Académique Documents
Professionnel Documents
Culture Documents
An informative essay.
Department of Engineering
California State University
The objective of this research paper, is to convey a comprehensive
components, one can build out an incredibly reliable, efficient and substantial data
network. This document explains various network devices that are designed to extend,
enhance and enrich a data network. In order for these devices to operate, there must be
an official procedure or system of rules governing these digital manipulations. These are
delivering data to a destination, and Internet Protocol (IP) which directs data packets
from node to node around a network and throughout the world when necessary.
Repeaters
critical network components, allows one to build out a robust, reliable network for an
efficient and substantial data connection. One obvious problem is signal attenuation. Its
not possible for a signal to be sent through a wire of infinite length (perhaps though, with
infinite energy or a superconducting infinitely long wire, both of which are a long shot).
Overcoming the issue of signal attenuation in a network (both wired and wireless) can
be implemented with a repeater. This type of device operates on the physical level of
the OSI model. A repeater receives a signal and, before it becomes too weak or
corrupted, regenerates the original bit pattern.1 A repeater can extend the path length of
a network when cable limits are reached. More than one repeater can easily be
implemented between segments of the network cables. Introducing a repeater, does not
alter the LAN to the point where it is no longer called a LAN. Seemingly, we can
but this is simply not the case. Dr. Moussavi points out in his book titled, Data
Communication and Networking (2011), Repeaters do not filter the signal. Therefore, if
a signal contains noise or other disturbing signals, these will be amplified as the signal
Key points for repeaters are, a repeater connects segments of a LAN. A repeater
1
Forouzan, 2004, P. 388
2
Moussavi, 2011, P. 247
amplifier.3 A repeater is also closely related to a HUB, though there are a few key
differences.
Hubs
Simply put, a hub is a hardware device that provides the illusion of a single network
segment to which multiple stations attach.4 In a general sense, a hub can refer to any
Hubs do not re-route information, nor do they filter or amplify. A hub will send the
incoming message out to all ports attached to it, allowing one to inexpensively build out
a smaller sized network such as a home or office. A hub does not offer additional
performance or network boost, but it does offer a reliable and cheap way to build out a
smaller network. The use of hubs, must be carefully implemented, too many hubs will
cause a degradation of signal quality, as well as increase the chance for data collision
(which causes problems). Dr. Moussavi wrote in his book Data Communications and
Networking (2011), Hubs are at the heart of the star network topology. They use
half-duplex transmission mode, which means they cannot send and receive information
at the same time.6 Figure 2, shows a simple star topology network. Advances in hub
design have incorporated other features. Dr. Moussavi points out in his book, that we
now have passive hubs (original designs), active hubs (multiport repeaters, which can
3
Forouzan, 2004, P. 388
4
Comer, 2005, P. 420
5
Forouzan, 2004, P. 388
6
Moussavi, 2011, P. 248
also amplify and filter out noise) and intelligent hubs, which monitor and direct traffic for
network performance boost. Like repeaters, hubs operate in the physical layer of the
OSI model.
Bridges
Bridges are designed to operate in a layer above the physical layer in the OSI
model (layer 2). A bridge has similarities to a HUB or repeater, except it's a much more
intelligent device. A bridge has the ability to compare incoming data with an address
table that is stored in its memory, and given to it by an administrator, or by asking for
a bridge operates as a physical layer device because it regenerates the signal received
(like a repeater, or repeating HUB). And a bridge operates in the data layer, because it
can check the MAC address and make a decision on whether or not to push a frame to
a particular device or network.7 Being called an active device, we know a bridge must
look at all incoming messages, and check for incoming and destination instructions. It
will also wait until the information path is clear, before sending. This will require the use
of data storage, in a buffer. Bridges are often referred to as a layer-2 switch, they are
of smaller parts to that network. They boost network efficiency and add to the
understand why an active device such as a bridge can help a networks performance,
starting with Figure 3. If a frame destined for station 712B1345642 arrives at port 1, the
bridge consults its table to find the departing port. According to its table, frames for
712B1345642 leave through port 1; therefore, there is no need for forwarding; the frame
is dropped. On the other hand, if a frame for 712B1345641 arrives at port 2, the
departing port is port 1 and the frame is forwarded. In the first case, LAN 2 remains free
of traffic; in the second case, both LANs have traffic.9 So here we clearly see an
advantage in this scaled down example. Instead of sending to all ports, we choose a
route and save bandwidth on the other. It is crucial to a larger network, to operate using
7
Forouzan, 2004, P. 390
8
Moussavi, 2011, P. 249
9
Forouzan, 2004, P. 391
Figure 3. Bridge. Picture credit to Data Communications and Networking, by Forouzan.
Switches
reliability. When implemented in the second second OSI layer, switches can work as a
virtual circuit between source and destination, without sharing links of other stations.10
This means that switches establish a link with the destination, and send information to it
without sending to anyone else. Switches are capable of two way communication, which
helps with maximizing bandwidth efficiency. A switch is able to forward a data frame,
drop a data frame, or transmit to all other ports on the network. A two-layer switch can
also be described as a bridge with many ports and a design that allows for faster
designed to minimize this. Packet switching is a big performance booster for this
10
Moussavi, 2011, P. 250
method of connecting LANs or computers. A switch implementing packet switching, can
send parts of information through different paths, allowing for data to be sent to the
destination more quickly. The outgoing message will be labelled with ordering numbers,
sent in separate packets, and reconstructed at the destination. This will allow the
network to be more productive, offering better bandwidth efficiency ratio, and overall
Figure 4. Switch network. Credit to M. Moussavi in Data Communication and Networking (2011)
Routers
Routers are layer 3 devices in the OSI model. They operate in the network level,
which is above data level and physical level. Routers often share internet access with all
devices connected to it. It is also possible to connect other devices, such as printers, fax
machines, or gaming machines to a router. Routers receive data packets from one of
the networks its connected to and reads the packets internal destination label, and
then decides to route the data packet based on either the routers internal routing table
of connected devices or its routing policy to send the packet on its way. Routing tables
across the whole network asking for an IP address from any device on the network, any
DHCP server on the network can see and respond to this request though there's
normally only 1 DHCP server on a network many can be present to share the load and
increase performance. DHCP assigned IP addresses are not permanent like a manually
configured static IP and have a lease that has to be repeatedly extended while the
device is connected to the network. Once the device has disconnected from the network
the lease will expire and the router can re-assign the associated IP address to a new
Routers also route data through to via the device believes to be the most efficient
route based on its destination. The router determines this with internal data tables that
are known as Routing tables. If the router knows a route for the destination of the data
packet its handling it will direct it accordingly, if it does not have a known route, it will
route the packet based on a general routing protocol. If the destination is directly
connected to the router the packet can be directed there instead of sent to another
router for the process to continue. Each time a packet is forwarded is known as a hop.
When initially sent, a packet can have a max hop count and when this is reached the
packet dies and does not continue hopping. When the packet is returned to the sender
it carries with it the count of hops it took to get to the destination, some routing protocols
use this hop count as their primary metric but these fail to account for other useful
metrics such as round-trip time and load on the routers along the way.
Routers are also able to talk to each other to recommend better routes using
ICMP messages are sent in several situations: for example, when a datagram cannot reach its
destination, when the gateway does not have the buffering capacity to forward a datagram, and
when the gateway can direct the host to send traffic on a shorter route. (RFC-792, Page 1)
This ability to relay system status and alternatives allow routers to be very reliable at
network conditions, keeping reliability high and maintain peak performance as well.
While this may make routers seem to have a quite narrow focus, they can be
further classified into 5 types, Core routers, Edge routers, Bridge routers, Virtual
Routers, and Wireless Routers. Some devices combine some or all of these
classifications into one physical unit. Core routers are normally placed as the backbone
of a network with these devices having the largest data throughput demand. These
devices also need to be able to transfer data through multiple different interfaces with
zero latency. To keep up with the demands of a growing network and the new interfaces
Core routers are typically supercomputers and devices have a relatively short service
life and will be repeatedly replaced as technology progresses. Edge routers are typically
the transition point from the core routers of the internet service providers to end users
and customers. Bridge routers are also known as brouters, can act as routers for
request they understand and can act as a bridge and just pass data packets along for
protocols they don't understand. Virtual routers are simulated routers in a network that
actually consist of multiple physical routers internally. This is known as Virtual Router
the network devices communicating through the virtual router. The virtual router
consists of a master physical device and slave devices. If the master physical router in
the Virtual router setup fails, then VRRP dictates that a backup router take its place and
that devices traffic is rerouted to an operational router allowing for no lost data during a
transmission. If a backup router fails, other backup routers wait for an action command
from the master device on how to handle the failure. Wireless routers connect wireless
transceiver converting the wireless signals to data sent to and from network devices.
Gateways
A gateway is a piece of networking equipment that can act in any or all 7 layers
of the OSI model, and differs from a router in that its main task is translating protocols
and interfaces. A device acting as a gateway also often acts as a router and hosts a
DHCP server, thus requiring only one physical device to be assigned an IP address and
allowing data to only pass through one device to be sent out over the network. In a
residential network a gateway may not only double as a router but also a modem for
commonly have firewalls incorporated as well, again saving latency by only needing 1
device to perform many services to the network. Gateways have historically been a
typical hardline connection for internet connections, but new technologies have also
adopted gateways as well. Some new instances of gateways are Internet-To-Orbit (I2O)
... to convert protocols from one network on the ground (internet) to another network, or device in
orbit by routing and translating the radio or laser waves to a protocol that can be understood by a
user-end TNC. 11
As stated, an Internet to Orbit gateway connects ground networks to low earth orbit
networks, enabling remote areas to have an internet connection that were previously
infeasible to connect via cabling. With I2O network speed increasing with
everyday life, since they consolidate infrastructure and remove physical proximity
limitations.
service like google drive into a physical storage medium connected to your computer.
These devices are gaining popularity for the same reasons that I2O is gaining
popularity, less hardware to maintain on site and a more centralized system. Figure 1
below is a visualization of how a network of core routers, gateways, edge routers and
11
Jaffer, G., Nader, R., & Koudelka, O. (2011). Internet-to-orbit gateway and virtual ground station: A tool
for space research and scientific outreach. Acta Astronautica, 69(7/8), 658-666.
doi:10.1016/j.actaastro.2011.05.021
Figure 5 (From: Researchgate.com, Real traffic logs creation for testing intrusion detection
systems)
Firewalls
Per Cisco.com, a leading firewall manufacturer, a firewall is defined as, ... a
network security device that monitors incoming and outgoing network traffic and decides
whether to allow or block specific traffic based on a defined set of security rules.12 As
aforementioned, firewalls are often implemented as part of gateways and routers since
all data transmission is already going through those devices for analysis anyway. This
hacking attempts, and other traffic that could congest the network the device is attached
to.
network in that they can be used for many different purposes. Also, while their names
are similar the distinction is necessary, Network cards operate in the physical layer
12
What Is a Firewall? (n.d.). Retrieved February 25, 2017, from
http://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
handling analog signals, while Network Adapters operate in the data link layer. A
Network Interface Card can handle both tasks acting as the interface from a device on a
network to the network itself. Due to their ability to act as 2 devices in one they are very
does the job of both. NICs commonly interface with a device on the network over a local
data bus such as Peripheral Component Interconnect (PCI) or Universal Serial Bus
(USB). A NIC will accept a request from the attached device over its local data bus and
convert the data request into a data packet for transmission on the network then convert
the packet to analog signals that can be sent over the network to routers for distribution.
The Internet Reference model, much like using the OSI model, is a layer-based
system and uses four layers, as opposed to the seven layers used by OSI. These layers
are as follows; Network access layer, internet layer, transport layer, and application
layer. Contrasting the internet reference model to the OSI model, the internet reference
model has combined both the physical and data link layers together into one layer, the
network interface layer. The internet and transport layers correspond to the network and
transport layers of the OSI model while the application layer combines the session,
presentation, and application layers of the OSI model. The internet layer is controlled by
IP, each layer has its own protocols and unique functions.
13
Application Layer
The best known protocols of the application layer are as follows; Hyper Text
Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol
(SMTP), and Telnet. Now as to what these protocols do in the application layer; HTTP
supports file transfers between the client and server, FTP enables the end to end
transfer of ASCII text files or binary data records, SMTP defines the mechanisms
needed for mailing between hosts, and finally Telnet allows the user the ability to
implement terminal sessions using a remote host. The initial importance of Telnet was
13
From: technet.microsoft.com, TCP/IP Protocol Architecture
As traveling data packets move from the application layer they change by adding
a header to them, which is called encapsulation. Each layer has its own analyzation of
the data packets with the application layer keeping them in their original context. The
Transport layer with segment the data packet by using TCP mechanisms to guarantee
that the data is error free, complete, and properly sequenced. These segments are
passed to the IP, transferring them to the target destinations. During the Internet layer
they are at their datagram stage with the packet then reaching its final stage at the
The Network Interface Layer also called the Network Access layer, the lowest
layer of the Internet reference model, is responsible for placing TCP/IP packets onto the
network medium as well as receiving TCP/IP packets off the network medium. The
Network Interface layer is responsible for many different functions. The Network
Interface layer accepts data from the Internet layer in the form of datagrams which are
then encapsulated into frames frames for transmission over the physical medium
mention before. The Network Interface layer is responsible for routing the IP address in
the network to the physical address of the recipient computer which has been saved on
the network adapter card. The Network Interface layer also learns the physical address
of the destination along with the maximum frame size as well as the data packet
structure for safe and efficient delivery. Another function The Network Interface layer
performs is learning the specific type of medium and the exchange rate of data to
signal. The last two properties that The Network Interface layer is responsible for are
the routing data having its information placed as a header for the transmitting frame,
and detecting general errors that may have occurred in any of the past functions. The
Network Interface layer combines the Data Link as well as the Physical layers of the
OSI model.
Internet layer
This layer is responsible for addressing, packaging, and routing functions. The
key functions are for IP, ARP, ICMP, and RARP. Internet Protocol or IP is responsible
for IP addressing, routing, and the separation as well as assembly of packets. The
Address Resolution Protocol or ARP is responsible for the resolution of the Internet
layer address to the Network Interface layer address by connecting the IP address to a
MAC address. ICMP or the Internet Message Protocol provides diagnostics in case of
Transmission Control Program or (TCP). The first major use of IP was the version called
encompasses the network, host, and multicast IDs all together. When using IPv4 there
are 5 modes for addressing which are selected from the IPs first byte of data. The first
three modes or classes are for different sizes of unicast communication networks for a
large network a logic bit starting with 0 is needed, for a medium network a 10 is
necessary, and for a small network a binary number of 110 will be used. The last two
classes are different in the aspect that one is used in the multicast communication
network when a 1110 binary number is used, the other is saved for use later on and
categorized with a 1111 binary number. Some key aspects of IPv4 is the support for
576 byte packet size, ability to configure manually or using DHCP. Today the need for
more 32 bit addresses, which limits to only about 4 billion unique addresses, has
caused the creation IPv6. The advantage of IPv6 over IPv4 is the increased address
space, IPv6 has 128 bits which allows for approximately 3.41038 addresses. Insert
IP here
Transport layer
reliable data delivery and communication service for nodes that demand an extended
bidirectional data exchange. TCP, UDP, and RTP are the most common protocols that
operate at this layer. TCP is responsible for completely and safely providing data packet
delivery from host to host. UDP is used when a reliable connection service is not
needed. This means that error correction is not necessary since the data is halted
before an error is made. Real-Time Transport Protocol (RTP) also operates within the
transport layer. It provides real time data from the sending to receiving end for data,
Internet protocol suite. The Internet Protocol was developed in the 1970s for the internet
Agency Network). Internet Protocol is responsible for the movement of data packets
from one node to another based on the IP addresses. The IP address consists of a
4-byte host address that is connected to the internet. Its routing function allows
internetworking as well as essentially runs the internet. This interworking lead into Local
Area Networks (LAN) that lead into Wide Area Networks (WAN), which lead into a rapid
growth of information and technology throughout the 1980s by scientific networks, such
depository information.14
In a dedicated router, there is no need for TCP. This is because no signals begin
datagem generated from a sender is told its destination from the IP. If this IP is outside
of the LAN, then it must be routed out onto the larger system. The packet of information
is then bounced to the next available router until it reaches its desired system. The
routing pattern can be seen illustrated in the figure below. Modern routers are outfitted
attachments are Ethernet, Token Ring, point-to-point synchronousity, fiber optics, etc.
14
TCP/IP: Architecture, Protocols, and Implementation (1993) Sidnie Feit, Pg. 8
Figure 7: Visualization of router flow, Sidnie Feit (1993)
The IP layer itself accepts commands from the TCP at the source and creates
the datagram. It then sends the information through the router using two main
mechanisms, the subnetwork mask and routing tables. The subnetwork mask is a 32 bit
external to the host address. Conversely if the byte is written as 0, every bit assigned to
a logic low, then it is seen as in the same local network. An example is that an IP
but no 127.0.1.238.
Routing tables is the other mechanic used in IP. These tables are initially set up
manually with a list of static entries. Small networks typically operate just on this static
list, but larger systems require a more dynamic list that can change during operations.
less traffic and theoretically improve time from host to recipient. On a Unix or Linux
operating system, the command to lookup the routing table in the terminal window is
netstat -nr. It will provide information similar to that seen in the figure below.
IP reports that information: source address, Type of Service, data length, and TCP
options. That information is passed to the TCP settings before passed into the IP
datagram. The most appealing of the TCP settings historically are the flow controlled
duplex communications.1 The hosts act as both sender and receiver, allowing
concurrent transmission in the system. The flow control is decided on the receiver side
on the system, due to limitations built into the transmission systems. This allows the
sent to guarantee communication is taking place between the systems. Before large
quantities of information are sent, one host sends out a packet of information and an
the transmitting host will send out its data, periodically waiting for acknowledgement bits
This concludes the research paper, and comprehensive overview of a few of the
many topics that go into building out a working and efficient data communication
network. Without these devices, and protocols governing their behavior, technology
15
TCP/IP: Architecture, Protocols, and Implementation (1993) Sidnie Feit, Pg.183