Overview of Network Infrastructure Design
Overview of Network Infrastructure Design
The Important things to consider include balancing security issues with the desire for easy access
to information; building redundancy into the network in anticipation of breakdowns; and
standardizing hardware and software to keep maintenance costs in check.
This includes where data is stored, either in-house or offsite with cloud-based solutions,
what types of information should be accessible, who should be able to access it, and which
types of devices should be included. Firewalls and access servers need to be secure
without slowing down operations.
If an organization hosts its own Web servers, or cannot be without Internet connectivity, a
second connection should be in place. Having an extra switch, wireless router, and a spare
laptop onsite is a good practice for ensuring that downtime is kept to a minimum.
A CEO or director may require special consideration, but if 90 percent of the employees
use the same notebooks, with the same word processing and email programs, a software
or hardware patch across the organization can be conducted much less expensively than if
everyone used a different computer model with different software installed on each.
The logical infrastructure of a network consists of both abstract software elements, such
as networking protocols, and concrete elements, such as specific software
products.
In addition to basic communication protocols such as TCP/IP, the abstract elements of
the logical infrastructure can include security technologies such as digital certificates
and the IP Security (IPSec) protocols.
Fig.-2: Sample example of logical design for small sized network
• Requirements Mapping can show graphically where stuff is, what kind of apps are
used, and existing connectivity
• So, how do we determine what the requirements are for our network?
• Collect requirements service metrics, and delays to help develop
and map requirements
Planning, Implementing and Maintaining
Information Sheet 2
Network Infrastructure
To maintain the network properly, administrators must have an intimate knowledge of the
infrastructure and the technologies used to implement it.
Network infrastructure maintenance includes tasks such as updating operating systems
and applications, monitoring ongoing processes, and troubleshooting problems.
Keeping the network’s operating systems and applications updated is more complicated
than simply downloading the latest patch releases and installing them on all the computers.
For a large and complex network infrastructure, you must be careful to test each release
before deploying it on the production network.
Administrators must monitor many services that are essential to a large network at regular
intervals to ensure they are operating properly.
This monitoring can include regular examination of logs, function testing, and network traffic
analysis.
The network administrator must be capable of configuring these services to log the
appropriate information and of using Windows Server 2008 tools such as Network Monitor
and the Performance console.
Troubleshooting is one of the primary maintenance functions of a network administrator.
Although much of the infrastructure design and implementation process revolves around the
creation of a robust network, problems do occur, and in a large organization, network
failures can mean reduced productivity and loss of revenue.
When examined carefully, these requirements translate into four fundamental network design goals
2.4 Determining Internet protocol addresses
What is an IP packet?
IP packets are created by adding an IP header to each packet of data before it is sent on its
way. An IP header is just a series of bits (ones and zeros), and it records several pieces of
information about the packet, including the sending and receiving IP address. IP headers also
report:
Header length
Packet length
Time to Live (TTL), or the number of network hops a packet can make before it is discarded
Which transport protocol is being used (TCP, UDP, etc.)
In total there are 14 fields for information in IPv4 headers, although one of them is optional.
An IPv4 packet header has a total of 14 fields; among these 14 fields, only one is optional,
which is aptly known as the options component.
1. Version: The first header field is a 4-bit version indicator. In the case of IPv4, the value of
its four bits is set to 0100, which indicates 4 in binary.
2. Internet Header Length: IHL is the 2nd field of an IPv4 header, and it is of 4 bits in size.
This header component is used to show how many 32-bit words are present in the header.
As we know, IPv4 headers have a variable size, so this is used to specify the size of the
header to avoid any errors. This size can be between 20 bytes to 60 bytes.
3. Type of Service: ToS is also called Differentiated Services Code Point or DSCP. This field
is used to provide features related to service quality, such as for data streaming or Voice
over IP (VoIP) calls. It is used to specific how a datagram will be handled.
4. Explicit Congestion Notification: ECN is used to send notifications to the sender or
receive in situations where network congestion happens. This is an optional feature of IPv4
can; if one of the endpoints don’t support it, it is not used.
5. Total Length: This field’s size is 16 bit, and it is used to denote the size of the entire
datagram. The minimum size of an IP datagram is 20 bytes, and at the maximum, it can be
65,535 bytes. Practically, all hosts are required to be able to read 576-byte datagrams. If a
datagram is too large for the hosts in the network, fragmentation is used, which is handled
in the host or packet switch.
6. Identification: The identification or ID field in a packet can identify an IP datagram’s
fragments uniquely. Some have suggested using this field for other things such as adding
information for packet tracing etc.
7. Flags: flag in an IPv4 header is a three-bit field that is used to control and identify
fragments. The following can be their possible configuration:
o Bit 0: this is reserved and has to be set to zero
o Bit 1: DF or do not fragment
o Bit 2: MF or more fragments.
8. Fragment Offset: This field is 13 bit long in length, and it is measured by blocks that units
of 8-byte blocks. These are used to specify the offset of a fragment relative to the start of
the IP datagram, which when it was not fragmented. As you can expect, the first offset of a
fragment is always set to zero. The maximum possible offset is ( 213-1 ) * 8 = 65528, but it
is more than the maximum possible IP Packet length, which is 65,535 bytes long with the
length of a header added in.
9. Time to live: Time to live (or TTL in short) is an 8-bit field to indicate the maximum time the
datagram will be live in the internet system. The time here is measured in seconds, and in
case the value of TTL is zero, the datagram is erased. Every time a datagram is processed,
it’s Time to live is decreased by one second. These are used so that datagrams that are not
delivered are discarded automatically. TTL can be between 0 – 255.
10. Protocol: This is a filed in the IPv4 header reserved to denote which protocol is used in the
later (data) portion of the datagram. For Example, number 6 is used to denote TCP and 17
is used to denote UDP protocol.
11. The header’s checksum: The checksum field is of 16-bit length, and it is used to check
the header for any errors. The header is compared to the value of its checksum at each
hop, and in case the header checksum is not matching, the packet is discarded. Keep in
mind that this is only for the header, and its protocol handles the data field. UDP and TCP,
for example, have their own checksum fields.
12. Source Address: It is a 32-bit address of the source of the IPv4 packet.
13. Destination Address: the destination address is also 32 bit in size, and it contains the
receiver’s address.
14. Options: This is an optional field of the IPv4 header. It is used only when the value of IHL
is set to more than 5. These options contain values and settings for things related to
security. Record route and time stamp etc. You will find that the list of options component
ends with an End of Options or EOL in many cases.
- Time to Live (TTL)- amount of time or “hops” that a packet is set to exist inside a network before being
discarded by a router
- AS- The Internet is a network of networks*, and autonomous systems are the big networks that make up the
Internet
- Border Gateway Protocol (BGP) is the postal service of the Internet. Similarly, when someone
submits data across the Internet, BGP is responsible for looking at all of the available paths that
data could travel and picking the best route
Packets can take different routes to the same place if necessary, just as a group of people driving
to an agreed-upon destination can take different roads to get there.
What is TCP/IP?
The Transmission Control Protocol (TCP) is a transport protocol, meaning it dictates the way data
is sent and received. A TCP header is included in the data portion of each packet that uses
TCP/IP. Before transmitting data, TCP opens a connection with the recipient. TCP ensures that all
packets arrive in order once transmission begins. Via TCP, the recipient will acknowledge
receiving each packet that arrives. Missing packets will be sent again if receipt is not
acknowledged.
TCP is designed for reliability, not speed. Because TCP has to make sure all packets arrive in
order, loading data via TCP/IP can take longer if some packets are missing.
TCP and IP were originally designed to be used together, and these are often referred to as the
TCP/IP suite. However, other transport protocols can be used with IP.
What is UDP/IP?
The User Datagram Protocol, or UDP, is another widely used transport protocol. It's faster than
TCP, but it is also less reliable. UDP does not make sure all packets are delivered and in order,
and it doesn't establish a connection before beginning or receiving transmissions.
2.4.2 Using IP address Version 4
• A unique identifier for a computer or device (host) on a TCP/IP network
• A 32-bit binary number usually represented as 4 decimal numbers separated by a
period Example:
206 .40 .185. 73
11001110.00101000. 10111001.01001001
• Each address is 32 bits’ wide
• Valid addresses can range from 0.0.0.0 to 255.255.255.255
WHY?
Because 11111111b = 25510
• Theoretically, a total of » 4.3 billion addresses are available
WHY?
Because 232 = 4,294,967,29610
Two addresses in one…
• Each address consists of two parts
1. The network address
2. The host address
• Other systems may use more than one address (Ex: IPX)
The Five Network Classes
1. Class A – begins with 0
•
00000001 (110) to 01111111 (12610)
2. Class B – begins with 10
•
10000000 (12810) to 10111111 (19110)
3. Class C – begins with 110
•
11000000 (19210) to 11011111 (22310)
01111111 = 12710
Addresses beginning with 127 are reserved for loopback (127.0.0.1 is YOU)
4. Class D – begins with 1110
•
22410 to 23910
•
Reserved for multicasting
5. Class E – begins with 1111
•
24010 to 25410
•
Reserved for future use
These classes D and E should not be used for host addressing
Which part belongs to the network and which part belongs to the node/host?
Class A – XXXXXXXX.yyyyyyyy.yyyyyyyy.yyyyyyyy
Class B – XXXXXXXX.XXXXXXXX.yyyyyyyy.yyyyyyyy
Class C – XXXXXXXX.XXXXXXXX.XXXXXXXX.yyyyyyyy
Where: -
X = Network and
y = node
Or
IP Addresses*
Class 1st Octet Networks Ids Host IDs
A 1-126 27 = 126 224 = 16M
The OSI model is divided into two layers: upper layers and lower layers.
The upper layer of the OSI model mainly deals with the application related issues, and they
are implemented only in the software. The application layer is closest to the end user. Both
the end user and the application layer interact with the software applications. An upper
layer refers to the layer just above another layer.
The lower layer of the OSI model deals with the data transport issues. The data link layer
and the physical layer are implemented in hardware and software. The physical layer is the
lowest layer of the OSI model and is closest to the physical medium. The physical layer is
mainly responsible for placing the information on the physical medium.
Functions of the OSI Layers
There are the seven OSI layers. Each layer has different functions. A list of seven layers are given
below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1- Physical layer
The main functionality of the physical layer is to transmit the individual bits from one node
to another node.
It is the lowest layer of the OSI model.
It establishes, maintains and deactivates the physical connection.
It specifies the mechanical, electrical and procedural network interface specifications.
Functions of a Physical layer:
Line Configuration: It defines the way how two or more devices can be connected
physically.
Data Transmission: It defines the transmission mode whether it is simplex, half-duplex or
full-duplex mode between the two devices on the network.
Topology: It defines the way how network devices are arranged.
Signals: It determines the type of the signal used for transmitting the information.
2- Data-Link Layer
3-Network Layer
It is a layer 3 that manages device addressing, tracks the location of devices on the network.
It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
The Data link layer is responsible for routing and forwarding the packets.
Routers are the layer 3 devices, they are specified in this layer and used to provide the
routing services within an internetwork.
The protocols used to route the network traffic are known as Network layer protocols.
Examples of protocols are IP and Ipv6.
Functions of Network Layer:
Internetworking: An internetworking is the main responsibility of the network layer. It
provides a logical connection between different devices.
Addressing: A Network layer adds the source and destination address to the header of the
frame. Addressing is used to identify the device on the internet.
Routing: Routing is the major component of the network layer, and it determines the best
optimal path out of the multiple paths from source to the destination.
Packetizing: A Network Layer receives the packets from the upper layer and converts
them into packets. This process is known as Packetizing. It is achieved by internet protocol
(IP).
4-Transport Layer
The Transport layer is a Layer 4 ensures that messages are transmitted in the order in
which they are sent and there is no duplication of data.
The main responsibility of the transport layer is to transfer the data completely.
It receives the data from the upper layer and converts them into smaller units known as
segments.
This layer can be termed as an end-to-end layer as it provides a point-to-point connection
between source and destination to deliver the data reliably.
The two protocols used in this layer are:
Transmission Control Protocol
o It is a standard protocol that allows the systems to communicate over the internet.
o It establishes and maintains a connection between hosts.
o When data is sent over the TCP connection, then the TCP protocol divides the data
into smaller units known as segments. Each segment travels over the internet using
multiple routes, and they arrive in different orders at the destination. The
transmission control protocol reorders the packets in the correct order at the
receiving end.
User Datagram Protocol
o User Datagram Protocol is a transport layer protocol.
o It is an unreliable transport protocol as in this case receiver does not send any
acknowledgment when the packet is received, the sender does not wait for any
acknowledgment. Therefore, this makes a protocol unreliable.
Functions of Transport Layer:
Service-point addressing: Computers run several programs simultaneously due to this
reason, the transmission of data from source to the destination not only from one computer
to another computer but also from one process to another process. The transport layer
adds the header that contains the address known as a service-point address or port
address. The responsibility of the network layer is to transmit the data from one computer
to another computer and the responsibility of the transport layer is to transmit the message
to the correct process.
Segmentation and reassembly: When the transport layer receives the message from the
upper layer, it divides the message into multiple segments, and each segment is assigned
with a sequence number that uniquely identifies each segment. When the message has
arrived at the destination, then the transport layer reassembles the message based on their
sequence numbers.
Connection control: Transport layer provides two services Connection-oriented service
and connectionless service. A connectionless service treats each segment as an individual
packet, and they all travel in different routes to reach the destination. A connection-oriented
service makes a connection with the transport layer at the destination machine before
delivering the packets. In connection-oriented service, all the packets travel in the single
route.
Flow control: The transport layer also responsible for flow control but it is performed end-
to-end rather than across a single link.
Error control: The transport layer is also responsible for Error control. Error control is
performed end-to-end rather than across the single link. The sender transport layer ensures
that message reach at the destination without any error.
5-Session Layer
6-Presentation Layer
A Presentation layer is mainly concerned with the syntax and semantics of the information
exchanged between the two systems.
It acts as a data translator for a network.
This layer is a part of the operating system that converts the data from one presentation
format to another format.
The Presentation layer is also known as the syntax layer.
Functions of Presentation layer:
Translation: The processes in two systems exchange the information in the form of
character strings, numbers and so on. Different computers use different encoding methods,
the presentation layer handles the interoperability between the different encoding methods.
It converts the data from sender-dependent format into a common format and changes the
common format into receiver-dependent format at the receiving end.
Encryption: Encryption is needed to maintain privacy. Encryption is a process of
converting the sender-transmitted information into another form and sends the resulting
message over the network.
Compression: Data compression is a process of compressing the data, i.e., it reduces the
number of bits to be transmitted. Data compression is very important in multimedia such as
text, audio, video.
7-Application Layer
Training, Teaching and Learning Materials Development
An application layer serves as a window for users and application processes to access
network service.
It handles issues such as network transparency, resource allocation, etc.
An application layer is not an application, but it performs the application layer functions.
This layer provides the network services to the end-users.
Functions of Application layer:
File transfer, access, and management (FTAM): An application layer allows a user to
access the files in a remote computer, to retrieve the files from a computer and to manage
the files in a remote computer.
Mail services: An application layer provides the facility for email forwarding and storage.
Directory services: An application provides the distributed database sources and is used
to provide that global information about various objects.
Summary
The OSI Model is a logical and conceptual model that defines network communication
which is used by systems open to interconnection and communication with other systems
In OSI model, layer should only be created where the definite levels of abstraction are
needed.
OSI layer helps you to understand communication over a network
In 1984, the OSI architecture was formally adopted by ISO as an international standard
Layer Name Function Protocols
L-7 Application To allow access to network resources. SMTP, HTTP, FTP, POP3,
SNMP
L- 6 Presentation To translate, encrypt and compress data. MPEG, ASCH, SSL, TLS
L-5 Session To establish, manage, and terminate the NetBIOS, SAP
session
L-4 Transport The transport layer builds on the network TCP, UDP
layer to provide data transport from a
Date April 21, 2021
Plan and Design Internet Infrastructure TTLM Page 32 of 38
By : Meresa H.
process on a source machine to a
process on a destination machine.
L-3 Network To provide internetworking To move IPV5, IPV6, ICMP, IPSEC,
packets from source to destination ARP, MPLS.
L-2 Data Link To organize bits into frames To provide RAPA, PPP, Frame Relay,
hop-to-hop delivery ATM, Fiber Cable, etc.
L- 1 Physical To transmit bits over a medium To RS232, 100BaseTX, ISDN,
provide mechanical and electrical 11.
specifications
The TCP/IP model consists of four layers: the application layer, transport layer, Internet
layer and network layer.
The first four layers provide physical standards, network interface, internetworking, and
transport functions that correspond to the first four layers of the OSI model and these
four layers are represented in TCP/IP model by a single layer called the application layer.
Here, hierarchical means that each upper-layer protocol is supported by two or more lower-level
protocols.
A network layer is the combination of the Physical layer and Data Link layer defined in
the OSI reference model.
It defines how the data should be sent physically through the network.
This layer is mainly responsible for the transmission of the data between two devices
on the same network.
The functions carried out by this layer are encapsulating the IP datagram into
frames transmitted by the network and mapping of IP addresses into physical
addresses.
The protocols used by this layer are Ethernet, token ring, FDDI, X.25, frame relay.
2-Internet Layer
An internet layer is the second layer of the TCP/IP model.
The main responsibility of the internet layer is to send the packets from any network,
and they arrive at the destination irrespective of the route they take.
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP
suite.
Data Encapsulation and Formatting: An IP protocol accepts the data from the transport
layer protocol. An IP protocol ensures that the data is sent and received securely, it
encapsulates the data into message known as IP datagram.
Fragmentation and Reassembly: The limit imposed on the size of the IP datagram by
data link layer protocol is known as Maximum Transmission unit (MTU). If the size of IP
datagram is greater than the MTU unit, then the IP protocol splits the datagram into
smaller units so that they can travel over the local network. Fragmentation can be done by
the sender or intermediate router. At the receiver side, all the fragments are reassembled
to form an original message.
Routing: When IP datagram is sent over the same local network such as LAN, MAN,
WAN, it is known as direct delivery. When source and destination are on the distant
network, then the IP datagram is sent indirectly. This can be accomplished by routing the
IP datagram through various devices such as routers.
ARP Protocol
ARP is a network layer protocol which is used to find the physical address from the IP
address.
The two terms are mainly associated with the ARP Protocol:
o ARP request: When a sender wants to know the physical address of the device,
it broadcasts the ARP request to the network.
o ARP reply: Every device attached to the network will accept the ARP request and
process the request, but only recipient recognize the IP address and sends back
its physical address in the form of ARP reply. The recipient adds the physical
address both to its cache memory and to the datagram header
ICMP Protocol
A datagram travels from router-to-router until it reaches its destination. If a router is unable
to route the data because of some unusual conditions such as disabled links, a device is
on fire or network congestion, then the ICMP protocol is used to inform the sender that the
datagram is undeliverable.
o ICMP Test: ICMP Test is used to test whether the destination is reachable or not.
o ICMP Reply: ICMP Reply is used to check whether the destination device is
responding or not.
The core responsibility of the ICMP protocol is to report the problems, not correct
them. The responsibility of the correction lies with the sender.
ICMP can send the messages only to the source, but not to the intermediate routers
because the IP datagram carries the addresses of the source and destination but not of
the router that it is passed to.
3-Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data which is
being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and Transmission
control protocol.
o It is an unreliable protocol as it discovers the errors but not specify the error.
o User Datagram Protocol discovers the error, and ICMP protocol reports the error
to the sender that user datagram has been damaged.
o UDP does not specify which packet is lost. UDP contains only checksum; it does
not contain any ID of a data segment.
o It creates a virtual circuit between the sender and receiver, and it is active for
the duration of the transmission.
o TCP is a reliable protocol as it detects the error and retransmits the damaged
frames. Therefore, it ensures all the segments must be received and
acknowledged
before the transmission is considered to be completed and a virtual circuit is
discarded.
o At the sending end, TCP divides the whole message into smaller units known
as segment, and each segment contains a sequence number which is required
for reordering the frames to form an original message.
o At the receiving end, TCP collects all the segments and reorders them based on
sequence numbers.
4-Application Layer
An application layer is the topmost layer in the TCP/IP model.
When one application layer protocol wants to communicate with another application layer,
it forwards its data to the transport layer.
There is an ambiguity occurs in the application layer. Every application cannot be placed
inside the application layer except those who interact with the communication system.
For example: text editor cannot be considered in application layer while web browser
using HTTP protocol to interact with the network where HTTP protocol is an application
layer protocol.
HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the
data over the World Wide Web. It transfers the data in the form of plain text, audio, video.
It is known as a Hypertext transfer protocol as it has the efficiency to use in a hypertext
environment where there are rapid jumps from one document to another.
SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used
for managing the devices on the internet by using the TCP/IP protocol suite.
SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that
supports the e-mail is known as a Simple mail transfer protocol. This protocol is used to
send the data to another e-mail address.
DNS: DNS stands for Domain Name System. An IP address is used to identify the
connection of a host to the internet uniquely. But, people prefer to use the names instead
of addresses. Therefore, the system that maps the name to the address is known as
Domain Name System.
TELNET: It is an abbreviation for Terminal Network. It establishes the connection between
the local computer and remote computer in such a way that the local terminal appears to
be a terminal at the remote system.
FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used
for transmitting the files from one computer to another computer.