Chapter VI

Networking and Internet

1-  Introduction: What is networking?

  1. Networking is communicating or linking people, groups, activities or devices in order to form networks that make it easy to exchange information or services.

b.  Networking as defined in Merriam Webster dictionary is the exchange of information or services among individuals, groups, or institutions; specifically : the cultivation of productive relationships for employment or business.

2-  Networking application

  1. A list of familiar use of network and networking comprises:
  2. Transportation network
  3. Telephone network
  4. Business network
  5. Travel network
  6. Expert network
  7. Architects network
  8. Network of hotels
  9. Sewer network
  10. Modern global business and thirsty global market made business professionals anxious to inventing ways that improve their business practice. One efficient practice they found consists of organizing themselves into group networks in every activity as we mentioned in the listed network examples above.
  11. Consequently, a network can be defined as interconnected number of people, objects, businesses, services, etc…
  12. This definition applies to computer networking since computers are tools used by individuals and business decision makers to hold and process information.
  13. Following this logic we can say that modern computer networking is in fact business networking as it is hard to imagine business information networks that don’t evolve around computers and computer information systems.
  14. It is needless to mention that business networking or computer networking or any other networking wouldn’t be this easily possible and profitable without the abundance of advanced telecommunication media and telecommunication technology.

Computer networking

1-  Computer network

a.  We use to consider two or more computers linked together as a computer network but practically a computer network consists of at least 3 computers linked together by means of telecommunication media.

b.  Computer networks are usually tailored to match the structure of a given establishment, business or any organization.

c.  Because this structure includes a lot of ramifications and substructures, business network usually is a network of sub-networks looking like the metaphor of the tree structure.

d.  Each computer in the network is known as a node or workstation.

e.  If the network has a server all other nodes are considered as clients to the server, by the way this is the most commonly used structure in computer networking.

2-  Network classification by size:

a.  Local area network (LAN) covers a limited geographical area (a building or few small buildings), the network in your computer lab is a LAN with around 30 nodes.

b.  Personal area network (PAN) is a specific LAN designed to connect computer devices for one person or household or office in very limited geographical area and ultimately connect them to the Internet.

c.  Metropolitan area network (MAN) is a larger network that may include several LANs and PANs. This network covers larger geographical area like a whole city or a large campus (university, college, military base, business campus).

d.  Wide area network (WAN) is the largest network structure that may include several interconnected LANs, MANs and PANs. This network covers large areas like a state, a country or several countries or even a continent.

e.  The largest area network is the Internet because it is the collection of all networks connected together by the Internet backbone.

3-  Network classification by physical structure (physical topology):

  1. Star network:
  2. Consists of several computer nodes connected to a central hub.
  3. The central server offer services to the other nodes that are considered as client nodes.
  4. Most used structure in business computer networking.
  5. Bus network:

Bus (backbone)

  1. Consists of a backbone cable extended all along the network area.
  2. Several computers connected in parallel to the same backbone which is called a bus because of this type of connection.
  3. No server in a bus network. Nodes share files and other information.
  4. Easy to connect and monitor network.

c.  Ring network:

  1. Consists of a specific bus network that has both ends linked together.
  2. Used in locations where the computers are physically located very close to a ring
  3. Message always flows clockwise and priorities are also established in the order clockwise.
  4. No server involved. Nodes connect and share files as they configure them depending on who needs what?
  5. Mesh networking topology:
  1. Consists of several computers where each node is connected with all other nodes.
  2. Expensive structure if we need to lay a huge quantity of cables or implement other media for this purpose.
  3. No server is usually needed. Exchange of files and information as previously configured by nodes (who needs what?).
  4. Access authorization for sharing files should be strictly controlled
  5. Rarely used without Internet backbone connection
  6. Peer-to-peer (P2P) network:
  7. Special mesh structure that uses the Internet backbone as a communication medium with each node in the network.
  8. Very flexible structure as it may connect unlimited number of nodes that may include every computer that has Internet connection.
  9. Eliminates the need of a server by using the file sharing technology that allows every node to share files with all other nodes.
  10. Tree network:
  11. Consists of a combination of a bus network with several star networks
  12. This network fits a department that comprises several divisions where each division has a star network and all stars are connected via a bus.
  13. Priorities and message flow control are more complicated in this network structure.

4-  Network protocol (network logical topology)

  1. Network protocol is a set of rules designed to control all network functions by assuming the following responsibilities:
  2. Establishing network priorities and enforcing them.
  3. Maintaining strict communication discipline in the network.
  4. Controlling network access and network security.
  5. Establishing communications with network nodes from internal nodes and external messages applying the handshaking technology
  1. Handshaking technology consists of the following steps achieved by the network protocol:
  2. Protocol detects a message originated by node A or coming from outside source addressed to node B
  3. Protocol intercepts the message and inspects its validity and security status and make sure it doesn’t collide with other network messages.
  4. Protocol warns node B about the message by checking if it is available and willing to receive it.
  5. To complete the handshaking process, protocol connects the sender with the receiver allowing the message to flow from origin to destination.
  6. If node B is busy with other messaging business the handshaking process will be postponed as long as necessary.
  7. Ethernet protocol: Was commercially released in 1980 and it is until today the most popular protocol among LAN users
  8. Ethernet technology is known as CSMA/CD which stands for (Carrier Sense Multiple Access/Collision Detection.
  9. This technology is based on the principle of polite conversation between a group of civilized people with the following scenario:
  10. Many people start talking at the same time.
  11. They stop talking because each one of them will leave the turn to others.
  12. When an absolute silence is achieved, some guys will restart talking and again if more than one is talking they will stop.
  13. The process will continue until only one is talking and all others listening
  14. Ethernet protocol assumes the enforcement of the courtesy role by stopping all messages if more than one station is trying to send.
  15. Ethernet sends the message to all nodes but none can receive it except the addressees.
  16. Token ring protocol:
  17. This protocol is designed for the ring network
  18. A signal called token that may be a code is sent to the station that has the sending priority
  19. When that station finishes it passes the token to the station that has the next priority and so forth
  20. In a ring network priorities are clockwise in the order and the message flows clockwise exactly.
  21. Some networks use the Internet protocol which we will see along with many other protocols of Internet services ahead.

5-  Wireless networking:

  1. WLAN network connects nodes via radio-waves instead of cables. It is known as Wi-Fi network and the latest wireless technology is the Wi-Max network.
  2. Wi-Fi network stands for (Wireless-Fidelity) and is known by its IEEE code 802.11 where we must distinguish from 802.11a, 802.11b, 802.11g, and 802.11n
  3. 802.11 was released in 1997 uses a 2.4 GHz and bandwidth 20 MHz can be used over a distance of 20 meter indoor and 100 meter outdoor
  4. 802.11a released on the eve of the 3rd millennium SEPT-OCT 1999 uses a 3.7 GHz frequency and 20 MHz bandwidth that improved the range to 35 meters indoor and 120 meters outdoor.
  5. 802.11b uses 2.4 GHz and same bandwidth of 20 MHz with the improvement of the outdoor working distance to 140 meters.
  6. 802.11g similar to the 802.11b and data rate between 6 and 54 (Mbit/s) and was released in June 2003.
  7. 802.11n released in OCT 2009 used a 2.4/5 GHz frequency and bit stream between 7.2 Mbit/s and 72.2 Mbit/s the working range was improved to 70 meters indoor and 250 meters outdoor.
  8. Other scheduled releases for 2013 (802.11ad) and 2014 (802.11ac) that will introduce new improvements to the WLAN technology.

c.  Wi-MAX (Worldwide interoperability for Microwave Access).

  1. Wireless broadband Internet access designed to replace the DSL as more convenient mobile and fixed Internet access.
  2. Wi-MAX influence on Internet access may be compared tp cellphone impact on the telephone networking and telephone industry.
  3. The IEEE 802.16 and 802.16e standard enable to use 2.3 GHz, 3.3 GHz, 2.5 GHz and 3.5 GHz.
  4. Wi-MAX range may reach 50 Kilometers about 31 miles (enough to cover a big city or a county).
  5. Designed to provide 30-40 Mbit/s that was updated in 2011 to 1 Gbit/s for fixed stations.
  6. However Wi-MAX has the limitation of not being able to deliver the maximum speed at the maximum range (speed in bit/s is inversely proportional to the distance from the base station).
  7. Wi-MAX 802.16 started the 4th generation (4G) of smart phones and mobile Internet access that evolved as follow:
  8. LTE (Long Term Evolution) is defined as a 4G standard was effectively first launched in 2009 in Scandinavia (Oslo and Stockholm).
  9. Wi-MAX 1, 1.5 and 2 were all designed as wireless MAN (Metropolitan area Network).
  10. Wi-MAX 2nd release core technology (802.16m) provides data speed 4 times faster than the first release 802.16 and 802.16e.
  11. 802.16m release 2 is backward compatible with Wi-MAX release 1 so the migration from Wi-MAX 1 to Wi-MAX 2 needs only to update the software or upgrade the channel cards.
  12. By the start of 2012 Wi-MAX networks around the world were estimated to have more than one billion subscribers.

d.  Blue tooth networking: (Blootooth.com)

  1. Bluetooth networking technology was developed in 1994 in the labs of ERICSSON (the Scandinavian communication giant company) by 2 employees Jaap Haartsen and Sven Mattisson
  2. It was called by this name after the Scandinavian king Harald (935 – 985) who was very productive in building bridges and making all Scandinavian tribes communicate with each other. This king was nicknamed “BLUETOOTH” because his front teeth were blue colored affected by his love of eating berries.
  3. Bluetooth is a full wireless networking technology using low power transmitters that are designed to link computing devices in PAN (Personal Area Network) over short distances (10 meters = 33 feet or less).
  4. Newer Bluetooth technology using more powerful transmitters can be used for up to 100 meters or 330 feet.
  5. The frequency band used is 2402-2480 MHz divided into 79 channels one MHz apart assigned by the ISM (Industrial Scientific Medical) agency.
  6. In 1998 Bluetooth SIG (Bluetooth Special Interest Group) was established by Ericsson, Nokia, IBM, Toshiba and INTEL this group is monitoring the use of protocol stack and Bluetooth qualification requirements for electronic devices and equipment.
  7. In 2002 Bluetooth enabled devices were around 250 million. Today it is estimated that more than a billion devices are using the technology.
  8. Computers who are not equipped with Bluetooth adaptor can be Bluetooth connected thru wireless adapter.
  9. One Bluetooth adapter can connect several Bluetooth devices.

e.  Characteristics of Bluetooth network:

  1. The basic network in a Bluetooth system is the “Pico-net” where the number of nodes cannot exceed 8 devices because the address is 3 digits (2^3 = 8).
  2. Each device in Pico-net is a peer device (it can act a master or a slave so at a given time we have one master and 7 slaves.
  3. Two or more Pico-nets form a scatter-net and the name is meaningful in this networking technology because a scatter happens when one slave of any Pico-net elects to behave as master or slave in another one.
  4. This interconnectivity is very important because it enables Bluetooth devices to reach far beyond the short range limitation of Bluetooth networking.
  5. Bluetooth protocol: because of the diversity of Bluetooth devices the technology has a stack of several protocols to handle diverse services and provide for implementation flexibility. These protocols are:
  6. LMP (Link Management protocol) establishes and manages links and ability to query.
  7. BNEP (Bluetooth Network Encapsulation Protocol) used by Bluetooth PNA to manage packet switching and transmission in the network.
  8. HCI (Host Controller Interface) establishes and controls communication between operating system of computer devices and Bluetooth IC (Integrated Circuit).
  9. SDP (Service Discovery Protocol) enables any Bluetooth device to discover services offered by other devices and their characteristics and parameters.
  10. TCS and TCS-BIN (Telephony Control Protocol allows voice and data calls between devices of Bluetooth network.
  11. WAP (Wireless Application Protocol) provides necessary access to telephone and computer networks for mobile users who are connecting thru Bluetooth network.
  12. Samples of Bluetooth apps: Here are some applications:
  13. PROFINET: Bridge that connects two Ethernet networks.
  14. Wii of Nintendo and PS3 of Sony game consoles use Bluetooth to accommodate their game controllers.
  15. Personal security application: Bluetooth tag (marker) attached to protected objects and has constant communication with a phone. If the communication is interrupted a warning signal is activated.
  16. RTLS (Real Time Location System) app that enables user to track and locate objects by attaching or embedding Bluetooth markers or tags and using readers to intercept and process signals sent by the tags. Bluetooth OBEX (Object Exchange) is an application that allows exchange of information and transfer of files within all devices of Bluetooth network.

The Internet