Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

2 Answers

Answer :

Basic Networking Concepts

1. Introduction

2. Protocols

3. Protocol Layers

4. Network Interconnection/Internet

1. Introduction

-A network can be defined as a group of computers and other devices connected in some ways so as to be able to exchange data.

-Each of the devices on the network can be thought of as a node; each node has a unique address.

-Addresses are numeric quantities that are easy for computers to work with, but not for humans to remember.

Example: 204.160.241.98

-Some networks also provide names that humans can more easily remember than numbers.

Example: www.javasoft.com, corresponding to the above numeric address.

image

Addressing

Internet address

Consists of 4 bytes separated by periods

Example: 136.102.233.49

-The R first bytes (R= 1,2,3) correspond to the network address;

-The remaining H bytes (H = 3,2,1) are used for the host machine.

-InterNIC Register: organization in charge of the allocation of the address ranges corresponding to networks.

-Criteria considered:

→ Geographical area (country)

→ Organization, enterprise

→ Department

→ Host

Domain Name System (DNS)

-Mnemonic textual addresses are provided to facilitate the manipulation of internet addresses.

-DNS servers are responsible for translating mnemonic textual Internet addresses into hard numeric Internet addresses.


Ports

-An IP address identifies a host machine on the Internet.

-An IP port will identify a specific application running on an Internet host machine.

-A port is identified by a number, the port number.

-The number of ports is not functionally limited, in contrast to serial communications where only 4 ports are allowed.

-There are some port numbers which are dedicated for specific applications.

image

Data Transmission
-In modern networks, data are transferred using packet switching.
-Messages are broken into units called packets, and sent from one computer to the other.
-At the destination, data are extracted from one or more packets and used to reconstruct the original message.
-Each packet has a maximum size, and consists of a header and a data area.
-The header contains the addresses of the source and destination computers and sequencing information necessary to reassemble the message at the destination.
image
Types of Networks
There are two principle kinds of networks: Wide Area Networks (WANs) and Local Area Networks (LANs).
WANs
-Cover cities, countries, and continents.
-Based on packet switching technology
-Examples of WAN technology: Asynchronous Transfer Mode (ATM),
Integrated Services Digital Network (ISDN)
LANs
-Cover buildings or a set of closely related buildings.
-Examples of LAN technology: Ethernet, Token Ring, and Fibber Distributed Data Interconnect (FDDI).
Ethernet LANs: based on a bus topology and broadcast communication Token ring LANs: based on ring topology
FDDI LANs: use optical fibbers and an improved token ring mechanism based on two rings flowing in opposite directions.
image
image
image

Interconnection
-Networks of low capacity may be connected together via a backbone network which is a network of high capacity such as a FDDI network, a WAN network etc.
-LANs and WANs can be interconnected via T1 or T3 digital leased lines
-According to the protocols involved, networks interconnection is achieved using one or several of the following devices:
→Bridge: a computer or device that links two similar LANs based on the same protocol.
→ Router: a communication computer that connects different types of networks using different protocols.
→ B-router or Bridge/Router: a single device that combines both the functions of bridge and router.
→ Gateway: a network device that connects two different systems, using direct and systematic translation between protocols.
image
Network Topology Diagram
The specification of the network topology diagram requires the definition of the characteristics and entities underlying the network:
-Geographical locations of the different components or subnets involved in the network.
-Description of the LAN topology
-Description of the WAN topology
-Description of the network connectors such as routers, bridges, repeaters, and gateways.

2. Protocols
-Define the rules that govern the communications between two computers connected to the network.
-Roles: addressing and routing of messages, error detection and recovery, sequence and flow controls etc.
-A protocol specification consists of the syntax, which defines the kinds and formats of the messages exchanged, and the semantic, which specifies the action taken by each entity when specific events occur.
Example: HTTP protocol for communication between web browsers and servers.

Request For Comments (RFC): specifications of the protocols involved in Internet Communications.
-Example: sample of RFC 821 describing communications between SMTP server and client.
image
-Protocols are designed based on a layered architecture such as the OSI reference model.
-Each entity at a layer n communicates only with entities at layer n-1.
-The data exchanged, known as Protocol Data Unit (PDU), goes back and forth through the layers, each layer adds or removes its own header and vice-versa. Therefore a layer n PDU may become a layer n-1 data.
image
3. Protocol Layers
The OSI (Open Systems Interconnection) Data Model
-ISO standard for computer networks design and functioning.
-Involves at least 7 layers, each playing a specific role when applications are communicating over the net.
-During the sending process, each layer (from top to down) will adda specific header to the raw data.
-At the reception, headers are eliminated conversely until the data arrived to the receiving application.

Answer :



OSI Layers
image
Physical layer: ensures a safe and efficient travel of data; consists of electronic circuits for data transmission etc.
Data link layer: in charge of data encapsulation under the form of packets and their interpretation at the physical layer.
Network layer: in charge of packets transmission from a source A to a destination B.
Transport layer: in charge of the delivery of packets from a source A to a destination B
Session layer: in charge of the management of network access. 
Presentation layer: determines the format of the data transmitted to applications, data compressing/decompressing, encrypting etc.
Application layer: contains the applications which are used by the end-user, such as Java, Word etc.

The TCP/IP Model
-Consists of only 4 layers: application, transport, internet and network.

Layers
image
Network layer
-Provides the same functionality as the physical, the data link and network layers in the OSI model.
-Mapping between IP addresses and network physical addresses.
-Encapsulation of IP datagrams, e.g packets, in format understandable by the network.

Internet layer
-Lies at the heart of TCP/IP.
-Based on the Internet Protocol (IP), which provides the frame for transmitting data from place A to place B.

Transport layer
-Based on two main protocols: TCP (Transmission Control Protocol)and UDP (User Datagram protocol)

Application layer
-Combines the functions of the OSI application, presentation, and session layers.
-Protocols involved in this layer: HTTP, FTP, SMTP etc.

4. Networks Interconnection/Internet
Concept of Network Interconnection
-First implemented in the Defense Advanced Research Project Agency
Network (Arpanet), in 1966 in USA.
-Consists of connecting several computer networks based on different protocols
-Requires the definition of a common interconnection protocol on top the local protocols.
-The Internet Protocol (IP) plays this role, by defining unique addresses for a network and a host machine.
image
image
Internet Protocol (IP)
Overview
-The IP protocol provides two main functionality:
→Decomposition of the initial information flow into packets of standardized size, and reassembling at the destination.
→Routing of a packet through successive networks, from the source machine to the destination identified by its IP address.
-Transmitted packets are not guaranteed to be delivered (datagram protocol).
-The IP protocol does not request for connection (connectionless) before sending data and does not make any error detection.
Functions
-Decompose the initial data (to be sent) into datagrams.
-Each datagram will have a header including, the IP address and the port number of the destination.
-Datagrams are then sent to selected gateways, e.g IP routers, connected at the same time to the local network and to an IP service provider network. 
-Datagrams are transferred from gateways to gateways until they arrived at their final destination.
image
Structure of an IP packet
-The fields at the beginning of the packet, called the frame header, define the IP protocol’s functionality and limitations.
-32 bits are allocated for encoding source and destination addresses (32 bits for each of these address fields).
-The remainder of the header (16 bits) encodes various information such as the total packet length in bytes.
-Hence an IP packet can be a maximum of 64Kb long.
image
Transmission Control Protocol (TCP)
Overview
-TCP provides by using IP packets a basic service that does guarantee safe delivery:
→error detection
→safe data transmission
→assurance that data are received in the correct order
-Before sending data, TCP requires that the computers communicating establish a connection (connection-oriented protocol). 
image
-TCP provides support for sending and receiving arbitrary amounts of data as one big stream of byte data (IP is limited to 64Kb).
-TCP does so by breaking up the data stream into separate IP packets.
-Packets are numbered, and reassembled on arrival, using sequence and sequence acknowledge numbers.
-TCP also improves the capability of IP by specifying port numbers.
→ There are 65,536 different TCP ports (sockets) through which every
TCP/IP machine can talk.
Structure of a TCP packet
image

User Datagram Protocol (UDP)
Overview
-Datagram protocol also built on top of IP.
-Has the same packet-size limit (64Kb) as IP, but allows for port number specification.
-Provides also 65,536 different ports.
-Hence, every machine has two sets of 65,536 ports: one for TCP and the other for UDP.
-Connectionless protocol, without any error detection facility.
-Provides only support for data transmission from one end to the other, without any further verification.
-The main interest of UDP is that since it does not make further verification, it is very fast.
-Useful for sending small size data in a repetitive way such as time information.

4.5 Internet Application Protocols
On top of TCP/IP, several services have been developed in order to homogenize applications of same nature:
-FTP (File Transfer Protocol) allows the transfer of collection of files between two machines connected to the Internet.
-Telnet (Terminal Protocol) allows a user to connect to a remote host in terminal mode.
-NNTP (Network News Transfer Protocol) allows the constitution of communication groups (newsgroups) organized around specific topics.
-SMTP (Simple Mail Transfer Protocol) defines a basic service for electronic mails.
-SNMP (Simple Network Management Protocol) allows the management of the network. 
image

Related questions

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Any advice on networking for the first time at an event?

Last Answer : I think dressing fairly professionally would be a good way to go. As this is meeting people in a possible business capacity, it is important to look the part. I think if you just go up and introduce ... being asked for their advice. These after all, are the best people to give their advice to you.

Description : Web-based business networking -- Valuable or worthless?

Last Answer : I haven’t used LinkedIn except to connect to former connections, but I have a friend who has used the network to find someone (who knows someone she knows) to contact.

Description : When you join a new " social networking site " that is asking for your home address before you can become a member, how can you be sure this information will not be used inappropriatly?

Last Answer : Here's one option: When this happens, open a new tab and do a google search with the following. Type the name of the site in question and then type the word review after it (e.g mastersofhearts.com review) ... your gut likes the most. A review will, of course, tell you if the site is legit or not.

Description : what is your favorite social networking website?

Last Answer : Flickr, Tumblr and DIGG (if you consider it as a social-netowrk)

Description : Anyone here interested in joining or starting a Social Networking Group in your city?

Last Answer : Are you in the business of setting such groups up?

Description : Explain the seven layers of the OSI reference model.

Last Answer : Below are the seven layers of the OSI reference model:  Physical Layer: This layer converts data bits into radio signals. An example of this is Ethernet.  Data Link layer: At data ... which both end user and application interact with. This layer provides services like email, file transfer, etc.

Description : Explain the different Layers of TCP/IP Model.

Last Answer : Application Layer, Transport Layer, Network or Internet Layer, Network interface layer.

Description : Explain the Different layers of the OSI model.

Last Answer : The different layers of the OSI model are given below:

Description : What are the key elements of the protocol?

Last Answer : There are three key elements of the protocol: Syntax: Describe the format of the data. Semantics: Describes the meaning of each section. Timings: Explain the timing that how fast the data can be sent.

Description : What do you mean by SLIP protocol?

Last Answer : SLIP stands for Serial Line Interface Protocol. It is used for sending IP datagram over a network in a single line.

Description : How many access lists are allowed per interface? * One per port, per protocol * Two per port, per protocol * Unlimited * Router interface +1 per port.

Last Answer : Correct answer: A Only one access list is allowed per interface. An access list must have conditions that test true for all packets that use the access list.

Description : Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP

Last Answer : Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time ... Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

Description : The acronym OSI stands for in computer networking. a. Open Systems Interconnection b. Organization for Standards Institute c. Organizing Systems Interconnection d. Open Systems Interworking

Last Answer : a. Open Systems Interconnection

Description : What are the common protocols associated with the network layer? a. Address Resolution Protocol b. Reverse Address Resolution Protocol c. Internet protocol d. Neighbour Discovery Protocol

Last Answer : c. Internet protocol

Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : B. 1. true, 2. false, 3.true

Description : How do I determine which, if any, static IP addresses are being used on my home WiFi network?

Last Answer : Check the status page of your Router setup.

Description : What's going on with my home network/phone lines?

Last Answer : I would borrow or purchase a telco toner generator . I bought the toner generator and the wand for like $40 at home depot. You plug the telephone jack into any phone or network port ... tell what is really connected to what. This method would probably be more accurate than using two Macbooks.

Description : Messy network cables?

Last Answer : Not for ethernet. The only standards I've seen that are still deployed are for fiber jumpers, where multimode is orange and single mode is yellow. There are different ends for fiber optic jumpers as well, they are ... standard and is just what we've done in one place to keep a grasp on what's what.

Description : In what ways have you used your (social) network to accomplish a task that normally wouldn't have been possible?

Last Answer : I used it to advertise this video. http://www.youtube.com/watch?v=yiqkrz83fos

Description : if i get a network hard drive will i be able to access it from anywhere?

Last Answer : answer:OS X Leopard will add easier networking and backup options, and if you get a new AirPort Extreme Base Station, your external hard drive can be attached to it and becomes a part of your network. Those items will be my next big Apple purchase, probably in the early part of next year. :)

Description : How do I hook up Xbox Live to a wired network?

Last Answer : I am pretty sure you just plug the Ethernet wire from your Xbox to your router. Then it should connect to the internet.

Description : Using MacBook Pro as Network Bridge?

Last Answer : answer:If you have cable/dsl or any other high speed internet connection, I would suggest installing a router and just plugging your macbook and your 360 into the built in switch. Using the bridging method will add more headache than the money you’d save on a router/switch solution.

Description : What is the maximum segment length of a 100Base-FX network?

Last Answer : The maximum segment length will be 412 meters. 

Description : What is the role of IEEE in the world of computer network?

Last Answer : IEEE full form is the Institute of Electrical and electronic Engineer which is used to define and develop the standards which will be used over the network.

Description : What are the types of mode available in Network? 

Last Answer : Data transferring mode in a computer network will be of three types: Simplex, Half-Duplex and Full Duplex.

Description : What do you mean by Network Topology?

Last Answer : A network topology is a physical structure of the network which defines how the computers or node will be connected to each other.

Description : What do you mean by Network?

Last Answer : Set of devices connected to each other over the physical medium is known as a computer network. For example the Internet.

Description : Where would network testing be included in an IP packet? * IP Options field * Identification field * Type of Service field * Reservation field

Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Which IP Address Class is INCORRECTLY paired with its range of network numbers? * Class A addresses include 192.0.0.0 through 223.255.255.0 * Class A addresses include 1.0.0.0 through 126.0.0.0 * Class B ... 192.0.0.0 through 223.255.255.0 * Class D addresses include 224.0.0.0 through 239.255.255.0

Last Answer : 1

Description : You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? * 10101100 00010000 * 00000010 10100000 * 10101100 00000000 * 11100000 11110000

Last Answer : Correct answer: A To find the network address, convert the IP address to binary-10101100 000100000 00000010 10100000-then ANDed it with the subnet mask-11111111 11111111 00000000 00000000. The rest is ... that the class of an address can be determined by the numerical value of the first octet

Description : is another kind of fiber optic network with active star for switching. A) S/NET B) SW/NET C) NET/SW D) FS/NET

Last Answer : A) S/NET

Description : . A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network

Last Answer : C) T-switched network

Description : Which of the following are the network services?

Last Answer : All of the above

Description : 1. The computer network is

Last Answer : C) Both of the above

Description : How do I set up my Xbox 360 to the internet?

Last Answer : answer:Hi freerange! We did something (sort of) simillar in the old condo I was living at. You shouldn't need another router. Here's what you need to do: I'm assuming that your wireless router ... your router into the mystery port in the bottom level and see when the light turns on. Happy gaming!

Description : Explain the difference between Internet, Intranet and Extranet.

Last Answer : All three are terminologies of a how a network can be accessed. They define the access levels for each user which is present inside and outside the network.  Internet: In this, all ... then it is extranet. They are provided access to a limited application in the organization.

Description : Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? * Identification * Flags * Frag Offset * Type of Service * Total Length

Last Answer : Correct answer: A, B & C The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) ... Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : What field tells the Internet layer how to handle an IP packet? * Type of Service * IdentificationFlags * Frag Offset

Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : What is internet?  a single network  a vast collection of different networks  interconnection of local area networks  None of the Above

Last Answer :  a vast collection of different network

Description : Interconnection of Internet and computing devices embedded in everyday objects, enabling them to send and receive data is called_____________ A. Internet of Things B. Network Interconnection C. Object Determination D. None of these 

Last Answer : A. Internet of Things 

Description : From the following which is not the type of protocol used in CIM? a.Open standard interconnection - OSI b.Manufacturing Automation Protocol - MAP c.Technical and Industrial Protocol - TIP d.None of the above

Last Answer : c.Technical and Industrial Protocol - TIP

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above

Last Answer : d. All the above

Description : The ___ protocols define how the applications interface with the lower layer protocol to send the data over the network. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : A. Application layer 

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v