Computer Networks by Nastaran Nazar Zadeh
Computer Networks by Nastaran Nazar Zadeh
NETWORKS
TAP
Toronto Academic Press
COMPUTER NETWORKS
© 2025
ISBN: 978-1-77956-708-6 (e-book)
This book contains information obtained from highly regarded resources. Reprinted material
sources are indicated and copyright remains with the original owners. Copyright for images
and other graphics remains with the original owners as indicated. A Wide variety of references
are listed. Reasonable efforts have been made to publish reliable data. Authors or Editors or
Publishers are not responsible for the accuracy of the information in the published chapters
or consequences of their use. The publisher assumes no responsibility for any damage or
grievance to the persons or property arising out of the use of any materials, instructions,
methods or thoughts in the book. The authors or editors and the publisher have attempted
to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission has not been obtained. If any copyright holder has not been
acknowledged, please write to us so we may rectify.
Notice: Registered trademark of products or corporate names are used only for explanation and
identification without intent of infringement.
Toronto Academic Press publishes wide variety of books and eBooks. For more information
about Toronto Academic Press and its products, visit our website at www.tap-books.com.
ABOUT THE AUTHOR
Nastaran Nazar Zadeh is a highly experienced computer engineer,
researcher, and advisor in the fields of robotics, artificial intelligence and
computer science. She holds a Master of Science in Computer Engineering
from Mapua University of the Philippines and pursed her Ph.D. in
Electronic Engineering at the same institution. With over seven years
of teaching experience, Nastaran has taught electronic and computer
engineering programs at several reputable academic institutions,
where she has also led numerous thesis studies. Her research focuses
on developing robotics systems with A.I. and machine learning, which
enables her to stay up-to-date with the latest advancements in the field
and implement cutting-edge technologies.
Table of Contents
List of Figures ix
List of Tables xiii
Preface xv
6.1.3. Cooperation Type and Chained 7.2.1. Purpose of Wireless LAN 270
Server 227 7.2.2. Benefits 273
6.1.4. Multiple Servers 227 7.2.3. Security of 802.11 Wireless LANs 274
6.2. Extensions to the Client-Server Model 230 7.2.4. Security Requirements and Threats 284
6.2.1. Agents and Indirect Client-Server 7.2.5. Emerging Security Standards and
Cooperation 231 Technologies 288
6.2.2. The Three-Tier Client-Server 7.3. Wireless Personal Area Networks 290
Architecture 233 7.3.1. Bluetooth Technology 290
6.3. Service Discovery 237 7.3.2. Benefits 294
6.3.1. Hardwiring Computer Address 238 7.3.3. Security Requirements and Threats 296
6.3.2. Broadcast Approach 238 Summary 302
6.3.3. Name Server Approach 239 Multiple Choice Questions 302
6.3.4. Broker-Based Location Lookup 239 Review Questions 303
6.3.5. Client-Server Interoperability 240 References 303
6.3.6. Client/Server Computing 241
INDEX 305
List of Figures
x
Figure 6.8. Transparency in distributed systems
Figure 7.1. Independent and infrastructure basic service sets
Figure 7.2. Extended service set
Figure 7.3. WEP encryption/decryption process. (black) common steps, (Red) encryption
process, (Blue) decryption process
Figure 7.4. Taxonomy of 802.11 authentication techniques
Figure 7.5. Shared-key authentication message flow
Figure 7.6. Taxonomy of security attacks
Figure 7.7. Bluetooth operating range
Figure 7.8. Man-in-the-middle attack scenarios
xi
List of Tables
In the 21st century, we have witnessed some remarkable new technologies that have significantly
altered our way of life. This significant transformation began in the late 20th century with the
emergence of the internet in 1995. The internet has introduced new methods of operation,
tools, and devices that are highly beneficial in educational institutions, businesses, and virtually
every other sector. Despite originating in 1989, the internet now hosts an immense amount of
data, approximately 1.2 million terabytes, contributed by major corporations such as Google,
Amazon, Microsoft, and Facebook. The internet is home to a vast array of content – with over 4.5
billion accessible websites, and even more content residing in the deep web, which surpasses
the size of the commonly used internet.
Shortly after the inception of the internet, email emerged, followed by a variety of other online
platforms including e-commerce websites, social media, online enterprises, digital learning,
e-government services, cloud storage, and more. These platforms began to surface between
1995 and the early 2000s. Presently, there is a multitude of internet-based technologies utilized
across various domains such as business, science, engineering, healthcare, and beyond. These
technologies have become integral to our daily lives, with most individuals utilizing them
whether by choice or necessity. Due to advancements in computing power and the decreasing
cost of data storage, both governmental bodies and private enterprises are amassing vast
quantities of information. Computer networking is about connecting computers together so
they can talk to each other and share data. Basically, a computer network is just two or more
computers hooked up together. This makes it easier for people to communicate with each other.
The aim of this book, “Computer Networks,” is to provide a comprehensive foundation in the
principles and practices of computer networking. It is designed to cater to undergraduate
students in computer science, information technology, and related fields who are seeking to
gain a thorough understanding of network concepts, architectures, protocols, and technologies.
The textbook aims to equip readers with the knowledge and skills necessary to understand the
complexities of modern networks, including the Internet, LANs, WANs, and wireless networks.
Through a blend of theoretical concepts and practical applications, the textbook introduces
fundamental networking concepts such as the OSI and TCP/IP models, network topologies,
routing algorithms, network security, and network management. It emphasizes not only the
technical aspects of networking but also explores critical issues like network security, data
communication protocols, and the latest networking trends and technologies. Intended to serve
both as a learning resource and a reference, this textbook includes numerous examples, case
studies, and exercises to reinforce learning and encourage practical application of concepts.
–Author
CHAPTER
Computer
1 Networks and
Services
LEARNING OBJECTIVES
INTRODUCTORY EXAMPLE
Project Participants
Given the challenging background of Kafanchan, how could anyone come up with the
idea of establishing the first rural Wireless ISP in Nigeria there? Fantsuam Foundation
did, and they made it happen. Fantsuam Foundation is a local, non-governmental
organization that has been working together with the community of Kafanchan since
1996 to fight poverty and disadvantage through integrated development programs.
Fantsuam’s focus lies on microfinance, ICT services, and social development in rural
communities of Nigeria. Becoming the first rural wireless ISP in Nigeria was part of
their mission to be a recognized leader in the provision of rural development initiatives,
as well as the foremost rural knowledge economy driver in Nigeria.
The Wireless ISP of Fantsuam Foundation, also known as Zittnet, is funded by IDRC,
the International Development Research Centre of Canada. IT +46, a Swedish-based
consultancy company focusing on ICTs for development, has worked together with
the Zittnet team to provide technical support for wireless communications, bandwidth
management, solar energy, power backup systems, and VoIP deployments.
Clients
The clients are free to use the Internet access for any purpose. For example, Isaiah
Balat is reselling vouchers (that he bought from Fantsuam) to his clients. His Internet
café hosts 10 computers that are all connected to Zittnet. The clients purchase vouchers
from the owner with a margin of 25% over the price offered by Fantsuam. In return,
clients that do not have access to a computer connected to Zittnet can access the
network through the PCs at Isaiah Balat’s café. The New World Hotel is another client
that aims to create a similar business model but on a larger scale. They will provide
wireless Internet access to all of their rooms and offer access to Zittnet’s uplink by
reselling vouchers. Other clients, like the General Hospital and the Jagindi Street Clinic,
are using the Internet access for professional and private use without reselling access
to their clients.
4 COMPUTER NETWORKS
INTRODUCTION
A group of linked computers is known as a computer network. Nodes refer to computers
connected to a network. Computers can be linked wirelessly using radio waves or
through cabling, typically an Ethernet cable.. Computers that are connected can share
resources such as file servers, printers, Internet access, and others. A network is a
multifunctional link that enhances the capabilities of a single computer.
A computer network is made up of two or more computers connected to one another in
order to exchange data electronically. In addition to physically joining computers and other
communication devices, a network system performs the crucial job of creating a unified
architecture that enables a range of equipment types to transfer data almost seamlessly.
IBM’s Systems Network Architecture (SNA) and ISO Open Systems Interconnection (OSI)
are two well-known architectures.
Wide-area networks (WANs) and local-area networks (LANs) are the two fundamental
types of networks. LANs use links (wires, Ethernet cables, fiber optics, Wi-Fi) that send
data quickly to link computers and peripheral devices in a constrained physical area, like
a lab, business office, or college campus. A local area network (LAN) usually comprises
multiple desktop computers, printers, and large-capacity disk storage units known as file
servers. These devices allow all computers connected to the network to access a shared
collection of files. LAN operating system software enables users to share printers and
storage devices, communicate with one another, and access centrally located processors,
data, or programs (instruction sets) all at once. It does this by interpreting input and
providing instructions to networked devices. LAN users can connect to WANs and
other LANs. Bridges, or similar devices, serve as transfer points connecting LANs with
comparable architectures. “Gates,” which change data as it travels between systems,
connect LANs with disparate architectural styles.
Wide Area Networks (WANs) link computers and local networks to larger networks
across extensive geographical regions, such as continents. Although their users typically
access the networks via a modem (a device that allows computers to communicate over
telephone lines), they may link the computers via cables, optical fibers, or satellites.
The Internet, a vast network of gateways and networks connecting billions of computer
users worldwide, is the biggest WAN.
COMPUTER NETWORKS AND SERVICES 5
1.1. FUNDAMENTALS OF
COMPUTER NETWORKING
→Learning Objectives
• Discuss on open systems interconnection (OSI)
• Access the useful protocol for networking
• Elaborate the various network topology
• Learn about the unique identifiers of network
Keyword
Network
interface
card (NIC)
is a hardware
Figure 1.9. Unique identifiers of network (Source: Geeksforgeeks, https://
component,
media.geeksforgeeks.org/wp-content/uploads/hostname.png). typically a circuit
board or chip,
• IP Address (Internet Protocol address): The system’s installed on a
network address over the network is also referred to as computer so it
can connect to a
the Logical Address. The Internet Assigned Numbers network.
Authority (IANA) assigns an IPv4 (Version 4) address to
each device on the Internet so that it can be uniquely
identified in the global web. The IP address has a length
of 32 bits. Consequently, 2^32 IP addresses are available
16 COMPUTER NETWORKS
to us. In the command prompt, type “ipconfig” and hit “Enter” to obtain the
device’s IP address.
• MAC Address (Media Access Control address): The NIC (Network Interface
Card) is linked to the unique identifier of every host, which is also referred to
as the physical address. At the time of manufacture, the NIC is given a MAC
address. The MAC address has the following length: 12 nibbles/6 bytes/48
bits. Type “ipconfig/all” into the command prompt and hit “Enter” to obtain
the MAC address.
• Port: A port is a logical channel that an application can use to send and receive
data. Numerous applications can be running on a single host, and the port
number of each application allows for its identification. Since port numbers
are 16-bit integers, there are 216 ports available, which are divided into the
following categories:
• Socket: The unique combination of IP address and Port number together are
termed as Socket.
• DNS Server: The domain name system is known as DNS. In essence, DNS is
a server that translates URLs, or web addresses (e.g., www.google.com), into
COMPUTER NETWORKS AND SERVICES 17
the IP addresses that match them. It is not necessary for us to retain the IP
addresses of every single website. You can find the IP address of the domain
you’re looking for by using the ‘nslookup’ command. This also provides details
about our DNS server.
Figure 1.11. Translation of web addresses or URLs (ex: www.google.com) into corresponding IP
addresses (Source: Geeksforgeeks, https://media.geeksforgeeks.org/wp-content/uploads/nslookup.
png).
A vast array of connectivity and software tools that are distributed to computers
connected to a network and overseen by a central team are collectively referred to as
network services. When several computers are connected to a central server or to each
other, the result is a networked computer environment. Shared files and utilities are
accessible from a central location to all computers. This kind of environment has many
benefits, from improved quality control to performance and issue management. System
administration, email, printing, and user management are the four categories of network
services. Desktop computers are referred to as client computers or workstations in a
networked environment.
The servers are normally kept in a separate, temperature-controlled room that is
frequently housed in a different structure than the areas where the workstation users
are situated. Network cables, which are used to transfer data packages within the
network, are used to provide access. Additionally, these cables offer access to the
Internet, usually following a path via a network switch or central server. A variety of
functions are included in user management, such as assigning rights, privileges, and
access in addition to creating user names and passwords.
Email is a widely used tool for productivity that typically requires an Internet
connection. Policies in many organizations govern the email software, maximum storage
limits, and file sizes for transmission. Most companies provide their employees with
company-specific email addresses, which necessitates the setup and maintenance of
an email server. Shared printing is one of the key network services required in any
organization. All users can send printing tasks to a central unit, eliminating the need
18 COMPUTER NETWORKS
COMPUTER NETWORKS AND SERVICES 19
for individual printers at each desk. This device often serves as a
multifunction printer, scanner, and copier. Many businesses utilize
specialized printer management software to handle document flow Keyword
and protect sensitive information. System
administration
An essential network service for system administration is the is the field of work
in which someone
ability to manage all workstations from a single location. The manages one or
administrator is responsible for installing new software, updating more systems,
operating systems, and ensuring all workstations run the same be they software,
hardware, servers
software versions. In many businesses, workstations are locked, or workstations.
granting only the system administrator permission to install updates
or launch new applications. This practice reduces staff time spent
on computer maintenance and enhances the overall quality of the
network.
Figure 1.12. Administrators to manage users and the actions they are
permitted to take on objects.
Source: https://www.miniorange.com/images/user-management/user-
management.webp
Lastly, it helps with the onboarding and packages. Although client software is still
decommissioning of corporate identities for in use today, a more adaptable approach
contractors and employees, which benefits has gained popularity recently. Webmail is
IT operations and human resources (HR). another well-liked method of accessing email
in addition to client software. As an extra
bonus, the majority of service providers
1.2.2. Email Management allow users to access their mailboxes via the
Email is just the abbreviated version of Internet from any computer or other web-
“electronic mail,” which is a system for connected device. There are email services
sending, receiving, and storing electronic that are made especially to use the Internet
messages. It is also sometimes written as as their main interface. These websites,
e-mail. With the growth of the Internet, its known as “portals,” have gained a lot of
popularity has increased almost universally popularity because they typically allow
worldwide. Email is now frequently used as users to register for a free email account
the go-to form of communication for both and provide access to a calendar, news,
personal and professional matters. search engine, and many other resources
from one location.
Email messages typically arrive in the
recipient’s account in a matter of seconds. Although the exact date of the
Images and various types of formatted invention of email is somewhat unknown,
documents are now easily included as Ray Tomlinson, an American, is widely
attached files, so they usually contain recognized as the father of the modern
more than just text. Furthermore, sending version. Prior to Tomlinson, users could
or receiving emails no longer requires a communicate with one another via messages,
computer in front of you. Various mobile but only if they had the same computer
devices, including tablets and smartphones, connected. Not even after computers were
enable correspondence management while networked could messages be directed to a
on the go. Emails can move easily across specific user. Tomlinson was credited with
different kinds of servers on different one of the most significant inventions in
networks and between computers running communication of the 20th century because
different software thanks to standardized he came up with a method to address mail
protocols that users use to send and receive to specific users. Tomlinson came up with
messages. SMTP, or simple message transfer the idea of identifying the user’s name
protocol, makes it possible for messages to and the computer that they were using.
be sent and received. Users can retrieve and Because of this, the standard email address
store messages over time using additional format was username@usercomputer. With
protocols like Internet Message Access the exception of the user computer being
Protocol (IMAP) and Post Office Protocol frequently substituted with the name of
(POP). a service provider, this standard has not
altered significantly over time.
In the beginning, processing mail
required a program known as “client Legally speaking, email is typically
software.” Email clients come in a variety regarded as a private communication
of forms; some are free to use, some medium, similar to phone conversations or
require payment, and some Internet service even handwritten letters. While specifics
providers even bundle them into their may differ depending on the country, it
is usually prohibited to access, read, or
COMPUTER NETWORKS AND SERVICES 23
publish someone else’s messages without
authorization. Nonetheless, it is crucial to Did you know?
realize that hackers can easily intercept In 1994, Information Cybernetics, a company in
electronic mail. Furthermore, a lot of Cambridge, Massachusetts, developed tools for pattern
businesses demand that workers sign a analysis and categorization of emails and other electronic
communication channels. The platform of tools was
consent form authorizing the business to
called EchoMail. The first company to adopt EchoMail
read and keep track of all emails sent and was AT&T. JC Penney adopted EchoMail in 1997.
received from company email addresses.
The fact that every electronic message
becomes a virtually permanent record of
1.2.2.1. Management Procedure
the conversation raises additional privacy
concerns. Currently, email is the de facto standard
for business communication within
When a message is marked for deletion,
organizations. The organizational standards
it is taken out of the user’s account’s
pertaining to information and records must
visible queue; however, deleted emails are
include email as well as adherence to it, just
infamously recoverable, so one should never
like any other form of business information
assume that the message is permanently
and record. Email is now extremely important
lost. Emails are likely to remain in existence
to business and is used in every part of all
on both the recipient’s end and many of the
organizations. Information workers spend
servers they traversed, even if the sender
many hours a day reading, replying to,
uses specialist software to completely
and working together via emails, with the
remove all traces of the message from their
email client serving as their main business
computer. As such, it is foolish.
application. Many people’s definition of email
Email’s impact is too great to be management is as simple as taking emails
understated. For instance, the USPS reports off a server and putting them in a repository.
that it processes 485 million pieces of mail However, in order to properly handle it,
every day. Comparatively, in the US, 39.6 all of the other types of documents and
billion emails are sent each day. Stated records must also be categorized, stored,
differently, the volume of electronic mail and possibly destroyed in accordance with
handled by providers surpasses 81 times established business policies and standards.
that of the world’s largest postal system. The methodical regulation of the volume
Examining how much the use of traditional and caliber of electronic messages sent and
“snail mail,” as it is now commonly called, received by an organization is known as
has been impacted by electronic mail may email management.
be equally instructive.
Email servers within the organization
Beginning in the latter half of the are negatively impacted by the large
1990s and continuing steadily ever since, amounts of emails stored in sent, deleted,
the postal service, like many other postal and inboxes, which also pose a risk to
services around the world, has seen the organization. The purpose of email
dramatic declines in volume and revenue; servers was never to store so many emails
this is partially due to the increasing amount and transfer control of that data outside
of personal and business correspondence of the company. A company’s effort and
that is now delivered by email. expenses when responding to eDiscovery
and disclosure will increase if it is unable
24 COMPUTER NETWORKS
to manage its email system and meet its more of a number of unacceptable options
legal preservation obligations in the event that they think constitute management but
of litigation or government investigations. really don’t. Organizations may decide the
best way to manage email is by doing one
Emails sent and received by staff or more of the following:
members are centrally recorded by email
management systems. Retention periods • Saving all email messages forever
and access controls can be used to manage • Saving all email messages in the
emails in addition to using a classification messaging application
scheme to manage this content. To manage
• Setting arbitrary mailbox sizes for
and retrieve this information, metadata
all users
related to the emails can be collected. One of
the most popular uses for email management • Declaring “email’ as a record series
is email archiving. These solutions, in their • And, of course, the ever-popular
most basic form, copy or delete messages “Doing nothing”
from the messaging app and store them The best answer is to ensure your
elsewhere. Some of these solutions archive organization has strong policies in place
the attachments but leave the messages to govern such things. And yet, we know
unarchived, replacing them with a stub or full well that not every organization does.
a link from within the message. Systems for According to a 2009 AIIM study on the
managing emails are a component of a larger subject:
solution. Records management programs,
which include personnel, activities, and • Only 10% of organizations have
policies and procedures applicable to the completed an enterprise-wide email
entire organization, are essential. management initiative,
Email is an information type that is often • Only 20% currently are rolling out
treated differently than others even though a project, and
it shouldn’t be. The reasons for different • Even in larger organizations, 17%
treatment are many and reflect: have no plans to do so.
There is much that organizations need
• The sheer volume of messages
to determine:
involved, which dwarfs the number
of other document types in play on • When to declare an email, copy
a daily basis of a message or an entire thread/
conversation a record
• The informality with which they
can be created and forwarded: • Determine what to base the record
everybody does it, all the time, decision upon – sender, receiver,
with the simple click of a mouse type of content, attachments, text
within the email, etc.
• The ease with which documents
can be attached, even if they’re
not supposed to be. 1.2.3. Printer Sharing
These factors make it difficult to The process of granting access to one
fully understand email management as a or more printers to numerous computers
discipline and wrestle it to the ground. and devices linked to the same network
Organizations will often default to one or is known as printer sharing. Depending
COMPUTER NETWORKS AND SERVICES 25
on the permissions the administrator has set for each user, every
node or device on the network can print to any shared printer and,
to a limited extent, modify the printer settings. A computer can
share a printer with other computers on the same network if it is
connected to a printer that supports printer sharing. As long as the
shared printer is set up correctly on one computer, that computer
can share it regardless of how old or new it is. The operating Keyword
system (OS), which manages communication between computers and Operating
System (OS)
devices on the network as well as the printer itself, makes sharing is a collection
possible. The computer connected to the shared printer receives of software that
print requests from other networked computers and uses them to manages computer
hardware resources
initialize the printer before forwarding print jobs to it. Regretfully, and provides
the person initiating the print job still needs to manually retrieve common services
the actual printouts. for computer
programs.
To enable printer sharing in Windows 7 and 8, navigate to the
Network and Sharing Center icon, click “Change advanced sharing
settings,” and then select the “Turn on file and printer sharing”
radio button under “File and printer sharing.” Each computer (Client
PC) in a network shared environment sends data via a server PC,
which is managed centrally, as shown below. This kind of computer
is frequently referred to as a “Print Server” or “Server.”
In a Network Shared environment:
• It is possible to use both print and scan functions from a
server PC, but only print from client PCs. (Note: Only if
your Brother machine has a scan function.)
• Client PCs cannot use the shared printer when a server PC
is turned off.
1.2.3.1. Peer-to-Peer
Every computer sends and receives data to every device directly
in a peer-to-peer setting. File access and machine sharing are not
controlled by a single central server. We recommend using the peer-
to-peer printing method, as shown below, if your Brother device is
compatible with wired or wireless Ethernet networks.
• In a Peer-to-Peer environment,
• It is easier to configure than the Network Shared printing
method.
• Client PCs can print to the printer at any time.
• No need to be concerned if the Server PC is turned on or
not.
• You can use the print and scanning functions of the Brother
26 COMPUTER NETWORKS
28 COMPUTER NETWORKS
COMPUTER NETWORKS AND SERVICES 29
via additional, broader communication protocols. To maintain the
dependability of this formidable collection of information technology,
expert network management is needed.
A vast array of services and applications are supported by
computer networks, including access to the World Wide Web, digital Remember
video and audio, shared use of printers, fax machines, application Computer
and storage servers, email and instant messaging, among many networks may
other things. Different computer networks have different bandwidths, be classified by
transmission media for carrying their signals, communications many criteria,
protocols for managing network traffic, sizes, topologies, traffic including the
transmission
control mechanisms, and organizational goals. The Internet is the medium used
most well-known computer network. to carry signals,
bandwidth,
There are many different types of networks, which can be communication
used for different purposes and by different types of people and protocols to
organizations. Here are some of the network types that you might organize network
traffic, the
come across: network size,
the topology,
traffic control
1.3.1. Local Area Networks (LAN) mechanisms, and
organizational
A local area network, or LAN, is a collection of peripherals and intent.
computers that are connected to a server within a specific geographic
area via a wireless link or shared communications line. As few as
two or three users in a home office or several hundred users in a
corporation’s central office can be connected to a local area network.
In order for network nodes to share resources like printers or
network storage, LANs are set up by homeowners and information
technology (IT) administrators. Cables, switches, routers, and other
hardware are needed for LAN networking in order to connect
users to internal servers, websites, and other LANs that are a part
of the same wide area network (WAN). The two main methods
for making LAN connections available are Ethernet and Wi-Fi. A
specification called Ethernet makes it possible for computers to
talk to one another. Wi-Fi connects computers to LANs via radio
waves. While Ethernet and Wi-Fi speeds increased and connectivity
costs decreased, other LAN technologies, such as Token Ring, fiber
distributed data interface (FDDI), and ARCNET, fell out of favor. A
wireless LAN’s cost and flexibility make it potentially better than
a wired LAN connection in many circumstances. People who work
exclusively with smartphones, tablets, and other mobile devices are
common among companies that view WLANs as their main source
of connectivity. Virtual LANs, which enable network managers
to logically divide and group network nodes without requiring
significant infrastructure changes, were made possible by the trend
toward virtualization.
30 COMPUTER NETWORKS
• Smart TV’s and DVRs (access A third option for creating a network,
to services such as Netflix and ISDN (integrated services digital network)
YouTube) solutions, became very popular in the 1990s,
• Stereo systems with network primarily due to the drawback.
connectivity that allow a user to
easily access their music library Did you know?
stored on a PC or NAS WANs are often built using leased lines. At each
• Video game consoles for multiplayer end of the leased line, a router connects the LAN on
one side with a second router within the LAN on the
games and social network other. Because leased lines can be very expensive,
integration instead of using leased lines, WANs can also be built
• Security alarms using less costly circuit switching or packet switching
methods.
• Garage door and gate openers
• HVAC (keeping your house warm A wide area network, or WAN, enables
or cold) businesses to utilize shared resources to run
• Smoke/CO detectors their operations. For instance, many retail
pharmacies use one to assist consumers who
• Media Players or Streaming Devices
fill prescriptions at one of their locations.
like Apple TV
Once a customer is in the pharmacy’s
common customer database, they can fill
1.3.4. Wide Area Networks a prescription at any of the company’s
(WAN) locations—even when they’re on vacation
in a different state.
A wide area network extends over a greater
area of space, typically within a radius of Wide area networks are useful for
several kilometers. Wide area networks, businesses as well. With this kind of
or WANs for short, are communications wide area network application, internal
networks that connect local computer operations like sales, marketing, production,
networks to a wider, functional network development, and accounting can also be
that can span both domestic and foreign shared with approved locations. Employees
locations by utilizing current technology. can work from almost anywhere by using
The local area network and the metropolitan this to combine disparate location-based
area network, on the other hand, offer computer networks into a single computer
communication inside a constrained network for the entire company. In the event
geographic area. It is frequently desirable that a natural disaster damages or renders
to link computer networks, particularly one facility unusable, staff members simply
for companies that run multiple locations. relocate and continue working using the
Utilizing the current telephony technology shared network at their new location.
makes this the easiest to do, starting with
the local area network and progressing to
the wide area network. Fiber optics are 1.3.5. Campus Networks
essentially used to establish a connection A campus network is like a local area
between networks that are housed in network (LAN) used by government
various facilities. This usually entails using agencies, universities, businesses, and
PSTN (public switched telephone network) similar organizations. It usually covers a
technology or POTS (standard phone lines). group of nearby buildings. In a campus
COMPUTER NETWORKS AND SERVICES 33
network, you’ll find a set of connected LANs exclusive to a business,
government body, academic institution, or similar establishment.
Typically, a campus includes a cluster of adjacent buildings. While
users in a campus network are not as spread out as in a wide area
network (WAN), they may be more geographically dispersed than in
a single LAN. Campus networks in colleges and universities connect
various buildings like administration offices, housing complexes,
lecture halls, libraries, student centers, sports facilities, and more
within a specific town or neighborhood. Important departments
and staff members work in buildings linked by corporate campus
networks. The corporate campus network, within a limited geographic
area, acts as the user-facing part of the larger corporate network.
In an ideal campus network, every node is connected to every other
node via optical fiber media, utilizing Gigabit Ethernet or 10-Gigabit
Ethernet technology. In certain places, such as university student
centers or libraries, where multiple users concurrently use portable
and mobile devices like notebook and tablet computers for research
and communication, Wi-Fi hot spots or even a hot zone comprise Keyword
the user end of the network. Occasionally, the phrase “campus Switched
network” refers to a group of geographically dispersed Internet Multimegabit
Data Service
users who share a common interest. Examples of such groups (SMDS) is a public,
include the International Sustainable Campus Network (ISCN), a packet-switched
forum that assists colleges, universities, and businesses in their service aimed at
enterprises that
pursuit of sustainability in research and teaching, and the Roosevelt need to exchange
Institute Campus Network, a nationwide student initiative. large amounts of
data with other
enterprises over a
wide area network
1.3.6. Metropolitan Area Networks (MAN) on a nonconstant or
Networks that cover an area the size of a metropolitan area are bursty basis.
known as metropolitan area networks. A Metropolitan Area Network,
or MAN, is made up of several interconnected Local Area Networks
(LANs) that may also be connected to a Wide Area Network (WAN).
A Metropolitan Area Network, or MAN, is a sizable computer network
that reaches across a city or a sizable university campus. Long-term
internet connectivity is the main goal of the Metropolitan Area
Network (MAN). Several LANs are typically combined into a MAN
(Metropolitan Area Network) to create a network. An optical fiber
setup makes up the backbone of this extensive network, known as
the Metropolitan Area Network (MAN).
The three technologies that are most frequently used to create
MAN (Metropolitan Area Network) networks are Switched Multi-
megabit Data Service (SMDS), ATM (Asynchronous Transfer Mode),
and Fiber Distributed Data Interface (FDDI). The most commonly
used is ATM (Asynchronous Transfer Mode). Digital data transfer
technology is known as ATM (Asynchronous Transfer Mode). It was
34 COMPUTER NETWORKS
created in 1980 with the goal of enhancing used to create a metropolitan area network,
real-time data transfer across a single or MAN. Routers and switches are used
network. Similar to a cell relay system, to set up the network. An active port that
ATMs (Asynchronous Transfer Mode) manages the filtering of data, typically in
divide data into fixed, equal-sized packets the form of frames, is called a switch. Every
that are transferred gradually. During a switch functions as two ports: on the one
video conference, the ATM (Asynchronous end, it handles data filtering, and on the
Transfer Mode) was used to access clear other, connection management. Another
audio and video results. ATMs’ qualities tool to help with network connectivity is
have made it possible for them to serve as a router. The data packets are assisted by
the foundation for wide area data networks. the router in determining the best course
of action. To put it another way, it monitors
Asynchronous Transfer Mode, or ATM, the transfer of data. An area of up to 50 km
combines packet switching and circuit is typically covered by MAN (Metropolitan
switching features to transfer data even Area Network).
in real time. The data transfer over LAN
standard FDDI has a range extension of The Metropolitan Area Network,
about 200 kilometers. Several thousand or MAN, is situated between the LAN
users’ data transmission can be supported and the WAN. As a result, it lowers the
with the aid of FDDI. It is known as cost associated with setting up a wide
the MAN (Metropolitan Area Network) area network while also improving data
technology for this reason. Fiber distribution handling efficiency. The Metropolitan Area
data interface, or FDDI, gets its name from Network, or MAN, provides centralized data
the fact that its fundamental infrastructure management. You can link numerous fast
is built on optical fiber. SMDS technology LANs together with it. Data transfer has
is used when transferring data via a been made easier by telephone companies
connectionless service. Data is transferred all over the world thanks to an underground
by storing information in the header and optical fiber network. The effectiveness and
traveling independently over any network speed of data transfer are improved by these
to reach its destination, according to optical fibers. A speed of nearly 1000 Mbps
connectionless services. Data transfers via is available to you thanks to the optical
SMDS technology result in the formation of fibers. A WAN with a speed of 1.45 Mbps
tiny data packets, much like those seen in will cost you more money than it will benefit
ATMs. Nevertheless, datagrams—unreliable you. On the other hand, a metropolitan area
data service provider’s data packets— network provides you with a total speed
can be transmitted over great distances of 1000 Mbps at the lowest possible cost.
thanks to SMDS. These days, microwave
and infrared signals are used to establish
MAN (Metropolitan Area Network) links. 1.3.7. Enterprise Private
Networks
Between LAN and WAN is typically
where MAN (Metropolitan Area Network) An organization connects its sites via an
is located. Connecting geographically enterprise private network, allowing the
separated LANs is the usual use for it. locations to share resources. An enterprise
In order to create a communication link private network is a type of computer
between two independent LAN nodes, network that enables large corporations
MAN’s objective. Optical fiber is typically with several dispersed offices to securely
COMPUTER NETWORKS AND SERVICES 35
connect those offices to one another via a network. Sharing of
computer resources is the primary purpose of an enterprise private
network.
Enterprise Private Networks fulfill the original function of
private networks, which was to share resources while protecting
data. Businesses create enterprise private networks to link their
various locations, which include offices, manufacturing facilities,
retail stores, warehouses, and other company sites. In order to
exchange resources. Enterprise Private Networks, or EPNs, are a
cutting-edge illustration of how information technology benefits the Keyword
business sector. Businesses can easily expand their operations by
Public network
connecting various departments that are spread out across remote is a wireless or
locations and frequently do not have connectivity with one another wired network that
through a private network. computers and
devices you don’t
trust are connected
This has a wide range of effects because it significantly affects a to.
company’s ability to be sustainable. Different business divisions can
benefit from the increased connectivity and resource mobility that
comes with integrating an enterprise private network. Enterprise
private networks place a high value on privacy, which is typically
protected by a combination of security controls and tunneling
protocols like the Layer 2 Tunneling Protocol. Internet service
providers, or ISPs, use a type of computer networking protocol
called L2TP, or Layer 2 Tunneling Protocol. Such a protocol exists
only to facilitate private network functions, like VPN and EPN.
Although Layer 2 Tunneling Protocol is a session layer protocol, it
resembles the Data Link Layer Protocol found in the OSI reference
model quite a bit.
A User Datagram Protocol, or UDP, is included in the Layer 2
Tunneling Protocol to facilitate communication. IPSec, or Internet
Protocol Security, is used as an encryption protocol since the
original version of this protocol lacked any features that could have
maximized data security, confidentiality, and encryption.
FOCUS ON CAREERS
NETWORK ENGINEER
A network engineer is a professional responsible for designing, implementing, and
maintaining the intricate systems that allow computers and devices to communicate
and share resources within an organization. These professionals play a crucial role in
ensuring the reliability, security, and performance of network infrastructure. Network
engineers design network layouts and architectures, considering factors such as scalability,
redundancy, and security requirements. They are adept at configuring and managing
networking equipment such as routers, switches, firewalls, and load balancers to establish
robust connectivity and enforce security policies. Monitoring network performance and
identifying and resolving issues promptly are essential aspects of their job.
Overall, network engineers are instrumental in maintaining the backbone of an
organization’s IT infrastructure, enabling seamless communication, collaboration, and
access to resources across the network while safeguarding against potential security
risks.
A Network Engineer usually plans and manages networks to ensure they function
as intended. Network Engineers are the integral cog of an IT system. People usually
confuse Network Technicians with Network Engineers. Network Technicians usually
assist with daily IT and troubleshooting tasks while Network Engineers deal with high-
level tasks that involve designing and improvising the network.
and privacy. Continuous learning is essential in this field, as network engineers must
stay updated with the latest technologies, protocols, and best practices to adapt to
evolving network demands and emerging cyber threats. Strong analytical and problem-
solving skills, along with attention to detail, are essential for success in this role.
• Maintain and control computer networks and associated computing environments
like software for systems, software applications, equipment, and configurations.
• Running operations for disaster recovery and backups of data where possible.
• Data, applications, and hardware are protected by organizing, preparing, and
enforcing network security measures.
• Troubleshooting, diagnosing, and solving hardware, software, and other issues
affecting the network and device.
• Replacing defective hardware components of the network where possible.
• Maintain, customize, and track the device and email applications for virus
protection.
• Network performance monitoring to decide whether any changes are required.
Conferring with network users on solving issues with current networks.
• Use master consoles to control network and computer system output.
• Coordinating access to the use of computer networks.
• Plan, install, and test networking devices, hardware for computers, and devices
for operating systems.
Expect
• The work is office-based, although you may need to work across different sites,
depending on the size of the organization and its network. More frequent travel
may be involved if you work as a consultant.
• Jobs are available throughout the UK in organizations with large, sophisticated
IT systems or with consultancies providing support to clients.
• The job can be challenging, particularly when things go wrong, as companies
are dependent on their computer networks.
• Women are underrepresented in the job and the gender imbalance across the IT
industry is a recognized issue. Steps are being taken to redress the balance. See
Women in Technology and BCSWomen for more information and job vacancies.
• Systems support roles such as network engineering involve less programming,
so you should consider this before committing to a career in this area if that
is something you really enjoy.
Qualifications
You’ll usually need a degree in a subject such as:
42 COMPUTER NETWORKS
• computer science
• computer software/computer systems engineering
• computer systems and networks
• electrical/electronic engineering
• mathematics
• network security management
• physics.
It may be possible to enter this career without a degree, provided you have
significant experience. There are many Level 4 network engineering apprenticeship
opportunities and you can search for them using Find an apprenticeship. To find out
more, see Apprenticeships.
Employers will usually expect you to do further study to get professional qualifications
if you don’t already have them. For example, many colleges and private training
organizations participate in the Cisco Networking Academy program, which provides
certification at several levels for students and network professionals.
Skills
You will need:
• An up-to-date knowledge and understanding of your employer’s business and
industry needs, as well as the technical demands
• To recognize the importance of customer focus and/or of serving the needs of
the end user
• Excellent communication skills for communicating with staff who aren’t technically
trained
• The skill to take on a variety of tasks and pay attention to detail
• Analytical and problem-solving ability
• Teamwork skills and the ability to feel comfortable working with different teams,
clients, and groups of staff across an organization
• Organizational skills and the ability to prioritize your workload.
Work Experience
Relevant work experience, for example through vacation work and summer placements,
is useful as recruiters often look for evidence of skills developed through project work
and placements.
Experience in related areas such as IT support, service, and repair can be useful if
you want to move into network engineering.
COMPUTER NETWORKS AND SERVICES 43
Being on the user end of IT systems is also helpful as this will give you an idea of
the types of problems that may arise.
Find out more about the different kinds of work experience and internships that
are available.
Employers
You can work for any organization with large, sophisticated IT systems. Typical employers
include:
• banks and building societies
• retail groups
• large government departments
• schools, hospitals and local authorities
• utility companies
• transport providers
• management consultancies.
Some organizations, including many local authorities and other public sector bodies,
outsource all their IT systems to specialists, so these specialist companies often have
vacancies for people with networking skills.
Network engineers can be employed by a large IT company to manage the firm’s
own systems or work in their contract services.
Large companies, such as Microsoft, provide an extensive range of installation and
customer support services and they recruit graduates and experienced staff into all
areas of IT support.
There are also many small consultancies that work by setting up and managing
systems for organizations that are too small to warrant full-time IT support.
Look for job vacancies at:
• CWJobs
• efinancialcareers
• Technojobs
Recruitment agencies specializing in IT, such as Hays, also have vacancies, although
these are more useful once you’ve built up some solid work experience. While large
companies usually have a structured graduate recruitment procedure, you can approach
small businesses and IT consultancies on a speculative basis, ensuring your CV stresses
your personal, as well as technical, abilities. Contracting may be an option once you’ve
gained substantial experience – visit Contractor UK for more information. Most job sites
include contractor roles as well.
44 COMPUTER NETWORKS
Career Prospects
Your career path will depend, to a certain extent, on the size of the organization you
work for and the scope of its IT systems. With experience, you can progress to senior
network manager and network management positions. Some network engineers choose to
broaden their careers into other IT, customer-related, or management functions. Technical
or infrastructure project management and network architecture are possibilities. Those
who start as help-desk technicians can sometimes progress to network engineer posts,
then on to senior network support, and finally network controller (mainly involved in
decision-making, staff management, and advice on future strategy). This may be the
typical route in an organization such as a large bank or a major government department.
COMPUTER NETWORKS AND SERVICES 45
A CLOSER LOOK
Computer networking is the backbone of modern communication and information exchange,
enabling devices to connect and interact with each other across various geographic
locations. At its core, networking involves the establishment of connections between
computers, servers, routers, switches, and other devices to facilitate data transmission,
resource sharing, and collaboration. The architecture of a computer network typically
follows a hierarchical model, with multiple layers of protocols and technologies working
together to ensure seamless communication. Protocols such as TCP/IP govern how data
is transmitted and received, while devices like routers and switches manage traffic flow
within the network.
One of the fundamental concepts in networking is the distinction between local
area networks (LANs) and wide area networks (WANs). LANs connect devices within
a limited geographical area, such as a home, office, or campus, using technologies
like Ethernet or Wi-Fi. WANs, on the other hand, span larger distances and connect
multiple LANs together, often utilizing leased lines, fiber-optic cables, or satellite links.
The internet itself is the most extensive WAN, providing global connectivity to billions
of devices worldwide.
Security is a critical aspect of computer networking, as networks are susceptible to
various threats, including unauthorized access, data breaches, and malicious attacks.
Network security measures such as firewalls, intrusion detection systems, and encryption
protocols help safeguard sensitive information and prevent unauthorized access to
network resources.
Advancements in networking technology are constantly pushing innovation and
shaping the digital landscape. Emerging trends like 5G connectivity, edge computing,
software-defined networking (SDN), and the Internet of Things (IoT) are changing how
networks are designed, deployed, and managed. These developments bring faster data
speeds, lower latency, increased flexibility, and scalability, creating new opportunities
for applications like autonomous vehicles, augmented reality, and smart cities.
46 COMPUTER NETWORKS
SUMMARY
• A computer network is a group of linked computers. Nodes are computers
connected to a network, either wirelessly using radio waves or through cabling
like an Ethernet cable.
• Wide Area Networks (WANs) connect computers and local networks to larger
networks across extensive geographical regions, like continents.
• A computer network is a group of computers connected by communication
channels to share resources and communicate with users.
• The fundamental idea behind OSI is that communication between two endpoints
in a network can be separated into seven different groups, or layers, of related
functions. Every user or program that communicates uses a device capable of
providing those seven levels of functionality.
• Specialized routing protocols are designed for internet network routers. Each
device in a ring topology has a unique point-to-point connection with only the
other two devices on either side.
• Every device in a star topology has a dedicated point-to-point link that connects
it to the hub, or central controller.
• Hostname is a special device name that is assigned to each device in the
network. In the Administrator Mode command prompt, type “hostname” and
hit “Enter” to see your machine’s hostname.
REVIEW QUESTIONS
1. What is the Open Systems Interconnection (OSI) model, and what are its different
layers?
2. What is network topology, and what are the common types of network topologies?
3. How does email management contribute to efficient communication within
organizations?
4. What are the key responsibilities of system administrators in managing computer
systems and networks?
5. What are Personal Area Networks (PANs), and what are some examples of
devices commonly used in PANs?
REFERENCES
1. Daniel, B., (2008). The Salsa20 family of stream ciphers; Chapter. In: Matthew, R.,
& Olivier, B., (eds.), New Stream Cipher Designs. Springer-Verlag.
2. Guido, A., Isaac, K., & McKeown, N., (2004). Sizing router buffers. ACM SIGCOMM
Computer Communication Review.
3. Joan, D., & Vincent, R., (2002). The Design of Rijndael: AES – The Advanced
Encryption Standard. Springer-Verlag.
4. Mills, D. L., & Kamp, P. H., (2000). The nanokernel. Proc. Precision Time and Time
Interval (PTTI) Applications and Planning Meeting (423–430). Reston VA.
5. Mogul, J., Mills, D., Brittenson, J., Stone, J., & Windl, U., (2000). Pulse-Per-Second
API for Unix-Like Operating Systems, Version 1 (p. 31). Request for Comments
RFC-2783, Internet Engineering Task Force.
6. Neal, C., Yuchung, C., Stephen, G. C., Soheil, H. Y., & Van, J., (2016). BBR congestion-
based congestion control. ACM Queue, 14(5).
7. Stefania, C., Bruce, D., Arjen, K. L., Walter, L., Peter, M., Brian, M., Herman Te, R.,
et al., (2000). Factorization of a 512-bit RSA modulus. Advances in Cryptology —
EUROCRYPT 2000, Lecture Notes in Computer Science (Vol. 1807). Springer-Verlag.
8. Vladimir, B., Suman, B., Marco, G., & Sangho, O., (2008). Wireless device identification
with radiometric signatures. Proceedings of the 14th ACM International Conference
on Mobile Computing and Networking (MobiCom ‘08).
CHAPTER
Network
2 Model and
Standardization
LEARNING OBJECTIVES
INTRODUCTORY EXAMPLE
The ISO/OSI model, which stands for The challenge arises when a vendor’s
International Standards Organization/Open products cannot easily integrate with those of
System Interconnection, is a commonly used other vendors, impacting their marketability.
reference model for network communication This, in turn, presents a significant issue
between two end users. Understanding for vendors. The ISO model provides a
the network’s operation can be helpful for networking architecture for implementing
addressing future issues. The significance of protocols layer by layer. While each layer
the OSI model cannot be overstated. Most functions independently, it also supports
networking suppliers and users recognize the layer above it and is supported by the
the importance of network computing layer below it. The layers are divided into
products adhering to and fully supporting two groups. When a message is sent to
the networking standards established by or from a user, the upper layers come into
this model. play. On the other hand, when a message
passes through the host computer, the lower
Connecting a vendor’s products to those layers are involved. Messages destined for
of other vendors becomes relatively easy the device target the higher layers, while
when they comply with the standards set those meant for another host do not get
by the ISO model. Conversely, the more a forwarded to the upper layers.
vendor strays from these guidelines, the
more challenging it becomes to integrate Layers of OSI model are as follows:
their offerings with those of other vendors. • Application layer
Deviating from the communication standards
fostered by the model would make software • Presentation layer
development efforts significantly more • Session layer
difficult for a vendor. They would need to • Transport layer
develop all the necessary software from
• Network layer
scratch instead of building on existing work
done by other vendors. • Data link layer
• Physical layer
NETWORK MODEL AND STANDARDIZATION 53
2.1.1. Application Layer
The application layer provides users, whether software or human, with network access.
It supports services like email, remote file access, transfer, shared database management,
and other distributed information services, offering user interfaces for them.
Figure 2.1. The request context of application layer (Source: Cloudflare, (https://cf-assets.www.
cloudflare.com/slt3lc6tev37/2rcDKpr4WLqoyAZ7GDKkyJ/7cab96402de7ac5465b86e617da3da4e/
osi_model_application_layer_7.png).
Figure 2.4. Transport Layer in OSI Networking System (Source: Fiberbit Technology Co.Ltd., http://
fiberbit.com.tw/wp-content/uploads/2013/06/transport-layer-in-osi-networking-model-system.jpg).
Multiplexing is the process of combining several signals (analog or digital) for transmission
over a single line or medium. Multiple low-speed signals are combined for transmission
over a single high-speed connection in a common form of multiplexing. A multiplexer
(MUX), which combines N input lines to produce one output line, is used to multiplex
data (many to one).
designs without significantly increasing the PLD’s size or power requirements or adding
needless complexity, a multiplexer that offers effective and flexible control and routing
options is needed.
2.3. TRANSMISSION
CONTROL PROTOCOL
(TCP)
→Learning Objectives
The Internet connection suite consists of two protocols, one of which is the Transmission
Control Protocol. The basis of almost all Internet traffic is formed by the combination
of this protocol and the Internet Protocol. Because these protocols are practically
indispensable in their usage and depend entirely on one another to function properly,
the Internet connection suite is commonly referred to as TCP/IP (Transmission Control
Protocol/Internet Protocol).
The Internet Protocol is in charge of routing and transmission, while the Transmission
Control Protocol disassembles and reassembles data. Small data bursts known as packets
make up the majority of Internet traffic. Along with some optional extra information,
these packets include details about the data’s origin and destination. The Internet
Protocol sends the packets over the Internet, while the Transmission Control Protocol
creates and reassembles them.
Consider moving a document from a distant computer to a local one to demonstrate
this procedure. The Internet protocol decides how the document needs to be moved
between the computers after the computer receives the move command. Next, the
transmission control protocol is requested by the Internet protocol to divide the document
in a particular manner. The document is then divided into packets by TCP, which are
then sent out via the Internet protocol. TCP starts reassembling the document packets
as soon as they reach the local computer. It first makes sure that it has all of them
and that they are in good condition. If not, it requests the necessary parts and waits
for them to be delivered. Once it has all the parts, it assembles the document by
70 COMPUTER NETWORKS
Figure 2.12. TCP Connection Establishment (Source: Birkbeck, University of London, https://
www.dcs.bbk.ac.uk/~ptw/teaching/IWT/transport-layer/retransmission.gif).
74 COMPUTER NETWORKS
One of the main network protocols used to send data over the Internet is the User
Datagram Protocol. It is a component of the Internet Protocol Suite, which sets the rules
for how computers connect to servers and to one another via IP networks. An application
can send datagrams, or messages, to other hosts via the User Datagram Protocol without
the need to first set up specific transmission channels or data paths. Compared to
other methods, this one is less dependable but allows for faster communication. Data
transmission is the main objective of the User Datagram Protocol. It offers no protections
against data corruption during transmission or to guarantee that the information actually
arrives. If error checking is necessary, the protocol assumes that the computers involved
in the communication will take care of it.
A stateless protocol is the User Datagram Protocol. In other words, it handles
every information request as a separate transaction. The benefit of running this way
is that the server can handle more traffic because ongoing conversations don’t require
storage space to be assigned. The User Datagram Protocol is actually superior to more
dependable communication techniques in some circumstances. For example, it enables
the delivery of messages without the lag time brought on by error checking. This is why
time-sensitive applications frequently use it. Voice over IP, a popular streaming media
application, is an example of this kind of application. For servers that process a large
number of tiny requests, the User Datagram Protocol is also helpful. The server can reply
to each request more quickly because it doesn’t have to allocate storage or establish
connections before speaking. All users will experience faster service as a result. For
this reason, servers that host online games frequently use the User Datagram Protocol.
Applications and upper-layer protocols can use UDP as a minimal, erratic, best-effort
message-passing transport. UDP and its variant UDP-Lite are distinct from other transport
78 COMPUTER NETWORKS
NETWORK MODEL AND STANDARDIZATION 79
protocols in that they do not create end-to-end connections between
communicating end systems. As a result, UDP communication has
little associated end system state and incurs no overhead during
connection establishment or teardown. These features make UDP a
very effective communication transport for some applications, but
they also make it unreliable and lack inherent congestion control.
Applications must be thoughtfully designed because UDP has a
second unique feature: it offers no inherent congestion control. On
many platforms, applications have the ability to send UDP datagrams
at the line rate of the link interface, which is frequently much higher Keyword
than the available path capacity [RFC 4505]. Service access
point (SAP)
UDP is being used more and more frequently as a tunneling is the point at
which a service
protocol. In this scenario, one tunnel endpoint encapsulates the begins (ingress)
packets of another protocol inside UDP datagrams and sends them or ends (egress)
to another tunnel endpoint, which forwards the original packets that and represents
the access point
were part of the payload after decapsulating the UDP datagrams. associated with a
Tunnels can be used to create virtual (private) networks by creating service.
virtual links that, in the physical Internet topology, appear to connect
distant locations directly. Since many middleboxes along the path
support UDP transmissions, using UDP as a tunneling protocol is
appealing when the payload protocol is not supported by them. There
is no communication security offered by UDP. Applications must
thus independently provide security services using extra protocol
mechanisms to safeguard their communications against message
forgery, tampering, or eavesdropping.
2.4.6. IP Networks
Developed in the 1970s, the Internet Protocol (IP) is the main
network protocol used on the Internet. IP and Transmission Control
Protocol (TCP) are frequently used together on the Internet and
numerous other networks; this combination is known as TCP/
IP. IP enables computers connected to a network to have unique
addresses. The Internet Protocol version 4 (IPv4) standard, which
has IP addresses that are four bytes (32 bits) long, is used by the
majority of networks. A 16-byte (128-bit) address is one of the
standard features of the more recent Internet Protocol version 6
(IPv6). Packets are the units of data organization on an Internet
Protocol network. Every IP packet consists of the message data
itself as well as a header that contains information about the source,
destination, and other details about the data. On layer 3 of the
84 COMPUTER NETWORKS
OSI model, IP operates. As a result, it can IP address. Typically, this IP address falls
operate over a variety of data link interfaces, neither at the beginning nor at the end of
such as Ethernet and WiFi. the range of network IP addresses, as the
first and last IP addresses are reserved
Communication between computing for specific purposes. Apart from the
devices is facilitated by networks. Every first and last IP addresses, all addresses
computer (host) connected to a network within the IP network range are considered
must employ the same communication host addresses. Hosts on a network can
protocols in order to communicate with communicate directly with each other
one another. on a one-to-one basis thanks to their IP
A computer network that uses Internet addresses. This type of communication is
Protocol as its communication protocol is known as unicast communication. A host IP
known as an Internet Protocol network. address consists of two parts: a network
Every computer connected to an IP network part and a host part. The network portion
needs to have a unique IP address that of the address identifies the IP network
identifies it as a host. A collection of hosts to which the host belongs, while the host
that utilize Internet Protocol for network part uniquely identifies an individual host.
layer communication and share a physical
connection is referred to as an Internet
Protocol-based network, or IP network. In an Did you know?
IP network, the IP addresses are contiguous, The dominant internetworking protocol in the
meaning there are never any gaps between Internet Layer in use is IPv4; the number 4 identifies
them. the protocol version, carried in every IP datagram.
IPv4 is described in RFC 791 (1981).
and decrypt sent data. This is a comparatively outdated method of network security,
and it is not too difficult to crack the WEP key.
A CLOSER LOOK
The network model serves as a foundational framework for communication and data
exchange within computer systems. It delineates how devices within a network interact,
communicate, and share resources. At its core, the network model comprises various
layers, each responsible for specific tasks such as data transmission, addressing, and
error detection. This modular approach ensures efficiency, scalability, and interoperability
across heterogeneous network environments.
Standardization plays a pivotal role in the development and implementation of
network models. By establishing uniform protocols, interfaces, and technologies,
standardization facilitates seamless communication between diverse devices and systems.
Key organizations such as the Institute of Electrical and Electronics Engineers (IEEE) and
the Internet Engineering Task Force (IETF) play instrumental roles in defining and refining
networking standards. These standards encompass a wide array of aspects, including
data formats, communication protocols, security measures, and network topologies.
The network model and standardization are intricately intertwined, with standards
providing the guidelines and specifications for implementing various layers and protocols
within the network model. For instance, the OSI (Open Systems Interconnection) model,
a prominent network model, delineates seven layers, each governed by standardized
protocols and interfaces. These standards ensure that devices from different manufacturers
can communicate effectively, fostering compatibility and interoperability.
Moreover, standardization fosters innovation and market growth by providing a common
framework upon which developers can build new technologies and services. It enables
seamless integration of diverse networking technologies, fostering the development of
sophisticated applications and services.
88 COMPUTER NETWORKS
ROLE MODEL
Christopher S. Strachey: One of the founders of denotational semantics,
and a pioneer in programming language design and computer time-
sharing.
Biography
Born on November 16, 1916 into one of England’s more prominent
families, Christopher Strachey was educated at Gresham’s School,
Norfolk, and at King’s College, Cambridge. He spent the war years
in radar research, after which he spent several years as a schoolmaster. His career in
computing did not effectively begin until 1951 when he started to program the machines
at the National Physical Laboratory and Manchester University, while still a master at
Harrow School.
In 1962, he also began work in the University Mathematical Laboratory, Cambridge,
where, in the nominal position of “part-time research assistant,” he worked on the
CPL programming language. In 1965, he wound up his consultancy and resigned from
Cambridge in order to form the Programming Research Group at Oxford University.
Under his leadership, the group quickly established an international reputation in the
theory of programming. At Oxford, in collaboration with Dana Scott, he produced the
work of which he was most proud, the foundation of denotational semantics; this work
was just beginning to bear fruit when he died in 1975.
Returning to King’s in October 1938 for a fourth and final year, he graduated in
the summer with a “lower second” in the natural sciences tripos. This mediocre result
was a considerable disappointment, and it dashed any hopes he had entertained of a
research studentship. Obliged to find an occupation of some kind, he accepted a post
as a physicist with Standard Telephones and Cables Limited (STC) at a salary of £4
per week.
Strachey began work in the Valve Development Laboratories of STC, London, in
August 1939, just a month before the declaration of war with Germany.
Most of his time at STC was spent as one member of a small team led by J.H.
Fremlin (later a professor at the University of Birmingham), investigating the theoretical
design of centimetric radar valves. Strachey’s particular contribution was the derivation
of analytical formulas for valve parameters and their experimental verification. His
mathematical work involved the integration of differential equations, some of which
proved particularly intractable; so, with colleague P.J. Wallis, he began to obtain
numerical solutions using a differential analyzer. He later came to regard this experience
with a computing machine as being something of a turning point, and his interests in
computing were aroused generally at this time; he began to read the literature on the
subject, and from time to time he also assisted STC colleagues in computational tasks.
NETWORK MODEL AND STANDARDIZATION 89
In July 1944 Strachey left Fremlin’s group and was transferred to London to work
in the STC Radio Division. This work was concerned with electrical and mechanical
design, which he found much less to his taste than the theoretical work. Strachey had
never liked the atmosphere of the STC laboratories (either at Ilminster or at London),
which he found “rather narrow-minded and sordid.”
Strachey began as a “physics-cum-mathematics” master at St. Edmund’s in October
1945, at a salary of £335 per annum.
He seems to have been a thorough schoolmaster: his lessons were meticulously
prepared, and he spent much effort coaching his pupils for public examinations. After
many applications to other schools, he was finally offered a position at Harrow School
and left St. Edmund’s in the spring of 1949.
Strachey began teaching at Harrow School in September 1949, at a salary of £600
a year. Securing a post at Harrow, one of Britain’s leading public schools, was a real
advancement to his career.
Strachey spent many of his evenings organizing societies and clubs. He was particularly
keen on the science society and gave talks on topics such as interplanetary travel and
the surface tension of soap films. He also played bassoon in the school orchestra, an
instrument he had taught himself at St. Edmund’s.
Against this background of busy “schoolmastering,” Strachey’s interest in computing
had been largely dormant since leaving STC. Of course, computers were very much in
the air in the late 1940s, and he no doubt read the semipopular articles.
His first exposure to a stored-program computer occurred in January 1951 when,
through a mutual friend, he obtained an introduction to Mike Woodger of the National
Physical Laboratory (NPL).
Back at Harrow, he began to write a program to make the Pilot ACE play draughts.
This was typical of his early attempts at programming: anyone with more experience
or less confidence would have settled for a table of squares. He got the idea of using
the machine to play draughts largely from an article by Donald Davies of NPL, “A
Theory of Chess and Noughts and Crosses,” that had appeared in the June 1950 issue
of Penguin Science News.
The following spring, Strachey learned from Woodger of the Ferranti Mark I computer
that had just been installed at Manchester University. This machine had a much larger
store than the Pilot ACE, with correspondingly greater scope for Strachey’s kind of
programming. Alan Turing, who was then assistant director of the Manchester University
Computing Machine Laboratory, had written the programmer’s handbook for the machine,
and Strachey had known him just well enough at King’s College that he could ask for
and receive a copy.
He visited the Manchester Mark I for the first time in July 1951. When Strachey
explained his ideas for a draughts-playing program, Turing was much impressed and
90 COMPUTER NETWORKS
suggested that another interesting problem would be to make the machine simulate
itself, in the fashion of the interpretive trace routines developed for the Cambridge
University EDSAC. Strachey was attracted by this idea and temporarily put the draughts
program to one side. The final trace program was some 1,000 instructions long-by far
the longest program that had yet been written for the machine, although Strachey was
unaware of this.
Shortly after, Strachey received a letter from M.H.A. Newman, professor of pure
mathematics at Manchester, complimenting him on the quality of his programs (which
had been reported by Turing), and saying that he hoped to be able to offer him a post
in the laboratory when one became available. Before he could do so, however, Strachey
came to the notice of Lord Halsbury, managing director of the National Research and
Development Corporation (NRDC). In November 1951 he was formally offered a post
as technical officer with NRDC at a salary of £1200. Strachey formally began as an
employee of NRDC on June 3, 1952.
During the first week of September 1952, Strachey attended the second ACM
National Conference, held at the University of Toronto. The conference was timed to
coincide with the inauguration of the FERUT, the second Ferranti Mark I, which had
been installed in the Computation Centre of the university.
NRDC had agreed to loan Strachey to the University of Toronto to help with
programming the calculations for the St. Lawrence Seaway project. Strachey spent all of
October and November, and part of the following spring, on the program. The program
was very long-about 2,000 instructions-and the input data tape was estimated to be
one and a half miles in length.
During his time in North America, Strachey visited various research labs and computer
manufacturers in the US, conducting a detailed study of different computers’ order codes.
He was one of the first in Britain to recognize the importance of this subject. In early
1954, he began discussions with Ferranti about designing a new machine, the Ferranti
Packaged-Circuit Computer (FPC, later known as Pegasus). He convinced Ferranti to
establish a small department to create a programming system for the machine, actively
participating in its development. The Pegasus programming system was a significant
achievement in British programming during the 1950s and had a profound impact.
Strachey, though relatively new to computing, was 38 years old when he started
working on Pegasus, displaying great energy and maturity. The project thrived under
his leadership, which was never as strong in subsequent endeavors.
In the late 1950s, multiprogramming (also referred to as time-sharing) gained
popularity. Strachey’s concept of time-sharing aimed to maintain direct interaction between
programmers and machines while benefiting from the efficiency of multiprogramming. He
applied for a time-sharing patent in February 1959, causing some tension with Kilburn’s
group at Manchester due to similarities with the Atlas project. In March 1959, after
eight years at NRDC, Strachey announced his decision to resign and pursue freelance
NETWORK MODEL AND STANDARDIZATION 91
director and consultant roles. Strachey formally started activities as a private consultant
on June 1, 1959, operating from his private address of 9 Bedford Gardens, Kensington.
As part of his consultancy agreement with Ferranti, Strachey undertook to deliver a
scientific autocode for the new ORION computer. To do this work, he took on a full-
time employee, Peter Landin, in January 1960. Landin spent only part of his time on
the autocode; with Strachey’s encouragement, he spent the remainder of his time on a
theoretical study of programming languages. It gave Strachey a certain ironic satisfaction
that he was financing “the only work of its sort being carried out anywhere (certainly
anywhere in England)” (Strachey 1971). Landin’s work, which concerned the application
of Church’s lambda calculus to programming language semantics, was described in a
classic paper, “The Mechanical Evaluation of Expressions.”
As well as financing Landin’s theoretical studies, Strachey was also prominent in the
public debate on programming languages, particularly Algol. For example, at the 1959
UNESCO conference in Paris, he was in fine form, holding forth on the deficiencies of
Algol while perched on the edge of a table on the platform, his legs swinging.
Strachey became well known for his outspoken view that Britain had fallen seriously
behind the US in the field of programming. The main reason for the poor progress in
Britain, Strachey perceived, was the small size of British machines. It was simply not
possible to implement a LISP compiler on a machine the size of Pegasus, which was
then the workhorse of most university computer centers.
In June 1962, Wilkes invited Strachey to work full-time in the University Mathematical
Laboratory, Cambridge, to participate in the development of a new programming language
and compiler for the Titan computer. Strachey accepted enthusiastically and began work
the following month. A considerable financial sacrifice was involved, for the salary that
Wilkes was able to offer was very modest compared to the consultancy fees he was
then able to command.
The CPL (Cambridge Programming Language) project got off to a most promising
start. By mid-August, the project group, which consisted of Strachey, Baron, and David F.
Hartley, had produced an outline proposal. In the autumn, the group began to collaborate
with Eric Nixon and John N. Buxton of the London University Computer Unit, so that
CPL could also be used on the London University Atlas.
Concurrent with the CPL activity at Cambridge, it must be recalled that Strachey
was also in business as a private consultant, with an office, a secretary, and his
principal assistant Peter Landin to support. From mid-1963, he was actively seeking an
opportunity to lead a university research group in the theory of programming. At first,
it was hoped to set up a research unit in the Mathematical Laboratory at Cambridge,
but this proved unsuccessful. In January 1964, Strachey also unsuccessfully competed
for the chair of Computing Science at Imperial College, University of London. Finally,
he secured the support of Leslie Fox, who succeeded in obtaining a DSIR grant to set
up a programming research group at Oxford University in July 1965.
92 COMPUTER NETWORKS
Although DSIR support for the Programming Research Group (PRG) started in July
1965, Strachey didn’t move to Oxford until April 1966. The work on CPL continued. In
June, Strachey gathered the full CPL group for a meeting, and it was decided, probably
due to his enthusiasm for revising earlier drafts, that Strachey should edit and distribute
the final version of the CPL reference manual. Throughout the rest of 1966, Strachey
and David Park kept working on CPL and preparing the reference manual, titled the
CPL Working Papers.
In the latter half of 1967, Strachey penned “Fundamental Concepts in Programming
Languages,” one of his most significant and lengthy papers, which, as usual, remains
unpublished in its original form. Like much of Strachey’s work at Oxford, though, the
paper had a significant impact through private circulation.
Since starting at Oxford, Strachey had limited his external activities to focus on his
academic work. For instance, he stepped down from his directorship of CAP in 1967,
although he remained a shareholder and a consulting fellow. He became less involved in
British Computer Society matters. He did participate in the computer science subcommittee
of the SRC and gave occasional external lectures and did some consulting, but these
activities were much less frequent compared to the early 1960s. On one memorable
occasion, he collaborated with Stanley Gill and Alex d’Agapeyeff to address a Labour
Party Science and Technology Committee, and in July 1973, he took part in a television
debate on the Lighthill report on AI research in Britain.
Strachey’s research into mathematical semantics took a significant step forward
in 1969 through his collaboration with Dana Scott. Scott, a mathematical logician at
Princeton University at the time, was on a sabbatical leave in Europe when he first
met Strachey at a lively meeting of IFIP Working Group 2.2 in Vienna during Easter.
Scott’s contribution was to provide a sound mathematical basis for the lambda-
calculus models that Strachey used in his formal semantics. Strachey had first used
this device in 1964 in his paper “Towards a Formal Semantics,” but now conceded it
was “gravely lacking in mathematical rigour.”
Strachey decided, early in 1973, to submit an essay for the Adams Prize of Cambridge
University, an award that has secured the reputation of many distinguished British
mathematicians over the years. The subject for the Adams Prize for 1973-1974 was
“Computer Science excluding Hardware,” and the competition was open to persons
admitted to a degree of the university. Apart from its obvious practical value as the kind
of tangible evidence that would impress a Royal Society election committee, winning
the Adams Prize perhaps meant something deeper to Strachey in terms of recognition
from the alma mater. The essay for the Adams Prize dominated the remainder of his life.
The Adams essay included an important historical account of the development of the
Oxford semantics and a final reworking of his “Fundamental Concepts in Programming
Languages.” The essay, with a few sections still unwritten, was finally dispatched to
the Cambridge University Registry at the very end of 1974. The effort of writing the
Adams essay took its toll on Strachey, and early in 1975 he spent several weeks away
NETWORK MODEL AND STANDARDIZATION 93
from Oxford resting. He returned to Oxford in the spring, where he continued to work
with Milne at completing the essay and revising it into book form. In a matter of weeks,
however, he contracted an illness diagnosed as jaundice; he obeyed the usual dietary
restrictions and made an apparent recovery, but the illness quickly returned. He died
of infectious hepatitis on May 18, 1975. The winner of the Adams Prize was announced
shortly after Strachey’s death. The submission of Strachey and Milne did not win.
Strachey made three important technical contributions to computing in Britain: the
logical design of computers, the design of programming languages, and the development
of denotational semantics. Strachey was responsible for a strong current of influence
in the design of programming languages. Perhaps more important than any details of
a particular language was the example that Strachey set: his whole approach to the
subject and his way of going about things. Donald Michie made this point well when
he wrote in 1971: Today an “invisible college” of programming theory exists throughout
the Universities of Britain. Almost every member of this “college” was guided along the
path at some stage by Strachey’s direct influence. Developments of theory may in the
long run prove decisive in helping to clear the hurdles of software engineering which
still lie ahead (Michie 1971).
94 COMPUTER NETWORKS
SUMMARY
• A network’s foundational component is its networking software. Administrators
can use it to deploy, maintain, and keep an eye on networks. Conventional
networks consist of specialized hardware, like switches and routers, which
combine networking software into the whole setup.
• The ISO/OSI model, which stands for International Standards Organization/
Open System Interconnection, is a commonly used reference model for network
communication between two end users. To solve future issues, it can be useful
to have a fundamental understanding of the network’s operation.
• Transmission of data over the network is handled by the transport layer. The
data is conceptualized at this level more as a conversation than as individual
packets. This is achieved by using protocols, which are referred to as “rules of
communication.”
• The network layer makes sure that every packet makes it from its point of
origin to its destination, while the data link layer manages the packet delivery
between two systems connected by the same network (links).
• The physical layer of a network consists of the actual cables, fibers, cards,
switches, and other electrical and mechanical components. This layer converts
digital data into signals so that they can be transmitted over a wire.
• Multiplexing is the process of combining several signals (analog or digital)
for transmission over a single line or medium. Multiple low-speed signals are
combined for transmission over a single high-speed connection in a common
form of multiplexing.
REVIEW QUESTIONS
1. What mechanisms are used in the transport layer?
2. How is framing detection understood in the Data Link Layer?
3. What are the various types of multiplexing?
4. What is the purpose and functionality of digital multiplexers?
5. How is connection establishment and termination clarified?
REFERENCES
1. Alderson, D., Li, L., Willinger, W., & Doyle, J. C., (2005). Understanding internet
topology: Principles, models, and validation. IEEE/ACM Transactions on Networking,
13(6), 1205–1218.
2. Bhandarkar, S., Jain, S., & Reddy, A., (2005). Improving TCP performance in high
bandwidth high RTT links using layered congestion control. Proceedings of the 3rd
International Workshop on Protocols for Fast Long-Distance Networks.
96 COMPUTER NETWORKS
3. Bresnahan, J., Link, M., Khanna, G., Imani, Z., Kettimuthu, R., & Foster, I., (2007).
Globus GridFTP: What’s new in 2007. Proceedings of the 1st International Conference
on Networks for Grid Applications. Article 19.
4. Kelly, T., (2003). Scalable TCP: Improving performance in highspeed wide area
networks. ACM SIGCOMM Computer Communication Review, 33, 83–91.
5. Leith, D., & Shorten, R., (2008). Next generation TCP: Open questions. Proceedings
of the 6th International Workshop on Protocols for Fast Long-Distance Networks.
6. Magoni, D., & Pansiot, J. J., (2002). Internet topology modeler based on map
sampling. Proceedings of the 7th International Symposium on Computers and
Communications (ISCC 2002) (pp. 1021–1027).
7. Mahadevan, P., Hubble, C., Krioukov, D., Huffaker, B., & Vahdat, A., (2007). Orbis:
Rescaling degree correlations to generate annotated internet topologies. ACM
SIGCOMM Computer Communications Review, 37(4), 325–336.
CHAPTER
Local Area
3 Network/Wide
Area Network
LEARNING OBJECTIVES
INTRODUCTORY EXAMPLE
• Trace the historical development and milestones of local area networks (LANs).
• Identify different types of LAN architectures and topologies.
• Analyze the role of LAN applications in enhancing productivity and efficiency
in business environments.
• Define the characteristics and attributes that distinguish LANs from other types
of networks.
• Identify the different types of devices commonly found in LAN environments.
• Explore the hardware components and infrastructure required to establish and
maintain a LAN.
• Analyze the advantages and benefits of deploying a LAN in a computing
environment.
• Explain the importance of protocol standards in ensuring interoperability and
compatibility in LAN environments.
• Explore the standards and specifications that govern LAN technology and
operations.
The network is privately owned and hardware such as a printer. For computer
is known as the local area network. A communications, a local area network, or
network is an assembly of computers and LAN, is a type of shared packet network
other devices that are linked together to with limited distance. Every machine in a
exchange data. A local area network, or LAN is linked by a single cable. A LAN
LAN, is a type of network that can function can have data rates as high as 100 Mbps,
over a small physical area, such as a few with a range of 4 to 16 Mbps. A local area
kilometers in size, which could be an office, network (LAN) can also simply refer to the
factory, or collection of buildings. Widely hardware and software that enable device
used in a range of computers, LANs allow networking. In this regard, Ethernet and
resources (e.g., printers) and communication Local Talk are two different types of LANs.
of data. To share resources, LANs connect The Local Talk protocol is called AppleTalk.
the workstations and personal computers
in the offices. The resources that need Hardware, protocols, and cabling
to be shared can be data, software, or standards comprise the parts that LANs
use. Ethernet, Token Ring, TCP/IP, 5MB,
LOCAL AREA NETWORK/WIDE AREA NETWORK 101
NetBIOS, NetBeui, IPX/SPX, Fiber Distributed Data Interchange (FDDI), and Asynchronous
Transfer Mode (ATM) are some examples of LAN protocols.
LANs can be identified from other kinds of networks based on their topology, size,
and transmission technology. A limited local area network (LAN) is one that can cover a
comparatively small area. LANs employ cable-based transmission technology. Conventional
LAN technology has very low error rates and can transmit data at 10 Mbps to 100
Mbps. But LAN technology today can transfer data at up to 10 Gbps. For broadcast
LANs, a variety of network topologies are possible. One client machine is the master
machine in a linear cable network (Bus) at any given time, and it is only permitted to
transmit. Every other machine doesn’t send any data. The ring is the second kind of
broadcast LAN. There, LAN speeds of 4 and 16 Mbps are used. Another illustration of
a ring network is FDDI.
3.1.8. Protocol
A local area network is one that operates within a structure, such
as a home office, business, or office. LANs are utilized in confined
geographic areas. Within a constrained network distance, LANs can
transfer data at speeds of up to 10Mbps. Peer-to-peer networking and
client-server networking are the two forms of network architecture
that can be used in local area networks. Ethernet and Token Ring
connections are the most often used types in local area networks
(LANs).
The ability of LAN protocols to effectively transfer data over
shorter distances—a few hundred feet, for example—through a
variety of media—including copper cabling—sets them apart. There
are various “layers” of the “Open Systems Interconnect,” or OSI,
model, and distinct protocols for various uses. Generally speaking,
lower level, or physical, layers are meant to be described when a
protocol is referred to as “LAN.” The most widely used LAN protocols
are “Fiber Distributed Data Interface,” or “FDDI,” “Ethernet,” and
“Token Ring.” By far the most popular kind of LAN protocol is
“Ethernet.” It is identifiable by its typical “CAT5” copper cable
medium and is found in homes and offices all over the world. To
exchange data, all systems connect to a switch or hub.
LOCAL AREA NETWORK/WIDE AREA NETWORK 109
The outdated LAN technology known or a constrained geographic area. Both
as “Token Ring” is becoming less common. wired and wireless connections between
The fundamental idea behind “Token Ring” the devices are possible. Standard LAN
is that only the intended recipient can read technologies include IEEE 802.11 Wireless
a single “token” that is transferred between LAN, Ethernet, and Token Ring.
systems or via a hub. The term “FDDI”
describes the fiber cabling method used to • Ethernet: The most popular LAN
transfer LAN traffic. When greater security technology, as defined by IEEE
is needed or longer distances—typically standards 802.3, is Ethernet.
between floors or buildings—are needed, Ethernet’s widespread use is due
fiber cabling is utilized. Multiple network to its simplicity in understanding,
protocols can be used by LANs (Local Area implementation, and maintenance,
Networks) to define their networks. The OSI as well as its ability to enable
Data Link Layer defines these protocols. low-cost network implementation.
Additionally, Ethernet allows for
• ARP (Address Resolution flexibility in terms of permitted
Protocol): Converts IP address to topologies. The Physical Layer and
MAC Address. An ARP cache is Data Link Layer are the two OSI
maintained in the system that has model layers in which Ethernet
a table mapping of IP address to functions. Since we primarily work
MAC address in the Network. with DLL, the protocol data unit
• RARP (Revers Address Resolution for Ethernet is the frame. Ethernet
Protocol): Convers MAC address to uses CSMA/CD as its access control
IP Address mechanism to handle collisions.
Ethernet employs the Manchester
Classifications of LAN transmissions:
Encoding Technique.
• Unicast: Data is transmitted from Since we are talking about IEEE 802.3
source to a destination system standard Ethernet, therefore, 0 is expressed
• Multicast: Data is transmitted from by a high-to-low transition, a 1 by the
source to multiple destinations low-to-high transition. In both Manchester
using a special multicast IP address Encoding and Differential Manchester,
Encoding Baud rate is double of bit rate.
Baud rate = 2* Bit rate
Did you know?
Ethernet LANs consist of network nodes
The development and proliferation of personal
and interconnecting media or link. The
computers using the CP/M operating system in the
late 1970s, and later DOS-based systems starting in network nodes can be of two types:
1981, meant that many sites grew to dozens or even
hundreds of computers. • Data Terminal Equipment (DTE):
DTEs are typically the final devices
that change signals received into
user information or vice versa.
3.1.9. LAN Standards Personal computers, workstations,
A local area network, or LAN, is a type file servers, print servers, and
of data communication network that links other devices commonly referred
computers or terminals within a building to as end stations are examples
110 COMPUTER NETWORKS
Wide area networks, or WANs for short, are communication networks that connect
local computer networks to a wider, functional network that can span both domestic
and foreign locations by utilizing current technology. On the other hand, the local area
network and the metropolitan area network offer communication inside a constrained
geographic area. It’s often desirable to link two computer networks together, especially
for companies with multiple locations. Using current telephony technology makes this
process easier, starting with the local area network and moving on to the wide area
network. Fiber optics are commonly used to establish connections between networks
in different facilities. This typically involves using PSTN (public switched telephone
network) technology or POTS (standard phone lines). Another option for network creation
emerged in the 1990s: ISDN (integrated services digital network) solutions. This was
mainly because it became more cost-effective to expand the network across international
borders.
A wide area network, or WAN, allows businesses to use shared resources to operate.
For example, many retail pharmacies use it to help customers who fill prescriptions at
their stores. Once a customer is in the pharmacy’s common customer database, they can
fill a prescription at any of the company’s locations—even when they’re on vacation in a
different state. Businesses also benefit from using wide area networks. With this kind of
wide area network application, internal operations like sales, marketing, production and
development, and accounting can also be shared with approved locations. Employees
can work from almost anywhere by using this to combine disparate location-based
LOCAL AREA NETWORK/WIDE AREA NETWORK 113
computer networks into a single computer information,
network for the entire company. In the event • Sets up a connection to the far-end
that a natural disaster damages or renders servers,
one facility unusable, staff members simply
• Sends the information to the far-end
relocate and continue working using the
servers,
shared network at their new location.
• Receives an acknowledgment
The current GPRS, EDGE, or 3G mobile from the far-end servers with the
network is expected to be used for the Wide message sequence number of the
Area Network because it is widely accessible last information received,
and has coverage in the majority of the UK.
• Completes Cyclic Redundancy
The crucial aspect in this situation is that
Checks (CRC) successfully, and
data from the Personal Connector must be
routinely sent to the distant servers for • Sends a ‘Success’ message back to
examination. Installing a software program the Personal Connector with the
on a mobile device allows it to interact message sequence number and
with both the server application and the receives an acknowledgment, sent
Personal Connector. This software, known by the Personal Connector.
as service integration software, is essential • All pointers and information are now
for facilitating the communications needed updated. A timeout occurs, and the
for the analysis of data on smart clothing. data is resent in failure scenarios,
such as when acknowledgments are
There may be times when the mobile not received or CRC malfunctions.
network doesn’t receive any signal, Whether it is GPRS or 3G, this
preventing data from being sent to distant software program will provide the
servers. In such situations, data is retrieved interface to the selected mobile
from the Personal Connector and stored on network. The software program
the mobile device. The Personal Connector can be updated in the future in
holds onto this data until the end servers response to changes in the wide
can be reached and the data transfer is area network, which could involve
completed successfully. Each piece of data Wi-Max or any other technology
is time-stamped and assigned a message selected for 4G mobile. Establishing
sequence number. This two-stage process a reliable protocol is essential for
enhances the overall service reliability, the complete data transfer process
ensuring that information can be transmitted from the home network to the
to the far-end servers once the wide area distant servers through a wireless
mobile network is accessible. This eliminates wide area network.
the need to wait for data transfer from the
Personal Connector to be successful.
3.2.1. WAN Protocol
In a normal scenario,
Packet-switching exchange nodes (PSEs)
• This application polls the Personal are the hardware that drops traffic onto
Connector, the wires connecting sites in standard-
sized packets, delivered in order, with error
• Retrieves the information,
correction. X.25 is one of the oldest protocols
• Checks the timestamps and used to deliver WAN traffic. Leased lines,
message sequence numbers of this dial-up phone services, and Integrated
114 COMPUTER NETWORKS
3.2.2.2. CSU/DSU
A combined piece of equipment called a Channel Service Unit (CSU)
and Data Service Unit (DSU) is used to monitor line clocking and
frame synchronization. It is also capable of error detection at the
physical layer; in a way, it functions like a modem.
Remember
Wide-area
3.2.2.3. Access Server
network (WAN)
optimization is
Concentrates dial-in and dial-out user communications. An access
a collection of server may have a mixture of analog and digital interfaces and
techniques that support hundreds of simultaneous users.
improve WAN
performance
metrics such 3.2.2.4. WAN Switch
as throughput,
congestion, A multi-port internetworking device used in carrier networks. These
and latency. devices typically switch traffic such as ATM and operate at the Data
WAN design,
Link layer of the OSI reference model. Public switched telephone
technology
choices, and network switches may also be used within the cloud for circuit-
traffic flow switched connections like Integrated Services Digital Network (ISDN)
arrangements or analog dial-up.
all affect WAN
performance.
3.2.2.5. Router
A router provides internetworking between the LANs and WAN
access interface ports that are used to connect to the service provider
network. These interfaces may be serial connections or other WAN
interfaces. With some types of WAN interfaces, an external device
such as a DSU/CSU or modem (Analogue, Cable, or DSL) is required
to connect the router to the local point of presence (POP) of the
service provider.
Core Router
A router that resides within the middle or backbone of the WAN
rather than at its periphery. To fulfill this role, a router must be able
to support multiple telecommunications interfaces of the highest
speed in use in the WAN core, and it must have the ability to forward
IP packets at full speed on all of those interfaces. The router must
also support the routing protocols being used in the core.
A: The exact design of your WAN architecture will vary based on your business
requirements and the type(s) of WAN in use. However, seven architectural components
are essential for WAN implementation:
1. End devices. End devices are computing systems that are being connected through
wide area network technology.
2. Customer premises equipment (CPE). While most of the networking infrastructure
used in WAN is owned by the carrier or service provider, CPE is owned by the
enterprise and sits in your local environment.
3. Access points and routers. While access points and routers technically fall under
CPE (as they are located within the LAN environment), they deserve special mention
as indispensable architectural components of WAN. A router is your core LAN hub
and manages data flow to and from your end devices.
4. Network switches. Network switches (also part of your CPE) sit between your
access points and routers and the end devices to which they are connected.
5. Local area network (LAN). LAN is a key architectural component of a wide area
network. All the components we discussed so far (end devices, CPE, access points,
routers, and network switches) are part of your local area network environment.
6. Connecting media. The connecting media carries data packets in a WAN mesh
architecture to and from different LAN components. There is a wide variety of media
to choose from when setting up your WAN, including traditional MPLS lines, fiber
optic cables, the cellular (3G, 4G, or 5G) spectrum, and satellite connectivity.
LOCAL AREA NETWORK/WIDE AREA NETWORK 121
7. Metropolitan area network (MAN) – optional. A metropolitan area network or
MAN is an optional component of WAN architecture. Instead of directly connecting
two or more LAN environments, you can choose to connect LANs within a relatively
small radius using a MAN.
8. Unified management portal – optional, but recommended. A unified WAN management
portal is becoming increasingly commonplace in enterprise WAN implementations. This is
because WAN can be difficult to orchestrate and manage, with each LAN hub responsible
for network management for its own location.
should be used by end users who use WAN to guard against device
compromises and illegal access. In addition to providing WAN
connectivity, using a VPN has the added advantage of encrypting
Keyword data. Network devices connected to a WAN from a remote location
Virtual private should also require users to establish a VPN connection. Furthermore,
network (VPN) a key-exchange feature of SD-WAN is utilized for device authentication
is a mechanism for
creating a secure across various endpoints.
connection between
a computing It is not reasonable to expect a certain level of security from a
device and a WAN service provider, even though a WAN can be just as secure. A
computer network, WAN system’s complete security is not guaranteed, not even with
or between two
networks, using a VPN in place. A hacker previously obtained access to Microsoft
an insecure by breaking into a user’s home device, which then followed the
communication VPN back to Microsoft.
medium such as the
public Internet.
internal networks. The gateway that allows example of this would be that three other
data to move back and forth between a LAN routers are connected to a single router via
and a WAN is called a WAN port. its LAN ports, and it receives high-speed
information from those routers at its WAN
On a network router, WAN ports are ports. With respect to one another, these
typically located for users. Four LAN ports internal networks would be completely
and one WAN port are found on a typical separate entities with no more connection
home router. For the WAN port, they are than if they were part of a network in an
referred to by some routers as an uplink, entirely different building.
and for the LAN ports, as wired connections.
This port splits data to multiple computers
within the home network after receiving it 3.2.8. Build a WAN
from a high-speed Internet source, like a
Creating a Wide Area Network, or WAN,
cable modem. Although four LAN ports are
entails setting up a link to your location
found on most home routers, there can be
through a third-party service provider.
zero, an infinite number, or rarely more than
Various WAN technologies can be used
eight. All five of these ports are visible as
based on your location and needs. For
rectangular holes on the device’s back. They
instance, much like a VPN, an MPLS network
are all made to be connected to a network
can be used to establish a single network
cable. Though it otherwise has the same
from several physical locations. You need
appearance as the LAN ports, the WAN
your own networking hardware, such as
port is typically positioned differently from
switches and routers, and a service provider
the other ports to facilitate identification.
contract in order to construct a wide area
The router is where the two port types network (WAN).
differ most significantly. Information from the
1. To find out what kinds of WAN
Internet or an external network is received
services are available, get in touch
by the WAN port. The internal firewall
with a local service provider. Frame
and routing system of the router filter the
relay and T1 are common services.
data. After that, the data is transmitted to
It’s possible that business-class
the appropriate LAN port or to a wireless
cable and DSL services are available
source via a wireless connection. Routers
in your area. The service provider
have switching capabilities in addition to
establishes a demarcation point
routing and firewalling capabilities. This
and installs their equipment at
enables communication between computers
your location after you choose a
that are linked solely through LAN ports.
desired service.
The PCs are all connected to the same
network because this switching feature gets 2. Get a router and attach the WAN
around the router’s built-in firewall. Users connection to it. Even if the service
can expand the size of their network by provider installs a router as part
using this feature to link multiple routers of the wide area network (WAN),
to one another. you will probably still require
a separate router for local area
Multiple internal networks that function network (LAN) access and control.
independently of one another could be It is your responsibility to use a
created if they connected several routers router that can connect to the WAN
to one another via the WAN port. An circuit if the service provider does
LOCAL AREA NETWORK/WIDE AREA NETWORK 125
not supply one. For instance, your router needs to have a T1 interface module
if you bought a T1 connection.
3. Link your router to the network switch. All LAN connections are gathered by
a network switch and connected to the router, which then routes the relevant
traffic over the WAN connection. Using one or more Ethernet cables is the most
typical method of connecting a switch to a router. Your router might have a
built-in switch with enough ports to connect every device on it, depending on
how your network is set up.
A CLOSER LOOK
Local Area Networks (LANs) and Wide Area Networks (WANs) are two fundamental types
of computer networks, each serving distinct purposes and catering to different scales
of connectivity. Despite their shared goal of facilitating communication and resource
sharing, they exhibit several significant differences upon closer examination.
LANs are typically confined to a limited geographical area, such as a single building,
office, or campus. They are characterized by high data transfer rates and low latency,
making them ideal for facilitating fast communication and resource sharing among devices
within their defined boundaries. LANs commonly utilize Ethernet or Wi-Fi technologies
for connectivity, with devices interconnected through switches or wireless access points.
Due to their localized nature, LANs are relatively easier to set up, manage, and maintain
compared to WANs. They offer inherent security advantages as the network administrator
has more control over access and monitoring within the confined environment.
In contrast, WANs span larger geographical areas, often connecting multiple LANs
or individual devices across vast distances, such as between different cities, countries,
or continents. WANs employ various technologies, including leased lines, satellite links,
and fiber optics, to establish connections over long distances. The expansive reach
of WANs introduces challenges such as higher latency and lower data transfer rates
compared to LANs due to the increased distance and the involvement of multiple
interconnected networks and devices. WANs are commonly used by organizations to
facilitate communication between geographically dispersed branches, enable remote
access for employees, and access centralized resources hosted in data centers.
One of the key differences between LANs and WANs lies in their ownership and
management structures. LANs are typically owned, operated, and maintained by a
single organization, such as a company, university, or government agency, allowing for
centralized control and customization according to specific requirements. In contrast,
WANs often involve collaboration between multiple entities, including Internet Service
Providers (ISPs), telecommunications companies, and government agencies, making
their management more complex and requiring adherence to standardized protocols and
agreements for interconnection and data exchange.
Another critical aspect to consider is scalability. LANs are inherently scalable
within their confined environment, allowing for the addition of devices and expansion
of network capabilities as needed. However, scaling a LAN to cover larger geographical
areas would require transitioning to WAN technologies and addressing the associated
challenges of long-distance communication and connectivity. WANs, on the other hand,
are designed to scale across vast distances, accommodating the growth and changing
needs of organizations operating across multiple locations or serving diverse user bases.
LOCAL AREA NETWORK/WIDE AREA NETWORK 127
CASE STUDY
CASE STUDY AND ANALYSIS OF WAN OPTIMIZATION
PRE-REQUIREMENT
In today’s world, the WAN network is congested with high traffic, which causes a lot
of data loss and jitter. In order to provide a solution for this, a WAN Optimizer (e.g.,
Riverbed) was introduced over the WAN network to significantly improve network
performance. However, there are many criteria that must be fulfilled to achieve a
considerable amount of data transaction, including a decrease in the percentage of data
loss over the network. These criteria will be analyzed during the discussion of the case
study. Every organization has multiple applications running over the network, resulting in
the available bandwidth being shared among them. If not balanced properly, this could
lead to significant losses in business, data transactions, and application performance.
Therefore, it is important to design this network in a way that ensures the organization’s
investment is satisfactory.
Data Transmission = Total data transmitted – Data loss (Calculate this for Fiber
Optic and Cat 6/5e cables) (4(i))
% of network performance = Total Data transmission/ Total bandwidth provided
* 100
v) % of service provided by ISP = (24*7 – Downtime) / (24*7) * 100 (5)
% of Service provided by ISP: % of overall Output (Expected along with fault
tolerance)
vi) Total Consumption (%) = ABC*UBC*BW*DBC*UWBC (6)
ABC – Application Bandwidth Consumption UBCUser Bandwidth consumption
BW- Bandwidth wastage DBC- Data Transaction Bandwidth Consumption UWBC
– Unwanted Bandwidth Consumption.
vii) % of N/W used during peak hours : % of N/W usage in non-peak hours/ weekend
These are some of the criteria that will help the Infrastructure team design the
network initially and put some of the operations of an application live to get an idea
of the network consumption as a whole. Based on the overall performance, they can
configure the WAN Optimizer, which will in turn accelerate the performance of the
applications running live.
Figure 1. WAN optimization and performance (Source: Bhargav. Balakrishnan; Case study and
analysis of WAN Optimization pre-requirements; https://arxiv.org/ftp/arxiv/papers/1109/1109.2285.
pdf).
For example, Finacle is now widely used in the banking sector, where it will be
integrated with Oracle Applications, Oracle Database, etc. Along with this, there are
commonly used applications like Active Directory service, Exchange Servers, Anti-
LOCAL AREA NETWORK/WIDE AREA NETWORK 129
Virus Servers, File Servers, SharePoint Servers, Web Servers, Blackberry Servers, etc.
Therefore, the bandwidth consumed by these applications should be carefully studied
by the network management, server management, and application management teams.
Based on this, the router and WAN Optimizer should be configured to achieve the best
overall output by minimizing data loss. Once data loss is reduced, transmission over
the network becomes much faster, thereby reducing jitter and data loss to a greater
extent. However, it is not possible to eliminate data loss and jitter completely, as there
is always a certain amount of data loss and jitter, along with a reduction in network
performance.
II. Case Study of Bank (Large Sectors)
During the design phase, the IT Team will have all the reports that were discussed.
Initially, the team should start working on the core applications that will be widely used
by the organization. Subsequently, all other common applications should be taken into
account, and a statistical graph should be created to show the approximate bandwidth
consumption by each application. An example of a statistical graph is shown below. In
this graph, let’s consider the consumption of Sharepoint portal and Finacle, which are
used more frequently. Therefore, these applications should be prioritized based on their
importance to the organization. These applications will be configured on WAN optimizer
to ensure performance can be maintained. Backup should also be taken care of in WAN
Optimization as it plays a role in storing and retrieving data. Therefore, these specific
applications should be tested before being launched live. The calculations of the above
formulas should be done in both test and live environments so that the IT team can
have a clear understanding of the bandwidth consumption. These calculations can serve
as a case study for future upgrades and references. Based on this, the IT Team will be
able to determine how successfully they have implemented the infrastructure for the
organization.
B. Live Environment
The organization should always conduct periodic tests on the performance of all applications
over the network. Any identified flaws should be promptly analyzed and the information
should be sent to the respective team. Based on this, the change advisory board should
decide on an alternate solution, for example, if the bandwidth consumption is high during
peak hours. The reasons for these issues should be discussed during meetings, such as:
1. Users downloading unwanted files from the internet 2. Certain applications utilizing
excessive bandwidth, especially core applications 3. Data storage transmission between
applications and the database 4. Anti-virus and firewall applications like ISA, Forefront
Security, etc. These are common issues that need proper justification. To justify these
issues, the team should prepare a case study on the application and conduct testing from
all perspectives. For example, if it involves a database, consider how data is distributed
over the network, such as network load balancing, to avoid performance issues. When
structured in this manner, WAN Optimizer can enhance application performance. To
achieve the best throughput with WAN Optimizer, certain prerequisites need to be met.
LOCAL AREA NETWORK/WIDE AREA NETWORK 131
It is crucial to balance the performance of all applications over the network, especially
for databases that primarily work on clustering.
The test results of all live servers should be presented to management every six
months as a report to demonstrate how well the infrastructure is maintained within
the organization.
C. Execution
This will be final phases after Live Testing of the critical applications. Here the reports
of all the testing which were done in the live servers will be verified that the condition
satisfies the usage of WAN optimizer and the respective applications for which this
needs to be prioritized. How is the prioritization calculated?
1. Prioritization in % = Number of usage * Approx. time duration utilized /total
no of employee * 100
In approximate time duration time duration of peak hours with + or – extra
hours.
2. Downtime in % = Total working hours(Application in WAN optimizer) / Total
working hours *100 Downtime is unplanned downtime. Maintenance will be
reduced in total working hours itself.
3. Percentage of transactions = Total of transaction done – Total no of lost transaction
/ Actual number of transaction * 100
So why above calculation are done for fixing a WAN Optimizer? What is need of
these testing processes? Hardly the device is going to cost some 10 Lakhs Maximum
with installation charges. The answer for this every inclusion of additional device needs
a proper justification and at the time same the investment should have some output
in the organizations overall result. These tests are conducted solely to ensure that the
critical applications are brought under the umbrella of the WAN Optimizer, which will
handle the performance of all applications configured under it. Subsequently, these
tests should be conducted to verify if there are any changes in the processing speed of
the desired applications. This will generate the final report for the management team,
indicating that WAN optimization will enhance the performance of critical applications
within the organization. Consequently, the organization can anticipate these results in
the upcoming financial year.
When the Excel sheet containing the above graph is opened, there is a prioritization
of core applications used in the banking sector. This scenario will be the same for other
sectors as well. Therefore, when the WAN Optimizer is configured in this manner, the
performance of the core applications will significantly improve, especially the daily backup
of the entire banking process. It should be generated properly to avoid data loss in case
of network performance interruptions, as the data transfer percentage depends on the
type of cable used, particularly for backup purposes where fiber optic cables are utilized.
In countries like India, the end-of-day (EOD) process can be cumbersome, making this
optimization process quite relieving, as it reduces the need for constant monitoring.
132 COMPUTER NETWORKS
Figure 2. Live testing of WAN (Source: Bhargav. Balakrishnan; Case study and analysis of WAN
Optimization pre-requirements; https://arxiv.org/ftp/arxiv/papers/1109/1109.2285.pdf).
The process flow of this implementation should be according to the above Step that,
i.e., designing and test.
LOCAL AREA NETWORK/WIDE AREA NETWORK 133
Figure 3. Process Flow Diagram of WAN (Source: Bhargav. Balakrishnan; Case study and analysis
of WAN Optimization pre-requirements; https://arxiv.org/ftp/arxiv/papers/1109/1109.2285.pdf).
134 COMPUTER NETWORKS
V. Key Advantage on Various WAN Optimizer In today’s world there are various
WAN optimizer and each of them have their own features let us some of them like
Riverbed, Bluecoat, Juniper and Cisco.
A. Bluecoat
Works on the protocol CIFS (Common Internet File System) which can significantly reduce
the number of round-trips required to satisfy a request, effectively minimizing delays
associated with waiting for data retrieval while simultaneously reducing WAN usage.
Another major advantage of CIFS protocol is CIFS Protocol Optimization is possible
because ProxySG appliances have the ability to terminate user requests as if they were
the server. They can then open a separate connection to the server that they can use to
intelligently make requests on the client’s behalf. The ProxySG appliance, acting as the
client, is able to take advantage of the CIFS protocol in a way that the client cannot.
B. Riverbed
Cisco’s WAAS has introduced the WAN Optimizer known as Wide Area Application
Services. This offers significant advantages in terms of deployment and management
compared to other WAN optimizers. The WAAS Central Manager is a web-based
central management tool that simplifies configuration, provisioning, monitoring, fault
management, logging, and reporting for up to 2,500 WAEs within a Cisco WAAS topology.
Cisco’s WAAS does not require any modifications to applications, clients, or servers to
provide acceleration services.
Transparency: Transparency is crucial for many IT organizations when implementing
a WAN optimization solution. It is essential that the network’s functionality, such as
security, QoS, or routing, remains intact. With WAAS not altering packet headers, it
ensures a high level of transparency. This transparency impacts the Total Cost of
Ownership (TCO) significantly.
Ease of Deployment and Management: Ease of Deployment and Management is another
key benefit of Cisco’s WAAS. By not modifying packet headers, WAAS minimizes the
LOCAL AREA NETWORK/WIDE AREA NETWORK 135
SUMMARY
• A local area network (LAN) is a computer network in a limited physical area
like a house, school, office building, or computer lab.
• A local area network, or LAN, is a type of network that can operate over a
small physical area, like a few kilometers in size, which could be an office,
factory, or collection of buildings.
• Local area networks (LANs) are widely used in the information age due to
the advent of low-cost computers and the need for hardware resources and
information sharing in office settings, leading to the development of affordable
LANs.
• A server on a network provides services to workstations and clients. The main
goal of a LAN server is data management. It ensures data is stored, secured,
and retrieved.
• Servers are business-class PCs that offer collaboration tools, antivirus protection,
messaging, and other services to the office.
• A local area network, or LAN, is a type of data communication network that
links computers or terminals within a building or a constrained geographic area.
• Frame Relay is a WAN protocol that is only for internetworking Local Area
Networks (LANs), or the transfer of data between LANs and WAN endpoints.
It is based on packet switching technology.
• The connection between your router and the service provider must be made
before you can use any type of WAN connection. The type of connection will
determine how you proceed.
• A wide area network (WAN) is a network that connects smaller campus and
metropolitan networks across different locations into a single, distributed network
using various links such as private lines, virtual private networks (VPNs),
wireless (cellular), MPLS, and the Internet.
REVIEW QUESTIONS
1. What are the characteristics of LAN technology?
2. What hardware devices are typically found on a LAN?
3. What are WAN devices and how do they differ from LAN devices?
4. How do you connect your Wide Area Network (WAN) devices?
5. How can WAN management and optimization be achieved?
REFERENCES
1. Campbell, S., (2010). A Wide Area Network (WAN) Tutorial [Technology Explained].
[online] MakeUseOf. Available at: http://www.makeuseof.com/tag/technology-
explained-wide-area-network-wan-tutorial/ (accessed on 05 April 2024).
2. Computerhope.com. (2016). What is WAN (Wide Area Network)? [online] Available
at: http://www.computerhope.com/jargon/w/wan.htm (accessed on 05 April 2024).
138 COMPUTER NETWORKS
4 Internetworks
LEARNING OBJECTIVES
INTRODUCTION
The original purpose of internetworking was to link different forms of computer networking
technology. The term “computer network” refers to a group of two or more connected
computers. Computer internetworking involves connecting two or more computer LANs,
WANs, or network segments using routers and configuring them with logical addressing
schemes and protocols like IP. The Internet Protocol is commonly used by interconnected
computer networks, also known as Internetworking. There are two architectural models
frequently used to explain the procedures and protocols in internetworking. Open Systems
Interconnection is the industry standard reference model for internetworking (OSI).
Companies like Cisco, BBN, and other network product and service providers use the
term “internetworking” to encompass all the concepts, technologies, and everyday items
that allow people and their computers to communicate over different types of networks.
For example, a user on a computer connected to a token ring local area network might
want to communicate with a user on a computer connected to an Ethernet local area
network in another country using a wide area network interconnection. Internetworking
consists of standard internetwork protocols, relevant network devices, and routing tables
necessary for this communication to take place.
Open Systems Interconnection (OSI) is the standard reference model for internetworking
and can also be used as a model for intranetworking. Because all technologies can be
related to the standard communication model, OSI makes it possible for any technology
to be related to another technology. In order to make the problem of exchanging data
across a network or a network of networks easier to understand and to make defining the
boundaries between components easier, OSI offers a layering approach to the problem.
4.1. PRINCIPLES OF
INTERNETWORKING
→Learning Objectives
• Understand the fundamental principles underlying internetworking
• Recognize the various challenges encountered in building and managing
interconnected networks.
• Define internetwork addressing and its significance in facilitating communication
between devices across interconnected networks.
• Explain the concept of a unit of internetworking and its role in establishing
connections and data exchange between devices.
4.1.1. Principle
The process of connecting multiple networks via devices like routers and gateways
is known as internetworking. These networks, owned by various organizations, use
different technologies, ranging from small LANs to massive WANs. These networks
can be public, private, government, commercial, or academic. The term “internetwork”
or “internet” is commonly used to describe this network of networks. Networking is
INTERNETWORKS 141
142 COMPUTER NETWORKS
Figure 4.1. Each interface on a device is uniquely identified by a data-link address (Source:
Scribd, https://image.slidesharecdn.com/internetworking-49-121020113333-phpapp02/75/
internetworking49-15-2048.jpg?cb=1667679119).
Figure 4.2. MAC addresses, data-link addresses, and the IEEE sub-layers of the data-link layer
are all related (Source: Scribd, https://image.slidesharecdn.com/internetworking-49-121020113333-
phpapp02/75/internetworking49-19-2048.jpg?cb=1667679119).
MAC addresses are expressed as 12 hexadecimal digits and have a length of 48 bits.
The manufacturer or vendor is identified by the first six hexadecimal digits, which are
managed by the IEEE, and together they make up the Organizational Unique Identifier
(OUI). The interface serial number, or any other value managed by the particular vendor,
is contained in the final six hexadecimal digits. Because MAC addresses are burned into
read-only memory (ROM) and copied into random-access memory (RAM) upon interface
card initialization, they are sometimes referred to as burned-in addresses (BIAs). The
format of the MAC address is shown in Figure 4.3.
The techniques used by various protocol suites to ascertain a device’s MAC address
vary. MAC addresses are mapped to network addresses via Address Resolution Protocol
(ARP), which is the most widely used of the three techniques. Network devices can
discover the MAC addresses of other network devices thanks to the Hello protocol. MAC
addresses can be produced by an algorithm or they can be included in the network-
layer address.
Mapping network addresses to Media Access Control (MAC) addresses is known as
address resolution. Several protocol suites implement the Address Resolution Protocol
(ARP), which is used to carry out this process. The network device saves the data
in the ARP cache after a network address and MAC address are successfully linked.
146 COMPUTER NETWORKS
Because the destination’s MAC address is that are connected by a router, address
already known, devices can send traffic resolution functions differently. To find out
there without generating ARP traffic thanks End System Z’s MAC address, End System
to the ARP cache. Y sends out an ARP request across the
LAN. Every device on the LAN receives and
processes the broadcast, including Router
X, which serves as a proxy for End System
Z by determining that End System Z is
situated on a separate LAN by consulting its
routing table. After that, Router X responds
to End System Y’s ARP request by sending
an ARP reply that appears to be from
End System Z and includes its own MAC
address. After receiving the ARP reply, End
System Y stores Router X’s MAC address
in its ARP cache and adds it to the entry
for End System Z. In order to send a frame
directly to End System Z without utilizing
ARP requests, End System Y first looks up
Router X’s MAC address in the ARP cache.
Figure 4.3. The MAC address contains a unique
Traffic from End System Y is received by
format of hexadecimal digits (Source: Wikipedia,
https://upload.wikimedia.org/wikipedia/
Router X, which then forwards it to End
commons/thumb/9/94/MAC-48_Address. System Z on the opposite LAN.
svg/800px-MAC-48_Address.svg.png).
A network-layer protocol called Hello
Depending on the network environment, allows devices connected to a network to
there are minor differences in the address recognize one another and signal that they
resolution process. When End System A are still operational. For example, a new end
broadcasts an ARP request onto the LAN system broadcasts Hello messages across the
in an effort to find out the MAC address network upon powering up. Subsequently,
of End System B, address resolution on a devices connected to the network respond
single LAN starts. All of the LAN’s devices with “Hello,” and to indicate that they are
receive and process the broadcast, but still operational, Hello messages are also
only End System B responds to the ARP sent at set intervals. Network devices can
request by giving End System A its MAC examine Hello-protocol packets to discover
address in an ARP reply. After receiving the other devices’ MAC addresses.
response, End System A stores End System Three MAC addresses are known
B’s MAC address in its ARP cache. Network to function. Because the network layer
addresses and MAC addresses are linked either includes the MAC address in the
in the ARP cache. When End System A network-layer address or determines
needs to communicate with End System B, it the MAC address through an algorithm,
retrieves System B’s MAC address from the MAC addresses in these protocol suites
ARP cache, sends the frame straight, and are predictable. Xerox Network Systems
avoids using an ARP request in the process. (XNS), Novell Internetwork Packet Exchange
However, when source and destination (IPX), and DECnet Phase IV are the three
devices are connected to separate LANs protocols.
INTERNETWORKS 147
4.1.3.3. Network-Layer Addresses
Network addresses, also known as virtual or logical addresses, can occasionally be found
within a gradable address space. A network address and a device have a logical, non-
fixed relationship that typically depends on either the physical properties of the network
or on arbitrary groupings. For each network-layer protocol that end systems support,
one network-layer address is required. For each supported network-layer protocol,
routers and other internetworking devices require a single network-layer address for
each physical network association.
An entity at the OSI layers’ network layer is identified by its network-layer address.
Network addresses, also known as virtual or logical addresses, are typically found in a
hierarchical address space. A network address and a device have a logical, non-fixed
relationship that is usually based on either physical network characteristics (e.g., the
device is on a specific network segment) or groupings for which there is no physical
basis (e.g., the device is a part of an AppleTalk zone). For each network-layer protocol
that end systems support, one network-layer address is needed. This presupposes that
there is just one physical network connection on the device. For each network-layer
protocol supported by routers and other internetworking devices, one network-layer
address is needed for each physical network connection. For instance, a router with
three interfaces that are each running OSI, TCP/IP, and AppleTalk needs three network-
layer addresses for every interface. Nine network-layer addresses are thus available to
the router. The process of assigning a network address to each network interface for
every supported protocol is shown in Figure 4.4.
Figure 4.4. Each network interface must be assigned a network address for each protocol
supported (Source: NotesforMsc, https://notesformsc.org/wp-content/uploads/2018/04/Network-
Addresses.png).
4.2. INTERNETWORK
ARCHITECTURE
→Learning Objectives
or end users, typically use Post point, the application or data is displayed
Office Protocol (POP) or Internet in a way that the user can comprehend
Message Access Protocol (IMAP) visually.
to access their mailbox accounts
on mail servers, while email servers Functions of the application layer:
use SMTP to send and receive mail • Ensures that the receiving device
messages. is identified, can be reached, and
• Internet Infrastructure: An Internet is ready to accept data.
Service Provider (ISP) is a company • Enables, if appropriate,
that connects individual users or authentication to occur between
corporate private networks to the devices for an extra layer of security.
Internet. ISPs serve a large number
• Makes sure necessary
of users through a variety of
communication interfaces exist.
physical media, including DSL and
For example, is there an Ethernet
wireless connections. These ISPs
or Wi-Fi interface in the sender’s
are referred to as local ISPs in an
computer?
Internet infrastructure. While local
ISPs can peer with one another, • Ensures agreement at both ends
they typically peer with regional about error recovery procedures,
ISPs, which link several local ISPs data integrity, and privacy.
together. Regional ISPs then peer • Determines protocol and data
with the larger provider known syntax rules at the application level.
as the Network Service Provider • Presents the data on the receiving
(NSP). This may not, however, be end to the user application.
taken to be the actual Internet
infrastructure, as different peering, Since the application layer in the OSI
connections, and other complexities model is the one nearest to the end user,
make it challenging to graph the both the user and the application layer can
entirety of the Internet. communicate with the software program
directly. Applications at the application layer
are client-server based.
4.2.1. Application Layer
The application layer includes the
In order to enable efficient communication
following functions:
between an application program and
another application program on a network, • Identifying communication
the application layer offers services to the partners: The application layer
program. It is not appropriate to think of identifies the availability of
the application layer as an application in communication partners for an
the sense that most people do. Rather, an application with data to transmit.
application’s application layer is a part that
• Determining resource availability:
manages how the application communicates
The application layer determines
with other devices. The remainder of the
whether sufficient network
application is hidden from the transmission
resources are available for the
process by this abstraction layer service. To
requested communication.
finish its task, the application layer depends
on every layer that comes before it. At this • Synchronizing communication: All
INTERNETWORKS 155
the communications occur between the applications require
cooperation, which is managed by an application layer.
Services of Application Layers
• Network Virtual terminal: An application layer allows a
user to log on to a remote host. To do so, the application
creates a software emulation of a terminal at the remote
host. The user’s computer talks to the software terminal,
which in turn, talks to the host. The remote host thinks
that it is communicating with one of its own terminals, so
it allows the user to log on.
• File Transfer, Access, and Management (FTAM): An
application allows a user to access files in a remote computer,
to retrieve files from a computer and to manage files in a
remote computer. FTAM defines a hierarchical virtual file
in terms of file structure, file attributes and the kind of
operations performed on the files and their attributes.
• Addressing: To obtain communication between client and
server, there is a need for addressing. When a client made
a request to the server, the request contains the server
address and its own address. The server response to the
client request, the request contains the destination address,
i.e., client address. To achieve this kind of addressing, DNS
is used. Keyword
• Mail Services: An application layer provides Email forwarding File Transfer
Protocol (FTP) is
and storage. a standard network
• Directory Services: An application contains a distributed protocol used
for the transfer
database that provides access for global information about of computer files
various objects and services. between a client
and server on a
• Authentication: It authenticates the sender or receiver’s computer network.
message or both.
A network diagram is usually used to guide the design of a
computer network. This topology, which has seven layers of network
functionality, is based on the Open Systems Interconnection model
(OSI). Known as layer seven in OSI, the application layer is the
highest level. The Hypertext Transfer Protocol (HTTP), email, and
File Transfer Protocol (FTP) are among the communication protocols
that are managed by the network layer. These applications allow
email clients and web browsers to share files over a network.ile
transfer protocol (FTP) are among the communication protocols that
are managed by the network layer. These applications allow email
clients and web browsers to share files over a network.
A physical cable is the first step in a network, and a computer
program is the last. In the course of a typical communication
156 COMPUTER NETWORKS
transfer, data is forced through multiple messages falls under the purview of
levels of transformations. To guarantee the lowest tier of the OSI model. The
appropriate data quality and security presentation layer, which manages the
regulations are followed, this procedure is message’s format and encryption, receives
required. Software protocols can now be messages from the application layer.
more flexible thanks to the creation of the
OSI model. There are seven layers in the OSI
model. The transport, data link, network, 4.2.2 Transport Layer
session, presentation, and application layers Data that must be transported beyond
are these. The layers communicate over the confines of an address space must go
a network by working in a hierarchical through a transport layer. Unstructured
structure. Standard transmission control byte sequences make up the data being
protocol (TCP/IP) is the Internet’s primary transported from the perspective of the
communication language and is used by transport layer. A concrete transport
the majority of computer networks today. mechanism is used to implement the
The OSI model serves as a guide for how transport layer. The transport layer’s job
network hardware and software should is to provide a uniform interface to the
communicate in this network protocol. In presentation layer while abstracting from
the network topology, every layer in the platform-specific transport mechanisms.
model has a distinct role to play. Generally speaking, the transport layer is
just an operating system’s wrapper around
The hierarchical chaining of responsibility
network functions. Just like when the
is the foundation of the OSI model. These
bank scenario is introduced, an analysis
guidelines compel every layer to transmit
of requirements shows the features of the
messages through the topology by adhering
transport layer that serve as the foundation
to predetermined handoff procedures. The
for a design:
presentation layer, the next tier down the
hierarchy chain, has handoff rules that the 1. The transport layer guarantees
application layer must abide by. The next a reliable end-to-end connection
level in the chain usually requires certain between precisely two address
size requirements, format, and encryption spaces.
before accepting a message. One common 2. Data can be sent bi-directionally
communication protocol on computers and in the form of unstructured byte
mobile devices is instant messaging, or IM. sequences of any length.
Software that makes use of the application
layer protocol is instant messaging (IM). 3. Different transport mechanisms
Instant messaging software is made possible should be supported.
for businesses by the IM standard protocol.
AOL Instant Messenger, Yahoo Mail, and 4.2.2.1. Transport Layer Links Address
MSN Messenger are a few of these products. Spaces
At this layer, every program communicates The details of the underlying transport
over the network using the OSI standards. mechanism are hidden above the transport
One email program that makes use of layer, which ensures reliable end-to-end
the application layer is Microsoft Outlook. connections. Several transport protocols,
The task of converting software program such as TCP, currently offer reliable
messages into comprehensible computer connections. It becomes more challenging to
INTERNETWORKS 157
guarantee appropriate semantics above the uneven application of the transport layer.
transport layer when an unreliable transport Based on the matching communication
mechanism is used at that layer. Requiring endpoints, clients and servers define a
the transport layer to connect precisely communications channel. An address
two address spaces aims to simplify the designating the communication endpoints
middleware. Managing transport channels is a sign of the client and server’s consent.
between different address spaces would Usually, a network address referring to the
be problematic without this restriction. actual transport mechanism is included in
Therefore, μORB only permits an application’s a transport layer address. Address formats
objects to be split between exactly two and details can vary amongst transport
address spaces. mechanisms. Thus, there isn’t a format that
is generally accepted.
The transport layer views data as
unstructured, variable-length byte sequences
exchanged between a client and a server. 4.2.2.3. Classes Buffer, Address, and
While the transport layer is not expected Transport Model Transport Layer
to continuously transmit media, multimedia
To model the transport layer, three classes—
applications require this capability. However,
Buffer, Address, and Transport—are
it is expected to support various transport
introduced. The storage region connected
mechanisms.
to a specific memory chunk is represented
The following use case outlines the type by the class buffer. The unstructured byte
of modeling needed at the class level: sequences that are transferred between
address spaces via a transport mechanism
1. The server establishes a are contained in instances of this class.
communication end point and waits There are methods available for configuring
for a connection setup request. and managing a memory chunk through the
2. The client creates a communication class Buffer’s interface. A specific transport
end point and connects it to the mechanism’s address is represented by
server. the class Address, and the transport
3. The client sends data and waits mechanism itself is represented by the
for a response. class Transport. This address serves as the
transport mechanism’s factory. Since they
4. The server receives the data of the merely serve as the interface for the actual
client and then sends a response. transport mechanism, the two classes are
5. After the client receives the abstract in and of themselves. As a result,
response from the server, both close each transport mechanism requires the
their communication end points definition of two concrete classes: one for
the address and another for the transport
4.2.2.2. Applications Scenario of the mechanism itself. The abstract base classes
Transport Layer Address and Transport are the ancestors
of these classes. A TCP-based transport
Keep in mind that the terms “client” and mechanism in UML notation is displayed
“server” do not refer to actual objects in Figure 4.7.
in this use case. Instead, they discuss
the roles that are played in interactions
with the transport layer, suggesting an
158 COMPUTER NETWORKS
4.2.3.2. DHCP
4.2.4. Network Access Layer
The Data Link and Physical layers of the
A client/server protocol called Dynamic Host OSI reference model align with the Network
Configuration Protocol gives an IP host its Access layer of the TCP/IP model. It outlines
IP address and other relevant configuration the hardware and protocols needed to link
data, such as the subnet mask and default a host to a real network and transfer data
gateway, automatically. With DHCP, IP between them. In order to be delivered
addresses and other network configuration within the physical network, packets from
data can be distributed and updated the Internet layer are routed through the
automatically. When a client submits a Network Access layer. The destination may
request, a DHCP server usually replies with be the network host itself, another host, or a
an address that is within the DHCP scope. router for additional forwarding. Therefore,
If they are set up to do so, DHCP servers the Network Access layer is restricted to the
can offer more network-related information physical layer boundary, which is typically
in addition to IP addresses. A valid range of defined by a layer 3 device like a router,
IP addresses that can be leased or assigned while the Internet layer has a view of the
to client computers on a specific subnet is entire Internetwork.
known as a DHCP scope. A scope is set up
in a DHCP server to ascertain the address There are numerous protocols that make
pool of IPs that the server can offer to up the Network Access layer. The most
DHCP clients. The DHCP server can assign widely used protocols when the physical
an address to a client, extend the lease network is a local area network (LAN)
term, recognize when the address is not in are Ethernet and its numerous variants.
use, and reclaim it when an address has a Conversely, protocols like Frame Relay and
dynamic lease. Point-to-Point Protocol (PPP) are frequently
used when the physical network is a Wide
A DHCP reservation, on the other hand, Area Network (WAN).
is a permanent IP address assignment. It
INTERNETWORKS 161
• The Network Access layer uses a physical address to identify
hosts and to deliver data.
• The Network Access layer PDU is called a frame. It contains
the IP packet as well as a protocol header and trailer from
this layer.
• The Network Access layer header and trailer are only relevant
in the physical network. When a router receives a frame, it
strips off the header and trailer and adds a new header and
trailer before sending it out to the next physical network
towards the destination.
The TCP/IP protocol hierarchy starts at the Network Access Keyword
layer. Because it is well hidden by the more well-known higher-level Network
protocols like SMTP, HTTP, and FTP, as well as mid-level protocols like interface
card (NIC)
IP, TCP, and UDP, it is frequently disregarded by users. Encapsulating is a hardware
IP datagrams into network-transmitted frames and translating IP component
addresses into physical hardware addresses are among the tasks without which a
computer cannot
carried out at the network access layer. Software programs and be connected over a
drivers specific to particular hardware components handle a large network.
portion of the work at the network access layer. Most of the time,
configuration is as simple as choosing the right driver to load and
TCP/IP as the protocol to use. Many computers have this driver
software pre-installed and set up, or they have “plug-and-play” apps
that allow them to configure themselves automatically.
Configuring a Windows NT system to use a 3Com Etherlink
III network interface card (NIC) with Ethernet is a good example
of network access layer configuration. In a typical scenario, the
operating system would identify the NIC during installation. If this
doesn’t happen, or if the card is added later, installing the card and
picking the driver by selecting the card’s manufacturer and model
from a list of available drivers would be the main steps in the
installation process. Certain cards may also need minimal hardware
configuration, including deciding on an I/O port, setting the IRQ,
and maybe utilizing the card’s Twisted Pair or Coax connector. Upon
selecting and configuring the appropriate driver for the card, the
subsequent action involves choosing TCP/IP from a list of available
protocols to be utilized on the interface. The network access layer
configuration is finished after this. Numerous configuration programs
proceed to configure DNS servers, IP addresses, netmasks, default
gateways, and other parameters that are actually related to other
layers and protocols automatically.
It’s true that some network access layer protocols require a lot
of configuration. Understanding the operation of the more common
ones is beneficial. Network managers should know about serial point-
to-point protocols like SLIP and PPP if they’ll be handling remote
162 COMPUTER NETWORKS
access over serial communication lines, such as ISDN lines or POTS modems. Being
aware of remote authentication protocols like TACACS and RADIUS is helpful if they’ll
be used on Network Access Server hardware, such as modem stacks or terminal servers.
FOCUS ON CAREERS
NETWORK ARCHITECT
A network architect is responsible for designing and building data communication
networks. The networks they work on can range from smaller local area networks
(LANs) to larger wide area networks (WANs), along with intranets. These professionals
also manage the infrastructure of computer networks to ensure they operate effectively,
including the installation of routers, cables, modems, and other necessary hardware
and software. Network architects can find employment at organizations in numerous
industries, including telecommunications, finance, insurance, and computer systems
design services. This role is typically a senior IT position within an organization, often
working alongside a team of IT specialists and communicating with management staff.
These professionals use their understanding of the organization’s business goals to
develop network systems that meet them. If you are thinking about becoming a network
architect, learning about the typical requirements for this career may help you assess
whether this profession is a good fit for you:
Certifications
Network architects have several certifications they can obtain, often through specific
software and product vendors. Many of these certifications have different levels that you
can earn as you continue to advance your IT skills and knowledge. The certification you
pursue may vary based on the types of systems or software used or required by your
employer. You can research job openings in your field to understand the certifications
164 COMPUTER NETWORKS
Work Experience
When hiring for network architect roles, employers typically seek candidates with at
least five years of professional experience working with IT systems. The amount of
experience sought may vary by employer or role, with some requiring at least 10 years.
You may gain relevant experience through internships as a student or entry-level jobs
in the field. For example, individuals may work as network engineers, administrators,
computer systems analysts, or database administrators. Demonstrating to potential
employers that you have relevant work experience can prove that you have the skills
and knowledge needed to perform the job effectively. When possible, you can also share
any achievements from your prior roles to set yourself apart from other candidates.
Skills
Network architects need numerous technical skills to perform their job effectively, such
as those related to computer operating systems, wireless systems, and security. They
typically learn such skills and knowledge through their education, training programs,
or on-the-job experience. Network architects also benefit from having several other
skills, including:
• Analytical thinking: Network architects must examine networks to identify
issues and develop potential solutions. They also use this skill to determine
the appropriate hardware, software, and other equipment to utilize based on
their organizations’ resources and needs.
• Attention to detail: When designing complex data communication networks,
network architects must consider numerous details. Having an attention to detail
helps ensure they create comprehensive designs with accuracy and networks
that function effectively.
• Communication: Network architects work with other IT professionals, and
strong verbal and written communication and interpersonal skills can ensure
INTERNETWORKS 165
they convey information effectively and accurately. They may also use these
skills to present plans and provide networking guidance to management staff.
• Leadership: Network architects may need to lead a team of IT specialists or
computer engineers through the network implementation process or other
necessary tasks. Leadership skills enable them to assign responsibilities and
maintain the proper functioning of the network.
• Organizational skills: Depending on their job, network architects may need to
manage numerous networks within an organization and keep these different
systems organized to ensure they work well together. Organizational skills,
such as time management and strategic planning, also help keep projects on
schedule and budget.
166 COMPUTER NETWORKS
4.3. IP ADDRESSING
AND ARCHITECTURE
→Learning Objectives
and host ID. The 255s “mask out” the network ID from the equation.
IP addressing details are displayed together with a default gateway
address in addition to the IP address itself and the corresponding
subnet mask. This address may be known by a different name on
the platform you are using. It may be referred to as the “gateway,”
“router address,” “default route,” or simply “router.” These all refer
to the same thing. When a device is supposed to send network
data to a network other than the one it is currently connected to
(one with a different network ID), it sends the data to the default
IP address.
The simplest example of this is found in a typical home network
A router that is linked to the internet via a modem is probably
present in a home network that has several devices connected
to it. Your internet provider may provide a modem/router combo
unit that includes the router, or it may be a stand-alone device.
Passing (or routing) traffic back and forth between the computers
and devices on your network and the more publicly facing devices
on the internet is what the router does. Let’s say you open your
browser and go to www.howtogeek.com. Your computer contacts
the IP address of our website with a request. Your PC sends traffic
to your router, which acts as a gateway, and your router then
forwards the request to our server because our servers are on the
Keyword internet rather than your home network. You see our website load
in your browser when the server sends the appropriate data back
Router is a
networking device to your router, which subsequently routes it to the device that
that forwards data made the request.
packets between
computer networks. Typically, routers are configured by default to have their private
IP address (their address on the local network) as the first host
ID. So, for example, on a home network that uses 192.168.1.0 for a
network ID, the router is usually going to be 192.168.1.1. Of course,
like most things, you can configure that to be something different
if you want.
an address that never changes gives data Websites automatically track and log IP
mining companies easy access to a fairly addresses, storing the numerical addresses
comprehensive profile of people’s online in server logs, for all of the aforementioned
browsing habits. reasons and more. Every request made by
the IP address is noted and has a time
stamp attached. Logs are regularly cleared
4.3.7. Track and Record IP of older data to make room for updated
Addresses information. The duration that a website
An IP address, also known as an Internet retains IP logs varies, is set by the site
Protocol address, is a special number that administrator, and depends on numerous
is given to a computer when it connects variables. In order to determine which pages
to the Internet. Internet Service Provider are the most popular, websites also monitor
(ISP) records can be used to trace an IP and log IP addresses. To boost website
address back to a specific person. When traffic, the website can expand on its most
users navigate the pages of nearly any popular pages. Leaks in traffic can also be
website on the World Wide Web (Web), found by tracking IP addresses throughout
IP addresses are tracked and recorded. the website.
This is primarily due to two factors: site IP addresses are typically referred to
enhancement and security. Every website as “anonymous” data in website policies.
has a server to host it on. A request for a Nonetheless, websites can still associate
webpage at the specified location is sent identities with IP addresses in a variety of
by the user’s browser to the server when ways—even if the address is dynamic and
they click to access a website. The webpage changes with every Web session—thanks
is sent back to the IP address that made to computer cookies. Additionally, a lot
the request by the server. After that, the of websites have “Web bugs,” which are
visitor’s computer screen loads the page. a few pixels connected to an advertising
The speed at which pages load for company that can track and record IP
visitors may decrease if the server is addresses as they move from one website to
overloaded with requests. When there are another on the Internet, covertly assembling
too many requests being made at once, comprehensive surfing profiles of people
the server will “crash” or go down, making over months or years. For a website to
the website momentarily unavailable. track and profile a visitor, registration is
This might be classified as a Denial of not required.
Service (DoS) attack. An attack is known If cookies are enabled in the web
as a Distributed Denial of Service (DDoS) browser, then every visit to a website is
attack if it originates from a botnet, which usually time-stamped and saved to a cookie.
is a collection of compromised computers. Every page and link that is viewed on the
A malevolent cybercriminal may attempt website is typically added to the cookie
to obtain data from password-protected (along with the server logs). Cookies are
databases containing credit card numbers often kept, but server logs are cleaned up.
and other customer information by breaking The duplicate cookie on the Web server
into a Web server. Those who are referred remains after a user deletes a cookie from
to as “script kiddies” may merely aim to their computer. Even if the user is cautious
damage a website by adding text or images. to accept only temporary cookies or none at
INTERNETWORKS 173
all, the server may be able to “identify” them enable users to browse the internet. When
when they return to the website later on using the website, a window displaying
thanks to a variety of system and software the requested pages opens. The website’s
data that browsers frequently provide. IP address is the only one visible on the
Internet. However, it is important to note
Because of these worries, a lot of astute that the website itself will log and monitor
internet users would rather browse in users’ IP addresses.
secret. Here, a proxy server is positioned
in between the user’s PC and the Internet.
Every browser request is routed through 4.3.8. Difference between Public
the proxy and then sent to the Internet. and Private IP Addresses
Instead of logging the proxy’s IP address,
web servers return pages to it. After All computers connected to a network,
receiving the page, the proxy serves as a whether public (such as the World Wide
go-between by forwarding it to the surfer. Web) or private (such as those in a
Although the proxy server will track and workplace), are uniquely identified by their
record IP addresses, web servers do not Internet Protocol addresses, or IP addresses.
have a record of the surfer’s IP address. Computers can locate and communicate
It’s critical to ascertain whether a proxy with each other thanks to the IP addressing
service is actually anonymous before using scheme. Each computer connecting to the
it. Some proxy servers thwart the intent by Internet is assigned a public IP address,
sending the requester’s IP address through while computers within the same local
their headers. It is only anonymous proxy area network (LAN) are recognized by their
servers that conceal this data. It is advised private addresses. This system operates
to personally verify through the proxy tools similarly to how phone numbers work in
that are available because some proxies an office environment. A company typically
make false claims about being anonymous. has a primary business number (the public
Since the netizen’s home country will not IP address), and each employee may have
have jurisdiction over the proxy’s logs, using a distinct extension that enables calls to
international proxies can further enhance be directed to the correct individual (the
anonymity. Nevertheless, rather than private IP address).
shielding unlawful activity, proxy services An IP address, a set of binary numbers,
are meant to support the preservation of is used to identify a computer or other device
freedom and privacy for legitimate activity. on a network and provide information about
To prevent records from accumulating it. In the more commonly used addressing
on a single proxy server, users can maintain scheme, IP Version 4 (IPv4), these numbers
a list of proxies and quickly switch between are typically expressed as four numbers
them using the FoxyProxy add-on plug- separated by dots. A new addressing
in for the FirefoxTM browser. Additionally, scheme, IPv6, was developed in the 1990s
proxies can be linked by chaining two or due to the limited and depleting number of
three proxy servers together, but this slows addresses available in the IPv4 format. In
down browsing. Moreover, requests are lost this format, eight groups of four letters and
if a proxy server is unavailable. For proxy numbers are used to represent IP addresses;
browsing, there are also various shareware groups with a zero value may be omitted.
applications available. Through an on-site Groups are separated by colons. In IPv6,
interface, web-based anonymous services private addresses are known as “local-use.”
174 COMPUTER NETWORKS
ROLE MODEL
Paul Baran: He was one of the two independent inventors of packet
switching, which is today the dominant basis for data communications
in computer networks worldwide, and went on to start several
companies and develop other technologies that are an essential
part of modern digital communication.
BIOGRAPHY
Paul Baran (born April 29, 1926, Grodno, Pol. [now Hrodna, Bela.]—
died March 26, 2011, Palo Alto, Calif., U.S.) was an American electrical
engineer and the inventor of the distributed network. He worked
contemporaneously with British computer scientist Donald Davies on
data packet switching across distributed networks. These inventions
laid the foundation for the Internet.
In 1928, Baran’s family moved to Philadelphia. He studied
electrical engineering at Drexel University in Philadelphia (B.S.,
1949) and at the University of California, Los Angeles (M.S., 1959).
In 1959, he joined the RAND Corporation as a researcher, a think
tank that provided analyses of various issues affecting public policy
and national defense. At RAND, Baran focused on developing a
method for U.S. authorities to communicate in case their centralized
switching facilities were destroyed by a nuclear attack. Influenced
by the principle that the human brain can recover lost functions
by bypassing a dysfunctional area, Baran conceived a “distributed”
network using digital technology. This network would have no
centralized switches or dedicated transmission lines and would
continue to operate even if several of its switching nodes were
disabled.
For transporting messages across this system, Baran conceived
of the idea of breaking large messages or units of computer data
into “message blocks”—separate pieces of data that would be sent
independently to the target destination, where they would be rejoined
into the original message. By foregoing dedicated communication
lines in favor of using any number of available circuits, Baran’s
system increased transmission capacity (bandwidth) and created a
flexible, reliable, and robust communications network. Baran’s work
on message blocks appeared in a series of RAND studies published
between 1960 and 1962. At about the same time, Davies in the
United Kingdom invented a similar system employing what Davies
INTERNETWORKS 177
called “packets,” and packet switching, as this process came to be called, formed the
basis for communication across modern networks. With digital computers as network
nodes, Baran used a “rapid store and forward” design for packet switching, allowing
for essentially real-time data transmission. In the 1970s, Baran became an informal
consultant to ARPANET, a high-speed computer network created by the Defense Advanced
Research Projects Agency (DARPA) to connect research institutes and laboratories
supported by the Department of Defense across the United States. Baran’s inventions
provided the technical foundation for the eventual development at ARPANET of the
Transmission Control Protocol/Internet Protocol (TCP/IP), a communications protocol
that allowed a number of different networks designed by different vendors to form a
“network of networks.” ARPANET, based on Baran’s packet switching, thus became
the predecessor of the Internet.
Baran left RAND in 1968 and afterward was involved with developing discrete
multitone technology (a crucial component of digital subscriber lines) and with contributing
to developments in spread spectrum transmission (an essential component of wireless
communication). Baran also founded Metricom, a wireless Internet service company, in
1986; Com21, a supplier of cable modem systems, in 1992; and GoBackTV, a company
specializing in infrastructure equipment for television operators, in 2003.
178 COMPUTER NETWORKS
SUMMARY
• The term “internetworking” is a compound of the words “inter” and “networking,”
which denotes a connection between completely unrelated nodes or segments.
The intermediary devices, which are similar to routers or gateways, establish
this connection.
• The process of connecting multiple networks via devices such as routers and
gateways is known as internetworking. The various networks are owned by
different organizations with vastly different network technologies.
• Each physical network connection of a network device is uniquely identified by
its data-link layer address. Physical or hardware addresses are commonly used
to refer to data-link addresses.
• Network addresses, also known as virtual or logical addresses, can sometimes
be found within an address space that can be graded. A network address and
a device have a logical, non-fixed relationship that typically depends on either
the physical properties of the network or on arbitrary groupings.
• An internetwork is a group of broadcast and packet-switching networks that
function as a single, large network thanks to the use of routers, switches, and
bridges, which are intermediate networking devices.
• In order to enable efficient communication between an application program and
another application program on a network, the application layer offers services
to the program. It is not appropriate to think of the application layer as an
application in the sense that most people do.
• A physical cable marks the beginning of a network, while a computer program
wraps it up. During a regular data transfer process, information undergoes
various transformations at different levels..
• The Internet layer organizes data into IP datagrams for transmission, containing
source and destination addresses. It also handles routing of IP datagrams.
REVIEW QUESTIONS
1. Identify the challenges to internetworking.
2. Give an overview on internetwork addressing.
3. What are the importance of application layer and transport layer in internetworking?
4. How to IP addresses work?
5. Define the TCP/IP network architecture.
REFERENCES
1. Advances in Internetworking, Data & Web Technologies, (2017). The 5th International
Conference on Emerging Internetworking, Data & Web Technologies, EIDWT-2017.
Wuhan, China.
2. Comer, D., (2013). Internetworking with TCP/IP (Vol. 1, 6th edn.). Saddle River, NJ:
Pearson.
3. Coulouris, G., Dollimore, J., Kindberg, T., & Blair, G., (2012). Distributed Systems:
Concepts and Design. Addison-Wesley.
180 COMPUTER NETWORKS
LEARNING OBJECTIVES
INTRODUCTORY EXAMPLE
Large dynamic networks can be controlled more effectively by using resources thanks
to cluster-based network control structures. They make excellent candidates for ad hoc
networks as a result. Cluster-based architectures come in various varieties. In particular,
the link-cluster architecture is made for managing transmission in ad hoc networks.
The clustering techniques used for backbone formation are virtual subnet architecture
and Near-Term Digital Radio Network (NTDR) architecture. The preferred method for
increasing routing efficiency in cluster-based networks is hierarchical routing, whether
it is strict or quasi-hierarchical.
An entity with dynamically changing states in an unpredictable way is a communication
network. A network must be able to modify its behavior to account for variations in
its inherent characteristics, such as connectivity, capacity, and offered load, in order to
achieve performance targets set for user traffic. The following goals are in competition
with each other for control functions that govern the network’s performance:
• Quick and accurate response when adapting the network’s behavior to the
current network state.
• Minimal use of network resources during and after the adaptation process.
Self-organizing controlled structures work better for networks with fluctuating
connectivity (e.g., mobile networks) or those that are large with numerous configuration
parameters. Nodes construct and maintain these structures, leading to increased network
availability, faster response to state changes, and reduced risk of configuration errors.
Depending on the control functions to be carried out, the size of the network, and the
anticipated frequency and magnitude of changes in network state, the proper network
control structure and algorithms for using this type of structure are selected.
Applicability of these structures and algorithms to ad hoc networks is also investigated,
particularly on routing functions. A cluster-based control network improves efficiency
of resource use by creating contexts for:
5.1.1.4. Routing
A naturally occurring routing backbone made up of cluster heads,
NETWORKING FOR CLUSTERS 187
gateways, and the links connecting them is provided by the link-clustered architecture.
Nevertheless, cluster heads could become clogged as hubs for traffic, and each one could
end up being a communication breakdown point for the cluster as a whole. For this
reason, routing algorithms do not use link-clustered architecture as their routing control
architecture. Rather, every node creates and chooses routes, distributes and gathers
routing data. In a link-clustered architecture, clusters serve as a routing backbone and
are primarily used to define regions for transmission management.
Any node has the ability to take over as cluster head quickly in the event that frequent
node movements or cluster head outages necessitate changes in node interconnectivity.
By periodically broadcasting and receiving beacons, each node maintains bi-directional
connectivity with its neighbors.
• Each node that detects one of the backbone with data and uses that data to
conditions for becoming a cluster compute routes to other network nodes. A
head waits a short random time “resistance” metric, which quantifies the
interval and tests the conditions likelihood of interference that upcoming
again. If the condition persists transmissions over the links may experience,
following the waiting period, the is included in the link state. Cluster heads
node assumes the role of a cluster use Dijkstra’s shortest path-first (SPF)
head. algorithm to calculate least resistance
• Each new cluster head immediately routes to destinations.
issues beacons in quick succession
proclaiming its status. 5.1.1.9. Virtual Subnet Architecture
is then routed through dk-1’s level-(k-2) to other nodes in the cluster. Next, using
clusters to get to dk-2’s border, and so on, Dijkstra’s SPF algorithm, each node creates
until it is ultimately routed to di. a minimum-cost route to every other node
in the cluster. Every gate node on a cluster
boundary computes every other gate for
the cluster using intra-cluster link-state
information. Next, a gate builds link-state
information in the form of costs over virtual
links to “neighboring” gates, both in the
gate’s immediate vicinity and in neighboring
clusters that are directly connected to it.
This link-state data is flooded by the gate
to every other gate in every level-1 cluster.
Next, every gate within the network creates
the least expensive paths to every other
gate, and consequently, to every other
cluster within the network. Additionally,
every gate floods all other clusters with
Figure 5.7. Quasi-hierarchical Routing its minimum costs through its intra-cluster
versus Stricthierarchical Routing (Source: nodes. A node can ascertain the n by fusing
Semanticscholar, https://d3i71xaburhd42. this intra-cluster link-state information with
cloudfront.net/df535cc40f672e2f9003a73de4ac8 the inter-cluster cost information.
facb58f9e5a/6-Figure7-1.png).
permitted for the level-i cluster. Each level-m level-i cluster, c, must be siblings within
landmark has a radius that is at least as x’s level-(i+1) cluster. If c’ and c are non-
large as the diameter of the network, and neighboring siblings, the next hop to c’ is
each node is a level-0 landmark. For 0 < i a level-i cluster that is a neighbor of c. If
≤ m, more than one level-i landmark is also c’ and c are neighboring siblings, the next
a level-(i+1) landmark, and for each such hop to c’ is a level-j cluster, where 0≤j<1,
landmark, y, ri+1(y) > ri(y). that lies on the boundary of c and contains
at least one node, y, with a direct link to c’.
With quasi-hierarchical routing, a node can
5.1.2.3. Strict-Hierarchical Routing determine the next hop to any destination
Because it is resilient to changes in the using a single forwarding table entry,
network state, strict-hierarchical routing whereas with strict-hierarchical routing,
is a preferred method in mobile wireless a node may have to consult up to 2m-1
networks. Comparing the robustness to forwarding table entries to determine the
quasi-statistical routing, higher route costs next-hop node to a destination. In practice,
and packet forwarding overhead result m remains small.
from the robustness. Using either the The expenses of the routes that the
distance-vector or the link-state approach, forwarding entries are derived from are
a representative of a level-i cluster, c, the subject of the second distinction.
gathers its routing data and distributes it Since the cost to reach the level-i cluster,
to representatives of other level-i clusters c’, from x is calculated as the sum of the
within its level-(i+1) cluster. Within its level- individual link costs, it is always the true
(i+1) cluster, c’s representative calculates minimum cost when using quasi-hierarchical
the next-hop clusters and minimum-cost routing. The total of each cluster cost for
routes from c to any other level-i clusters each level-i in the route from c to c’ is
using routing information similarly obtained the cost to reach c’ from x when using
from other clusters. The representative of c strict-hierarchical routing. As a result, the
then sends the cluster boundary information, latter routing is probably going to produce
route cost, and next-hop cluster information more expensive routes than the former one.
to every node inside c. For the SURAN packet radio network, the
There are two key differences strict-hierarchical routing scheme below
between strict-hierarchical routing and was selected due to its ability to maintain
quasi-hierarchical routing with respect to routes in the face of dynamically changing
forwarding information. The first difference nodes and links. To find the lowest cost
concerns the number of forwarding table routes and next-hop nodes to every node in
entries a node must consult to determine its cluster and to every neighboring cluster
the next-hop node to a destination. With within its supercluster, each node employs
quasi-hierarchical routing, the next hop to distance vector routing. The cluster head,
level-i cluster c’ stored in the forwarding also known as the super-cluster head, is a
table is always a node which is a neighbor node within each cluster or supercluster,
of node x. With strict-hierarchical routing, as depicted in Figure 5.10. This node is
the next hop to c’ stored in the forwarding in charge of creating and disseminating
table is always a cluster at level j≤ i, as routing information about the cluster to all
explained below. For an entry for c’ to other clusters or superclusters within the
appear in x’s forwarding table, c’ and x’s same supercluster (or network).
NETWORKING FOR CLUSTERS 195
Did you know?
A 2003 measurement study of Internet routes found that, between pairs of neighboring ISPs, more than 30% of
paths have inflated latency due to hot-potato routing, with 5% of paths being delayed by at least 12 ms. Inflation
due to AS-level path selection, while substantial, was attributed primarily to BGP’s lack of a mechanism to directly
optimize for latency, rather than to selfish routing policies.
The connectivity and cost to each neighboring clusterhead (or super-clusterhead) are
determined by each clusterhead (or super-clusterhead). It then inundates all clusterheads
(or super-clusterheads) within its supercluster (or network) with this link-state data.
The number of node hops to the neighboring clusterhead (or superclusterhead), the
number of cluster hops to the neighboring superclusterhead, and the value 1 to indicate
inter(super)cluster connectivity only are among the suggested costs from one clusterhead
(or super-clusterhead).
A node makes an effort to create routes that are compatible with the users’ service
requests and the network’s existing capabilities using this link-state information. There
exists an opportunity to greatly minimize the amount of network state data that
needs to be dispersed, processed, and stored across a network by utilizing hierarchical
cluster-based control structures. It is accomplished by abstracting away the specifics
of a cluster’s connectivity and services, and expressing the cluster’s state in this way.
However, balancing the abstraction’s fidelity and size is necessary to build a workable
abstraction for a cluster whose features vary widely or often. All abstraction techniques,
however, have in common that a cluster’s connectivity and services are expressed in
terms of the cluster’s neighboring clusters, which serve as the cluster’s entry and exit
points.
5.2. CLUSTERING
PROTOCOLS
→Learning Objectives
As the object is being tracked, the clustering protocol simplifies the transfer of
information between cluster heads regarding the object’s current state and the uncertainty
of its target position. The topology of the hierarchical, non-overlapping sensor node
clusters is specified by clustering protocols. A robust clustering method is essential for
sensor networks to self-organize. An effective clustering protocol ensures clusters with
nearly equal radii and optimally positioned cluster heads. Route discovery among cluster
heads is sufficient to establish a workable route in a clustered network since each node
is connected to a cluster head. Clustering can reduce the number of transmissions and
facilitate multihop route discovery for large sensor networks compared to a flat, non-
clustered network.
cluster head. After 1/p – 1 rounds, T(n) is specified location will be done by hand. For
equal to 1, meaning that all the remaining instance, in the context of gathering data
nodes have been selected as cluster head. during a war, optical distribution (OD) is
Thus, after 1/p rounds, all the nodes have typically achieved through aircraft sprinkling,
had a chance to become a cluster head whereas in the context of gathering data on
once. Since being the cluster head puts a underwater detection, nodes are typically
substantial burden on the sensor nodes, this placed artificially in their surroundings.
ensures that the network has no overloaded Since OD runs solely on batteries, its energy
node that runs out of energy sooner than supply is finite and cannot be increased.
the others. The two nodes were chosen based on the
similarities and differences between their
Following their self-selection, cluster initial energies.
heads begin to promote themselves to other
sensor nodes. A sensor node begins to Routing protocols refer to the means
determine which cluster head it corresponds of data collection and transmission in a
with when it receives advertisements from network. Numerous researchers have put
multiple cluster-head candidates. Every forth different WSN routing protocols in
node pays attention to the signals from the recent years. These routing protocols
advertisements and selects the candidate can be separated into single-hop and
whose signal is received with the highest multi-hop categories based on the data
power. By doing this, every sensor node is transfer between OD and SN. Whereas in
guaranteed to select the nearest candidate the single-hop routing protocol, OD only
to lead the cluster. communicates with SN via single-hop, in
the multi-hop routing protocol, OD and SN
can communicate via single-hop or multi-
5.2.3. Clustering and Routing hop. The hierarchical routing protocols
Protocol for Wireless Sensor originated when the Low-Energy Adaptive
Networks Cluster Hierarchical (LEACH) [1] protocol
suggested the clustering technique for
WSNs are used in a wide range of industries, sensor network development. WSNs divide
including manufacturing automation, the OD distributed into two categories:
industry, data collection during wartime, member nodes (MN) and CH. The primary
and agricultural environment monitoring, duty of MN is to gather data and forward
primarily for the perception and transmission it via a single hop to the relevant CH. The
of environmental data. A WSN is always CH compiles data and sends the message in
made up of one or more sink nodes (SNs), a single or multiple hop fashion to the SN.
which are responsible for uploading and
collecting data, and hundreds of ordinary As WSNs develop, certain issues are
nodes (ODs). The primary responsibility of discovered. To begin with, one of the main
the OD is to perceive environmental data, issues limiting the network’s lifespan is the
which it then transmits to the SN via a imbalance in network load. Within the WSNs,
predetermined method to complete the nodes with the same starting energy are
communication. The OD is inexpensive, but dispersed, and during each data collection
its processing power is constrained. ODs are round, the energy consumption of each node
typically distributed randomly throughout varies. High energy consumption nodes die
the detection space. In certain instances, more quickly, reducing network coverage
the installation of some or all nodes at the or causing SN to become an island, which
NETWORKING FOR CLUSTERS 201
ultimately results in the failure of WSNs. in 3D space nodes with a distance less than
Second, the issue of “hot point,” which R have only r/R in 2D space. The number
arises from the phenomenon of network of nodes in the area closer to SN decreases
load imbalance, is the situation in which more obviously. When the network coverage
certain nodes in the network experience is broad, the total number of nodes close
significantly higher network loads than to the SN in 2D WSNs will be several times
other nodes because of issues with routing that in 3D WSNs.
protocols or node distribution. These two
issues cannot be avoided by any protocol in The average distance between a
WSNs where nodes are assigned at random. node and the sink increases when the
The only way to lessen it is to try balancing percentage of nodes that are close to the
the network load as much as possible using sink decreases. The LEACH protocol shows
different techniques. a positive correlation between node energy
consumption and inter-node distance. The
When it comes to WSN research, the average distance will eventually rise, which
majority of researchers presume that the will result in higher energy usage and a
application environment is two-dimensional. shorter lifespan for the LEACH protocol. Not
Most WSNs are still used in 3D application only that, but when the multi-hop routing
scenarios in real life, despite the fact that protocol was used, the number of nodes near
there is one application scenario that can the convergence node decreased, which also
be thought of as a 2D environment with decreased the network’s load balance. It is
minimal fluctuation. It is possible to use the inevitable to designate the nodes within
2D routing protocol in a 3D environment. one hop of the SN as the relay nodes in
Under the same circumstances, the LEACH the majority of multi-hop routing protocols.
protocol’s performance in 2D and 3D space is The network load imbalance gets worse
simulated. It is discovered that the lifetime when the number of relay nodes decreases
of the LEACH protocol in 3D space is because the load on the remaining relay
decreased by roughly 21% when compared nodes increases. It is critical to develop
to the LEACH protocol in 2D space. It is an energy optimization protocol for load
established that the traditional protocol’s balancing in order to address the issues
2D approximation of the environment of energy consumption and load imbalance
is illogical. Nodes in a 3D environment in 3DWSNs.
typically use more energy than those in
a 2D environment because of issues with The time for each node to broadcast
the 3D environment’s structure. It is easy CH claim information is computed based
to demonstrate that SN is at the center of on its residual energy and the average
the network if there are an equal number distance between it and surrounding nodes.
of nodes uniformly distributed in the sphere It is preferred for nodes to be CH if they
with radius R and in the circular plane area. have a small average distance from the
In both environments, it is not difficult to surrounding nodes and a relatively high
find through the formula of the circular area residual energy. Between CH and MN, two
S=2πr2 and the formula of sphere volume additional identity nodes are added in an
V=4/3πr3. The proportion of the number of effort to balance the network’s load and
nodes with a distance less than r to the total lower energy consumption. The secondary
number of nodes is reduced from (r/R)2 in 2D SCH serves as the standby CH, and the
space to (r/R)3 in 3D space, that is to say, other is the load transfer node (LTN), which
distributes the communication load among
202 COMPUTER NETWORKS
Source: Exasol
Figure 5.13. Add 3rd NIC of each cluster member to existing VLAN ‘CICN’ (Source: Exasol,
https://docs.exasol.com/db/7.1/resource/images/administration/on%20premise/installation/
network_failover_1_799x392.png).
Figure 5.14. Create a new dedicated and isolated VLAN (Source: Exasol, https://docs.exasol.com/
db/7.1/resource/images/administration/on%20premise/installation/network_bonding_1_810x378.
png).
5.2.4.8. Network Switch Configuration • Phase 2: AES 256 / SHA1 / PFS-
Group 5: MODP 1536; Lifetime: 3600
The following features must be disabled on seconds
the switch ports connected to the cluster
For maintenance tasks, the following
to maximize network performance:
service/ports need to be accessible, at
• IEE802.3az: Energy-Efficient least on the cluster’s public and LOM IP
Ethernet (EEE) (“no interface A1- addresses:
A24 energy-efficient-ethernet”)
• TCP/20 (SSH)
• IEEE 802.3x: Flow-Control (“no
• TCP/22 (Cluster-SSH)
interface A1-A24 flow-control”).
• TCP/443 (HTTPS access to
5.2.4.9. Configure VPN Tunnel for Exasol EXAoperation and the LOM web
Support interface)
• ICMP ECHO REQUEST/REPLY
If you opt for Exasol to provide support (ping)
via VPN, you will need to configure a site-
to-site VPN tunnel. The proposed setup is • UDP/123 (NTP)
an IPSec tunnel with the following phases: If you mandate Exasol to monitor
clusters or to perform incident management,
• Phase 1: AES 256 / SHA1 / DH- additional ports will be required.
Group 5: MODP 1536; Lifetime: 7800
seconds
• Define the role and function of a Network Interface Card (NIC) in computer
networking
• Define the purpose and functionality of a repeater in networking
• Explain the role of a hub in network connectivity and data distribution
• Analyze the role of bridges in improving network performance, reducing collisions,
and enhancing security
• Describe how switches operate at the data link layer to forward data packets
based on MAC addresses
• Design and implement router configurations to optimize network routing, security,
and performance
A modern network needs a lot of interconnection devices, ranging from the interface
that connects a single computer to other computers through a phone line or LAN cable
to the big, intricate switching devices that link two or more complete networks. The
following is a list of the primary types of interconnection devices used in computer
networks.
(OUI), a block code that uniquely identifies Operationally, a repeater is at the physical
the manufacturer of NICs, is made up of layer. Its task is to prolong the time that
the first 24 bits. The Institute of Electrical a signal can be transmitted over the same
and Electronics Engineers (IEEE) oversees network by regenerating the signal over it
the issuance of OUIs to organizations. before it gets too weak or distorted. It is
The manufacturer’s sequential number is imperative to acknowledge that repeaters
comprised of the final 24 bits. The MAC do not enhance the signal strength. They
address, which uniquely identifies the replicate the signal bit by bit and regenerate
network adapter, is also referred to as a it at the original strength when it starts to
hardware address or physical address. fade. This gadget has two ports.
It is used by many data link layer
communications protocols, including 5.3.3. Hub
Ethernet, the 802.11 wireless protocol,
An Ethernet network uses hubs. Every
and Bluetooth. The use of a 48-bit address
port on the hub retransmits a signal that
allows for 248 (281,474,976,710,656) unique
is received at any other port. Hub-using
addresses. A MAC address is usually shown
network segments are frequently referred
in hexadecimal format, with each octet
to as having a star topology, where the hub
separated by a dash or colon, for example:
serves as the star’s wiring center.
00-90-47-03-B6-C4.
Because each network device has a
Did you know? separate connection to the hub, using a
The NIC is both a physical layer and data link layer
hub offers a certain level of fault tolerance
device, as it provides physical access to a networking as only one device is impacted by a failed
medium and, for IEEE 802 and similar networks, connection. Additionally, it is simpler to
provides a low-level addressing system through the use expand the network because a single hub—
of MAC addresses that are uniquely assigned to network which is frequently linked to a network
interfaces.
backbone—can add a large number of new
devices. Hubs may be passive or active. An
active hub regenerates incoming frames
5.3.2. Repeater prior to retransmitting them and has its own
power supply. Each output port can link a
Signal strength will decrease (attenuation)
channel up to 100 meters (the maximum
as it passes through a transmission medium.
permitted length for twisted pair cables)
A repeater is a type of network device that
because signals are regenerated. Passive
lacks intelligence. It receives a signal on one
hubs don’t generate the signal; they just
port, regenerates it, and then retransmits
relay it.
it on all of its remaining ports. Repeaters
can join two network segments together
to increase a network’s length (but not 5.3.4. Bridge
its capacity). Repeaters are not useful for
Bridges are useful for connecting multiple
connecting network segments that use
LAN segments of the same kind (e.g.,
distinct network access methods or for
Token-Ring to Token-Ring or Ethernet to
expanding a network beyond the bounds
Ethernet). Similar to repeaters, bridges can
of its underlying architecture. However, they
increase a network’s length, but because
may be able to link segments of bridges with
each port on a bridge has a unique MAC
varying data rates and various media types.
NETWORKING FOR CLUSTERS 211
address, they can also increase a network’s capacity. In an Ethernet
network, bridges that are powered on begin by analyzing the
source addresses of incoming frames from all connected network
segments in order to determine the topology of the network. They
accumulate a routing table over time. The bridge does not need
to move an incoming frame to another network segment unless
the source and the destination are on separate network segments.
The bridge must be able to identify which segment the destination
device is on if the source and destination are on separate segments.
The bridge monitors all traffic on the segments it connects,
cross-referencing each frame’s source and destination addresses
against its routing table. The routing table is empty when the bridge
first starts up, but as data is sent back and forth, the bridge adds Remember
each incoming frame’s source MAC address to the table and links
it to the port on which the frame arrives. The bridge quickly builds Managed
hubs give
a comprehensive image of the network topology in this way. An administrators
incoming frame will be forwarded to all attached segments if the the ability to
bridge is unsure of its destination segment, with the exception of remotely enable
the segment from which it originated. By segregating intra-segment or disable specific
ports, and
traffic and acting as a filter, bridges reduce the volume of traffic on
intelligent hubs
individual segments. This can significantly improve reaction times. have the ability
to automatically
Ethernet bridges are considered to operate at the data link layer close ports if a
of the OSI Reference Model because they decide whether or not to predetermined
forward frames based on the destination MAC address. Although threshold of
they effectively isolate intrasegment traffic, lowering overall network packet errors is
exceeded.
traffic and speeding up network response times, Ethernet bridges
are sometimes referred to as transparent due to the transparency
of both their existence and operation to network users.
for the bridges to be able to recognize the bridge itself. Network administrators
changes in topology and generate a have the ability to assign an arbitrary cost
new spanning tree accordingly. When to each bridge port on the network. The
the bridges are initially powered on and algorithm can then use this cost to decide
whenever a change in the network topology which ports are put into standby mode and
is noticed, the spanning-tree calculation which are left open, based on which ports
takes place. Configuration messages are have the lowest cost. A default value is
used to facilitate communication between applied if no cost value is specified. The
the bridges and are sent back and forth network with five segments that redundant
at regular intervals (usually every few bridges have caused loops within is depicted
seconds). The other bridges will rerun the in the diagram below.
algorithm if a bridge fails because they
will notice that its configuration messages The root bridge is chosen initially in a
are missing. spanning-tree computation; this is typically
the bridge with the lowest identifier. For
the purpose of clarity, the simplified bridge
5.3.4.2. The Spanning Tree Algorithm identifiers (B1-B5) are used in the diagrams
(Ethernet) on this page, and B1 will be the root bridge.
Next, one needs to identify a root port (R)
The spanning tree technique disables loops
on every other bridge. This is the port that
in a network by putting bridge ports into a
has the lowest root path cost to reach the
standby (blocking) state that, in an active
root bridge (the cost of each bridge port
state, would result in loops. In the event
that must be crossed on a specific root
that a link fails to offer an alternative path
path will determine this). Lastly, for every
across the network, a standby port can be
LAN segment, designated bridges and their
reactivated. The spanning tree algorithm
designated ports are identified. The bridge
builds a loop-free topology using graph
on the segment that offers the root path at
theory as a foundation. According to graph
the lowest cost is designated. The port that
theory, a spanning tree of edges keeps a
links a segment to its designated bridge is
connected graph connected but free of
known as the designated port. The bridge
loops, given any connected graph made up
with the lowest bridge identifier number
of nodes and edges joining pairs of nodes.
is used when two or more bridges have
Every bridge represents an edge, and the same root path cost. All but one of
every LAN segment represents a node. the bridges attached to each LAN segment
This makes it possible for the network’s are removed using the STA, eliminating
bridges to generate a spanning tree using loops while maintaining connectivity. The
a straightforward algorithm. Bridges can outcome of applying the STA to the network
register a change in network topology and that was previously depicted is displayed in
obtain a new spanning tree by rerunning the the following updated diagram. The ports
STA, demonstrating the dynamic nature of company is in the STA’s list.
the algorithm. According to the algorithm,
When a change in the network topology
every bridge must have a unique identity, as
is detected or the bridge is powered on,
does every port on every bridge. Each port is
the spanning-tree calculation takes place.
typically identified by its MAC address, and
Bridges must communicate with one
the algorithm uses one of the bridge ports—
another in order for this to occur, and bridge
prefixed by a two-byte priority—to identify
protocol data units (BPDUs) are used to
NETWORKING FOR CLUSTERS 213
send configuration messages. The bridge and port identifiers of the
sending bridge are contained in a configuration message, which
also identifies the bridge that the sender believes to be the root
bridge.
It also includes the age of the data in the configuration message
and the root path cost from the sending bridge to the root bridge.
Every few seconds, on average, bridges exchange configuration
messages. In the event of a bridge failure, which results in a
topology change, neighboring bridges will detect this and send
topology change messages to start a spanning-tree recalculation.
Keyword
Bridge Protocol
5.3.4.3. Frame Format Data Units
(BPDUs) are
The format of the IEEE 802.1d configuration message is illustrated frames that contain
information about
in Figure 5.15. The fields of the bridge configuration message are the spanning tree
described below. protocol (STP).
Figure 5.15. Bridge configuration message format (Source: Research gate, https://www.researchgate.
net/profile/Soufiene-Djahel-2/publication/280317385/figure/fig3/AS:287057567076355@1445451265
758/Format-of-the-new-RREQ-packet.png).
A CLOSER LOOK
Cluster networks are groups of high-performance computing (HPC), GPU, or optimized
instances that are connected with a high-bandwidth, ultra-low-latency network. Each
node in the cluster is a bare metal machine located in close physical proximity to the
other nodes. A remote direct memory access (RDMA) network between nodes provides
latency as low as single-digit microseconds, comparable to on-premises HPC clusters.
Cluster networks are designed for highly demanding parallel computing workloads.
For example:
• Computational fluid dynamics simulations for automotive or aerospace modeling
• Financial modeling and risk analysis
• Biomedical simulations
• Trajectory analysis and design for space exploration
• Artificial intelligence and big data workloads
Oracle Cloud Infrastructure offers two types of cluster networks. In both cases,
the networks are groups of bare metal instances that are connected with an ultra-low
latency network.
• Compute clusters allow you to manage instances in the cluster individually.
When you create a compute cluster, you create an empty RDMA network
group. After the group is created, you can add instances to the group or delete
instances from the group. If you want to manage instances in the RDMA network
independently of each other or use different types of instances in the network
group, use compute clusters.
• Cluster networks with instance pools enable you to use instance pools to
manage groups of identical instances in the RDMA network group. If you want
predictable capacity for a specific number of identical instances that are managed
as a group, use cluster networks with instance pools.
218 COMPUTER NETWORKS
SUMMARY
• A cluster network is an ultra-low latency, high-bandwidth network that connects a
pool of GPU-optimized instances or high-performance computing (HPC) instances.
• The networks whose connectivity fluctuates frequently (e.g., mobile networks) or
are large with many configuration parameters work better with self-organizing
controlled structures. Because nodes construct and maintain them, they offer
greater network availability, a quicker reaction to state changes, and a lower
chance of configuration errors.
• Broadcast environments with multiple access utilize this architecture. Node
clusters are organized to control transmissions without contention, reducing
interference..
• Large tactical networks are the intended application and deployment context
for Network Near-Term Digital Radio (NTDR) networking. This is one of the
backbone formation clustering techniques.
• The cluster heads in the NTDR network are responsible for keeping the backbone
stable, so they monitor it and share information about any changes with one
another.
• The quasi-hierarchical category includes the majority of hierarchical cluster-
based routing systems. Moreover, the distance vector routing technique forms
the basis for nearly all quasi-hierarchical routing schemes.
• A node strives to create routes that align with the users’ service requests and
the network’s existing capabilities using this link-state information.
• Techniques for clustering can be decentralized or centralized. Each sensor node
must transmit its unique data, including its location and energy level, to the
central base station to utilize centralized clustering algorithms.
REVIEW QUESTIONS
1. What is the role of routing in cluster-based networks?
2. How can clustering protocols be classified?
3. What are the considerations in clustering and routing protocol design for wireless
sensor networks?
4. What functions does a Network Interface Card (NIC) serve?
5. How does the Spanning Tree Algorithm apply to Ethernet networks?
REFERENCES
1. Charles, E., (2001). Perkins: Chapter 4. Ad Hoc Networking. Addison Wesley. ISBN
0-201-30976-9.
2. Kalashnikov, D. V., & Mehrotra, S., (2004). Learning Importance of Relationships for
Reference Disambiguation. RESCUE.
3. McDonald, D. W., (2003). Recommending collaboration with social networks: A
comparative evaluation. In: Proceedings of the SIGCHI Conference on Human Factors
in Computing Systems (pp. 593–600). ACM Press, Ft. Lauderdale, Florida, USA.
220 COMPUTER NETWORKS
4. Tho, Q. T., Hui, S. C., & Fong, A. C. M., (2003). A web mining approach for finding
expertise in research areas. In: Cyberworlds, 2003; Proceedings. 2003 International
Conference (pp.310–317). Oxford University Press.
5. Bathelt, H., & Glückler, J. (2011). The Relational Economy: Geographies of Knowing
and Learning. Oxford University Press.
6. Ketels, C. (2013). Cluster Reinvention and Regional Economic Development. In M.
Porter, C. Ketels, & M. Delgado (Eds.), Competitiveness in the Global Economy: A
Multi-Disciplinary Perspective (pp. 235-258). Harvard Business School Publishing.
7. Martin, R., & Sunley, P. (2003). Deconstructing clusters: Chaotic concept or policy
panacea? Journal of Economic Geography, 3(1), 5-35.
CHAPTER
Distributed
6 Network Systems
LEARNING OBJECTIVES
INTRODUCTORY EXAMPLE
control function is essential to the retrieves the data from the mail
system’s functionality (e.g., as an server. Every kind of computer
authentication server, a file server, goes through this procedure again
or a name server). As a result, the when requesting information from
dependability of all computers and servers. As such, your phone,
devices as well as communication laptop, and even smartwatch can
lines determines the availability serve as clients.
and reliability of an operation that
depends on numerous servers.
• The potential bottleneck caused
by individual servers is the second
issue. As more computers with
potential customers are added to
the system, the issue worsens.
• The third issue arises when a client-
server based system’s performance
is improved by using multiple
implementations of comparable
functions to maintain consistency.
Figure 6.2. Cooperation functionality between
Additionally, this increases the client and server (Source: TechTerms, https://
overall costs of a distributed medium.com/@joshjnunez09/the-client-server-
computing system. relationship-9ac90fadb3d2).
• Explore the concept of agents and their role in facilitating indirect client-server
cooperation within distributed systems.
• Understand the principles and components of the three-tier client-server
architecture in distributed computing environments.
defined interface, despite the complexity of such an agent. Additionally, the client
receives transparency, which lessens the application’s complexity.
A straightforward communication system that uses a direct, one-to-one message
protocol can facilitate cooperation between a client and several servers. Despite being
straightforward, this communication model performs poorly because it requires sending
separate messages to each of the servers involved. When a one-to-many communication
pattern is employed, the overall performance of a communication system supporting
message delivery in a client-server based distributed computing system can be significantly
increased. In this instance, the client process sends a single request—specified by a
single group name—to each server. Although it’s not necessary, multicasting at the
physical/data link layer does make this system better.
Q: How the browser interacts with the servers in while using client-server
model?
Source: https://www.setgetweb.com/p/WAS8/images/thtrcs.gif
234 COMPUTER NETWORKS
Source: https://www.gstatic.com/pantheon/images/solutions/three_tier_web_app_v6.svg
a part of, either permanently or temporarily. N-tier programs are another name for 3-tier
application programs. The letter n represents several tiers in this context.
• Logical separation is maintained between Presentation Tier, Application Tier,
and Database Tier.
• Enhancement of Performance as the task is divided on multiple machines in
distributed machines and moreover, each tier is independent of other tiers.
• Increasing demand for adding more servers can also be handled in the architecture
as tiers can be scaled independently.
• Developers are independent to update the technology of one tier as it would
not impact the other tiers.
• Reliability is improved with the independence of the tiers as issues of one tier
would not affect the other ones.
• Programmers can easily maintain the database, presentation code, and business/
application logic separately. If any change is required in business/application
logic then it does not impact the presentation code and codebase.
• Load is balanced as the presentation tier task is separated from the server of
the data tier.
• Security is improved as the client cannot communicate directly with Database
Tier. Moreover, the data is validated at Application Tier before passing to
Database Tier.
• The integrity of data is maintained.
• Provision of deployment to a variety of databases rather than restraining yourself
to one particular technology.
To request a desired service, a client needs to know if there is a server that can
provide it, what those characteristics are, where it is located, and its name. This is the
service discovery problem. It is not necessary to determine whether a desired server
exists in a simple distributed computing system with a small number of servers. All of
the servers that are available are known in advance. This suggests that the scope of
service discovery is limited to identifying the server that offers the required service.
However, in a sizable distributed computing system that is a federation of several
dispersed computing systems, with numerous service providers that dynamically offer
and withdraw these services, it is necessary to ascertain whether a suitable service
(e.g., a high-quality, extremely quick color printer) is available at a specific time, along
with its name and location.
One of the most crucial aspects of a distributed computing system is transparency.
It is important to note that in a distributed computing system managed by a distributed
operating system, a client should only be aware of the name of a server or an agent
acting on the server’s behalf. In contrast, a client in a distributed computing system
that is controlled by a collection of centralized operating systems and their extensions
needs to be aware of its name and location in order to access remote resources and
• Understand the concept of fault tolerance and its importance in ensuring system
reliability and resilience.
• Explain scalability in the context of computing systems and its implications for
accommodating growing workloads or user demands.
• Define predictable performance and discuss strategies for achieving consistent
and reliable system response times.
• Explore the concept of openness in software and systems, including the benefits
of interoperability and accessibility.
• Analyze security considerations in computing environments, including threats,
vulnerabilities, and strategies for safeguarding data and resources.
• Discuss transparency in system design and operation, including mechanisms for
providing visibility and insight into system behaviors and processes.
Distributed systems are characterized by several key features that distinguish them
from centralized or standalone systems. These characteristics define the architecture,
behavior, and capabilities of distributed systems, enabling them to achieve scalability,
fault tolerance, and efficient resource utilization. One fundamental characteristic of
distributed systems is decentralization, where multiple autonomous nodes collaborate
to perform tasks or provide services without relying on a central coordinator. This
decentralization fosters resilience and flexibility, as nodes can operate independently
and adapt to changes in the network topology or workload distribution without affecting
the system’s overall functionality.
Another important characteristic of distributed systems is concurrency, which refers
to the ability to perform multiple tasks or processes concurrently across different nodes
in the network. Concurrency enables distributed systems to handle multiple requests
simultaneously, improving throughput and responsiveness. However, managing concurrency
requires mechanisms for synchronization and coordination to ensure consistency and
integrity of shared resources or data accessed by multiple concurrent processes.
Scalability is a critical characteristic of distributed systems, allowing them to
accommodate growing workloads or user demands by adding more nodes to the network.
Scalability can be achieved through horizontal scaling, where additional nodes are added to
distribute the workload, or vertical scaling, where existing nodes are upgraded to handle
separation between its farthest nodes, the data among several servers, the size
and the number of organizations that have of the database that each server needs to
administrative control over certain areas maintain is decreased, which cuts down on
of the system. The three dimensions of the amount of time required for database
scale have a variety of effects on distributed searches. Additionally, distribution divides
systems. A few of the components that the load among the servers, limiting the
are impacted are naming, authorization, amount of requests that each can handle.
communication, remote resource utilization, The load on servers can be efficiently
authentication to confirm an individual’s managed if requests are routed to servers
identity, and user observation mechanisms. according to their power. Assigning data
To control scale, three strategies are used: to servers near their most frequently used
caching, replication, and distribution. location can help minimize network traffic.
If cached copies are accessible from lower-
Resources are replicated multiple level servers in a tree-structured system,
times during replication. Its application to the higher levels can be skipped.
file services, naming, and authentication
lightens the burden on individual servers Another crucial method for creating
and raises the overall availability and scalable systems is caching. The strain
dependability of the services. The locations on servers and the network is reduced
of the replicas and the methods used to by caching. Accessing data that has been
maintain consistency between them are the cached is quicker than making a new
two key aspects of replication. The reason request. Replication and caching differ in
for replicating a resource determines where that the latter is a temporary storage of
replicas should be placed in a distributed data. When consistency cannot be ensured,
system. A service’s replicas are dispersed consistency is preserved by nullifying cached
throughout the system if it is being data rather than propagating updates on
replicated in order to minimize network it. As the client typically handles caching,
latency when the service is accessed. there are fewer repeated requests made
Replicas may be positioned close to one to the network services. On the servers
another if most users are local and if the running those services, caching may also
service is being replicated to increase take place. It is quicker to read a file from
availability or distribute the load across the file server’s memory cached copy than
several servers. Any modifications made to from the client’s local disk.
the object should be apparent to all users
of the system. As an illustration, the system
updates any replica it finds, and that replica 6.4.3. Predictable Performance
then distributes the updates to the others as A range of performance indicators, including
they become available. Timestamps, or the system utilization, network capacity,
date and time the update was generated, throughput (the speed at which data is
are used to distinguish between copies of sent or received over a network), response
an inconsistent update if they are received time (the amount of time that passes
by various replicas in different orders. between the end of a request or inquiry
on a computer system and the start of a
A distributed service’s data can be
response), etc., are used in order to evaluate
expanded across multiple servers through
the performance. The capacity to deliver
distribution, another method for controlling
desired responsiveness on time is known
scale in distributed systems. By spreading
as predictable performance.
DISTRIBUTED NETWORK SYSTEMS 247
6.4.4. Openness
The quality that guarantees a subsystem is always available for
communication with other systems is called “openness.” Software
systems known as web services are made to facilitate networked,
interoperable machine-to-machine communication. These protocols
enable scalability and extension of distributed systems. A scalable, Remember
open system is preferable to one that is totally closed and A distributed
independent. The openness of a distributed system is achieved networking
system is
without relying on the heterogeneity of the underlying environment,
composed of
including hardware and software platforms. As a result, each service processes,
in the system is equally available to all clients, whether they threads, agents,
are local or remote. New service implementation, installation, and and distributed
debugging shouldn’t be too difficult in a system with an openness objects. Merely
distributed
characteristic. physical
components
are not enough
6.4.5. Security to suffice as
a distributed
By enforcing the appropriate security measures, distributed systems network; typically
should enable communication between users, programs, and distributed
resources on various computers. The primary goals of the security networking
features are to ensure availability, integrity, and confidentiality. uses concurrent
program
Privacy, or confidentiality, is the defense against revelation to
execution.
unauthorized parties. Confidentiality violations can range from
upsetting to disastrous. Integrity shields against corruption and
modification. Availability maintains the resource’s usability. The
integrity of databases and other resources is frequently compromised
by hacking incidents. The term “denial of service” refers to an attack
that targets availability. Nonrepudiation and access control are two
more crucial security issues. Ensuring that users can only access
resources and services to which they are legally entitled is made
easier by maintaining access control. Additionally, it makes sure
that users don’t lose access to resources that they have a right to.
Protection against denial by one of the parties to a communication
is offered by nonrepudiation. The security measures implemented
ought to ensure that various system users are utilizing resources
in an appropriate manner.
6.4.6. Transparency
Rather than being seen as a group of collaborating parts, distributed
systems should be viewed as a whole by users and application
developers. The locations of computer systems that are involved in
concurrent operations, data replication, failures, system recovery,
and resource discovery from multiple sites. are concealed from
users. Transparency allows the system to appear and function like
248 COMPUTER NETWORKS
a typical centralized system, concealing from its users the fact that it is distributed. In
a distributed system, the transparency can be used in various ways (Figure 6.8).
FOCUS ON CAREERS
WIRELESS NETWORK ENGINEER
A Wireless Network Engineer job description includes installing, configuring, and
maintaining wireless network equipment, network management, and security, including
802.11 b/g/n/ac standards and industry best practices for implementing high-density WIFI
solutions. Moreover, to put it concisely, a Wireless Network Engineer needs to assess,
plan, and develop several operational capabilities for wireless telecommunications. As
more companies continue to embrace Wireless LAN, the demand for wireless network
engineers has grown manifold in the recent past. The proliferation of mobile applications,
which require testing in a wireless environment, is also one of the other reasons why
enterprises need their services more. Research indicates that 60% of enterprise-level
managers report utilizing freelancers in their workforce. But with the emergence of
Software Defined WAN (SD-WAN) DevOps, the advent of 5G, and virtualization, it is
necessary for Wireless Network Engineers to be open to reskill themselves, as it could
likely bring about changes that might change the way they operate. It is, however,
averred by experts that despite all the changes that may take place in the networking
landscape, the demand for Wireless Network Engineers will continue to rise.
REVIEW QUESTIONS
1. Define the client-server model in a distributed computing system.
2. Explain the cooperation between clients and servers.
3. What are the extensions to the client-server model?
4. Discuss the three-tier client-server architecture.
5. What is broadcast approach?
REFERENCES
1. Robert, R., Chris, A., & Jay, L., (2003). A solver for the network testbed mapping
problem. ACM SIGCOMM Computer Communications Review, 32(2), 65–81.
2. Jonathon, D., Robert, R., John, B., & Jay, L., (2006). Automatic IP Address Assignment
on Network Topologies. Technical Report FTN-2006-02.
3. David, S. A., Leigh, S., Mike, H., Tim, S., & Jay, L., (2006). Automatic online validation
of network configuration in the Emulab network testbed. Third IEEE International
Conference on Autonomic Computing (ICAC 2006).
4. Ang, B. S., Chiou, D., Rosenband, D. L., Ehrlich, M., Rudolph, L., & Arvind, (1998).
StarT-voyager: A flexible platform for exploring scalable SMP issues. In: Proceedings
of SC98: High Performance Networking and Computing. Orlando, Florida.
5. Arpaci-Dusseau, C., (1998). Implicit Coscheduling: Coordinated Scheduling with
Implicit Information in Distributed Systems. PhD thesis, University of California at
Berkeley.
DISTRIBUTED NETWORK SYSTEMS 255
6. Adem, E. G., David, B., Emin, G. S., & Robbert, V. R., (2015). Configuring Distributed
Computations Using Response Surfaces. Middleware, Vancouver, Canada.
7. Alysson, N. B., Eduardo, A., Miguel, C., & Joni, S. F., (2008). DepSpace: A Byzantine
Fault-Tolerant Coordination Service. Proceedings of the 3rd ACM SIGOPS/EuroSys
European Systems Conference – EuroSys’08.
8. Jonathon, D., Robert, R., Junxing, Z., Daniel, G., Sneha, K., & Jay, L., (2006). Flexlab:
A realistic, controlled, and friendly environment for evaluating networked systems.
Fifth Workshop on Hot Topics in Networks (HotNets-V).
9. Shashi, G., Rob, R., & Jay, L., (2005). Integrated network experimentation using
simulation and emulation. First International Conference on Testbeds and Research
Infrastructures for the Development of Networks and Communities (Tridentcom 2005).
10. Shashikiran, B. G., (2005). Issues in Integrated Network Experimentation Using
Simulation and Emulation. Thesis, University of Utah.
11. David, J., Tim, S., Russ, F., Daniel, M. F., Leigh, S., Robert, R., & Jay, L., (2006).
Mobile Emulab: A Robotic Wireless and Sensor Network Testbed. IEEE INFOCOM
2006.
12. Arora, N. S., Blumofe, R. D., & Plaxton, C. G., (1998). Thread scheduling for
multiprogrammed multiprocessors. In: Proceedings of the 10 th Symposium on Parallel
Algorithms and Architectures (pp. 119–129). Puerto Vallarta, Mexico.
13. Jonathon, D., Robert, R., John, B., & Jay, L., (2005). Optimizing IP Address Assignment
on Network Topologies. Technical Report FTN-2005-04, University of Utah.
14. Bruno, V., Nuno, N., Henrique, M., & Paulo, V., (2010). Randomized consensus in
wireless environments: A case where more is better. Third International Conference
on Dependability. Venice, Italy.
15. Nitin, G., Alan, J. D., & Johannes, E. G., (2008). SEMMO: A scalable engine for
massively multiplayer online games. Talk. International Conference on Management
of Data. Vancouver, Canada.
16. Vincent, G., Ymir, V., Ken, B., Anne-Marie, K., & Robbert, V. R., (2007). Sliver, a
Fast Distributed Slicing Algorithm. Technical Report.
17. David, J., Daniel, G., & Jay, L., (2008). Towards a high quality path-oriented
network measurement and storage system. Proc. of the Ninth Passive and Active
Measurement Conference (PAM 2008).
18. Michael, P. K., Priya, N., Kevin, A., & Jay, L., (2006). Towards finger pointing in
the Emulab dynamic distributed system. Third USENIX Workshop on Real, Large
Distributed Systems (WORLDS 2006).
19. David, J., Tim, S., Russ, F., Dan, F., Rob, R., & Jay, L., (2005). TrueMobile: A Mobile
Robotic Wireless and Sensor Network Testbed. Technical Report FTN-2005-02,
University of Utah.
CHAPTER
Wireless
7 Network Security
LEARNING OBJECTIVES
INTRODUCTORY EXAMPLE
In the simplest terms, wireless technologies allow for the communication of one or more
devices without the need for network or peripheral cabling or physical connections.
Whereas wired technologies use cables, wireless technologies use radio frequency
transmissions to transfer data. Wireless technologies cover a broad spectrum, from
sophisticated systems like wireless local area networks (WLAN) and cell phones to
basic gadgets like wireless microphones, headphones, and other non-processing, non-
storing devices. They also include wireless hi-fi stereo headsets, some cordless computer
keyboards and mice, and remote controls that use infrared (IR) technology. All of these
devices require a direct line of sight to break the connection.
wireless NICs, but not all of them. Radio designed specifically for that purpose. They
waves can be used by machines to send are frequently made quickly and for a single,
and receive data once the wireless LAN has fleeting purpose. These networks typically
been configured on the server and client. consist of a collection of workstations or
Because the client can stay mobile anywhere other wireless devices that exchange data
within the network’s broadcasting range, a directly with one another. Consider these
wireless LAN is incredibly convenient. With ties as impromptu networks that are open
a laptop, one can work from any room in to anyone in a particular location.
the house—mostly even the backyard—and
still share the server’s network connection. An ad hoc network is one in which no
access points allow participants to exchange
Mobile employees have instant access to data. Infrastructure networks route data
the office via a wireless LAN. Additionally, via a central information hub, which may
it saves money by eliminating the need be a computer’s hardware or software. For
to run Ethernet cables throughout an instance, office networks typically use a
entire building, enabling simple desktop server that business workstations connect
connectivity between clients. One of the to in order to obtain their information. On
key benefits of a wireless local area network the other hand, ad hoc networks bypass a
(LAN) is its ease of installation, as there central information hub.
are no wires needed to reach the clients. In
addition to being less expensive, wireless These networks are usually created
LANs offer greater flexibility than wired between participants and are closed
LANs. A wired network has fewer security networks, meaning they do not connect
measures to prevent intrusion, and wireless to the Internet. However, if one of the
LANs can be slower and less dependable participants is connected to a public or
when interference is present. These are the private network, other network members
two main drawbacks of wireless LANs. On may share this connection. This will make
the other hand, as technology advances, it possible for additional users on the
dependency rates also do. Certain wireless impromptu ad hoc network to establish an
local area networks (LANs) can rival wired Internet connection. Due to their ability to
networks. Wireless technology standards enable wireless gaming between players,
are denoted by letter designations. 54 ad hoc networks are frequently found
megabits per second are possiblwith the on portable gaming systems such as the
wireless “g” standard (mbps). The most Nintendo DS and Sony PSP. Customers can
recent iterations of multiple input multiple access new game demos through the store’s
output (MIMO) technology enable rates to own ad hoc network by creating networks
approach 100 mbps. within certain retail establishments. Peer-to-
peer networking for the wireless era is what
an ad hoc network is. Network environments
7.1.1.2. Ad Hoc Networks for early Windows computers were created
using peer-to-peer or workgroup style
Wireless networks have been classified into
networks. In a smaller office setting, this
two categories since their inception: ad
allowed the early computers to connect to
hoc networks and infrastructure networks,
each other and share information without
which include some LANs. The Latin term
the need for domains and the associated
“ad hoc” means “for this purpose.” Ad
extra overhead and management.
hoc networks, then, are networks that are
WIRELESS NETWORK SECURITY 263
7.1.2. Wireless Devices Perhaps a Personal Area Network (PAN)
contains another kind of wireless device. A
Any type of communication equipment that
Personal Area Network (PAN) is established
can transmit data to another device without
through the use of Bluetooth® technology,
the need for a physical wire is referred to
which allows connections between personal
as a wireless device. Wireless headphones
digital devices over extremely short
with a receiver connect to a transmitter that
distances—a few feet, on average—though
is connected to the sound source, such as a
the standard is 30 feet (9.14 m). Networks
television, using either radio frequency (RF)
of the Bluetooth® variety are incredibly
or infrared technology. Generally speaking,
versatile and practical. It saves the trouble
though, a wireless device is a networking
of setting up shared resources over a LAN
device that can transmit data to other
by allowing print jobs to be sent from a
wireless network equipment even when it
laptop to a nearby printer. Moreover, it is
is not physically connected.
employed to link Apple products, PDAs, and
There are many different kinds of wireless cell phones with Bluetooth® capability to
technologies in today’s world, where people one another as well as to other Bluetooth®-
value having constant access to the Internet enabled devices like computers, headsets,
and to one another. Local area networks and standalone speakers. A Bluetooth®
(LANs) are broadcast by wireless routers network can operate “within” a LAN
with integrated modems, hubs, and switches without interfering since it operates on a
in homes and offices, enabling nearby different frequency spectrum than LANs.
computers to connect. A LAN typically
spans 300 feet (91.44 m) or more, though the 7.1.1.3. Personal Digital Assistants
actual broadcasting distance varies greatly
depending on numerous factors. A printer, A portable electronic gadget used for
other office supplies, or a fast Internet communication and personal organization
connection are just a few examples of the is called a personal digital assistant (PDA).
network resources that any computer on PDAs typically have memory cards for
the network can share. A wireless network removable storage, touch screens that allow
card or adapter needs to be installed on for finger or stylus input, organizational
a computer in order for it to connect to software like an address book and calendar,
a wireless LAN (WLAN). A network card and ways to connect to a personal computer
is an internal wireless device designed to via a cable or a wireless protocol like
operate using the same protocol or language Bluetooth®. The majority allow you to add
as wireless routers. Nevertheless, in the apps, like games or business software.
interim, compatibility problems arise as
these protocols sporadically develop into PDAs come in a wide variety, occupying
new standards. In cases where an internal a space between laptop computers and cell
wireless device is unable to support the phones in terms of both functionality and
protocol used by the router, an external size. Typically, they are compact enough
wireless adapter can be inserted into an to fit easily in a pocket or belt loop. A
external port. Although ExpressCard® smartphone is a PDA that has cell phone
formats are also available for wireless functionality; these are by far the most
network adapters, laptop users have an common kind of PDAs available.
additional option in addition to the more One of the key benefits of PDAs is their
popular USB dongle. capacity to replace numerous heavy paper
264 COMPUTER NETWORKS
7.2. DEVELOPMENT OF
WIRELESS LANS
→Learning Objectives
• Explore the role of WLAN in providing flexible and mobile connectivity within
organizations.
• Discuss the scalability and flexibility offered by WLAN for accommodating
changing business needs.
• Learn about the security mechanisms and protocols available for securing 802.11
Wireless LANs.
• Identify the security requirements and compliance standards applicable to
WLAN deployments.
• Explore the latest advancements in WLAN security standards and technologies.
A wireless LAN, or wireless local area network, consists of two or more computers
linked through the same radio frequency. In contrast, a wired LAN requires physical
connections via Ethernet cables to a server’s network switch or hub. Each network
begins with a main computer, known as a server, and multiple connected devices, called
clients. Two Ethernet network interface cards (NICs) and network-supporting software
are usually installed on the server. Since Windows 98 Special Edition (SE), Microsoft
Windows operating systems have included built-in networking capabilities; however,
third-party networking software is also accessible. A desktop computer could be the
server and a laptop the client in a basic home wireless LAN.
Imagine if the desktop computer is hooked up to a high-speed DSL for Internet
access. To spread the Internet connection through a wireless LAN, the desktop computer
needs to be physically connected to a wireless DSL modem. The wireless DSL modem
might have a network switch or router built in to keep the data flowing to the right
network device. If these aren’t part of the modem, you’ll have to get them separately.
Physical Ethernet cables connect the desktop server to the DSL modem, switch, and
router. Clients require wireless NICs like internal, USB, or PCMCIA. Many wireless NICs
have a small antenna.
With a laptop, one can work from any room in the house—mostly even the backyard—
and still share the server’s network connection. Mobile staff members can instantly
connect to the office via a wireless LAN. Additionally, it provides simple, easy desktop
connectivity between clients without incurring the high cost of running Ethernet cable
throughout a building. One of the primary benefits of a wireless LAN is its ease of
270 COMPUTER NETWORKS
Characteristic Description
Physical Layer Direct Sequence Spread Spectrum (DSSS), Frequency
Hopping Spread Spectrum (FHSS), Orthogonal Frequency
Division Multiplexing (OFDM), infrared (IR).
Frequency Band 2.4 GHz (ISM band) and 5 GHz.
Data Rates 1 Mbps, 2 Mbps, 5.5. Mbps (11b), 11 Mbps (11b), 54
Mbps (11a )
Data and Network RC4-based stream encryption algorithm for confidentiality,
Security authentication, and integrity. Limited key management.
(AES is being considered for 802.11i.)
Operating Range Up to 150 feet indoors and 1500 feet outdoors.9
Positive Aspects Ethernet speeds without wires; many different products
from many different companies. Wireless client cards and
access point costs are decreasing.
Negative Aspects Poor security in native mode; throughput decrease with
distance and load.
WIRELESS NETWORK SECURITY 271
7.2.1.1. Frequency and Data Rates hoc networks. In an infrastructure BSS, all
communications—including those between
In order to provide wireless networking mobile nodes within the same service set—
technology similar to the long-established take place over APs. The coverage distance
wired Ethernet, IEEE developed the 802.11 from the AP defines the boundaries of an
standards. The 802.11 WLAN family’s most infrastructure BSS. A single AP’s coverage
extensively used standard is IEEE 802.11a. area is referred to as a cell. The AP needs
It uses OFDM technology and operates in to be able to reach every mobile station.
the licensed 5 GHz band. The widely used
802.11b standard uses direct sequence
spread-spectrum technology to function in
the unlicensed 2.4. GHz–2.5. GHz Industrial,
Scientific, and Medical (ISM) frequency
band. Since the ISM band is accessible
everywhere, it has grown in popularity for
wireless communications. Up to 11 Mbits
per second of transmission are possible with
the 802.11b WLAN technology. This makes
it marginally faster than regular Ethernet
and much faster than the original IEEE
802.11 standard, which transmits data at
up to 2 Mbps.
are delivered to a station by the router using its MAC address as the destination; only
the associated AP can deliver the frame to that station.
Typically, the main driver behind the deployment of an 802.11 network is mobility
support. At the link layer, IEEE 802.11 permits mobility between BSSs. It is ignorant
of all activity occurring above the link layer, though. Stations will search for and try to
associate with an AP with the strongest signal and the least amount of network traffic
when they move between BSSs. In this manner, a mobile station can move between
APs in the network without experiencing a loss of connectivity. This phenomenon is
commonly known as roaming.
from small peer-to-peer networks network traffic, nor does it offer any other
to very large enterprise networks protection other than access control to the
that enable roaming over a broad network behind the access point, as its name
area. suggests. As a result, any wireless network
The WLAN market has been growing that is only secured by this method is
steadily over the past few years, and WLANs extremely weak and susceptible to network
are still becoming more and more popular, attacks. Furthermore, it turns out that it
thanks to these core advantages. WLANs is relatively simple to temporarily change
are starting to show promise as a substitute the MAC address on almost any wireless
for conventional wired solutions. To carry network interface (at least in Windows and
out their regular business operations, UNIX/Linux OS), rendering this security
hospitals, colleges, airports, hotels, and mechanism useless as an access control
retail stores, for instance, already use measure. MAC spoofing is the process of
wireless technologies. altering the MAC address to pretend to be
another person or device. To perform MAC
spoofing in UNIX/Linux OS, we simply need
7.2.3. Security of 802.11 to run one command.
Wireless LANs ifconfig eth0 hw ether 00:01:02:03:04:05
It is very difficult to control which
computers or devices are receiving the Where:
wireless network signal because of the RF eth0 is the network interface we want
signal nature of the network. In order to to modify.
prevent eavesdropping and other network
threats, software link-level protection— 00:01:02:03:04:05 is the MAC address
which employs cryptography—is therefore we want to specify with numbers in hex
necessary for wireless. Exclusively WEP is number format.
available for wireless network security in
the original 802.11 standard. In Windows environment, we need the
help of tools designed specially for this
intention. There are at least two tools
7.2.3.1. Access Control List available for MAC spoofing:
In a wireless network, the most basic a. SMAC3, from KLC Consulting, and
security feature is the access control b. MAC Makeup4 (freeware), from
list. This mechanism provides protection H&C Works
mostly by filtering out unknown users and
necessitates loading the MAC addresses Both feature an intuitive graphical user
of authorized clients into the access interface, work with Windows XP and 2000,
point. The Access Point will only accept don’t require drivers to be installed, and
communication from those MAC addresses work almost with any network interface
that have registered; any communication card—including wireless ones. Anyone can
from unregistered MAC addresses will be obtain a list of registered MAC addresses
rejected. on their own with the use of wireless
analyzer utilities, which enables anyone
This mechanism does not protect the to use this information to gain access to
confidentiality or integrity of wireless an unprotected wireless network. With the
WIRELESS NETWORK SECURITY 275
ability to passively monitor or sniff wireless network traffic, wireless analyzers are
incredibly potent tools for learning vital details about wireless networks.
Figure 7.3. WEP Encryption/Decryption Process. (Black) Common steps, (Red) Encryption Process,
(Blue) Decryption Process (Source: Researchgate, https://www.researchgate.net/profile/Abdel-
Karim-Al-Tamimi/publication/303417816/figure/fig9/AS:627929046335490@1526721359103/WEP-
encryption-and-decryption-processes.png).
Every wireless client on a WEP-protected network needs to have the same secret
key as the access point in order to function. This secret key may take the form of a
passphrase or a string of characters produced by a wireless configuration software.
The most crucial requirement for every member of the wireless network is that they
all have the same WEP secret key. Although WEP uses a 64- or 128-bit key to encrypt
data, the actual effective key is smaller because a portion of the WEP key is transmitted
in clear text along with the data packet. This is especially true when using cards
276 COMPUTER NETWORKS
from multiple manufacturers. The shared of the first logical XOR operation. This is
secret key (the static portion of the key) possible because a specific WEP key (the
and the dynamic Initialization Vector (IV) same IV and shared secret key) will always
value are concatenated to form the WEP produce the same pseudo-random string,
key, which is the key used to encrypt the making it possible to regenerate the same
data packet. In order to give the WEP key pseudo-random string.
liveness, the transmitter wireless network
interface selects the Initialization Vector When the WEP was designed, it was
(IV), a dynamic 24-bit value that offers more thought to be sufficiently secure. However,
than 16 million possible keys at random. later research revealed an inherent
WEP keys must be live since every message weakness in the WEP mechanism. Since
needs to be encrypted using a unique key. then, a number of tools have been created
The duration of the mutual. to successfully crack the WEP shared secret
key, making it unsecure.
A data packet that reaches the link level
in a wireless network protected by WEP is
7.2.3.3. WEP Key Recovery
encrypted before being sent over the air.
The wireless network interface first selects A serious cryptographic flaw in the WEP
an IV value at random and concatenates it protocol makes it possible for an attacker
with the shared secret key to create the to obtain the shared secret key. This flaw
WEP Key (IV + secret key). This is how involves taking advantage of the fact that a
data packet encryption is carried out. The specific IV value generates weak WEP keys.
selection criteria for the wireless network The first bytes of the pseudo-random string
interface are not specified in the 802.11 may have some correlation with the WEP key
standard. As a result, the manufacturer when encryption is performed with a weak
determines how the wireless network WEP key. There is a 5-6 percent certainty
interface determines the IV value. When probability that each weak key will leak one
the WEP Key is prepared, the RC4 stream byte of the shared secret key. The attacker
cipher uses it to generate a pseudo-random needs to collect a significant number of
string that matches the length of the data raw WEP-protected data packets (roughly
packet. When the wireless network interface 5 million to 10 million packets) in order
performs a logical XOR operation between to increase the likelihood that the shared
the data packet and the pseudo-random secret key will be successfully cracked
string, encryption occurs. The link-level because the certainty level is low. This flaw
headers, IV value, and encrypted data packet was revealed in the paper “Weaknesses in
are combined and sent to the recipient to the Key Scheduling Algorithm in RC4” by
complete the WEP-protected data packet. Fluhrer, Mantin, and Shamir.
The procedures for encrypting messages
and decrypting a data packet protected by A number of WEP cracking tools have
WEP are the same. The recipient reads the already been available for some time.
IV value before repeating the encryption Wepcrack and Airsnort8 are a couple of the
process when decrypting a WEP-protected first tools that take advantage of the FMS
data packet. The data is decrypted by vulnerability. Other tools, such as brute-
executing a second logical XOR operation force attacks and optimizations for requiring
between the encrypted data packet and the fewer weak WEP-protected data packets,
pseudo-random string, canceling the effect have more capabilities. Among the tools are
WIRELESS NETWORK SECURITY 277
Dwepcrack, Aircrack, and Airjack. Although encryption, thereby addressing the weak
most of these tools are designed to operate key vulnerability. Reducing the number of
on UNIX/Linux, some have already been WEP keys by avoiding some IVs exacerbates
adapted for Windows OS. By passively the IV collision weakness.
capturing a significant amount of wireless
network traffic, attackers can potentially
7.2.3.5. Dynamic WEP
obtain the shared secret key by utilizing any
of these WEP cracking tools. The wireless An attacker must intercept a significant
network is completely vulnerable as soon number of data packets in order to decipher
as the attacker manages to get their hands the shared secret key before they can gain
on the shared secret key. physical access to a WEP-protected network.
It will be much more difficult to crack the
7.2.3.4. IV Collision secret key if the wireless network is able to
alter the shared secret key each time before
An additional method of getting into a the attacker receives enough data packets.
wireless network without the shared Therefore, regularly changing the shared
secret key is to passively capture a lot of secret key is a way to stop a potential
data packets, but this time the attacker secret key recovery without aggravating
is searching for IV collisions. When two any other vulnerability. Because the current
or more data packets are encrypted using WEP mechanism lacks an automatic key
the same IV value—and thus, the same rotation system that could support this
WEP key—this is known as an IV collision. solution, using it could be very problematic.
An attacker can remove encryption by
performing a logical XOR with the two To accomplish this, automatic key
encrypted data packets when an IV collision delivery and recurring rekeying can be
is detected. The XOR of the two data facilitated by utilizing the 802.1x protocol.
packets is the outcome. If the attacker has For user authentication and authorization,
sufficient time and employs analytical and the 802.1x protocol is responsible. When
statistical techniques, they may be able to a user is approved and authenticated, the
retrieve the contents of the two packets. authentication server generates the WEP
When more packets encrypted with the key..
exact same WEP key are intercepted and
used for the recovery, the effort and time 7.2.3.6. WPA (Wi-Fi Protected Access)
needed to recover the contents of the data
packets decrease. It should be noted that The Wi-Fi Alliance has released WPA as
recovering a pseudo-random string for a a solution while a final security protocol
specific WEP key is simple if this attack is being standardized. The next 802.11
is successful. After that, an attacker could wireless network security protocol standard,
store all of the pseudo-random strings in 802.11i, is the foundation of this security
a record and use them for network access, protocol. The three primary parts of WPA
packet forging, and decryption. are TKIP, 802.1x, and MIC. Every element
was created and put into place with a
Aware of the WEP key vulnerability, specific 802.11 vulnerability in mind.
some manufacturers of wireless interface
cards provide updates for their cards Significant security enhancements were
that prevent the use of weak IVs for put into place, like the 802.1x protocol
278 COMPUTER NETWORKS
for network access control and the key secret key is only used as a seed for creating
hierarchy that essentially neutralizes and additional keys; it is not used to access the
safeguards the WPA main key from attacks. cipher directly. This strategy reduces the
By using key hierarchy, WPA avoids using likelihood that any attack will reveal the
the main key for encryption directly. Rather, shared secret key. The session key is the
the main key (Pairwise Master Key) is used first key to be generated. The per-packet
to generate other temporal keys, like session key is generated using this key as a seed.
keys and group keys, and then the session
key is used recursively to generate the
7.2.3.8. Security Features of 802.11 Wireless
encryption key for each packet. In order
LANs per the Standard
to prevent replay attacks, the IV is also
extended from 24 to 48 bits in length and The three basic security services defined
given a new function as a sequence counter. by IEEE for the WLAN environment are
Using a specially created cryptographically as follows:
protected hashing function rather than the
CRC32 linear function improves packet • Authentication: A primary goal of
integrity protection. WEP was to provide a security
service to verify the identity of
communicating client stations.
7.2.3.7. TKIP (Temporal Key Integrity This provides access control to the
Protocol) network by denying access to client
This protocol fixes the majority of critical stations that cannot authenticate
vulnerabilities and is a direct replacement properly. This service addresses
for WEP. Maintaining compatibility with the question, “Are only authorized
current 802.11 hardware allowed for persons allowed to gain access to
software upgrades, which was part of its my network?”
intended purpose. The fact that each packet • Confidentiality: Confidentiality,
is generated by a per-packet key mixing or privacy, was a second goal of
function rather than by concatenating the WEP. It was developed to provide
IV and the shared secret key is one of the “privacy achieved by a wired
most significant improvements over WEP. network.” The intent was to prevent
information compromise from casual
Since the majority of cryptographic eavesdropping (passive attack).
features are hard-coded into the hardware This service, in general, addresses
of the wireless network interface, software the question, “Are only authorized
upgrades are not possible. Owing to these persons allowed to view my data?”
constraints, the WPA protocol makes use of
• Integrity: Another goal of WEP
certain hardcoded functions from the WEP
was a security service developed
protocol in order to maintain performance
to ensure that messages are not
and compatibility. Certain functions, such
modified in transit between the
as the output function of the RC4 stream
wireless clients and the access
cipher, are hardcoded into the wireless
point in an active attack. This
network interface and cannot be altered.
service addresses the question, “Is
TKIP reuses the RC4 stream cipher to
the data coming into or exiting the
circumvent this issue, but it modifies how
network trustworthy—has it been
the shared secret key is used. The shared
tampered with?”
WIRELESS NETWORK SECURITY 279
It is important to note that the standard did not address other
security services such as audit, authorization, and nonrepudiation.
The security services offered by 802.11 are described in greater
detail below.
7.2.3.9. Authentication
Open-system authentication and shared-key authentication are
the two ways that wireless users trying to connect to a wired Keyword
network can be “validated” according to the IEEE 802.11 standard. Cryptography
Cryptography underpins one method of authentication (shared-key is the process of
hiding or coding
authentication), but not the other. information so that
only the person
a message was
intended for can
read it.
7.2.3.10. Privacy
The 802.11 standard uses cryptographic
methods for the wireless interface to
support privacy (confidentiality). The RC4
symmetrickey stream cipher algorithm is also
used by the WEP cryptographic technique
for confidentiality in order to produce a
pseudo-random data sequence. To the data
to be transmitted, this “key stream” is
Figure 7.5. Shared-key Authentication Message simply added modulo 2 (exclusive-OR-ed).
Flow (Source: Medium.com, https://miro.medium. Data can be shielded from disclosure during
com/v2/resize:fit:640/format:webp/1*olfHTS- transmission over a wireless link by using
hoqEtiSDIXxxipA.png). the WEP technique. To secure traffic such
One cryptographic method of as Transmission Control Protocol/Internet
authentication is shared key authentication. Protocol (TCP/IP), Internet Packet Exchange
It is a straightforward “challenge-response” (IPX), and Hyper Text Transfer Protocol
system that asks clients if they are aware (HTTP), WEP is applied to all data above
of a shared secret. In this scheme, which the 802.11 WLAN layers.
is conceptually shown in Figure 7.5, the According to the 802.11 standard,
wireless client receives a random challenge WEP can only support shared keys with
generated by the access point. The challenge, a cryptographic key size of 40 bits.
also known as a “nonce” in security jargon, Numerous vendors do, however, provide
is encrypted by the client using a shared nonstandard WEP extensions that support
cryptographic key with the AP, and the key lengths ranging from 40 to 104 bits.
client then sends the result back to the A keysize of 128 bits is supported by at
AP. The client computes a result, which the least one vendor. For example, a 128-bit
AP decrypts. Access is granted only if the RC4 key can be created from a 104-bit
decrypted value matches the transmitted WEP key with a 24-bit Initialization Vector
random challenge. The RC4 stream cipher, (IV). Generally speaking, a cryptographic
created by MIT’s Ron Rivest, is the technique’s security is increased when the
algorithm used for both the cryptographic key size is increased, barring any other
computation and the creation of the 128- circumstances. Long keys may not, however,
bit challenge text. It should be mentioned always be able to boost security due to
that the just-described authentication poor implementations or designs. Studies
method lacks mutual authentication and have indicated that when considering robust
is a simple cryptographic technique. In designs and implementations, brute-force
other words, there is no guarantee that cryptanalysis (code breaking) is rendered
a client is interacting with a genuine AP impossible for key sizes larger than 80 bits.
and wireless network since the client does The keyspace of over 1026 possible keys for
not authenticate the AP. Not to mention, 80-bit keys is larger than what is currently
WIRELESS NETWORK SECURITY 281
possible to compute. The majority of WLAN deployments in use
today rely on 40-bit keys. Furthermore, regardless of keysize, recent
attacks have demonstrated that the WEP approach for privacy is
regrettably susceptible to some attacks.
7.2.3.11. Integrity
A method for guaranteeing data integrity for messages sent between
wireless clients and access points is also described in the IEEE
802.11 specification. The purpose of this security service was to
reject any messages that had been altered by a hostile party
“in the middle.” This method employs a basic encrypted Cyclic
Redundancy Check (CRC) methodology. A CRC-32, or frame check
sequence, is calculated on each payload before transmission, as
shown in the above diagram. The cipher-text message is then
obtained by encrypting the integrity-sealed packet using the RC4
key stream. Decryption and CRC recalculation are done on the
receiving end after the message has been received. The CRC
calculated with the original message and the one computed at
the receiving end are compared. The packet would be rejected if Remember
the CRCs do not equal, indicating that the message was “received IEEE 802.11 is
in error,” which would be an indication of an integrity violation used in most
caused by an active message spoofer. Unfortunately, regardless of home and office
key size, the 802.11 integrity is susceptible to some attacks, just networks to
like the privacy service. In conclusion, the basic weakness in the allow laptops,
printers,
WEP integrity scheme lies in the fact that the straightforward CRC smartphones, and
is not a “cryptographically secure” mechanism. other devices
to communicate
Unfortunately, key management—the life cycle handling of with each other
cryptographic keys and related materials—is not covered by the and access the
IEEE 802.11 specification. Thus, those using WLANs are responsible Internet without
connecting wires.
for creating, distributing, storing, loading, escrowing, archiving,
auditing, and destroying the content. The 802.11 network’s
users are primarily responsible for managing their keys, which
is arguably the most important component of any cryptography
system. Consequently, the WLAN environment may be exposed
to numerous vulnerabilities.
Weak keys (all zeros, all ones, based on easily guessed
passwords, or other similar trivial patterns) and non-unique,
factory-default, and never-changing WEP keys are some examples
of these vulnerabilities. WEP-secured WLANs also do not scale well
since key management was not addressed in the original 802.11
specification, leaving the key distribution unresolved. In a large
WLAN environment, the task is daunting if an enterprise realizes
it needs to frequently change keys and make them random. As an
282 COMPUTER NETWORKS
illustration, a sizable campus might have which allows multiple users to potentially
up to 15,000 APs. It is a significant task share the same key for extended periods
to generate, distribute, load, and manage of time. The WEP protocol’s absence of
keys in an environment this size. any important management clauses is
partially to blame for this. The key could
be compromised along with all the other
7.2.3.12. Problems with the IEEE 802.11
computers that share it if a laptop or other
Standard Security
computer were lost or stolen. Furthermore,
The 802.11 WLAN standard’s standardized if every station uses the same key, an
security has this vulnerability. WLANs eavesdropper may have quick access to
based on 802.11 employ the WEP protocol, a lot of traffic for analytic attacks like the
as previously mentioned. In response, WEP ones shown in numbers 2 and 3 below.
protects traffic using the RC4 cryptographic
The IV in WEP is a 24-bit field that
algorithm and a variable-length key. Once
is transmitted in a message’s clear text
more, 40-bit WEP cryptographic keys are
section. When used for cryptography, this
supported by the 802.11 standard. However,
24-bit string—which is used to start the key
some suppliers have used 128-bit or even
stream produced by the RC4 algorithm—is
104-bit keys in their products. The real
a comparatively small field. When an IV is
key used in the RC4 algorithm is 152 bits
reused, it generates identical key streams
for the 128-bit WEP key after the 24-bit
that protect data, and in a busy network,
IV is added. Noteworthy is the fact that
its short length ensures that these streams
some vendors generate keys based on a
will repeat after a short while. Furthermore,
user’s keystrokes; when done correctly,
the 802.11 standard is silent on the setting
with appropriate random processes, this
or modification of IVs, so different wireless
can yield a strong WEP key. As a result,
NICs from the same vendor might produce
the effective key size is usually smaller
identical IV sequences or some might even
than with other vendors who base WEP
employ a fixed IV. Because of this, hackers
keys on user-selected passwords. Security
are able to capture network activity, identify
flaws that allow malevolent users to breach
the key stream, and utilize it to crack the
WLAN security have been found by multiple
ciphertext.
teams of computer security experts. These
comprise statistical analysis-based passive The RC4 encryption key contains the
attacks to decrypt traffic, active attacks IV. Due to a flaw in the RC4 key schedule
to introduce new traffic from unapproved and the fact that an eavesdropper is aware
mobile stations (i.e., based on plain text of the first 24 bits of each packet key, a
that is known), ongoing attempts to decrypt successful analytic attack can recover the
traffic (i.e., dictionary-building attacks), and key after only a small amount of traffic
deceiving the access point attacks. Once has been intercepted and examined. The
sufficient traffic on a busy network has been attack script and open source code for this
analyzed, the dictionary-building attack can attack are accessible to the general public.
be launched. Cryptographic integrity is not protected
by WEP. To verify packet integrity and
Security problems with WEP include
acknowledge packets with the correct
the following:
checksum, the 802.11 MAC protocol employs
A well-known security flaw in wireless a noncryptographic Cyclic Redundancy
networks is the use of static WEP keys, Check (CRC).
WIRELESS NETWORK SECURITY 283
It is risky and frequently results in vulnerabilities when noncryptographic checksums
and stream ciphers are combined, as is the case with WEP. By methodically altering
the packet, CRC sending it to the AP, and noting whether the packet is acknowledged,
the attacker can currently decrypt any packet. Because of the potential for interactions
with other protocol levels that could reveal cipher details, it is now deemed dangerous
to design encryption protocols without cryptographic integrity protection. These attacks
are frequently subtle.
Keep in mind that just one of the four issues mentioned above is dependent on a
cryptographic algorithmic flaw. Therefore, using a more powerful stream cipher would
not solve these issues. For instance, the third issue on the above list results from an
implementation flaw in the RC4 stream cipher that is made public by a badly thought
out protocol. Table 7.2 provides a summary of some of the issues with WEP and 802.11
WLAN security.
Table 7.2. Key Problems with Existing 802.11 Wireless LAN Security
7. Packet integrity is CRC32 and other linear block codes are inadequate
poor. for providing cryptographic integrity. Message
modification is possible. Linear codes are inadequate
for the protection against advertent attacks on data
integrity. Cryptographic protection is required to
prevent deliberate attacks. Use of noncryptographic
protocols often facilitates attacks against the
cryptography.
8. No user Only the device is authenticated. A device that is
authentication occurs. stolen can access the network.
9. Authentication Identity-based systems are highly vulnerable
is not enabled; particularly in a wireless system because signals
only simple SSID can be more easily intercepted.
identification occurs.
10. Device One-way challenge-response authentication is
authentication is subject to “man-inthe-middle” attacks. Mutual
simple shared-key authentication is required to provide verification
challenge-response. that users and the network are legitimate.
11.The client does not The client needs to authenticate the AP to ensure
authenticate the AP. that it is legitimate and prevent the introduction of
rogue APs.
signals, this is known as jamming. Emissions into company networks and systems by
from microwave ovens and cordless phones connecting to them via an untrusted
can also unintentionally cause jamming. network. Usually, users must gain access
Communication breaks down as a result of to resources that are classified as either
jamming because reputable wireless signals public or private by their organizations.
are unable to interact with the network. Transport Layer Security (TLS), the Internet
Another source of a DoS is non-malicious Engineering Task Force-standardized
users. For example, a user may download version of Secure Sockets Layer (SSL), is
large files and inadvertently monopolize a one application layer security protocol that
wireless signal, thereby preventing other agencies might want to think about utilizing
users from accessing the network. Agency to protect their public resources. In the
security policies should therefore restrict majority of agencies, though, this is not
the kinds and volumes of data that users required because the information is already
can download via wireless networks. available to the public. Agencies should
think about securing their connections to
private resources by utilizing a VPN solution,
Other Security Risks as this will help stop eavesdropping and
More users are looking for ways to connect unauthorized access.
remotely to the networks within their own Finally, social engineering and dumpster
organizations as a result of the widespread diving are issues as well, just like with any
use of wireless devices. The use of network. When preparing to implement a
untrusted, third-party networks is one such wireless network, an organization should
technique. For instance, wireless networks take network security into account from
are frequently available in conference every angle.
centers, enabling attendees to connect to
the Internet and then their own companies.
Airports, hotels, and even some coffee shops 7.2.5. Emerging Security
are starting to provide their patrons with Standards and Technologies
802.11-based publicly accessible wireless
networks. For an extra layer of security, Standards organizations have reacted to
these networks even offer VPN capabilities. the uproar over vulnerabilities in 802.11
WLANs, much like the security industry.
These untrusted public networks The IEEE and the Internet Engineering Task
present three main risks: 1) they are open to Force (IETF) are both active. Three distinct
the public and can therefore be accessed by projects are being worked on by the IEEE
anyone, including malevolent users; 2) they to enhance WLAN security. In the first,
act as a bridge to the user’s own network, as a long-term security solution, the IEEE
making it possible for anyone on the public 802.11 Task Group i (TGi) has suggested
network to attack or gain access to the substantial changes to the current IEEE
bridged network; and 3) they use high- 802.11 standard. On the basis of the
gain antennas to enhance reception and recently published Advanced Encryption
expand coverage area, making it easier for Standard (AES), the TGi is defining new
malevolent users to intercept user signals. ciphers. Although it will require new
Unless their organizations take action to hardware and protocol modifications, the
safeguard both their users and themselves, AES-based solution will offer a very reliable
users may introduce vulnerabilities solution in the future. TGi’s current design
WIRELESS NETWORK SECURITY 289
requirements include the ability to detect
replay attacks and prevent forgeries, two Did you know?
of the most common issues with WEP. IEEE 802.11i enhances IEEE 802.11-1999 by providing
a Robust Security Network (RSN) with two new
The TGi’s temporary fix for WEP’s protocols: the four-way handshake and the group key
issues, WiFi Protected Access (WPA), is the handshake. These utilize the authentication services
second effort to enhance WLAN security. and port access control described in IEEE 802.1X to
To solve the issues without needing to establish and change the appropriate cryptographic
keys.
modify hardware, the team is developing
the Temporal Key Integrity Protocol (TKIP),
which will only require firmware and IEEE 802.1X can be used with a backend
software driver changes. The third initiative authentication server or fully implemented
from IEEE is the June 2001 approval of IEEE on the AP (by supporting one or more
802.1X-2001, a new standard that provides EAP methods within the AP). Diameter,
a generic framework for port-based network Kerberos, RADIUS, and other authentication
access control and key distribution. IEEE protocols are supported by the IEEE 802.1X
802.1X defines the encapsulation of EAP standard. RADIUS provides authentication,
(defined in RFC 2284) over IEEE 802 media, authorization, and accounting for Network
allowing mutual authentication between an Access Server (NAS) devices, such as dial-
AP and a station. The IEEE 802.11i draft up, xDSL, and 802.11; it is detailed in
standard specifies extra capabilities needed RFC 28652869 and RFC 3162. The 802.1X
for the safe implementation of IEEE 802.1X standard can be implemented using various
on 802.11 networks because IEEE 802.1X EAP types, such as EAP-TLS (defined in
was designed primarily for use with IEEE RFC 2716, supporting fast reconnect, mutual
802 LANs and not for use with WLANS. authentication, and key management via
Using an EAP method that supports mutual certificate authentication) for Ethernet
authentication, key management, and LANs and EAP-MD5 (defined in RFC 2284,
dictionary attack resistance are a few of supporting only one-way authentication
these requirements. Furthermore, 802.11i without key exchange). The IETF is
specifies a “four way” key management currently working on a new generation of
handshake that is used to confirm that EAP techniques that will address problems
the station has been authenticated to both with wireless authentication and key
the AP and, if one is present, a back-end management. Additional security features
authentication server. This handshake is like identity protection, secure ciphersuite
also used with the TKIP and AES ciphers. negotiation, cryptographic protection of
Therefore, it is crucial that IEEE 802.1X the EAP conversation, tunneling of other
implementations on 802.11 implement both EAP methods, etc., are supported by these
the fundamental IEEE 802.1X standard and methods. The reader is encouraged to visit
the IEEE 802.11i enhancements in order to the IEEE 802.11 standards website for the
provide sufficient security. most recent updates on each specification’s
status.
Ad hoc networks are a relatively new wireless communication paradigm in which access
points and base stations are not part of a fixed infrastructure. Ad hoc networks rely on a
system of mobile routers connected by wireless links that allow devices to communicate
with one another, allowing devices to maintain random network configurations created
“on the fly.” In an ad hoc network, devices manage and exchange resources in addition
to controlling the network configuration. Ad hoc networks and peer-to-peer (P2P)
networks are comparable in that they both rely on decentralized networking, where
data is kept locally at the end user’s location as opposed to in a centralized database.
Ad hoc networks, on the other hand, are different from P2P networks in that the former
rely on the device hardware to request and share information, while the latter rely on
a routing mechanism to direct information queries. Ad hoc networks enable devices
to connect to wireless personal area networks (PANs) and use wireless applications,
like file sharing and address book synchronization. These networks can be expanded
to include network and Internet access by combining them with other technologies.
When connected to a Bluetooth network with another device that is capable of 802.11,
Bluetooth devices—which normally do not have access to network resources—can
establish a connection within the corporate network and access the Internet.
Characteristic Description
Physical Layer Frequency Hopping Spread Spectrum (FHSS).
Frequency Band 2.4 – 2.4835 GHz (ISM band).
Hop Frequency 1 ,600 hops/sec.
Data Rate 1 Mbps (raw). Higher bit rates are anticipated.
Data and Network Three modes of security (none, link-level, and service level), two levels
Security of device trust, and three levels of service security. Stream encryption for
confidentiality, challenge-response for authentication. PIN-derived keys and
limited management.
Operating Range About 10 meters (30 feet); can be extended to 100 meters.
Throughput Up to approximately 720 kbps.
Positive Aspects No wires and cables for many interfaces. Ability to penetrate walls and
other obstacles. Costs are decreasing with a $5 cost projected. Low power
and minimal hardware.
Negative Aspects Possibility for interference with other ISM band technologies.
operating range of up to 100 meters (m) and run at 100 milliwatts (mW). The lowest
power Class 3 devices operate at 1 mW and have an operating range of 1/10 meter to
10 meters. Class 2 devices operate at 2.5 mW and have an operating range of up to 10
meters. Table 7.4 provides an overview of these three operating power levels.
Table 7.4. Device Classes of Power Management
In Figure 7.7, the three Bluetooth ranges are shown. The shortest range, as
demonstrated, might be useful for tasks like changing out cables (e.g., mouse or
keyboard), syncing files, or exchanging business cards. Like with the data rates, it is
expected that even longer ranges will be attained in the future. The high-powered range
can travel up to 100 m, or roughly 300 feet.
7.3.2. Benefits
Users can benefit from Bluetooth in five main ways. Bluetooth is becoming increasingly
appealing due to its ad hoc untethered communication method, which can lead to lower
costs and more efficiency. Both home users and business users in large organizations
find the efficiencies and cost savings appealing.
Benefits of Bluetooth include—
• Cable replacement: For a range of interconnections, Bluetooth technology takes
the place of cables. These consist of those of auxiliary equipment (i.e., USB at
12 Mbps (USB 1.1) up to 480 Mbps (USB 2.0); printers and modems, typically
WIRELESS NETWORK SECURITY 295
at 4 Mbps; wireless headsets and would turn on a cell phone or any
microphones that interface with other gadget that could establish
PCs or mobile phones; mouse and a network connection. After the
keyboard computer connections. person logs on, the laptop would
• Ease of file sharing: File sharing then automatically start a network
between Bluetooth-enabled devices join by using the phone as a modem
is made possible via Bluetooth. For and send the emails.
instance, laptops that are Bluetooth • Internet connectivity: Many
compatible during a meeting allow different kinds of devices and apps
participants to share files. Another support Bluetooth. Mobile phones,
example is the use of a mobile PDAs, laptops, desktop computers,
phone with Bluetooth compatibility and fixed telephones are a few
as a wireless modem for laptops. of these gadgets. When these
The laptop communicates with the technologies and devices work
mobile phone through Bluetooth, together to leverage each other’s
and the phone connects to a capabilities, internet connectivity
network. This allows the laptop to is made possible. For instance,
have full networking functionality a laptop can ask a smartphone
without requiring an electrical to establish a dial-up connection
interface to connect to the mobile via Bluetooth, and the laptop can
device. use that connection to access the
• Wireless synchronization: Internet.
Automatic wireless synchronization Office equipment is anticipated to include
with other Bluetooth-capable Bluetooth built-in (e.g., laptops, printers,
devices is made possible by fax machines, and PCs), communication
Bluetooth. For instance, PDAs, appliances (e.g., pagers, headsets, cell
laptops, mobile phones, and other phones, and handsets), as well as household
devices can synchronize the private appliances (e.g., microwave ovens, DVD
data found in address books and players, cameras, and refrigerators). In
date books. addition, Bluetooth finds use in smart
• Automated wireless applications: homes, banking, electronic payment systems,
Automatic wireless application vending machines, wireless conference
functions are suppor ted by rooms and offices, in-car communications,
Bluetooth. In contrast to local and parking.
synchronization, automatic wireless
applications communicate with the Did you know?
LAN and Internet. A person working The development of the “short-link” radio technology,
offline on emails, for instance, later named Bluetooth, was initiated in 1989 by Nils
might be traveling or otherwise Rydbeck, CTO at Ericsson Mobile in Lund, Sweden.
not within their usual service The purpose was to develop wireless headsets,
according to two inventions by Johan Ullman, SE
area. After returning to a service
8902098-6, issued 1989-06-12 and SE 9202239,
location, the person will email issued 1992-07-24.
the files that are queued in the
laptop’s inbox (i.e., upon landing),
296 COMPUTER NETWORKS
organizations to keep an eye on and record DoS attacks prevent authorized users from
what. accessing network applications and system
resources. Aside from the standard DoS
attacks (e.g., Signal jamming attacks (such
7.3.3.2. Loss of Integrity
as flooding techniques) can also target
When users’ or organizations’ data is Bluetooth devices, LANs, and Internet
tainted, there are violations of integrity. The services. Bluetooth devices are susceptible to
immediate result is a compromised network, interference because they share bandwidth
much like in the case of a confidentiality with cordless phones, microwave ovens, and
or disclosure threat. Beyond this, though, other wireless networks. Malicious users
are threats to network integrity that have the ability to obstruct the information
include information being added, altered, flow (i.e., employing devices that broadcast
or deleted and then transmitted through in the 2 GHz ISM band to skew the network’s
the network without the user’s or network information and interfere with the routing
administrator’s knowledge. Data on user protocol. Ad hoc network devices are not
devices and files on the network are both able to negotiate the dynamic topologies
susceptible to corruption. For instance, a of the network when the routing protocol
malevolent user may use a PDA or other is disrupted. Jamming may occur more
untrusted device to access the address book frequently for remote users than for on-
of a different PDA or laptop. But unlike a site users. The same interference that users
disclosure threat, where information would face in the office must also be dealt with
only be monitored, the malicious user by remote users. Additionally, because the
changes the contact details without the remote environment is uncontrolled, it is
owner’s knowledge or even erases them more probable that distant devices will be
entirely. Such attacks may cause the agency near other devices (e.g., other ISM band and
(or user) to lose faith in its data and system Bluetooth devices) that are purposefully or.
if they go unnoticed. It is recommended that
An attack due to battery exhaustion is
users confirm that their Bluetooth product
another risk connected to ad hoc devices.
prohibits automatic data synchronization in
This attack uses a device’s battery to try
order to stop any information from being
and disable it. The device receives frequent
changed without the user’s consent.
requests from a malevolent user requesting
either the creation of a network or data
7.3.3.3. Loss of Availability transfers (presuming the user is a member
of the network topology). This kind of attack
Network availability and “usability upon doesn’t jeopardize network security, but in
demand” for authorized users and devices the end, it keeps the user from accessing
are lost as a result of DoS and DDoS attacks. the network since it breaks the device.
ROLE MODEL
Norman Manuel Abramson: An American engineer and computer scientist, most known
for developing the ALOHA net system for wireless computer communication.
BIOGRAPHY
Norman Abramson, the leader of a group of scientists and engineers who pioneered
the development of wireless computer networks, passed away on December 1 at his
residence in San Francisco. He was 88.
The cause of his passing was skin cancer that had spread to his lungs, as reported
by his son, Mark.
Professor Abramson’s project at the University of Hawaii was initially intended
to transmit data to schools on the distant Hawaiian islands through a radio channel.
However, the solution he and his team developed in the late 1960s and early 1970s
would prove to be widely applicable; some of their technology is still utilized in today’s
smartphones, satellites, and home WiFi networks.
The technology they invented enabled numerous digital devices to exchange data
over a shared radio channel. It was a straightforward approach that did not necessitate
intricate scheduling of when each data packet would be transmitted. If a data packet was
not received, it was simply retransmitted. This method deviated from telecommunications
practices at the time, but it was effective.
“It was an incredibly bold idea, truly innovative engineering,” remarked Vinton
Cerf, a computer scientist at Google and the co-author, alongside Robert Kahn, of the
technical standards for connecting computer networks on the internet.
The wireless network in Hawaii, which commenced operations in 1971, was named
ALOHA net, incorporating the Hawaiian greeting or farewell. It served as a smaller,
wireless counterpart to the more renowned ARPA net, the precursor to the internet, which
enabled university researchers to communicate over a network and send messages via
landlines. The ARPA net was overseen by the Pentagon’s Advanced Research Projects
Agency, which also supported the ALOHA net.
300 COMPUTER NETWORKS
“The early wireless work in Hawaii is vastly underappreciated,” said Marc Weber,
an internet historian at the Computer History Museum in Mountain View, Calif. “Every
modern form of wireless data networking, from WiFi to your cellphone, goes back to
the ALOHA net.”
Professor Abramson has been called the father of wireless networking. But it was a
shared paternity. The project included graduate students and several faculty members,
notably Frank Kuo, a former Bell Labs scientist who came to the University of Hawaii
in 1966, the same year Professor Abramson arrived.
His deepest expertise was in communication theory, the subject of his Ph.D. thesis
at Stanford University. The fundamental design ideas behind ALOHA net were his. In
a 2018 oral history interview for the Computer History Museum, Professor Kuo recalled,
“Norm was the theory and I was the implementer, and so we worked together pretty
well.”
ALOHAnet owed a lot to surfing. Professor Abramson was presenting a paper at
an academic conference in Tokyo in the days when flights from San Francisco to Tokyo
had to stop midway in Honolulu. Professor Abramson, who was raised in Boston, had
not been to Hawaii before and decided to spend a few days there on the way home.
He rented a surfboard. “I got on, I learned how to surf, and I said, Boy, I could
stand some of this,” he recalled in 2013 in an oral history interview with the Computer
History Museum.
Within a year, after the University of Hawaii offered him a tenured professorship,
he and his family moved to Hawaii. “My father was really wrapped up in his work, but
he surfed nearly every day,” Mark Abramson said.
That the ALOHAnet technology became so widely used was partly because Professor
Abramson and his team had shared it freely and welcomed other scientists to Hawaii.
“We had done no patenting, and ALOHA was published in scientific papers,” putting
their work in the public domain, Professor Abramson said in the oral history, adding:
“And that was fine with me. I was too busy surfing to worry about that sort of thing.”
Norman Manuel Abramson was born in Boston on April 1, 1932, to Edward and
Esther Abramson. His father was a commercial photographer, his mother a homemaker.
Norman and his sister, Harriet, grew up in the Dorchester neighborhood, home to mostly
Jewish immigrants, like his parents, at the time. His father was from Lithuania, his
mother from Ukraine.
Norman was educated in Boston’s public schools, at the elite Boston Latin School
and the English High School, where he excelled in math and science. He went on to
Harvard University, where he took a course taught by Howard Aiken, a mathematician
and early pioneer in computing. It was a computer course long before the discipline of
computer science existed, and he enjoyed his first taste of programming.
WIRELESS NETWORK SECURITY 301
SUMMARY
• A wireless network is one that allows computers and other devices to communicate
using radio signal frequency. It’s also referred to as a WLAN or WiFi network
sometimes.
• A wireless LAN, or wireless local area network, consists of two or more computers
linked to the same radio frequency. In contrast, a wired LAN requires each
computer to be physically connected to the server’s network switch or hub via
an Ethernet cable.
• Physical Ethernet cables are used to connect the desktop server to the DSL
modem, switch, and router. But the clients don’t need any cabling.
• Since their beginning, wireless networks have been categorized into ad hoc
networks and infrastructure networks, which encompass LANs. The term “ad
hoc” in Latin means “for this purpose.” Ad hoc networks are designed for
specific purposes, often created quickly and for a temporary use.
• A minor backlash appeared in popular culture due to the rapid rise to fame of
the personal digital assistant and its early associations as a status symbol for the
business class.
• A wireless local area network, or WLAN, consists of two or more computers
connected to the same radio frequency. In contrast, a wired LAN has computers
physically connected to the server’s network switch or hub via Ethernet cables.
• A WLAN comprises a wireless station and an access point. A laptop or notebook
PC with a wireless network interface card (NIC) is commonly known as a station
or client.
REVIEW QUESTIONS
1. What are Ad Hoc Networks?
2. How are Personal Digital Assistants (PDAs) relevant in wireless networking?
3. What are some examples of Emerging Wireless Technologies?
4. What components constitute Wireless LANs?
5. How is the security of 802.11 Wireless LANs ensured?
REFERENCES
1. Andy, D., (2002). Emerging Technology: Wireless LAN Standards. NetworkMagazine.
com. http://networkmagazine.com/article/NMG20020206S0006 (accessed on 05
April 2024).
2. Bajwa, M. I., (2004) Wireless Network Security. Directed Study Project, Strayer
University, Herndon.
3. Vacca, J. R. (2013). Computer and Information Security Handbook (2nd ed.). Morgan
Kaufmann.
4. Rappaport, T. S. (2002). Wireless Communications: Principles and Practice (2nd
ed.). Prentice Hall.
5. Stallings, W. (2017). Wireless Communications & Networks (2nd ed.). Pearson.
304 COMPUTER NETWORKS
6. Russell, D. L., Ganguly, A., & Liscano, R. (2016). Wireless Security: Models, Threats,
and Solutions. CRC Press.
7. Pirzada, A. A., & McDonald, C. (2007). Network Security: A Beginner’s Guide (2nd
ed.). McGraw-Hill.
Index