Building Simple Network

Embed Size (px)

Citation preview

  • 7/31/2019 Building Simple Network

    1/47

    Lesson Objectives

    Building a Simple Network

    identify the major components of a computer system and their functionality, and list the

    resources required to install a NIC.distinguish between the processes used to convert between decimal, binary, and

    hexadecimal numbering systems.

    identify the main purposes and functions of networking.identify the purpose of major computer components, and calculate conversions between

    binary, decimal, and hexadecimal numerical systems.

    distinguish between the OSI reference model and the TCP/IP stack.distinguish between basic computer and networking terms, and between the principles

    of the OSI reference model and the TCP/IP protocol stack.

    Ref: http://www.webopedia.com/TERM/C/computer.html

    Computer:

    1

  • 7/31/2019 Building Simple Network

    2/47

    A programmable machine. The two principal characteristics of a computer are:

    o It responds to a specific set ofinstructionsin a well-defined manner.

    o It canexecutea prerecorded list of instructions (aprogram).

    Modern computers are electronic anddigital. The actual machinery -- wires,transistors,and circuits -- is called hardware; the instructions and data are calledsoftware.

    All general-purpose computers require the following hardware components:

    o Memory : Enables a computer to store, at least temporarily, data and programs.

    o Mass storage device : Allows a computer to permanently retain large amounts of

    data. Common mass storage devices includedisk drives andtape drives.

    o Input device : Usually a keyboard andmouse, the input device is the conduit

    through which data and instructions enter a computer.

    o Output device : A display screen,printer, or other device that lets you see what the

    computer has accomplished.

    o Central processing unit (CPU): The heart of the computer, this is the component

    that actually executes instructions.

    In addition to these components, many others make it possible for the basic components to

    work together efficiently. For example, every computer requires abus that transmits datafrom one part of the computer to another.

    Computers can be generally classified by size and power as follows, though there is

    considerable overlap:

    o Personal computer : A small, single-usercomputer based on a microprocessor. In

    addition to the microprocessor, a personal computer has a keyboard for entering

    data, a monitorfor displaying information, and a storage device forsaving data.

    o Workstation : A powerful, single-user computer. A workstation is like a personal

    computer, but it has a more powerful microprocessor and a higher-quality monitor.

    o Minicomputer : A multi-usercomputer capable of supporting from 10 to hundreds

    of users simultaneously.

    o Mainframe : A powerful multi-user computer capable of supporting many

    hundreds or thousands of users simultaneously.

    o Supercomputer : An extremely fast computer that can perform hundreds of

    millions of instructions per second.

    Memory:

    Internalstorage areas in the computer. The term memory identifiesdata storage that comes

    in the form ofchips, and the wordstorage is used for memory that exists on tapes ordisks.

    Moreover, the term memory is usually used as a shorthand forphysicalmemory, which

    2

    http://www.webopedia.com/TERM/C/instruction.htmlhttp://www.webopedia.com/TERM/C/instruction.htmlhttp://www.webopedia.com/TERM/C/instruction.htmlhttp://www.webopedia.com/TERM/C/execute.htmlhttp://www.webopedia.com/TERM/C/execute.htmlhttp://www.webopedia.com/TERM/C/execute.htmlhttp://www.webopedia.com/TERM/C/program.htmlhttp://www.webopedia.com/TERM/C/program.htmlhttp://www.webopedia.com/TERM/C/digital.htmlhttp://www.webopedia.com/TERM/C/digital.htmlhttp://www.webopedia.com/TERM/C/transistor.htmlhttp://www.webopedia.com/TERM/C/transistor.htmlhttp://www.webopedia.com/TERM/C/hardware.htmlhttp://www.webopedia.com/TERM/C/data.htmlhttp://www.webopedia.com/TERM/C/software.htmlhttp://www.webopedia.com/TERM/C/memory.htmlhttp://www.webopedia.com/TERM/C/store.htmlhttp://www.webopedia.com/TERM/C/mass_storage.htmlhttp://www.webopedia.com/TERM/C/device.htmlhttp://www.webopedia.com/TERM/C/disk_drive.htmlhttp://www.webopedia.com/TERM/C/disk_drive.htmlhttp://www.webopedia.com/TERM/C/tape_drive.htmlhttp://www.webopedia.com/TERM/C/tape_drive.htmlhttp://www.webopedia.com/TERM/C/input_device.htmlhttp://www.webopedia.com/TERM/C/keyboard.htmlhttp://www.webopedia.com/TERM/C/mouse.htmlhttp://www.webopedia.com/TERM/C/mouse.htmlhttp://www.webopedia.com/TERM/C/mouse.htmlhttp://www.webopedia.com/TERM/C/output_device.htmlhttp://www.webopedia.com/TERM/C/display_screen.htmlhttp://www.webopedia.com/TERM/C/printer.htmlhttp://www.webopedia.com/TERM/C/CPU.htmlhttp://www.webopedia.com/TERM/C/bus.htmlhttp://www.webopedia.com/TERM/C/personal_computer.htmlhttp://www.webopedia.com/TERM/C/user.htmlhttp://www.webopedia.com/TERM/C/user.htmlhttp://www.webopedia.com/TERM/C/microprocessor.htmlhttp://www.webopedia.com/TERM/C/monitor.htmlhttp://www.webopedia.com/TERM/C/storage_device.htmlhttp://www.webopedia.com/TERM/C/save.htmlhttp://www.webopedia.com/TERM/C/workstation.htmlhttp://www.webopedia.com/TERM/C/minicomputer.htmlhttp://www.webopedia.com/TERM/C/multi_user.htmlhttp://www.webopedia.com/TERM/C/mainframe.htmlhttp://www.webopedia.com/TERM/C/supercomputer.htmlhttp://www.webopedia.com/TERM/M/storage.htmlhttp://www.webopedia.com/TERM/M/storage.htmlhttp://www.webopedia.com/TERM/M/computer.htmlhttp://www.webopedia.com/TERM/M/computer.htmlhttp://www.webopedia.com/TERM/M/data.htmlhttp://www.webopedia.com/TERM/M/data.htmlhttp://www.webopedia.com/TERM/M/chip.htmlhttp://www.webopedia.com/TERM/M/storage.htmlhttp://www.webopedia.com/TERM/M/disk.htmlhttp://www.webopedia.com/TERM/M/physical.htmlhttp://www.webopedia.com/TERM/M/physical.htmlhttp://www.webopedia.com/TERM/C/execute.htmlhttp://www.webopedia.com/TERM/C/program.htmlhttp://www.webopedia.com/TERM/C/digital.htmlhttp://www.webopedia.com/TERM/C/transistor.htmlhttp://www.webopedia.com/TERM/C/hardware.htmlhttp://www.webopedia.com/TERM/C/data.htmlhttp://www.webopedia.com/TERM/C/software.htmlhttp://www.webopedia.com/TERM/C/memory.htmlhttp://www.webopedia.com/TERM/C/store.htmlhttp://www.webopedia.com/TERM/C/mass_storage.htmlhttp://www.webopedia.com/TERM/C/device.htmlhttp://www.webopedia.com/TERM/C/disk_drive.htmlhttp://www.webopedia.com/TERM/C/tape_drive.htmlhttp://www.webopedia.com/TERM/C/input_device.htmlhttp://www.webopedia.com/TERM/C/keyboard.htmlhttp://www.webopedia.com/TERM/C/mouse.htmlhttp://www.webopedia.com/TERM/C/output_device.htmlhttp://www.webopedia.com/TERM/C/display_screen.htmlhttp://www.webopedia.com/TERM/C/printer.htmlhttp://www.webopedia.com/TERM/C/CPU.htmlhttp://www.webopedia.com/TERM/C/bus.htmlhttp://www.webopedia.com/TERM/C/personal_computer.htmlhttp://www.webopedia.com/TERM/C/user.htmlhttp://www.webopedia.com/TERM/C/microprocessor.htmlhttp://www.webopedia.com/TERM/C/monitor.htmlhttp://www.webopedia.com/TERM/C/storage_device.htmlhttp://www.webopedia.com/TERM/C/save.htmlhttp://www.webopedia.com/TERM/C/workstation.htmlhttp://www.webopedia.com/TERM/C/minicomputer.htmlhttp://www.webopedia.com/TERM/C/multi_user.htmlhttp://www.webopedia.com/TERM/C/mainframe.htmlhttp://www.webopedia.com/TERM/C/supercomputer.htmlhttp://www.webopedia.com/TERM/M/storage.htmlhttp://www.webopedia.com/TERM/M/computer.htmlhttp://www.webopedia.com/TERM/M/data.htmlhttp://www.webopedia.com/TERM/M/chip.htmlhttp://www.webopedia.com/TERM/M/storage.htmlhttp://www.webopedia.com/TERM/M/disk.htmlhttp://www.webopedia.com/TERM/M/physical.htmlhttp://www.webopedia.com/TERM/C/instruction.html
  • 7/31/2019 Building Simple Network

    3/47

    refers to the actual chips capable of holding data. Some computers also use virtual memory,

    which expandsphysical memory onto ahard disk.

    Every computer comes with a certain amount of physical memory, usually referred to asmain memory orRAM. You can think ofmain memory as an array of boxes, each of which

    can hold a singlebyte of information. A computer that has 1megabyteof memory,therefore, can hold about 1 million bytes (orcharacters) of information.

    There are several different types of memory:

    o RAM (random-access memory): This is the same as main memory. When used by

    itself, the termRAMrefers to readandwrite memory; that is, you can both writedata into RAM andread data from RAM. This is in contrast to ROM, which

    permits you only to read data. Most RAM is volatile, which means that it requires a

    steady flow of electricity to maintain its contents. As soon as the power is turnedoff, whatever data was in RAM is lost.

    o ROM (read-only memory): Computers almost always contain a small amount ofread-only memory that holds instructions for starting up the computer. Unlike

    RAM, ROM cannot be written to.

    o PROM (programmable read-only memory): A PROM is a memory chip on

    which you canstore aprogram. But once the PROM has been used, you cannotwipe it clean and use it to store something else. Like ROMs, PROMs are non-

    volatile.

    o EPROM (erasable programmable read-only memory): An EPROM is a special

    type of PROM that can be erased by exposing it to ultraviolet light.

    o EEPROM (electrically erasable programmable read-only memory): An

    EEPROM is a special type of PROM that can be erased by exposing it to an

    electrical charge.

    Mass Storage:

    Refers to various techniques anddevices forstoring large amounts ofdata. The earliest

    storage devices were punched paper cards, which were used as early as 1804 to controlsilk-weaving looms. Modern mass storage devices include all types ofdisk drivesand tape

    drives. Mass storage is distinct frommemory, which refers to temporary storage areas

    within the computer. Unlikemain memory, mass storage devices retain data even when the

    computer is turned off.

    The main types of mass storage are:

    o Floppy disks : Relatively slow and have a small capacity, but they areportable,

    inexpensive, and universal.

    o Hard disks : Very fast and with more capacity than floppy disks, but also more

    expensive. Some hard disksystemsare portable (removable cartridges), but most

    are not.

    3

    http://www.webopedia.com/TERM/M/virtual_memory.htmlhttp://www.webopedia.com/TERM/M/physical.htmlhttp://www.webopedia.com/TERM/M/hard_disk.htmlhttp://www.webopedia.com/TERM/M/hard_disk.htmlhttp://www.webopedia.com/TERM/M/main_memory.htmlhttp://www.webopedia.com/TERM/M/RAM.htmlhttp://www.webopedia.com/TERM/M/RAM.htmlhttp://www.webopedia.com/TERM/M/main_memory.htmlhttp://www.webopedia.com/TERM/M/main_memory.htmlhttp://www.webopedia.com/TERM/M/array.htmlhttp://www.webopedia.com/TERM/M/byte.htmlhttp://www.webopedia.com/TERM/M/byte.htmlhttp://www.webopedia.com/TERM/M/megabyte.htmlhttp://www.webopedia.com/TERM/M/megabyte.htmlhttp://www.webopedia.com/TERM/M/megabyte.htmlhttp://www.webopedia.com/TERM/M/character.htmlhttp://www.webopedia.com/TERM/M/RAM.htmlhttp://www.webopedia.com/TERM/M/RAM.htmlhttp://www.webopedia.com/TERM/M/read.htmlhttp://www.webopedia.com/TERM/M/write.htmlhttp://www.webopedia.com/TERM/M/write.htmlhttp://www.webopedia.com/TERM/M/read.htmlhttp://www.webopedia.com/TERM/M/read.htmlhttp://www.webopedia.com/TERM/M/ROM.htmlhttp://www.webopedia.com/TERM/M/instruction.htmlhttp://www.webopedia.com/TERM/M/PROM.htmlhttp://www.webopedia.com/TERM/M/store.htmlhttp://www.webopedia.com/TERM/M/store.htmlhttp://www.webopedia.com/TERM/M/program.htmlhttp://www.webopedia.com/TERM/M/program.htmlhttp://www.webopedia.com/TERM/M/program.htmlhttp://www.webopedia.com/TERM/M/EPROM.htmlhttp://www.webopedia.com/TERM/M/EEPROM.htmlhttp://www.webopedia.com/TERM/M/device.htmlhttp://www.webopedia.com/TERM/M/device.htmlhttp://www.webopedia.com/TERM/M/store.htmlhttp://www.webopedia.com/TERM/M/store.htmlhttp://www.webopedia.com/TERM/M/data.htmlhttp://www.webopedia.com/TERM/M/storage.htmlhttp://www.webopedia.com/TERM/M/disk_drive.htmlhttp://www.webopedia.com/TERM/M/disk_drive.htmlhttp://www.webopedia.com/TERM/M/tape_drive.htmlhttp://www.webopedia.com/TERM/M/tape_drive.htmlhttp://www.webopedia.com/TERM/M/memory.htmlhttp://www.webopedia.com/TERM/M/memory.htmlhttp://www.webopedia.com/TERM/M/computer.htmlhttp://www.webopedia.com/TERM/M/main_memory.htmlhttp://www.webopedia.com/TERM/M/main_memory.htmlhttp://www.webopedia.com/TERM/M/main_memory.htmlhttp://www.webopedia.com/TERM/M/floppy_disk.htmlhttp://www.webopedia.com/TERM/M/portable.htmlhttp://www.webopedia.com/TERM/M/hard_disk.htmlhttp://www.webopedia.com/TERM/M/system.htmlhttp://www.webopedia.com/TERM/M/system.htmlhttp://www.webopedia.com/TERM/M/removable_hard_disk.htmlhttp://www.webopedia.com/TERM/M/virtual_memory.htmlhttp://www.webopedia.com/TERM/M/physical.htmlhttp://www.webopedia.com/TERM/M/hard_disk.htmlhttp://www.webopedia.com/TERM/M/main_memory.htmlhttp://www.webopedia.com/TERM/M/RAM.htmlhttp://www.webopedia.com/TERM/M/main_memory.htmlhttp://www.webopedia.com/TERM/M/array.htmlhttp://www.webopedia.com/TERM/M/byte.htmlhttp://www.webopedia.com/TERM/M/megabyte.htmlhttp://www.webopedia.com/TERM/M/character.htmlhttp://www.webopedia.com/TERM/M/RAM.htmlhttp://www.webopedia.com/TERM/M/RAM.htmlhttp://www.webopedia.com/TERM/M/read.htmlhttp://www.webopedia.com/TERM/M/write.htmlhttp://www.webopedia.com/TERM/M/write.htmlhttp://www.webopedia.com/TERM/M/read.htmlhttp://www.webopedia.com/TERM/M/ROM.htmlhttp://www.webopedia.com/TERM/M/instruction.htmlhttp://www.webopedia.com/TERM/M/PROM.htmlhttp://www.webopedia.com/TERM/M/store.htmlhttp://www.webopedia.com/TERM/M/program.htmlhttp://www.webopedia.com/TERM/M/EPROM.htmlhttp://www.webopedia.com/TERM/M/EEPROM.htmlhttp://www.webopedia.com/TERM/M/device.htmlhttp://www.webopedia.com/TERM/M/store.htmlhttp://www.webopedia.com/TERM/M/data.htmlhttp://www.webopedia.com/TERM/M/storage.htmlhttp://www.webopedia.com/TERM/M/disk_drive.htmlhttp://www.webopedia.com/TERM/M/tape_drive.htmlhttp://www.webopedia.com/TERM/M/tape_drive.htmlhttp://www.webopedia.com/TERM/M/memory.htmlhttp://www.webopedia.com/TERM/M/computer.htmlhttp://www.webopedia.com/TERM/M/main_memory.htmlhttp://www.webopedia.com/TERM/M/floppy_disk.htmlhttp://www.webopedia.com/TERM/M/portable.htmlhttp://www.webopedia.com/TERM/M/hard_disk.htmlhttp://www.webopedia.com/TERM/M/system.htmlhttp://www.webopedia.com/TERM/M/removable_hard_disk.html
  • 7/31/2019 Building Simple Network

    4/47

    o Optical disks : Unlike floppy and hard disks, which use electromagnetism to

    encode data, optical disk systems use a laser toread andwrite data. Optical disks

    have very large storage capacity, but they are not as fast as hard disks. In addition,

    the inexpensive optical disk drives are read-only. Read/write varieties areexpensive.

    o Tapes: Relatively inexpensive and can have very large storage capacities, but theydo not permitrandom accessof data.

    Mass storage is measured inkilobytes (1,024bytes),megabytes (1,024 kilobytes),

    gigabytes (1,024 megabytes) andterabytes (1,024 gigabytes).

    Mass storage is sometimes called auxiliary storage.

    Input Device:

    Any machine that feedsdata into a computer. For example, a keyboard is an input device,

    whereas a display monitoris anoutput device. Input devices other than the keyboard aresometimes called alternate input devices.Mice,trackballs, and light pens are all alternate

    input devices.

    Output Device:

    Any machine capable of representing information from a computer. This includesdisplay

    screens,printers, plotters, and synthesizers.

    Central Processing Unit:

    Abbreviation ofcentralprocessingunit, and pronounced as separate letters. The CPU isthe brains of the computer. Sometimes referred to simply as theprocessororcentral

    processor, the CPU is where most calculations take place. In terms of computing power,the CPU is the most important element of a computer system.

    On large machines, CPUs require one or moreprinted circuit boards. Onpersonalcomputers and smallworkstations, the CPU is housed in a single chip called a

    microprocessor.

    Two typical components of a CPU are:

    The arithmetic logic unit(ALU), which performs arithmetic and logical operations.

    The control unit(CU), which extracts instructions frommemory and decodes and

    executes them, calling on the ALU when necessary.

    U-NET Reference:

    Major Hardware Elements of a computer system:

    Major hardware elements of computers that allow network connectivity include the CPU,

    the bus, drives, memory components, ports and cards.

    4

    http://www.webopedia.com/TERM/M/optical_disk.htmlhttp://www.webopedia.com/TERM/M/read.htmlhttp://www.webopedia.com/TERM/M/read.htmlhttp://www.webopedia.com/TERM/M/write.htmlhttp://www.webopedia.com/TERM/M/write.htmlhttp://www.webopedia.com/TERM/M/read_only.htmlhttp://www.webopedia.com/TERM/M/random_access.htmlhttp://www.webopedia.com/TERM/M/random_access.htmlhttp://www.webopedia.com/TERM/M/random_access.htmlhttp://www.webopedia.com/TERM/M/K.htmlhttp://www.webopedia.com/TERM/M/K.htmlhttp://www.webopedia.com/TERM/M/byte.htmlhttp://www.webopedia.com/TERM/M/megabyte.htmlhttp://www.webopedia.com/TERM/M/megabyte.htmlhttp://www.webopedia.com/TERM/M/gigabyte.htmlhttp://www.webopedia.com/TERM/M/terabyte.htmlhttp://www.webopedia.com/TERM/M/terabyte.htmlhttp://www.webopedia.com/TERM/I/data.htmlhttp://www.webopedia.com/TERM/I/data.htmlhttp://www.webopedia.com/TERM/I/computer.htmlhttp://www.webopedia.com/TERM/I/keyboard.htmlhttp://www.webopedia.com/TERM/I/monitor.htmlhttp://www.webopedia.com/TERM/I/output_device.htmlhttp://www.webopedia.com/TERM/I/output_device.htmlhttp://www.webopedia.com/TERM/I/output_device.htmlhttp://www.webopedia.com/TERM/I/device.htmlhttp://www.webopedia.com/TERM/I/mouse.htmlhttp://www.webopedia.com/TERM/I/trackball.htmlhttp://www.webopedia.com/TERM/I/trackball.htmlhttp://www.webopedia.com/TERM/I/light_pen.htmlhttp://www.webopedia.com/TERM/O/computer.htmlhttp://www.webopedia.com/TERM/O/display_screen.htmlhttp://www.webopedia.com/TERM/O/display_screen.htmlhttp://www.webopedia.com/TERM/O/display_screen.htmlhttp://www.webopedia.com/TERM/O/printer.htmlhttp://www.webopedia.com/TERM/O/printer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/processor.htmlhttp://www.webopedia.com/TERM/C/processor.htmlhttp://www.webopedia.com/TERM/C/computer_system.htmlhttp://www.webopedia.com/TERM/C/printed_circuit_board.htmlhttp://www.webopedia.com/TERM/C/printed_circuit_board.htmlhttp://www.webopedia.com/TERM/C/personal_computer.htmlhttp://www.webopedia.com/TERM/C/personal_computer.htmlhttp://www.webopedia.com/TERM/C/workstation.htmlhttp://www.webopedia.com/TERM/C/workstation.htmlhttp://www.webopedia.com/TERM/C/chip.htmlhttp://www.webopedia.com/TERM/C/microprocessor.htmlhttp://www.webopedia.com/TERM/C/ALU.htmlhttp://www.webopedia.com/TERM/C/ALU.htmlhttp://www.webopedia.com/TERM/C/CU.htmlhttp://www.webopedia.com/TERM/C/instruction.htmlhttp://www.webopedia.com/TERM/C/memory.htmlhttp://www.webopedia.com/TERM/C/memory.htmlhttp://www.webopedia.com/TERM/C/execute.htmlhttp://www.webopedia.com/TERM/M/optical_disk.htmlhttp://www.webopedia.com/TERM/M/read.htmlhttp://www.webopedia.com/TERM/M/write.htmlhttp://www.webopedia.com/TERM/M/read_only.htmlhttp://www.webopedia.com/TERM/M/random_access.htmlhttp://www.webopedia.com/TERM/M/K.htmlhttp://www.webopedia.com/TERM/M/byte.htmlhttp://www.webopedia.com/TERM/M/megabyte.htmlhttp://www.webopedia.com/TERM/M/gigabyte.htmlhttp://www.webopedia.com/TERM/M/terabyte.htmlhttp://www.webopedia.com/TERM/I/data.htmlhttp://www.webopedia.com/TERM/I/computer.htmlhttp://www.webopedia.com/TERM/I/keyboard.htmlhttp://www.webopedia.com/TERM/I/monitor.htmlhttp://www.webopedia.com/TERM/I/output_device.htmlhttp://www.webopedia.com/TERM/I/device.htmlhttp://www.webopedia.com/TERM/I/mouse.htmlhttp://www.webopedia.com/TERM/I/trackball.htmlhttp://www.webopedia.com/TERM/I/light_pen.htmlhttp://www.webopedia.com/TERM/O/computer.htmlhttp://www.webopedia.com/TERM/O/display_screen.htmlhttp://www.webopedia.com/TERM/O/display_screen.htmlhttp://www.webopedia.com/TERM/O/printer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/processor.htmlhttp://www.webopedia.com/TERM/C/computer_system.htmlhttp://www.webopedia.com/TERM/C/printed_circuit_board.htmlhttp://www.webopedia.com/TERM/C/personal_computer.htmlhttp://www.webopedia.com/TERM/C/personal_computer.htmlhttp://www.webopedia.com/TERM/C/workstation.htmlhttp://www.webopedia.com/TERM/C/chip.htmlhttp://www.webopedia.com/TERM/C/microprocessor.htmlhttp://www.webopedia.com/TERM/C/ALU.htmlhttp://www.webopedia.com/TERM/C/CU.htmlhttp://www.webopedia.com/TERM/C/instruction.htmlhttp://www.webopedia.com/TERM/C/memory.htmlhttp://www.webopedia.com/TERM/C/execute.html
  • 7/31/2019 Building Simple Network

    5/47

    Backplane components:

    o Power cord: cord connecting an electric device to an electrical outlet to provide

    power to the device

    o Mouse Port: Port that is designed for connecting a mouse to a PC.

    o Parallel Port: An interface capable of transferring more than one bit simultaneously,used for connecting external devices, such as printers.

    o Serial port: An interface that can be used for serial communication in which only

    one bit is transmitted at a time.

    o Sound card: An expansion board that handles sound functions.

    o Video card: A board that plugs into a PC to give its display capabilities.

    o Network card: An expansion board inserted into a computer to enable connection to

    a network.

    o Interface: A piece of hardware, such as modern connector, that allows two devices

    to be connected together.

    Drives:There are different types of drives the CD-ROM drive, the floppy disk drive, and the hard

    disk drive.

    o CD-ROM drive: A compact disc read only memory drive that can read information

    from a CD-ROM.

    o Floppy disk drive: Disk drive that can read and write to floppy disks.

    o Hard disk drive: Device that reads and writes data on a hard drive.

    CPU:

    The CPU is the brain of the computer where most of the calculations take place. Themicroprocessor is a silicon chip contained within a CPU.

    BUS:

    A bus is a collection of wires through which data is transmitted from one part of a

    computer to another. The bus connects all the internal computer components to the CPU.

    The Industry-Standard Architecture (ISA) and the Peripheral Component Interconnect

    (PCI) are two types of buses.

    Expansion Slots:

    These are the openings in computer into which you can insert a circuit board to add newcapabilities to the computer. The expansion card is a printed circuit board that provides the

    added capabilities to the computer.

    Motherboard:

    The Motherboard is the main circuit board of a computer. The important components on

    the motherboard are -

    o The power supply is the component that supplies power to the computer.

    o The system unit is the main part of a PC. It is the term that encompasses the

    chassis, the microprocessor, the main memory, the bus, and the ports. The system

    5

  • 7/31/2019 Building Simple Network

    6/47

    unit does not contain the keyboard, the monitor, or any other external devices

    connected to the computer.

    o ROM Read Only Memory is the computer memory on which data has been

    prerecorded.

    o PCB Printed Circuit Board is a thin plate on which chips (integrated circuits) and

    other electronic components are placed.o RAM Random Access Memory has new data written into it as well as stored data

    read from it. It is also known as read-write memory. A drawback of RAM is that it

    requires electrical power to maintain data storage. If the computer is turned off or

    loses power, all data stored in RAM is lost unless the data previously saved to disk.

    Laptop Vs PC:

    Laptop computers and notebook computers have become very popular. There are few

    differences between the two.

    o The main difference between PCs and laptops is that laptop components are smaller

    than those found in a PC, they are designed to fit together into a smaller physicalspace, and they use less power when operated. These smaller components can be

    difficult to remove.

    o In a laptop, the expansion slots become Personal Computer Memory Card

    International Association (PCMCIA) card slots, or PC slots, through which NIC,

    modems, hard drives, and other useful devices (usually the size of a thick creditcard) are connected.

    o PCs are more powerful than laptops, but laptops have the advantage of being

    portable, which makes it more convenient to work from home and while traveling

    between offices.

    Application sharing through networks:Network Interface card:

    o A network interface card (NIC) is a printed circuit board that provides network

    communication capabilities to and from a personal computer.

    o Also called a LAN adapter, the NIC plugs into a motherboard and provides port for

    connecting to the network. The NIC constitutes the computer with the local areas

    network (LAN).

    o The NIC communicates with the network through a serial connection, and with the

    computer through a parallel connection.

    o When a NIC is installed in a computer, it requires an interrupt request line (IRQ),

    an input/output (I/O) address, a memory space for the operating system (such as

    DOS or Windows), and drivers in order to perform its function.o An IRQ is a signal that informs a CPU that an event needing its attention has

    occurred. An IRQ is sent over a bus line to the microprocessor.

    o An example of an interrupt request being issued is when a key is pressed on a

    keyboard, and the CPU must move the character from the keyboard to RAM.

    o An I/O address is a location in memory used by an auxiliary device to enter or

    retrieve data from a computer.

    6

  • 7/31/2019 Building Simple Network

    7/47

    When selecting a NIC card for a network, one should consider the following:

    o Type of network: You must choose a NIC to suit the type of network you have,

    Ethernet NICs are designed for Ethernet LANs.

    o Type of media: The type of port or connector used by the NIC for network

    connection is specific to the type of media, such as twisted-pair.

    o Type of Expansion Slot: With regard to the type of expansion slot to use, oneshould consider that because PCI slots are faster than ISA slots, the latter are being

    phased out.

    To install a NIC, one should know about these issues:

    o One must know how the network card is configured, including jumpers, plug-and-

    play software, and erasable programmable read only memory (EPROM).

    o One must know the network card diagnostics; including the vendor supplied

    diagnostics and loopback tests (see the documentation that comes with the card).

    o You must know how to resolve hardware resource conflicts, including IRQ, I/O

    base address, and direct memory access (DMA), which is used to transfer data fromRAM to a device without going through the CPU.

    Understanding Binary Basics:

    At the most basic level, computers perform their computations by using 1s and 0s insteadof the decimal system.

    Computers are made up of electronic switches. At the lowest levels of computation,computers depend on these electronic switches to make decisions. Computers react only to

    electrical impulses, understood by the computer as either on or off states (1s or 0s).

    Bits, bytes and measurement terms:

    Computers can understand and process only data that in a binary format, represented by 0s

    and 1s. These 0s and 1s represent the two possible states of an electrical impulse and

    referred to as binary digits (bits).

    Most computer coding schemes use eight bits to represent a number, letter, or symbol. A

    series of eight bits is referred to as a byte. One byte represents a single addressable storagelocation.

    BIT (b): A bit is the smallest unit of data in a computer. A bit equals 1 or 0 in the binaryformat in which data is processed by computers. Bits per second (bps) is a standard unit of

    measurement for data transmission.

    Byte (B): A byte is a unit of measure used to describe the size of a data file, the amount of

    space on a disk or other storage medium, or the amount of data being sent over a network.

    7

  • 7/31/2019 Building Simple Network

    8/47

    One byte equals eight bits of data. Bytes per second (BPS) is a standard unit of

    measurement of the data transmission rate over a network connection.

    1byte = 8 bits.

    Kilobit (Kb): A kilobit is approximately 1000 bits (1024 bits exactly). Kilobits per second

    (Kbps) is a standard unit of measurement of the data transmission rate over a networkconnection.

    1Kilobit = 1000 bits

    Kilobyte (KB): 1000 bytes = 8000 bits =1Kilobyte [KBps]

    Megabit (Mb): 1 million bits = 1 Megabit (Mbps)

    Megabyte (MB): 1million bytes (1,048,576 bytes exactly) = 8 million bits = 1 Megabyte(MBps)

    Gigabit (Gb): 1 billion bits = 1 Gigabit (Gbps)

    Gigabyte (GB): 1 billion bytes = 8 billion bits = 1Gigabyte (GBps)

    Footnote: it is a common error to confuse KB with Kb and MB with Mb. You should

    remember to do the proper calculations when comparing transmission speeds that are

    measured in KBps and those measured with Kbps. For example, modern software usuallyshows the connection speed in kilobits per second (for example 45Kbps). However,

    popular browsers display file-download speeds in kilobytes per second, meaning that with

    a 45-Kbps.

    Speed Measurement terms commonly used for microprocessors:

    o Hz: A hertz (hz) is a unit of frequency. It is the rate of change in the state or cycle

    in a sound wave, alternating current, or other cyclical waveform. It represents one

    cycle per second and is used to describe the speed of a computer microprocessor.

    o MHz: A megahertz (MHz) represents one million cycles per second. This is a

    common unit of measurement of the speed of a processing chip, such as a computer

    microprocessor.

    o GHz: A gigahertz (GHz) represents one billion cycles per second. This is a

    common unit of measurement of the speed of a processing chip, such as a computer

    microprocessor.

    PC processors are getting faster all the time. The microprocessors used on PCs in the 1980z

    typically ran 10MHz (the original IBM PC was 4.77 MHz). Today they are measured inGHz.

    Understanding Binary Basics:

    Converting a decimal number to a binary number is one of the most common procedures

    performed in computer operations.

    8

  • 7/31/2019 Building Simple Network

    9/47

    Conversion between decimal and binary:

    Computers recognize and process data using the binary or base 2, numbering system. The

    binary numbering system uses only two symbols (0 and 1) instead of the ten symbols usedin the decimal numbering system.

    Example: Convert 100 to binary

    2 100

    2 50 0

    2 25 0

    2 12 1

    2 6 0

    2 3 0

    1 1

    The binary number for 100 is 1100100

    Reference from Google:

    Converting Binary to Decimal -

    Steps:

    1. Get the last digit of the hex number, call this digit the currentDigit.

    2. Make a variable, let's call it power. Set the value to 0.3. Multiply the current digit with (2^power), store the result.

    4. Increment power by 1.

    5. Set the current Digit to the previous digit of the hex number.6. Repeat step 3 until all digits have been multiplied.

    7. Sum the result of step 3 to get the answer number.

    Example

    Convert BINARY 11101 to DECIMAL

    NOTES MULTIPLICATION RESULT

    start from the last digit, which is 1, 1*(2^0) 1

    9

  • 7/31/2019 Building Simple Network

    10/47

    multiply that digit with 2^0, note

    that the power of 0 of any number

    is always 1

    11101 (current digit is in bold)

    process the previous digit, whichis 0, multiply that digit with the

    increasing power of 2

    11101(current digit is in bold)

    0*(2^1) 0

    process the previous digit, which

    is 1, note that 2^2 means 2*2

    11101(current digit is in bold)

    1*(2^2) 4

    process the previous digit, which

    is 1, note that 2^3 means 2*2*2

    11101(current digit is in bold)

    1*(2^3) 8

    process the previous digit, which

    is 1, note that 2^4 means 2*2*2*2

    11101(current digit is in bold)

    1*(2^4) 16

    here, we stop because there's no

    more digit to process

    this number comes from the sumof the RESULTS ANSWER 29

    Basically, this is the same as saying:

    1*(2^4) + 1*(2^3) + 1*(2^2) + 0*(2^1) + 1*(2^0)

    or

    1*(16) + 1*(8) + 1*(4) + 0*(2) + 1*(1)

    The reason it's easier to start backward is because:

    Counting the number of digits takes extra time, and you might count wrongly.

    If you don't remember what a particular power-of-2 value, it's easy to calculate it

    from the previous value. For instance, if you don't remember what the value of2*2*2 is, then just double the value of 2*2 (which you already have - if you had

    started backward).

    10

  • 7/31/2019 Building Simple Network

    11/47

    Another Example

    Convert BINARY 1010 to DECIMAL

    MULTIPLICATION RESULT

    0*(2^0) 0

    1*(2^1) 2

    0*(2^2) 0

    1*(2^3) 8

    ANSWER 10

    Is constructing a table like above required? No, it just depends on your preference. Some

    people are visual, and the table might help. Without a table, it's also easy. If you want to

    be a speed counter, just remember that the value of the multiplier is always the double ofthe previous one.

    1, 2, 4, 8, 16, 32, 64, 128, 256, 512, ...

    POWER OF 2s RESULT

    2^0 1

    2^1 = 2 2

    2^2 = 2*2 4

    2^3 = 2*2*2 82^4 = 2*2*2*2 16

    Example

    Convert BINARY 1010001 to DECIMAL.

    Again, I'm starting backward here:

    (1*1) + (0*2) + (0*4) + (0*8) + (1*16) + (0*32) + (1*64) =

    1 + 0 + 0 + 0 + 16 + 0 + 64 = 81

    BINARY

    Computers work on the principle of number manipulation. Inside the computer, thenumbers are represented inbits andbytes. For example, the number three is represented by

    a byte with bits 0 & 1 set; 00000011. This is numbering system using base 2. Peoplecommonly use a decimal or Base 10 numbering system. What this means is that in Base 10,

    count from 0 to 9 before adding another digit. The number 22 in Base 10 means we have 2

    sets of 10's and 2 sets of 1's.

    11

    http://www.computerhope.com/jargon/c/computer.htmhttp://www.computerhope.com/jargon/b/bit.htmhttp://www.computerhope.com/jargon/b/byte.htmhttp://www.computerhope.com/jargon/c/computer.htmhttp://www.computerhope.com/jargon/b/bit.htmhttp://www.computerhope.com/jargon/b/byte.htm
  • 7/31/2019 Building Simple Network

    12/47

    Base 2 is also known asbinary since there can only be two values for a specific digit; either

    a 0 = OFF or a 1 = ON. You cannot have a number represented as 22 in binary notation.

    The decimal number 22 is represented in binary as 00010110 which by following the belowchart breaks down to:

    Bit Position 7 6 5 4 3 2 1 01 1 1 1 1 1 1 1

    Decimal 128 64 32 16 8 4 2 1

    22 or 00010110:

    All numbers representing 0 are not counted, 128, 64, 32, 8, 1 because 0 represents OFF

    However, numbers representing 1 are counted, 16 + 4 + 2 = 22 because 1 represents ON

    Decimal Values and Binary Equivalents chart:

    DECIMAL BINARY

    1 1

    2 10

    3 11

    4 100

    5 101

    6 110

    7 111

    8 1000

    9 1001

    10 1010

    16 10000

    32 100000

    64 1000000

    100 1100100

    256 100000000

    512 1000000000

    1000 1111110100

    1024 10000000000HEXADECIMAL

    The other major numbering system used by computers is hexadecimal, or Base 16. In thissystem, the numbers are counted from 0 to 9, then letters A to F before adding another

    digit. The letter A through F represents decimal numbers 10 through 15, respectively. The

    below chart indicates the values of the hexadecimal position compared to 16 raised to a

    12

    http://www.computerhope.com/jargon/b/binary.htmhttp://www.computerhope.com/jargon/h/hex.htmhttp://www.computerhope.com/jargon/d/decimal.htmhttp://www.computerhope.com/jargon/b/binary.htmhttp://www.computerhope.com/jargon/h/hex.htmhttp://www.computerhope.com/jargon/d/decimal.htm
  • 7/31/2019 Building Simple Network

    13/47

    power and decimal values. It is much easier to work with large numbers using hexadecimal

    values than decimal.

    To convert a value from hexadecimal to binary, you merely translate each hexadecimal

    digit into its 4-bit binary equivalent. Hexadecimal numbers have either and 0x prefix or an

    h suffix. For example, the hexadecimal number:0x3F7A

    Translates into, Using the Binary chart and the below chart for Hex:0011 1111 0111 1010

    DECIMAL HEXADECIMAL BINARY

    0 0 00001 1 0001

    2 2 0010

    3 3 0011

    4 4 0100

    5 5 0101

    6 6 0110

    7 7 0111

    8 8 1000

    9 9 100110 A 1010

    11 B 1011

    12 C 1100

    13 D 1101

    14 E 1110

    15 F 1111

    From U learning

    Hexadecimal:

    The base 16, or hexadecimal (hex), numbering system is used frequently when working

    with computers because it can be used to represent binary numbers in a more readableform. The computer performs computations in binary, but there are instances when the

    binary output of a computer is expressed in hexadecimal format to make it easier to read.

    Conversion between binary and hexadecimal:

    13

  • 7/31/2019 Building Simple Network

    14/47

    Converting a hexadecimal number to binary and vice versa, is a common task when dealing

    with the 16-bit configuration register in Cisco routers. That 16-bit binary number can be

    represented as a four digit hexadecimal number.For example, 0010000100000010 in binary is equal to 2102 in hex.

    The most commonly way for computers and software to express hexadecimal output isusing 0x in front of the hexadecimal number. Thus, whenever you see 0x, you know

    that the number that follows is a hexadecimal number. For example, 0x1234 means 1234 in

    base 16.

    It is referred to base 16 because it uses 16 symbols. Combinations of these symbols can

    represent all possible numbers. Because there are only 10 symbols that represent digits (0,

    1, 2, 3, 4, 5, 6, 7, 8, 9) and base 16 requires six more symbols, the extra symbols are theletters A, B, C, D, E, F. The A represents the decimal 10, B represents the decimal 11,

    C represents the decimal 12, D represents the decimal 13, E represents the decimal

    14, and F represents the decimal 15.

    Decimal Binary Hex

    0 00000000 00

    1 00000001 01

    2 00000010 02

    3 00000011 03

    4 00000100 04

    5 00000101 05

    6 00000110 06

    7 00000111 07

    8 00001000 08

    9 00001001 0910 00001010 0A

    11 00001011 0B

    12 00001100 0C

    13 00001101 0D

    14 00001110 0E

    15 00001111 0F

    16 00010000 10

    32 00100000 20

    64 01000000 40

    128 10000000 80

    255 11111111 FF

    The position of each symbol (digit) in a hex number represents the base number 16 raised

    to a power (exponent) based on its position. Moving from right to left, the first position

    represents 16^0 (or 1), the second position represents 16^1 (or 16), the third position

    represents 16^2 (or 256), and so on.

    14

  • 7/31/2019 Building Simple Network

    15/47

    Network layer 2 MAC addresses are typically written in hex. For Ethernet and Token ring

    topologies, these addresses are 48 bits, or six octets (one octet is eight bits). Because these

    addresses consist of six distinct octets, you can write them as 12 hex numbers.

    10101010 11110000 11000001 11100010 01110111 01010001

    Octet Bit

    Converting binary to hex is easy because base 16 (hexadecimal) is a power of base 2

    (binary). Every four digits (bits) are equal to one hexadecimal digit. The figure compares

    the binary and hexadecimal numbering systems.

    If there is a binary number that looks like 01011011, you can break it into two groups of

    four bits: 0101 and 1011. When converting these two groups to hex, they become 5 and B,

    so the hexadecimal equivalent of the binary 01011011 is 5B.

    No matter how large the binary number, you always apply the same conversion. First you

    start from the right of the binary number and break the number into groups of four. If thefar left group does not contain four digits, add zero to the left and until there are four digits

    (bits) in every group.

    100100100010111110111110111001001 can be split as follows:

    1 0010 0100 0101 1111 0111 1101 1100 1001 As per the rule add three zero to the

    left, therefore the number becomes

    0001 0010 0100 0101 1111 0111 1101 1100 1001

    And the Hex number is 1245F7DC9

    You can also convert hexadecimal numbers to binary format. To convert from hexadecimalto binary, you convert every hex digit into four binary digits (bits). For example, to

    convert hex AC (0xAC) to binary, you first convert hex A, which is 1010 binary, and then

    convert hex C, which is 1100 binary. So the conversion of hex AC is 10101100 binary.

    NOTE: Make sure you include four binary digits for each hexadecimal character, adding

    zeros to the left of the number when necessary.

    Using a PC on a Network

    This article discusses basic networking technologies and common network applications. It

    identifies the main purposes and functions of networking.

    Basic Networking Terminology

    15

  • 7/31/2019 Building Simple Network

    16/47

    Computer networking, like most industries, has its own jargon, which includes technical

    terms, abbreviations, and acronyms. Without a good grasp of the terminology, it will bedifficult to understand the concepts and processes involved in networking. The following

    list of terms and their definitions is intended to be a quick reference that defines some of

    the most important words, phrases, and acronyms related to computer networking:o A network interface card(NIC), pronounced "nick," is also called the LAN adapter,

    or just the network interface. This card typically goes into an ISA, PCI, or

    PCMCIA (PC card) slot in a computer and connects to the network medium. It then

    connects to other computers through the network media.

    o Media refers to the various physical environments through which transmission

    signals pass. Common network media include twisted-pair, coaxial, and fiber-opticcable, and even the earth's atmosphere through which wireless transmission occurs.

    o Aprotocolis a set of rules. In the case of a network protocol, it is a set of rules by

    which computers communicate. The term "protocol suite" describes a set of several

    protocols that perform different functions related to different aspects of the

    communication process.o Cisco IOS software which runs on Cisco equipment and devices, is the industry-

    leading and most widely deployed network system software. It delivers intelligent

    network services for enabling the rapid deployment of Internet applications.

    Cisco IOS software provides a wide range of functionality, from basic connectivity,

    security, and network management to technically advanced services. The functionality of

    Cisco IOS software is the result of a technological evolution. First-generation networkingdevices could only store and forward data packets.

    Today, Cisco IOS software can recognize, classify, and prioritize network traffic, optimize

    routing, support voice and video applications, and much more. Cisco IOS software runs onmost Cisco routers and Cisco switches. These network devices carry most of the Internet

    traffic today.

    o Network operating system (NOS) usually refers to server software such as

    Windows NT, Windows 2000 Server, Windows Server 2003, Novell NetWare,

    UNIX, and Linux. The term sometimes refers to the networking components of a

    client operating system such as Windows 95 or the Macintosh OS.

    o Connectivity devices refer to several different device types, all of which are used to

    connect cable segments, connect two or smaller networks (or subnets) into a larger

    network, or divide a large network into smaller ones. The term encompasses

    repeaters, hubs, switches, bridges, and routers.

    The following are three categories of networks:

    o A local-area network(LAN) is a network that is confined to a limited geographic

    area. This area can be a room, a floor, a building, or even an entire campus.

    16

  • 7/31/2019 Building Simple Network

    17/47

    o A metropolitan-area network(MAN) is a network that is larger in size than a LAN

    and smaller in size than a WAN. This is a network that covers approximately the

    area of a large city or metropolitan area.

    o A wide-area network(WAN) is made up of interconnected LANs. It spans wide

    geographic areas by using WAN links such as telephone lines or satellite

    technology to connect computers in different cities, countries, or even differentcontinents.

    Network structure is described in the following two ways:

    o The logical topology is the path that the signals take from one computer to another.

    The logical topology may or may not correspond to the physical topology. Forinstance, a network can be a physical "star," in which each computer connects to a

    central hub, but inside the hub the data can travel in a circle, making it a logical

    "ring."

    o Thephysical topology refers to the layout or physical shape of the network, andincludes the topologies in this table.

    Table1: Topologies

    Bus Computers arranged so that cabling goes from one to another in a linear fashion

    Ring When there are no clear beginning points or endpoints within a topology, forming acircle

    Star If the systems "meet in the middle" by connecting to a central hub

    Mesh When multiple redundant connections make pathways to some or all of the endpoints

    Network Applications

    Network applications are software programs that run between different computers

    connected together on a network.

    17

  • 7/31/2019 Building Simple Network

    18/47

    Network applications

    Network applications are software programs that run between different computers

    connected together on a network.

    Some of the more common uses of network applications include using a web browser

    program to find content from the World Wide Web, or using an e-mail program to send e-

    mails over the Internet.

    Network applications are selected based on the type of work that needs to be done. A

    complete set of application-layer programs is available to interface with the Internet. Eachapplication program type is associated with its own application protocol. Some examples

    include:

    o HTTPis the World-Wide-Web communications protocol used to connect to web

    servers. Its primary function is to establish a connection with a web server andtransmit HTML pages to the client browser.

    o Post Office Protocol 3 (POP3) is an application-layer protocol supported by e-mail

    programs for the retrieval of electronic mail. POP3 is a standard e-mail server

    commonly used on the Internet. It provides a message storage container that holdsincoming e-mail until users log on and download their messages.

    o File Transfer Protocol(FTP) is a simple file utility program for transferring filesbetween remote computers, which also provides for basic user authentication.

    o Telnetis a remote access application and protocol for connecting to remote

    computer consoles, which also provides for basic user authentication. Telnet is not

    a graphical user interface but is command-line driven or character mode only.

    o Simple Network Management Protocol(SNMP) is used by network management

    programs for monitoring the network device status and activities.

    18

  • 7/31/2019 Building Simple Network

    19/47

    It is important to emphasize that the application layer is just another protocol layer in the

    OSI model or TCP/IP protocol stack. The programs interface with application layer

    protocols.

    Sending e-mail

    E-mail client applications, (such as Eudora, Microsoft Mail, Pegasus, and Netscape Mail)

    all work with the POP3 protocol. The same principle is true with web browsers. The two

    most popular web browsers are Microsoft Internet Explorer and Netscape Communicator.The appearance of these two web browser programs is very different, but they both work

    with the application layer HTTP protocol.

    Electronic mail enables you to send messages between connected computers. The

    procedure for sending an e-mail document involves two separate processes sending the e-

    mail to the user's post office, which is a computer running the POP3 server software, and

    delivering the e-mail from that post office to the user's e-mail client computer, which is therecipient.

    Computer Networks

    One of the primary purposes of a network is to increase productivity by linking computers

    and computer networks, so that people have easy access to information regardless of

    differences in time, place, or type of computer system.

    19

  • 7/31/2019 Building Simple Network

    20/47

    Components of a network

    Because companies have adopted networks as part of their business strategy, they typically

    subdivide and map corporate networks to the corporate business structure. In the figure, the

    network is defined based on the grouping of employees (users) into a main office andvarious remote access locations.

    A main office is a site where everyone is connected via a LAN and where the bulk ofcorporate information is located. A main office can have hundreds or even thousands of

    people who depend on network access to do their jobs. It may have several LANs, or it

    may be a campus that contains several buildings. Because everyone needs access to centralresources and information, it is common to see a high-speed backbone in a LAN as well as

    a data center with high-performance computers or servers and networked applications.

    A variety of remote access locations connect to the main office or each other using WANservices as follows:

    o In branch offices, smaller groups of people work and connect to each other via a

    LAN. To connect to the main office, these users must use WAN services such as

    Integrated Services Digital Network (ISDN). Although some corporate informationmay be stored at a branch office, it is more likely that branch offices have local

    network resources, such as printers, but have to access information directly from

    the main office.o A home office is where individuals are set up to work from their own home. Home

    office workers most likely require on-demand connections to the main office or abranch office to access information or use network resources such as file servers.

    o Individuals who are mobile users connect to the main office LAN when they are at

    the main office, at the branch office, or on the road. Their network access needs are

    based on where they are located.

    20

  • 7/31/2019 Building Simple Network

    21/47

    In order to understand what types of equipment and services to deploy in a network and

    when to deploy them, it is important to understand the business and user needs. The figure

    shows how to map an organization's business or user requirements to a network.

    Computer networks

    In this example, the business needs may require LAN connectivity within the campus tointerconnect the servers and end-user PCs, and WAN connectivity to connect the campus to

    the remote branch office and telecommuters. The WAN connection to the remote branch

    office requires a permanent connection, such as a leased line, and the home officeconnection requires a dial-up connection, such as ISDN.

    Summary

    When working with computer applications, it is important that you are familiar withnetworking terminology. There are three categories of networks a LAN, a MAN, and a

    WAN. The physical topology of a network is the physical structure of a network. The

    logical topology of a network is the path that signals follow through the network.

    Network applications are software programs that run between different computers

    connected on a network. Each application type has associated protocols depending on the

    function of the application. HTTP is used by applications that access the Internet, POP3 isused by applications that access email services, FTP is used by applications that transfer

    files, Telnet is used by applications that remotely access other machines, and SNMP is used

    by applications that monitor the operation of the network.

    21

  • 7/31/2019 Building Simple Network

    22/47

    Applications interface with protocols in the application layer of the OSI model or TCP/IP

    stack.

    By creating a computer network, you enable access between computers regardless of time,

    place, or type of computer system. Because networks are incorporated into the business

    strategy of a company, a company's network will usually replicate its business structure.Typically, a network will be subdivided to facilitate the branch, home, and main office of

    the company as well as its mobile users.

    Functions of networking:

    OSI model layers and functions

    Origins of the OSI reference model:

    The early development of LANs, MANs, and WANs was chaotic in many ways. The early

    1980s saw tremendous increases in the number and size of networks. As companies

    realized that they could save money and gain productivity by using networking technology,they added networks and expanded existing network as rapidly as new network

    technologies and products were introduced.

    By the middle of the 1980s, companies began to experience difficulties from all the

    expansions they had made. It became more difficult for networks using differentspecifications and implementations to communicate with each other. The companies

    realized that they needed to move away from proprietary networking systems, those

    systems which are privately developed, owned, and controlled.

    A standard or technology may be

    o Proprietary means that one company or a small group of companies control(s) all

    usage of the technology. In the computer industry, proprietary is the opposite of

    open.

    o Open means that free usage of the technology is available to the public.

    To address the problem of networks being incompatible and unable to communicate with

    each other, the International Organization for Standardization (ISO) researched different

    network schemes. As a result of this research, the ISO created a model that would helpvendors create network that would be compatible with, and operate with other networks.

    The Open Systems Interconnection (OSI) reference model, released in 1984, was the

    descriptive scheme that the ISO had created. It provided vendors with a set of standardsthat ensured greater compatibility and interoperability between the various types od

    network technologies produced by companies around the world.

    Although other models exist, most network vendors today relate their products to the OSI

    reference mode, especially when they want to educate customers on the use of their

    products. It is considered the best tool available for teaching people about sending andreceiving data on a network.

    22

  • 7/31/2019 Building Simple Network

    23/47

    The OSI reference model has seven numbered layers, each illustrating a particular network

    function. This separation of networking functions is called layering.

    1. Physical Layer

    2. Data0link Layer3. Network Layer

    4. Transport Layer

    5. Session Layer6. Presentation Layer

    7. Application Layer

    The OSI reference model defines the network functions that occur at each layer. Moreimportantly, the OSI reference model facilitates an understanding of how information

    travels throughout a network.

    In addition, the OSI reference model describes how data travels from application programs(for example, spreadsheets,) through a network medium, to an application program located

    in another computer, even if the sender and receiver are connected using different networkmedia.

    OSI layers and functions:

    The practice of moving information between computers is divided into seven techniques in

    the OSI reference model. Each of the seven techniques is represented by its own layer in

    the model.

    The seven layers are as follows:

    1. Physical Layer

    2. Data0link Layer

    3. Network Layer4. Transport Layer

    5. Session Layer

    6. Presentation Layer

    7. Application Layer

    Dividing the network into seven layers provides the following advantages:

    o Accelerates evolution: Layering accelerates evolution by providing for effective

    updates and improvements to individual components without affecting other

    components or having to rewrite the entire protocol.

    o Ensures interoperable technology: Layering prevents changes in one layer from

    affecting the other layers, allowing for quicker development, and ensuring

    interoperable technology.

    23

  • 7/31/2019 Building Simple Network

    24/47

    o Facilitates modular engineering: Layering allows different types of network

    hardware and software to communicate with each other, thereby facilitating

    modular engineering.

    o Reduces complexity: Layering breaks network communication into smaller,

    simpler parts and reduces complexity.

    o Standardizes interfaces: Layering standardizes network component interfaces toallow multiple-vendor development and support.

    o Simplifies teaching and learning: Layering breaks network communication into

    smaller components to make learning easier, thereby simplifying teaching.

    Each OSI layer contains a set of functions performed by programs to enable data packets totravel from a source to a destination on a network. The functions are as follows

    Application Layer:

    The application layer is the OSI layer that is closest to the user. This layer provides

    network services to the users applications. It differs from the other layers in that it does

    not provide services to any other OSI layer, but rather, only to applications outside the OSImodel.

    The application layer establishes the availability of intended communication partners and

    synchronizes and establishes agreement on procedures for error recovery and control ofdata integrity.

    Presentation Layer:

    The presentation layer ensures that the information that the application layer of one system

    sends out is readable by an application layer of another system.

    For example, a PC program communicates with another computer, one using extendedbinary coded decimal interchange code (EBCDIC) and the other using ASCII to represent

    the same characters.

    If necessary, the presentation layer translates between multiple data formats by using a

    common format.

    Session Layer:

    The session layer establishes, manages and terminates sessions between two

    communicating hosts. It provides its services to the presentation layer. The session layeralso synchronizes dialogue between the presentation layers of the two hosts and manages

    their data exchange.

    For example, web servers have many users, so there are many communication processesopen at a given time. It is important to keep track of which user communicates on which

    path.

    24

  • 7/31/2019 Building Simple Network

    25/47

    In addition to session regulation, the session layer offers provisions for efficient data

    transfer, class of service, and exception reporting of session layer, presentation layer, and

    application layer problems.

    Transport Layer:

    The transport layer segments data from the sending hosts system and reassembles the datainto a data stream on the receiving hosts system.

    For example, business users in large corporations often transfer large files from fieldlocations to a corporate site, Reliable delivery of the files is important, so the transport

    layer will break down large files into smaller segments that are less likely to incur

    transmission problems.

    The boundary between transport layer and the session layer can be thought of as the

    boundary between application protocols and data-flow protocols. Whereas the application,

    presentation, and session layers are concerned with application issues, the lower four layers

    are concerned with data transport issues.

    The transport layer attempts to provide a data-transport service that shields the upper layersfrom transport implementation details. Specifically, issues such as reliability of transport

    between two hosts are the concern of the transport layer.

    In providing communication service, the transport layer establishes, maintains, and

    properly terminates virtual circuits. Transport error detection and recovery and information

    flow control are used to provide reliable service.

    Network Layer:

    The network layer provides connectivity and path selection between two host systems that

    may be located on geographically separated network. The growth of the internet hasincreased the number of users accessing information from sites around the world, and it is

    the network layer that manages this connectivity.

    Data-Link Layer:

    The data-link layer defines how data is formatted for transmission and how access to the

    network is controlled.

    Physical Layer:

    The Physical layer defines the electrical, mechanical, procedural, and functional

    specifications for activating, maintaining, and deactivating the physical link between endsystems.

    Characteristics such as voltage levels, timing of voltage changes, physical data rates,maximum transmission distances, physical connectors, and other similar attributes are

    defined by physical layer specifications.

    In summary these are the functions of the layers in the OSI model:

    25

  • 7/31/2019 Building Simple Network

    26/47

    o Application network services: The application layer provides network services to

    any applications requiring access to the network.

    o Data representation: The presentation layer handles data representation. It ensures

    data is readable, and formats and structures data. It also negotiates data transfer

    syntax for the application layer.o Interhost communication: The session layer provides Interhost communication. In

    doing this it establishes, manages, and terminates sessions between applications.

    o End-to-end connections: The transport layer facilitates end to end

    communications. It handles transportation issues between hosts and ensures data

    transport reliability. It also establishes, maintains and terminates virtual circuits,and provides reliability through fault detection and recovery information flow

    control.

    o Data Delivery: The network layer ensures data delivery. It provides connectivity

    and path selection between two host systems, routes data packets and selects thepath to deliver data.

    o Media access: The data-link layer provides access to the network media. It defineshow data is formatted and how access to the network is controlled.

    o Binary transmission: The physical layer handles binary transmission. It defines

    the electrical, mechanical, procedural, and functional specifications for activating,

    maintaining, and deactivating the physical link. It is responsible for transmitting thedata onto the physical media.

    Reference from GOOGLE:

    26

  • 7/31/2019 Building Simple Network

    27/47

    27

  • 7/31/2019 Building Simple Network

    28/47

    The protocols defined by ISO based on the OSI 7 layer mode are as follows:

    Application ACSE: Association Control Service Element

    CMIP: Common Management Information Protocol

    CMIS: Common Management Information Service

    CMOT: CMIP over TCP/IP

    FTAM: File Transfer Access and Management

    ROSE: Remote Operation Service Element

    RTSE: Reliable Transfer Service Element Protocol

    VTP: ISO Virtual Terminal Protocol

    X.400: Message Handling Service (ISO email

    transmission service) Protocols

    X.500: Directory Access Service Protocol (DAP)

    28

    http://www.javvin.com/protocolISOACSE.htmlhttp://www.javvin.com/protocolCMIP.htmlhttp://www.javvin.com/protocolCMIP.htmlhttp://www.javvin.com/protocolCMOT.htmlhttp://www.javvin.com/protocolISOFTAM.htmlhttp://www.javvin.com/protocolISOROSE.htmlhttp://www.javvin.com/protocolISORTSE.htmlhttp://www.javvin.com/protocolISORTSE.htmlhttp://www.javvin.com/protocolISOVTP.htmlhttp://www.javvin.com/protocolX400.htmlhttp://www.javvin.com/protocolX400.htmlhttp://www.javvin.com/protocolX500.htmlhttp://www.javvin.com/protocolISOACSE.htmlhttp://www.javvin.com/protocolCMIP.htmlhttp://www.javvin.com/protocolCMIP.htmlhttp://www.javvin.com/protocolCMOT.htmlhttp://www.javvin.com/protocolISOFTAM.htmlhttp://www.javvin.com/protocolISOROSE.htmlhttp://www.javvin.com/protocolISORTSE.htmlhttp://www.javvin.com/protocolISOVTP.htmlhttp://www.javvin.com/protocolX400.htmlhttp://www.javvin.com/protocolX400.htmlhttp://www.javvin.com/protocolX500.html
  • 7/31/2019 Building Simple Network

    29/47

    Presentation

    LayerISO-PP: OSI Presentation Layer Protocol

    ASN.1: Abstract Syntax Notation One

    Session Layer ISO-SP: OSI Session Layer Protocol

    Transport LayerISO-TP: OSI Transport Protocols: TP0, TP1, TP2, TP3,

    TP4

    Network Layer ISO-IP: CLNP: Connectionless Network Protocol

    CONP: Connection-Oriented Network Protocol

    ES-IS: End System to Intermediate System Routing

    Exchange protocol

    IDRP: Inter-Domain Routing Protocol

    IS-IS: Intermediate System to Intermediate System

    Data Link HDLC: High Level Data Link Control protocol

    LAPB: Link Access Procedure Balanced for X.25

    http://www.javvin.com/osimodel.html

    DATA Communication:

    All communications on a network originate at a source and are sent to a destination. The

    information sent on a network is referred to as data or data packets. Of one computer (Host

    A) wants to send data to another computer (HOST B), the data must first be packaged by aprocess called encapsulation.

    The encapsulation process can be thought of as putting a letter inside an envelope, and then

    properly writing the recipients mail address on the envelope so it can be properly deliveredby the postal system.

    Encapsulation wraps data with the necessary protocol information before network transit.Therefore, as the data moves down through the layers of the OSI model, each OSI layer

    adds a header (and a trailer if applicable) to the data before passing it down to the lower

    layer.

    The headers and trailers contain control information for the network devices and receiver to

    ensure proper delivery of the data and to ensure that the receiver can correctly interpret the

    data.

    When the remote device receives a sequence of bits, the physical layer at the remote device

    passes the bits to the data-link layer for manipulation.

    29

    http://www.javvin.com/protocolISOpresentation.htmlhttp://www.javvin.com/protocolASN1.htmlhttp://www.javvin.com/protocolISOsession.htmlhttp://www.javvin.com/protocolISOTP.htmlhttp://www.javvin.com/protocolISOTP.htmlhttp://www.javvin.com/protocolCLNP.htmlhttp://www.javvin.com/protocolCONP.htmlhttp://www.javvin.com/protocolESIS.htmlhttp://www.javvin.com/protocolESIS.htmlhttp://www.javvin.com/protocolIDRP.htmlhttp://www.javvin.com/protocolIDRP.htmlhttp://www.javvin.com/protocolISIS.htmlhttp://www.javvin.com/protocolHDCL.htmlhttp://www.javvin.com/protocolLAPB.htmlhttp://www.javvin.com/protocolLAPB.htmlhttp://www.javvin.com/osimodel.htmlhttp://www.javvin.com/protocolISOpresentation.htmlhttp://www.javvin.com/protocolASN1.htmlhttp://www.javvin.com/protocolISOsession.htmlhttp://www.javvin.com/protocolISOTP.htmlhttp://www.javvin.com/protocolISOTP.htmlhttp://www.javvin.com/protocolCLNP.htmlhttp://www.javvin.com/protocolCONP.htmlhttp://www.javvin.com/protocolESIS.htmlhttp://www.javvin.com/protocolESIS.htmlhttp://www.javvin.com/protocolIDRP.htmlhttp://www.javvin.com/protocolISIS.htmlhttp://www.javvin.com/protocolHDCL.htmlhttp://www.javvin.com/protocolLAPB.htmlhttp://www.javvin.com/osimodel.html
  • 7/31/2019 Building Simple Network

    30/47

    The data-link layer performs the following tasks:

    o It checks the data-link trailer (the FCS) to see if the data is in error.

    o If the data is in error, it may be discarded, and the data-link layer may ask for the

    data to be retransmitted.

    o If the data is not in error, the data-link layer reads and interprets the controlinformation in the data-link header.

    o It strips the data-link header and trailer, and then passes the remaining data up to

    the network layer based on the control information in the data-link header.

    This process is referred to as de-encapsulation. Each subsequent layer performs a similarde-encapsulation process. Think of de-encapsulation as the process of reading the address

    on a letter to see if it is for you or not, and then removing the letter from the envelope if the

    letter is addressed to you.

    So that data packets can travel from the source to the destination, each layer of the OSI

    model at the source must communicate with its peer layer at the destination. This form ofcommunication is referred to as peer to peer communication. During this process, the

    protocols at each layer, exchange information, called Protocol Data Units (PDUs) between

    peer layers.

    Data packets on a network originate at a source and then travel to a destination. Each layer

    depends on the service function of the OSI layer below it. To provide this service, the

    lower layer uses encapsulation to put the PDU from the upper layer into its data field. Itthen adds whatever headers the layer needs to perform its function. As the data moves

    down through Layers 7 through 5 of the OSI model, the additional headers are added. The

    grouping of data at the Layer 4 (transport) PDU is called segment.

    The network layer provides a service to the transport layer, and the transport layer presents

    data to the internetwork subsystem.

    The network layer moves the data through the internetwork by encapsulating the data and

    attaching a header to create a packet (the Layer 3PDU). The header contains information

    required to complete the transfer, such as source and destination logical addresses.

    The data- link layer provides a service to the network by encapsulating the network layer

    packet in a frame (the Layer 2PDU). The frame header contains the physical addressesrequired to complete the data-link functions, and the frame trailer contains the FCS.

    The physical layer provides a service to the data-link layer, encoding the data-link frame

    into a pattern of 1sand 0s (bits) for transmission on the medium (usually a wire) at Layer 1.

    Network devices such as hubs, switches, and routers work at the lower three layers. Hubs

    are at Layer 1 the physical layer, switches are at Layer 2 the data-link layer, and routerare at Layer 3 the network layer.

    Reference from Google:

    30

  • 7/31/2019 Building Simple Network

    31/47

    Each protocol creates a Protocol Data Unit (PDU) for transmission that includes headers

    required by that protocol and data to be transmitted. This data becomes the Service DataUnit (SDU) of the next layer below it. This diagram shows a 7 layer PDU consisting of a

    layer 7 header (L7H) and application data. When this is passed to layer 6, it becomes a

    layer 6SDU. The layer 6 protocol prepends to it a layer 6 header (L6H) to create a layer

    6PDU, which is passed to layer 5. The encapsulation process continues all the way down tolayer 2, which creates a layer 2 PDU in this case shown with both a header and footer

    that is converted to bits and sent at layer 1.

    The TCP/IP protocol stack

    31

  • 7/31/2019 Building Simple Network

    32/47

    Although the OSI reference model is universally recognized, the historical and technical

    open standard of the internet is the TCP/IP protocol stack.

    The TCP/IP protocol stack has four layers the application layer, the transport layer, the

    internet layer, and the network access layer.

    It is important to note that although some of the layers in the TCP/IP protocol stack have

    the same names as layers in the OSI model, the layers have different functions in eachmodel.

    Application Layer:

    The application layer handles high-level protocols, including issues of representation,encoding, and dialog control. The TCP/IP model combines all application related issues

    into one layer and ensures that this data is properly packaged for the next layer.

    Transport Layer:The transport layer deals with quality-of-service issues of reliability, flow control, and error

    correction. One of its protocols, the Transmission Control Protocol (TCP), provides forreliable network communications.

    Internet Layer:

    The purpose of the internet layer is to send source packets from any network on the

    internetwork and have them arrive at the destination, regardless of the path they look to get

    there.

    Network access Layer:

    The network access layer is also called the host-to-network layer. It includes LAN and

    WAN protocols, and all the details in the OSI physical and data-link layers.

    Similarities and differences b/w TCP/IP protocol stack and the OSI reference model:

    Main Similarities:

    o Application layers Both have the application layers, though they include

    different services.

    o Packet-switched technology - Both assume packet-switched technology, not

    circuit-switched. (Analog telephone calls are an example of circuit switched.)

    o Transport and network layers Both have comparable transport and network

    layers.

    Main Differences:

    o Data-link and physical layers TCP/IP combines the OSI data-link and physical

    layers into the network access layer.

    o Implementation of standards TCP/IP protocols are the standards around which

    the internet developed, so the TCP/IP protocol stack gains credibility just because

    of the wide spread implementation of its protocols. In contrast, networks are nottypically built on the OSI model, even though the OSI model is used as a guide.

    32

  • 7/31/2019 Building Simple Network

    33/47

    o Presentation and session layers TCP/IP combines the OSI presentation and

    session layers into its application layer.

    Reference from Google:

    Layer Function Protocols NetworkComponents

    Application

    User Interface

    used for applications

    specifically written to runover the network

    allows access to network

    services that support

    applications;

    directly represents the

    services that directly

    support user applications

    handles network access,

    flow control and error

    recovery

    Example apps are filetransfer,e-mail, NetBIOS-

    based applications

    DNS; FTP; TFTP;

    BOOTP;SNMP;RLOGIN;

    SMTP; MIME;

    NFS; FINGER;

    TELNET; NCP;APPC; AFP; SMB

    Gateway

    Presentation

    Translation

    Translates from application

    to network format andvice-versa

    all different formats fromall sources are made into acommon uniform format

    that the rest of the OSI

    model can understand

    responsible for protocol

    conversion, character

    conversion,dataencryption / decryption,

    expanding graphics

    commands, data

    compression

    sets standards for different

    systems to provide

    seamless communicationfrom multiple protocol

    stacks

    not always implemented in

    Gateway

    Redirector

    33

  • 7/31/2019 Building Simple Network

    34/47

    a network protocol

    Session

    "syncs and

    sessions"

    establishes, maintains and

    ends sessions across the

    network

    responsible for namerecognition (identification)

    so only the designated

    parties can participate inthe session

    provides synchronization

    services by planning checkpoints in the data stream

    => if session fails, only

    data after the most recentcheckpoint need be

    transmitted manages who can transmit

    data at a certain time andfor how long

    Examples are interactive

    login and file transferconnections, the session

    would connect and re-

    connect if there was an

    interruption; recognize

    names in sessions andregister names in history

    NetBIOS

    Names Pipes

    Mail Slots

    RPC

    Gateway

    Transport

    packets; flow

    control &

    error-handling

    additional connectionbelow the session layer

    manages the flow control

    of data between parties

    across the network

    divides streams of data into

    chunks or packets; the

    transport layer of thereceiving computer

    reassembles the messagefrom packets

    "train" is a good analogy

    => the data is divided into

    identical units

    provides error-checking toguarantee error-free data

    delivery, with on losses or

    TCP, ARP, RARP;

    SPX

    NWLink

    NetBIOS /

    NetBEUI

    ATP

    Gateway

    Advanced Cable

    Tester

    Brouter

    34

  • 7/31/2019 Building Simple Network

    35/47

    duplications

    provides acknowledgment

    of successfultransmissions; requests

    retransmission if some

    packets dont arrive error-free

    provides flow control and

    error-handling

    Network

    addressing;

    routing

    translates logical network

    address and names to theirphysical address (e.g.

    computername ==> MAC

    address)

    responsible for

    o addressingo determining routes

    for sending

    o managing network

    problems such aspacket switching,

    data congestion and

    routing

    if router cant send dataframe as large as the source

    computer sends, the

    network layer compensatesby breaking the data into

    smaller units. At the

    receiving end, the networklayer reassembles the data

    think of this layer stamping

    the addresses on each train

    car

    IP; ARP; RARP,

    ICMP; RIP; OSFP;

    IGMP;

    IPX

    NWLink

    NetBEUI

    OSI

    DDP

    DECnet

    Brouter

    Router

    Frame Relay

    Device

    ATM Switch

    Advanced Cable

    Tester

    Data Link

    data frames tobits

    turns packets into raw bits100101 and at the receiving

    end turns bits into packets. handles data frames

    between the Network and

    Physical layers

    the receiving end packagesraw data from the Physical

    layer into data frames for

    Logical Link

    Control

    error

    correction and

    flow control manages link

    control anddefines SAPs

    Bridge

    Switch

    ISDN Router

    Intelligent Hub

    35

  • 7/31/2019 Building Simple Network

    36/47

    delivery to the Network

    layer

    responsible for error-freetransfer of frames to other

    computer via the Physical

    Layer

    this layer defines themethods used to transmit

    and receive data on the

    network. It consists of thewiring, the devices use to

    connect the NIC to the

    wiring, the signaling

    involved to transmit /receive data and the ability

    to detect signaling errorson the network media

    802.1 OSI Model

    802.2 Logical Link

    Control

    NIC

    Advanced Cable

    Tester

    Media AccessControl

    communicateswith the

    adapter card controls the

    type of media

    being used:

    802.3 CSMA/CD

    (Ethernet)

    802.4 Token Bus

    (ARCnet)

    802.5 Token Ring

    802.12 DemandPriority

    Physical

    hardware;

    raw bit stream

    transmits raw bit stream

    over physical cable

    defines cables, cards, and

    physical aspects

    defines NIC attachments tohardware, how cable isattached to NIC

    defines techniques to

    transfer bit stream to cable

    IEEE 802

    IEEE 802.2

    ISO 2110

    ISDN

    Repeater

    Multiplexer

    Hubs

    Passive

    Active

    TDR

    Oscilloscope

    Amplifier

    The 7 Layers of the OSI Model

    The OSI, or Open System Interconnection, model defines a networking framework for

    implementing protocols in seven layers. Control is passed from one layer to the next,

    36

  • 7/31/2019 Building Simple Network

    37/47

    starting at the application layer in one station, proceeding to the bottom layer, over the

    channel to the next station and back up the hierarchy.

    Application(Layer 7)

    This layer supports application and end-user processes. Communication

    partners are identified, quality of service is identified, userauthenticationand privacy are considered, and any constraints on data syntax are

    identified. Everything at this layer is application-specific. This layerprovides application services for file transfers, e-mail, and othernetworksoftwareservices. Telnet and FTP are applications that exist entirely in the

    application level. Tiered application architectures are part of this layer.

    Presentation

    (Layer 6)

    This layer provides independence from differences in data representation

    (e.g.,encryption) by translating from application to network format, andvice versa. The presentation layer works to transform data into the form

    that the application layer can accept. This layer formats and encrypts data

    to be sent across a network, providing freedom from compatibility

    problems. It is sometimes called thesyntax layer.

    Session

    (Layer 5)

    This layer establishes, manages and terminates connections betweenapplications. The session layer sets up, coordinates, and terminates

    conversations, exchanges, and dialogues between the applications at each

    end. It deals with session and connection coordination.

    Transport

    (Layer 4)

    This layer providestransparent transfer of data between end systems, orhosts, and is responsible for end-to-end error recovery andflow control. It

    ensures complete data transfer.

    Network

    (Layer 3)

    This layer providesswitchingand routing technologies, creating logical

    paths, known as virtual circuits, for transmitting data from node to node.

    Routing and forwarding are functions of this layer, as well as addressing,internetworking, error handling, congestion control andpacket sequencing.

    Data Link

    (Layer 2)

    At this layer, data packets are encoded and decoded intobits. It furnishes

    transmission protocol knowledge and management and handles errors in

    the physical layer, flow control and frame synchronization. The data link

    layer is divided into two sublayers: The Media Access Control (MAC)layer and the Logical Link Control (LLC) layer. The MAC sublayer

    controls how a computer on the network gains access to the data and

    permission to transmit it. The LLC layer controls frame synchronization,flow control and error checking.

    Physical

    (Layer 1)

    This layer conveys thebitstream - electrical impulse, light or radio signal-- through the network at the electrical and mechanical level. It provides the

    hardware means of sending and receiving data on a carrier, includingdefining cables, cards and physical aspects. Fast Ethernet,RS232, and

    ATM are protocols with physical layer components.

    37

    http://www.webopedia.com/quick_ref/application.htmlhttp://www.webopedia.com/quick_ref/authentication.htmlhttp://www.webopedia.com/quick_ref/syntax.htmlhttp://www.webopedia.com/quick_ref/e_mail.htmlhttp://www.webopedia.com/quick_ref/network.htmlhttp://www.webopedia.com/quick_ref/software.htmlhttp://www.webopedia.com/quick_ref/software.htmlhttp://www.webopedia.com/quick_ref/Telnet.htmlhttp://www.webopedia.com/quick_ref/FTP.htmlhttp://www.webopedia.com/quick_ref/app.arch.htmlhttp://www.webopedia.com/quick_ref/encryption.htmlhttp://www.webopedia.com/quick_ref/encryption.htmlhttp://www.webopedia.com/quick_ref/transparent.htmlhttp://www.webopedia.com/quick_ref/transparent.htmlhttp://www.webopedia.com/quick_ref/flow_control.htmlhttp://www.webopedia.com/quick_ref/flow_control.htmlhttp://www.webopedia.com/quick_ref/flow_control.htmlhttp://www.webopedia.com/quick_ref/switch.htmlhttp://www.webopedia.com/quick_ref/switch.htmlhttp://www.webopedia.com/quick_ref/switch.htmlhttp://www.webopedia.com/quick_ref/routing.htmlhttp://www.webopedia.com/quick_ref/virtual_circuit.htmlhttp://www.webopedia.com/quick_ref/node.htmlhttp://www.webopedia.com/quick_ref/internetworking.htmlhttp://www.webopedia.com/quick_ref/packet.htmlhttp://www.webopedia.com/quick_ref/bit.htmlhttp://www.webopedia.com/quick_ref/bit.htmlhttp://www.webopedia.com/quick_ref/MAC_layer.htmlhttp://www.webopedia.com/quick_ref/bit.htmlhttp://www.webopedia.com/quick_ref/bit.htmlhttp://www.webopedia.com/quick_ref/hardware.htmlhttp://www.webopedia.com/quick_ref/card.htmlhttp://www.webopedia.com/quick_ref/Fast_Ethernet.htmlhttp://www.webopedia.com/quick_ref/Fast_Ethernet.htmlhttp://www.webopedia.com/quick_ref/RS_232C.htmlhttp://www.webopedia.com/quick_ref/ATM.htmlhttp://www.webopedia.com/quick_ref/application.htmlhttp://www.webopedia.com/quick_ref/authentication.htmlhttp://www.webopedia.com/quick_ref/syntax.htmlhttp://www.webopedia.com/quick_ref/e_mail.htmlhttp://www.webopedia.com/quick_ref/network.htmlhttp://www.webopedia.com/quick_ref/software.htmlhttp://www.webopedia.com/quick_ref/Telnet.htmlhttp://www.webopedia.com/quick_ref/FTP.htmlhttp://www.webopedia.com/quick_ref/app.arch.htmlhttp://www.webopedia.com/quick_ref/encryption.htmlhttp://www.webopedia.com/quick_ref/transparent.htmlhttp://www.webopedia.com/quick_ref/flow_control.htmlhttp://www.webopedia.com/quick_ref/switch.htmlhttp://www.webopedia.com/quick_ref/routing.htmlhttp://www.webopedia.com/quick_ref/virtual_circuit.htmlhttp://www.webopedia.com/quick_ref/node.htmlhttp://www.webopedia.com/quick_ref/internetworking.htmlhttp://www.webopedia.com/quick_ref/packet.htmlhttp://www.webopedia.com/quick_ref/bit.htmlhttp://www.webopedia.com/quick_ref/MAC_layer.htmlhttp://www.webopedia.com/quick_ref/bit.htmlhttp://www.webopedia.com/quick_ref/hardware.htmlhttp://www.webopedia.com/quick_ref/card.htmlhttp://www.webopedia.com/quick_ref/Fast_Ethernet.htmlhttp://www.webopedia.com/quick_ref/RS_232C.htmlhttp://www.webopedia.com/quick_ref/ATM.html
  • 7/31/2019 Building Simple Network

    38/47

    Reference from Google CISCO:

    Open System Interconnection Protocols

    Background

    The Open System Interconnection (OSI) protocol suite is comprised of numerous standard

    protocols that are based on the OSI reference model. These protocols are part of aninternational program to develop data-networking protocols and other standards that