Site icon Tutorial

Networking Basics

A network is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information.

Networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software. A host device on a network can be computers, servers, laptops, Personal Digital Assistants (PDAs), or anything a person uses to access the network. Network devices are hubs, repeaters, bridges, switches, router and firewall.

Layered Network Model

The layered network model defines a networking framework for implementing protocols in different layers. Control is passed from one layer to the next, starting at the top most layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

The International Standards Organization (ISO) defined a seven-layer model to standardize networking processes. The benefits to layering networking protocol specifications are many including

TCP/IP Protocol Architecture

TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. The TCP/IP model and related protocols are maintained by the (IETF) or Internet Engineering Task Force. The Internet protocol suite and the layered protocol stack design were in use before the OSI model was established. It has four abstraction layers, each with its own protocols. It has four abstraction layers, each with its own protocols. From highest to lowest, the layers are

Application, Transport, Internet and Network Access Layer

Application Layer

It contains all protocols and methods of process-to-process communications across an Internet Protocol (IP) network. Its methods use the underlying transport layer protocols to establish host-to-host connections. Both TCP/IP and the OSI model specify a group of protocols and methods identified by the name application layer. The following protocols are described in the application layer of the Internet protocol suite.

Transport Layer

The transport layer or layer 4 provides end-to-end communication services for applications by providing services like connection-oriented data stream support, reliability, flow control, and multiplexing. It is contained in the TCP/IP as TCP and in the OSI model as transport layer.

The Transmission Control Protocol (TCP) is used for connection-oriented transmissions, whereas the connectionless User Datagram Protocol (UDP) is used for simpler messaging transmissions. TCP has stateful design for reliable transmission and data stream services. Various services provided by a transport-layer protocol include

Internet Layer or IP Layer

It is a group of internetworking methods, protocols, and specifications used to transport datagrams (packets) from the originating host across network, to destination host specified by a network address (IP address). It facilitates internetworking or connecting multiple networks by gateways.

Internet-layer protocols use IP-based packets and have three functions, for outgoing packets, select the next-hop host (gateway) and transmit the packet to this host by passing it to the appropriate link layer implementation; for incoming packets, capture packets and pass the packet payload up to the appropriate transport-layer protocol, if appropriate. In addition it provides error detection and diagnostic capability. The Version 4 of the IP (IPv4), IP is capable of automatic fragmentation or de-fragmentation of packets, based on the maximum transmission unit (MTU) of link elements.

It is not responsible for reliable transmission and offers “best effort” delivery hence, no proper arrival making network resilient and assigning reliability provision to higher level protocols. In IPv4 (not IPv6), a checksum is used to protect the header of each datagram.

Network Access Layer

It is the lowest layer which provides the means for the system to deliver data to the other devices on a directly attached network. It defines how to use the network to transmit data and thus, must know the details of the underlying network to correctly format the data being transmitted to comply with the network constraints. The TCP/IP Network Access Layer has the functions of all three lower layers of OSI (Network, Data Link, and Physical).

Functions performed at this level include encapsulation of IP datagrams into the frames transmitted by the network, and mapping of IP addresses to the physical addresses used by the network. One of TCP/IP’s strengths is its universal addressing scheme. The IP address must be converted into an address appropriate for physical network over which the datagram is transmitted.

Devices at different layers

Devices at different layers of TCP/P network model are

Data Encapsulation

It is a method for communication protocols to logically separate functions in the network and abstracts it from their underlying structures by inclusion or information hiding within higher level objects. Link encapsulation by the physical layer allows local area networking by higher layers and IP provides global addressing of individual computers; UDP adds application or process selection, i.e., the port specifies the service such as a Web or TFTP server.

The more abstract layer is called the upper layer protocol while the more specific layer is called the lower layer protocol. Encapsulation is a characteristic feature of most networking models, including the OSI Model and TCP/IP suite of protocols. An image of encapsulation of application data descending through the layers

The OSI Reference Model

The OSI or Open System Interconnection reference model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at application layer in source and to bottom layer, over channel to destination and back up hierarchy.

Application (Layer 7)

It supports application and end-user processes. Communication destination is identified, quality of service found, user authentication and privacy are considered and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level.

Presentation (Layer 6)

It provides independence from differences in data representation (e.g., encryption) by translating

from application to network format, and vice versa. It transforms data into the form that the application layer can accept by formatting and encrypting data to be sent across a network so, providing freedom from compatibility problems. It is also called the syntax layer.

Session (Layer 5)

It establishes, manages and terminates connections between applications. It sets up, coordinates,

and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.

Transport (Layer 4)

It provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

Network (Layer 3)

It provides switching and routing technique, creates logical paths called virtual circuits to transmit data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.

Data Link (Layer 2)

In it data packets are encoded and decoded into bits. It handles errors in the physical layer, flow control and frame synchronization. It is divided into two sub layers of Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

Physical (Layer 1)

It transmits the bit stream – electrical impulse, light or radio signal — through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.

OSI Layers and Their Functions

Physical Layer

It is the lowest layer of the OSI model and is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. It describes the electrical/optical, mechanical, and functional interfaces to physical medium, and carries signals for all higher layers. It provides

Data Link Layer

It gives error-free data frames transfer from one node to another over the physical layer, allowing top layers an error-free transmission over the link. The data link layer provides

Network Layer

It controls the operation of the subnet, deciding which physical path the data should take based on network conditions, priority of service, and other factors. It provides

This layer builds headers and uses them to route data to the destination address thus, relieving upper layers. It establishes, maintains and terminates connections across communications subnet.

Peer protocols also exist between a node and its immediate neighbor, but the neighbor may be a node through which data is routed, not the destination station.

Transport Layer

It ensures that messages are delivered error-free, in sequence, and with no losses or duplications. It relieves the higher layer protocols from concern of data transfer. In a reliable network layer with virtual circuit capability, a minimal transport layer is required but, unreliable one only supporting datagrams, the transport protocol should include extensive error detection and recovery. The transport layer provides

There are strict message size limits imposed by the network (or lower) layer so, the transport layer must break up the messages into smaller units, or frames, with a header to each frame.

The transport layer header information must then include control information, such as message start and message end flags, to enable the transport layer on the other end to recognize message boundaries.

The transport layer and the layers above are true “source to destination” or end-to-end layers, and are not concerned with the details of the underlying communications facility. Transport layer software (and software above it) on the source carries on a conversation with similar software on the destination by using message headers and control messages.

Session Layer

It allows session establishment between processes running on different nodes. It provides

Presentation Layer

The presentation layer formats the data to be presented to the application layer. This layer may translate data from a format used by the application layer into a common format at the source then, translate the common format to a format known to application layer at destination. The presentation layer provides

Application Layer

It serves as the window for users and application processes to access network services. This layer contains a variety of commonly needed functions

Apply for IT Support Certification

https://www.vskills.in/certification/certified-it-support-professional

Back to Tutorials

Exit mobile version