Introduction To Computer Network: Dr. Babasaheb Ambedkar Open University
Introduction To Computer Network: Dr. Babasaheb Ambedkar Open University
BCA-301
BLOCK 2:
LAN, WAN AND TCP/IP
Author
Prof. Garima Mazumdar
Language Editor
Ms. Katherine Abraham
Acknowledgment
Every attempt has been made to trace the copyright holders of material reproduced
in this book. Should an infringement have occurred, we apologize for the same and
will be pleased to make necessary correction/amendment in future edition of this
book.
The content is developed by taking reference of online and print publications that
are mentioned in Bibliography. The content developed represents the breadth of
research excellence in this multidisciplinary academic field. Some of the
information, illustrations and examples are taken "as is" and as available in the
references mentioned in Bibliography for academic purpose and better
understanding by learner.'
ROLE OF SELF INSTRUCTIONAL MATERIAL IN DISTANCE LEARNING
UNIT 2 STANDARDS
UNIT 1
LAN AND WAN - I 03
UNIT 2
LAN AND WAN – II 29
UNIT 3
TCP/IP 42
BLOCK 2: LAN, WAN AND TCP/IP
Block Introduction
In this block the whole content has been divided into three units .The first
unit covers the topic LAN and WAN-I, whereas the second unit covers the topic
LAN and WAN - II, under both first and second unit the whole content under
LAN and WAN has been divided under two units and has been discussed in very
detail, whereas the third unit covers the topic TCP/IP which has even been
discussed in very detail. The writer has tried his best to explain the topics, he has
kept the language of the book very simple in order to make it more
understandable.
This block has been written so that those who need information quickly are
able to find what they need, and those who wish to learn more advanced topics
can read deeper into each unit and further into the chapters.
The book begins with an overview of writer, discussing about the LAN
AND WAN.
It is possible to read this block of the book like any other book (from
beginning to end). Each chapter begins with an introduction about the block and
further discussion of the contents it contains. As you get further into a chapter you
will learn more about LAN AND WAN, their role and capabilities, but often you
will be able to head directly to the topic you wish to learn about.
We will also use diagrams where appropriate, and where we believe readers
may find it helpful we will discuss some related theory, including reference to
certain documents that you will be able to get from the books incase you need to
study more about the topics.
Block Objective
After learning this block, you will be able to understand:
1
LAN, Repeater Operation
WAN and
TCP/IP SPP over IP over GPRS and IP address
Block Structure
Unit1: LAN and WAN - I
Unit 3: TCP/IP
2
UNIT 1: LAN AND WAN - I
Unit Structure
1.0 Learning Objectives
1.1 Introduction
1.5.1 HDLC
1.5.2 PPP
1.6.1 WAN
3
LAN, 1.11 Glossary
WAN and
1.12 Assignment
TCP/IP
1.13 Activities
LAN devices
1.1 Introduction
When we talk about a Wide Area Network (WAN), we are describing a
network of computers or other types of networks that make up abroad area
network. We are describing cross-metro, interstate, regional or national networks.
A great example of awell-known WAN is the open Internet. Therefore, it is
obvious that in order to function, all WANs use protocols. WANs connect LANs
and other types of networks together, using protocols on a specific level. Network
protocols such as TCP/IP deliver the transport and addressing portions of the link.
However, protocols like Packet over SONET/SDH, MPLS, ATM and Frame relay
can be used often by service providers to bring about the links used by WANs. An
important early WAN was X.25 which is often considered to be the initial Frame
Relay protocol. Many of its underlying protocols and functions are still used today
in Frame Relay networks.
4
LAN and
1.2 LAN Protocols
WAN - I
The figure given below displays the implementation of basic layout of
Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and Fiber Distributed Data
Interface (FDDI).
1.2.1 LAN
A LAN is a high-speed data network that covers a relatively small
geographic area. It typically connects workstations, personal computers, printers,
servers and other devices. LANs offer computer users many advantages, including
shared access to devices and applications, file exchange between connected user
and communication between users‘ via electronic mail and other applications.
5
LAN,
WAN and
TCP/IP
Fig. 3.2: Popular LAN protocols mapped to the OSI reference model
a. LAN c. MAN
b. WAN d. SAN
6
data. In most cases, a collision between the two devices will not repeat. Because LAN and
of this type of network contention, the busier a network becomes, the more WAN - I
collisions occur. This is why performance of ethernetdegrades rapidly as the
number of devices on a single network increases.
7
LAN, However, full-duplex operation does increase the throughput of most
WAN and applications because the network media is no longer shared. Two devices on a
TCP/IP full-duplex connection can send dataas soon as it is ready.
Token-passing networks such as Token Ring can also benefit from network
switches. In large networks, the delay between turns to transmit may be
significant because the token is passed around the network.
a. Collision c. LAN
b. Accident
8
1.4 LAN Topologies LAN and
WAN - I
LAN topologies define the manner in which network devices are organized.
Four common LAN topologies exist: bus, ring, star and tree. These topologies are
logical architectures, but the actual devices need not be physically organized in
these configurations. Logical bus and ring topologies, for example, are commonly
organized physically as a star.
9
LAN, A star topology is a LAN architecture in which the endpoints on a network
WAN and are connected to a common central hub or switch by dedicated links. Logical bus
TCP/IP and ring topologies are often implemented physically in a star topology.
10
LAN and
WAN - I
A hub is a physical layer device that connects multiple user stations, each
viaa dedicated cable. Electrical interconnections are established inside the hub.
Hubs are used to create a physical star network while maintaining the logical bus
or ring configuration of the LAN. In some respects, a hub functions as a multiport
repeater.
11
LAN,
WAN and Check your progress 3
TCP/IP 1. LAN __________define the manner in which network devices are
organized.
a. Topologies c. Design
b. Architecture d. Method
1.5.1 HDLC
HDLC stands for High-Level Data Link Control protocol. Like the two
other WAN protocols mentioned in this article, HDLC is a Layer 2 protocol.
HDLC is a simple protocol used to connect serial devices point-to-point. For
example, you have point-to-point leased line connecting two locations, in two
different cities.
12
1.5.2 PPP LAN and
WAN - I
You may have heard of the Point to Point Protocol (PPP) because it is used
for most every dial up connection to the Internet. PPP is documented in RFC
1661. PPP is based on HDLC and is very similar. Both work well to connect
point-to-point leased lines.
Link quality management monitors the quality of the dial-up link and the
number of errors taken. It can bring the link down if the link is receiving too
many errors.
Multilink can bring up multiple PPP dialup links and bond them together to
function as one.
Authentication is supported with PAP and CHAP. These protocols take your
username and password to ensure that you are allowed access to the network
into which you are dialling.
To change from HDLC to PPP, on a Cisco router, use the encapsulation ppp
command.
13
LAN,
WAN and
1.6 Frame-Relay
TCP/IP Frame Relay is a Layer 2 protocol and commonly known as a service from
carriers. Frame relay creates a private network through a carrier‘s network. This is
done with permanent virtual circuits (PVC). PVC is a connection from one site to
another site through the carrier‘s network. This is really just a configuration entry
that a carrier makes on their frame relay switches.
It has the ability to have a single circuit that connects to the ―frame relay
cloud‖ and gain access to all other sites (as long as you have PVCs). As the
number of locations increases, you would save more and more money
because you do not need as many circuits as you would if you were trying to
fully- mesh your network with point-to-point leased lines.
By using the PVCs, you can design your WAN whichever way you want.
This means that, you define what sites have direct connections to other sites
and you only pay the small monthly PVC fee for each connection.
Some other terms concerning frame relay that you should know:
CIR - committed information rate: This is the amount bandwidth you pay to
guarantee which you receive, on each PVC. Generally, you have much less
CIR than you have port speed.
DE - discard eligible: Traffic marked DE (that was above your CIR) can be
discarded by the frame-relay network if there is congestion.
14
FECN & BECN - forward explicit congestion notification and backward LAN and
explicit congestion notification: These are bits set inside LMI packets to WAN - I
alert the frame-relay devices that there is congestion in the network.
1.6.1 WAN
A WAN is a data communications network that covers a relatively broad
geographic areaand that often uses transmission facilities provided by common
carriers, such as telephone companies. WAN technologies generally function at
the lower three layers of the OSI reference model: the physical layer, the data link
layer and the network layer. Figure 3.8 illustrates the relationship between the
common WAN technologies and the OSI model.
Fig. 3.8: WAN technologies operate at the lowest levels of the OSI model
15
LAN, 1.6.2 Protocol Structure
WAN and
TCP/IP The key WAN protocols are listed as follows:
Broadband
DOCSIS: Data Over Cable Service Interface Specification
Access
16
xDSL: Digital Subscriber Line Technologies (DSL, IDSL, LAN and
WAN - I
ADSL, HDSL, SDSL, VDSL, G.Lite)
17
LAN,
WAN and X.75: Signalling system used to connect packet switched
TCP/IP networks (X.25).
A virtual private network (VPN) riding on the public switched data network
(PSDN) is often used by organizations for their private and secured
communications. VPN uses encryption and other techniques to make it
appear that the organisation has a dedicated network while making use of
the shared infrastructure of the WAN.
WAN technologies and protocols are mostly data link layer (layer 2)
protocols, which are defined by many organizations over time. The key
organizations in this space are IETF for PPP, ITU-T for ATM, Frame Relay,
ISO for X.25 and SONET etc.
18
LAN and
These circuits are generally priced based on bandwidth required and distance
WAN - I
between the two connected points.
Point-to-point links are generally more expensive than shared services such
as Frame Relay. Figure 3-9 illustrates a typical point-to-point link through a
WAN.
Fig. 3.9: A Typical point-to-point link operates through a WAN to a remote network
b. LAN
When the two networks are connected and authenticated, they can transfer
data. When the data transmission is complete, the call can be terminated. Figure
3.10 illustrates an example of this type of circuit.
19
LAN,
WAN and
TCP/IP
The carrier can then create virtual circuits between customers‘ sites by
which packets of dataare delivered from one to the other through the network. The
section of the carrier‘s network that is shared is often referred to as a cloud.
20
LAN and
WAN - I
b. LAN
Data transfer involves transmitting databetween the devices over the virtual
circuit and the circuit termination phase involves tearing down the virtual circuit
21
LAN, between the source and destination devices. SVCs are used in situations in which
WAN and data transmission between devices is sporadic, largely because SVCs increase
TCP/IP bandwidth used due to the circuit establishment and termination phases, but they
decrease the cost associated with constant virtual circuit availability.
22
WAN environments that are used in WAN implementations include routers, ATM LAN and
WAN - I
switches and multiplexers.
Fig. 3.12: Two routers at remote ends of a WAN can be connected by WAN switches
Access Server
An access serveractsas a concentration point for dial-in and dial-out
connections. Figure 3.13 illustrates an access server concentrating dial-out
connections into a WAN.
23
LAN, Modem
WAN and
A modem is a device that interprets digital and analog signals, enabling data
TCP/IP
to be transmitted over voice-grade telephone lines. At the source, digital signals
are converted to a form suitable for transmission over analog communication
facilities. At the destination, these analog signals are returned to their digital form.
Figure 3.14 illustrates a simple modem-to-modem connection through a WAN.
Fig. 3.14: A Modem connection through a WAN handles analogand digital signals
CSU/DSU
Fig. 3.15: The CSU/DSU stands between the switch and the terminal
24
LAN and
WAN - I
Fig. 3.16: The terminal adapter connects the ISDN terminal adapter to other interfaces
a. Dialup c. LAN
b. ISDN
LAN protocols function at the lowest two layers of the OSI reference model
between the physical layer and the data link layer.
LAN data transmissions fall into three classifications: unicast, multicast and
broadcast. In each type of transmission, a single packet is sent to one or
more nodes.
LAN topologies define the manner in which network devices are organized.
Four common LAN topologies exist: bus, ring, star and tree.
Mainly three types of WAN Protocols are used: HDLC, PPP or Frame-relay.
25
LAN, Integrated Services Digital Network (ISDN) is a good example of circuit
WAN and switching.
TCP/IP
In a packet switching setup, networks have connections into the carrier‘s
network and many customers share the carrier‘s network.
Answers: (1-a)
Answers: (1-a)
Answers: (1-a)
26
LAN and
Check your progress 4 WAN - I
Answers: (1-a)
Answers: (1-a)
Answers: (1-a)
Answers: (1-a)
1.11 Glossary
1. Circuit Switching - Communication viaa single dedicated path between the
sender and receiver. The telephone system is an example of a circuit
switched network.
4. Network Layer - The third lowest layer in the OSI seven layer model. The
network layer determines routing of packets of data from sender to receiver
via the data link layer and is used by the transport layer. The most common
network layer protocol is IP.
27
LAN, 6. Router - A device which forwards packets between networks. The
WAN and forwarding decision is based on network layer information and routing
TCP/IP tables, often constructed by routing protocols.
1.12 Assignment
1. What are some types of WAN circuits?
1.13 Activities
1. What is a CSU/DSU used for?
28
UNIT 2: LAN AND WAN II
Unit Structure
2.0 Learning Objectives
2.1 Introduction
2.8 Glossary
2.9 Assignment
2.10 Activities
2.1 Introduction
Modern network devices can be described as complex entities comprising
both- silicon and software. Thus, designing an efficient hardware platform is not
by itself, sufficient to achieve an effective, cost-efficient and operationally tenable
29
LAN, product. The control plane plays a vital role in the development of features and in
WAN and ensuring device usability.
TCP/IP
Even though progress from the development of quicker CPU boards and
forwarding planes is visible, structural changes made in software are generally
hidden. Though vendor collateral often offers a list of features in a carrier-class
package, operational experiences might differ considerably.
30
2.2 Origin and Evolution of Network Operating System LAN and
WAN - II
Modern network operating systems are mostly advanced and specialised
branches of POSIX-compliant software platforms and are rarely developed from
scratch. The main reason behind this situation is the high cost of developing an
excellent operating system all the way from concept to finished product. By
adopting a general-purpose OS architecture, network vendors can focus on
routing-specific code, decrease time to market and benefit from years of
technology and research that went into the design of the original (donor) products.
31
LAN, run full-size commercial operating systems, at least on high-end hardware, but
WAN and with one catch. They could not sustain packet forwarding with satisfactory data
TCP/IP rates. A breakthrough solution was needed. It came in the concept of a hard
separation between the control and forwarding plane—an approach that became
widely accepted after the success of the industry‘s first application-specific
integrated circuit (ASIC)-driven routing platform, the Juniper Networks M40.
Forwarding packets entirely in silicon was proven viable, clearing the path for
next-generation network operating systems, led by Juniper with its JUNOS
Software.
Today, the original M40 routers are mostly retired, but their legacy lives in
many similar designs and their blueprints are widely recognized in the industry as
the second-generation reference architecture.
32
transparent to customers. They must offer an evolutionary, rather than LAN and
revolutionary approach; upgrade experience typical to the retirement process of WAN - II
legacy software designs.
Memory Model
In a more complex memory model, threads can run in their own virtual
machines and the operating system switches the context every time the next thread
needs to run. Due to this context switching, direct communication between threads
is no longer possible and requires special interprocess communication (IPC)
structures like pipes, files and shared memory pools.
33
LAN, Scheduling Discipline
WAN and
Scheduling choices are primarily between cooperative and pre-emptive
TCP/IP
models, which define whether thread switching happens voluntarily. A
cooperative multitasking model allows the thread to run to completion and a pre-
emptive design ensures that every thread gets access to the CPU regardless of the
state of the other threads.
a. memory model
b. scheduling discipline
34
adevice‘s Ethernet interface automatically. Mobile devices also normally provide LAN and
the programs needed to enable Wi-Fi, Bluetooth or other wireless connectivity. WAN - II
The early versions of Microsoft Windows did not provide any computer
networking support. Microsoft added basic networking capability to its operating
system, starting with Windows 95 and Windows for Workgroups. Microsoft also
introduced its Internet Connection Sharing (ICS) feature in Windows 98 Second
Edition (Win98 SE). This can be contrasted with UNIX, which was designed from
the beginning with networking in view. Nearly any consumer O/S today qualifies
as a network operating system due to the popularity of the Internet.
Some security devices allow you to define the properties of a WAN data
link by configuring the WAN interface. The following topic allows you to
configure the properties for the physical line and the encapsulation method to be
used to transfer dataacross the WAN.
b. Windows 98 d. Windows Me
35
LAN,
WAN and
2.5 WAN Interface Information
TCP/IP Interface Name (read-only)
The name of a physical interface comprises the media type, slot number (for
some devices) and port number, for instance, serial 1/0 or serial 6/0.
WAN Configuration
Main Link: Select this option if the WAN interface is not part of a
multilink interface.
BRI Mode: Select Leased Line Mode or Dial Using BRI to configure the
device for ISDN support.
Check this option to use the ISDN BRI to dial out.Click ‗Apply‘ and edit the
Dialer Enable Options Edit the following to configure the dialer for Basic Rate
Interface (BRI):
Load Threshold: Enter the threshold (in percent) to set up the second B-
channel. For bandwidth on demand, if traffic is greater than the defined
load-threshold, the second B-channel is setup. The range for this B-channel
is 1 to 100. The default is 80.
Idle Time: If there is no traffic before the idle-time expires (in seconds), the
connection is lost. The range for idle time is 0 to 60000, where 0 = never
idle. The default is 180.
36
Retry Times: Enter the number of times to redial if the dial number fails. LAN and
WAN - II
The range is 1-6 and the default is 3.
Interval: The dial interval (in seconds) between retries. The range is from 1
to 60 and the default is 30.
WAN Encapsulation
Frame Relay: Sets the WAN interface to use Frame Relay as the
encapsulation method
Cisco HDLC: Sets the WAN interface to use Cisco HDLC as the
encapsulation method
Manage IP: The logical IP address through which you can manage the
device. You can set a different Manage IP address on each available
interface. The Manage IP address must be on the same subnet as the
physical IP address.
37
LAN, Management Services
WAN and
WebUI: Select this option to enable management through the Web user
TCP/IP
interface (WebUI).
SNMP: Select this option to enable the use of SNMP. The device supports
the SNMPv1 protocol (described in RFC-1157) and all relevant MIB II
(Management Information Base II) groups defined in RFC-1213.
SSL: Select this option to allow the interface to receive HTTPS traffic for
secure management of the device via the WebUI.
Other Services
Ping: Select this option to allow the device to respond to ICMP echo
requests or ‗pings‘. Ping is a utility that determines whether a specific IP
address is accessible or not.
Path MTU (IPV4): Sets the device to use the smallest MTU for all the links
in a path.
Ident-reset: Services like Mail and FTP send identification requests. If they
receive no acknowledgment, they send the request again. While the request
is processing, there is no user access. An ident-reset restores access that has
been blocked by an unacknowledged identification request.
Maximum Transfer Unit (MTU): The default protocol MTU is 1500 bytes
for serial, T1, E1, ISDN BRI and multilink interfaces and 4470 bytes for T3
interfaces. If the MTU of the network to which the interface connects is
different, enter that value here. You can specify a value between 800 and
8192 bytes.
DNS Proxy: Select this option if you want the device to proxy (forward)
DNS queries received on this interface to the appropriate DNS server as
configured on the DNS Proxy Configuration page.
38
WebAuth checkbox: (Appears only when an IP address/net mask is entered LAN and
and applied). Select this option to enable WebAuthauthentication for this WAN - II
interface.
IP: Enter the IP address that receives authentication requests for the
WebAuth server. The WebAuth IP address must be in the same subnet as
the interface IP address.
T1 Interface Options
E1 Interface Options
T3 Interface Options
ISDN Options
b. Frame Relay
39
LAN,
WAN and
2.6 Let Us Sum Up
TCP/IP In this unit, we have learned:
A CPU and memory are shared resources, all running threads and processes
have to access them in a serial and controlled fashion.
A number of design choices are available to achieve this goal, but the two
most important are the memory model and the scheduling discipline.
So in this unit a detailed discussion was made on CPU and Virtual memory.
Answers: (1-a)
Answers: (1-a)
Answers: (1-a)
Answers: (1-a)
2.8 Glossary
1. Socket - The Berkeley Unix mechanism for creating a virtual connection
between processes. Sockets interface Unix‘s standard I/O with its
network communication facilities. They can be of two types, stream (bi-
directional) or datagram (fixed length destination-addressed messages). The
socket library function socket () creates a communications end-point or
40
socket and returns a file descriptor with which to access that socket. The LAN and
WAN - II
socket has associated with it a socket address, consisting of a port number
and the local host‘s network address.
2.9 Assignment
What is WAN?
2.10 Activities
What kind of phone lines can WAN use?
41
LAN,
WAN and
UNIT 3: TCP/IP
TCP/IP
Unit Structure
3.0 Learning Objectives
3.1 Introduction
3.9 IP address
3.13 Assignment
3.14 Activities
42
TCP/IP
3.0 Learning Objectives
After learning this unit, you will be able to understand:
Repeater Operation
IP address
3.1 Introduction
The Transmission Control Protocol (TCP) is one of the core protocols of the
Internet Protocol Suite. TCP is one of the two original components of the suite,
complementing the Internet Protocol (IP) and therefore the entire suite is
commonly referred to as TCP/IP. TCP provides the service of exchanging data
reliably directly between two network hosts, whereas IP handles addressing and
routing message across one or more networks.
43
LAN, describes the packet‘s destination and optionally, the routers to use for forwarding
WAN and until it arrives at its destination. The body contains the data IP is transmitting.
TCP/IP
Due to network congestion, traffic load balancing or other unpredictable
network behaviour, IP packets can be lost, duplicated, or delivered out of order.
TCP detects these problems, requests retransmission of lost packets, rearranges
out-of-order packets and even helps minimise network congestion to reduce the
occurrence of the other problems.
Once the TCP receiver has finally reassembled a perfect copy of the data
originally transmitted, it passes that datagram to the application program. Thus,
TCP abstracts the application‘s communication from the underlying networking
details.
TCP is optimised for accurate delivery rather than timely delivery and
therefore, TCP sometimes incurs relatively long delays (in the order of seconds)
while waiting for out-of-order messages or retransmissions of lost messages.
It is not particularly suitable for real-time applications such as voice over IP.
For such applications, protocols like the Real-time Transport Protocol (RTP)
running over the User Datagram Protocol (UDP) are usually recommended
instead.
TCP is a reliable stream delivery service that guarantees delivery of a data
stream sent from one host to another without duplication or losing data. Since
packet transfer is not reliable, a technique known as positive acknowledgment
with retransmission is used to guarantee reliability of packet transfers. This
fundamental technique requires the receiver to respond with an acknowledgment
message as it receives the data.
The sender keeps a record of each packet it sends and waits for
acknowledgment before sending the next packet. The sender also keeps a timer
from when the packet was sent. It retransmits a packet if the timer expires. The
timer is needed in case a packet is lost or corrupted.
TCP consists of a set of rules: for the protocol, that are used with the
Internet Protocol and for the IP, to send data ‗in a form of message units‘ between
computers over the Internet. At the same time that IP takes care of handling the
44
actual delivery of the data, TCP takes care of keeping track of the individual units TCP/IP
of data transmission, called segments that a message is divided into for efficient
routing through the network.
For example, when an HTML file is sent from a Web server, the TCP
software layer of that server divides the sequence of bytes of the file into
segments and forwards them individually to the IP software layer (Internet Layer).
The Internet layer encapsulates each TCP segment into an IP packet by adding a
header that includes (among other data) the destination IP address.
Even though every packet has the same destination address, they can be
routed on different paths through the network. When the client program on the
destination computer receives them, the TCP layer (Transport Layer) reassembles
the individual segments and ensures they are correctly ordered and error free as it
streams them to an application.
The data section follows the header. Its contents are the payload data carried
for the application. The length of the data section is not specified in the TCP
segment header. It can be calculated by subtracting the combined length of the
TCP header and encapsulating IP segment header from the total IP segment length
(specified in the IP segment header).
45
LAN,
WAN and
Source port (16 bits): Identifies the sending port
TCP/IP
Destination port (16 bits): Identifies the receiving port
If the SYN flag is clear, then this is the accumulated sequence number of the
first databyte of this packet for the current session.
Acknowledgment number (32 bits) – If the ACK flag is set then the value of
this field is the next sequence number that the receiver is expecting. This
acknowledges receipt of all prior bytes (if any). The first ACK sent by each end
acknowledges the other end‘s initial sequence number itself, but no data.
Data off set (4 bits) specifies the size of the TCP header in 32-bit words.
The minimum size header is 5 words and the maximum is 15 words thus giving
the minimum size of 20 bytes and maximum of 60 bytes, allowing for up to 40
bytes of options in the header. This field gets its name from the fact that it is also
the off set from the start of the TCP segment to the actual data.
46
Reserved (4 bits): For future use and should be set to zero TCP/IP
PSH (1 bit): Push function asks to push the buffered data to the receiving
application.
SYN (1 bit): Synchronise sequence numbers. Only the first packet sent from
each end should have this flag set. Some other flags change meaning based
on this flag and some are only valid when it is set and others when it is
clear.
47
LAN, Window (16 bits): The size of the ‗receive window‘ which specifies the
WAN and number of bytes (beyond the sequence number in the acknowledgment field)
TCP/IP that the receiver is currently willing to receive.
Checksum (16 bits): The 16-bit checksum field is used for error-checking
of the header and data.
Urgent pointer (16 bits): If the URG flag is set, then this 16-bit field is an
offset from the sequence number indicating the last urgent databyte.
Options (Variable 0-320 bits, divisible by 32): The length of this field is
determined by the data offset field. Options 0 and 1 are a single byte (8 bits)
in length. The remaining options indicate the total length of the option
(expressed in bytes) in the second byte. Some options may only be sent
when SYN is set; they are indicated below as SYN.
a. WWW
b. Chatapplications
48
TCP/IP
3.3 TCP Protocol Operation
TCP protocol operations may be divided into three phases. Connections
must be properly established in a multi-step handshake process (connection
establishment) before entering the data transfer phase. After data transmission is
completed, the connection termination closes establishes virtual circuits and
releases all allocated resources.
SYN-SENT: Waiting for the remote peer to send back a TCP segment with
the SYN and ACK flags set (usually set by TCP clients).
FIN-WAIT-1
FIN-WAIT-2
CLOSE-WAIT
CLOSING
LAST-ACK
CLOSED
49
LAN,
WAN and Check your progress 2
TCP/IP 1. In case of a server, waiting for a connection request from any remote client.
a. LISTEN c. SYN-RECEIVED
b. SYS-SENT
The active open is performed by the client sending a SYN to the server. It
sets the segment‘s sequence number to a random value A.
Finally, the client sends an ACK back to the server. The sequence number is
set to the received acknowledgement value i.e. A + 1 and the
acknowledgement number is set to one more than the received sequence
number i.e. B + 1.
At this point, both the client and server have received an acknowledgment
of the connection.
50
TCP/IP
SPP-over-IP
SPP-over-IP is a special functionality of iWRAP Bluetooth servers running
in Access Servers. It offers a transparent way to transmit data from Bluetooth
Serial Port Profile (SPP) enabled devices to server computers or PCs. Several
transport medium are supported, such as Ethernet, Wi-Fi or and GPRS.
b. oneway
51
LAN,
WAN and
3.5 Features of SPP-Over-IP
TCP/IP Access Server 2291 supports 7 incoming SPP connections.
SPP-over-IP can also be used to opposite direction, i.e. access server opens
the Bluetooth connections to dedicated Bluetooth devices.
Standard operation
Forwards all incoming data from the SPP device to the established TCP
connection and vice versa
All the server computer needs to do is to listen for incoming TCP connections
from access server to a specified TCP port and receive/send the application data.
52
TCP/IP
Check your progress 4
1. Access Server 2293 supports _______incoming SPP connections.
a. 21 c. 42
b. 7
53
LAN,
WAN and
TCP/IP
GPRS connection may be unreliable and break easily. This should be taken
account when designing the system. If GPRS connection breaks, all the TCP and
Bluetooth connections will also be closed.
54
TCP/IP
55
LAN, Configuring SPP-over-IP
WAN and
This briefly instructs you to configure SPP-over-IP to work in different
TCP/IP
network setups or use cases. SPP-over-IP is easiest to configure through WWW
setup, which allows you to access all the necessary configurations.
a. Wired c. Bluetooth
b. Wifi
Repeater configuration
If you want to configure access server also to act as a repeater, you must
make some additional configurations. Add the line below to your Bluetooth
startup script, editable at Setup → iWRAP settings → Edit startup script. Line
starting with # is comment, which can be left out:
56
TCP/IP
# Automatically connect to Access Server with PAN-NAP enabled using
baseband 1
Note: The server receiving the PAN connection must have the PAN-NAP
profile enabled. This is by default is not the case, so in setup or its WWW
interface, ensure that the setting at → Bluetooth settings → Bluetooth profiles →
Enable PAN network access point profile says yes. No other configuration is
needed.
a. enabled
b. disabled
Name Function
57
LAN,
OSPF Open shortest path first- A descendant of RIP that increases
WAN and
its speed and reliability
TCP/IP
a. TCP c. PPP
b. SMTP
3.9 IP Address
An Internet Protocol address (IP address) is a numerical label that is
assigned to any device participating in a computer network that uses the Internet
Protocol for communication between its nodes. An IP address serves two principal
58
functions: host or network interface identification and location addressing. Its role
TCP/IP
has been characterisedas follows: ―A name indicates what we seek. An address
indicates where it is. A route indicates how to get there‖.
b. LAN
59
LAN,
WAN and
3.10 Let Us Sum Up
TCP/IP In this unit, we have learned:
A TCP segment consists of a segment header and a data section. The TCP
header contains 10 mandatory fields and an optional extension field. The
data section follows the header.
Its contents are the payload data carried for the application. The length of
the data section is not specified in the TCP segment header. An Internet
Protocol address (IP address) is a numerical label that is assigned to any
device participating in a computer network that uses the Internet Protocol
for communication between its nodes.
Acknowledgment number (32 bits) – If the ACK flag is set then the value of
this field is the next sequence number that the receiver is expecting. This
acknowledges receipt of all prior bytes (if any).
Data offset (4 bits) – This specifies the size of the TCP header in 32-bit
words. The minimum size header is 5 words and the maximum is 15 words.
Answers: (1-a)
Answers: (1-a)
Answers: (1-a)
60
TCP/IP
Check your progress 4
Answers: (1-a)
Answers: (1-a)
Answers: (1-a)
Answers: (1-a)
Answers: (1-a)
3.12 Glossary
1. Modem (Modulator/demodulator) - An electronic device for converting
between serial data (typically EIA-232) from a computer and an audio
signal suitable for transmission over a telephone line connected to another
modem. In one scheme the audio signal is composed of silence (no data) or
one of two frequencies representing zero and one.
3. Network Layer - The third lowest layer in the OSI seven layer model. The
network layer determines routing of packets of data from sender to receiver
via the data link layer and is used by the transport layer. The most common
network layer protocol is IP.
61
LAN, to full strength in the process. Repeaters are used to counter the attenuation
WAN and which occurs when signals travel long distances
TCP/IP
5. Router - A device which forwards packets between networks. The
forwarding decision is based on network layer information and routing
tables, often constructed by routing protocols.
3.13 Assignment
1. Explain TCP protocol operation.
3.14 Activities
1. Explain the repeater operation.
62
Block Summary
This block was written so that those readers who need information quickly
are able to find it instantly, and those who wish to learn more advanced topics can
even read deeper into each unit and further into the chapters. Books reference list
was also provided at the end of each unit in order to help those students who wish
to learn more more due to their interest in that very line.
The book begins with an overview of writer, discussing about the LAN
AND WAN.
Efforts were made by the writer as you get further into a chapter you will
learn more about LAN AND WAN, their role and capabilities, but often you will
be able to head directly to the topic you wish to learn about.
Sufficient diagrams were even used wherever it was felt appropriate by the
writer, and where according to him readers may find it helpful related to the
theory, including reference to certain documents that you will be able to get from
the books incase you need to study more about the topics.
63
LAN,
WAN and
Block Assignment
TCP/IP Short Answer Questions
Define the following terms-
1. Point-to-point protocol
2. Wan devices
3. HDLC
4. Circuit switching
5. Packet switching
6. Frame relay
7. WAN configuration
8. Ping
9. DNS proxy
10. SNMP
11. SSL
12. IP address
13. SPP
14. IP
15. Repeater
16. TCP/IP
64
Enrolment No.
1. How many hours did you need for studying the units?
Unit No 1 2 3 4
Nos of Hrs
2. Please give your reactions to the following items based on your reading of
the block:
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
65
Education is something
which ought to be
brought within
the reach of every one.
- Dr. B. R. Ambedkar