Home > Engineering essays > Introduction To Computer Networks

Essay: Introduction To Computer Networks

Essay details and download:

  • Subject area(s): Engineering essays
  • Reading time: 9 minutes
  • Price: Free download
  • Published: 7 June 2012*
  • Last Modified: 23 July 2024
  • File format: Text
  • Words: 2,568 (approx)
  • Number of pages: 11 (approx)

Text preview of this essay:

This page of the essay has 2,568 words.

Introduction To Computer Networks

LIST OF SYMBOLS AND ABBREVATION

LAN Local Area Network
WAN Wide Area Network
MAN Metropolitan Area Network
RIP Routing Information Protocol
RIP V1 Routing Information Protocol Version 1
RIP V2 Routing Information Protocol Version 2
UTP Unshielded Twisted Pair
MAC Medium Access Control

EXECUTIVE SUMMARY:

This report discusses important information about networking devices that we dealt in the real time entity; it includes all the five laboratory work description as first chapter involves about the general configurations, devices and physical configuration of the laboratory, next demonstrate about the addressing of IP subneting, later shows the methodological and practical serial synchronous n asynchronous connection for the communications, it continues explaining the traffic flow by using RIP protocols of versions, finally it gives brief explanations about the VLANs and Ethernet .

1. INTRODUCTION

In the 1960 Computer network is introduced to use for the communication purpose in military. Computer network is a method of interconnected computers and peripheral devices. For example, it may connect computers, printers, scanners and cameras.Using hardware and software, these interconnected computing devices can communicate with each other through defined rules of data communications. In a network, computers can exchange and share information and resources.

A computer network may operate on wired connections or wireless connections.When two or more networks are linked or connected and are able to communicate with one another using suitable hardware and software, it is called an internetwork.

In this course we are having five lab sessions which basically explains about the IP addressing, serial connections, configuration of routers and configuration of vlan switches which are the basic fundamentals for the networking stream. After configuring the routers we will be get a flexible hand on experience to configure the routers.

There are three different types of Networks, LAN (Local area network): They are used to connected closely located area such as Universities, School, etc. MAN (Metropolitan area network): They are used to connect different networks with a city, town or a collection of street.WAN (Wide area network): They are used to connect a larger geographical area across different cities and countries.

OBJECTIVE OF THE REPORT.

The main objective of this report is to introduce and analyze theIPv4 Addressing basics, Switching Network Protocol and Routing. The Routing and Switching Protocol is used to Configure for different kinds of router and switches.

OUTLINE
The report consists of 4 laboratories Session. They are as follows

Lab 2 : IPv4 Addressing
Lab 3 : Serial Connections
Lab 4 : Routing Information Protocol
Lab 5 : VLANs/Ethernet Networks

2. IPv4 ADDRESSING

IP Address is the direction of Internet Protocol, it is a 32 bit address which is assign to the devices. Each device has a unique address so that they can be identified effortlessly. The IP address consists of a network id and host id. There are two types of IP Addressing they are IPv4 and IPv6

2.1 Binary Operations

IP addressing is one of the most essential aspect in designing a network. IP addresses are assigned to the devices inorder to identify them in a network. IP address is a 32 bit address which is represented via dotted decimal form, where each decimal number represents one octet(eight bits), Here is an example of the IP address written in brinary and dotted decimal notations,

In the above given example the address, 189.9.1.0- it is the Network address.
One of the most important binary operation in IP addressing is AND operation, it will divide the network address from the host segment using IP address mask.
The result of an AND operation is always 0(zero) unless both the operand are 1. I.e. as followed 0 AND 0 = 0
0 AND 1 = 0
1 AND 0 = 0
1 AND 1 = 1
One of the Example for AND operation is

1 1 0 0 1 0 0 1
AND 0 0 0 0 1 1 1 1
= 0 0 0 0 1 0 0 1

2.2 Network Classes

The Administration of IP addresses which are defined five classes to accommodate networks of varying sizes, the most significant bit pattern determines the class of the address and number of octets.

FIGURE 2.1

The valid range of network addressing in each class is
CLASS A- 1 to 126
CLASS B- 128 to 191
CLASS C- 192 to 223
CLASS D- 224 to 239

Both the network segments i.e. network and host of the IP address can be all zeros or all ones in binary format. Therefore, the minimum valid network ID is 1 and the host ID cannot be 0 as it refers the network segment there should be minimum of two hosts to broadcast a message, So, this number cannot be used as a single host ID.

2.3 Subnet Masks

Subnet mask is a logical division of a network. Using this number of networks can be found which can work independently without help of Subnet mask it is impossible to connect the devices and build a communicate with each other. IP address only cannot compose the devices to communicate with each other. IP address and subnet together helps us to create a network and make the devices to communicate with each other. There is a default subnet mask assigned to each class of IP address. They are
Class A- 255.0.0.0
Class B- 255.255.0.0
Class C- 255.255.255.0

The subnet address is also a 32 bit address. They are also just represented as IP address with dotted decimals.

We learned to find out number of possible subnet in the lab
For a giver IP address = 153.50.6.27/25
The possible number of subnets = 2^n where n = number of subnet bits in a network , where n=9 , therefore 2^9 = 512 etc.

2.4 Variable-Length Subnet Masks (VLSM):
Variable-length subnet mask is nothing but when a sub-netted network is further sub-netted inorder to avoid wastage of IP address is called as VLSM (Variable-length subnet mask). It was developed to circumvent the rapidly increasing routing tables in internet.

Figure 2.3 VLSM

The above figure shows how VLSM is done using a class C network, In VLSM multiple levels of sub-networks are created and assigned to hosts according to the need in the individual networks. IP address wastage can be avoided if VLSM technique is used.

2.5 Private IP Addresses:
The Internet Assigned Numbers Authority (IANA) is an organization that assigns IP addresses to the network. Private IP addresses are used on local networks that can be home, school and business LANs including airports and hotels.
Private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. Instead, access to such devices should be brokered by a router that supportsNetwork Address Translation (NAT). NAT hides the private IP numbers but can selectively transfer messages, providing security to the local network.

RFC 1918 specifies the following IP addresses as Private:
Class A ‘ 10.0.0.0 ‘ 10.255.255.255
Class B ‘ 172.16.0.0 ‘ 172.31.255.255
Class C ‘ 192.168.0.0 ‘ 192.168.255.255

2.6 SUMMARY

IP addressing used to uniquely identify the device in the network and subnet-mask help us to sub-divide into multiple networks. It is obligatory that every single device must and should have an IP inorder to communicate with other devices. VLSM is used overcome the wastage of network.

3. SERIAL CONNECTIONS

The serial connector is Serial Interface through which information transfers in or out onebitat a time. The usual Serial Interface uses DB-60 connector. DB-60 on one side and Winchester-type connector on the end. The serial communication is used to transfer data bit by bit in sequential mode. DB-60 serial connector contains 60 pins.

Figure 3.1
We have two types of transmission mode. 2.1 Synchronous line, 2.2 Asynchronous line

3.1 Synchronous Lines

Synchronous Mode is the kind of a transmission which is frequently used by serial connection. This mode helps to transfer data with respective to time. It makes the receiver to receive data in a appropriate series with no delay in packets.

In lab we learn configuring the Serial interface using synchronous lines, as followed
Router>enable
Router# Show Interface Serial 0/1
This command helps us to see the serial interface connection .The serial 0/1 is the number of the serial port.
Router# configure terminal
Router(config-if)# ip address 192.168.1.1 255.255.255.0
This command is used to assign IP address to the serial interface. 255.255.255.0 Is a subnet mask used along with IP address.
Router(config-if)#no shutdown
This command is used to make the interface manually up.
Router(config-if)#Bandwidth
This command is used to fix the bandwidth or data rate for the interface.
Router(config-if)#clock rate 6600
This command is used to set the clock time of data rate. This can be configured only on the Data communicating equipment side because this side is configured by the ISP (Internet service provider).
Router(config-if)#nrzi-encoding
This command is used encode the data in nrzi form and transfer the data. The receiver should also follow the same encoding technique to recover the data.
Router(config-if)#no nrzi-encoding
This command is used to return to default encoding form
Router(Config-if)#encapsulation PPP
This command is used to encapsulate the data in different protocol. Some of the encapsulation protocols are HDLC (High Level data link control), PPP (Point to Point Protocol), SDLC (Synchronous data link control), etc

3.2 Asynchronous lines :

Asynchronous Mode is a kind of transmission which is conflict to Synchronous transmission mode. As it insert start bit to point out the data flow and a stop bit to point out the receiver regarding the end of data flow.
It is less often used which are mostly used to connect PC to Modem, printers via EIA/TIA-232 cable and PC to Cisco router using a console port .

In lab we learn configuring the Serial interface using Asynchronous lines, as followed

Router>en
This command helps us to navigate to privilege mode.
Router# show line
This command help us to display the different line in asynchronous lines like auxiliary port, virtual terminal port,etc
Router# configure terminal
This command helps us to navigate to global configuration mode.
Router(config-line)#line aux 0
This command helps us to configure auxiliary port 0
Router(config)#interface async 65
This command is used to select the asynchronous interface.
Router(config-if)# ip address 192.168.1.1 255.255.255.0
This command is used to assign IP address. 255.255.255.0 Is a subnet mask used along with IP address.
Router(config-if)#no shutdown
This command is used to make the interface manually up.

3.3 SUMMARY:

The Serial connection is used in the direction of connecting the hardware devices via DB-60 connector. Serial connections can be synchronous or asynchronous according to the requirement.

4. ROUTING INFORMATION PROTOCOL (RIP)

Routing information protocol is a distance vector routing protocol based on Bellman-ford algorithm. Router’s main function is to forward traffic based on destination. RIP determines the best path to its destination using hop count. Hop count is the number of routers during which the packet should pass to the end. When routing information protocol is enable on a router, it advertise the route of interfaces to all other connected routers.

RIP timers:
Various timers of rip are as follows
Update timer = every 30 seconds
Invalid timer = 180 seconds
Hold down timer = 180 seconds
Flush timer = 240 seconds
There are two main methods populated, they are
STATIC ROUTING: It is a routing where network administrators enter the routes and make it remain unchanged i.e. remain fixed indefinitely.
DYNAMIC ROUTING: It is a routing where routers are decided by routing protocols which are change dynamically while the network topology changes.

4.1 RIP VERSIONS

This is one of the routing protocol used. The maximum number of hop is 16 and beyond that it is considered as unreachable. Data is encapsulated as UDP segments. It keeps on updated for every 30 seconds. Rip version 1 is a simple distance vector routing protocol which has various techniques like Split horizon, Poison Reverse. RIP uses static metrics to compare routes. RIP version 2 came as an enhancement over RIP version 1. The best enhancement was it supported Classless inter-domain routing. Further It had multicast support and authentication.
The disadvantage of RIP version 1 is that it does support discontiguous network.

Figure 4.1
4.2 Configuring RIP:
Router>enable
This command helps us to navigate to privilege mode.
Router#Configure terminal
This command helps us to navigate to global configuration mode.
Router(config)#interface serial 0/1
This command helps us to make changes in serial interface
Router(config-if)#ip address 192.168.10.10 255.255.255.0
This command is used assign IP address to the serial interface along with subnet.
Router(config-if)#no shutdown
This command helps to make the interface up
Router(config-if)# router rip
This command helps us to assign rip protocol to the router
Router(config-router)#version 2
This command helps us to assign RIP version 2
Router(config-router)#192.168.10.0
This command is given to assign the network
Router(config-router)#exit
Router(config)#exit
Router#undebugip RIP

4.3 Static and Default Routes:
Dynamic routing is the most used way to pass the traffic through a network as it adopts the changes that take place in network topology unlike static routing. Static routes are used in small networks where dynamic routing may overhead.
Static routes can change the default route, i.e. by entering the user-defined route in the routing table a static routers can change the route for the fastest route.
I.e. Router(config)#ip route<destination network address><next hop address>

4.4 SUMMARY:
The Routing Information Protocol is considered as one of the popularly used dynamic routing protocol where routers find path to different destinations.

5 . VLANs/ETHERNET NETWORKS
VLANs (Virtual Local Area Network), Virtual LAN or VLAN. It is a single networkmay be partition to create multiple different broadcast domains which are equally isolated so that packets can pass between them via one or more routers.
A sample VLAN figure is as followed

Figure 5.1

5.1 Configure VLANs:

To create a VLAN:

Step1: switch# configure terminal / it enters configuration mode.

Step2: switch(config)#vlan{vlan-id|vlan-range}
[It creats a VLAN or a range of VLANs
Example: switch(config)# vlan 16-24]

To delete a VLAN:

switch(config-vlan)#no vlan{vlan-id|vlan-range}
[It deletes the specified VLAN or range of VLANs].

Inorder to enter the submode and configure the VLAN:

Step1: switch#configure terminal / it enters configuration mode.

Step2: switch(config)#vlan{vlan-id|vlan-range}
[Enters VLAN configuration submode. If the VLAN does not exist,
the system first creates the specified VLAN.]

Step3: switch(config-vlan)#namevlan-name
[Name the VLAN]

Step4: switch(config-vlan)#no shutdown
[To Enables the VLAN]

5.2 Configure Ports to VLAN:

Step1: switch#configure terminal / it enters configuration mode.

Step2: switch(config)#interface{type slot/port|port-channelnumber}
[It specifies the interface to configure, and enters the interface configuration mode
Example: switch(config)# interface ethernet 1/13]

Step3: switch(config-if)#switchportaccess vlanvlan-id
[It sets the access mode of the interface to the specified VLAN
Example: switch(config-if)# switchport access vlan 5]

5.3: SUMMARY:

Virtual Local Area Network is a set of workstations in a LAN that can communicate with each other as they were on a single, isolated LAN. The basic motive to split a network into VLANs is to reduce congestion on a large LAN.

REFERENCES:

1. IP ADDRESSING

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a00800a67f5.shtml
http://computer.howstuffworks.com/internet/basics/question549.htm

2. SERIAL CONNECTION
http://digital.ni.com/public.nsf/allkb/2AD81B9060162E708625678C006DFC62
http://www.cisco.com/en/US/docs/routers/access/800/819/software/configuration/Guide/6ser_conf.html
http://static3.depositphotos.com/1004946/192/i/950/depositphotos_1927544-Serial-connector.jpg

3. ROUTING INFORMATION PROTOCOL

http://www.cisco.com/en/US/docs/ios/12_2/ip/configuration/guide/1cfrip.html
http://www.dummies.com/how-to/content/routing-information-protocol-rip.html
http://www.cisco.com/en/US/docs/ios/12_2/ip/configuration/guide/1cfrip.html#wp1000952
http://www.cisco.com/en/US/docs/ios/12_2/ip/configuration/guide/1cfrip.html#wp1001083

4. VLANS (Virtual Local Area Network)
http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_9_ea1/configuration/guide/swvlan.html#wp1034669
http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli_rel_4_0_1a/VLANs.html
http://www.cisco.com/en/US/docs/routers/connectedgrid/switch_module_swcg/config_vlans.html#wp1055978

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Introduction To Computer Networks. Available from:<https://www.essaysauce.com/engineering-essays/computer-networks/> [Accessed 16-04-26].

These Engineering essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.