Chapter 2 Network Admin
Chapter 2 Network Admin
3/5/2024 2
Protocols and protocol layering (TCP/ IP)
❑ Network Protocols:
▪ A protocol is a set of rules that governs data communications.
▪ A protocol defines what is communicated, how it is communicated, and when it is
communicated.
▪ To request any service or exchange any information between 2 devices there must be an
agreed set of commands and data formats.
▪ For instance, for one computer to send a message to another computer, the first computer
must perform the following general steps:
✓ Break the data into small sections called packets.
✓ Add addressing information to the packets identifying the source and destination
computers.
✓ Deliver the data to the network interface card for transmission over the network.
3/5/2024 3
Cont ….
▪ The receiving computer must perform the same steps, but in reverse order.
✓ Timing: refers to when data should be sent and how fast they can be sent
3/5/2024 4
Protocol layering
▪ Protocol layering is a common technique to simplify networking designs by dividing them
into functional layers, and assigning protocols to perform each layer's task.
▪ For example, it is common to separate the functions of data delivery and connection
▪ Thus, one protocol is designed to perform data delivery, and another protocol layered
▪ The data delivery protocol is fairly simple and knows nothing of connection management.
▪ The connection management protocol is also fairly simple, since it doesn't need to
concern itself with data delivery.
3/5/2024 5
Cont …
▪ The most important layered protocol designs are:
3/5/2024 6
OSI and TCP/IP Layers Correspondence
3/5/2024 7
Cont …
5 Session 5 Session
4 Transport 4 Transport
3 Network 3 Network
2 Data Link 2 Data Link
1 Physical 1 Physical
3/5/2024 8
OSI Model Analogy Application Layer - Source Host
After riding your new bicycle a few times in New York, you decide that you
want to give it to a friend who lives in Addis Ababa, Ethiopia.
3/5/2024 9
Presentation Layer - Source Host
3/5/2024 10
Session Layer - Source Host
Call your friend and make sure you have his correct address.
3/5/2024 11
Transport Layer - Source Host
3/5/2024 12
Network Layer - Source Host
❑ Put your friend's complete mailing address (and yours) on each box.
❑ Since the packages are too big for your you determine that you need to
go to the post office.
13
3/5/2024
Data Link Layer – Source Host
3/5/2024 14
Physical Layer - Media
3/5/2024 15
Data Link Layer - Destination
Ethiopia
3/5/2024 16
Network Layer - Destination
Upon examining the destination address, Adis Ababa post office determines
that your boxes should be delivered to your written home address.
3/5/2024 17
Transport Layer - Destination
Your friend calls you and tells you he got all 3 boxes and he is
having another friend named BOB reassemble the bicycle.
3/5/2024 18
Session Layer - Destination
3/5/2024 19
Presentation Layer - Destination
3/5/2024 20
Application Layer - Destination
3/5/2024 21
Layer 7: The Application Layer
▪ The application layer running on the sending system (COMPUTER) is responsible
3/5/2024 22
Cont …
Layer 6: The Presentation Layer
Performs three major functionalities:-
✓ Translation
✓ Data compression
✓ Encryption
Layer 5: session layer
So it performs:
✓ Session management
✓ Authentication and
✓ Authorization
On layers 5-7 the data package is in the form of data stream.
3/5/2024 23
Cont …
Layer 4: The Transport Layer
▪ The transport layer is responsible for
✓ Segmentation
✓ Flow control
✓ Error correction
▪ Protocols:
✓ Transmission Control Protocol (TCP) – Connection Oriented
✓ User Datagram Protocol (UDP) – Connectionless.
Layer 3: The Network Layer
▪ The network layer is responsible for working with
✓ Logical addressing
✓ Path determination
✓ Routing 24
3/5/2024
Cont …
Layer 2: The Data Link Layer
▪ The data link layer is responsible for physical addressing.
▪ MAC addressing of the sender and receiver for each packet to form a frame.
▪ Data unit used at data link layer is called a frame.
Layer 1: The Physical Layer
▪ The bottom layer of the OSI hierarchy is concerned only with moving bits of data on
the network medium.
▪ Responsible for converting the data frame to a pattern of signals (on and off) that will
be used to send the data across the communication medium.
▪ On the receiving system, the signals will be converted to frame by the data link layer
and then passed up to the network layer for further processing.
▪ Cable, connectors, repeaters, transmitters, receivers, are associated with physical layer.
3/5/2024 25
Cont …
Application Allows access to network resources.
SMTP SNMP
Transport
TCP UDP
Network
ICMP IP IGMP
Link
hardware
ARP RARP
interface
Media
3/5/2024 27
Cont …
Application
Message
Presentation Applications
Session
Segment
Transport TCP UDP
Network Datagram
IP
Frame
Data Link Protocols defined by
the underlying networks Bits
Physical
3/5/2024 28
TCP/IP and Addressing
Application Processes
layer
Transport
Port
TCP UDP
layer address
IP and other IP
Network
protocols
layer address
Data link
Underlying
layer Physical
physical
networks (MAC)
Physical address
3/5/2024 layer 29
Networking and Internetworking Devices
▪ Network devices are components used to connect computers or other electronic
devices together so that they can share files or resources like printers or fax
machines.
▪ Devices used to setup a Local AreaNetwork (LAN) are the most common types of
network devices used by the public.
▪ An internetwork is a collection of individual networks, connected by intermediate
networking devices, that functions as a single large network.
▪ An internet is an interconnection of individual networks.
▪ To create an internet, we need internetworking devices called routers and
gateways.
▪ Each of these device interact with protocols at different layers of the OSI model
30
Cont…
Connecting Devices
Internetworking
Networking Devices
Devices
31
Connecting Devices and layers of OSI Model
32
Repeaters
▪ As signals travel along a cable, they degrade and become distorted in a process called
"attenuation."
➢ Repeaters take a weak signal from one segment, regenerates it, and passes it to the
next segment.
➢A repeater works at the physical layer of the OSI Reference Model to regenerate the
network's signals and resend them out on other segments.
➢It connects two segments of the same network ,overcoming the distance limitations of
the transmission media.
33
Repeater and OSI model
▪ A repeater forwards every frame; it has no filtering capability
▪ A repeater is a generator , not an amplifier.
▪ Repeaters can connect segments that have the same access method.(CSMA/CD ,
Token Passing, Polling , etc.).
34
Cont …
35
Function of repeater
36
Bridges
▪ As a data link layer device, the bridge can check the PHYSICAL / MAC addresses
(source and destination) contained in the frame.
▪ It can check the destination address of a frame and decide if the frame should be
forwarded or dropped.
37
Cont …
38
Cont …
39
How Bridges Work
▪ If the destination device is on the same segment as the frame, the bridge blocks
the frame from going on to other segments.
✓filtering.
▪ If the destination device is on a different segment, the bridge forwards the frame
to the appropriate segment.
▪ If the destination address is unknown to the bridge, the bridge forwards the
frame to all segments except the one on which it was received.
✓flooding.
40
Cont …
41
Function of Bridges
42
Characteristics of Bridges s
❑ Routing Tables
▪ Is used to determine the network of destination station of a received
packet.
❑ Filtering
▪ Is used by bridge to allow only those packets destined to the remote
network.
▪ Packets are filtered with respect to their destination and multicast
addresses.
❑ Forwarding
▪ The process of passing a packet from one network to another.
❑ Learning Algorithm
▪ The process by which the bridge learns how to reach stations on the
internetwork.
43
Advantages and Disadvantages of Bridges
❑ Advantages of using a bridge
✓ Extend physical network.
✓ Reduce network traffic with minor segmentation.
✓ Creates separate collision domains.
✓ Reduce collisions.
✓ Connect different architecture.
Disadvantages of using bridges
✓ Slower than repeaters due to filtering.
✓ Do not filter broadcasts.
✓ More expensive than repeaters.
44
Hub
▪ A hub is used as a central point of connection among media segments.
▪ Types of HUBS :
1. Active Hubs
✓ Most hubs are active; that is, they regenerate and retransmit signals in the
same way as a repeater does.
45
Cont …
2 . Passive Hubs
✓ They act as connection points and do not amplify or regenerate the signal; the
signal passes through the hub.
3. Intelligent
46
Cont…
✓ The receptacles on the front of the hub are called ports.
✓ There are usually from 4 to 32 ports on a hub, depending on the size of the network.
✓ Some hubs have an additional interface port that connects to another hub, thus increasing
the size of the network.
47
IP addressing
▪ An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication.
▪ An IP address serves two principal functions: Host identification and Location(Network) addressing.
▪ The network ID identifies the systems that are located on the same subnet bounded by IP routers.
▪ All systems on the same physical network must have the same network ID.
▪ The host ID identifies a workstation, server, router, or other TCP/IP host within a network.
▪ The address for each host must be unique to the network ID.
48
VLAN
▪ Users and resources that communicate most frequently with each other can be grouped
3/5/2024 49
Cont …
▪ Virtual LANs (or VLANs) separate a Layer-2 switch into multiple broadcast domains.
▪ Broadcasts from one VLAN will never be sent out ports belonging to another VLAN.
3/5/2024 50
Cont …
▪ Ports (interfaces) on switches can be assigned to one or more VLANs, enabling
▪ Based on which department they are associated with -- and establish rules about how
systems in the each groups are allowed to communicate with each other.
▪ Devices which are in the same VLAN, but connected to different switches, can
▪ Modern switches often incorporate routing functionality and are called Layer 3 switches.
3/5/2024 51
Cont …
3/5/2024 52
Cont …
▪ Four computers are connected to a Layer-2 switch that supports VLANs.
▪ Computers A and B belong to VLAN 1, and Computers C and D belong to
VLAN 2.
▪ Because Computers A and B belong to the same VLAN, they belong to the same IP
subnet and broadcast domain.
▪ They will be able to communicate without the need of a router
▪ Computers C and D likewise belong to the same VLAN and IP subnet.
▪ They also can communicate without a router.
▪ However, Computers A and B will not be able to communicate with Computers C
and D, as they belong to separate VLANs, and thus separate IP subnets.
▪ Broadcasts from VLAN 1 will never go out ports configured for VLAN 2.
▪ A router will be necessary for both VLANs to communicate.
3/5/2024 53
Benefits of VLANs
❑ Simplified administration for the network manager.
▪ By logically grouping users into the same virtual networks, you make it easy to set up
▪ When users physically move workstations, you can keep them on the same network with
different equipment.
▪ If someone changes teams but not workstations, they can easily be given access to
3/5/2024 54
Cont …
❑ Improved security:
▪ Using VLANs improves security by reducing both internal and external threats.
▪ Internally, separating users improves security and privacy by ensuring that users can
▪ If an outside attacker is able to gain access to one VLAN, they’ll be contained to that
network.
3/5/2024 55
Cont …
❑ Easier fault management
▪ Troubleshooting problems on the network can be simpler and faster when your different
▪ If you know that complaints are only coming from a certain subset of users, you’ll be
▪ VLANs manage traffic more efficiently so that your end users experience better
performance.
▪ Fewer latency problems will be there on the network and more reliability for critical
3/5/2024 applications. 56
Routing and Routing Protocols
▪ The main function of the network layer is routing packets from the source machine to the
destination machine.
▪ The algorithms that choose the routes and the data structures that they use are a major area
▪ The routing algorithm is that part of the network layer software responsible for deciding
3/5/2024 57
Cont …
▪ Routing requires a host or a router to have a routing table which is constructed by the
routing algorithm.
▪ Given big internetworks such as the Internet, the number of entries in the routing table
becomes large and table look ups become inefficient; methods for reducing its size
required.
3/5/2024 58
Cont …
▪ Next-hop routing.
▪ The routing table holds only the information that leads to the next hop.
▪ Network-specific routing
▪ Instead of having an entry for every host connected to the same physical network, there
is only one entry to define the address of the network itself.
3/5/2024 59
Cont …
▪ A routing algorithm must have the following properties in order to be an efficient one:
✓ Correctness
✓ Simplicity
✓ Robustness
✓ Optimality
✓ Stability
3/5/2024 60
Address resolution protocol
▪ Address Resolution Protocol (ARP) is a procedure for mapping a dynamic IP address to a
permanent physical machine address in a local area network (LAN).
▪ The job of ARP is essentially to translate 32-bit addresses to 48-bit addresses and vice
versa.
▪ This is necessary because IP addresses in IPv4 are 32 bits, but MAC addresses are 48 bits.
▪ The MAC address exists on Layer 2 of the OSI model, the data link layer.
3/5/2024 61
Cont …
▪ Most of the computer programs/applications use logical address (IP address) to
send/receive messages.
▪ The actual communication happens over the physical address (MAC address) i.e from
layer 2 of the OSI model.
▪ So, the main attempt is to get the destination MAC address which helps in
communicating with other devices.
▪ This is where ARP comes into the picture, its functionality is to translate IP address to
physical address.
3/5/2024 62
ICMP
▪ The Internet Control Message Protocol (ICMP) is a network layer protocol used by
network devices to diagnose network communication issues.
▪ ICMP is mainly used to determine whether or not data is reaching its intended
destination in a timely manner.
3/5/2024 63
What is ICMP used for?
▪ The primary purpose of ICMP is for error reporting.
▪ When two devices connect over the Internet, the ICMP generates errors to share with
the sending device in the event that any of the data did not get to its intended destination.
▪ A secondary use of ICMP protocol is to perform network diagnostics; the commonly used
terminal utilities traceroute and ping both operate using ICMP.
▪ The traceroute utility is used to display the routing path between two internet devices.
▪ The routing path is the actual physical path of connected routers that a request must
pass through before it reaches its destination.
3/5/2024 64