Vous êtes sur la page 1sur 28

Chapter 1:

Chapter 2:

Chapter 3:

Chapter 4:

Chapter 5:

Chapter 6:

Chapter 7:

Chapter 8:

Chapter 9:

Chapter 10:

Chapter 11: Insta IIing the Network 277

Chapter 12: Wireless Networking 337

Chapter 13: Network Servers 375

Chapter 14:

Chapter 15: Working on Internet 445

Chapter 16: WAN Technologies 499

Chapter 17: Client Server System and Remote Connectivity 537 .

Chapter 18: Network Security and Protocols 589

Chapter 19: Testing and Troubleshooting Networks 635

Glossary 675
Dear Student, at Jetking we believe in providing the best education and services to our customers.

It is our constant effort to improve ourselves. The second edition of the book 'NETWORKING ESSENTIALS

MODULE - III' is just a one example of this effort. This book has been developed after conducting an

exhaustive research.

This book features more examples in the topic covered. Also we have included the topics of Wireless Networking,

Structured cabling and Application Configuration.

We are sure that this book will meet your expectations and will help you in mastering the content. Please provide

your feedback on the book and send it across to the address given below and we will ensure that it is taken

care of.

We wish you all the best!

- Design Team

Please send your feedback to:

Head - Design and Development,


Jetking Infotrain Limited,

401, Bussa Udyog Bhavan,

T.J. Road, Sewri (W),

Mumbai - 400015.
Chapter 1

Introduction to Computer Networks


Chapter Objectives:

At the end of the chapter, you will be aqle to:

Explain the types of computer networks

Explain Client/Server configuration

Application

Explain Standards Organizations


Network is a collection of computers connected to each other. It allows the computers to communicate with each
other and share resources which include information, software and peripheral devices such as printers, scanners.
A computer network is shown in Figure 1.1.

Figure 1.1 . Computer Network

Nowadays, computers are used in a wider range. All the organizations are using multiple computers within
their departments to perform their day to day work. It is necessary to connect them which form a network. The
networks are classified into different types according to the network size. When computers communicate with
each other, they follow certain specific formats and rules. This formats and rules are explained by the OSI (Open
Systems Interconnection) model. This OSI model is conceptual and has seven layers and each layer is having
its own functions.

As network selection criterion forms the basis of a network, since it helps to select a secured and efficient
network. The criterion explains network performance improvement techniques and necessity of reliable network.
Various standards organizations are used for network communication to maintain consistency.

Computer network is an interconnection of two or more computers and peripherals such as printers and faxes.
Computer network allows the user to share and transfer information using cables or modems within a network.

Computer network allows the user to share data with other users in a network, for example, a company having
a number of computers which are connected in a network. Computer network will enable the users to share files
and folders and get synchronized with other users.

Computer network also allows the user to share resources such as printers and faxes. Printer can be installed
on one computer and can be accessed by other users in a network. By this the need of installing printers on
individual computers is avoided and it results in cost-effectiveness. Computer network also allows the user to
communicate with each other using instant messaging tools to share ideas, files or solve queries

The user can also setup a central system wherein common files and folders which are frequently used by all the
users can be stored. All the users within the network can easily access those files. Instead of taking backups
from individual computer, the user can take data backup from the central system. This helps in reducing the time

of taking backup.

If an organization you have several computers but just one phone line, a network makes it easier to use the

Internet. Several computers can share one modem to use the same Internet connection. Otherwise, you can

even install a dedicated high-speed Internet connection such as a cable modem for your network.

It is possible to add new systems or servers to an existing network easily. Thus the computer network provides

scalability. It is also reliable to use a network as it uses mirroring and redundancy.

Earlier, computers were only used as stand-alone machines. Computer networks were created to establish a

communication link between different users within an organization. The Advanced Research Projects Agency

(ARPA) designed Advanced Research Projects Agency Network (ARPANET) for United States Department of

Defense. It was the first network in the world.

Small computers were used to manage communication links. These small computers were connected to large
mainframe computers. These large computers were connected to the ARPANET. The purpose of ARPANET

was that each computer would be connected to a specialized computer, called as Interface Message Processors

(IMP). The IMPs perform the store and forward of data and were connected to each other using modems.

In 1969, the first ARPANET link was established between the IMP nodes at the University of California at Los

Angeles (UCLA). Then Douglas Engelbart's hypertext-project computer at Stanford Research Institute (SRI)

was connected to IMP node. By the end of the year, the computers at the University of California, Santa Barbara

(UCSB) and the University of Utah were connected to the network. All the computers in the network were using
different operating systems and were able communicate with each other across the network.

ARPANET was originally developed for providing long-distance (remote) computing. Remote computing was

done by a utility program known as Telnet which allows the user on one computer to connect to another

computer on a network. Telnet service can be used for debate, discussion and news sharing by the news or
discussion groups. Still the remote computing is considered as an effective and useful service of the APRANET.

File transfer is another service provided by APRANET. It allows the users to access remote computer and

retrieve programs or data. The File Transfer Protocol (FTP) is utility software which is used for uploading and

downloading files. Using FTP, the directories or folders on remote computers can be easily accessed and files
can be transferred between computers.

In 1970s, the research institutes and laboratories supported by the Department of Defense were also included
in ARPANET, in various parts of USA.
Computer network can be wired or wireless. Networks can be categorized as per the geographical area to be
covered by the network. Computer network includes Local Area Network (LAN), Campus Area Network (CAN),
Metropolitan Area Network (MAN) and Wide Area Network (WAN).

LAN is a computer network that spans over a small area. It connects computers and workstations to share data
and resources such as printers or faxes. LAN is restricted to a small area such as home, office or colle"ge.Figure
1.2 shows a Local Area Network.

In Figure 1.2, all the workstations, server and printer are interconnected with the help of the network device.
Printer can be used by other workstations.

The Institute of Electrical and Electronic Engineers (IEEE) in the United States of America produced a series of
standards for LANs called the IEEE 802 standards. (Refer Chapter 4, topic 4.2.1, for detail information on IEEE
802 standards.)

Terminology is the set of terms which are used to define elements in a particular topic. LAN terminology is
related to the terms included in LAN. The LAN terminologies are:
» Central Processor· It controls and processes data. CPU executes the instructions given by the user. CPU
does not have interfaces, main memory or peripherals.
» Microcomputer· Microcomputer are small and single user computers. When microcomputer was
developed, its speed and functionality were limited. But today, very small machines are able to handle and
execute complex functions and are very fast.
» Node· A single device which is connected to a network. Devices such as personal computers are connected
to a network at a particular location. Nodes are also called as stations or workstations.
» Packets· Packet is a block of information transmitted through the network. Block of information includes
data units or pieces of data. The information passes through the different layers in the network.
)0>- Personal Computer (PC) - Personal Computer is also known as microcomputer. PC is a self-contained
computer and has limited storage space and speed. PC is used by a single user at the workplace.
)0>- Protocol· Protocol is the set of rules or conventions that establishes a connection and transmit data
between two devices. Protocol defines the procedure that is to be followed during data transmission.
)0>- Server· A computer system that provides access and services to other systems over a network. Server
gives access to shared resources such as hard disks and printers.

)0>- Terminal - A device which enables the user to input and get output of the data. Device such as keyboard
is used for data input and monitor is used to display the output of the data.
)0>- Workstations - Workstations are used to compute and execute applications. They are not passive parties
to the computing process. IBM computers or compatibles, Apple Macintosh computers or UNIX machines
from Sun Microsystems are the few workstation manufacturers.

In LANs, data can be transferred using techniques like token passing. As per the techniques used for data
sharing, LANs are classified into Ethernet, Token Ring, Token bus and Fiber Distributed Data Interface (FOOl).
Figure 1.3 shows LAN classification.

Figure 1.3 - LAN Classification

)0>- Ethernet LAN - Enables the user to transmit data at the rate of more than 10 Mbps. In this network, the
system checks for a medium before transferring data. If the medium is available, the system transmits the
information. This technique is called Carrier Sense Multiple Access/Collision Detection (CSMA/CD). Ethernet
has been standardized as one of the 802 standards, called as 802.3.

)0>- Token Ring - Passes a control frame called as 'Token' over the network. The systems in token ring are
connected in a ring and the token is also passed in a ring format. The system which wants to transmit data
catches the token, attaches a data to it and then it continues to travel around the network.

)0>- Token Bus - Uses token passing mechanism such as token ring. In token bus, the systems are physically
connected in a bus format but the token is passed in a logical ring format.

)0>- FOOl - Uses token passing technique like Token ring network. FOOl uses primary and secondary rings.
The actual data transfer is done through the primary ring, whereas the secondary ring is used as backup.
LAN has advantages over other networks as it covers comparatively small geographic area. Sometimes, the use
of LAN is restricted due to its smaller coverage area and centralized management.

Advantages of LAN are:

» Allows the user to share devices like printers or faxes in a network.


» Improves productivity leading to faster work. Many users can share data or network elements at the same
time which results in faster work.

» Provides easy maintenance as standard hardware is used for the computers in the network.
» Provides communication in smaller network with limited network elements.

» New user or equipment can be installed and configured easily.

Disadvantages of LAN are:

» Limited number of computers can be connected in a LAN

» LAN cannot cover large area


» Network performance degrades as the number of users exceeds

» LAN is more prone to virus and hacking than standalone computers

Campus Area Network (CAN) is a computer network. It is made up of two or more LANs within a limited area. It
can cover many buildings in an area. The main feature of CAN is that all of the computers which are connected
together have some relationship to each other. For example. different building in a campus can be connected
using CAN. It will help to interconnect academic departments. library and computer laboratories. CAN is larger
than a LAN but smaller than WAN. Wires, wireless or some other technology can be used to connect these
computers. Campus Area Network is shown in Figure 1.4.
.1...2..3 Metropolitan Area Network (MAN)
MAN is the interconnection of networks in a city. Generally, MAN is not owned by a single organization. It acts as
a high speed network to allow sharing resources within a city. MAN can also be formed by connecting remote
LANs through telephone lines or radio links. MAN support data and voice transmission. The best example for
MAN is the television cable network in cities. Figure 1.5 shows Metropolitan Area Network.

WAN covers a wide geographical area which includes multiple computers or LANs. It connects computers
through public networks, like telephone system, microwave, satellite link or leased line.

Most of the WANs use leased lines for Internet access as they provide faster data transfer. Leased line is a
dedicated telephone connection between service provider and consumer. The main advantage of using leased
lines is that there is no interference by other users outside the network.
WAN helps an organization to establish network between all its departments and offices located in the same or
different cities. It also enables communication between the organization and the rest of the world. Figure 1.6
shows Wide Area Network.
LAN CAN MAN WAN
Connects computers and Connects two or more Interconnects networks Connects geogra-
workstations in office or LANs within a campus. in a town or a city. phically separated
home. LANs.
Covers a local area of 1 Km. Covers privately owned Covers larger area than Spans large
campus with an area of LAN but smaller area than geographical area
5 to 100 Km. WAN with an area more than 100 Km.
of 2 to 100 Km.

Data Transmission Data Transmission Data Transmission Data Transmission


Rate - 10/100 Mbps Rate - Variable Rate - Variable Rate - 64 Kbps
or 2 Mbps

Uses IEEE 802 standard. Uses IEEE 802 standard. Uses ITU standard.

Low cost High cost High cost (Repetitive) High cost (Repetitive)

MoneyMaker bank uses LAN as their computer network for each department. All the branches of the bank from
different cities are connected through WAN. The bank is expanding and decided to open its branches at different
locations in the city.

The already existing bank in Mumbai can work as a main branch which will supervise the work of the inter-city
branches. LAN computer network should be used for each department in the new branch. For connecting the
different branches of the bank within the city MAN can be used. MAN allows the sharing of resources within a
city.

Client/Server is a configuration of the computer network that includes a server and one or more clients. The
client manages the local resources that are used by the user such as monitor, keyboard, CPU and peripherals.
The server is a more powerful system which manages shared resources such as databases, printers,
communication links or high powered-processors and handles all the incoming requests for its shared resources.
Figure 1.7 shows Client/Server Configuration.
••
Server

C
Clients
Figure 1.7 - Client/Server Configuration

Server is a centralized and dedicated entity which manages data, printers or network traffic depending upon the
type of the server. The server must run a server program to share its resources. In a network, one server can be
used for multiple purposes or you can have multiple servers for specific applications. Many programs are built
into the Operating System (OS) which can be used for the sharing of resources and for other purposes. Client is
a computer on which user runs applications. Clients can also be called as workstations. The network resources
are stored on the server and are accessed by the clients. Clients cannot access shared resources available on
another client. Server has large storage capacity. It stores most of the information required by the clients. Client-
Server architecture is also known as two-tier architecture. The example of this type network is Novell Netware
clienVserver system.

Open System Interconnection (OSI) model developed by the International Standards Organization (ISO) describes
the flow of information from one computer to another. OSI model is also called ISO OSI Reference Model. It is a
conceptual model that has seven layers. Physical, data link, network, transport, session, presentation and
application are the seven layers of OSI model. Each layer performs distinct functions on the data in accordance
with the previous layer functions. The application, presentation and session layers are called as upper layers.
Figure 1.8 shows OSI Model.
All the layers of the OSI reference model use different protocols. Protocol defines the procedure that is to be
followed during data transmission. It is the set of specified rules and standards used to transmit data from one
device to other device.

Physical layer is the first or the bottom most layer of the OSI model. This layer is used to establish or terminate
a connection to a communication medium. It also defines the electrical and mechanical specifications like
cables, connectors and signaling options of the medium.

Physical layer receives data from the upper layer called the data link layer. It converts the received data into bit
stream. The data is then transmitted through the medium to the receiver. At the receiving end, physical layer
receives the data in bit format. It forwards the data to the data link layer. This functioning of the physical layer is
shown in Figure 1.9.

S.nder Receiver
From ~ Unk Layv ToD.Un1l:~r
Layer 2. Data Layer20ata

Physical: : :Phy$lCal
Layet [110100010101100101} 110100010101100101 Layer

> Characteristics of media - Defines the characteristics of the interface which is used for connecting the
devices. It also defines the type of the transmission media such as copper wires or fiber optic cables.

> Encoding - Defines the encoding type. Encoding means changing bit stream (Os and 1s) into signal.
Before transmission, physical layer encodes the signal into electrical or optical form depending upon the
media.

> Transmission Rate - Defines the transmission rate of bits. This provides number of bits transmitted per
second. It defines how long will the duration of a bit be.

> Transmission Mode - Defines the transmission mode between two devices. Transmission mode specifies
the direction of signal flow. The different types of transmission modes are:

• Simplex - Communication is done only in one direction. One device can only send and the other can
only receive.

Je11dh9®
»- Line Configuration - Defines the way in which devices are connected to the appropriate link. For example,
point to point or multipoint.

W" The point to point line configuration provides a dedicated link between two devices.
But in the multipoint line configuration more than two devices share a single link ..

»- Topology - Defines how the devices are connected to form a network. (Refer chapter number 2 for detail
information on topology.)

»- Synchronization of Bits - The sender and receiver must use the same bit rate. The clocks of the sender
and receiver must also be synchronized for bit level synchronization.

Data link layer is the second layer of the oSI model. It handles data transfer between network and the physical
layers. Data unit at the data link layer is called as frame. Functioning of data link layer is shown in Figure 1.10.
Data link layer receives data from network layer. It adds header and trailer to the data and passes data to the
physical layer. At the receiver side, data link layer receives data from the physical layer. It detaches header and
trailer from the data and passes data to the network layer.

Sender
From NetwOrk Lay f

I Layer 3 Data J
OataUnk:
Layer

Framing - The physical layer delivers raw bits from the source to destination. During transmission, the
value of the bits can change. It is also possible that the number of bits received by the receiver may be
different from the number of bits sent by the sender. To resolve this problem, the data link layer organizes
the bits into manageable data units called as frames.

Physical Addressing - Data link layer adds header to the frame which contains the physical address of
the sender and/or receiver. Headers are assigned when the frames are to be distributed to various systems
within the network.

Access Control - When the devices in the network use the same link for communication, at a time only one
device should transmit data. The data link layer provides access to a particular device to use the link at a
given, time.
> Flow Control· It may happen that the speed at which the sending and receiving nodes operate may differ.
The sending node may transmit data at a faster rate but the receiving node may receive it at a slower rate.
The rate of data transmission between two nodes should be controlled to keep both the nodes in
synchronization. This process is called flow control.

> Error Control· Another function of the Data Link layer is error control. Error control detects and corrects
errors. During transmission, if a frame is lost or corrupted, the data link layer retransmits that frame. It also
prevents duplication of frames. Error control is accomplished using trailer at the end of the frame.

This is the third layer of the 081 model. The data unit at this layer is known as packet. There is no need of the
network layer if the two communicating devices lie on the same network. However, when the two devices are
connected on different networks, network layer is essential for providing source to destination delivery of
packets.

Functioning of network layer is shown in Figure 1.11. Network layer receives data from transport layer. It adds
~- header to the data and passes data to the data link layer. At the receiver side, network layer receives data from
data link layer. It detaches header from the data and passes data to the transport layer.

> Logical Addressing - The data link layer provides physical addressing which is useful for a local network.
When the packet is destined for a device outside the network, we require other addressing scheme to
identify source and destination. Network layer adds header to the data that includes the logical address (IP
address) of the source and destination. It is a 32-bit address that uniquely identifies the device connected
to the network.

> Routing - Routing is a process wherein a proper path is defined for the packets to reach the destination.
Routing can be of two types, static or dynamic. In static routing, the route to be followed by a packet is
already set by the network administrator. In dynamic routing, the route to be followed by a packet is
decided at the time of transmission of the packet. The route can be changed based on the available traffic
on the network.
> Handling Congestion Issues • Any given network has a certain capacity-to deliver or handle number of
packets. When the packets exceed the handling capacity, then the network is unable to cope with them
and results in excess accumulation of packets over the network. This is called congestion. Congestion
may occur due to various reasons like shortage of buffer space in network devices, slow links and slow
processors. It is the responsibility of the network layer to control such congestion problems.
> Internetworking - Intemetworking means connecting two or more computer networks together. The Internet
is the best example of intemetworking. There are different types of networks that exist in the real world such
as LAN, MAN and WAN. These networks are interconnected using various networking devices such as
bridges, routers and gateways.(Refer to chapter 10 for detailed informationabout bridge, routers and gateways)

This is the fourth layer of the OSI model. The data unit at this layer is known as segment. The network layer deals
with source-to-destination delivery of individual packets and does not recognize any relationship between
them. On the other hand, the transport layer ensures that the entire message reaches in order and handles error
control and flow control at the source-to destination level.

Functioning of transport layer is shown in Figure 1.12. Transport layer receives data from the session layer. It
divides the data into segments with each segment having its own header and passes these segments to the
network layer. At the receiver side, transport layer receives packets from the network layer. It detaches headers
from them and then reassemblesthe segments into original message and passes that message to the session layer.

S.ndtr Recelwr
From s.s.1otI ~ To s.s.1on l.ayef
UY'tt S Data UY'tr 5 oata

~4D'"
UY'tt .• Data uyer"oat.
~4Data UY'tr4oata
To tMtwOlk Layer from N4ltwOlk Layer

> Service-point Addressing - There may be number of programs running at the same time on a computer.
For this purpose, source-to-destination delivery should also include process-to-process delivery. Data
must be transferred from a specific process (running program) on one computer to a specific process on
another computer and to accomplish this, port address is required. Thus, transport layer includes service-
point address (also referred to as port address) in the header. Using these port addresses transport layer
delivers the packets to the correct process.
,

14 Jelldh~f
> Segmentation and Reassembly - A message is divided into segments with each segment having a
sequence number. When the message arrives at the destination, with the help of these sequence numbers,
the transport layer reassembles the message correctly. Sequence numbers also enable transport layer to
determine and replace the segments that were lost in the transmission.

> Connection Control • Transport layer provides either connection-oriented or connectionless service. In
connection-oriented service, transport layer establishes a connection with the transport layer at the
destination before transmitting segments and terminates the connection when all the data is transferred.
In connectionless service, transport layer treats each segment as individual packet and transmits it to the
transport layer at destination.

> Flow Control· Data link layer provides flow control of data across a single link. Transport layer, on the
other hand is also responsible for flow control which is performed end to end.

> Error Control - Transport layer also performs error checking. Error control takes place end to end. Transport
layer at the sending machine ensures that the entire message is delivered at the receiving machine
without an error. Segments are retransmitted to achieve error correction.

Transport layer is concerned with delivering the entire message from source-to-destination. The end to end
delivery of a message is shown in Figure 1.13.

,
I \
\.
I \
I \
I \
I \
••• Ji\

This is the fifth layer of the oSI model. This layer establishes, manages, synchronizes and terminates connection
between the computers. It also sets up, coordinates and terminates interactions and dialogs between
communicating devices. It provides either half duplex or full duplex service.
Functioning of session layer is shown in Figure 1.14. Session layer receives data from the presentation layer. It
adds header and synchronization bits to the data and passes data to the transport layer. At the receiver side,
session layer receives data from transport layer. It detaches header and synchronization bits from the data and
passes d~ta to the presentation layer.
~,5D.tbo
To t_JIOft liayI!r fl'llmT~ liayI!r

Figure 1.14 - Functioning of Session Layer

Responsibilities of session layer are:

»- Dialog Control - The session layer is responsible for setting up sessions between devices. It allows two
devices to enter into dialog (communication process). These dialogs can take place either in half-duplex
or full duplex mode. Dialog control is implemented using a data token. The user that has the token is only
allowed to send the data. When the user is done with the operation the token is passed on to next user.

»- Synchronization - At the session layer, checkpoints (synchronization bits) are added into a stream of data
to synchronize the sessions. For example, if a device is sending a file of 1000 pages, then you can insert
checkpoints after every 100 pages to ensure that these 100 pages are received without an error and
acknowledged independently. If an error occurs while transmitting page 631, he only pages that should
be retransmitted are from 601 to 631. Previous pages need not to be resent because the successful
reception of the pages form 1 to 600 must have acknowledged before transmission of the pages from 601
to 700.

This is the sixth layer of the oSI model. This layer deals with syntax and semantics of the data exchanged
between two devices. It transforms the data in the format that will be accepted by the application layer.

Functioning of presentation layer is shown in Figure 1.15. Presentation layer receives data from application
layer. It adds header to the data and passes data to the session layer. At the receiver side, the presentation layer
receives data from session layer. It detaches header from the data and passes data to the application layer.

Sender Recelyer
From Application Layer To Application Layer
>- Translation - The running programs on the computer exchange data in the form of character strings and
numbers. Before transmitting, the information should be converted to bits format. The presentation layer
handles interoperability between different encoding systems used by different computer systems. At the
sending device, presentation layer changes the information from its sender-dependent format into a
common format that will be accepted by the device. At the receiving side, presentation layer changes the
information from the common format into its receiver-dependent format. For example, consider one device
that uses Extended Binary Coded Decimal Interchange Code (EBCDIC) to represent data and wishes to
transmit data to a device using American Standard Code for Information Interchange (ASCII) to represent
the same data. The information sent directly won't be accepted by the device. To resolve this problem, the
presentation layer performs the conversion of codes. At the sender's side the EBCDIC code is converted
into a common format. At the receiver's end the presentation layer again converts that data (common
format) into ASCII code.

>- Encryption - The presentation layer also adds security to data by encrypting it. Encryption is a process in
which the data is converted into a form that prevents unauthorized users from reading. Encryption allows
a system to carry sensitive and private information. The encrypted data is decrypted by the presentation
layer at the receiving end. Decryption is a process opposite to encryption. It converts the encrypted
message back to its original form.

>- Compression - Data compression refers to a process of encoding data using less number of bits. This
process reduces the number of bits used to represent the information. It is important while transmitting
multimedia information such as text, aU~io and video. Lossless and lossy compressions are the two types
of data compression techniques. In lossless compression, the data received after decompressing the
compressed data is the exact replica of the original data. In lossy compression, the data received after
decompressing the compressed data is not the exact replica of the original data. The data is lost in the
compression and decompression processes. Presentation layer is responsible for performing data
compression.

This is the seventh layer of the oSI model. It provides a means for the user to access information on the network
using an application. It also supports services such as electronic mail, remote file access and transfer and
shared database management.
Se.nder
u_

uyet7·o.ta

"tom Pre."""lltton lAyer

> Network Virtual Terminal - It is a software version of physical terminal. Using this software the user can log

on to a computer that is remotely connected on the network. The application layer emulates a terminal at the

remote host. When the user's computer wants to communicate with the remote host, it communicates with the

virtual terminal that converts the data in the intermediary format used by the virtual terminal and sends it to the
remote host. After processing the data the remote host replies to the terminal in the reverse order.

> File Transfer, Access and Management (FTAM) - Using this application user can access files (to make
changes) in a remote host. It also enables the user to retrieve and manage files from a remote computer so

that the files can be used on a local computer.

> Mail Services - Using this application e-mails can be forwarded to another device. Message handling
system (MHS) is the oSI protocol used to transfer mail over the internet.

> Directory Services· Another service provided by the Application layer is directory services. A directory is

a source of information about objects such as people, organizations, programs and files. These objects
are managed by directory services.

Each layer in the oSI model performs distinct functions on the data in accordance with the previous layer
functions. Layers accept functions from the below layer and transfer the functionality to the layers above. The

functions of the layers in the oSI model can be summarized as below:

> User information is converted into data in the upper layers

> Data is converted into segments in the transport layer

> Segments are converted into packets in the network layer

> Packets are converted into frames in the data link layer

> Frames are converted into bits in the physical layer


A network is selected on the basis of network criteria. During the network selection, it is important to consider
these criteria for improving network functionality.

);> Reliability

);> Security

While designing a network, it is necessary to consider the need of building the network. The network should
provide the desired performance. Organizations may need to upgrade their networks as per the new techniques.
Hence, it is important that the network should not be permanent, it has to be flexible. The network should be
designed in such a way that it is possible to expand or upgrade the network systems in future.

Network performance can be measured by analyzing the request and response time. Request time includes the
time that a message can take to travel from one computer to another computer within a network. Response time
is the elapsed-time between a request and the response.

The performance of the network depends on the following factors:


);> Number of Users - Performance of the network may degrade when the number of users connected to the
network increases

);> Transmission medium - It connects elements in the network and is used to transmit data over the network.
The data transmission speed varies with the type of transmission medium. The bandwidth requirement
and the type of transmission media can be decided depending on the size and the application of the
network.
);> Hardware - The different types of hardware can be used in a network. It affects both the speed and
capacity of the system in a network.
);> Software - The software is a program or set of instructions which controls the operation of a networking
device. It is used to process data at the sender, receiver and intermediate nodes in a network.

Network reliability plays a major role in developing network functionality. The network monitoring systems
and network devices are necessary for making the network reliable. The network monitoring systems detects
and identifies the network problems. The network devices ensure that the data reaches the appropriate
destination.

The reliability of the network is measured by following factors:

);> Fn;quency of failure - Determines how frequently the network fails.

Je11dh9®
> Recovery time· It is the time taken by a device or network to recover from the failure.

> Catastrophe - Network must be protected from the disasters such as fire, earthquake and fire.

Security of the network is considered as the important aspect for improving the network performance. The
network security may be affected due to viruses and unauthorized access of other users. To provide network
security:

> Avoid opening unknown e-mail attachments which may contain virus.
> Use anti-virus software for securing the systems from virus.

> Firewalls can be implemented for detecting and preventing unauthorized access of other users in the
network.

> Use backup tools to store the important data on removable media like CD or ZIP disks. This helps to secure
your data.
> Turn off the system and remove the network cable when not in use, to avoid unauthorized interference in
the systems.

1Ji Network Applications


Networks are widely used in different fields like financial institutions, communication services and Internet
services like E-mails. Network selection criteria are the most important aspect in each and every type of network
and applications.

Organizations which provide financial services need secure networks. The frequency of failure has to be low
and the network recovery should be fast. This will help to provide a reliable network with better performance. All
these network criteria are also applicable for Electronic Data Interchange (EDI) which enables data transfer
between two computers as well as data between different networks.
Marketing and sales services are important in various sectors. So it is necessary that the networks used for these
services be reliable and protected from the unauthorized access.

All the fields where networks are used has department called Information Service. This department manages
the network systems and data. It also provides directory service. Directory service identifies all resources on a
network. It collects software, hardware, administrative procedures of the network and makes them available to
network users. For such type of services, network security plays an important role. The networks should not have
unauthorized interference and virus.

The Customer Service department of MoneyMaker bank provides online services to the customers. At Hyderabad
branch, the Customer Service department network is not functioning properly. So the bank has decided to build
an alternative network for that department.
To create a network the following points must be considered:

» Decide the type of network and network configuration.

» Decide the number of users to be connected in the network.

» Decide the speed of the network and hardware to be used for each system in the network.

» Decide the operating system to be installed in each system in the network.

Regional organizations are European Committee for Standardization (CEN), Euro-Asian Council for
Standardization (EASC), European Telecommunications Standards Institute (ETSI).

International organizations are International Standard Organization (ISO), International Telecommunication


Union (ITU), Institute of Electrical and Electronics Engineers (IEEE) and World Wide Web Consortium (W3C).

The International Standard Organization (ISO) is the leading developer of international standards and is composed
of representatives from national standards organizations. The main objective of ISO is to create world-wide
industrial and commercial standards. The ISO is a Non-Governmental Organization (NGO). It sets standards
which becomes law through contract and acts as an association with strong links to governments. The standards
developed by ISO are accepted worldwide. ISO works with the International Electrotechnical Commission (IEC),
which is responsible for standardization of electrical equipment.
Title - subject

IEC - only included if the standard results from work of JTC1

The International Telecommunication Union - Telecommunication (Standardization Sector) is the oldest


intergovernmental organization. It was previously known as Consultative Committee on International Telephony
and Telegraphy (CCITT). It is established to standardize and regulate international radio and
telecommunications. The public and private organizations develop telecommunications through ITU-T. The ITU
was founded in Paris in 1865 as an International Telegraph Union. In 1947 it became a United Nations agency.
In 1992, the ITU has mentioned new purposes for the union. For the improvement of telecommunications, the
international cooperation between all the members of the union needs to maintain. ITU-T offers technical
assistance to the developing countries in the field of telecommunications.

The Institute of Electrical and Electronics Engineers (IEEE) is an international non-profit organization. In 1963,
the IEEE was formed by merging the two organizations American Institute of Electrical Engineers (AlEE) and
Institute of Radio Engineers (IRE). The AlEE was concerned with the wire communications (telegraph and
telephony) and light and power systems whereas the IRE was concerned with radio engineering. The IEEE is
one of the leading standards-making organizations in the world. It develops standards of various industries like,
power and energy, Information Technology (IT), telecommunications, biomedical and healthcare.

The American National Standards Institute (ANSI) is a nonprofit organization. The organization coordinates the
U.S. standards with international standards to make American products used worldwide. It is possible with ANSI
to develop American National Standards (ANS) by certifying the procedures of SODs. The ANSI also approves
standards which are developed by representatives of standards developing organizations, government agencies,
consumer groups and companies.

ANSI creates standards for the computer industry and for a wide range of technical areas. ANSI C is a C
language standard produced by ANSI. The technical standards can be electrical specifications and
communication protocols. For example FOOl, is ANSI standard which is a set of protocols for sending data over
fiber optic cables.
»- Computer networks are divided into LAN, CAN, MAN and WAN depending on the geographical coverage
area.

»- Physical layer is responsible for actual transmission of bits over the medium. It deals with the electrical and
mechanical functions.

»- Performance, reliability and security are the network selection criterion which enables to create efficient
network.

»- International standards organizations are International Standard Organization (ISO), International


Telecommunication Union (ITU), Institute of Electrical and Electronics Engineers (IEEE) and World Wide
Web Consortium (W3C).
Quiz:

1. Fill in the blanks

1. The network is divided into LAN, CAN, MAN and WAN according to the -
a. Configuration
b. Coverage area
c. Topology
d. Cost

2. oSI model consists of layers.


a. 7
b. 2
c. 5
d. 4

3. The physical layer is concerned with the transmission of over the physical medium.
a. Programs
b. Protocols
c. Bits
d. Dialogs

4. The main responsibility of the Iayer is to deliver the packets from source to destination.
a. Network
b. Application
c. Transport
d. Physical

5. The virus may enter the system if unknown is opened.


a. e-mail attachment
b. word document
c. power point
d. file

6. Segmentation and reassembly are functions of the layer.


a. Session
b. Transport
c. Presentation
d. Application
7. Trailers to the data are added only at Iayer of the oSI model.
a. Presentation
b. Physical
c. Network
d. Data Link

1. The Chennai branch of the MoneyMaker bank has split into two buildings in the same campus due to some
reasons. The bank wants to interconnect all the departments from the two buildings. Which type of network
the bank should use?
a. LAN
b. WAN
c. MAN
d. CAN

2. Some systems of the Insurance department of the MoneyMaker bank from Mumbai want to secure important
data. What should be done to secure important data?

~, a. Store important data on the removable media

Vous aimerez peut-être aussi