HBT2204
HBT2204
Software modules in one system are used to communicate with one or more software modules in the
distance System. Such interfaces across a distance are termed as “peer-to-peer” interfaces; and the
local interfaces are termed as “service” interfaces. The modules on each end are organized as a
sequence of functions called “layers”. The set of modules organized as layers is also commonly
called a “protocol stack”.
Computers and information networks are critical to the success of businesses, both large and small.
They connect people, support applications and services, and provide access to the resources that
keep the businesses running. To meet the daily requirements of businesses, networks themselves are
becoming quite complex.
Network Requirements
Today, the Internet-based economy often demands around-the-clock customer service. This means
that business networks must be available nearly 100 percent of the time. They must be smart enough
to automatically protect against unexpected security incidents. These business networks must also be
able to adjust to changing traffic loads to maintain consistent application response times. It is no
longer practical to construct networks by connecting many standalone components without careful
planning and design.
Building a Good Network
Good networks do not happen by accident. They are the result of hard work by network designers
and technicians, who identify network requirements and select the best solutions to meet the needs of
a business.
The steps required to design a good network are as follows:
Step 1. Verify the business goals and technical requirements.
Step 2. Determine the features and functions required to meet the needs identified in Step 1.
Step 3. Perform a network-readiness assessment.
Step 4. Create a solution and site acceptance test plan.
Step 5. Create a project plan.
After the network requirements have been identified, the steps to designing a good network are
followed as the project implementation moves forward. Network users generally do not think in
terms of the complexity of the underlying network. They think of the network as a way to access the
applications they need, when they need them.
1
Network Requirements
Most businesses actually have only a few requirements for their network:
− The network should stay up all the time, even in the event of failed links, equipment failure,
and overloaded conditions.
− The network should reliably deliver applications and provide reasonable response times from
any host to any host.
− The network should be secure. It should protect the data that is transmitted over it and data
stored on the devices that connect to it.
− The network should be easy to modify to adapt to network growth and general business
changes.
− Because failures occasionally occur, troubleshooting should be easy. Finding and fixing a
problem should not be too time-consuming.
Fundamental Design Goals
When examined carefully, these requirements translate into four fundamental network design goals:
− Scalability: Scalable network designs can grow to include new user groups and remote sites
and can support new applications without impacting the level of service delivered to existing
users.
− Availability: A network designed for availability is one that delivers consistent, reliable
performance, 24 hours a day, 7 days a week. In addition, the failure of a single link or piece
of equipment should not significantly impact network performance.
− Security: Security is a feature that must be designed into the network, not added on after the
network is complete. Planning the location of security devices, filters, and firewall features
is critical to safeguarding network resources.
− Manageability: No matter how good the initial network design is, the available network staff
must be able to manage and support the network. A network that is too complex or difficult
to maintain cannot function effectively and efficiently
2
Chapter 2: Various Types of Computer Network Design
__
Computer network design refers to the architecture and structure of how devices communicate within a
network. The main types of network designs include peer-to-peer, client-server, centralized,
distributed, cloud-based, and hybrid designs. Below is a discussion of each type with examples:
1. Peer-to-Peer (P2P) Network Design
In this design, all computers (nodes) are connected directly to each other and share resources
without needing a central server. Each node acts as both a client and a server.
Example:
o File-sharing networks like BitTorrent, where users share files directly with each other.
o Small office or home networks where computers share files and printers without a
dedicated server.
2. Client-Server Network Design
This design consists of client devices that request services and a central server that provides
services like data storage, authentication, or application hosting. The server manages network
traffic, security, and data access.
Example:
o A corporate network with Active Directory managing user authentication.
o A web application where clients access a web server to retrieve information (e.g., Google
Search, Facebook).
3. Centralized Network Design
All network resources and computing power are concentrated in a central system. Terminals or
workstations rely on the central server for processing and data storage.
Example:
o Mainframe-based networks used in banking and government institutions.
o Google Drive or Dropbox, where data is stored in a central cloud server.
4. Distributed Network Design
Unlike centralized networks, resources and processing power are spread across multiple
interconnected nodes. Provides redundancy, load balancing, and scalability.
Example:
o Blockchain networks, where no single node controls the data.
o Content Delivery Networks (CDNs) like Cloudflare and Akamai, which distribute web
content across multiple servers worldwide.
5. Cloud-Based Network Design
A modern network design where services, computing power, and storage are hosted in cloud data
centres and accessed over the internet. Provides flexibility, scalability, and cost efficiency.
3
Example:
o Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
o SaaS applications like Google Workspace (Gmail, Google Docs, etc.).
4
Chapter 3: Classification of Computer Networks
_____________________________________________________________________________
Transmission mode defines the direction of signal flow between two linked devices. There are three
types of transmission modes.
Simplex
In simplex mode, the communication is unidirectional. Among the stations only one can transmit and the
other can only receive.
Half-Duplex
In half-Duplex mode, the communication is bidirectional. In this both station can sent and receive but not
at the same time.
Full-Duplex
In synchronous Transmission both the sender and the receiver use the same time cycle forthe
transmission. We send bits one after another without start/stop bits or gaps. It is the responsibility of the
receiver to group the bits. Bit stream is delivered with a fixed delay and given error rate. Each bit reaches
the destination with the same time delay after leaving the source.
• Asynchronous Transmission
In Asynchronous Transmission we send one start bit at the beginning and one stop bit at the end of each
byte. There may be a gap between each byte. Bit stream is divided into packets. Packets are received
with varying delays, so packets can arrive out of order. Some packets are not received correctly.
3. Based on Authentication
• Peer to Peer Connection
In peer-to-peer networks, there are no dedicated servers. All the computers are equal and,
therefore, are termed as peers. Normally, each computer functions as both a client and a server.
No one can control the other computers.
5
• Server Based Connection
Most networks have a dedicated server. A dedicated server is a computer on a network which
functions as a server, and cannot be used as a client or a workstation. A dedicated server is
optimized to service requests from network clients. A server can control the clients for its
services.
4. Based on Geographical location
• Local Area Networks (LAN)
LAN is a small high speed network. In LAN few numbers of systems are interconnected with
networking device to create network. As the distance increases between the nodes or system it
speed decreases. So it is limed to few meters only. Networks which cover close geographical
area. LAN used to link the devices in a single office, building or campus. It provides high speeds
over short distance. Systems are connecting directly to Network. The LAN is owned by private
people.
5. Based on Reliability
Reliability is maintained by authentication.
• Connection-oriented
6
This type of communication establishes a session connection before data can be sent. This
method is often called a "reliable" network service. It can guarantee that data will arrive in
the same order.
• Connection less
This type of communication does not require a session connection between sender and receiver for data
transfer. The sender simply starts sending packets to the destination. A connectionless network provides
minimal services.
Topology
Topology refers to physical layout including computers, cables, and other resources; it determines how
components communicate with each other.
Protocol
Protocols mean set of rules. It is a formal description of message formats and the rules two or more
machines has follow to exchange messages. The key elements of a protocol are syntax, semantics and
timing.
• Syntax
Syntax refers to the structure or format of the data, meaning the order in which they are presented.
• Semantics
Semantics refers to the meaning of each section of bits.
• Timing
Timing refers to when data should be sent and how fast it can be sent.
7
Chapter 4: Internetworking Technologies
________________________________________________________________________________
Internetworking Technologies tell how the Internet accommodating multiple underlying hardware
technologies and how they are interconnected and formed the network, and set of communication
standard which the network used to inter-operate.
The lowercase internet means multiple networks connected together, using a commonprotocol suite. The
uppercase Internet refers to the collection of hosts around the world that can communicate with each
other using TCP/IP. While the Internet is an internet, the reverse is not true.
1. Access Networks
An access network is the part of a telecommunications network which connects end system to the first
router or subscribers to their immediate service provider as shown in figure 1.
It is different from core network which connects all the routers to each other and ISP(Internet service
provider). An access network may be a so-called local area network within a company or university, a
dial telephone line with a modem, or a high-speed cable-based or phone-based access network.
8
Access networks can be loosely divided into three categories:
• Residential access networks, connecting a home end system into the network.
• Institutional access networks, connecting an end system in a business or educational institution into
the network.
• Mobile access networks, connecting a mobile end system into the network
Core Networks:
Core network connects all the routers to each other and ISP (Internet service provider). It is a main back
bone for internet. Core network uses circuit switching and packet switching for data transmission.
Let's begin at the top of the hierarchy and work our way down. Residing at the very top of the hierarchy
are the national ISPs, which are called National Backbone Provider (NBPs). The NBPs form
independent backbone networks that span North America (and typically abroad as well). Just as there are
multiple long-distance telephone companies in the USA, there are multiple NBPs that compete with each
other for traffic and customers. The existing NBPs include internetMCI, SprintLink, PSINet, UUNet
Technologies, and AGIS. The NBPs typically have high-bandwidth transmission links, with bandwidths
ranging from 1.5 Mbps to 622 Mbps and higher. Each NBP also has numerous hubs which interconnect
its links and at which regional ISPs can tap into the NBP.
The NBPs themselves must be interconnected to each other. To see this, suppose one regional ISP, say
MidWestnet, is connected to the MCI NBP and another regional ISP, say EastCoastnet, is connected to
Sprint's NBP. How can traffic be sent from MidWestnet to EastCoastnet? The solution is to introduce
switching centers, called Network Access Points (NAPs), which interconnect the NBPs,
9
thereby allowing each regional ISP to pass traffic to any other regional ISP. To keep us all confused,
some of the NAPs are not referred to as NAPs but instead as MAEs (Metropolitan Area Exchanges).
Component of Internet:
A network (or internet) is formed using Hardware (or network device) and network software or
Application and protocols.
Hardware or Network device:
1. Hub:
• It is uses to connect systems or nodes or networks.
• It has direct connection to a node (point to point connection).
• It suffers from high collision of data, results to data loss.
• A hub takes data from input port and retransmits the input data on output port.
2. Repeater:
• A repeater is a device which regenerates or amplifies the data or signal so that it can be travel
to the other segment of cable.
• It is use to connect two networks that uses same technology and protocol.
• It does not filter or translate any data.
• Work in physical layer.
3. Bridge:
• It is used to connect two networks.
• It divides the collision domain based on number of ports or interface present in a bridge.
• It uses the packet switches that forward and filter the frames using LAN destination address.
• Bridge examines the destination address of frame and forwards it to the interface or port
which leads to the destination.
• It uses the routing table for routing frame from one node to other using MAC address.
• It works in Data Link Layer.
4. Switch :
• It is similar to bridge. It has more number of interfaces as compared to bridge.
• It allows direct communication between the nodes.
10
• It works in Data Link Layer.
• It uses MAC address for data transmission and communication.
5. Router:
• It is used to connect different types of network (types- architecture/ Protocol).
• It work similar to bridge but it uses IP address for routing data.
• Router can't be used for connecting Systems.
• It works in Network Layer.
6. Gateways:
Gateways make communication possible between systems that use different communication
protocols, data formatting structures, languages and architectures. Gateways repackage data
going from one system to another. Gateways are usually dedicated servers on a network and are
task-specific.
• Chat- IRC (Internet Relay Chat) is used for live discussions on the Internet.
• FTP - File Transfer Protocol is the most common method of transferring files between computers
via the Internet.
• Search Engines - These tools are really a part of the World Wide Web and are often used when
looking for information because the Web has grown so large and is without any inherent
organizational structure.
• Telnet - Creation of a dumb terminal session to a host computer in order to run software
applications on the host system.
11
• World Wide Web - This is largest, fastest growing, part of the Internet, the part for which
Internet browsers like Netscape’s Navigator and Microsoft’s Explorer were designed. Business is
the leading factor fueling the rapid growth of the Web making information, advertising, and
product ordering readily available to everyone with Web access.
• TCP/IP
• Browser
WAN Protocols
• Frame Relay
Frame relay is used to connect large number of sites in the network because it is relatively
inexpensive to do so. The service provider gives you a frame relay circuit and is charged for the
amount of data and the bandwidth you use as oppose to T1 circuit that charges with a flat
monthly rate whether you use partial bandwidth or the full bandwidth regardless. Frame relay is a
high-performance WAN protocol that operates at the Data Link layer and the Physical layer of
the OSI model.
12
• High Level Data Link Control (HDLC)
High Level Data Link Control (HDLC) is a bit oriented data link layer frame protocol that has
many versions similar to LAP, LAPB, and LAPD. CISCO routers default encapsulation is
HDLC, but it is proprietary to CISCO.
13
Chapter 5: OSI model
14
The seven layers, beginning with the bottom layer of the OSI model, are shown in figure
2.Routers are used as intermediate node to create a link between A and B end system.
OSI model layers are dependent on each other. Each layer serves the upper layer and also
depends upon the services from the lower layer.
OSI model also provide the layer abstraction. Layers are dependent on each other for services but
in terms of protocol they are independent.
In each layer information is added into original data as header but in data link layer trailer is
added into the data as shown in figure xxxxxxx
15
Layer 2: Data Link Layer
▪ It divides the data into number of frames.
▪ It uses the MAC address for sending frames from one node to other.
▪ It provides flow control, error control and access control.
Layer 3: Network Layer
▪ It divides data into number of packets.
▪ It uses IP address for routing packets to their destination.
▪ It provides end to end connection.
Layer 4: Transport Layer
▪ It divides message into segments and also reassemble the segments to create
original message.
▪ It can be either connection-oriented or connectionless.
▪ It uses service-point address or port address for process to process communication.
16
Application HTTP, FTP, SMTP,TELNET
Presentation JPG, GIF, MPEG,
Session TCP 3-way Handshaking
Transport TCP, UDP
Network IP, IPX
Data Link Ethernet, Token Ring, HDLC
Physical X.21, RS-232, DS, DS3
TCP/IP model
• TCP/IP protocol suite was developed before the OSI model.
• TCP/IP is a set of protocols developed to allow cooperating computers to share resources across
a network.
• In 1969 the Defense Advanced research projects Agency (DARPA) funded a research and
development project to create an experimental packet switching network. This network is called
ARPANET.
• In 1975 the ARPANET was converted from an experimental network to an operational network,
and the responsibility for administering the network was given to the Defense Communication
Agency (DCA).
• The TCP/IP protocols were adopted as Military Standards (MIL STD) in 1983, and all hosts
connected to the network were required to convert to the new protocols.
• DARPA funded to implement TCP/IP in Berkely Unix.
• In 1983, the old ARPANET was divided into MILNET and smaller ARPANET. The Internet
was used to refer to the entire network; MILNET and ARPANET.
Advantages of TCP/IP
Open protocol standards, freely available and developed independently from any specific computer
hardware or operating system. A common addressing scheme which is enable to connect the most widely
used networks. It may use any protocols. It connects dissimilar systems. It provides client/server
framework. It provides access to the Internet
17
TCP/IP combines the presentation and session layer into its application layer. TCP/IPcombines the OSI
data link and physical layers into one layer. TCP/IP appears simpler because it has fewer layers. TCP/IP
transport layer using UDP does not always guarantee reliable deliveryof packets as the transport layer in
the OSI model does.
18
Chapter 6: Packet Switching fundamentals
A network is a collection of interconnected system. In a network we have in one-to-one communication.
To resolves this one of the solutions is to make point to point connection between each pair of system
(using mesh topology) or connecting centralized system to every other system (using star topology). But
still this is not a cost effective as number of systems grows and it is limited to small distance between
inter connected system.
A solution to the above problem is switching. A switched network consists of a series of interlined
device called switches (shown in figure 2). It is a device which can create a temporary connection
between two or more system linked to the switch. In switched network some of the nodes are system
and other are used for routing.
The end systems (communicating devices) are labeled A, B, C, D, and so on, and the switches are
labeled I, II, III, IV, and V. Each switch is connected to multiple links.
19
2. Packet Switched Networks
A. Datagram Networks
B. Virtual- circuit Networks
3. Message Switched Networks
In the above figure one link is divided into n channel (here n=3).A circuit switched network requires
following three phase during the session.
1. Setup Phase: First of all two system needs to create dedicated circuit or path for
communication. For example in figure xxx when system A needs to connect to system M, it
sends a setup request that includes the address of system M, to switch I. Switch I finds a
channel between itself and switch II that can be dedicated for this purpose. Switch I then
sends the request to switch II, which finds a dedicated channel between itself and switch III.
Switch III informs system M of about system A.
20
To establish a path system M must send an acknowledgement for the request of A. Only after system A
receives this acknowledgement the connection is established. Only end to end addressing is required for
establishing connection between two end systems.
Not efficient because the link is reserved and can’t be used by other system during the connection.
Minimum delay in data transfer.
Example: Let us consider how long it takes to send a file of 640 Kbits from host A to host B over a
circuit-switched network. Suppose that all links in the network use TDM with 24 slots and have bit rate
1.536 Mbps. Also suppose that it takes 500 msec to establish an end-to-end circuit before A can begin to
transmit the file. How long does it take to send the file?
Each circuit has a transmission rate of (1.536 Mbps)/24 = 64 Kbps, so it takes (640 Kbits)/(64 Kbps) =
10 seconds to transmit the file. To these 10 seconds we add the circuit establishment time, giving 10.5
seconds to send the file. Note that the transmission time is independent of the number links: the
transmission time would be 10 seconds if the end-to-end circuit passes through one link or one-hundred
links.
21
• No dedicated Resources are allocated for packet. Resources are allocated on demand and it
follows first come first basis. When a switch receives a packet, irrespective of the source or
destination, the packet must wait if the other packets being processed.
• A single message is divided into number of packets. During the transfer of packets from source to
destination, each packet is treated independently. Destination can receive unordered packets and
later packet can be ordered and combine the packets to extract the message.
• Packets are referred as datagrams in this type of switching. Datagram switching is normally done
at the network layer.
• The datagram networks are referred to as connectionless networks. Connectionless means
switches have no connection state information.
• There is no setup and teardown phase. So a routing table is required in every switch to route
packet from source to destination. A Routing table is based on the destination address. The
routing table updated periodically. The destination addresses and the corresponding forwarding
output ports are recorded in the tables. This is different from the table of a circuit switched
network in which each entry is created when the setup phase is completed and deleted when the
teardown phase is over. Figure 4`shows the routing table for a switch.
22
Efficiency
The efficiency of a datagram network is better than that of a circuit-switched network; resources are
allocated only when there are packets to be transferred. If a source sends a packet and there is a delay
of a few minutes before another packet can be sent, the resources can be reallocated during these
minutes for other packets from other sources.
Delay
There may be greater delay in a datagram network than in a virtual-circuit network .Although there
are no setup and teardown phases, each packet may experience a wait at a switch before it is
forwarded. In addition, since not all packets in a message necessarily travel through the same
switches, the delay is not uniform for the packets of a message.
Switching in the Internet is done by using the datagram approach to packet switching at the
network layer.
Addressing
Two types of addressing is used in virtual-circuit network
• Global Address: It is an address which can uniquely identify the systems (source or
destination) in a network or internet. This address is used to create virtual circuit identifier
only.
• Virtual Circuit Identifier: The identifier that is actually used for data transfer is known as
virtual circuit identifier (VCI). It is a number which is used in a frame between two switches.
This VCI changes from one switch to another. Every switch uses a fixed range of values for
VCI.
23
Three phases of Virtual –Circuit Networks:
1. Data Transfer Phase
• To transfer a frame from a source to its destination, all switches need to have a table entry for this
virtual circuit.
• The table, in its simplest form, has four columns.
• This means that the switch holds four pieces of information for each virtual circuit that is already
setup.
• Figure 6 shows such a switch and its corresponding table. Figure 7 shows a frame arriving at port
1with a VCI of 14. When the frame arrives, the switch looks in its table to find port 1 and VCI of
14.When it is found, the switch knows to change the VCI to 22 and send out the frame from port
3.
• The data transfer phase is active until the source sends all its frames to the destination.
• The procedure at the switch is the same for each frame of a message.
• The process creates a virtual circuit, not a real circuit, between the source and destination.
2. Setup Phase
In the setup phase, a switch creates an entry for a virtual circuit. For example, suppose source A needs to
create a virtual circuit to B. Two steps are required: the setup request and the acknowledgment.
24
Figure 8 Setup request in a virtual-circuit network
25
e. Destination B receives the setup frame, and if it is ready to receive frames from A, it assigns a VCI to
the incoming frames that come from A, in this case 77. This VCI lets the destination know that the
frames come from A, and no other sources.
2.2. Acknowledgment:
A special frame, called the acknowledgment frame, completes the entries in the switching tables.
Figure 7 shows the process.
a. The destination sends an acknowledgment to switch 3. The acknowledgment carries the global
source and destination addresses so the switch knows which entry in the table is to be completed.
The frame also carries VCI 77, chosen by the destination as the incoming VCI for frames from A.
Switch 3 uses this VCI to complete the outgoing VCI column for this entry. Note that 77 is the
incoming VCI for destination B, but the outgoing VCI for switch 3.
b. Switch 3 sends an acknowledgment to switch 2 that contains its incoming VCI in the table,
chosen in the previous step. Switch 2 uses this as the outgoing VCI in the table.
c. Switch 2 sends an acknowledgment to switch 1that contains its incoming VCI in the table,
chosen in the previous step. Switch 1uses this as the outgoing VCI in the table.
d. Finally switch 1 sends an acknowledgment to source A that contains its incoming VCI in the
table, chosen in the previous step.
e. The source uses this as the outgoing VCI for the data frames to be sent to destination B.
26
1. Teardown Phase
In this phase, source A, after sending all frames to B, sends a special frame called a teardown request.
Destination B responds with a teardown confirmation frame. All switches delete the corresponding entry
from their tables.
Note: In virtual-circuit switching, all packets belonging to the same source and destination travel
the same path; but the packets may arrive at the destination with different delays if resource
allocation is on demand.
27
The packet is traveling through two switches (routers). There are three transmission times (3T), three
propagation times (3Ƭ), data transfer depicted by the sloping lines, a setup delay (which includes
transmission and propagation in two directions), and a teardown delay (which includes transmission and
propagation in one direction).
We ignore the processing time in each switch. The total delay time is
Total delay=3T+3 Ƭ +setup delay + tear down delay
28
Chapter 7: Internet Standards
The IETF started out as an activity supported by the US federal government, but since 1993 it has
operated as a standards development function under the auspices of the Internet society, an international
membership-based non-profit organization. The mission of the IETF is to make the Internet work better
by producing high quality, relevant technical documents that influence the way people design, use, and
manage the Internet.
The Institute of Electrical and Electronics Engineers (IEEE) is a professional association with its
corporate office in New York City and its operations center in Piscataway, New Jersey. It was formed in
1963 from the amalgamation of the American Institute of Electrical Engineers and the Institute of Radio
Engineers. Today it is the world's largest association of technical professionals with more than 400,000
members in chapters around the world. Its objectives are the educational and technical
29
advancement of electrical and electronic engineering, telecommunications, computer engineering and
allied disciplines.
The IEEE is best known for developing standards for the computer and electronics industry. In
particular, the IEEE 802 standards for LANs are widely followed. IEEE manages the Ethernet address
space and assigns addresses as needed.
IEEE is one of the leading standards-making organizations in the world. IEEE performs its standards
making and maintaining functions through the IEEE Standards Association(IEEE-SA). IEEE standards
affect a wide range of industries including: power and energy, biomedical and healthcare, Information
Technology (IT), telecommunications, transportation, nanotechnology, information assurance, and many
more. In 2013, IEEE had over 900 active standards, with over 500 standards under development. One of
the more notable IEEE standards is the IEEE 802 LAN/MAN group of standards which includes the
IEEE 802.3 Ethernet standard and the IEEE 802.11 Wireless Networking standard.
30
be of the same size. The fixed cell structure of ATM means it can be easily switched by hardware
without the delays introduced by routed frames and software switching. This is why some people believe
that ATM is the key to the Internet bandwidth problem. ATM creates fixed routes between two points
before data transfer begins, which differs from TCP/IP, where data is divided into packets, each of which
takes a different route to get to its destination. This makes it easier to bill data usage. However, an ATM
network is less adaptable to a sudden network traffic surge.
The ATM provides data link layer services that run on the OSI's Layer 1 physical links. It functions
much like small-packet switched and circuit-switched networks, which makes it ideal for real-rime, low-
latency data such as VoIP and video, as well as for high-throughput data traffic like file transfers. A
virtual circuit or connection must be established before the two end points can actually exchange data.
• Available Bit Rate: Provides a guaranteed minimum capacity but data can be bursted to higher
capacities when network traffic is minimal.
• Constant Bit Rate: Specifies a fixed bit rate so that data is sent in a steady stream. This is
analogous to a leased line.
• Unspecified Bit Rate: Doesn’t guarantee any throughput level and is used for applications such as
file transfers that can tolerate delays.
• Variable Bit Rate (VBR): Provides a specified throughput, but data is not sent evenly. This
makes it a even popular choice for voice and videoconferencing.
31
• LAN interconnection
• LAN emulation
• Remote access
• File transfer
• Internet/intranet/extranet access
◦ E-mail messaging
◦ Text imaging
• Forms processing
Use in internet: ATM is normally utilized by Internet service providers on their private long-distance
networks. ATM operates at the data link layer (Layer 2 in the OSI model) over either fiber or twisted-
pair cable
ITU also organizes worldwide and regional exhibitions and forums, such as ITU TELECOM WORLD,
bringing together representatives of government and the telecommunications and ICT industry to
exchange ideas, knowledge and technology.
ITU, based in Geneva, Switzerland, is a member of theUnited Nations Development GroupITU has been
an intergovernmental public-private partnershiporganization since its inception. Its membership includes
193 Member States and around 700 public and private sector companies as well as international and
regional telecommunication entities, known as Sector Members and Associates, which undertake most of
the work of each Sector.
• An organization based on public-private partnership since its inception, ITU currently has a
membership of 193 countries and over 700 private-sector entities and academic institutions.
32
ITU is headquartered in Geneva, Switzerland, and has twelve regional and area offices around the
world.
• ITU membership represents a cross-section of the global ICT sector, from the world's largest
manufacturers and carriers to small, innovative players working with new and emerging
technologies, along with leading R&D institutions and academia.
• Founded on the principle of international cooperation between governments (Member States) and the
private sector (Sector Members, Associates and Academia), ITU is the premier global forum through
which parties work towards consensus on a wide range of issues affecting the future direction of the
ICT industry.
IP Packet Format
Packets in the IP layer are called datagrams. A datagram divided into two parts : Header and Data
Header can be from 20 to 60 bytes and contains information for routing and delivery of d
33
IP packet fields Details:
• Identification: Contains an integer that identifies the current datagram. This field is used to help
piece together datagram fragments.
• Flags: Consists of a 3-bit field of which the two low-order (least-significant) bits control
fragmentation. The low-order bit specifies whether the packet can be fragmented. The middle bit
specifies whether the packet is the last fragment in a series of fragmented packets. The third or
high-order bit is not used.
• Fragment Offset: Indicates the position of the fragment’s data relative to the beginning of the
data in the original datagram, which allows the destination IP process to properly reconstruct the
original datagram.
• Time-to-Live: Maintains a counter that gradually decrements down to zero, at which point the
datagram is discarded. This keeps packets from looping endlessly.
• Protocol: Indicates which upper-layer protocol receives incoming packets after IP processing is
complete.
• Header Checksum: Helps ensure IP header integrity.
• Source Address: Specifies the sending node.
• Destination Address: Specifies the receiving node.
IP Addresses
• TCP/IP version 4 or IPv4 uses 32-bit for logical address and IPv6 uses 128-bit for logical
address.
• IP Addresses are divided into five classes: Class A, Class B, Class c, Class C, Class D, Class E.
34
IP Starting First Last Address No. of No. of Host
Address Binary Address Network
Class Value
7 24
Class A 0 1.0.0.0 126.255.255.254 2 -1 2 –2
16
Class B 10 128.0.0.0 191.255.255.254 214 2 -2
8
Class C 110 192.0.0.0 223.255.255.254 221 2 -2
Class D 1110 224.0.0.0 239.255.255.254 Multicast
Class A:
Net ID Host ID
======8======> =====================24========================>
• It uses first octet for network address to uniquely identify the network and rest three octet for host
• An important rule is that network address cannot have all 8 bits 0 (zero).
• First bit is set to zero for class A, so following 7 bits in the first octet use to distinguish the
• Similar to the rule that the network portion of the address cannot be all 0s, the host portion of the
• You subtract 2 because addresses with all 0s and all 1s are invalid.
35
Class B:
Net ID Host ID
=============16===============> ===========16=================>
• It uses first two octet for network address to uniquely identify the network and rest two octet
• 10 in the first 2 bits, the following 6 bits in the first octet and all 8 bits in the second octet for
total 14 bits are used to distinguish this network from all other networks.
Class C:
Net ID Host ID
===================24=========================> ======8======>
• It uses first three octet for network address to uniquely identify the network and last octet for
• 110 in the first 3 bits, the following 5 bits in the first octet, all 8 bits in the second octet and
all 8 bits in the third octet for total 21 bits are used to distinguish this network from all other
networks.
36
Class D:
• Class D addresses are called Multicast Address which cannot be used for host.
• The purpose of a multicast address is to enable a server somewhere to send data to a Class D
address that no one host has so that several hosts can listen to that address at the same time.
When you are watching TV on the Internet or listening to the radio on the Internet, your
workstation; instead, a server is sending data to the multicast address. Any host can use
software to listen for data at that address, and many hosts can be listening at once.
Class E:
• Class E addresses are reserved addresses and are invalid host addresses. They are used for
Special Address:
• Address use for Private use
37
Chapter 8: Firewalls
Introduction
Many organizations have confidential or proprietary information, such as trade secrets, product development
plans, marketing strategies, etc., which should be protected from unauthorized access and modification. One
possible approach is to use suitable encryption/decryption technique for transfer of data between two secure
sites, as we have discussed in the previous lesson. Although these techniques can be used to protect data in
transit, it does not protect data from digital pests and hackers. To accomplish this it is necessary to perform
user authentication and access control to protect the networks from unauthorized traffic. This is known as
firewalls. A firewall system is an electronic security guard and electronic barrier at the same time. It protects
and controls the interface between a private network and an insecure public network as shown in the
simplified diagram of Fig. 8.3.1. It is responsible for partitioning a designated area such that any damage on
one side cannot spread to the other side. It prevents bad things from happening, i.e. loss of information,
without preventing good things from happening, that is controlled exchange of information with the outside
world. It essentially enforces an access control policy between two networks. The manner in which this is
implemented varies widely, but in principle, the firewall can be considered as a pair of mechanisms: one that
is used to block traffic, and the other that is used to permit traffic. Some firewalls place more emphasis on
blocking traffic, while others emphasize on permitting traffic. Probably the most important issue to
understand of a firewall is the access control policy it implements. If a firewall administrator has no idea
about what or whom he is protecting his network, what should be allowed and what should be prohibited, a
firewall really won't help his organization. As firewall is a mechanism for enforcing policy, which affects all
the persons behind it, it imposes heavy responsibility on the administrator of the firewall. In this lesson
various issues related to Firewalls are discussed. Figure
38
Why a Firewall is needed?
There is no need for a firewall if each and every host of a private network is properly secured. Unfortunately,
in practice the situation is different. A private network may consist of different platforms with diverse OS and
applications running on them. Many of the applications were designed and developed for an ideal
environment, without considering the possibility of the existence of bad guys. Moreover, most of the
corporate networks are not designed for security. Therefore, it is essential to deploy a firewall to protect the
vulnerable infrastructure of an enterprise.
Access Control Policies
Access control policies play an important role in the operation of a firewall. The policies can be broadly
categorized in to the following four types:
Service Control:
Determines the types of internet services to be accessed Filters
traffic based on IP addresses and TCP port numbers
Provides Proxy servers that receives and interprets service requests before it is passed on
Direction Control:
Determines the direction in which a particular service request may be initiated and allowed to flow through
the firewall
User Control:
Controls access to a service according to which user is attempting to access it
Typically applied to the users inside the firewall perimeter
Can be applied to the external users too by using secure authentication technique
Behavioural Control:
Controls how a particular service is used for example, a firewall may filter email to eliminate spam
Firewall may allow only a portion of the information on a local web server to an external user
Firewall Capabilities
Important capabilities of a firewall system are listed below:
• defines a single choke point to keep unauthorized users out of protected network
• It prohibits potentially vulnerable services from entering or leaving the network
• It provides protection from various kinds of IP spoofing
• It provides a location for monitoring security-related events Audits an alarm can
be implemented on the firewall systems
39
A firewall is a convenient platform for several internet functions that are not security related
A firewall can serve as the platform for IPSec using the tunnel mode capability and can be used to implement
VPNs
Limitations of a Firewall
Main limitations of a firewall system are given below:
• Firewall cannot protect against any attacks that bypass the firewall. Many organizations buy
expensive firewalls but neglect numerous other back-doors into their network.
• A firewall does not protect against the internal threats from traitors. An attacker may be able to break
into network by completely bypassing the firewall, if he can find a ``helpful'' insider who can be
fooled into giving access to a modem pool
• Firewalls can't protect against tunnelling over most application protocols. For example, firewall
cannot protect against the transfer of virus-infected programs or files
Types of Firewalls
The firewalls can be broadly categorized into the following three types:
Packet Filters
Application-level Gateways
Circuit-level Gateways
Packet Filters: Packet filtering router applies a set of rules to each incoming IP packet and then forwards or
discards it. Packet filter is typically set up as a list of rules based on matches of fields in the IP or TCP header.
An example table of telnet filter rules is given in Fig. 8.3.2. The packet filter operates with positive filter
rules. It is necessary to specify what should be permitted, and everything that is explicitly not permitted is
automatically forbidden.
Figure 8.3.2 A table of packet filter rules for telnet application Application-level Gateway: Application-level
gateway, also called a Proxy Server acts as a relay of application level traffic. Users contact gateways using
an application and the request is successful after authentication. The application gateway is service specific
such as FTP, TELNET, SMTP or HTTP.
Circuit Level Gateway: Circuit-level gateway can be a standalone or a specialized system. It does not allow
end-to-end TCP connection; the gateway sets up two TCP connections. Once the TCP connections are
established, the gateway relays TCP segments from one connection to the other without examining the
contents. The security function determines which connections will be allowed and which are to be disallowed
Bastion Host
40
An application-level gateway is sometimes known as Bastion Host. It is a system identified by the firewall
administrator as a very critical point in the network’s security. It serves as a platform for an application-level
or circuit-level gateway. It executes a very secured version of OS and configured to be very secure. It is
necessary to perform additional authentication before a user is allowed to access the gateway. Each proxy
server is configured to perform the following:
• Support only a subset of the application’s command set
• Allow access only to specific host systems
• Maintains detailed audit information
Network Address Translation
NAT works by using one set of addresses for communications on the internet and a separate set of addresses
for communication on the private network. IANA set aside three ranges of IP addresses given below for
communication on the internal network.
Class A addresses: 10.0.0.0 – 10.255.255.255.255
Class B addresses: 172.16.0.0 – 172.31. 255.255
Class C addresses: 192.168.0.0 – 192.168.255.255
As these addresses are reserved for internal network addressing, these are not routable. The Firewall performs
translation of an internal address to an external IP address and vice versa to facilitate communication between
the private and the public network, as shown in Fig. 8.3.3. However, the NAT affords a substantial degree of
security by preventing direct communication. Moreover, NAT allows the use of same IP addresses in different
private networks. This prolongs the life expectancy of IPv4 on the internet. Without NAT the supply of IP
addresses would have exhausted long back.
41
Figure 8.3.3 Function of a Network Address Translator
Firewall Configurations
42
guarantee that all packets are analyzed and checked. For internet traffic, only IP packets destined for the
bastion host are allowed. For intranet traffic, only IP packets from the bastion host are allowed. Bastion host
performs authentication and proxy functions. This configuration affords flexibility in providing direct internet
access. If the packet filtering router is completely compromised, traffic could flow directly through the router
between the internet and other hosts in the private network. In case of dual-homed Bastion host, the
application gateway has two separate network interfaces as shown in Fig. 8.3.5. As a consequence, it has
complete control over the packets.
The structure of an active firewall element, which is integrated in the communication interface between the
insecure public network and the private network is shown in Fig. 8.3.6. To provide necessary security
services, following components are required:
Integration Module: It integrates the active firewall element into the communication system with the help of
device drivers. In case of packet filters, the integration is above the Network Access Layer, where as it is
above the Transport layer ports in case of Application Gateway.
Analysis Module: Based on the capabilities of the firewall, the communication data is analysed in the
Analysis Module. The results of the analysis are passed on to the Decision Module.
Decision Module: The Decision Module evaluates and compares the results of the analysis with the security
policy definitions stored in the Ruleset and the communication data is allowed or prevented based the
outcome of the comparison.
43
Processing module for Security related Events: Based on ruleset, configuration settings and the message
received from the decision module, it writes on the logbook and generates alarm message to the Security
Management System.
Authentication Module: This module is responsible for the identification and authentication of the instances
that are communicated through the firewall system.
Ruleset: It contains all the information necessary to make a decision for or against the transmission of
communication data through the Firewall and it also defines the security-related events to be logged.
Logbook: All security-related events that occur during operation are recorded in the logbook based on the
existing ruleset.
Security Management System: It provides an interface where the administrator enters and maintain the
ruleset. It also analyses the data entered in the logbook.
44