You are on page 1of 16

What is a Network:-

The term Computer Network is used to mean an interconnected collection of autonomous computers. Two computers are said to be interconnected, if they are able to exchange information. The connection can be wired or wireless. A large computer with remote printers and terminals is not a network. Nor a system with one control and many slaves is a network. With a network the user must explicitly log into a machine, explicitly submit jobs remotely, explicitly move files around and generally handle all network management personally. Distribution or exchange of information is very important for any group activity to work or function efficiently and effectively. This is best achieved by networking. Computer network have become an important tool of communication, with an added advantage of being able to store large amount of data and also being able to deliver it as and when demanded. A computer network finds application in almost every field of life. A computer network can do many things, which are listed below, that a stand-alone machine cannot do: 1. Share a single copy of a file among all the users, even simultaneously. 2. Transfer files from computer to computer or from one computer to the central hard disk on the server. 3. Share applications over the entire network, thus reducing the cost of purchasing the multiple copies. A multi-user license costs much less than buying a stand alone license. 4. Share resources like printers, hard disks, CD-ROM drives, modems, fax machines etc. 5. Use e-mail for internal communications, inert office notes etc., creating an almost paper less office. Components of a computer network A network is a combination of different components. The most essential components of a simple network are listed below: Servers: Servers are faster computers that run various softwares, store and process information and also provide a human interface for the users to be able to use the networked computers. Nodes: Nodes are the computers on the network, which are provided to the users to carry out their tasks using the network. Workstation: A node, which is more powerful, and can handle local information processing or graphics processing is called a workstation. The workstation works only for the person sitting in front of it, where as a server serves all the people on the network to share its resources. A workstation usually has an inexpensive, small hard disk to carry out local tasks. Some

workstations, called diskless workstations, have no disk drive of their own. Such workstations also called dumb terminals and they rely completely on the LAN for their access. The network operating system lets the nodes work as if all the resources at the server belong to the node itself. Network Operating System (NOS): The network requires some software to control all the information transfer activity on the network, like the traffic police to control the traffic. The software called NOS handles these tasks. Networks, which are more complex, require network devices like hubs, switches & routers to carry out different network functions. LAN Software: On the network, each computer is called a node or a workstation unless there are certain computers designed as servers. LAN cables connect all the nodes and servers together to form the network. In addition to its local disk operating system, each node requires networking software that enable the nodes to communicate with the servers. In return, the file servers run network software that communicates with the nodes. LAN Cable: This is the medium or channel over which the information travels from computer to computer. The information travels from one computer onto the medium and then from the medium to another computer in the form that it can be read. Network Interface Card: Each computer contains a network interface card. This card is used to connect the cables to the computers. These cards help the computer to transfer the data at a faster rate and in the form of packets. These cards are plugged into the computer motherboard. These cards are generally called as Ethernet cards.

Describe the OSI reference model and compare it with TCP / IP model. Ans:There are two important network architectures. They are ISO-OSI reference model and TCP/IP reference model. In 1977, the International Organization for Standardization (ISO) began to develop its OSI networking suite. OSI has two major components: an abstract model of networking (the Basic Reference Model, or seven-layer model), and a set of concrete protocols. The standard documents that describe OSI are for sale and not currently available online. Parts of OSI have influenced Internet protocol development, but none more than the abstract model itself, documented in ISO 7498 and its various addenda. In this model, a networking system is

divided into layers. Within each layer, one or more entities implement its functionality. Each entity interacts directly only with the layer immediately beneath it, and provides facilities for use by the layer above it. In particular, Internet protocols are deliberately not as rigorously architected as the OSI model, but a common version of the TCP/IP model splits it into four layers. The Internet Application Layer includes the OSI Application Layer, Presentation Layer, and most of the Session Layer. Its End-toEnd Layer includes the graceful close function of the OSI Session Layer as well as the Transport Layer. Its Internet work Layer is equivalent to the OSI Network Layer, while its Interface layer includes the OSI Data Link and Physical Layers. These comparisons are based on the original seven-layer protocol model as defined in ISO 7498, rather than refinements in such things as the Internal Organization of the Network Layer document. Protocols enable an entity in one host to interact with a corresponding entity at the same layer in a remote host. Service definitions abstractly describe the functionality provided to a (N)-layer by an (N-1) layer, where N is one of the seven layers inside the local host

The OSI Reference Model This reference model is proposed by International standard organization (ISO) as a a first step towards standardization of the protocols used in various layers in 1983 by Day and Zimmermann. This model is called Open system Interconnection (OSI) reference model. It is referred OSI as it deals with connection open systems. That is the systems are open for communication with other systems. It consists of seven layers. Layers of OSI Model The principles that were applied to arrive at 7 layers: 1. A layer should be created where a different level of abstraction is needed. 2. Each layer should perform a well defined task. 3. The function of each layer should define internationally standardized protocols 4. Layer boundaries should be chosen to minimize the information flow across the interface. 5. The number of layers should not be high or too small.

Figure 2.5: ISO OSI Reference Model The ISO-OSI reference model is as shown in figure 2.5. As such this model is not a network architecture as it does not specify exact services and protocols. It just tells what each layer should do and where it lies. The bottom most layer is referred as physical layer. ISO has produced standards for each layers and are published separately.

A Comparison of OSI and TCP/IP Reference Models Concepts central to the OSI model are: Services: It tells what the layer does. Interfaces: It tells the processes above it how to access it. It specifies what parameters are and what result to expect. Protocols: It provides the offered service. It is used in a layer and are layers own business. The TCP/IP did not originally distinguish between the service, interface & protocols. The only real services offered by the internet layer are SEND IP packets and RECEIVE IP packets. The OSI model was devised before the protocols were invented. Data link layer originally dealt only with point-to-point networks. When broadcast networks came around, a new sub-layer had to be hacked into the model. With TCP/IP the reverse was true, the protocols came first and the model was really just a description of the existing protocols. This TCP/IP model did fit any other protocol stack. Then OSI model has seven layers and TCP/IP has four layers as shown in figure 2.11

Figure 2.11: Comparisons of the two reference models Another difference is in the area of connectionless and connection oriented services. The OSI model supports both these services in the network layer but supports only connection oriented communication in the transport layer. Where as the TCP/IP has supports only connection less communication in the network layer, and supports both these services in the transport layer. A Critique of the OSI Model and Protocols Why OSI did not take over the world Bad timing Bad technology Bad implementations Bad politics

Que.3. Explain Circuit, switching techniques. Ans:- Switching

Message

and

Packet

For transmission of data beyond local area, communication is typically achieved by transmitting data from source to destination through a network of intermediate switching nodes. The switching nodes are not concerned with the content of data. Rather their purpose is to provide a switching facility that will move the data from node to node until it reaches the destination. Circuit switching

and packet switching techniques are more commonly used and are as shown in Figure 4.5 (a) and (b) respectively. Circuit switching A circuit switching network is one that establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate. Each circuit that is dedicated cannot be used by other callers until the circuit is released and a new connection is set up. Even if no actual communication is taking place in a dedicated circuit then, that channel still remains unavailable to other users. Channels that are available for new calls to be set up are said to be idle. Circuit switching is used for ordinary telephone calls. It allows communications equipment and circuits, to be shared among users. Each user has sole access to a circuit (functionally equivalent to a pair of copper wires) during network use.

Figure 4.5: (a) circuit switching (b) packet switching For call setup and control (and other administrative purposes), it is possible to use a separate dedicated signalling channel from the end node to the network. ISDN is one such service that uses a separate signalling channel. The method of establishing the connection and monitoring its progress and termination through the network may also utilize a separate control channel. Circuit switching can be relatively inefficient because capacity is wasted on connections which are set up but are not in continuous use (however momentarily). On the other hand, the connection is immediately available and capacity is guaranteed until the call is disconnected Communication using circuit switching involves three phases discussed below: 1. Connection establishment: Before any signal can be transmitted, an end to end circuit must be established. 2. Data transfer: Information can now be transmitted from source through the network to the destination using the dedicated path established. 3. Termination: After some period of data transfer, the connection is terminated

Consider communication between two points A and D in a network as shown in fig. 4.6. The connection between A and D is provided using (shared) links between two other pieces of equipment, B and C.

Figure: A four node and 3 link network Network use is initiated by a connection phase, during which a circuit is set up between source and destination, and terminated by a disconnect phase as listed above. These phases, with associated timings, are illustrated in the figure 4.7.

Figure: A circuit switched connection between A and D (Information flows in two directions. Information sent from the calling end is shown in grey and information returned from the remote end is shown in black) After a user requests a circuit, the desired destination address must be communicated to the local switching node (B). In a telephony network, this is achieved by dialing the number. Node B receives the connection request and identifies a path to the destination (D) via an intermediate node (C). This is followed by a circuit connection phase handled by the switching nodes and initiated by allocating a free circuit to C (link BC), followed by transmission of a call request signal from node B to node C. In turn, node C allocates a link (CD) and the request is then passed to node D after a similar delay. The circuit is then established and may be used. While it is available for use, resources (i.e. in the intermediate equipment at B and C) and capacity on the links between the equipment are dedicated to the use of the circuit. After completion of the connection, a signal confirming circuit establishment (a connect signal in the diagram) is returned; this flows directly back to node A with no search delays since the circuit has been established. Transfer of the data in the message then begins. After data transfer, the circuit is disconnected; a simple disconnect phase is included after the end of the data transmission.

Delays for setting up a circuit connection can be high, especially if ordinary telephone equipment is used. Call setup time with conventional equipment is typically on the order of 5 to 25 seconds after completion of dialing. New fast circuit switching techniques can reduce delays. Trade-offs between circuit switching and other types of switching depend strongly on switching times. Message switching Message switching was the precursor of packet switching, where messages were routed in their entirety and one hop at a time. It was first introduced by Leonard Kleinrock in 1961. Message switching systems are nowadays mostly implemented over packet-switched or circuit-switched data networks Hop-by-hop Telex forwarding are examples of message switching systems. E-mail is another example of a message switching system. When this form of switching is used, no physical path is established in advance in between sender and receiver. Instead, when the sender has a block of data to be sent, it is stored in the first switching office (i.e. router) then forwarded later at one hop at a time. Each block is received in its entity form, inspected for errors and then forwarded or re-transmitted. It is a form of store-and-forward network. Data is transmitted into the network and stored in a switch. The network transfers the data from switch to switch when it is convenient to do so, as such the data is not transferred in real-time. Blocking can not occur, however, long delays can happen. The source and destination terminal need not be compatible, since conversions are done by the message switching networks. Again consider a connection of a network shown in figure 4.6. For instance, when a telex (or email) message is sent from A to D, it first passes over a local connection (AB). It is then passed at some later time to C (via link BC), and from there to the destination (via link CD). At each message switch, the received message is stored, and a connection is subsequently made to deliver the message to the neighboring message switch. Message switching is also known as store-andforward switching since the messages are stored at intermediate nodes en route to their destinations.

Figure: Message switching to communicate between A and D

The figure 4.8 illustrates message switching; transmission of only one message is illustrated for simplicity. As the figure indicates, a complete message is sent from node A to node B when the link interconnecting them becomes available. Since the message may be competing with other messages for access to facilities, a queuing delay may be incurred while waiting for the link to become available. The message is stored at B until the next link becomes available, with another queuing delay before it can be forwarded. It repeats this process until it reaches its destination. Circuit setup delays are replaced by queuing delays. Considerable extra delay may result from storage at individual nodes. A delay for putting the message on the communications link (message length in bits divided by link speed in bps) is also incurred at each node enroute. Message lengths are slightly longer than they are in circuit switching, after establishment of the circuit, since header information must be included with each message; the header includes information identifying the destination as well as other types of information. Most message switched networks do not use dedicated point-to-point links. Packet switching Packet switching splits traffic data (for instance, digital representation of sound, or computer data) into chunks, called packets. Packet switching is similar to message switching. Any message exceeding a network-defined maximum length is broken up into shorter units, known as packets, for transmission. The packets, each with an associated header, are then transmitted individually through the network. These packets are routed over a shared network. Packet switching networks do not require a circuit to be established and allow many pairs of nodes to communicate almost simultaneously over the same channel. Each packet is individually addressed precluding the need for a dedicated path to help the packet find its way to its destination. Packet switching is used to optimize the use of the channel capacity available in a network, to minimize the transmission latency (i.e. the time it takes for data to pass across the network), and to increase robustness of communication. Again consider the same network as shown in figure 4.6. Now the message of figure 4.8 is broken into three small units called packets and labeled 1-3 as illustrated in figure 4.9.

Figure :Packet-switched communication between A and D The most well-known use of packet switching is the Internet. The Internet uses the Internet protocol suite over a variety of data link layer protocols. For example, Ethernet and Frame relay are very common. Newer mobile phone technologies (e.g., GPRS, I-mode) also use packet switching. Packet switching is also called connectionless networking because no connections are established There are two important benefits from packet switching. 1. The first and most important benefit is that since packets are short, the communication links between the nodes are only allocated to transferring a single message for a short period of time while transmitting each packet. Longer messages require a series of packets to be sent, but do not require the link to be dedicated between the transmission of each packet. The implication is that packets belonging to other messages may be sent between the packets of the message being sent from A to D. This provides a much fairer sharing of the resources of each of the links. 2. Another benefit of packet switching is known as "pipelining". Pipelining is visible in the figure above. At the time packet 1 is sent from B to C, packet 2 is sent from A to B; packet 1 is sent from C to D while packet 2 is sent from B to C, and packet 3 is sent from A to B, and so forth. This simultaneous use of communications links represents a gain in efficiency; the total delay for transmission across a packet network may be considerably less than for message switching, despite the inclusion of a header in each packet rather than in each message. The long-haul circuit-switching telecommunications network was originally designed to handle voice traffic, and the majority of traffic on these networks continues to be voice. A key characteristic of circuit-switching networks is that resources within the network are dedicated to a particular call. For voice connections, the resulting circuit will enjoy a high percentage of utilization because; most of the time, one party or the other is talking. However, as the circuit-switching network began to be used increasingly for data connections, two shortcomings became apparent: In a typical user/host data connection (e.g., personal computer user logged on to a database server), much of the time the line is idle. Thus, with data connections, a circuit-switching approach is inefficient. In a circuit-switching network, the connection provides for transmission at a constant data rate. Thus, each of the two devices that are connected must transmit and receive at the same data rate as the other. This limits the utility of the network in interconnecting a variety of host computers and workstations. To understand how packet switching addresses these problems, let us briefly summarize packetswitching operation. Data are transmitted in short packets. A typical upper bound on packet length is 1000 octets (bytes).If a source has a longer message to send, the message is broken up into a series of packets. Each packet contains a portion (or all for a short message) of the users data plus

some control information. The control information at a minimum includes the information that the network requires to be able to route the packet through the net- work and deliver it to the intended destination. At each node en route, the packet is received stored briefly, and passed on to the next node. Now, lets consider figure 4.10, assuming that it depicts a simple packet switching network. Consider a packet to be sent from station A to station E. The packet includes control information that indicates that the intended destination is E. The packet is sent from A to node 4. Node 4 stores the packet, determines the next leg of the route (say 5), and queues the packet to go out on that link (the 4-5 link). When the link is available, the packet is transmitted to node 5, which forwards the packet to node 6, and finally to E. This approach has a number of advantages over circuit switching:

Figure :The Use of Packets Line efficiency is greater, as a single node-to-node link can be dynamically shared by many packets over time. The packets are queued up and transmitted as rapidly as possible over the link. By contrast, with circuit switching, time on a node-to-node link is pre-allocated using synchronous time division multiplexing. Much of the time, such a link may be idle because a portion of its time is dedicated to a connection that is idle. A packet-switching network can perform data-rate conversion. Two stations of different data rates can exchange packets because each connects to its node at its proper data rate. When traffic becomes heavy on a circuit-switching network, some calls are blocked; that is, the network refuses to accept additional connection requests until the load on the network decreases. On a packet-switching network, packets are still accepted, but delivery delay increases. Priorities can be used. Thus, if a node has a number of packets queued for transmission, it can transmit the higher-priority packets first. These rackets will therefore experience less delay than lower-priority packets.

Que5. Explain the following different classes of IP addresses:

A) Primary classful addresses B) Class A C) Class B D) Class C

Ans :- Primary addresses :Out of five the three classes are called Class A, Class B, and Class C. These three classes together are often referred to as "classful" addressing or primary address class.

Fig. 2.1(a): Principle Classful IP Address Formats Each class fixes the boundary between the network-prefix and the host-number at a different point within the 32-bit address. The formats of the fundamental address classes are illustrated in Figure 2.1(a). One of the fundamental features of classful IP addressing is that each address contains a self-encoding key that identifies the dividing point between the network-prefix and the host-number. 2.4.2 Class A Networks (/8 Prefixes) Each Class A network address has an 8-bit network-prefix with the highest order bit set to 0 and a seven-bit network number, followed by a 24-bit host-number. Today, it is no longer considered modern to refer to a Class A network. Class A networks are now referred to as "/8s" (pronounced "slash eight" or just "eights") since they have an 8-bit network-prefix. A maximum of 126 (2 7 -2) /8 networks can be defined as shown in figure 2.1(b). The calculation requires that the 2 is subtracted because the /8 network 0.0.0.0 is reserved for use as the default route and the /8 network 127.0.0.0 (also written 127/8 or 127.0.0.0/8) has been reserved for the "loop back" function. Each /8 supports a maximum of 16,777,214 (2 24 -2) hosts per network. The host calculation requires that 2 is subtracted because the all-0s ("this network") and all-1s ("broadcast") host-numbers may not be assigned to individual hosts. Since the/8 address block contains 231 (2,147,483,648) individual addresses and the IPv4 address space contains a maximum of 2 32 (4,294,967,296) addresses, the /8 address space is 50% of the total IPv4 unicast address space. 2.4.3 Class B Networks (/16 Prefixes) Each Class B network address has a 16-bit network-prefix with the two highest order bits set to 1-0 and a 14-bit network number, followed by a 16-bit host-number as illustrated in figure 2.1(b). Class B networks are now referred to as"/16s" since they have a 16-bit network-prefix.

A maximum of 16,384 (2 14) /16 networks can be defined with up to 65,534 (2 16 -2) hosts per network. Since the entire /16 address block contains 2 30 (1,073,741,824) addresses, it represents 25% of the total IPv4 unicast address space. 2.4.4 Class C Networks (/24 Prefixes) Each Class C network address has a 24-bit network-prefix with the three highest order bits set to 11-0 and a 21-bit network number, followed by an 8-bit host-number as shown in figure 2.1(b). Class C networks are now referred to as "/24s" since they have a 24-bit network-prefix. A maximum of 2,097,152 (2 21) /24 networks can be defined with up to 254 (2 8 -2) hosts per network. Since the entire /24 address block contains 2 29 (536,870,912) addresses, it represents 12.5% (or 1/8th) of the total IPv4 unicast address space.

4. Discuss the following with respect to Internet Control Message Protocols: a. Congested and Datagram Flow control b. Route change requests from routers c. Detecting circular or long routes Ans: a. Congested and Datagram Flow control

As IP is a connectionless, a router cannot reserve communication resources or memory in advance of receiving datagram. Hence routers can be overrun with traffic. This situation is called network congestion or simply congestion. Congestion arises because of two reasons: 1. A high speed computer generating traffic faster than a network can transfer 2. The datagram may need to cross a slower speed WAN . When datagram arrive at host or router to process at faster rate, it enqueues them in memory temporarily. So for small bursts temporary memory solves the problem. But if the traffic continues the memory will be exhausted and results in discarding the datagram. A machine uses ICMP source quench messages to report to the original source. It is request for the source to reduce its current rate of the datagram transmission. In general a router sends one source quench message for every datagram that they discard. There is no ICMP message to reverse the effect of a source quench. As soon as any host gets this source quench message, it lowers the rate at which the datagram it sends to that destination until it stops

getting source quench messages. It then gradually increases the rate as long as further source quench messages are not received. Source quench format

Figure 5.5 source quench message format The format of source quench message is as shown in figure 5.5. It contains the TYPE field equal to 4 and CODE filed equal to 0. it contains a datagram prefix. As most ICMP messages report an error, the datagram prefix field contains a prefix of the datagram that triggered the source quench request. A congested router discards the datagram, sends one source quench request and the datagram prefix in source quench message identifies the datagram that was dropped. b. Route change requests from routers Routers are assumed to know the correct routes. Host begins with minimal routing information and learns new routes from routers. Hosts initialize the Internet routing tables from a configuration file at system startup, system administrators make routing changes during normal operations. Whenever the network topology changes, routing tables in routers or host may become incorrect. Routers exchange routing information periodically to accommodate network changes and keep their routes up-to-date. When a router detects a host using non optimal route, it sends the host an ICMP message called redirect, requesting that the host must change its route to that specific destination. The router also forwards the original datagram. Redirect message format The Format for RE-DIRECT message as shown in figure 5.6. it contains the TYPE field with

value equal to 5. It contains a 32-bit ROUTER INTERNET ADDRESS field. It specifies address of the router that the host is to use to reach the destination mentioned in the datagram. INTERNET HEADER which is also a 32-bit contains an IP header plus 64 bits of the datagram that invokes the message. A host that receives ICMP redirect message examines the datagram prefix to determine the datagrams destination address.

Figure 5.6 Redirect message format The CODE field is 8-bit long specifies how to interpret the destination address based on the values which is illustrated in table 5.2. Table 5.2: Code value of redirect message CODE Value Meaning 0 Redirect datagram for the Net 1 Redirect datagram for the host 2 Redirect datagram for the type of service and Net 3 Redirect datagram for the type of service and Host ICMP redirect message is sent to hosts only and not to routers. c. Detecting circular or long routes Internet routers use routing tables and error in routing table can produce routing cycle. A routing cycle can consists of two or more routers in which the datagram is circulated among themselves only. Once a datagram enters a routing cycle it will pass around the cycle endlessly. To prevent this each datagram consists of time to live field in IP header sometimes it is also referred to as

hop count. A router decrements this time to live counter when ever it processes a datagram and discards the datagram when this counter hits zero. Whenever a datagram is discarded by a router because of counter time out it sends an ICMP time exceeded message back to the source of the discarded datagram. Time exceeded message format Figure

Figure 5.7 Time exceeded message format The format for Time exceeded message is as shown in figure 5.7. A router sends this message whenever a datagram is discarded because 1. Time to live field of IP datagram header has reached zero. 2. re-assembling timer expires while waiting for more fragments of that datagram It uses TYPE field value equal to 11. It supports two values for CODE filed 0 and 1 to specify the nature of time out being reported according to the list shown in table 5.3. Table 5.3 Code value of Time exceeded message CODE Value Meaning 0 Time to live count of IP datagram exceeded 1 Fragment re-assembling timer exceeded

You might also like