Uploaded by fadil Yusuf

Network Protocols

advertisement
1) Network Protocols are a set of rules governing exchange of information in an easy,
reliable and secure way. Before we discuss the most common protocols used to transmit
and receive data over a network, we need to understand how a network is logically
organized or designed. The most popular model used to establish open communication
between two systems is the Open Systems Interface (OSI) model proposed by ISO.
OSI Model
OSI model is not a network architecture because it does not specify the exact services and
protocols for each layer. It simply tells what each layer should do by defining its input and output
data. It is up to network architects to implement the layers according to their needs and resources
available.
These are the seven layers of the OSI model −

Physical layer −It is the first layer that physically connects the two systems that need to
communicate. It transmits data in bits and manages simplex or duplex transmission by
modem. It also manages Network Interface Card’s hardware interface to the network, like
cabling, cable terminators, topography, voltage levels, etc.

Data link layer − It is the firmware layer of Network Interface Card. It assembles datagrams
into frames and adds start and stop flags to each frame. It also resolves problems caused by
damaged, lost or duplicate frames.

Network layer − It is concerned with routing, switching and controlling flow of information
between the workstations. It also breaks down transport layer datagrams into smaller
datagrams.

Transport layer − Till the session layer, file is in its own form. Transport layer breaks it
down into data frames, provides error checking at network segment level and prevents a
fast host from overrunning a slower one. Transport layer isolates the upper layers from
network hardware.

Session layer − This layer is responsible for establishing a session between two
workstations that want to exchange data.

Presentation layer − This layer is concerned with correct representation of data, i.e. syntax
and semantics of information. It controls file level security and is also responsible for
converting data to network standards.

Application layer − It is the topmost layer of the network that is responsible for sending
application requests by the user to the lower levels. Typical applications include file
transfer, E-mail, remote logon, data entry, etc.
TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is a set of layered
protocols used for communication over the Internet. The communication model of this suite is
client-server model. A computer that sends a request is the client and a computer to which the
request is sent is the server.
TCP/IP has four layers −

Application layer − Application layer protocols like HTTP and FTP are used.

Transport layer − Data is transmitted in form of datagrams using the Transmission Control
Protocol (TCP). TCP is responsible for breaking up data at the client side and then
reassembling it on the server side.

Network layer − Network layer connection is established using Internet Protocol (IP) at the
network layer. Every machine connected to the Internet is assigned an address called IP
address by the protocol to easily identify source and destination machines.

Data link layer − Actual data transmission in bits occurs at the data link layer using the
destination address provided by network layer.
What is User Datagram Protocol (UDP)?
User Datagram Protocol (UDP) is a communications protocol that is primarily used to establish
low-latency and loss-tolerating connections between applications on the internet.
UDP speeds up transmissions by enabling the transfer of data before an agreement is provided by
the receiving party. As a result, UDP is beneficial in time-sensitive communications, including
voice over IP (VoIP), domain name system (DNS) lookup, and video or audio playback.
UDP enables process-to-process communication, while TCP supports host-to-host UDP provides
two services not provided by the IP layer. It provides port numbers to help distinguish different
user requests. It also provides an optional checksum capability to verify that the data arrived
intact.
User Datagram Protocol features
User Datagram Protocol has attributes that make it beneficial for use with applications that can
tolerate lost data. Below are some examples:

It allows packets to be dropped and received in a different order than they were transmitted,
making it suitable for real-time applications where latency might be a concern.

It can be used for transaction-based protocols, such as DNS or Network Time Protocol
(NTP).

It can be used where a large number of clients are connected and where real-time error
correction isn't necessary, such as gaming, voice or video conferencing, and streaming media
What is a subnet?
A subnet, or subnetwork, is a network inside a network. Subnets make networks more efficient.
Through subnetting, network traffic can travel a shorter distance without passing through
unnecessary routers to reach its destination.
2) Troubleshooting is a systematic approach to solving a problem. The goal of troubleshooting is
to determine why something does not work as expected and explain how to resolve the problem.
Troubleshooting network problems can be a frustrating experience, whether you're dealing with
one PC or the entire ball of wax. This is because today's networks are so complicated that the
point of failure could be virtually anywhere. Worse yet, your network could contain multiple
points of failure, resulting in confusing symptoms that are hard to diagnose.
Troubleshooting Steps
In the Network+ troubleshooting model, there are eight steps:
1. Establish symptoms.
2. Identify the affected area.
4. Select the most probable cause.
5. Implement a solution.
7. Recognize the potential effects of the solution.

3. Establish what has changed.
6. Test the result.
8. Document the solution.
Hardware Troubleshooting Tools
In addition to manufacturer-provided troubleshooting tools, there are a few hardware devices we
can use to troubleshoot the network. These are actual devices that you can use during the
troubleshooting process. Some devices have easily recognizable functions; others are more
obscure. Four of the most popular hardware tools are:
 A crossover cable
 A hardware loopback
 A tone generator
 A tone locator

Software Troubleshooting Tools
In addition to these hardware troubleshooting tools, you can use software programs to gain
information about the current health and state of the network. These tools fall into two main
categories:
 Protocol analyzers
 Performance-monitoring tools
3)
4) What is a Server?
A server is a computer, a device, or a program entirely responsible for managing network
resources. Servers are called so because they provide the functionality to a "client," another
computer, device, or application.

In theory, computers are considered servers when they share resources with client
machines.

Servers are sometimes considered to be committed because they rarely do anything else but
serve.

A server's job is to handle network resources, including hosting websites, delivering data,
sending and receiving emails, limiting access, and so on.

All other network PCs can access the server's capabilities and services since it is connected
to a switch or router (browsing websites, checking emails, communicating with other users,
etc.).
What is a Workstation?
A workstation is a computer dedicated to a single user or a group working on a business or
professional project. It has one or more high-resolution monitors and a quicker processor than a
personal computer.

A workstation has a higher multitasking capability because of the more significant randomaccess memory, drives, and drive capacity.

A workstation may also have faster graphics adapters and additional peripherals linked to
it.

A PC or mainframe terminal on a local area network is also referred to as a workstation.
One or more large client computers and network servers may share network resources with
these workstations.

Workstations are often designed to handle extensive data manipulation and visualization.
Examples are image rendering and editing, computer-aided design (CAD), animations, and
mathematical graphs.

Workstations were the first to introduce collaboration tools as well as innovative
accessories
and
improvements.
3D
mouse,
multiple
screens,
and
high-
performance/capacity data storage devices are among them.
Workstation characteristics were eventually incorporated by mainstream PCs, resulting in the
workstation market segment's demise. In addition, the price difference between lower-cost
workstations and higher-cost PCs has narrowed.
Difference between Workstation and Server
Key
Purpose
Operations
Example
Operating
System
Workstation
Server
A workstation is a computer that is used
A server is a software which
to perform required tasks and to access
provides Services when requested
Internet or LAN.
by workstations.
Operations on workstations are like
Server operations are mostly
Business process, engineering, etc.
network or Internet based.
FTP Server, Web Server.
Kiosks, Video workstations, Audio
workstations.
Unix, Linux, or Windows NT are the
Linux, Solaris server, and Windows
operating systems used in workstations.
are the operating systems used in
servers.
GUI
Graphics User Interface (GUI) is installed
GUI is an optional feature on a
on the workstation.
Server.
Proxy Server
The proxy server is a computer on the internet that accepts the incoming requests from the client
and forwards those requests to the destination server. It works as a gateway between the end-user
and the internet. It has its own IP address. It separates the client system and web server from the
global network.
In other words, we can say that the proxy server allows us to access any websites with a different IP
address. It plays an intermediary role between users and targeted websites or servers. It collects
and provides information related to user requests. The most important point about a proxy server is
that it does not encrypt traffic.
There are two main purposes of proxy server:
o
To keep the system behind it anonymous.
o
To speed up access to a resource through caching.
5) What is a Network Operating System?
Unlike operating systems, such as Windows, that are designed for single users to control one
computer, network operating systems (NOS) coordinate the activities of multiple computers
across a network. The network operating system acts as a director to keep the network running
smoothly.
The two major types of network operating systems are:

Peer-to-Peer

Client/Server
Nearly all modern networks are a combination of both. The networking design can be considered
independent of the servers and workstations that will share it.
Peer-to-Peer
Peer-to-peer network operating systems allow users to share resources and files located on their
computers and to access shared resources found on other computers. However, they do not have
a file server or a centralized management source (See fig. 1). In a peer-to-peer network, all
computers are considered equal; they all have the same abilities to use the resources available on
the network. Peer-to-peer networks are designed primarily for small to medium local area
networks. Nearly all modern desktop operating systems, such as Macintosh OSX, Linux, and
Windows, can function as peer-to-peer network operating systems.
Advantages of a peer-to-peer network:

Less initial expense - No need for a dedicated server.

Setup - An operating system (such as Windows XP) already in place may only need to be
reconfigured for peer-to-peer operations.
Disadvantages of a peer-to-peer network:

Decentralized - No central repository for files and applications.

Security - Does not provide the security available on a client/server network.
Client/Server
Client/server network operating systems allow the network to centralize functions and
applications in one or more dedicated file servers (See fig. 2). The file servers become the heart
of the system, providing access to resources and providing security. Individual workstations
(clients) have access to the resources available on the file servers. The network operating system
provides the mechanism to integrate all the components of the network and allow multiple users
to simultaneously share the same resources irrespective of physical location. UNIX/Linux and
the Microsoft family of Windows Servers are examples of client/server network operating
systems.
Advantages of a client/server network:

Centralized - Resources and data security are controlled through the server.

Scalability - Any or all elements can be replaced individually as needs increase.

Flexibility - New technology can be easily integrated into system.

Interoperability - All components (client/network/server) work together.

Accessibility - Server can be accessed remotely and across multiple platforms.
Disadvantages of a client/server network:

Expense - Requires initial investment in dedicated server.

Maintenance - Large networks will require a staff to ensure efficient operation.

Dependence - When server goes down, operations will cease across the network.
7) What is Collision Domain?
Collision domain is a single physical line that a collision can occur. In other words, it is a
network domain that allows only one device to transfer data at a time. If one more device tries to
send data at the same time in a collision domain, collision occurs. This means that there will be
data loss. Let’s give some examples for collision domain.
For example, simple hubs have one collision domain and one broadcast domain. So, only one
node that is connected to this hub can make a data transfer at any time. If another device tries to
make data transfer, this data is not reached to the destination.
Another good example for collision domain is switches. By default, each port of a switch is one
collision domain. In other words, the number of collision domains for a switch is related with
the ports of the switch by default. If a switch has 24 ports, it has 24 collision domains.
What is Broadcast Domain?
Broadcast Domain simply shows a network. In other words, it is the area that a broadcast traffic
can sent and received. All the devices that receive this broadcast traffic are in the same broadcast
domain. If a device sends broadcast traffic, all the other devices in the same broadcast domain
receive this broadcast traffic.
A Switch is one broadcast domain by default. Because, by default there is no extra
VLAN configuration on switches. In such a switch, without any restriction, if one node
connected to this switch sends broadcast data, all the other ports receive it. But if we use VLANs
in a switch, these VLANs become separate broadcast domains. So, only the VLAN members’
ports receive broadcast traffic.
Another example for broadcast domains is router ports. Each router port is one broadcast
domain. By default, router do not pass broadcast traffic. So, devices connected to the different
port of a router, do not receive any broadcast traffic coming from another port.
8) What is the Functional Difference between ARP, DHCP and DNS?
1. ARP
ARP stands for Address Resolution Protocol and represents a protocol used when IPv4 is used
over the Ethernet. This protocol helps resolve an address of a specific computer in the Ethernet
network by sending a piece of information from the local computer to a remote computer where
the server process is executed. This piece of information allows the server to identify the network
system and provide the address.
2. DHCP
There are two types of IP addresses, static and dynamic. A static IP address means that the
computer is manually configured to use a certain IP address. This is just used when you want to
host a server on your computer and need your IP to stay the same. For regular users, they want
their address to change over time (because it’s more secure among other things), so they use a
dynamic address.
Well, let’s say you misconfigured your IP address so it stays static and someone else also
configured their computer for that same IP address. What then? You use a DHCP (Dynamic Host
Configuration Protocol) to automatically allocate your IP address from a defined range of
numbers available in a specific network.
3. DNS
When you search for a domain name or a website, you search for its alphabetical name.
Computers, however, don’t think like we humans do and use an IP (internet protocol) address,
which is represented in numbers. For instance 194.240.155.
Now, imagine having to remember a numerical IP address for every domain you want to visit.
That would be impossible. So, a DNS, or a Domain Name Server, translates an IP address into,
for us, more understandable domain name
What is Kerberos?
Kerberos is a network authentication protocol. It is designed to provide strong authentication for
client/server applications by using secret-key cryptography. A free implementation of this
protocol is available from the Massachusetts Institute of Technology. Kerberos is available in
many commercial products as well.
9) What is Router in Networking?
Definition: Router is a network hardware device that allows to make communication in between
the internet and all devices which are linked to the internet in your house and office.
Router has responsible to receives, analyze, and forward the all data packets from the modem and
transfer it to the destination point. After reaching the data packets, the router monitors the
destination address; get to make consultation its routing table that take the decision which is the
best route for transferring the data packets.
Function of Routers

To Make Segment: Routers play the major role to segment the internet network form internal
network in the residencies area or business. Routers moves to all packets from internal network to
the Internet. Primary function of router is to web traffic dedicated for internet outside to internet
network as a safety concern. It also helps to ignore the damage of data from a data packet that is
flowing to wrong network.

To Assign IP Address: IP (Internet Protocol) is very necessary element for every computer
system because the IP address means that which address that is assigned to the computer over the
network. With the help of IP, all communication packets are sending and received over the
network. Dynamic host configuration protocol (DHCP) allows to IP address to each computer that
is linked to network. Most routers are enabled with DHCP protocol over the internet that is used
for home and office small types of networks.

As a Firewall: Firewall helps to provide protection from intruders and malicious users over the
internal networks. Firewall allows to get blockage of unauthorized or unwanted traffic. Firewall is
software that is installed on each computer over the network, but routers are identified over the
internet along with firewall firmware and software.

To Share Resources: Routers also help to many users for sharing resources like as faxes,
scanners, printers, and file folders on the drives which are located on remotely. Printers and faxes
can be properly configured on the router by skilled network administrator for using the entire
organization through computer network. There are not need to install the printer for every user
over the network, so it helps to save extra money and space for placing the printer. All files and
folders that is stored on the user’s hard drive can be shared over entire network without getting to
print or hard copies. Due to this, to save extra company funding and resources, and so employees
are able to perform their functions quickly while locating remote geographic locations.
Uses of Router
Router is used for getting to fulfill four purposes; like as –

First, to make ensure that data is flowing with correct destination, like as uses sends the emails to
correct internet provider and recipient.

Second, Routers provide the protection from unwanted data, like as enlarge file is distributed to
each machines over the network and improve the network performance.

Third, router plays the role as a buffer in between the modem and network, and it also allows the
software security to diminish the risk of viruses or other malware.

Four, to share the information with other connecting routers in the networking.
Download