Download it_networking

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Running Head: NETWORKING
1
Networking
(Student’s Name)
(Institutional Affiliation)
(Date)
NETWORKING
2
A router is one of the network layer devices which are responsible for routing the traffic
between subordinate networks that make up a data network. A subordinate network can be
described as a group of network resources that can be attained without the need of having to go
through the router. An internetwork on the other hand can be explained as a grouping of
networks which are connected by the use of a router. The core function of a router is simple
because it is used in receiving data packets from one end and routes them to the other end of a
network which is made up of sub networks.
Routers are also used to do more superior jobs only if the network layer will sustain that
function. Many of them have the aptitude to fragment data packets. Routers are also utilized to
provide some congestion or jamming control aptitudes. Routers can be highly classy packet
filters. A group of people mistake routing for bridging. Routing is in addition a network layer
function. Routers function on packets and preferences based on the network layer addresses.
However, Bridging is a data link layer function. Bridges maneuver on frames and build filtering
and forwarding preferences basing on the media access control address (MAC).
Packets traverse within frames and are used as the transmission unit to get a message
from one node to another in the network. If two end nodes are in the same subordinate network,
the packet is be positioned in a frame by the transmitter and propelled across the sub network to
the intended receiver, possibly going through a few bridges. If the end nodes are not in the same
subordinate network, the packet will traverse in one frame from the transmitter to router, which
will also decide on the routing and the pass the packet to the next subordinate network in a
another new frame.
In a sub network, connection software has to make tables and keep track of potentially all
of the procedures and devices in the subnet and the subordinate network. These tables do not
NETWORKING
3
hold entries for any end node in a dissimilar subnet. Routers may also construct tables that enlist
all of the subordinate networks and how to contact them. The network protocol in an
internetwork is in charge for end to end routing of packets. There are many network layer
protocols in the market, but they all share some general characteristics. All of the service
networks can supply packet fragment, connectionless or otherwise connection-oriented service,
and packet prioritization.
A network bridge is used to connect many network segments at the data link layer of the
Open System Interconnection (OSI) model. Bridges also are used to send broadcasts to all ports
apart from the one on that was the broadcast recipient. Nevertheless, bridges do not
promiscuously imitate traffic to all ports, as hubs do, but study which MAC addresses can be
reached through specific ports. Once the bridge links a port and an address, it will send traffic for
that address to that port solitary.
Bridges discover the association of ports and addresses by studying the source address of
frames that it can see on various ports. When a frame reaches through a port, its source address is
kept and the bridge assumes that MAC address is related with that port. The first time that a
previously not known destination address is seen, the bridge will forward the frame to all ports
other than the one on which the frame arrived.
Bridges come in three basic types:
 Local bridges. These are used to connect LANs
 Remote bridges: used to interconnect WANs and LANs.
 Wireless bridges: Used to bond remote stations to LANs.
A routing table is a computer readable file that is used to keep the routes to the various
nodes in a computer network. The nodes can be of any type of electronic device connected to the
NETWORKING
4
network. The Routing Table is usually accumulated in a router or networked computer in the
form of a data file or rather a database. When data needs to be sent from one node to another on
the network, the routing table is consulted to in order to find the best likely route for the
transmission of data.
Hop-by-hop routing method is a standard routing method used in a network that for each
node in that network, the address of the next node primary to the destination is enlisted. Such
that when a data packet makes to a particular node, it refers to the routing table to determine the
address of the next hop node target. Upon reaching that next node, it once again refers to the
routing table for the address of the next node and so on, until it makes it to the final destination.
In the case of a large network which consists of many nodes and routers, the routing
tables for all the routers need to be trusted reliable, of which if they fail, routing loops can
develop. This can sometimes be a source of problems in particular in networks that use the hopby-hop routing method for which the data packets may ultimately end up being sent in a neverending loop. Routing loops have frequently been a frequent problem in networks and one of the
main goals of scheming routing protocols is the careful dodging of these routing loops.
Routing tables may generally be upheld manually when a network is small and static. The
routing tables for all static network tools do not change unless or until the network administrator
alter them manually. In dynamic routing, the devices individually and automatically build and
maintain their own routing tables. They do this through the exchange of information concerning
the network topology using routing protocols. This enables the devices in the network to
automatically settle to the changes in the network like device breakdown and network congestion
as and when they occur.
NETWORKING
5
Performance of a network can be evaluated in several ways which include response time
and transit time. Transit time is the total sum of time required for a message to go through from
one node to another node. On the other hand response time is the elapsed time between a request
and a response. The performance of a network may depend on several other factors, which
include the number of users in the network, the potential of the connected hardware in
transmission, and the efficiency of the software used.
Performance is mainly measured by two networking measures: throughput and delay. We
typically need much throughput and less delay. Moreover, these two criteria are often opposing.
If one tries to send more data to the network, we may increase throughput but we increase the
delay because of traffic congestion in the network.
NETWORKING
6
REFERENCES
Sackett, G. C. (2000). Cisco router handbook. New York: McGraw-Hill.
Fox Chapel Publishing. (2010). Router. East Petersburg, PA: Fox Chapel Pub.
Narayan, H., Govindan, R., & Varghese, G. (2003). The impact of address allocation and routing
on the structure and implementation of routing tables. La Jolla, Calif.: Dept. of Computer
Science and Engineering], University of California, San Diego.
Willer, D. (1999). Network exchange theory. Westport, Conn: Praeger.