Ruoky CN Lecture
Ruoky CN Lecture
Ruoky CN Lecture
Lecture Notes
• To send information over the Internet, a computer packs data into Internet Protocol (IP) packets
and labels them with the correct address. They are then sent across a packet switched
interconnected network.
on each end are organized as a sequence of functions called “layers”. The set of modules organized as
layers is also commonly called a “protocol stack”.
Over the years, some layered models have been standardized. The ISO Open Systems Interconnection
(ISO/OSI) layered model has seven layers and was developed by a set of committees under the auspices
In simplex mode, the communication is unidirectional. Among the stations only one can transmit and the
other can only receive.
Half-Duplex
In half-Duplex mode, the communication is bidirectional. In this both station can sent and receive but not
at the same time.
Full-Duplex
• Asynchronous Transmission
In Asynchronous Transmission we send one start bit at the beginning and one stop bit at the end of each
byte. There may be a gap between each byte. Bit stream is divided into packets. Packets are received with
varying delays, so packets can arrive out of order. Some packets are not received correctly.
2. Based on Authentication
• Peer to Peer Connection
In peer-to-peer networks, there are no dedicated servers. All the computers are equal and, therefore,
are Local Area Networks (LAN)
LAN is a small high speed network. In LAN few numbers of systems are interconnected with
networking device to create network. As the distance increases between the nodes or system it
speed decreases. So it is limed to few meters only. Networks which cover close geographical area.
LAN used to link the devices in a single office, building or campus. It provides high speeds over
short distance. Systems are connecting directly to Network. The LAN is owned by private people.
• Chat- IRC (Internet Relay Chat) is used for live discussions on the Internet.
• FTP - File Transfer Protocol is the most common method of transferring files between computers
via the Internet.
• Search Engines - These tools are really a part of the World Wide Web and are often used when
looking for information because the Web has grown so large and is without any inherent
organizational structure.
• Telnet - Creation of a dumb terminal session to a host computer in order to run software applications
on the host system.
• World Wide Web - This is largest, fastest growing, part of the Internet, the part for which Internet
browsers like Netscape’s Navigator and Microsoft’s Explorer were designed. Business is the
leading factor fueling the rapid growth of the Web making information, advertising, and product
ordering readily available to everyone with Web access.
• TCP/IP
• Browser
WAN Protocols
• Frame Relay
Frame relay is used to connect large number of sites in the network because it is relatively
inexpensive to do so. The service provider gives you a frame relay circuit and is charged for the
amount of data and the bandwidth you use as oppose to T1 circuit that charges with a flat monthly
rate whether you use partial bandwidth or the full bandwidth regardless. Frame relay is a high
performance WAN protocol that operates at the Data Link layer and the Physical layer of the OSI
model.
▪ It uses the MAC address for sending frames from one node to other.
▪ It also encrypts the information for security purpose and compress the information
to reduce the number of bits in the information.
Layer 7: Application Layer
▪ It provides the interface to the end user and supports for services such as Email, file
transfer and distributed information service.
TCP/IP model
• TCP/IP protocol suite was developed before the OSI model.
• TCP/IP is a set of protocols developed to allow cooperating computers to share resources across
a network.
• In 1969 the Defense Advanced research projects Agency (DARPA) funded a research and
development project to create an experimental packet switching network. This network is called
ARPANET.
• In 1975 the ARPANET was converted from an experimental network to an operational network,
and the responsibility for administering the network was given to the Defense Communication
Agency (DCA).
• The TCP/IP protocols were adopted as Military Standards (MIL STD) in 1983, and all hosts
connected to the network were required to convert to the new protocols.
• DARPA funded to implement TCP/IP in BerkelyUnix.
• In 1983, the old ARPANET was divided into MILNET and smaller ARPANET. The Internet was
used to refer to the entire network; MILNET and ARPANET.
Advantages of TCP/IP
Open protocol standards, freely available and developed independently from any specific computer
hardware or operating system. A common addressing scheme which is enable to connect the most widely
used networks. It may use any protocols. It connects dissimilar systems. It provides client/server
framework. It provides access to the Internet
The end systems (communicating devices) are labeled A, B, C, D, and so on, and the switches are
labeled I, II, III, IV, and V. Each switch is connected to multiple links.
In the above figure one link is divided into n channel (here n=3).A circuit switched network requires
following three phase during the session.
1. Setup Phase: First of all two system needs to create dedicated circuit or path for
communication. For example in figure xxx when system A needs to connect to system M, it
sends a setup request that includes the address of system M, to switch I. Switch I finds a channel
between itself and switch II that can be dedicated for this purpose. Switch I then sends the
request to switch II, which finds a dedicated channel between itself and switch III.
Switch III informs system M of about system A.
To establish a path system M must send an acknowledgement for the request of A. Only after system A
receives this acknowledgement the connection is established. Only end to end addressing is required for
establishing connection between two end systems.
Not efficient because the link is reserved and can’t be used by other system during the connection.
Minimum delay in data transfer.
Example:Let us consider how long it takes to send a file of 640 Kbits from host A to host B over a circuit-
switched network. Suppose that all links in the network use TDM with 24 slots and have bit rate 1.536
Mbps. Also suppose that it takes 500 msec to establish an end-to-end circuit before A can begin to transmit
Each circuit has a transmission rate of (1.536 Mbps)/24 = 64 Kbps, so it takes (640 Kbits)/(64 Kbps) =
10 seconds to transmit the file. To this 10 seconds we add the circuit establishment time, giving 10.5
seconds to send the file. Note that the transmission time is independent of the number links: the
transmission time would be 10 seconds if the end-to-end circuit passes through one link or onehundred
links.
1234 1
4444 2
6666 ….. 3
2222 .
3
Destination Address
Every packet in a datagram network carries a header that contains information of the destination address
of the packet. When the switch receives the packet, this destination address is examined; the routing table
is consulted to find the corresponding port through which the packet should be forwarded. This address,
unlike the address in a virtual-circuit-switched network, remains the same during the entire journey of the
packet.
Efficiency
The efficiency of a datagram network is better than that of a circuit-switched network; resources are
allocated only when there are packets to be transferred. If a source sends a packet and there is a delay of a
few minutes before another packet can be sent, the resources can be reallocated during these minutes for
other packets from other sources.
Delay
There may be greater delay in a datagram network than in a virtual-circuit network .Although there are no
setup and teardown phases, each packet may experience a wait at a switch before it is forwarded. In
addition, since not all packets in a message necessarily travel through the same switches, the delay is not
uniform for the packets of a message.
Switching in the Internet is done by using the datagram approach to packet switching at the network
layer.
Addressing
Two types of addressing is used in virtual-circuit network
• Global Address: It is an address which can uniquely identify the systems (source or destination) in
a network or internet. This address is used to create virtual circuit identifier only.
• Virtual Circuit Identifier: The identifier that is actually used for data transfer is known as virtual
circuit identifier (VCI). It is a number which is used in a frame between two switches. This VCI
changes from one switch to another. Every switch uses a fixed range of values for VCI.
2. Setup Phase
In the setup phase, a switch creates an entry for a virtual circuit. For example, suppose source
A needs to create a virtual circuit to B. Two steps are required: the setup request and the
acknowledgment.
Figure 8 Setup request in a virtual-circuit network
1. Teardown Phase
In this phase, source A, after sending all frames to B, sends a special frame called a teardown
request. Destination B responds with a teardown confirmation frame. All switches delete the corresponding
entry from their tables.
Note: In virtual-circuit switching, all packets belonging to the same source and destination travel
the same path; but the packets may arrive at the destination with different delays if resource
allocation is on demand.
The packet is traveling through two switches (routers). There are three transmission times (3T), three
propagation times (3Ƭ), data transfer depicted by the sloping lines, a setup delay (which includes
transmission and propagation in two directions), and a teardown delay (which includes transmission and
propagation in one direction).
We ignore the processing time in each switch. The total delay time is
Total delay=3T+3 Ƭ +setup delay + tear down delay
Internet Standards:
Internet Engineering Task Force (IETF):
The IETF is an open international community concerned with the development and operation of
the Internet and its architecture. The IETF was formally established by the Internet Architecture Board
(IAB) in 1986. The IETF meets three times a year; much of its ongoing work is conducted via mailing lists
by working groups. Typically, based upon previous IETF proceedings, working groups will convene at
meetings of the IETF to discuss the work of the IETF working groups. The IETF is administered by the
Internet Society, whose WWW site contains lots of high-quality, Internet-related material.
TheIETF Internet Engineering Task Force) is the body that defines standard Internet operating protocols
such as TCP/IP. The IETF is supervised by the Internet Society Internet Architecture Board (IAB). IETF
members are drawn from the Internet Society's individual and organization membership. Standards are
expressed in the form of Requests for Comments (RFCs). The Internet Engineering Task Force (IETF) is
an organized activity of the Internet Society (ISOC). It is an openstandard organisations, with no formal
membership or membership requirements. All participants and managers are volunteers, though their work
is usually funded by their employers or sponsors.
The IETF started out as an activity supported by the US federal government, but since 1993 it has operated
as a standards development function under the auspices of the Internet society, an international
membership-based non-profit organization. The mission of the IETF is to make the Internet work better by
producing high quality, relevant technical documents that influence the way people design, use, and
manage the Internet.
The Institute of Electrical and Electronics Engineers (IEEE) is a professional association with its
corporate office in New York City and its operations center in Piscataway, New Jersey. It was formed in
1963 from the amalgamation of the American Institute of Electrical Engineers and the Institute of Radio
Engineers. Today it is the world's largest association of technical professionals with more than
400,000 members in chapters around the world. Its objectives are the educational and technical
advancement of electrical and electronic engineering, telecommunications, computer engineering and
allied disciplines.
The IEEE is best known for developing standards for the computer and electronics industry. In
particular, the IEEE 802 standards for LANs are widely followed. IEEE manages the Ethernet address
space and assigns addresses as needed.
IEEE is one of the leading standards-making organizations in the world. IEEE performs its standards
making and maintaining functions through the IEEE Standards Association(IEEE-SA). IEEE standards
affect a wide range of industries including: power and energy, biomedical and healthcare, Information
Technology (IT), telecommunications, transportation, nanotechnology, information assurance, and many
more. In 2013, IEEE had over 900 active standards, with over 500 standards under development. One of
the more notable IEEE standards is the IEEE 802 LAN/MAN group of standards which includes the IEEE
802.3 Ethernet standard and the IEEE 802.11 Wireless Networking standard.
Asynchronous Transfer Mode (ATM ) :
AsynchronousTransferMode,anetworktechnology based on transferring data incellsorpackets of a fixed
size. The cell used with ATM is relatively small compared to units used with older technologies. The small,
constant cell size allows ATM equipment to transmit video, audio, and computer data over the same
network, and assure that no single type of data hogs the line.
Some people think that ATM holds the answer to theInternet bandwidthproblem, but others are
skeptical. ATM creates a fixed channel, or route, between two points whenever data transfer begins. This
differs fromTCP/IP, in which messages are divided into packetsand each packet can take a different route
from source to destination. This difference makes it easier to track and bill data usage across an ATM
network, but it makes it less adaptable to sudden surges in network traffic.
ATM (asynchronous transfer mode) is a dedicated-connection switching technology that organizes
digital data into 53-byte cell units and transmits them over a physical medium using digital signal
technology. Individually, a cell is processed asynchronously relative to other related cells and is queued
before being multiplexed over the transmission path.
Asynchronous transfer mode was designed with cells in mind. This is because voice data is
converted to packets and is forced to share a network with burst data (large packet data) passing through
the same medium. So, no matter how small the voice packets are, they always encounter fullsized data
packets, and could experience maximum queuing delays. This is why all data packets should be of the
same size. The fixed cell structure of ATM means it can be easily switched by hardware without the delays
introduced by routed frames and software switching. This is why some people believe that ATM is the key
to the Internet bandwidth problem. ATM creates fixed routes between two points before data transfer
begins, which differs from TCP/IP, where data is divided into packets, each of which takes a different
route to get to its destination. This makes it easier to bill data usage. However, an ATM network is less
adaptable to a sudden network traffic surge.
The ATM provides data link layer services that run on the OSI's Layer 1 physical links. It
functions much like small-packet switched and circuit-switched networks, which makes it ideal for real-
rime, low-latency data such as VoIP and video, as well as for high-throughput data traffic like file transfers.
A virtual circuit or connection must be established before the two end points can actually exchange data.
• Available Bit Rate: Provides a guaranteed minimum capacity but data can be bursted to higher
capacities when network traffic is minimal.
• Constant Bit Rate: Specifies a fixed bit rate so that data is sent in a steady stream. This is
analogous to a leased line.
• Unspecified Bit Rate: Doesn’t guarantee any throughput level and is used for applications such
as file transfers that can tolerate delays.
• Variable Bit Rate (VBR): Provides a specified throughput, but data is not sent evenly. This
makes it a even popular choice for voice and videoconferencing.
◦ Text imaging
• Forms processing
Use in internet: ATM is normally utilized by Internet service providers on their private long-distance
networks. ATM operates at the data link layer (Layer 2 in the OSI model) over either fiber or twistedpair
cable
• An organization based on public-private partnership since its inception, ITU currently has a
membership of 193 countries and over 700 private-sector entities and academic institutions.
ITU is headquartered in Geneva, Switzerland, and has twelve regional and area offices around the
world.
• ITU membership represents a cross-section of the global ICT sector, from the world's largest
manufacturers and carriers to small, innovative players working with new and emerging
technologies, along with leading R&D institutions and academia.
• Founded on the principle of international cooperation between governments (Member States) and
the private sector (Sector Members, Associates and Academia), ITU is the premier global forum
through which parties work towards consensus on a wide range of issues affecting the future
direction of the ICT industry.
Internet Protocol (IP)
• The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains addressing
information and some control information that enables packets to be routed.
• IP is documented in RFC 791 and is the primary network-layer protocol in the Internet protocol
suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet
protocols.
• IP has two primary responsibilities: providing connectionless, best-effort delivery of datagrams
through an internetwork; and providing fragmentation and reassembly of datagrams to support data
links with different maximum-transmission unit (MTU) sizes.
IP Packet Format
Packets in the IPlayer are called datagrams.A datagram divided into two parts : Header and Data Header
can be from 20 to 60 bytes and contains information for routing and delivery of data.
IP packet fields Details:
IP Addresses
• TCP/IP version 4 or IPv4 uses 32-bit for logical address and IPv6 uses 128-bit for logical
address.
• IP Addresses are divided into five classes: Class A, Class B, Class c, Class C, Class D, Class
E.
Class A:
Net ID Host ID
======8======> =====================24========================>
8 bit 8 bit 8 bit 8 bit
• It uses first octet for network address to uniquely identify the network and rest three octet for
• An important rule is that network address cannot have all 8 bits 0 (zero).
• First bit is set to zero for class A, so following 7 bits in the first octet use to distinguish the
• Similar to the rule that the network portion of the address cannot be all 0s, the host portion of
• You subtract 2 because addresses with all 0s and all 1s are invalid.
Class B:
Net ID Host ID
=============16===============> ===========16=================>
• It uses first two octet for network address to uniquely identify the network and rest two octet
• 10 in the first 2 bits, the following 6 bits in the first octet and all 8 bits in the second octet for
total 14 bits are used to distinguish this network from allother networks.
Class C:
Net ID Host ID
===================24====================== ======8======>
===>
• It uses first three octet for network address to uniquely identify the network and last octet for
• 110 in the first 3 bits, the following 5 bits in the first octet , all 8 bits in the second octet and
all 8 bits in the third octet for total 21 bits are used to distinguish this network from allother
networks.
Class D:
• Class D addresses are called Multicast Address which cannot be used for host.
• The purpose of a multicast address is to enable a server somewhere to send data to a Class D
address that no one host has so that several hosts can listen to that address at the same time.
When you are watching TV on the Internet or listening to the radio on the Internet, your
workstation; instead, a server is sending data to the multicast address. Any host can use
software to listen for data at that address, and many hosts can be listening at once.
Class E:
Special Address:
• Address use for Private use
Class A: 10.0.0.0 to 10.255.255.255
Class B: 172.16.0.0 to 172.31.255.255
Class C: 192.168.0.0 to 192.168.255.255
• Loop Back Address
127.0.0.0 to 127.255.255- For testing the TCP/IP connection.
It cannot be used for host addressing.
BookS
1. Data & Computer Communications, By William Stallings
2. Internetworking with TCP / IP, Principles, Protocols & Architecture, By Douglas E.Comer.
3. Computer Networking Kurose and Ross.
4. Computer Networks, A system approach By Larry L.Peterson, Bruce S. Davie .
5. Data Communications and Networking By Behrouz A.Forouzan
FIREWALL
Introduction
Many organizations have confidential or proprietary information, such as trade secrets, product development
plans, marketing strategies, etc., which should be protected from unauthorized access and modification. One
possible approach is to use suitable encryption/decryption technique for transfer of data between two secure
sites, as we have discussed in the previous lesson. Although these techniques can be used to protect data in
transit, it does not protect data from digital pests and hackers. To accomplish this it is necessary to perform user
authentication and access control to protect the networks from unauthorized traffic. This is known as firewalls.
A firewall system is an electronic security guard and electronic barrier at the same time. It protects and controls
the interface between a private network and an insecure public network as shown in the simplified diagram of
Fig. 8.3.1. It is responsible for partitioning a designated area such that any damage on one side cannot spread
to the other side. It prevents bad things from happening, i.e. loss of information, without preventing good things
from happening, that is controlled exchange of information with the outside world. It essentially enforces an
access control policy between two networks. The manner in which this is implemented varies widely, but in
principle, the firewall can be considered as a pair of mechanisms: one that is used to block traffic, and the other
that is used to permit traffic. Some firewalls place more emphasis on blocking traffic, while others emphasize
on permitting traffic. Probably the most important issue to understand of a firewall is the access control policy
it implements. If a firewall administrator has no idea about what or whom he is protecting his network, what
should be allowed and what should be prohibited, a firewall really won't help his organization. As firewall is a
mechanism for enforcing policy, which affects all the persons behind it, it imposes heavy responsibility on the
administrator of the firewall. In this lesson various issues related to Firewalls are discussed. Figure
Firewall Capabilities
Important capabilities of a firewall system are listed below:
defines a single choke point to keep unauthorized users out of protected network
It prohibits potentially vulnerable services from entering or leaving the network
It provides protection from various kinds of IP spoofing
It provides a location for monitoring security-related events
Audits and alarms can be implemented on the firewall systems
A firewall is a convenient platform for several internet functions that are not security related A firewall can
serve as the platform for IPSec using the tunnel mode capability and can be used to implement VPNs
Limitations of a Firewall
Main limitations of a firewall system are given below:
Firewall cannot protect against any attacks that bypass the firewall. Many organizations buy expensive firewalls
but neglect numerous other back-doors into their network.
A firewall does not protect against the internal threats from traitors. An attacker may be able to break into
network by completely bypassing the firewall, if he can find a ``helpful'' insider who can be fooled into giving
access to a modem pool
Firewalls can't protect against tunneling over most application protocols. For example, firewall cannot protect
against the transfer of virus-infected programs or files
Types of Firewalls
The firewalls can be broadly categorized into the following three types:
Packet Filters
Application-level Gateways
Circuit-level Gateways
Packet Filters: Packet filtering router applies a set of rules to each incoming IP packet and then forwards or
discards it. Packet filter is typically set up as a list of rules based on matches of fields in the IP or TCP header.
An example table of telnet filter rules is given in Fig. 8.3.2. The packet filter operates with positive filter rules.
It is necessary to specify what should be permitted, and everything that is explicitly not permitted is
automatically forbidden.
References
1. William Stallings, Cryptography and Network Security: Principles and Practices, Pearson
Education, 2006
2. Behrouz A. Forouzan, Data Communications and Networking, 3rd Edition, Tata McGraw-Hill
Publishing Company Limited, 2004
3. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security: PRIVATE
Communication in a PUBLIC World, Prentice-Hall of India Private Limited, 2005
4. Norbert Pohlmann and Tim Crothers, Firewall Architecture fot the Enterprise, FIREWALL
MEDIA, 2003