Lecture Notes 1
Lecture Notes 1
Lecture Notes 1
ON
PREPARED BY
2. NETWORK LAYER
Network layer – Switching concepts –Circuit switching – Packet switching – IP
3. TRANSPORT LAYER
Transport layer – service – Connection establishment – Flow control -
Transmission control protocol – Congestion control and avoidance – User
datagram protocol - Transport for Real Time Applications (RTP).
4. APPLICATIONS
Applications - DNS – E-Mail Protocols –
OUTCOMES
• Able to trace the flow of information from one node to another node in the
network.
• Able to choose the required functionality at each layer for given application.
Networking Overview
The origin of network from the historical perspectives of electronic
communication it has been into existent for every long time, the idea was
introduce by Samuel Morse through telegraph. The telegraph massage was
officially launch on 24th may 1844, in United State of America which covers
almost 37 miles distances from Washington DC to Baltimore MD. A study
conducted by Alexander Graham Bell to improve the quality and signal
transmissions straight through analog systems in less than 25 years 1867. The
language for electronic communications devices was developed by Emile
Baudot through printing telegraph and signal transmissions by bit-oriented that
requires devices to sent pulses of electricity where either positive or no voltage
at all. The designed is to use Baudot five levels code sent five pulses down the
wire for each character transmitted rather than using Morse code. The machine
was configure and enables encoding and decoding to eliminate the need for
operators at both ends of the wires and it was the first time electronic message
sent by any one.
In 1966 additional technical advancements of networks communications devices
initiate by single persons known as ``Carter`` by attach a telephone receiver that
allowed transmission of voice over the telephone for two way radio. As a result
of developing two way radio transmission by bell which makes American
Government to intervene in other to provide security in communication and
establish a standardizations and regulatory commission in telecommunication
industries in united state of America Federal communication commission
(FCC). In 1975 the federal communication commission introduced new policies
and guidelines for networks communications devices most meets the required
specifications and standards for devices to be connected for phone systems.
Those specifications and guidelines where approved in 1977 and fully become
known a FCC part 68. In years ago after the established federal communication
commission all networks communications devices manufactured by approved
vendors most carries a stamps, trademarks and approval of federal
communication commission (FCC) certified by a regulatory commission to
ensured safety of devices interoperability and information security.
Data Communication:
The information is shared when we communicate. This sharing can be
local or over long distance. Data refers to information presented in
whatever form is agreed upon by the parties creating and using it. Data
communications are the exchange of data between two devices via some
form of transmission medium such as a wire cable. A communication
service enables the exchange of information between users at different
locations. The communicating devices must be a part of a
communication system made up of a combination of hardware (physical
equipment) and software (programs). Communication services &
applications are everywhere. Some examples are given below:
Message: The data that has to be shared. It may include audio, video, text,
images, and numbers.
Sender: The device that transmits the data transmission is the sender. It could
be a video camera, phone, computer, workstation, and so forth.
Receiver: The device that gets the message is known as the receiver. It could be
a video camera, phone, computer, workstation, and so forth.
Medium: The actual channel that a message passes through to go from sender
to recipient is known as the transmission medium. It could be radio waves,
coaxial cable, fiber optic cable, or twisted pair wire.
A protocol is a collection of guidelines that controls data transmissions. It
stands for a consensus among the communicating devices.
Data representation:
Any format, including text, numbers, pictures, music, and video, can contain
information.
Write something
A bit pattern is used to represent text.
The quantity of symbols in a language determines how many bits are used in a
pattern. The collection of bit patterns used to represent text symbols is called
code.
ANSI
The American Standard code for Information Interchange (ASCII) was created
by the American National Standards Institute.7 bits are used for each symbol in
this code.
Enhanced ASCII
An additional 0 is added to the left of the ASCII bit patterns, which doesn't
affect the pattern's value, to make each pattern one byte (8 bits) in size. Unicode
Unicode is used to represent a symbol or code in any language. It makes use of
32 to represent.
ISO
The international organization for standardization known as ISO has designed a code
using a 32 – bit pattern. This code can represent up to 4,294,967,296 symbols.
Numbers
Numbers are also represented by using bit patterns. Instead of using ASCII to
represent numbers, the number is directly converted to a binary number.
Images
Images are also represented by bit patterns. An image is divided into a matrix of
pixels (The smallest element of an image) where each pixel is a small dot having
dimension. Each pixel is assigned a bit pattern. The size and value of the pattern
depends on the image.
Audio
Audio is the recording or broadcasting of sound or music. Audio is by nature
different from text, numbers or images. It is continuous not discrete.
Video
Video is the recording or broadcasting of picture or movie. Video can be produced
either a continuous entity or it can be a combination of images.
In half-duplex mode, each station can both transmit and receive but not at the same
time. When one device is sending, the other can only receive. Ex. Walkie-talkies and
CB (citizen band radios)
Full-duplex
In full-duplex mode, both stations can transmit and receive simultaneously.
When two people are communicating by a telephone line, both can listen and talk at
the same time.
Network:
Definition:
A network is set of devices (nodes) connected by communication
links (media)
A node can be a computer, printer or other device capable of
sending and/or receiving data Link connecting the devices are often called
communication channels most network use distributed processing.
Distributed Processing
Networks use distributed processing in which a task divided among multiple
computers. Separate computers handle a subset instead of a single machine
responsible for all aspects of a process.
Performance
Performance can be measured in terms of transit time, response time, number of
users, type of transmission medium, and capabilities of the connected hardware and
the efficiency of the software.
Transit time
The time required for a message to travel from one device to another.
Response time
The time spent between an inquiry and a response
Reliability
It is measured by the frequency of failure and time required to recover from a failure.
Security
Network security is protecting data from unauthorized access.
Type of connection
Two types of connections
a. Point to point
b. Multipoint
In point-to-point connection the two devices are connected by a dedicated link. The
entire capacity of the link is reserved for transmission between those two devices.
A multipoint (also known as multi drop) connection is one in which more than two
specific devices share a single link. The capacity of the channel is shared either
spatially or temporally.
Physical Topology
Physical Topology refers to the way in which network is laid out physically. The topology of
a network is the geometric representation of the relationship of all the links and the linking
devices. The physical or logical arrangement of a network is also topology. The basic
topologies are
Mesh
Star
Bus
Ring
Networks architectures Designs
A computer network communication is a group of interconnections of systems
in entities to shared resources and not limited to modern computer network. It is
framework that contains detailed information and specifications of physicals
components, configurations, managements its operations, principles and
methods of executions as well as data transmission paths designed.
The computer network devices components are operate globally under open
systems interconnections reference model architectures (OSI) designed by
international standard organisation. The reference model of open systems
interconnection is design with seven layers approach from the physical layer to
applications layer with fixed standards from different vendor equipments
interoperability and applications for network architectures design for data and
voice communications over internet connectivity. Although the OSI reference
models is not widely deployed is rather than consider as basic primary of
network architectures for inter computing and networking communications.
There are others vendors network architectures apart from OSI models in inter-
communications networking such as IBM systems network architectures, Hp
digital equipments corporation, Digital network architectures apple computers
and Novell’s NetWare. The idea of networks computing provides conceptual
frameworks of computer communications and does not give a detail of network
methods and communications systems.
Networks Components Architectures
Local area networks are called LANs. LANs are designed to cover a few
distances of kilometers in organisation offices or several buildings within a
campus. It consist of interconnections of personal computer systems, printers
and other peripherals devices that is capable to shared resources. There are three
basic elements that distinguished LANs with other network, they are as follows.
Figure1
Figure 2
Figure 3
Residential Networks
Figure 4
Networks Topologies
The term network topology refers to physical maps descriptions of nodes and
connecting lines arrangements and technical distance measures of nodes,
interconnections and transmissions rates. There are two types of network
topology measures are physical topology and signal topology.
Physical Topology
The physical topology describe networks layout and how cables are terminate,
end to end cables laying, and connection of each workstation.
Logical Topology
Bus
The topology in which all workstations are directly connected through one
medium line, it is easy to connect other networks peripherals. It consumes less
amount of cables compared with any others topologies.
Figure 5
Star
A star topology all workstations are connected directly through central nodes,
hub, and switch point to point links. The configurations are normally done with
twister pair cables or fiber optic cables LANs. A switch manage and controls all
functions of data transmissions and failure of central workstations transmission
will affect entire connections and downfall or malfunction of one workstation
amongst other that will not affect the connections only the affected one will be
out of connection.
Figure 6
Tree Star
Ring
Mesh
Figure 9
Hybrid
There are various options in designing computer networks systems. it all depend
on organizations capabilities and locations were they want to connect as well as
technical competences of personals in selecting the appropriate topology that
meet the needs of organization in comply with international and local guidelines
and policies.
Wired Connections
Figure 10
The principles and techniques of unshielded twisted pairs a cables termination is
colour codes behind the techniques weather straight cables or cross over. A
cross over cables purposed applied only for two systems without any
intermediary network device (i.e. Switched) between nodes a straight cable
required switched to connects a large numbers of workstations each node with
unique Internet protocols (IP) and systems names and all workstations are
configured in the same workgroups.
In some cases networks engineers/administrators configured each workstations
are automate options of internet protocols (IP) that is only serve machined will
be configured with internet protocol address and routers.
Figure 11
A fiber optic cables single mode (SM) is designed to cover a long distance
trunks and multimode cables basically for inter buildings short distance
connections data and voice transmissions a fibre cables consist of copper and
glass is differs from other cat6 Ethernet cables (Unshielded Twisted Pair) in
term of speeds, thickness, terminations, laying, costs, maintenance and distance
covering.
Wireless Connections
The wireless networking it has been into exiting for many years in
telecommunications industries, wireless is designed to improved internet
connectivity and business transactions for data and voice transmission a cross
the world. The wireless connectivity gives a wide range of benefits amongst its
users and manufacturing industries devices components in relations to
applications and implementations for both home used and public cooperation.
Wireless devices networks components are expensive for the first time of
launching and unreliable in terms of speed and poor security in operations. The
decisions for using both or one out of the two wireless and wired it all depends
with organizations day to day activities.
Figure 12
A wireless networks in compasses interconnections of radios wave
transmissions in wireless communications for data and voices without physical
cables connections in local area networks (LANs) and wide area networks
(WAN). The wireless connections required a few amount of straight unshielded
twisted pairs cables in ever host machined purposely for access points (AP)
configurations.
Table 2.Comparisons between wired and wireless connections
S/ Wired Wireless
N
Applications Layer
The applications layer is the highest layer defined in OSI reference model which
provides accessed to other layers. Application networks process applications
packages that are found in application layers such as Excels, CorelDraw
installed and any network software applications installed in workstations or host
machine (server). The application layer contains higher levels protocols in OSI
reference model which applications required to communicate. The application
layer is categories into two functions user applications and program application.
User applications
All applications process likes simple mail transfer protocols (SMTP), file
transfer protocols (FTP) and hypertext transport protocols (HTTP) they are
using applications functions which give a direct results between sender and
receiver after programs executions.
System application
Dynamic configurations and applications settings on how users will access
programs in application layer to communicate between two nodes. The
protocols of systems application are Domain name services and internet
protocols (DNS and IP). All configurations and setting is considered as
applications systems due the reasons that users have no direct access to
applications and it’s only done by networks administrators.
Presentations Layer
The presentation layer is defined as layer six in open systems reference model
that provides services to application and session layers. It helps in data
transmission and encryptions services between the two nodes in
communications process and syntax management to ensured encryptions and
decryptions of data between sender and receiver hosts communicate using
common languages and understand the encryptions algorithms to provide a
smooth’s of data program for sender or receiver in the networks.
Session Layer
A session layer is an interhost and communications to establish connections
between endpoints for data exchanges. The results for data exchanges is an
orderly procedures for sessions termination, it’s an arrangements for
communications specifications guidelines and communications transparency in
data link layer also charges with the responsibilities for creating sessions and
managing between endpoints and proper termination of sessions.
Transport Layer
The transport layer is capable and responsible of transparency in data transfer
between session’s entities and relieving from any measure with details and ways
in which data transmissions is achieved for cost effective. As names implies a
transport layer ensuring for data segmentations and compliance with quality of
services (QoS) and requirements for media access controls. However a transport
layer protocols and functions in OSI are transmission control protocols and
internet protocols (TCP/IP) and user datagram protocols. It’s supported end to
end network program connections and reliability of data transmissions.
The transmission control protocol and internet protocol (TCP/IP) layer does
similar functions with OSI reference model. It provides services between the
applications packages running on host machine servers and workstations
network interface. The applications for TCP/IP are webs browsers such as
internet explorer and Firefox which found in clients HTTP systems and
protocols is simple mail transfer protocol (SMTP) between mail servers of
sender and recipients.
Transport Layer
The transport layer has two protocols known as transmission control protocols
(TCP) reliable and User Datagram (UDP) unreliable connectionless provides
end to end logical communications between applications that running on
different machines and each layer give a supports service to above it. The
functions of layer are fairly similar the same with international standards
organization OSI reference model, the layer has capabilities of managing and
errors controls.
Internetwork Layer
The internet protocols (IP) defines each workstations with unique (IP) address
and routers on network for easy segmentations and managing. The
implementations of routing information tables fully, the logical IP address
process and guides packet transmissions and understand the whole networks
segments to deliver data correctly.
The network interface defined physical hardware components and protocols that
required for data transmissions across the networks. Onboard networks interface
cards (PCI), switches and routers as a medium to connect host machines and
other workstations through Ethernet protocols between systems and network.
Ethernet is the required cables for IP addressing and entire network topology.
Figure 14
Figure show layers architectures of OSI and TCP model with network diagram
and routing information table.
Network Layer
The network layer in OSI reference model is paths determination and logical
addressing in internet protocols for packets transmissions. It’s a functional and
methodology measurement and comparisons between user datagram (UDP)
connectionless mode and transmission control protocols (TCP) connection
mode among transport entities and provides transport entities independence
routing and delay consideration in routing tables. The routing table allows a
dynamic configuration of routers and switches from different segmentations by
assigning a unique IP addresses for easy identification for troubleshooting and
IP conflict avoidance within networks. It is required for each sources and
destination to know the IP address for packets transmission and (QoS)
parameters.
Data Link
The data link layer is a physical addressing of media access control and logical
links control (MAC and LLC) for packets transmissions paths. It’s clearly
shows how two physical addressing is carrying packets from sources to
destination. Data links is responsible for errors detections and corrections in
physical layer and provides services for sessions (layer 3) and application (layer
1) which is classified as host layer. The MAC and LLC is categories as a sub
layers under institute of electrical electronics engineers (IEEE) policies for best
practices and identifications of MAC behaviors and physical layers also the
LLC is usually used by many TCP protocols.
Physical Layer
A physical layer is responsible for electrical and network cables wiring, binary
transmission and mechanical functions for establishing connections between
physical and data link entities. The connections from physical layer to
application layer i.e. layer 1 to layer 7 in OSI reference model is logical in the
real sense but the reality the physical connections from physical layer
Figure 15
Figure: 1 shows details on how each layer execution in open systems
interconnection reference models from sources to destinations using standards
Ethernets packets switched.
A proposed five layers project (Akari, 2010) the idea to improved efficiency
and performance of existing layers of ISO reference models architectures and
designs not to replace. Any network architecture comprises five layer blueprint
is consider as new next generation network framework. Research work
conducted by (Mehra, 2013) as a result of high demand of organizations and
individuals of ICT infrastructures applications operations for business
transactions and communications globally change work habits and required it
necessity to upgrade bandwidth and transmission devices to international
standards requirements. A British computer communications engineer (Russell,
2012) describes the initiatives and innovations of computer network standards
set by ISO that network engineers are referred as guides to designs standards
network architectures.
Open Standards
Open standards is initiate and create by public and private with common agreed
methodology for the operations of network devices interoperability802.3
Ethernet standards and H.323 for media communication standards
Defector Standards
Industries Standardisations
Collaborative efforts from different professional institutions across the world
come together with common ideas and standards to ensure manufacturers are
producing network devices that are compatible with each other with various
vendors brands. The institutions were form based on dynamic and complexity of
internet architectures and services by professionals institution know as institute
of electrical and electronics (IEEE) emphasis on Ethernet 802.3 standards and
wireless networks ranging from 802.11 to 802.22 for quality of services (QoS)
and spectrum services and management. International standards organisation
(ISO) engaged in monitoring and evolutions of national bodies for computing
recourses and open systems interconnections reference model for best practices
networks communications in different country. The international
telecommunications union (ITU) engaged in global standardisation for
telecommunications networks and internet architectures boards (IAB) were
form purposely as editorial management and documentations for publications
and comments on internet architectures standards and technical developments to
achieved a global standardisations and objectives (IEEE, ITU, IAB and ISO).
Inter-Operability
Network physical components devices where designed from different vendors
in compliance with international standards for interconnections and
compatibility of systems specification to communicate with each other to
achieve predictable results in telecommunications. Interoperability is a system
which serves as a gateway for transmissions to shared resources between sender
and receiver.
Efficiency and Effective
The regulatory body is to ensure the compatibility and efficiency of various
vendor network device and efficiencies of services providers in delivering the
required bandwidth agreed amongst their customer’s subscriber. Information
related to bandwidth physical components and architectures, business plains,
interconnections and quality standards.
Services Measuring and Monitoring
The regulatory bodies is responsible for monitored and detect any inefficiency,
discriminations and exploitations of end users services agreement with internet
services providers and devices vendors in operations. It’s mandatory for ever
ISPs to update and monitor the operations and capacity of their facilities deploy
for interconnections to provide services to their esteem client due to increased
of demand regularly.
Network Components Set-up
All services providers shall be responsible in constructions, installations,
maintenance of equipments within a premises locate for a reliable services to
their respect customers in delivering the services and any upgrade,
modifications and substitutions that may arise shall be agree between services
providers and customers in other to avoid any downtime or inconveniencies.
Equipment’s Safeguard
Each services provides shall be responsible for taking necessary steps and
actions to protections and maintenance of it physical infrastructures for any
likelihood threats likes natural disaster and human interference and disruptions
for safety of communications network resources in various locations. We’re if
the agreement of contract between ISPs and end user to provides all the
necessaries security in terms of the physical felicities by the subscribers within
the premises install the network infrastructures is acceptable.
Equipment’s Interface
All equipments develop for interconnections for each party between services
providers and receiving part (clients) most understand the technical interface of
each other and interoperability in network systems. It is mandatory for both
parties to seek the approval of commissions purposely for equipments capacities
and services agreements to certify the standards and quality of network devices.
Nigeria Bandwidth Policies
The guidelines is strictly applied to licenses internet services providers and any
other internet protocols telecommunications services established under the
commissions 2003 act in compliance with general consumers code of practices.
All services providers based in Nigeria and outside shall compliance with
customer’s code regulations 2006 in respect to subscriptions policies.
In order to ensure good quality of services (QoS) and standards for
bandwidth subscriptions between ISPs and consumers, ever ISPs should
attached consumers code regulations guidelines for practices and
applicable to ISPs shall be governed by general commission regulations.
In view of the consumers code regulations subscriptions for internet
access services all ISPs should disclosed the following information about
bandwidth requirements and detailed specifications for consumers.
ISPs should provide full details of bandwidth capacities and categories to
consumers before conclude to subscriptions. It can be a dedicated or
shared bandwidth and bit transfer rate.
IPSs should provides a good communication channels and policies in
respect to any change of equipments and facilities upgrades that may
results to down time for at least six months notices.
IPSs should give their esteem subscribers a subscriptions fees notice for
re-renewal a maximum of six months before disconnections of services.
IPSs should maintain records of their client’s information for commercial
and reseller’s services.
Network Management
Client Monitoring
With supports of various network management tools installed and configure and
competency of network administrators to monitor transmissions packet data rate
and amount of traffic flows from source to destinations of LANs segment host
communications. Network manager determines the levels performance of
bandwidth is overloaded or not does it required to be upgraded or newer
equipments need to be replaced for effective and efficient transmission speeds.
The network security policies to ensure all networks resources are secure and
users are accessing information based on specific policies configurations
settings by networks managers. The firewalls are configuring to monitor
incoming and outgoing packets on network through TCP/IP protocols.
Zero-error
Information Privacy
Availability
Basically any organization weather small or large has a forecast and planning
tools to prevent any feature disaster occurrence towards to accomplishments or
organizations goals and objectives. Information communication technology
disaster recovery plain is a drafted writing document that contains principles,
procedures, guidelines, policies and technical operations for any natural or
human errors disasters that may likelihood.
Important Elements:
Software that operates on a network management station and is in charge of
requesting and receiving data from SNMP agents is called SNMP Manager.
Software that operates on managed devices and is in charge of gathering and
transmitting data to the SNMP manager is known as an SNMP agent.
Central processing unit (CPU) and application programming interface (API) are
related terms that were not previously discussed.
ICMP: What is it
In IP networks, the ICMP protocol is used for error reporting and diagnostic
purposes. It enables devices to communicate with other devices on the network
by sending error messages and operational data.
A method for sending email messages across servers is called the Simple Mail
Transfer Protocol (SMTP). It functions at the TCP/IP protocol stack's
application layer and is a crucial part of email transmission. Email messages can
be sent and received using the SMTP protocol. We will cover every topic
pertaining to SMTP in this essay.
Since the session is started by the client SMTP, let's refer to it as Let's call the
server SMTP the receiver-SMTP as it is the server SMTP that answers to the
session request. The session will begin with the client-SMTP and end with the
receiver-SMTP responding to the request.
The user interacts with the user agent (UA) in the SMTP model, such as
Microsoft Outlook, Netscape, Mozilla, and so on. Using TCP, and Message
Transfer Agent (MTA) is used to exchange mail. The system administrator is in
charge of setting up a local MTA, so the person sending the mail doesn't have to
deal with it. In order to plan for repeat mail delivery in the event that the
recipient is unavailable, the MTA keeps a small mail queue. The user agents can
then get the information when the MTA delivers the mail to the mailboxes.
The SMTP Mail User Agent (MUA) is a computer program that facilitates
sending and receiving mail. It is in charge of composing emails to be forwarded
to the mail transfer agent (MTA).
Agent for Mail Transfer (MTA): With the aid of SMTP, this software facilitates
the transport of mail across systems.
Local Delivery Agents, often known as mail delivery agents (MDAs), are
essentially systems that assist with the delivery of mail to the local system.
Getting Emails: At specific intervals, the server-side user agent monitors the
inboxes. In the event that information is obtained, the user is notified about the
mail. A list of emails with a brief description of each email in the mailbox
appears when the user tries to view the mail. Users can read the contents of any
email by choosing it and viewing it on the terminal.
An SMTP envelope:
Objective
It is not visible to the email recipient and is separate from the email text and
headers.
The SMTP envelope instructs email servers where to send emails, much
like an envelope directs postal delivery.
It provides the
identification
1. HELO HELO<SP><domain><CRLF> of the sender Mandatory
i.e. the host
name.
It specifies the
MAIL<SP>FROM : <reverse-
2. MAIL originator of Mandatory
path><CRLF>
the mail.
It specifies the
RCPT<SP>TO : <forward-
3. RCPT recipient of Mandatory
path><CRLF>
mail.
It specifies the
4. DATA DATA<CRLF> beginning of Mandatory
the mail.
It closes the
5. QUIT QUIT<CRLF> TCP Mandatory
connection.
connection
remains open.
It is use to
confirm or Highly
7. VRFY VRFY<SP><string><CRLF>
verify the user recommended
name.
Highly
8. NOOP NOOP<CRLF> No operation
recommended
It reverses the
9. TURN TURN<CRLF> role of sender Seldom used
and receiver.
It specifies the
10. EXPN EXPN<SP><string><CRLF> mailing list to Seldom used
be expanded.
It send some
specific
11. HELP HELP<SP><string><CRLF> Seldom used
documentation
to the system.
It send mail to
the terminal if
SOML<SP>FROM : <reverse-
13. SOML possible; Seldom used
path><CRLF>
otherwise to
mailbox.
It send mail to
SAML<SP>FROM : <reverse-
14. SAML the terminal Seldom used
path><CRLF>
and mailbox.
Which port is used by SMTP?
Port 587 is frequently used by the Simple Mail Transfer Protocol (SMTP) for
secure communication over TLS. While port 465 was once supported by many
providers, it is no longer an acknowledged standard. In addition, SMTP relaying
rather than SMTP submission is the primary usage of port 25. Despite not being
an official SMTP port, port 2525 can be a useful substitute.
We cannot reduce the size of the We can reduce the size of the email in
email in SMTP. Extended SMTP.
Advantages of SMTP
If a message is longer than a certain length, SMTP servers may reject the
entire message.
References
https://www.geeksforgeeks.org/simple-mail-transfer-protocol-smtp/