter 8 Computer Network

    replicated as needed in the network to reach as many end-users as necessary. You cannot

    assign these IP addresses to your devices.

    Four left most bits of the left most octet of a "Class D" network is reserved as "1110".

    The other 28 bits are used to identify the group of computers the multicast message is

    intended for.

    Class E IP addresses

    Class E is used for experimental purposes only and you cannot assign these IP addresses

    to your devices.

    Four left most bits of the left most octet of a "Class E" network is reserved as "1111".

    The minimum possible value for the left most octet in binaries is 11110000 (decimal

    equivalent is 240) and the maximum possible value for the leftmost octet is 11111111

    (decimal equivalent is 255). Therefore for a "Class E" IP address, leftmost octet must

    have a value between 240-255 (240.X.X.X to 255.X.X.X).

    Limited Broadcast

    255.255.255.255 is used to send messages to all devices in the LAN and this IP addrress

    is known as limited broadcast IP address.

    You have learned IP addresses, different classes of IP addresses, Class A IP address,

    Class B IP address, Class C IP address, Class D IP address, Class E IP Address, public IP

    address, private IP address, multicast IP address, Limited broadcast IP address and

    Automatic Private IP Addresses (APIPA).

    IP address classes

    Class

    1st Octet

    Decimal

    Range

    1st Octet

    High

    Order

    Bits

    Network/Host ID

    (N=Network,

    H=Host)

    Default

    Subnet Mask

    Number of

    Networks

    Hosts per

    Network

    (Usable

    Addresses)

    A 1 126* 0 N.H.H.H 255.0.0.0 126 (27 2) 16,777,214 (2

    24

    2)

    B 128 191 10 N.N.H.H 255.255.0.0 16,382 (2

    14

    2) 65,534 (2

    16 2)

    C 192 223 110 N.N.N.H 255.255.255.0 2,097,150

    (221

    2) 254 (2

    8 2)

    D 224 239 1110 Reserved for Multicasting

    E 240 254 1111 Experimental; used for research

  • Management Information Systems Page 132

    Chapter 8 Computer Network

    Note: Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is reserved for

    loopback and diagnostic functions.

    Private IP Addresses

    Class Private Networks Subnet Mask Address Range

    A 10.0.0.0 255.0.0.0 10.0.0.0 - 10.255.255.255

    B 172.16.0.0 - 172.31.0.0 255.240.0.0 172.16.0.0 - 172.31.255.255

    C 192.168.0.0 255.255.0.0 192.168.0.0 - 192.168.255.25

  • Management Information Systems Page 133

    Chapter 8 Computer Network

    Reference 1 Source http://simple.wikipedia.org/wiki/Computer_network

    2 Source : http://simple.wikipedia.org/wiki/Internet 3 Source: http://en.wikipedia.org/wiki/Computer_network 4 http://en.wikipedia.org/wiki/Network_topology#cite_note-atis-2 5 http://en.wikipedia.org/wiki/Twisted_pair_Ethernet 6 http://en.wikipedia.org/wiki/Media_Access_Unit 7 http://computer.howstuffworks.com/home-network.htm 8 http://en.wikipedia.org/wiki/Internet 9 http://en.wikipedia.org/wiki/HTTPS#cite_note-httpse-1 10 http://en.wikipedia.org/wiki/HTTPS#cite_note-deployhttpscorrectly-3 11 http://en.wikipedia.org/wiki/Secure_channel 12 http://en.wikipedia.org/wiki/Secure_Sockets_Layer#cite_note-2 13 http://en.wikipedia.org/wiki/IP_address#cite_note-rfc791-2