Internet Working
Internet Working
Personal computer devices that are used to develop the personal area
network are the laptop, mobile phones, media player and play stations.
Advantages:
It is easy to use.
Affordable cost.
It used in the TV remote, AC remotes, etc.
DISADVANTAGES:
PAN has a limited range.
The device with inbuilt WPAN is more expensi
It can only be used for the personal area.
Metropolitan Area Network(MAN)
A metropolitan area network is a network
that covers a larger geographic area by
interconnecting a different LAN to form a
larger network.
Government agencies use MAN to connect to
the citizens and private industries.
In MAN, various LANs are connected to each
other through a telephone exchange line.
The most widely used protocols in MAN are RS-232, Frame Relay, ATM,
ISDN, OC-3, ADSL, etc. A Metropolitan Area Network can range in size
from 5 to 50 km.
It has a higher range than Local Area Network(LAN).
Uses Of Metropolitan Area Network:
MAN is used in communication between the banks in a city.
It can be used in an Airline Reservation.
It can be used in a college within a city.
It can also be used for communication in the military.
ADVANTAGES AND DISADVANTAGES
OF MAN
ADVANTAGES:
It can send data in both directions at the same time.
Metropolitan Area Network allows people to connect LANs.
Metropolitan Area Network usually encompasses several city blocks or an entire city.
DISADVANTAGES:
The data rate is slow in a Metropolitan Area Network compared to LAN.
Compared to LAN, more cable is required to set up a Metropolitan Area Network.
This network’s implementation and management costs are higher than
those of a local area network.
WIDE AREA NETWORK(WAN)
A Wide Area Network is a network that
extends over a large geographical area such as
states or countries.
A Wide Area Network is quite bigger
network than the LAN.
DISADVANTAGES:
It is slow in speed
It is difficult to maintain the network
Maintenance and Security problem
Require high-performance device
ETHERNET
Ethernet is the traditional
technology for connecting devices in a
wired local area network (LAN) or
wide area network (WAN). It enables
devices to communicate with each
other via a protocol, which is a set of
rules or common network language.
Ethernet describes how network devices
format and transmit data so other devices on
the same LAN or campus network can
recognize, receive and process the
information. An Ethernet cable is the
physical, encased wiring over which the data
travels
Connected devices that use cables to access a geographically localized
network -- instead of a wireless connection -- likely use Ethernet. From
businesses to gamers, diverse end users rely on the benefits of Ethernet
connectivity, which include reliability and security.
ADVANTAGES AND DISADVANTAES
OF ETHRENET
ADVANTAGES:
It is not much costly to form an Ethernet network. As compared to other
systems of connecting computers, it is relatively inexpensive.
Ethernet network provides high security for data as it uses firewalls in
terms of data security.
In this network, the quality of the data transfer does maintain.
DISADVANTAGES:
If you create a wired ethernet network that needs cables, hubs, switches,
routers, they increase the cost of installation.
The wired Ethernet network restricts you in terms of distances, and it is
best for using in short distances.
Tunneling
Introduction:-
Tunneling is a protocol for transferring data securely from one network to another.
Using a method known as encapsulation, Tunneling allows private network
communications to be sent across a public network, such as the Internet. Encapsulation
enables data packets to appear general to a public network when they are private data
packets, allowing them to pass unnoticed.
When data is tunneled, it is split into smaller parts called packets, as it travels through
the tunnel. The packets are encrypted via the tunnel, and another process known
as encapsulation takes place. For transmission, private network data and protocol details
are encased in public network transmission units. The units have the appearance of
public data, allowing them to be sent via the Internet. Encapsulation enables packets to
reach their intended destination. De-capsulation and decryption take place at the final
destination.
• To send an IP packet to a host in the London office, a
host in the Paris office constructs the packet
containing an IPv6 address in London, and sends it to
the multiprotocol router that connects the Paris IPv6
network to the IPv4 Internet. When this router gets
the IPv6 packet, it encapsulates the packet with an
IPv4 header addressed to the IPv4 side of the
multiprotocol router that connects to the London IPv6
net- work. That is, the router puts a (IPv6) packet
inside a (IPv4) packet. When this wrapped packet
arrives, the London router removes the original IPv6
packet and sends it onward to the destination host.
Advantage of Tunneling :-
Tunneling is often used in virtual private
networks (VPNs). It can also set up efficient
and secure connections between networks,
enable the usage of unsupported network
protocols, and in some cases allow users to
bypass firewalls.
Disadvantage of Tunneling :-
Cost and Time: As compared to the open-
cut method the initial costing for
commencing a tunnel is higher.
Also, the construction requires much more
time than the open-cut method.
FRAGMENTATION
Fragmentation is done by the network layer when
the maximum size of datagram is greater than
maximum size of data that can be held in a frame
i.e., its Maximum Transmission Unit (MTU).
• The transport layer looks at datagram data limit and frame data limit and
does segmentation in such a way that resulting data can easily fit in a frame
without the need of fragmentation.
•Receiver identifies the frame with the identification (16 bits)
field in the IP header. Each fragment of a frame has the same
identification number.
1)Internal Fragmentation
2)External Fragmentation
Internal Fragmentation:-
In this fragmentation, the process is allocated a memory block of size more than
the size of that process. Due to this some part of the memory is left unused and
this cause internal fragmentation.
External Fragmentation:-
In this fragmentation, although we have total space available that is needed
by a process still we are not able to put that process in the memory because
that space is not contiguous. This is called external fragmentation.
Internet Control Protocols
ADDRESS MAPPING
21.44
Address Resolution Protocol (ARP) helps find the MAC (Media Access
Control) address given the system’s IP address.
The ARP’s main task is to convert the 32-bit IP address (for Ipv4) to a 48-
bit MAC address.
It is also used when one device wants to communicate with some other
device on a local network.
Important ARP terms:
ARP request: Broadcasting a packet over the network to validate whether
we came across the destination MAC address or not.
ARP response/reply: The MAC address response that the source receives
from the destination aids in further communication of the data.
ARP Cache: After resolving the MAC address, the ARP sends it to the
cache stored in a table for future reference. The subsequent
communications can use the MAC address from the table.
Mapping Physical to Logical Address: RARP,
BOOTP, and DHCP
There are occasions in which a host knows its physical address, but needs
to know its logical address. This may happen in two cases:
1. A diskless station is just booted. The station can find its physical address
by checking its interface, but it does not know its IP address.
2. An organization does not have enough IP addresses to assign to each
station; it needs to assign IP addresses on demand. The station can send
its physical address and ask for a short time lease.
RARP
Reverse Address Resolution Protocol (RARP) finds the logical address(IP) for a machine
that knows only its physical address(MAC).
Each host or router is assigned one or more logical (IP) addresses, which are unique and
independent of the physical (hardware) address of the machine.
To create an IP datagram, a host or a router needs to know its own IP address or addresses.
The IP address of a machine is usually read from its configuration file stored on a disk file.
However, a diskless machine is usually booted from ROM, which has minimum booting
information.
The ROM is installed by the manufacturer. It cannot include the IP address because the IP
addresses on a network are assigned by the network administrator.
The machine can get its physical address (by reading its NIC, for example), which is unique
locally. It can then use the physical address to get the logical address by using the RARP
protocol.
A RARP request is created and broadcast on the local network. Another machine on the
local network that knows all the IP addresses will respond with a RARP reply.
The requesting machine must be running a RARP client program,
the responding machine must be running a RARP server
program.
There is a serious problem with RARP,(i.e) Broadcasting is done at the data
link layer. The physical broadcast address, allis in the case of Ethernet, does
not pass the boundaries of a network.
This means that if an administrator has several networks or several subnets, it
needs to assign a RARP server for each network or subnet. This is the reason
that RARP is almost obsolete. Two protocols, BOOTP and DHCP, are
replacing RARP.
BOOTP
The Bootstrap Protocol (BOOTP) is a client/server protocol designed to
provide physical address(MAC) to logical address(IP) mapping. BOOTP is
an application layer protocol.
The administrator may put the client and the server on the same network or
on different networks, as shown in Figure 21.7.
BOOTP messages are encapsulated in a UDP packet, and the UDP packet
itself is encapsulated in an IP packet.
The reader may ask how a client can send an IP datagram when it knows
neither its own IP address (the source address) nor the server's IP address
(the destination address). The client simply uses all 0’s as the source address
and all 1’s as the destination address.
One of the advantages of BOOTP over RARP is that the client and server
are application-layer processes. As in other application-layer processes, a
client can be in one network and the server in another, separated by several
other networks. However, there is one problem that must be solved.
The BOOTP request is broadcast because the client does not know the
IP address of the server. A broadcast IP datagram cannot pass through
any router. To solve the problem, there is a need for an intermediary.
One of the hosts (or a router that can be configured to operate at the
application layer) can be used as a relay. The host in this case is called a
relay agent. The relay agent knows the unicast address of a BOOTP
server. When it receives this type of packet, it encapsulates the message
in a unicast datagram and sends the request to the BOOTP server.
The packet, carrying a unicast destination address, is routed by any
router and reaches the BOOTP server. The BOOTP server knows the
message comes from a relay agent because one of the fields in the
request message defines the IP address of the relay agent. The relay
agent, after receiving the reply, sends it to the BOOTP client
Figure 21.7 BOOTP client and server on the same and different networks
DHCP
BOOTP is not a dynamic configuration protocol. When a client requests its IP address,
the BOOTP server consults a table that matches the physical address of the client with its IP
address. This implies that the binding between the physical address and the IP address of
the client already exists.
The binding is predetermined. However, what if a host moves from one physical network
to another? What if a host wants a temporary IP address?
BOOTP cannot handle these situations because the binding between the physical and IP
addresses is static and fixed in a table until changed by the administrator. BOOTP is a static
configuration protocol.
The Dynamic Host Configuration Protocol (DHCP) has been devised to provide static and
dynamic address allocation that can be manual or automatic.
Static Address Allocation: In this capacity DHCP acts as BOOTP does. It is backward
compatible with BOOTP, which means a host running the BOOTP client can request a static
address from a DHCP server. A DHCP server has a database that statically binds physical
addresses to IP addresses.
Dynamic Address Allocation DHCP has a second database with a pool of
available IP addresses. This second database makes DHCP dynamic. When a
DHCP client requests a temporary IP address, the DHCP server goes to the
pool of available (unused) IP addresses and assigns an IP address for a
negotiable period of time.
Manual and Automatic Configuration One major problem with the
BOOTP protocol is that the table mapping the IP addresses to physical
addresses needs to be manually configured.
This means that every time there is a change in a physical or IP address, the
administrator needs to manually enter the changes.
DHCP, on the other hand, allows both manual and automatic configurations.
Static addresses are created manually.
Dynamic addresses are created automatically.
Note: