Showing posts with label topologies in networking. Show all posts
Showing posts with label topologies in networking. Show all posts

Thursday, January 2, 2014

Network Categories

TDP/IP includes a wide range of protocols which are used for a variety of purposes on the network. The set of protocols that are a part of TCP/IP is called the TCP/IP protocol stack or the TCP/IP suite of protocols.

Considering the many protocols, message types, levels, and services that TCP/IP networking supports, I believe it would be very helpful to categorize the various protocols that support TCP/IP networking and define their respective contribution to the operation of networking. Unfortunately I have never seen this done to any real extent, but believe it would be worthwhile to help those learning networking understand it faster and better. I cannot guarantee that experts will agree with the categorizations that will be provided here, but they should help the reader get the big picture on the various protocols, and thus clarify what the reason or need is for each protocol.

As mentioned previously, there are four TCP/IP layers. They are link, network, transport, and application. The link layer is the hardware layer that provides ability to send messages between multiple locations. In the case of this document, ethernet provides this capability. Below I define several categories some of which fit into the 4 layer protocol levels described earlier. I also define a relative fundamental importance to the ability of the network to function at all. Importance includes essential, critical, important, advanced, useful.

1. Essential - Without this all other categories are irrelevant.
2. Critical - The network, as designed, is useless without this ability.
3. Important - The network could function, but would be difficult to use and manage.
4. Advanced - Includes enhancements that make the network easier to use and manage.
5. Useful - Functionality that you would like to be able to use as a network user. Applications or some       functionality is supported here. Without this, why build a network?

The categories are:

There are exceptions to my categorizations that don't fit into the normal layering scheme, such as IGMP is normally part of the link layer, but I have tried to list these categorizations according to network functions and their relative importance to the operation of the network. Also note that ethernet, which is not really a protocol, but an IEEE standard along with PPP, SLIP, TokenRing, and ArcNet are not TCP/IP protocols but may support TCP/IP at the hardware or link layer, depending on the network topology.

The list below gives a brief description of each protocol

  • ethernet - Provides for transport of information between physical locations on ethernet cable. Data is passed in ethernet packets
  • SLIP - Serial line IP (SLIP), a form of data encapsulation for serial lines.
  • PPP - Point to point protocol (PPP). A form of serial line data encapsulation that is an improvement over SLIP.
  • IP - Internet Protocol (IP). Except for ARP and RARP all protocols' data packets will be packaged into an IP data packet. Provides the mechanism to use software to address and manage data packets being sent to computers.
  • ICMP - Internet control message protocol (ICMP) provides management and error reporting to help manage the process of sending data between computers.
  • ARP - Address resolution protocol (ARP) enables the packaging of IP data into ethernet packages. It is the system and messaging protocol that is used to find the ethernet (hardware) address from a specific IP number. Without this protocol, the ethernet package could not be generated from the IP package, because the ethernet address could not be determined.
  • TCP - A reliable connection oriented protocol used to control the management of application level services between computers.
  • UDP - An unreliable connection less protocol used to control the management of application level services between computers.
  • DNS - Domain Name Service, allows the network to determine IP addresses from names and vice versa.
  • RARP - Reverse address resolution protocol (RARP) is used to allow a computer without a local permanent data storage media to determine its IP address from its ethernet address.
  • BOOTP - Bootstrap protocol is used to assign an IP address to diskless computers and tell it what server and file to load which will provide it with an operating system.
  • DHCP - Dynamic host configuration protocol (DHCP) is a method of assigning and controlling the IP addresses of computers on a given network. It is a server based service that automatically assigns IP numbers when a computer boots. This way the IP address of a computer does not need to be assigned manually. This makes changing networks easier to manage. DHCP can perform all the functions of BOOTP.
  • IGMP - Internet Group Management Protocol used to support multicasting.
  • SNMP - Simple Network Management Protocol (SNMP). Used to manage all types of network elements based on various data sent and received.
  • RIP - Routing Information Protocol (RIP), used to dynamically update router tables on WANs or the internet.
  • OSPF - Open Shortest Path First (OSPF) dynamic routing protocol.
  • BGP - Border Gateway Protocol (BGP). A dynamic router protocol to communicate between routers on different systems.
  • CIDR - Classless Interdomain Routing (CIDR).
  • FTP - File Transfer Protocol (FTP). Allows file transfer between two computers with login required.
  • TFTP - Trivial File Transfer Protocol (TFTP). Allows file transfer between two computers with no login required. It is limited, and is intended for diskless stations.
  • SMTP - Simple Mail Transfer Protocol (SMTP).
  • NFS - Network File System (NFS). A protocol that allows UNIX and Linux systems remotely mount each other's file systems.
  • Telnet - A method of opening a user session on a remote host.
  • Ping - A program that uses ICMP to send diagnostic messages to other computers to tell if they are reachable over the network.
  • Rlogin - Remote login between UNIX hosts. This is outdated and is replaced by Telnet.
Each protocol ultimately has it's data packets wrapped in an ethernet, SLIP, or PPP packet (at the link level) in order to be sent over the ethernet cable. Some protocol data packets are wrapped sequentially multiple times before being sent. For example FTP data is wrapped in a TCP packet which is wrapped in a IP packet which is wrapped in a link packet (normally ethernet). The diagram below shows the relationship between the protocols' sequential wrapping of data packets.

Tuesday, December 24, 2013

Network Topology

A network consists of multiple computers connected using some type of interface, each having one or more
interface devices such as a Network Interface Card (NIC) and/or a serial device for PPP networking. Each
computer is supported by network software that provides the server or client functionality. The hardware used to transmit data across the network is called the media. It may include copper cable, fiber optic, or wireless transmission. The standard cabling used for the purposes of this document is 10Base-T category 5 ethernet cable. This is twisted copper cabling which appears at the surface to look similar to TV coaxial cable. It is terminated on each end by a connector that looks much like a phone connector. Its maximum segment length is 100 meters.

Network Categories

There are two main types of network categories which are:
1. Server based
2. Peer-to-peer

In a server based network, there are computers set up to be primary providers of services such as file service or mail service. The computers providing the service are are called servers and the computers that request and use the service are called client computers. In a peer-to-peer network, various computers on the network can act both as clients and servers. For instance, many Microsoft Windows based computers will allow file and print sharing. These computers can act both as a client and a server and are also referred to as peers. Many networks are combination peer-to-peer and server based networks. The network operating system uses a network data protocol to communicate on the network to other computers. The network operating system supports the applications on that computer. A Network Operating System (NOS) includes Windows NT, Novell Netware, Linux, Unix and others.

Three Network Topologies The network topology describes the method used to do the physical wiring of the network. The main ones are bus, star, and ring.


1. Bus - Both ends of the network must be terminated with a terminator. A barrel connector can be used to       extend it.
2. Star - All devices revolve around a central hub, which is what controls the network communications, and
    can communicate with other hubs. Range limits are about 100 meters from the hub.
3. Ring - Devices are connected from one to another, as in a ring. A data token is used to grant permission       for each computer to communicate.

There are also hybrid networks including a star-bus hybrid, star-ring network, and mesh networks with
connections between various computers on the network. Mesh networks ideally allow each computer to have a direct connection to each of the other computers. The topology this documentation deals with most is star topology since that is what ethernet networks use.