Beruflich Dokumente
Kultur Dokumente
on
Computer Networking
Bachelor of Technology
in
Submitted By
Himangshu Borah
CERTIFICATE
.. ...
Faculty_Name
Date: Designation
Dept. of CSE
1
CERTIFICATE FROM EXTERNAL GUIDE
(If Any)
2
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
THE ASSAM KAZIRANGA UNIVERSITY, JORHAT-785006
Evaluation Sheet
(Industrial Training/ Seminar/ Minor Project/ Major Project)
Date: Time:
Panel members:
Supervisor(S)/Mentor(s):
Name Signature
Internal Members:
Name Signature
Approved by:
Head of the Department
3
ABSTRACT
The purpose of this industrial training project was to know practically about how an ISP
company provides their Internet Service to the door-to-door of user.
4
DECLARATION
5
CONTENTS
Abstract iv
1. Introduction 01
3. Types of Networks 04
4. Models of Networking 08
5. Categories of Network 09
6. Networking Components 14
7. IP Addressing 27
8. Routing 32
9. Protocols 33
10. Conclusion 36
Bibliography 37
6
LIST OF FIGURES
8
Chapter - 1
Introduction
Networking is a practice of linking of two or more computing devices such as PCs, printers, faxes
etc., with each other Connection between two devices is through physical media or logical media
to share information, data and resources. Networks are made with the hardware and software.
Cable/media
There are many different ways to connect your computer to another computer or
an. Using Windows 2000, you can connect your computer to:
1
Chapter 2
1. Bus Topology
A bus topology is another type of design where a single cable connects all computers and
the information intended for the last node on the network must run through each connected
computer. If a cable is broken, all computers connected down the line cannot reach the
network. The benefit of a bus topology is a minimal use of cabling.
2
2. Ring Topology
In this design, computers are connected via a single cable, but the end nodes also are
connected to each other. In this design, the signal circulates through the network until it
finds the intended recipient. If a network node is not configured properly, or it is down
temporarily for another reason, the signal will make a number of attempts to find its
destination. It is called ring topology because it forms a ring as each computer is
connected to another computer, with the last one connected to the first.
3. Star Topology
A star topology is a design of a network where a central node extends a cable to each
computer on the network. On a star network, computers are connected independently to
the center of the network. If a cable is broken, the other computers can operate without
problems. A star topology requires a lot of cabling.
4. Mesh Topology
3
A network setup where each computer and network device is interconnected with one
another, allowing for most transmissions to be distributed, even if one of the connections
go down. It is a topology commonly used for wireless networks.
Chapter 3
Types of Networks
1. Wired Networks:
Wired networks are almost always faster and less expensive than wireless networks. Once
connected, there is little that can disrupt a good-wired connection. Wired networks come
in many forms, but the most popular are HomePNA and Ethernet. HomePNA uses the
existing phone line wires in your home and Ethernet needs special network cabling.
4
Figure 3.1: Wired Network
ii) Reliability
Wired networks bring with them a reliable, constant download and upload speed
unaffected by the environment. As these networks are closed off and don't travel through
the air, they aren't susceptible to fluctuations in speed or interference from other wireless
devices. While the most recent 802.11ac Wi-Fi standard can theoretically achieve speeds
of 1,000MB per second, older hardware isn't up to this standard -- 802.11n maxes out at
600MB/s. Gigabit Ethernet provides a stable, constant 1,000MB/s connection.
Wi-Fi signal. Ultimately how convenient this wired networking method is for your
company depends on how well equipped your office is and the extent of the existing
network cabling.
Wired technology is not portable. The units must be plugged into power outlets and
network ports in order to function. Moving units takes time, energy and, potentially,
information- technology personnel. These hard-wired requirements can make arranging
personnel, furniture and equipment difficult. Moves of equipment or employees may
require running additional network cabling, installing new electrical outlets and
reconfiguring network-port structures. Network configuration may limit the options for
employee and equipment placement.
5
ii) Space
iii) Safety
The physical requirements of a wired-technology product present some opportunities for
damage not noted in wireless products. Cables can be damaged by cleaning crews and
mislaid wires can cause tripping hazards. Additionally, always-on technology systems may
be more prone to electrical surges and damage than wireless units that can be unplugged
during storms or power outages.
2. Wireless Networks:
Mobile computers, such as notebook computers and personal digital assistants (PDAs) are
the fastest- growing segment of the computer industry. Many of the owner of these
computers have desktop machines on LANs and WANs back at the office and want to be
connected to their home base even when away from home or en route. Since having a
wired connection is impossible in cars and airplanes, there is a lot of interest in wireless
networks.
6
Figure 3.2: Wireless Network
ii) Users are also able to share files and other resources with other devices that are
connected to the network without having to be cabled to a port.
iii) Not having to lay lots of cables and put them through walls etc. can be a considerable
advantage in terms of time and expense. It also makes it easier to add extra devices to the
network, as no new cabling is needed.
iv) Wireless networks can sometimes handle a larger amount of users because they are not
limited by a specific number of connection ports.
7
Chapter 4
Models of Networking
Model means the connectivity of two computers. We have three types of networking
models.
8
On the point of view of administrator its very easy to control the network because we
combine with the server also at security point of view. It is very useful because it uses user
level security in which users have to remember only one password to share the resources.
Chapter-5
Categories of Networks
9
Now-a-days LANs are being installed using wireless technologies. Such a system makes
use of access point or APs to transmit and receive data. One of the computers in a network
can become a server serving all the remaining computers called Clients.
For example, a library will have a wired or wireless LAN Network for users to
interconnect local networking devices e.g., printers and servers to connect to the internet.
LAN offers high speed communication of data rates of 4 to 16 megabits per second
(Mbps). IEEE has projects investigating the standardization of 100 Gbit/s, and possibly 40
Gbit/s. LANs Network may have connections with other LANs Network via leased lines,
leased services.
Types of LAN:
There are basically two types of Local Area Networks namely: ARCnet and Ethernet.
ARCNET is one of the oldest, simplest, and least expensive types of Local-Area Network
protocol, similar in purpose to Ethernet or Token Ring. ARCNET was the first widely
available networking system for microcomputers and became popular in the 1980s for
office automation tasks. ARCnet was introduced by Datapoint Corporation in 1977.
A new specification, called ARCnet Plus, will support data rates of 20 Mbps
ii) Ethernet:
replaced competing wired local area network technologies. Ethernet uses a bus or star
topology Network and supports data transfer rates of 10 Mbps.
Ethernet Network uses the CSMA/CD access method to handle simultaneous demands. It
is one of the most widely implemented LAN standards. A newer version of Ethernet
Network, called 100Base-T (or Fast Ethernet), supports data transfer rates of 100 Mbps.
And the newest version, Gigabit Ethernet supports data rates of 1 gigabit (1,000 megabits)
per second. Ethernet is a physical and data link layer technology for local area networks
(LANs). Ethernet Network was invented by engineer Robert Metcalfe.
10
Figure 5.1: Local Area Network
As we have discussed above it is smaller than a wide area network and multiple Local
Area Network (LAN) combines in one organization or regions to make a Campus Area
Network (CAN). Therefore, whenever someone tells you about the networks within the
specific area, we can easily guess that it is campus network.
In this kind of networking, the same technology along with the hardware is used in
different buildings of one campus or one corporation. They follow the same terminologies
like the local area networks but the difference is that they are interconnected between the
multiple buildings at the particular location. For e.g. Just imagine a university campus in
which you have multiple departments such as information technology, electronics, mass
communication and fine arts etc and in all these departments computer labs, they have
implemented the same infra -structure of hardware and other technologies using the Local
area network as the main tool, and one message sent by one department can be accessed
by the other department, then we say that the network is the techniques of Campus Area
Network (CAN).
11
Figure 5.2 Campus Area Network
12
Figure 5.3 Metropolitan Area network
Computers connected to a Wide Area Networks are often connected through public
networks, such as the telephone system. They can also be connected through leased lines
or satellites. The largest WAN in existence is the Internet. Some segments of the Internet,
like VPN based extranets, are also WANs in themselves. Finally, many WANs are
corporate or research networks that utilize leased lines.
Numerous WANs have been constructed, including public packet networks, large
corporate networks, military networks, banking networks, stock brokerage networks, and
airline reservation networks.
Organizations supporting WANs using the Internet Protocol are known as Network
Service Providers (NSPs). These form the core of the Internet.
By connecting the NSP WANs together using links at Internet Packet Interchanges
(sometimes called "peering points") a global communication infrastructure is formed.
WANs (wide area networks) generally utilize different and much more expensive
networking equipment than do LANs (Local Area Networks). Key technologies often
found in WANs (wide area networks) include SONET, Frame Relay, and ATM.
13
Figure 5.4: Wide Area Network
Chapter-6
Networking Components
When a computer or device A is requesting a resource from another computer or device B,
the item A is referred to as a client. Because all or most items that are part of a network
live in association or cooperation, almost any one of them can be referred to as a client.
Based on this, there can be different types of clients. The most regularly used of them is
referred to as a workstation.
14
If you already have one or more computers that you plan to use as workstations, you can
start by checking the hardware parts installed in the computer. The computer must meet
the following requirements:
Coaxial cable - Coaxial cable more resembles like TV installation cable. It is more
expensive than twisted-pair cable but provide high data transmission speed.
15
iii) Cables used in outdoor environments typically utilize a polyethylene jacket
material.
Fiber-optic cable - It is a high-speed cable which transmits data using light beams
through a glass bound fibers. Fiber-optic cable is high data transmission cable comparing
to the other cable types. But the cost of fiber optics is very expensive which can only be
purchased and installed on governmental level.
Registered Jack 45 (RJ45) - The cable connector that is found on almost all UTP and
STP cables is a Registered Jack 45 which is mostly commonly referred to as RJ45.
16
i) Registered Jack 45 (RJ45) is commonly used to connect computers onto
Ethernet-based local area networks (LAN).
ii) High-speed modem or other computer network applications are supported by
Registered Jack 45 (RJ45).
SXT:
It's powerful 60 degrees 2x2 MIMO 10dbi sector antenna with 1600mW wireless on-
board- you can use it as a Sector AP.
Airgrid:
AirGrid represents the evolution of outdoor broadband wireless devices. Complete antenna
and radio system integration provides revolutionary cost/performance solutions to the
Worldwide Broadband Industry. Can be oriented to use either vertical or horizontal
polarization. Mechanical design provides complete weatherproof performance. Acitivity
and signal strength LED's provided for installers. Enhanced RF and Ethernet ESD/Surge
protection enables prolonged operation in harshest environments. 100+Mbps of real
outdoor throughput and up to 30km+ range.
17
Figure 6.6: AirGrid
Applications of AirGrid
i) It is used to make wireless point-to-point links.
ii) It is also used in hi-performance outdoor multipoint networking.
Types
18
Figure 6.7.2: PoE+
Applications of PoE or PoE Plus (Basically applications of both the PoEs are same)
Routers:
Routers are networking devices that forward data packets between networks using headers
and forwarding tables to determine the best path to forward the packets. Routers work at
the network layer of the TCP/IP model or layer 3 of the OSI model. Routers also provide
interconnectivity between like and unlike media.
Types of Routers
i) Broadband Routers
Broadband routers can do different types of things. Broadband routers can be used to
connect computers or to connect to the Internet.
If you connect to the internet through phone and using Voice over IP technology (VOIP)
then you need broadband router. These are often a special type of modem (ADSL) that
will have both Ethernet and phone jacks.
19
Wireless routers create a wireless signal in your home or office. So, any PC within range
of Wireless routers can connect it and use your Internet.
In order to secure your Wireless routers, you simply need to come secure it with password
or get your IP address. Then, you'll log on into your router with the user ID and passwords
will that come with your router.
20
vi) Core Router
A router that resides within the middle or backbone of the LAN network rather than at its
periphery. In some instances , a core router provides a step down backbone ,
interconnecting the distribution routers from multiple building of a campus ( LAN), or Large
enterprise Location (WAN). They tend to be optimized for a high brandwidth.
Applications of Router
i) When multiple routers are used in interconnected networks, the routers can
exchange information about destination addresses using a dynamic routing
protocol. Each router builds up a routing table listing the preferred routes
between any two systems on the interconnected networks.
21
ii) It is easy to get internet access for all your computers without using a single
wire by using wireless routers.
iii) A router may have interfaces for different physical types of network
connections, such as copper cables, fiber optic, or wireless transmission.
Its firmware can also support different networking communication
protocol standards. Each network interface is used by this specialized computer
software to enable data packets to be forwarded from one protocol transmission
system to another.
iv) Routers may also be used to connect two or more logical groups of computer
devices known as subnets, each with a different network prefix. The network
prefixes recorded in the routing table do not necessarily map directly to the
physical interface connections
Media Converter:
A fiber media converter is a simple networking device that makes it possible to connect
two dissimilar media types such as twisted pair with fiber optic cabling.
Types
Switch:
A network switch or switching hub is a computer networking device that connects network
segments. A network switch is a small hardware device that joins multiple computers
together within one local area network (LAN). Technically, network switches operate at
layer two (Data Link Layer) of the OSI model.
Network switches appear nearly identical to network hubs, but a switch generally contains
more intelligence (and a slightly higher price tag) than a hub. Unlike hubs, network
switches are capable of inspecting data packets as they are received, determining the
source and destination device of each packet, and forwarding them appropriately. By
delivering messages only to the connected device intended, a network switch conserves
network bandwidth and offers generally better performance than a hub.
Types
i) LAN Switch
ii) Unmanaged Network Switches.
iii) Managed Switches
Application of Switch -
The network switch plays an integral role in most modern Ethernet local area
networks (LANs). Mid-to-large sized LANs contain a number of
linked managed switches. Small office/home office (SOHO) applications typically
23
use a single switch, or an all-purpose converged device such as a residential
gateway to access small office/home broadband services such as DSL or cable
Internet. In most of these cases, the end-user device contains a router and
components that interface to the particular physical broadband technology. User
devices may also include a telephone interface for Voice over IP (VoIP) protocol.
Repeater:
A repeater is a network device that is used to regenerate or replicate signals that are
weakened or distorted by transmission over long distances and through areas with high
levels of electromagnetic interference (EMI). The purpose of a repeater is to extend the
LAN segment beyond its physical limits.
Applications of Repeater
Modem:
Modem is a device which converts the computer-generated digital signals of a computer
into analog signals to enable their travelling via phone lines. The modulator-demodulator
or modem can be used as a dial up for LAN or to connect to an ISP. Modems can be both
external, as in the device which connects to the USB or the serial port of a computer, or
proprietary devices for handheld gadgets and other devices, as well as internal.
24
Figure 6.12: Modem
Applications of Modem
i) Basically, modem is used to connect the analog world to the digital world.
ii) It is used to convert the analog signal to digital signal.
Bridge:
A bridge is a computer networking device that builds the connection with the other bridge
networks which use the same protocol. It works at the Data Link layer of the OSI Model
and connects the different networks together and develops communication between them.
It connects two local-area networks; two physical LANs into larger logical LAN or
two segments of the same LAN that use the same protocol.
Bridge serves to divides a network into network up. Bridge set of information between the
edge of the network to run regularly.
Server:
A network server is a computer designed to process requests and deliver data to other
(client) computers over a local network or the Internet. Examples include Web servers,
proxy servers, and FTP servers. Not only should you learn about servers on the Internet,
private network servers for business and personal use are also becoming more common.
25
Figure 6.14: Server
Access Point:
In computer networking, a wireless access point (WAP) is a device that allows wireless
devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The
WAP usually connects to a router (via a wired network), and can relay data between the
wireless devices (such as computers or printers) and wired devices on the network.
26
Chapter - 7
IP Addressing
4.1 IP Addressing:
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an
IP network. An IP address is a 32 bit binary number usually represented as 4 decimal
values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by
decimal points. This is known as "dotted decimal" notation. Example: 140.179.220.200 It
is sometimes useful to view the values in their binary form. 140 .179 .220 .200
10001100.10110011.11011100.11001000 Every IP address consists of two parts, one
identifying the network and one identifying the node. The Class of the address and the
subnet mask determine which part belongs to the network address and which part belongs
to the node address. The four numbers in an IP address are called octets, because they each
have eight positions when viewed in binary form. If you add all the positions together, you
get 32, which is why IP addresses are considered 32-bit numbers. Since each of the eight
positions can have two different states (1 or 0) the total number of possible combinations
per octet is 28 or 256. So each octet can contain any value between 0 and 255. Combine
the four octets and you get 232 or a possible 4,294,967,296 unique values. Out of the
almost 4.3 billion possible combinations, certain values are restricted from use as typical
IP addresses. For example, the IP address 0.0.0.0 is reserved for the default network and
the address 255.255.255.255 is used for broadcasts. Understanding IP Addresses
An IP address is an address used in order to uniquely identify a device on an IP network.
The address is made up of 32 binary bits, which can be divisible into a network portion
and host portion with the help of a subnet mask. The 32 binary bits are broken into four
octets (1 octet = 8 bits). Each octet is converted to decimal and separated by a period (dot).
For this reason, an IP address is said to be expressed in dotted decimal format (for
example, 172.16.81.100).
27
The value in each octet ranges from 0 to 255 decimal, or 00000000 - 11111111 binary.
Here is how binary octets convert to decimal: The right most bit, or least significant bit, of
an octet holds a value of 20. The bit just to the left of that holds a value of 21. This
continues until the left-most bit, or most significant bit, which holds a value of 27. So if all
binary bits are a one, the decimal equivalent would be 255 as shown here: 1 1 1 11 1 1 128
64 32 16 8 4 2 1 (128+64+32+16+8+4+2+1=255) Here is a sample octet conversion when
not all of the bits are set to 1. 0 1 0 0 0 0 0 1 0 64 0 0 0 0 0 1 (0+64+0+0+0+0+0+1=65)
And this is sample shows an IP address represented in both binary and decimal. 10. 1. 23.
19 (decimal) 00001010.00000001.00010111.00010011 (binary). There are five IP classes
plus certain special addresses:
Class A:
This class is for very large networks, such as a major international company might have.
IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are
used to identify each host. This means that there are 126 Class A networks each with
16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses.
Class A networks account for half of the total available IP addresses. In Class A networks,
the high order bit value (the very first binary number) in the first octet is always 0.
Loopback:
The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the
host computer to send a message back to itself. It is commonly used for troubleshooting
and network testing.
Class B:
Class B is used for medium-sized networks. A good example is a large college campus. IP
addresses with a first octet from 128 to 191 are part of this class. Class B addresses also
includes the second octet as part of the Net identifier. The other two octets are used to
identify each host. This means that there are 16,384 (214) Class B networks each with
65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses.
Class B networks make up a quarter of the total available IP addresses. Class B networks
have a first bit value of 1 and a second bit value of 0 in the first octet.
Class C:
Class C addresses are commonly used for small to mid-size businesses. IP addresses with
a first octet from 192 to 223 are part of this class. Class C addresses also include the
second and third octets as part of the Net identifier. The last octet is used to identify each
host. This means that there are 2,097,152 (221) Class C networks each with 254 (28 -2)
possible hosts for a total of 536,870,912 (229) unique IP addresses. Class C networks
make up an eighth of the total available IP addresses. Class C networks have a first bit
value of 1, second bit value of 1 and a third bit value of 0 in the first octet.
28
Class D:
Used for multicasts, Class D is slightly different from the first three classes. It has a first
bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other
28 bits are used to identify the group of computers the multicast message is intended for.
Class D accounts for 1/16th (268,435,456 or 228) of the available IP addresses.
Class E:
Class E is used for experimental purposes only. Like Class D, it is different from the first
three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and
fourth bit value of 1. The other 28 bits are used to identify the group of computers the
multicast message is intended for. Class E accounts for 1/16th (268,435,456 or 228) of the
available IP addresses.
Classless:
Classless addressing system is also known as CIDR (Classless Inter-Domain
Routing).Classless addressing is a way to allocate and specify the Internet addresses used
in inter-domain routing more flexibly than with the original system of Internet Protocol
(IP) address classes. What happened in classful addressing is that if any company needs
more than 254 host machines but far fewer than the 65,533 host addresses then the only
option for the company is to take the class B address. Now suppose company needs only
1000 IP addresses for its host computers then in this (65533-1000=64533) IP addresses get
wasted. For this reason, the Internet was, until the arrival of CIDR, running out of address
space much more quickly than necessary. CIDR effectively solved the problem by
providing a new and more flexible way to specify network addresses in routers.
29
Figure 7.1 IP address
Address:
The unique number ID assigned to one host or interface in a network.
Public addresses:
Public addresses are assigned by ICANN and consist of either historically allocated class-
based network IDs or, more recently, CIDR-based address prefixes that are guaranteed to
be globally unique on the Internet. For CIDR-based address prefixes, the value of w (the
first octet) is in the ranges of 1 through 126 and 128 through 223, with the exception of the
private address prefixes described in Private Addresses.
When the public addresses are assigned, routes are added to the routers of the Internet so
that traffic sent to an address that matches the assigned public address prefix can reach the
assigned organization. For example, when an organization is assigned an address prefix in
the form of a network ID and prefix length, that address prefix also exists as a route in the
routers of the Internet. IPv4 packets destined to an address within the assigned address
prefix are routed to the proper destination.
Private addresses:
Each IPv4 interface requires an IPv4 address that is globally unique to the IPv4 network.
In the case of the Internet, each IPv4 interface on a subnet connected to the Internet
requires an IPv4 address that is globally unique to the Internet. As the Internet grew,
organizations connecting to the Internet required a public address for each interface on
their intranets. This requirement placed a huge demand on the pool of available public
addresses.
30
When analyzing the addressing needs of organizations, the designers of the Internet noted
that for many organizations, most of the hosts on an organizations intranet did not require
direct connectivity to the Internet.
Those hosts that did require a specific set of Internet services, such as Web access and e-
mail, typically access
the Internet services through Application layer gateways such as proxy servers and e-mail
servers. The result is that most organizations only required a small number of public
addresses for those nodes (such as proxies, servers, routers, firewalls, and translators) that
were directly connected to the Internet.
For the hosts within the organization that do not require direct access to the Internet, IPv4
addresses that do not duplicate already-assigned public addresses are required. To solve
this addressing problem, the Internet designers reserved a portion of the IPv4 address
space and named this space the private address space. An IPv4 address in the private
address space is never assigned as a public address. IPv4 addresses within the private
address space are known as private addresses. Because the public and private address
spaces do not overlap, private addresses never duplicate public addresses.
Broadcast:
Messages that are intended for all computers on a network are sent as broadcasts. These
messages always use the IP address 255.255.255.255.
Subnet:
A portion of a network sharing a particular subnet address.
Subnet mask:
A 32-bit combination used to describe which portion of an address refers to the subnet and
which part refers to the host.
Subnetting:
By extending the mask to be 255.255.255.224, you have taken three bits (indicated by
"sub") from the original host portion of the address and used them to make subnets. With
these three bits, it is possible to create eight subnets. With the remaining five host ID bits,
each subnet can have up to 32 host addresses, 30 of which can actually be assigned to a
device since host ids of all zeros or all ones are not allowed (it is very important to
remember this). So, with this in mind, these subnets have been created. 204.17.5.0
255.255.255.224 host address range 1 to 30
Types of Subnetting:
Fixed Length Subnet Mask (FLSM)
Variable Length Subnet Mask (VLSM)
Chapter 8
Routing
Routing is the process of directing packets from a source node to a destination node on a
different network. It is of two types:
Static routing:
The process of manually adding routes in each router's routing table. The administrator
configures the destination network, next hop, and appropriate metrics. The route doesn't
change until the network administrator changes it.
Dynamic routing:
32
Dynamic routes adjust to changes within the internetwork environment automatically.
When network changes occur, routers begin to converge by recalculating routes and
distributing route updates. The route update messages spread through the network, which
causes other routers to recalculate their routes. The process continues until all routes have
converged. Uses protocols to find and update routes on a routing table. It uses CPU time
and consumes bandwidth between links. The routing protocol defines the rules used by the
routers when they communicate with each other. There are two types of routing protocols
on internetworks, Interior Gateway Protocol (IGP) and Exterior Gateway Protocol (EGP).
IGP is used in networks in the same administrative domain. EGPs are used to
communicate between the domains.
Chapter 9
Protocols
Routed protocols:
Routed protocols are nothing more than data being transported across the networks.
Routed protocols include:
Internet Protocol
Telnet
SNMP
33
SMTP
Novell IPX
DECnet
Appletalk
Banyan Vines
Routing protocols:
Routing Protocols are the software that allow routers to dynamically advertise and learn
routes, determine which routes are available and which are the most efficient routes to a
destination. Routing protocols used by the Internet Protocol suite include:
Routing Information Protocol (RIP and RIP II)
34
RIP uses a hop count as a way to determine network distance. (Other protocols use more
sophisticated algorithms that include timing as well.) Each host with a router in the
network uses the routing table information to determine the next host to route a packet to
for a specified destination. RIP is considered an effective solution for small homogeneous
networks. For larger, more complicated networks, RIP's transmission of the entire routing
table every 30 seconds may put a heavy amount of extra traffic in the network.
The major alternative to RIP is the Open Shortest Path First Protocol (OSPF).
36
forward compatible as we can add more branches at low cost and high efficiency with
effective communication between head office and various branches of an organization.
Bibliography
The following web links are visited for the theory reference:
http://www.cisco.com/web/learning/netacad/course_catalog/PacketTracer.html
http://www.cisco.com/web/learning/netacad/index.html
http://www.cisco.com/en/US/docs/internetworking/technology/handbook/ito_doc.html
http://netcert.tripod.com/ccna/routers/routeprotocols.html
http://www.livinginternet.com/i/iw_route.htm
http://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
37
http://www.isc.org/software/dhcp
http://www.cisco.com/web/IN/products/routers/index.html
http://www.webopedia.com/TERM/R/router.html
38