Skip to content

IT Essentials Lecture 6: Networking Concepts (Part II)

Networking Protocols, Standards, and Services

Reference Models

Reference models, such as the OSI and TCP/IP models, describe data communication processes.

  • Open Standards:

    • Developed by organizations like IEEE, IETF, and ISO.
    • Ensure compatibility across systems and platforms.
  • Encapsulation:

    • As application data moves down through layers, protocol information is added (headers, footers, etc.).

TCP/IP Model

TCP/IP stands for Transmission Control Protocol/Internet Protocol.

  • Purpose:
    • Framework for the Internet's protocols.
    • Organizes networking tasks into layers.
    • Layers prepare data for network transmission.

Layers:

LayerDescriptionProtocols
ApplicationProvides network services to user applicationsHTTP, HTML, Telnet, FTP, TFTP, SMTP, DNS
TransportEnd-to-end data management and segmentationTCP, UDP
InternetProvides host connectivity, routing, and IP addressingIP, ICMP, RIP, ARP
Network AccessHandles MAC addressing and physical transmissionEthernet, Wi-Fi, PPP

OSI Model

OSI Stand for Open Systems Interconnection.

  • Purpose:

    • Divides network communications into seven layers.
    • Used as a standard framework by most network vendors.
    • Combines hardware (lower layers) and software (higher layers) implementations.
  • Protocol Stack:

    • Can be implemented in hardware, software, or both.
    • Lower layers often in hardware; higher layers in software.

Real-World Example (Email Transmission)

  1. Application Layer: Email client uses SMTP to send an email.
  2. Presentation Layer: Formats email data to be usable by the Application layer and ensures proper encryption, and compression of data.
  3. Session Layer: Establishes a session between sender and recipient.
  4. Transport Layer: Divides data into segments; ensures reliability via TCP.
  5. Network Layer: Routes data across networks using IP.
  6. Data Link Layer: Frames data with MAC addresses for local delivery.
  7. Physical Layer: Transmits data as electrical signals or Wi-Fi.

Layers:

No.LayerDescriptionProtocols
7ApplicationProvides network services to users or applications.HTTP, FTP, SMTP, DNS, POP3, IMAP
6PresentationTranslates data into a format usable by the Application layer (e.g., encryption, compression).SSL/TLS, JPEG, MPEG, ASCII, EBCDIC
5SessionManages communication sessions between applications.NetBIOS, RPC, PPTP
4TransportEnsures reliable data transfer with error correction and flow control.TCP, UDP
3NetworkHandles logical addressing and routing of data packets across networks.IP, ICMP, OSPF, RIP, ARP
2Data LinkManages physical addressing (MAC), error detection and prepares data for transmission.Ethernet, Wi-Fi (802.11), PPP, MAC
1PhysicalDefines physical transmission medium and data encoding.Cables, hubs, repeaters, voltage levels

Comparison: OSI vs. TCP/IP Models

FeatureOSI ModelTCP/IP Model
Layers7 Layers4 Layers
Application Layer MappingSeparate Presentation and SessionCombined in Application layer
Use in NetworkingTheoretical frameworkPractical model

Encapsulation Process

Definition:
Encapsulation involves wrapping data with protocol-specific headers and footers to prepare it for transmission.

  • Steps:
    1. Data: Original information from the application.
    2. Segments: Data divided and prepared by Transport layer.
    3. Packets: Segments are assigned IP addressing by Network layer.
    4. Frames: Packets framed with MAC addresses by Data Link layer.
    5. Bits: Data transmitted as raw signals (binary) via Physical layer.

TCP vs. UDP Protocols

TCP (Transmission Control Protocol)

  • Features:
    • Reliable, ensures data integrity.
    • Acknowledges received data.
    • Resends unacknowledged data.
    • Maintains data sequencing.

UDP (User Datagram Protocol)

  • Features:
    • Unreliable, best-effort delivery.
    • No acknowledgments or retransmissions.
    • Fast, low overhead.
    • Delivers data as it arrives.
FeatureTCPUDP
ReliabilityReliable; acknowledges data.Unreliable; no acknowledgments.
OverheadHigher; ensures data integrity.Lower; fast, lightweight.
Use CaseEmail, file transfer, web browsing.Streaming, gaming, voice calls.
Data SequencingData delivered in order.No guarantee of order.

Application Port Numbers

PCs use source port numbers to track the data flow of different applications. Ports classify communication for specific protocols and services.


World Wide Web Protocols

PortTransport ProtocolApplication ProtocolDescription
53TCP, UDPDNSFinds IP addresses associated with Internet domains. UDP is used for requests; TCP handles responses if required.
80TCPHTTPProvides rules for exchanging text, images, videos, and multimedia files on the web.
443TCP, UDPHTTPSSecure version of HTTP, using encryption and authentication for browser-server communication.

Email and Identity Management Protocols

PortTransport ProtocolApplication ProtocolDescription
25TCPSMTPSends emails from clients to servers or relays messages between servers.
110TCPPOP3Retrieves emails from servers, downloading them to the client.
143TCPIMAPRetrieves emails from servers, with advanced features like folder management and synchronization.
389TCP, UDPLDAPMaintains directory information for user identities and authenticates users across systems.

Remote Access Protocols

PortTransport ProtocolApplication ProtocolDescription
22TCPSSHSecurely accesses remote systems, encrypting data and authentication. Preferred over Telnet for security.
23TCPTelnetProvides an insecure command-line interface on remote systems. Use SSH instead.
3389TCP, UDPRDPEnables graphical remote desktop access, primarily for Windows systems. Requires caution due to full remote control.

File Transport and Management Protocols

PortTransport ProtocolApplication ProtocolDescription
20TCPFTPTransfers files between computers. SFTP (port 22) is preferred for secure transfers.
21TCPFTPEstablishes connections for FTP sessions.
69UDPTFTPA lightweight protocol with less overhead than FTP, for simpler file transfers.
445TCPSMB/CIFSAllows sharing files, printers, and resources on a network.
548TCP, UDPAFPA proprietary protocol by Apple for file services in macOS and classic Mac OS environments.

Network Operations Protocols

PortTransport ProtocolApplication ProtocolDescription
67/68UDPDHCPDynamically assigns IP addresses. The server uses port 67, and the client uses port 68.
137-139UDP, TCPNetBIOS (NetBT)Facilitates communication for older applications over TCP/IP. Each function within NetBIOS uses a specific port in this range.
161/162UDPSNMPMonitors network devices and operations using centralized management stations.
427UDP, TCPSLPDiscovers services on a local network without manual configuration.

Standards Organizations

Several organizations develop and maintain standards for networking and communication technologies.

OrganizationNameTypeStandardsEstablished
ITU-TITU Telecommunication Standardization Sector (formerly CCITT)Sector of the International Telecommunication UnionStandards covering all fields of telecommunications1992
IEEEInstitute of Electrical and Electronics EngineersNon-profit technical professional associationStandards for the computer and electronics industry1884
ISOInternational Organization for StandardizationNetwork of national standards institutesPromotes international standards agreements1947
IABInternet Architecture BoardCommittee and advisory bodyOversees the technical and engineering development of the Internet1979 (formerly ICCB)
IECInternational Electrotechnical CommissionGlobal organizationStandards for electrical, electronic, and related technologies1906
ANSIAmerican National Standards InstitutePrivate non-profit organizationSeeks to establish consensus among groups1918
TIA/EIATelecommunications Industry Association / Electronic Industries AllianceTrade associationsStandards for voice and data wiring for LANsPost-1984 deregulation of the U.S. telephone industry

Ethernet Standards

Ethernet Protocols

  • IEEE 802.3 specifies that networks implement Carrier Sense Multiple Access with Collision Detection (CSMA/CD).
    • End stations "listen" to the wire and transmit data when the network is clear.
    • Collisions may occur during simultaneous transmissions.

Media Types and Transfer Rates

Ethernet StandardMediaTransfer Rates
10BASE-TCategory 3Transfers data at 10 Mb/s.
100BASE-TXCategory 5Ten times faster than 10BASE-T with 100 Mb/s transfer rates.
1000BASE-TCategory 5e, 6Supports data transfer rates of 1 Gb/s.
10GBASE-TCategory 6a, 7Achieves transfer rates of 10 Gb/s.

Wireless Standards

WLAN Standards (IEEE 802.11)

  • CSMA/CA is used to prevent collisions on wireless LANs.
  • Encryption is critical; WPA2 has been the strongest encryption since 2006.

Wireless Ethernet Standards:

StandardBandwidthFrequencyRangeCompatibility
802.11aUp to 54 Mbps5 GHz band100 feet (30 meters)Not compatible with 802.11b, 802.11g, or 802.11n.
802.11bUp to 11 Mbps2.4 GHz band100 feet (30 meters)Compatible with 802.11g.
802.11gUp to 54 Mbps2.4 GHz band100 feet (30 meters)Compatible with 802.11b.
802.11nUp to 540 Mbps5 GHz, 2.4 GHz164 feet (50 meters)Compatible with 802.11b and 802.11g.
802.11acUp to 1.3 Gbps5 GHz band115 feet (35 meters)Compatible with 802.11a and 802.11n.
802.15.1 BluetoothUp to 2 Mbps2.4 GHz or 5 GHz30 feet (10 meters)Not compatible with any other 802.11

Bluetooth, NFC, RFID, Zigbee, and Z-Wave

  • Bluetooth (802.15.1): Used for PANs, operating in the 2.4-2.485 GHz range with up to 7 devices.
  • RFID:
    • Tags can be passive (activated by readers) or active (battery-powered, range up to 100 meters).
    • Operates at 125 MHz to 960 MHz.
  • NFC: Close-range communication for payments, printing, and parking.
  • Zigbee (802.15.4): Mesh networks, supporting up to 65,000 devices with speeds up to 250 kb/s.
  • Z-Wave: Proprietary but widely used for smart homes, supporting 232 devices with speeds up to 100 kb/s.

Cellular Generations

GenerationFeaturesSpeeds
1G/2GAnalog calls (1G); digital voice, caller ID, conference calls (2G).<9.6 Kb/s
2.5GSupports web browsing, audio, and video clips.Up to 237 Kb/s
3GStreaming music and video.Up to 2 Mb/s
4GIPv6, gaming, and high-quality multimedia.Up to 672 Mb/s
LTEEnhanced 4G connectivity; mobile speeds up to 100 Mb/s, stationary up to 1 Gb/s.100 Mb/s (mobile); 1 Gb/s (static)
5GAR/VR support, IoT, smart homes, and cars.Up to 3 Gb/s (download), 1.5 Gb/s (upload)

Server Types and Roles

Server TypeDescription
DHCP ServerProvides IP addressing information to network hosts.
DNS ServerTranslates domain names (e.g., example.com) to IP addresses.
Print ServerManages printers and print jobs for multiple clients.
File ServerStores and shares files using protocols like FTP, SFTP, and SCP.
Web ServerServes web pages using HTTP (port 80) and HTTPS (port 443).
Mail ServerHandles email storage and communication using SMTP, POP, and IMAP.
Proxy ServerActs on behalf of clients, caching frequently accessed web pages.
Authentication ServerProvides Authentication, Authorization, and Accounting (AAA) for network access.
Syslog ServerCollects and stores log messages from network devices for monitoring and analysis.

Network Topologies

Types of LAN Topologies

Physical Topology

  • Defines the physical layout of network components.

Logical Topology

  • Determines how hosts access the medium for communication.

Logical Topologies

  • Broadcast Topology:
    • Hosts broadcast messages to all hosts on the same network segment.
    • No specific transmission order; messages sent on a FIFO basis.
    • Used in Ethernet networks.
  • Token Passing:
    • Network access controlled by sequentially passing a token.
    • Only the host with the token can transmit data.

LAN Physical Topologies

  • Bus:
    • A single central cable connects all devices.
    • Only one device transmits at a time; collisions destroy frames.
  • Ring:
    • Hosts connected in a circular pattern; uses tokens for data transmission.
    • Each device connects to two others
    • Variants: Single-ring and Dual-ring.
  • Star:
    • Central connection point (hub, switch, or router).
    • Simplifies troubleshooting; independent connections for each device.
  • Hierarchical (Extended Star):
    • Additional devices extend a star topology to support larger networks.
  • Mesh:
    • Every device is connected to all (full) or to multiple devices (partial)
    • High reliability; used in WANs and high-availability systems.
  • Hybrid:
    • Combines two or more topologies, such as star-bus or star-ring.

Comparison Table: LAN Physical Topologies

Topology TypeStructureReliabilityScalabilityCostUse Cases
BusSingle central cable for all devicesLow; cable break disrupts allLimited; degrades easilyLowSmall/temporary networks
StarCentral hub/switch for all nodesHigh; central device failureEasy to expandModerateHome, office LANs
RingCircular sequenceModerate; dual-ring improvesModerate; complex changesModerateOlder LANs, token ring networks
MeshFully/partially connected devicesVery high; redundant pathsHighHighMilitary, hospitals, critical WANs
HybridCombination of topologiesDepends on designFlexibleVariesDiverse environments

Types of Networks

  • LAN (Local Area Network): Connects devices in a limited area (home/office).
  • WLAN (Wireless LAN): Wireless connection via access points; copper cabling connects access points.
  • VLAN (Virtual LAN): Logical network segmentation for management, security, and performance.
  • PAN (Personal Area Network): Connects personal devices (e.g., Bluetooth for keyboards, phones, etc.).
  • MAN (Metropolitan Area Network): Covers a campus or city, using wireless or fiber backbones.
  • WAN (Wide Area Network): Interconnects smaller networks (e.g., the Internet).

Network Architectures

Peer-to-Peer (P2P) Networks

  • Decentralized; each device acts as both client and server.
  • No centralized administration; all peers manage their own resources.
  • Limited scalability; performance decreases as peers increase.
  • Low setup cost; no need for expensive servers.
  • Less secure; each device is responsible for its own security.
  • Less reliable; if a peer goes offline, its resources are unavailable.
  • Slower as the network grows; depends on peer resources.
  • Easier maintainance; no central device to manage.
  • Used in file-sharing networks (e.g., BitTorrent).
  • Data storage is distributed across peers.

Client-Server Networks

  • Centralized server manages resources and security.
  • Centralized control by the server.
  • Higher setup cost due to the need for dedicated servers.
  • Highly scalable; servers can handle many clients.
  • More secure; centralized measures can be implemented.
  • More reliable; servers provide consistent availability.
  • Faster; optimized server hardware ensures efficiency.
  • Data storage is centralized on the server; clients access shared data.
  • Requires skilled admins to manage servers.
  • Used in large networks (e.g., corporate systems, web apps).
  • Examples include: Websites, enterprise systems (e.g., Google Drive).

Peer-to-Peer vs. Client-Server Comparison

FeaturePeer-to-PeerClient-Server
ArchitectureDecentralizedCentralized
ControlNo central controlCentralized
CostLow setup costHigh setup cost
ScalabilityLimitedHighly scalable
SecurityLess secureMore secure
ReliabilityLess reliableMore reliable
PerformanceSlower as peers growFaster with optimized hardware
Use CaseSmall networks (file-sharing)Large corporate networks

Bandwidth and Latency

  • Bandwidth: Data transmitted per second, measured in:

    • bps: Bits per second.
    • Kbps: Kilobits per second.
    • Mbps: Megabits per second.
    • Gbps: Gigabits per second.
  • Latency: Time for data to travel from source to destination.

Transmission Modes

ModeDescriptionExample
SimplexOne-way transmission onlyRadio broadcast
Half-DuplexBidirectional, one direction at a timeWalkie-talkies
Full-DuplexSimultaneous bidirectional data flowTelephone call