You are on page 1of 116

h

t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
UNIT 1
M%&con.&co
1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Definition of Computer Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. Components of Data communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3. Types of computer networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.1. Local rea Networks !LNs" . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.2. #etropolitan rea Network !#N" . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.3. $i%e rea Network !$N" . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.&. 'irtual (ri)ate Network !'(N" . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.&.1. (rotocols use% in '(N . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . &
1.3.&.2. Internet*+ase% '(Ns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ,
1.3.&.3. Intranet*+ase% '(Ns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ,
1.3.,. (ersonal rea Network !(N" . . . . . . . . . . . . . . . . . . . . . . . . . . . . -
2. N.T$OR/IN0 D.'IC.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1. Repeater . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.2. 3u+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.1. (assi)e 3u+s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1.2. cti)e 3u+s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 5
2.1.3. Intelli6ent 3u+s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.3. 7ri%6e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.&. 1witc8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.,. Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.-. Network Interface Car% !.t8ernet" . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 12
2.2. #o%em . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4. 'oI( !'oice o)er Internet (rotocol" . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1&
2.4.1. Types of 'oI( Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1&
2.5. 0ateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1&
2.19. Connectors R: &, . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1,
2.11. Direction of transmission or Data ;low . . . . . . . . . . . . . . . . . . . . . . . . .. 1-
2.11.1. 1imple< . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.11.2. 3alf*Duple< . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.11.3. ;ull*Duple< . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3. TRN1#I11ION #.DIU# . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.1. Un6ui%e% #e%ia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2. 0ui%e% #e%ia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3. Twiste%*(air Ca+le . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3.1. UT( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3.2. 1T( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.&. Coa<ial ca+le . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.,. Optical ;i+er . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.-. Comparison of Different mo%e of Optical ;i+ers . . . . . . . . . . . . . . . . . . . 21
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
&. TRN1#I11ION I#(IR#.NT===============..== 22
&.1. ttenuation==================.==.. 22
&.2. Distortion=====================.. 22
&.3. Noise=====================......... 23
&.3.1. 1i6nal*to*Noise Ratio !1NR"======..==.=. 23
&.3.2. T8rou68put============..====.. 23
,. CC.11 (OINT=......============...====.................... 2&
,.1 $8at is $i*;i>...............................................................................2&
,.2 Types of ccess (oints===============..=2,
,.2.1 #otorola (*,131=======.=====.==2-
,.3 (*,131 Confi6uration==============..==24
-. 1$ITC3===========================..=3,
-.1 T?(. O; 1$ITC3.1 ==============.=.=3,
-.1.1 Two*Layer 1witc8es============....=3,
-.1.2 T8ree*Layer 1witc8es==========.===.3-
-.2 LN 1witc8 #ec8anism an% Its %)anta6es========32
-.3 'LN====================...==..32
-.3.1 %)anta6es of 'LNs==========..==.34
-.3.2 Types of 'LNs=============.==34
2. N.T$OR/ TO(OLO0?===================..==35
2.1 1tar Topolo6y ====================35
2.2 Rin6 Topolo6y =================..==.&9
2.3 7us Topolo6y ====================&1
2.& #es8 Topolo6y ==============.====.=
&1
2., Tree Topolo6y =================..=.=&2
2.- 3y+ri% Topolo6y ===============...===&3
4. O1I R.;.R.NC. #OD.L=====================&&
4.1 (8ysical Layer ===============...====&,
4.2 Data Link Layer ===================&-
4.3 Network Layer =================..==&2
4.& Transport Layer =================.==&2
4., 1ession Layer ====================&4
4.- (resentation Layer ==================&4
4.2 pplication layer ================...==&5
5. ;IR.$LL========================.===,9
5.1 3ow Does ;irewall #ana6ement $ork>.......................................,9
5.2 ;irewall tec8ni@ues==================,9
5.2.1 (acket filterin6 firewall======..======,9
5.2.2 1tateful firewall=========..======,1
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
5.2.3 Deep packet inspection firewall======..===,1
5.2.& pplication*aware firewall=========..==,1
5.2., pplication pro<y firewall======.==.===,1
5.3 ;irewall Rules==================.==,2
5.& Types of ;irewall===================,2
5.&.1 1oftware firewall=============.==,2
5.&.2 3ar%ware firewall===============..,3
5., T8e %)anta6es an% Disa%)anta6es of ;irewall =====..
=,3
5.,.1 %)anta6es ================.=,3
5.,.2 Disa%)anta6es ============.====,&
19. UT#============================..=,,
19.1 3ow UT# secures t8e network=============,,
19.2 %)anta6es ===================..=,-
19.3 ;eatures======================,-
19.&UT# ppliance 7enefits..............................................................,-
11. (ROTOCOL========================..==.,2
11.1 ;T( A;ile Transfer (rotocolB==============,2
11.1.1 nonymous ;T(===============,4
11.1.2 3ow ;T( $orks>..........................................................,4
11.2 T.LN.T AT.rminaL N.TworkB========.==.==,4
11.3 1imple #ail Transfer (rotocol !1#T("......................... .............,5
11.& (O(3=====================.==-1
UNIT -2
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
1.$.7 1.R'.R======================== =.=-,
1.1 II1=====================.===..-,
1.1.1 Installation===============.==..--
1.1.2 1ecurity ;eatures==============.=29
1.2 pac8e $e+ 1er)er===== =========..===29
1.2.1 ;eatures ==============..====21
1.2.2 Use=============.=======..21
2. T.#INL 1.R'.R========================22
2.1Terminal 1er)ices rc8itecture ============.====22
2.1.1 #ulti*user kernel ===========...=====22
2.1.2 Remote Desktop client===============
22
2.1.3 Terminal 1er)ices licensin6 ser)ice====...=====22
2.1.& 1ession Directory 1er)ices========.=====22
2.2 Components========================23
2.3 Installation C Confi6uration Terminal 1er)ices==========2,
2.& 3ow to connect client wit8 Terminal ser)er=======.====42
2., %)anta6es====================.====43
3. $INDO$1 1.R'.R U(DT. 1.R'IC.1 !$1U1"=======..===4&
3.1 Installation ======================.==4&
3.1.1 1oftware Re@uirements ============..==
4&
3.1.2 #inimum 3ar%ware Re@uirements =====...====4&
3.1.3 Installation 1teps=================4,
3.2 Confi6urin6 t8e network===================42
3.3 To specify t8e way t8is ser)er will o+tain up%ates=========42
3.& 1tart $1U1========================42
3.&.1 Confi6ure up%ates an% sync8roniDation=======.=42
3.&.2 Confi6ure client up%ates==============.44
&.7LD. 1.R'.R========================.=45
&.1 Nee% Of 7la%e 1er)er====================.45
&.2 ;eatures =========================.45
&.2.1 'irtualiDation=================.=45
&.2.2 3ot 1wappin6=================.=59
&.2.3 (ower====================..=59
&.2.& Coolin6 ===================..=59
&.2., 1tora6e=====================59
&.2.- L.D In%icators===============..==.59
&.3 1pecification====================.=.==.51
&.& Components Of 7la%e 1er)er=================.51
&.&.1.C8assis=====================52
&.&.2 #ana6ement ser)er ================
52
&.&.3 1N C /'#==================. 52
&., RID======================..====53
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
&.,.1. %)anta6es n% Disa%)anta6es Of Rai%=====.==5&
&.- Confi6uration=====================.==
5,&.-.1. Usin6 t8e Confi6uration E1etup Utility pro6ram==....==5,
&.-.2. Usin6 t8e (F. +oot a6ent utility pro6ram =.===...==52
4.)Confi6urin6 T8e 0i6a+it .t8ernet Controllers ========.==52
&.4. 7la%e 1er)er %)anta6es n% Disa%)anta6es=====..=.......==54
&.4.1. %)anta6es======.......=========.==54
&.4.2. Disa%)anta6es===.....===========...==55
,. D3C( 1er)er========================...=199
,.1 Installin6 D3C( 1er)er is )ery easy in win ser)er 2993====.==191
,.2 Confi6urin6 D3C(==================...==119
,.3 %)anta6es an% Disa%)anta6es ==============...=112
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
UNIT 1
NETWORKING
1. INTRODUCTION
network is a set of mac8inesE%e)ices !often referre% to as no%es" connecte% +y
communication links to communicate wit8 eac8 ot8er. no%e can +e a computerG
printerG or any ot8er %e)ice capa+le of sen%in6 an%Eor recei)in6 %ata 6enerate% +y
ot8er no%es on t8e network.
Two mac8ines may +e %irectly connecte%G or can communicate t8rou68 ot8er
mac8ines
1ome mac8ines are sources an% %estinations of %ata.
1ome %e)ices %o not 6enerate %ataG +ut facilitate in t8e transfer !e<. a router"
Networks are an interconnection of two or more computers suc8 t8at t8ey can
s8are resources an% information.
T8ese computers can +e linke% to6et8er usin6 a wi%e )ariety of Ca+lesG or
telep8oneG or t8rou68 satellites.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
1.1 Definition of Computer Network
computer network is an interconnecte% collection of autonomous computers.
Two computer are interconnecte% if t8ey are a+le to e<c8an6e information
Two computers are autonomous if t8ey are capa+le of operatin6
in%epen%entlyG t8at isG neit8er is
capa+le of forci+ly startin6G stoppin6G
or controllin6 t8e ot8er.
1.2 Components of Dt
!ommuni!tion
%ata communications system 8as fi)e
components.
$. "ess#e H T8e messa6e is t8e information !%ata" to +e communicate%. (opular
form of information inclu%es te<tG num+ersG picturesG au%ioG an% )i%eo.
2. $en%er H T8e sen%er is t8e %e)ice t8at sen%s t8e %ata messa6e. It can +e a
computerG workstationG telep8one 8an%setG )i%eo cameraG an% so on=.
'. Re!ei&er H T8e recei)er is t8e %e)ice t8at recei)es t8e messa6e. It can +e a
computerG workstationG telep8one 8an%setG )i%eo cameraG an% so on=.
4. Trnsmission me%ium H T8e transmission me%ium is t8e p8ysical pat8 +y
w8ic8 a messa6e tra)els from sen%er to recei)er. .<ample of Transmission
me%ia inclu%e twiste% Ipair wireG coa<ial ca+leG fi+er*optic ca+leG an% ra%io
wa)es.
(. 'roto!o( H protocol is a set of rules t8at 6o)ern %ata communications. It
represents an a6reement +etween t8e communicatin6 %e)ices. $it8out a
protocolG two %e)ices may +e connecte% +ut not communicatin6G Just as a
person speakin6 ;renc8 cannot +e un%erstoo% +y a person w8o speaks only
:apanese.
1.) T*pes of !omputer networks
1.).1 +o!( ,re Networks -+,Ns. / T8e computers are 6eo6rap8ically close
to6et8er !t8at isG in t8e same +uil%in6". It confine% to a sin6le +uil%in6 or 6roup of
+uil%in6G 3omeG Office 7uil%in6 Or 1c8ool or Uni)ersity !/IIT". It is .it8er $ire% or
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
wireless me%ia. $ireless LNs are t8e newest e)olution in LN tec8nolo6y.LN
siDe is limite% to a few kilometers.
1.).2 "etropo(itn ,re Network -",N. /
metropolitan area network !#N" is a network wit8 a siDe +etween a LN
an% a $N. It co)ers t8e area insi%e a town or city. It consists of multiple LNs. It is
lar6er t8an local*area networks !LNs" +ut smaller t8an wi%e*area networks !$Ns".
It is c8aracteriDe% +y )ery 8i68*spee% connections usin6 fi+er optical ca+le or ot8er
%i6ital me%ia.
.<ample* Telep8one company network an% ca+le T' network
1.).) Wi%e ,re Network -W,N. H wi%e area network !$N" pro)i%es lon6*
%istance transmission of %ataG ima6eG au%ioG an% )i%eo information o)er lar6e
6eo6rap8ic areas t8atKs may comprise a countryG a continentG or e)en t8e w8ole worl%.
It co)ers a lar6e 0eo6rap8ical area !/ilometers".It consists of two or more LNs.
1.).0 1irtu( 'ri&te Network -1'N. / 'irtual (ri)ate Network !'(N" is a
network tec8nolo6y t8at creates a secure
network connection o)er a pu+lic network
suc8 as t8e Internet or a pri)ate network
owne% +y a ser)ice pro)i%er. Lar6e
corporationsG e%ucational institutionsG an%
6o)ernment a6encies use '(N tec8nolo6y to
ena+le remote users to securely connect to a
pri)ate network.
'(N can connect multiple sites o)er a lar6e %istance Just like a $i%e rea
Network !$N". '(Ns are often use% to e<ten% intranets worl%wi%e to %isseminate
information an% news to a wi%e user +ase. .%ucational institutions use '(Ns to
connect campuses t8at can +e %istri+ute%
across t8e country or aroun% t8e worl%.
In or%er to 6ain access to t8e pri)ate
networkG a user must +e aut8enticate% usin6 a
uni@ue i%entification an% a passwor%. n
aut8entication token is often use% to 6ain
access to a pri)ate network t8rou68 a personal
i%entification num+er !(IN" t8at a user must enter. T8e (IN is a uni@ue aut8entication
co%e t8at c8an6es accor%in6 to a specific fre@uencyG usually e)ery 39 secon%s or so.
1.).0.1 'roto!o(s use% in 1'N H
T8ere are a num+er of '(N protocols in use t8at secure t8e transport of %ata
traffic o)er a pu+lic network infrastructure. .ac8 protocol )aries sli68tly in t8e way
t8at %ata is kept secure.
I( security !I(1ec" is use% to secure communications o)er t8e Internet. I(1ec
traffic can use eit8er transport mo%e or tunnelin6 to encrypt %ata traffic in a '(N. T8e
%ifference +etween t8e two mo%es is t8at transport mo%e encrypts only t8e messa6e
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
wit8in t8e %ata packet !also known as t8e payloa%" w8ile tunnelin6 encrypts t8e entire
%ata packet. I(1ec is often referre% to as a Lsecurity o)erlayL +ecause of its use as a
security layer for ot8er protocols.
1ecure 1ockets Layer !11L" an% Transport Layer 1ecurity !TL1" use
crypto6rap8y to secure communications o)er t8e Internet. 7ot8 protocols use a
L8an%s8akeL met8o% of aut8entication t8at in)ol)es a ne6otiation of network
parameters +etween t8e client an% ser)er mac8ines. To successfully initiate a
connectionG an aut8entication process in)ol)in6 certificates is use%. Certificates are
crypto6rap8ic keys t8at are store% on +ot8 t8e ser)er an% client.
(oint*To*(oint Tunnelin6 (rotocol !((T(" is anot8er tunnelin6 protocol use%
to connect a remote client to a pri)ate ser)er o)er t8e Internet. ((T( is one of t8e
most wi%ely use% '(N protocols +ecause of itMs strai68tforwar% confi6uration an%
maintenance an% also +ecause it is inclu%e% wit8 t8e $in%ows operatin6 system.
Layer 2 Tunnelin6 (rotocol !L2T(" is a protocol use% to tunnel %ata
communications traffic +etween two sites o)er t8e Internet. L2T( is often use% in
tan%em wit8 I(1ec !w8ic8 acts as a security layer" to secure t8e transfer of L2T( %ata
packets o)er t8e Internet. Unlike ((T(G a '(N implementation usin6 L2T(EI(1ec
re@uires a s8are% key or t8e use of certificates.
Typical '(N connections are eit8er Internet*+ase% or intranet*+ase%.
1.).0.2 Internet-2se% 1'Ns /
7y usin6 an Internet*+ase% '(N connectionG you can a)oi% lon6*%istance an%
1*499 telep8one c8ar6es w8ile takin6 a%)anta6e of t8e 6lo+al a)aila+ility of t8e
Internet.
1.).0.) Intrnet-2se% 1'Ns /
T8e intranet*+ase% '(N connection takes a%)anta6e of I( connecti)ity on an
or6aniDation intranet.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
,%&nt#e/-
1. Cost 1a)in6
2. Impro)e% 1cala+ility
3. Impro)e% 1ecurity
&. 7etter (erformance
,. ;le<i+ility an% Relia+ility
-. 0reater ccess to mo+ile user
Dis%&nt#e/-
1. Less 7an%wi%t8 t8an De%icate% Line
2. Lack of 1ecurity
1.).3 'erson( ,re Network -',N. /
(ersonal %e)ices of one in%i)i%ualH 3isE8er (CG laptopG cell p8oneG (D
To allow %e)ices to communicate an% work to6et8er.
To permit %e)ices to +ecome smarterH spontaneouslyG network an% work
to6et8er.
(Ns feasi+ility is 6rowin6 wit8 impro)ement of wireless tec8nolo6yH
7luetoot8 ena+lin6 %e)ices to communicate automatically an% wirelessly
w8en t8ey are in ran6e.
(Ns can keep porta+le %e)ices sync8roniDe% wit8 a %esktop (C.
.*clot8in6 pro%ucts !:acket" e@uippe% wit8 a +attery pack an% %e)ices.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
$
2. NETWORKING DE1ICE$
Computer network %e)ices also known as communication %e)ices an% t8ey
constitute a %ata communication network. Network components an% %e)ices are t8e
p8ysical entities connecte% to a network. T8ere are many types of network %e)ices
an% increasin6 %aily. T8e +asic network %e)ices areH Computers eit8er a (C or a
1er)erG 3u+sG 1witc8esG 7ri%6esG RoutersG 0atewaysG Network interface car%s !NICs"G
$ireless access points !$(s"G (rinters an% #o%ems. In an .t8ernet or $N
networkG t8e %ata communication cannot +e performe% wit8out t8ese %e)ices.
Network %e)ices are components use% to connect computers or ot8er electronic
%e)ices to6et8er so t8at t8ey can s8are files or resources like printers or fa< mac8ines.
, fu(( (ist of Computer networkin# %e&i!es is units t8at me%iate %ata in a computer
network. Computer networkin6 %e)ices are also calle% network e@uipmentG
Interme%iate 1ystems !I1" or Interworkin6 Unit !I$U". Units w8ic8 are t8e last
recei)er or 6enerate %ata are calle% 8osts or %ata terminal e@uipment. T8ese %e)ices
are +roken into two classifications.
.n% User De)ices H Inclu%e computersG printersG scannersG an% ot8er
%e)ices t8at pro)i%e ser)ices %irectly to t8e user.
Network %e)ices H Inclu%e all %e)ices t8at connect t8e en%*user %e)ices to
allow t8em to communicate.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
2
.n% user %e)ices t8at pro)i%e users wit8 a connection to t8e network are also
calle% 4osts.
T8ese %e)ices allow users to s8areG createG an% o+tain information. 3ost
%e)ices can e<ist wit8out a networkG +ut wit8out a networkG 8ost capa+ilities are
6reatly re%uce%. 3ost %e)ices are p8ysically connecte% to t8e network me%ia usin6 a
network interface car% !NIC". T8ey use t8is connection to perform t8e tasks of
sen%in6 e*mailsG printin6 reportsG scannin6 picturesG or accessin6 %ata+ases.
2.1 Repeter
Repeters are networkin6
%e)ices t8at e<ist at Layer 1G t8e
(8ysical layerG of t8e O1I reference
mo%el. To un%erstan% 8ow a repeater
worksG it is important to un%erstan% t8at
as %ata lea)es a source an% 6oes out o)er
t8e networkG it is transforme% into eit8er
electrical or li68t pulses t8at pass
alon6 t8e networkin6 me%ium.
T8ese pulses are calle% si6nals.
$8en si6nals lea)e a transmittin6
stationG t8ey are clean an% easily
reco6niDa+le. network repeater
is a %e)ice use% to e<pan% t8e
+oun%aries of a wire% or wireless
!$i;i" local area network !LN".
Repeaters are relati)ely simple pieces of e@uipment consistin6 of an antennaG
%uple<erG recei)er an% transmitter. T8e reason t8at repeaters are nee%e% is +ecause a
ra%ioMs power is limite% +y its antenna siDe. T8e purpose of a repeter is to re6enerate
incomin6 electricalG wireless or optical si6nals t8at are weaker si6nals an% t8en
+roa%cast it. $it8 p8ysical me%ia like .t8ernet or $i*;iG %ata transmissions can only
span a limite% %istance +efore t8e @uality of t8e si6nal %e6ra%es. Repeaters attempt to
preser)e si6nal inte6rity an% e<ten% t8e %istance o)er w8ic8 %ata can safely tra)el.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
'
Repeater is to retime network si6nals at +it le)elG allowin6 t8em to tra)el a lon6er
%istance on t8e me%ium. T8e term repeater ori6inally meant a sin6le port NinO %e)ice
an% a sin6le port NoutO %e)ice. To%ay multiple*port repeaters also e<ist. Repeaters are
classifie% as layer 1 %e)ices in t8e O1I mo%el +ecause t8ey act only on t8e +it le)el
an% look at no ot8er information.
2.2 5u2
T8e central connectin6 %e)ice in a computer network is known as a 8u+.
U$6 4u2 is a %e)ice t8at e<pan%s a sin6le U17 port into se)eral so t8at t8ere are
more ports a)aila+le to connect %e)ices to a 8ost system. .)ery computer is %irectly
connecte% wit8 t8e 8u+. $8en %ata packets arri)es at 8u+G it +roa%cast t8em to all t8e
LN car%s in a network an% t8e %estine% recipient picks t8em an% all ot8er computers
%iscar% t8e %ata packets. 3u+ 8as fi)eG ei68tG si<teen an% more ports an% one port is
known as uplink port. 3ere are t8ree types of network 8u+sH (assi)e 3u+sG cti)e
3u+s an% Intelli6ent 3u+s.
2.2.1 'ssi&e 5u2s / One of t8e types of a network 8u+ is t8e so*calle% passi)e 8u+.
ItMs a pass*t8rou68 t8at %oes not %o anyt8in6 more t8an Just +roa%cast si6nals it
recei)es t8rou68 its input portG t8en sen%s it out t8rou68 t8e output port. It %oes not %o
anyt8in6 to re6enerate or process t8e si6nals +ecause it only functions as a connector
of %ifferent wires in a topolo6y.
2.2.2 ,!ti&e 5u2s / n acti)e 8u+ works more t8an Just a connector +ut also
re6enerates t8e %ata +its to ensure t8e si6nals are stron6. not8er name for an acti)e
8u+ is a multiport repeater. It pro)i%es an acti)e participation in t8e network asi%e
from actin6 as an interface. It participates in t8e %ata communicationG suc8 as storin6
si6nals recei)e% t8rou68 t8e input portsG +efore forwar%in6 t8em. It can monitor t8e
%ata it is forwar%in6 an% sometimes 8elp impro)e si6nals +efore forwar%in6 t8em to
ot8er connections. 1uc8 a feature makes trou+les8ootin6 of network pro+lems easier.
2.2.) Inte((i#ent 5u2s / n intelli6ent 8u+ can perform e)eryt8in6 t8at t8e passi)e
8u+ an% acti)e 8u+ %oG an% 8elp mana6e t8e network resources effecti)ely to ensure
t8at t8e performance of t8e network is 8i68ly efficient. n intelli6ent 8u+ can 8elp in
trou+les8ootin6 +y pinpointin6 t8e actual location of t8e pro+lem an% 8elp i%entify t8e
root cause an% resolution. It is )ery a%apta+le to %ifferent tec8nolo6ies wit8out any
nee% to c8an6e its confi6uration. T8e intelli6ent 8u+ performs %ifferent functions suc8
as +ri%6in6G routin6G an% switc8in6 an%
network mana6ement.
3u+s are consi%ere% Layer 1
%e)ices +ecause t8ey only re6enerate
t8e si6nal an% repeat it out all t8eir
ports !network connections". 3u+s
amplify si6nals an% propa6ate si6nals
t8rou68 t8e network. 3u+s %o not
re@uire filterin6 an% pat8 %etermination
or switc8in6.
2.)6ri%#e
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
4
T8e +ri%6es use% in computer networkin6 are not like your typical +ri%6e.
2ri%#e %e)ice filters %ata traffic at a network +oun%ary. 7ri%6es ser)e a similar
function as switc8es. 7ri%6es re%uce t8e amount of traffic on a LN +y %i)i%in6 it
into two se6ments. +ri%6e works on t8e principle t8at eac8 network no%e 8as its
own a%%ress. +ri%6e forwar%s t8e packets +ase% on t8e a%%ress of t8e particular
%estination no%e. 7ri%6es operate at t8e %ata link layer !Layer 2" of t8e O1I mo%elG
w8ic8 means t8e +ri%6e cannot rea% I( a%%ressesG +ut only t8e outermost 8ar%ware
a%%ress of t8e packet. In our case t8e +ri%6e can rea% t8e .t8ernet %ata w8ic8 6i)es
t8e 8ar%ware a%%ress of t8e %estination a%%ressG not t8e I( a%%ress. T8e 8ar%ware
a%%ress is also calle% t8e #C !me%ia access control" a%%ress. 7ri%6es inspect
incomin6 traffic an% %eci%e w8et8er to forwar% or %iscar% it. To %etermine t8e
network se6ment a #C a%%ress +elon6s toG +ri%6es use one ofH
Transparent 7ri%6in6 * T8ey +uil% a ta+le of a%%resses !+ri%6in6 ta+le" as t8ey
recei)e packets. If t8e a%%ress is not in t8e +ri%6in6 ta+leG t8e packet is
forwar%e% to all se6ments ot8er t8an t8e one it came from. T8is type of +ri%6e
is use% on .t8ernet networks.
1ource route +ri%6in6 * T8e source computer pro)i%es pat8 information insi%e
t8e packet. T8is is use% on Token Rin6 networks.
7ri%6es can +e use% toH
.<pan% t8e %istance of a se6ment.
(ro)i%e for an increase% num+er of computers on t8e network.
Re%uce traffic +ottlenecks resultin6 from an e<cessi)e num+er of attac8e%
computers.
2.0 $wit!4
network swit!4 or swit!4in# 4u2 is a
computer networkin6 %e)ice t8at connects
network se6ments. 1witc8 is multi*port %e)ice.
networkin6 switc8 runs in full*%uple< mo%eG
meanin6 a mac8ine on t8e LN can recei)e an%
transmit %ata simultaneously. T8is is muc8
faster t8an a networkin6 4u2. In t8e Open
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
(
1ystems Interconnection !O1I" communications mo%elG a switc8 performs t8e layer2
or Data*Link*Link function. 1ome newer switc8es also perform routin6 functions
!layer3 or t8e Network layer functions in O1I" an% are sometimes calle% I( switc8es.
network swit!4 is a small 8ar%ware %e)ice t8at Joins multiple computers to6et8er
wit8in one local area network !LN".
1witc8 pro)i%es similar functions as a 8u+ or a +ri%6e +ut 8as more a%)ance%
features t8at can temporarily connect any two ports to6et8er. It contains a switc8
matri< or switc8 fa+ric t8at can rapi%ly connect an% %isconnect ports. Unlike 3u+G a
switc8 only forwar% frame from one port to t8e ot8er port w8ere t8e %estination no%e
is connecte% wit8out +roa%cast to all ot8er ports.
2.3 Router
In an en)ironment consistin6 of se)eral network se6ments wit8 %ifferent
protocols an% arc8itectureG a +ri%6e may
not +e a%e@uate for ensurin6 fast
communication amon6 all of t8e
se6ments. comple< network nee%s a
%e)iceG w8ic8 not only knows t8e a%%ress
of eac8 se6mentG +ut also can %etermine
t8e +est pat8 for sen%in6 %ata an%
filterin6 +roa%cast traffic to t8e local
se6ment. 1uc8 %e)ice is calle% a Router.
router is a %e)ice in computer
networkin6 t8at forwar%s %ata packets to
t8eir %estinationsG +ase% on t8eir
a%%resses. T8e work a router %oes it
calle% routin6G w8ic8 is somew8at like
switc8in6G +ut a router is %ifferent from a
switc8.
Routers work at t8e Network layer of t8e O1I mo%el meanin6 t8at t8e Routers
can switc8 an% route packets across multiple networks. T8ey %o t8is +y e<c8an6in6
protocol*specific information +etween separate networks. Routers 8a)e access to
more information in packets t8an +ri%6esG an% use t8is information to impro)e packet
%eli)eries. Routers are usually use% in a comple< network situation +ecause t8ey
pro)i%e +etter traffic mana6ement t8an +ri%6es an% %o not pass +roa%cast traffic.
Routers can s8are status an% routin6 information wit8 one anot8er an% use t8is
information to +ypass slow or malfunctionin6 connections. $8en %ata packets are
transmitte% o)er a network !say t8e Internet"G t8ey mo)e t8rou68 many routers
!+ecause t8ey pass t8rou68 many networks" in t8eir Journey from t8e source mac8ine
to t8e %estination mac8ine. Routers work wit8 I( packetsG meanin6 t8at it works at t8e
le)el of t8e I( protocol.
.ac8 router keeps information a+out its nei68+ors !ot8er routers in t8e same or
ot8er networks". T8is information inclu%es t8e I( a%%ress an% t8e costG w8ic8 is in
terms of timeG %elay an% ot8er network consi%erations. T8is information is kept in a
routin6 ta+leG foun% in all routers.
Routers %o not look at t8e %estination no%e a%%ressP t8ey only look at t8e
network a%%ress. Routers will only pass t8e information if t8e network a%%ress is
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
*
known. T8is a+ility to control t8e %ata passin6 t8rou68 t8e router re%uces t8e amount
of traffic +etween networks an% allows routers to use t8ese links more efficiently t8an
+ri%6es . Unlike +ri%6es an% switc8esG w8ic8 use t8e 8ar%ware*confi6ure% #C
a%%ress to %etermine t8e %estination of t8e %ataG routers use t8e lo6ic network a%%ress
suc8 as I( a%%ress to make %ecisions.
2.7 Network Interf!e Cr% -Et4ernet.
Network interface car%s !NICs" are installe% in a computer to allow it to
communicate wit8 a network.
T8ey pro)i%e a transparent
interface +etween t8e network
an% t8e computer.
n .t8ernet network
interface car% is installe% in an
a)aila+le slot insi%e t8e
computer. T8e NIC assi6ns a
uni@ue a%%ress calle% a #C
!me%ia access control" to t8e
mac8ine. T8e #Cs on t8e
network are use% to %irect traffic
+etween t8e computers. T8e +ack plate of t8e network interface car% features a port
t8at looks similar to a p8one JackG +ut is sli68tly lar6er. T8is port accommo%ates an
.t8ernet ca+leG w8ic8 resem+les a t8icker )ersion of a stan%ar% telep8one line.
.t8ernet ca+le must run from eac8 network interface car% to a central 8u+ or switc8.
T8e 8u+ or switc8 acts like a relayG passin6 information +etween computers usin6 t8e
#C a%%resses an% allowin6 resources like printers an% scanners to +e s8are% alon6
wit8 %ata.
NICs come in many s8apes an% siDes. T8ey can +e installe% internally or
e<ternallyG alt8ou68 an internal installation is more likely. T8e picture illustrates an
internally installe% !om2o -more t4n one t*pe of !onne!tion. car%. T8is car% is
somew8at unusual in t8at it supports t8ree connectionsH
T8e upper connection is an R803 female for UT' me%ia.
T8e mi%%le connection is a 6NC connector for t8in !o9i( me%ia.
T8e lower connection is a D6-13 connector for a t8ick .t8ernet &iper tp.
In or%er for a NIC to operate effecti)elyG it must +e a+le to carry out its interface
tasks wit8 minimum %isruption to t8e C(U of t8e computer in w8ic8 it is installe%.
;our met8o%s of NIC to computer %ata transfer are use%H
6us msterin# D", -%ire!t memor* !!ess.H
Data enters t8e NIC from t8e network.
T8e NICMs own C(U stores %ata in t8e NICMs R#.
NICMs C(U sen%s %ata to computerMs mot8er+oar% w8en t8e network
transmission is complete.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
)
T8e computerMs C(U is not interrupte% * t8e NICMs C(U 8as ultimate
responsi+ility for %ata transfer.
D",H
Data enters t8e NIC from t8e network.
T8e NICMs C(U interrupts t8e computerMs C(U.
T8e computerMs C(U stops ot8er tasks an% transfers t8e network %ata
into its R#.
'ro#rmme% I:O -input:output.H
Data enters t8e NIC from t8e network.
T8e NICMs C(U loa%s t8e network %ata into a mot8er+oar% IEO a%%ress.
T8e computerMs C(U c8ecks t8e IEO a%%ress for any network %ata.
If t8ere is any %ataG t8e computerMs C(U transfers t8e %ata to its R#.
$4re% memor*H
Data enters t8e NIC from t8e network.
T8e NICMs C(U stores t8e %ata in t8e NICMs R#.
T8e NICMs C(U interrupts t8e computerMs C(U.
T8e computerMs C(U stops ot8er tasks an% transfers t8e network %ata
into its R#.
2.; "o%em
mo%em !modulator-
demodulator" is a %e)ice t8at
mo%ulates an analo6 carrier si6nal to
enco%e %i6ital informationG an% also
%emo%ulates suc8 a carrier si6nal to
%eco%e t8e transmitte% information.
T8e 6oal is to pro%uce a si6nal t8at
can +e transmitte% easily an% %eco%e%
to repro%uce t8e ori6inal %i6ital %ata. #o%ems can +e use% o)er any means of
transmittin6 analo6 si6nalsG from %ri)en %io%es to ra%io.
T8e most familiar e<ample is a )oice +an% mo%em t8at turns t8e %i6ital %ata of
a personal computer into analo6 au%io si6nals t8at can +e transmitte% o)er a telep8one
line. #o%ems are 6enerally classifie% +y t8e amount of %ata t8ey can sen% in a 6i)en
timeG normally measure% in +its per secon% !+itEsG or +ps". T8ey can also +e classifie%
+y 7au%G t8e num+er of times t8e mo%em c8an6es its si6nal state per secon%.
,s*mmetri! Di#it( $u2s!ri2er +ine !,D$+" is one form of t8e Di6ital
1u+scri+er Line tec8nolo6yG a %ata communications tec8nolo6y t8at ena+les faster
%ata transmission o)er copper telep8one lines t8an a con)entional )oice +an% mo%em
can pro)i%e. It %oes t8is +y utiliDin6 fre@uencies t8at are not use% +y a )oice telep8one
call. CurrentlyG most D1L communication is full*%uple<. ;ull*%uple< D1L
communication is usually ac8ie)e% on a wire pair +y eit8er fre@uency*%i)ision %uple<
!;DD"G ec8o*cancellin6 %uple< !.CD"G or time*%i)ision %uple< !TDD". $it8 stan%ar%
D1LG t8e +an% from 2-.999 /3D to 132.42, k3D is use% for upstream
communicationG w8ile 134 k3D I 119& k3D is use% for %ownstream communication.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
+
2.< 1oI' -1oi!e o&er Internet 'roto!o(.
'oI( !'oice o)er Internet (rotocol" is simply t8e transmission of )oice traffic
o)er I(*+ase% networks. 'oI( is a 6eneral term for a family of transmission
tec8nolo6ies for %eli)ery of )oice communications o)er I( networks suc8 as t8e
internet or ot8er packe% switc8e% networks. 'oI( systems employ session control
protocols to control t8e set*up an% tear*%own of calls as well as au%io co%ec w8ic8
enco%e speec8 allowin6 transmission o)er
an I( network on %i6ital au%io )ia an
au%io stream.
T8ere are t8ree met8o%s of connectin6 to
a 'oI( networkH
Usin6 a 'oI( telep8one
Usin6 a LnormalL telep8one wit8 a
'oI( a%apter
Usin6 a computer wit8 speakers
an% a microp8one
2.<.1 T*pes of 1oI' C((s
'oI( telep8one calls can +e place% eit8er to ot8er 'oI( %e)icesG or to normal
telep8ones on t8e (1TN !(u+lic 1witc8e% Telep8one Network".
Calls from a 'oI( %e)ice to a (1TN %e)ice are commonly calle% L(C*to*
(8oneL callsG e)en t8ou68 t8e 'oI( %e)ice may not +e a (C.
Calls from a 'oI( %e)ice to anot8er 'oI( %e)ice are commonly calle% L(C*
to*(CL callsG e)en t8ou68 neit8er %e)ice may +e a (C.
2.= Gtew*
0ateways make communication possi+le +etween %ifferent arc8itectures an%
en)ironments. T8ey repacka6e an% con)ert %ata 6oin6 from one en)ironment to
anot8er so t8at eac8 en)ironment can un%erstan% t8e ot8erMs en)ironment %ata.
6ateway repacka6es information to matc8 t8e re@uirements of t8e %estination system.
0ateways can c8an6e t8e format of a messa6e so t8at it will conform to t8e
application pro6ram at t8e recei)in6 en% of t8e transfer.
6ateway links two systems t8at %o not use t8e sameH
Communication protocols
Data formattin6 structures
Lan6ua6es
rc8itecture
;or e<ampleG electronic mail 6atewaysG suc8 as F.&99 6atewayG recei)e messa6es
in one formatG an% t8en translate itG an% forwar% in F.&99 format use% +y t8e recei)erG
an% )ice )ersa.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
,
2.1> Conne!tors R8 03
Re#istere% 8!k-03, an ei68t*wire
connector use% commonly to connect
computers onto Local*area networks !LN"G
especially .t8ernets.
2.=.1 Confi#urin# stri#4t n% !ross pt!4
!or%s/
$tri#4t !onne!tionH It is use% in LN
En%1 En% 2
1. $8ite!oran6e" 1. $8ite!oran6e"
2. Oran6e 2. Oran6e
3. $8ite!6reen" 3. $8ite!6reen"
&. 7lue &. 7lue
,. $8ite!7lue" ,. $8ite!7lue"
-. 0reen -. 0reen
2. $8ite!7rown" 2. $8ite!7rown"
4. 7rown 4. 7rown
Cross !onne!tion/ It is use% in computer to computer %ata transform.
En%1 En% 2
1.$8ite!oran6e" 1.$8ite!0reen"
2.Oran6e 2.0reen
3.$8ite!6reen" 3.$8ite!Oran6e"
&.7lue &.7lue
,.$8ite!7lue" ,.$8ite!7lue"
-.0reen -.Oran6e
2.$8ite!7rown" 2.$8ite!7rown"
4.7rown 4.7rown
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
-
2.11 Dire!tion of trnsmission or Dt ?(ow/
Communication +etween two %e)ices can +e simple<G 8alf %uple<G an% full %uple<.

h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
$
2.11.1 $imp(e9
In simple< mo%eG t8e communication is uni%irectionalG as on a one way street.
Only one of t8e two %e)ices on a link can transmitP t8e ot8er can only recei)e. In
ot8er wor%sG 1imple< refers to one*way
communications w8ere one party is t8e
transmitter an% t8e ot8er is t8e recei)er.
n e<ampleH simple ra%ioG w8ic8 you
can recei)e %ata from stations +ut canMt
transmit %ata. /ey+oar%s an%
Tra%itional #onitors are e<ample of
simple< %e)ices. T8e key+oar% can only intro%uce inputP t8e monitor can only accept
output.
2.11.2 5(f-Dup(e9
In 8alf*%uple< mo%eG eac8 station can +ot8 transmit an% recei)eG +ut not at t8e
same time. $8en one %e)ice is sen%in6G t8e ot8er can only recei)eG an% )ice )ersa. It
refers to two*way communications
w8ere only one party can transmit at a
time. I.e. in +ot8 %irections +ut one at a
time. T8e entire capacity of a c8annel is
taken o)er +y w8ic8e)er of t8e two
%e)ices is transmittin6 at t8e time. T8e
8alf*%uple< mo%e is use% in cases
w8ere t8ere is no nee% for communication in +ot8 %irections at t8e same time.
.<ampleH a walkie*talkie an% C7!citiDen +an%"ra%ios .
2.11.) ?u((-Dup(e9
;ull*Duple<H*In full %uple< mo%eG +ot8 stations can transmit an% recei)e
simultaneously. It refers to t8e transmission of %ata in two %irections simultaneously.
;or e<ampleG a telep8one con)ersation
+ecause +ot8 parties can talk an% listen at
t8e same time. In full %uple< mo%e si6nals
6oin6 in eit8er %irection s8are t8e capacity
of t8e link. It can occur in two ways eit8er
two separate p8ysical pat8s or t8e capacity
of t8e c8annel is %i)i%e% +etween si6nals
tra)elin6 +ot8 %irections.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
2
). TR,N$"I$$ION "EDIU"
trnsmission me%ium is a material su+stance !soli%G li@ui% or 6as" w8ic8
can propa6ate ener6y wa)es. ;or e<ampleG t8e transmission me%ium for soun%
recei)e% +y t8e ears is usually airG +ut soli%s an% li@ui%s may also act as transmission
me%ia for soun%. In ot8er wor%G t8e transmission me%ium is t8e p8ysical pat8 +y
w8ic8 a messa6e tra)els from sen%er to recei)er. .<ample of Transmission me%ia
inclu%e twiste% Ipair wireG coa<ial ca+leG fi+er*optic ca+leG an% ra%io wa)es. T8e
a+sence of a material me%ium !t8e )acuum of empty space" can also +e t8ou68t of as
a transmission me%ium for electroma6netic wa)es suc8 as li68t an% ra%io wa)es.
1i6nals are usually transmitte% o)er some transmission me%ia t8at are +roa%ly
classifie% in to two cate6oriesH*
).1 Un#ui%e% "e%i/
T8is is t8e wireless me%ia t8at transport electroma6netic wa)es wit8out usin6
a p8ysical con%uctor. 1i6nals are +roa%cast t8rou68 air. T8is is %one t8rou68 ra%io
communicationG satellite communication an% cellular telep8ony.
).2 Gui%e% "e%i/
T8ese are t8ose t8at pro)i%e a con%uit from one %e)ice to anot8er t8at inclu%e
twiste%*pairG coa<ial ca+le an% fi+er*optic ca+le. si6nal tra)elin6 alon6 any of t8ese
me%ia is %irecte% an% is containe% +y t8e p8ysical limits of t8e me%ium. Twiste%*pair
an% coa<ial ca+le use metallic t8at accept an% transport si6nals in t8e form of
electrical current. Optical fi+er is a 6lass or plastic ca+le t8at accepts an% transports
si6nals in t8e form of li68t.
).) Twiste%-'ir C2(e /
twiste% pair consists of two con%uctors !normally copper"G eac8 wit8 its own
plastic insulationG twiste% to6et8erG as s8own in ;i6ure.
One of t8e wires is use% to carry si6nals to t8e recei)erG an% t8e ot8er is use% only as a
6roun% reference. T8e recei)er uses t8e %ifference +etween t8e two. In a%%ition to t8e
si6nal sent +y t8e sen%er on one of t8e wiresG interference !noise" an% crosstalk may
affect +ot8 wires an% create unwante% si6nals. If t8e two wires are parallelG t8e effect
of t8ese unwante% si6nals is not t8e same in +ot8 wires +ecause t8ey are at %ifferent
locations relati)e to t8e noise or crosstalk sources !e.6.G one is closer an% t8e ot8er is
fart8er". T8is results in a %ifference at t8e recei)er. 7y twistin6 t8e pairsG a +alance is
maintaine%. Twiste%*pair ca+le use% in communications is cate6ories in two %ifferent
cate6ories H
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
'
).).1 UT'
T8e most common twiste%*pair ca+le use% in communications is referre% to as
uns8iel%e% twiste%*pair !UT(".

).).2 $T'
I7# 8as also pro%uce% a )ersion of twiste%*pair ca+le for its use calle%
s8iel%e% twiste%*pair !1T(". 1T( ca+le 8as a metal foil or +rai%e%*mes8 co)erin6 t8at
encases eac8 pair of insulate% con%uctors. lt8ou68 metal casin6 impro)es t8e @uality
of ca+le +y pre)entin6 t8e penetration of noise or crosstalkG it is +ulkier an% more
e<pensi)e
).0 Co9i( !2(e
Co9i( !2(eG or !o9G is an electrical ca+le wit8 an inner con%uctor
surroun%e% +y a fle<i+leG tu+ular insulatin6 layerG surroun%e% +y a tu+ular con%uctin6
s8iel%.


Coa<ial ca+le is use% as a transmission line for ra%io fre@uency si6nalsG in
applications suc8 as connectin6 ra%io transmitters an% recei)ers wit8 t8eir antennasG
computer network !Internet" connectionsG an% %istri+utin6 ca+le tele)ision si6nals.
One a%)anta6e of coa< o)er ot8er types of transmission line is t8at in an i%eal coa<ial
ca+le t8e electroma6netic fiel% carryin6 t8e si6nal e<ists only in t8e space +etween t8e
inner an% outer con%uctors. T8is allows coa<ial ca+le runs to +e installe% ne<t to
metal o+Jects suc8 as 6utters wit8out t8e power losses t8at occur in ot8er transmission
linesG an% pro)i%es protection of t8e si6nal from e<ternal electroma6netic interference.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
4
).3 Opti!( ?i2er
n opti!( fi2er !2(e is a ca+le containin6 one or more optical fi+ers. T8e
optical fi+er elements are typically in%i)i%ually coate% wit8 plastic layers an%
containe% in a protecti)e tu+e suita+le for t8e en)ironment w8ere t8e ca+le will +e
%eploye%. Optical ;i+er consists of t8in 6lass fi+ers t8at can carry information at
fre@uencies in t8e )isi+le li68t spectrum an% +eyon%.
T8e typical optical fi+er consists of a )ery narrow stran% of 6lass calle% t8e
Core. typical Core %iameter is -2., microns !1 micron Q 19*- meters". roun% t8e
Core is a concentric layer of 6lass calle% t8e Cla%%in6. Typically Cla%%in6 8as a
%iameter of 12, microns .Coatin6 t8e cla%%in6 is a protecti)e coatin6 consistin6 of
plasticG it is calle% t8e :acket. Its purpose is to pro)i%e protection for t8e cla%%in6 an%
core a6ainst suc8 8aDar%s as a+rasion an% moisture.
T8ere are 3 primary types of transmission mo%es usin6 optical fi+erH T8ey are
a" 1tep #o%e In%e<
+" 0ra%e% #o%e In%e<
c" 1in6le #o%e In%e<
$tep "o%e In%e9 8as a lar6e core t8e li68t rays ten% to +ounce aroun%G
reflectin6 off t8e cla%%in6G insi%e t8e core. T8is causes some rays +ounce +ack an%
fort8 takin6 a lon6er pat8. 1ome take t8e %irect pat8 wit8 8ar%ly one reflections takin6
s8orte% pat8.
T8e result is t8at t8e li68t rays arri)e at t8e recei)er at %ifferent times. T8e
si6nal +ecomes lon6er t8an t8e ori6inal si6nal. Typical Core %iameter is -2., microns
an% cla%%in6 %iameter is 12, microns. L.D li68t sources are use%.
Gr%e% "o%e In%e9 8as a 6ra%ual c8an6e in t8e CoreMs Refracti)e In%e<.
T8is causes t8e li68t rays to +e 6ra%ually +ent +ack into t8e core pat8. T8is is
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
(
represente% +y a cur)e% reflecti)e pat8. T8e result is a +etter recei)e si6nal t8an 1tep
In%e<. Typical Core %iameterH &2., microns C cla%%in6 %iameter 1&,., microns. L.D
li68t sources are use%.
$in#(e "o%e In%e9 8as separate %istinct Refracti)e In%e<es for t8e cla%%in6
an% core. T8e li68t ray passes t8rou68 t8e core wit8 relati)ely few reflections off t8e
cla%%in6. 1in6le #o%e is use% for a sin6le source of li68t !one color" operation. T8e
core %iameter is )ery smallH 5 microns C cla%%in6 %iameter is 122., microns. It
re@uires a laser.
).7 Comprison of Different mo%e of Opti!( ?i2ers/
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
*
0. TR,N$"I$$ION I"',IR"ENT
1i6nals tra)el t8rou68 transmission me%iaG w8ic8 are not perfect. T8e
imperfection causes si6nal impairment. T8is means t8at t8e si6nal at t8e +e6innin6 of
t8e me%ium is not t8e same as t8e si6nal at t8e en% of t8e me%ium. $8at is sent is not
w8at is recei)e%. T8ree causes of impairment are attenuationG %istortionG an% noise.
0.1 ,ttenution
ttenuation means a loss of ener6y. $8en a si6nalG simple or compositeG
tra)els t8rou68 a me%iumG it loses some of its ener6y in o)ercomin6 t8e resistance of
t8e me%ium. To compensate for t8is lossG amplifiers are use% to amplify t8e si6nal.
;i6ure s8ows t8e effect of attenuation an% amplification.
De!i2e(
To s8ow t8at a si6nal 8as lost or 6aine% stren6t8G en6ineers use t8e unit of t8e
%eci+el. T8e %eci+el !%7" measures t8e relati)e stren6t8s of two si6nals or one si6nal
at two %ifferent points. Note t8at t8e %eci+el is ne6ati)e if a si6nal is attenuate% an%
positi)e if a si6nal is amplifie%.
%7 Q19 lo619 p2Ep1
0.2 Distortion
Distortion means t8at t8e si6nal c8an6es its form or s8ape. Distortion can
occur in a composite si6nal ma%e of %ifferent fre@uencies. .ac8 si6nal component 8as
its own propa6ation spee% !see t8e ne<t section" t8rou68 a me%ium an%G t8ereforeG its
own %elay in arri)in6 at t8e final %estination. Differences in %elay may create a
%ifference in p8ase if t8e %elay is not e<actly t8e same as t8e perio% %uration. In ot8er
wor%sG si6nal components at t8e recei)er 8a)e p8ases %ifferent from w8at t8ey 8a% at
t8e sen%er. T8e s8ape of t8e composite si6nal is t8erefore not t8e same. ;i6ure s8ows
t8e effect of %istortion on a composite si6nal.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
)
0.) Noise
Noise is anot8er cause of impairment. 1e)eral types of noiseG suc8 as t8ermal
noiseG in%uce% noiseG crosstalkG an% impulse noiseG may corrupt t8e si6nal. T8ermal
noise is t8e ran%om motion of electrons in a wire w8ic8 creates an e<tra si6nal not
ori6inally sent +y t8e transmitter. In%uce% noise comes from sources suc8 as motors
an% appliances. T8ese %e)ices act as sen%in6 a antennaG an% t8e transmission me%ium
acts as t8e recei)in6 antenna. Crosstalk is t8e effect of one wire on t8e ot8er. One
wire acts as a sen%in6 antenna an% t8e ot8er as t8e recei)in6 antenna. Impulse noise is
a spike !a si6nal wit8 8i68 ener6y in a )ery s8ort time" t8at comes from power linesG
li68tnin6. ;i6ure s8ows t8e effect of noise on a si6nal.
0.).1 $i#n(-to-Noise Rtio -$NR.
s we will see laterG to fin% t8e t8eoretical +it rate limitG we nee% to know t8e
ratio of t8e si6nal power to t8e noise power. T8e si6nal*to*noise ratio is %efine% as
1NR Q a)era6e si6nal powerEa)era6e noise power
1NR is actually t8e ratio of w8at is wante% !si6nal" to w8at is not wante% !noise".
8i68 1NR means t8e si6nal is less corrupte% +y noiseP a low 1NR means t8e si6nal is
more corrupte% +y noise. s 1NR is t8e ratio of two powersG it is often %escri+e% in
%eci+el unitsG 1NR %7 G %efine% as
1NR
cm
Q19 lo6
19
1NR
0.).2 T4rou#4put
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
+
T8e t8rou68put is a measure of 8ow fast can sen% %ata t8rou68 a network. In
ot8er wor%sG t8e +an%wi%t8 is a potential measurement of a linkG t8e t8rou68put is an
actual measurement of 8ow fast %ata can sen%.
3. ,CCE$$ 'OINT
n access point is not8in6 +ut a router t8at releases I(. ccess point 6ets its I(
a%%ress ran6e from t8e port a%%ress of t8e switc8 as port of switc8es are confi6ure%
accor%in6 to 'LN. ccess points are confi6ure% an% installe% accor%in6 o t8e si6nal
location etc.
T8ey 8a)e 1& +roa%castin6 c8annels of 22 #3D eac8 an% separate% +y , #3D
6uar% +an%. If two %e)ices come un%er same c8annel t8en t8ey will esta+lis8 pat8 in a
loop wit8 eac8 ot8er. In t8is case t8ey can communicate wit8 eac8 ot8er only an% not
wit8 any ot8er %e)ice. ll access points are connecte% to mana6e% switc8 from w8ere
D3C( ser)er is connecte% in %ata centre. ;rom access points stations are connecte%.
$e can also confi6ure access point as D3C( ser)er. ccess points can release up to a
ma<imum of -9 I( a%%resses an% it )aries wit8 t8e %e)ice. ccess point %e)ices can
confi6ure #C a%%ress wit8in itself. ccess points are %istin6uis8e% +y 11ID
!1er)ice 1et I%entifier" an% we can 8a)e multiple 11ID to allocate particular
+an%wi%t8. It also 8elps in mana6in6 access points. ccess points are mainly use% in
$i*;i tec8nolo6y to transmit %ata to an% from wireless clients.
3.1 W4t is Wi-?i@
$i*;i stan%s for wireless fidelity. It is a wireless tec8nolo6y t8at uses ra%io
fre@uency to transmit %ata t8rou68 t8e air. $i*;i stan%ar%s use t8e .t8ernet protocol
an% C1#ECD !Carrier 1ense #ultiple ccess wit8 Collision Detection" for pat8
s8arin6. In s8ort wi*fi is meant to +e use% 6enerically w8en referrin6 to any type of
492.11 networks.
ccess points are confi6ure% usin6 t8e 492.11 stan%ar%s. 492.11 refers to a
family of specifications %e)elope% +y I... for wireless LN tec8nolo6y. 492.11
specifies an o)er*t8e*air interface +etween a wireless client an% a +ase station or
+etween two wireless clients. T8ere are se)eral specifications in 492.11 familyH*
492.11a
492.11+
492.11e
492.11f
492.116
492.118
492.11i
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








2
,
<>2.11
T8e ori6inal $LN stan%ar%. 1upports 1#+ps to 2 #+ps.
1pectrum 2.& 03D.
Layer 3 %ata rate 1.2#+ps.
Transmission ;311ED111.
Limite% +it rate +ut 8i68er ran6e.
<>2.11
3i68 spee% $LN stan%ar% for , 03D +an% spectrum.
1upports ,& #+ps.
Layer 3 %ata rate 33#+ps.
Transmission t8rou68 O;D#.
1mallest ran6e of all 492.11 stan%ar%s +ut 8i68er +it rate in
less crow%e% spectrum.
<>2.112
$LN stan%ar% for 2.& 03D +an%.
1upports a ma<imum of 11 #+ps.
Layer 3 %ata rate -*2 #+ps.
Transmission +y D111.
Compati+le wit8 492.11
$i%ely %eploye% %ue to 8i68er ran6e +ut +it rate is too slow
for many emer6in6 applications.
<>2.11e
%%ress @uality of ser)ice re@uirements for all I... $LN
ra%io interfaces.
<>2.11f
Defines inter*access point communications to facilitate
multiple )en%or*%istri+ute% $LN networks.
<>2.11#
.sta+lis8es an a%%itional mo%ulation tec8ni@ue for 2.& 03D
+an%.
Inten%e% to pro)i%e spee%s up to ,& #+ps.
Layer 3 %ata rate is 32 #+ps.
Transmission t8rou68 O;D#.
Compati+le wit8 492.11 an% 492.11+ %ue to narrow
spectrum.
Inclu%es muc8 6reater security.
<>2.114 Defines spectrum mana6ement of , 03D +an% for use in
.urope an% sia (acific.
<>2.11i %%ress t8e current security weakness for +ot8 aut8entication
an% encryption protocols.
T8e stan%ar% encompasses 492.1FG T/I(G an% .1
protocols.
.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
-

3.2 T*pes of ,!!ess 'oints/
Different types of access points are a)aila+le in t8e market now*a*%ays like*
)aya (*-G #otorola (*,131G D*Link D$L*3299(G CiscoG Linksys etc.
3.2.1 "otoro( ,'-31)1/
E(e!tri!( C4r!teristi!s /
Operatin6 'olta6e &4 '%c !Nom"
Operatin6 current 299 m !(eak" R &4 '%c
129 m !Nom" R &4 '%c
R%io C4r!teristi!s /
Transmitter (ower 22 %7m #a<imum !countryG c8annel an% %ata
rate %epen%ent"
492.11+E6
15 %7m SE* %7m R1G 2G ,.,G 11 #+ps
15 %7m SE* %7m R- an% 5 #+ps
14 %7m SE* %7m R12 an% 14 #+ps
12 %7m SE* %7m R2& an% 3- #+ps
1- %7m SE* %7m R&4 an% ,& #+ps
492.11a
12 %7m SE* %7m R- an% 5 #+ps
1- %7m SE* %7m R12 an% 14 #+ps
1, %7m SE* %7m R2& an% 3- #+ps
1& %7m SE* %7m R&4 an% ,& #+ps
Operatin6 C8annels 492.11a ra%io* C8annels 1*3, !&529*,42, #3D"
492.11+E6 ra%io* C8annels 1*13 !2&12*2&22
#3D"
Ra%io Data Rates 492.11a ra%io -G 5G 12G 14G 2&G 3-G &4 an% ,&
#+itEsec
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
$
492.116 ra%io -G 5G 12G 14G 2&G 3-G &4 an% ,&
#+itEsec
492.11+ ra%io 1G 2G ,.,G 11 #+ps
$ireless #e%ium Direct 1e@uence 1prea% 1pectrum !D111"
Ort8o6onal ;re@uency Di)ision #ultiple<in6
!O;D#"
,ntenn Options /
7ot8 Ra%io 1 an% Ra%io 2 re@uire 1 antenna an% can optimally use two
antennas per ra%io !& antennas total for %ual*ra%io mo%els". Two antennas per ra%io
pro)i%e %i)ersity t8at can impro)e performance an% si6nal reception. #otorola
supports 2 antenna suites for t8e (*,131. Ra%io 1 supports t8e 2.& 03D ra%io an%
Ra%io 2 refers to t8e (*,131 ,.2 03D ra%io. 3owe)erG t8ere coul% +e some cases
w8ere a %ual*ra%io (*,131 is performin6 a Ro6ue ( %etector function. In t8is
scenarioG t8e (*,131 is recei)in6 in eit8er 2.& 03D or ,.2 03D o)er Ra%io 1 or
Ra%io 2 antennas %epen%in6 on w8ic8 ra%io is selecte% for t8e scan.
+ED in%i!tors /
(*,131 utiliDes se)en L.D in%icators. ;i)e L.Ds %isplay wit8in four L.D
slots on t8e front of t8e (*,131 !on top of t8e (*,131 8ousin6" an% two L.Ds !for
a+o)e t8e ceilin6 installations" are locate% on t8e +ack of t8e %e)ice !t8e si%e
containin6 t8e LNG $N an% antenna connectors". T8e fi)e (*,131 top 8ousin6
L.Ds 8a)e t8e followin6 %isplay an% functionalityH*
7oot an% (ower 1tatus 1oli% w8ite in%icates t8e (*,131 is a%e@uately
powere%.
.rror Con%itions 1oli% re% in%icates t8e (*,131 is e<periencin6
a pro+lem con%ition re@uirin6 imme%iate
attention.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
2
.t8ernet cti)ity ;las8in6 w8ite li68t in%icates %ata transfers an%
.t8ernet acti)ity.
492.11a Ra%io cti)ity ;lickerin6 am+er in%icates +eacons an% %ata
transfers o)er t8e (*,131 492.11a ra%io.
492.11+E6 Ra%io cti)ity ;lickerin6 6reen in%icates +eacons an% %ata
transfers o)er t8e (*,131 492.11+E6 ra%io.
T8e L.Ds on t8e rear of t8e (*,131 are )iewe% usin6 a sin6le !customer
installe%" e<ten%e% li68t pipeG a%Juste% as re@uire% to suit a+o)e t8e ceilin6
installations. T8e L.Ds %isplaye% usin6 t8e li68t pipe 8a)e t8e followin6 colour
%isplay an% functionalityH*
7oot an% (ower 1tatus 1oli% w8ite in%icates t8e (*,131 is a%e@uately
powere%.
.rror Con%itions 7linkin6 re% in%icates t8e (*,131 Ro6ue (
Detection feature 8as locate% a ro6ue %e)ice.
1oli% re% in%icates t8e (*,131 is e<periencin6
a pro+lem con%ition re@uirin6 imme%iate
attention.
3.) ,'-31)1 Confi#urtion /
1. 1tart +rowser an% enter t8e followin6 I( a%%ress in t8e a%%ress fiel%
8ttpHEE19.1.1.1
T8e (*,131 lo6in screen %isplays.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
'
2. Lo6 in usin6 Ta%minK as t8e %efault user ID an% TmotorolaK as t8e %efault
passwor%. If t8e %efault lo6in is successfulG t8e TC8an6e %min (asswor%K
win%ow %isplays.
3. C8an6e t8e passwor%.
To %efine +asic (*,131 confi6urationH
$. 1elect 1ystem Confi6uration Uuick 1etup from t8e (*,131 menu tree.
2. .nter a T1ystem NameK for t8e (*,131. T8e system name is useful if
multiple %e)ices are +ein6 a%ministere%.
3. 1elect t8e TCountryK for t8e (*,131Ks country of operation from t8e %rop*
%own menu.
T8e (*,131 prompts t8e user for t8e correct country co%e on t8e first lo6in.
warnin6 messa6e also %isplays statin6 t8at an incorrect country settin6 may result in
ille6al ra%io operation. 1electin6 t8e correct country is central to le6ally operatin6 t8e
(*,131. .ac8 country 8as its own re6ulatory restrictions concernin6 electroma6netic
emissions an% t8e ma<imum R; si6nal stren6t8 t8at can +e transmitte%. To ensure
compliance wit8 national an% local lawsG +e sure to set.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
4
&. Optionally enter t8e I( a%%ress of t8e ser)er use% to pro)i%e system time to t8e
(*,131 wit8in t8e Time 1er)er fiel%.
Once t8e I( a%%ress is entere%G t8e (*,131Ks Network Time (rotocol !NT("
functionality is en6a6e% automatically.
(. Click $N ta+ to set minimum set of parameters for usin6 t8e $N
interface.
a. 1elect t8e T.na+le $N InterfaceK c8eck+o< to ena+le a connection
+etween t8e (*,131 an% a lar6er network or outsi%e worl% t8rou68 t8e
$N port. Disa+le t8is option to effecti)ely isolate t8e (*,131Ks $N
connection. No connections to a lar6er network or t8e internet will +e
possi+le. #Us cannot communicate +eyon% t8e confi6ure% su+nets.
+. 1elect t8e TT8is Interface is a D3C( ClientK c8eck+o< to ena+le D3C( for
t8e (*,131 $N connection. T8is is usefulG if t8e tar6et corporate
network or Internet 1er)ice (ro)i%er !I1(" uses D3C(.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
(
c. 1pecify an TI( a%%ressK for t8e (*,131Ks $N connection.
%. 1pecify a T1u+net #askK for t8e (*,131Ks $N connection. T8is
num+er is a)aila+le from t8e I1( for a D1L or a ca+le*mo%em connection
or from an a%ministrator if t8e (*,131 connects to a lar6er network.
e. 1pecify a TDefault 0atewayK a%%ress for t8e (*,131Ks $N connection.
T8e I1( or a network a%ministrator pro)i%es t8is a%%ress.
f. 1pecify t8e a%%ress of a T(rimary DN1 1er)erK. T8e I1( or a network
a%ministrator pro)i%es t8is a%%ress.
1. Optionally use t8e T.na+le ((( o)er .t8ernetK c8eck+o< to ena+le point*to*
point o)er .t8ernet !(((o." for a 8i68 spee% connection t8at supports t8is
protocol.
a. 1elect t8e T/eep li)eK c8eck+o< to ena+le occasional communications
o)er t8e $N port e)en w8en t8e client communications to t8e $N are
i%le. 1ome I1(s terminate inacti)e connectionsG w8ile ot8ers %o not. In
eit8er caseG ena+lin6 /eep*li)e maintains t8e $N connectionG e)en
w8en t8ere is no traffic. If t8e I1( %rops t8e connection after t8e i%le timeG
t8e (*,131 automatically re*esta+lis8es t8e connection to t8e I1(.
+. 1pecify a TUsernameK entere% w8en connectin6 to t8e I1(.
c. 1pecify a passwor% entere% w8en connectin6 to t8e I1(.
1. Click t8e TLNK ta+ to set a minimum set of parameters to use t8e (*,131
LN interface.

h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
*
a. 1elect t8e T.na+le LN InterfaceK c8eck+o< to forwar% %ata traffic o)er
t8e (*,131 LN connection. T8e LN connection is ena+le% +y %efault.
+. Use TT8is InterfaceK %rop*%own menu to specify 8ow network a%%ress
information is %efine% o)er t8e (*,131Ks LN connection. 1elect TD3C(
ClientK if t8e lar6er corporate network uses D3C(. 1elect TD3C( 1er)erK
to use t8e (*,131 as a D3C( ser)er o)er t8e LN connection.
c. .nter t8e network*assi6ne% TI( %%ressK of t8e (*,131.
%. T8e T1u+net #askK %efines t8e siDe of t8e su+net.
e. .nter a TDefault 0ateway to %efine t8e I( a%%ress of a router t8e (*,131
uses on t8e .t8ernet as its %efault 6ateway.
f. .nter t8e T(rimary DN1 1er)erK I( a%%ress.
6. If usin6 D3C( 1er)er use t8e T%%ress ssi6nment Ran6eK parameter to
specify a ran6e of I( a%%ress reser)e% for mappin6 clients to t8e I(
a%%resses.
1. .na+le t8e ra%io!s" usin6 t8e TRa%io .na+leK c8eck+o<!es". If usin6 a sin6le
ra%io mo%elG ena+le t8e ra%ioG t8en select eit8er 492.11a!,03D" or
492.11+E6!2.&03D" from t8e TR; 7an% of OperationK fiel%.
2. 1elect t8e T$LNV1K ta+ to %efine its .11ID security sc8eme for +asic
operation.
a. .nter t8e .11ID !.<ten%e% 1er)ices 1et I%entification" an% name
associate% wit8 t8e $LN.
+. Use t8e T)aila+le OnK c8eck+o<es to %efine w8et8er t8e tar6et $LN is
operatin6 o)er t8e 492.11a or 492.11+E6 ra%io. .nsure t8e ra%io selecte%
8as +een ena+le%.
c. .)en an (*,131 confi6ure% wit8 minimal )alues must protect its %ata
a6ainst t8eft an% corruption. security policy s8oul% +e confi6ure% for
$LN1 as part of +asic confi6uration outline% in t8is 6ui%e.
1. Click TpplyK to sa)e any c8an6es to t8e (*,131 Uuick 1etup screen.
$tti! WE' ke*s/
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
)
$ire% .@ui)alent (ri)acy !$.(" is a part of 492.11 specifications. 1tatic
$.( key operation re@uires keys on t8e client an% ( t8at are use% to encrypt %ata
sent +etween t8em. $it8 $.( encryptionG sniffin6 is eliminate% an% session
8iJackin6 is %ifficult !or impossi+le". Client an% ( are confi6ure% wit8 a set of &
keysG an% w8en %ecryptin6 eac8 is use% in turn until %ecryption is successful. T8is
allows keys to +e c8an6e% %ynamically.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
+
To !onfi#ure WE'12< /
1. ;rom t8e (*,131 Uuick 1etup 1creen. Click t8e TCreateK +utton to t8e ri68t
of t8e 1ecurity (olicy item.
T8e TNew 1ecurity (olicyK screen %isplays wit8 t8e T#anually (re*s8are%
keyENo aut8enticationK an% TNo .ncryptionK options selecte%.
2. .nsure t8e TNameK of t8e security policy entere% suits t8e inten%e%
confi6uration or function of t8e policy. #ultiple $LNs can s8are t8e same
security policy.
3. 1elect t8e T$.( 124 !19& +it key" c8eck+o<. T8e T$.( 124 1ettin6K fiel%
%isplays wit8in t8e TNew 1ecurity (olicyK screen.
&. Confi6ure t8e T$.( 124 1ettin6K fiel% as re@uire% to %efine t8e pass key use%
to 6enerate t8e $.( keys.
,. Click t8e TpplyK +utton to sa)e t8e security policy an% return to t8e T(*,131
Uuick 1etupK screen.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








'
,
7. $WITC5
LN switc8 is a local area networkin6 %e)ice t8at pre)ents %ata packet
collisionG an% ma<imiDes transmission spee% as well as +an%wi%t8 allocation. T8is is a
6oo% replacement to a network 8u+ an% sol)es pro+lems associate% wit8 e<pan%in6
networks.
1witc8 is an intelli6entG acti)e 8u+ t8at esta+lis8esG maintainsG an% c8an6es lo6ical
connections o)er p8ysical circuits. 1witc8es fle<i+ly connect transmitters an%
recei)ers across networks of interconnecte% ports an% linksG t8ere+y allowin6 network
resources to +e s8are% +y lar6e num+ers of en% users. LN switc8es are packet
switc8es t8at can support multiple simultaneous transmissionsG rea%in6 t8e %estination
a%%ress of eac8 frame an% forwar%in6 it %irectly to t8e port associate% wit8 t8e tar6et
%e)ice. T8ere is a fi6ure of switc8 wit8 4 ports.
7.1 TA'E O? $WITC5E$
$8en we use t8e term switc8, we must +e careful +ecause a switc8 can mean
two %ifferent t8in6s. $e must clarify t8e term +y a%%in6 t8e le)el at w8ic8 t8e %e)ice
operates. $e can 8a)e a two*layer switc8 or a t8ree*layer switc8. t4ree-(*er
swit!4 is use% at t8e network layerP it is a kin% of router. T8e two-(*er swit!4
performs at t8e p8ysical an% %ata link layers.
7.1.1 Two-+*er $wit!4es
switc8 works at Layer 2 of t8e O1I mo%el !%ata*link". It is a LN %e)ice
t8at can also +e calle% a multi*port +ri%6e. switc8 switc8es .t8ernet frames +etween
.t8ernet %e)ices. T8is switc8es %o not care a+out I( a%%resses nor %o t8ey e)en
e<amine I( a%%resses as t8e frames flow t8rou68 t8e switc8. 3owe)erG unlike a 8u+
t8at Just %uplicates %ata an% sen%s it out all ports.
two*layer switc8G as a +ri%6e %oesG makes a filterin6 %ecision +ase% on t8e
#C a%%ress of t8e frame it recei)e%. 3owe)erG a two*layer switc8 can +e more
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
-
sop8isticate%. It can 8a)e a +uffer to 8ol% t8e frames for processin6. It can 8a)e a
switc8in6 factor t8at forwar%s t8e frames faster. 1ome new two*layer switc8esG calle%
cut-through switc8esG 8a)e +een %esi6ne% to forwar% t8e frame as soon as t8ey c8eck
t8e #C a%%resses in t8e 8ea%er of t8e frame.
+ri%6e wit8 a few ports can connect a few LNs to6et8er. +ri%6e wit8
many ports may +e a+le to allocate a uni@ue port to eac8 stationG wit8 eac8 station on
its own in%epen%ent entity. T8is means no competin6 traffic !no collisionG as we saw
in .t8ernet".
7.1.2 T4ree-+*er $wit!4es
routerG on t8e ot8er 8an%G works at Layer 3 of t8e O1I mo%el !Network". It
is a $N %e)ice t8at connects a LN to a $N or a su+nette% LN to anot8er
su+nette% LN. router routes I( packets +etween I( networks. Routers %o t8is
usin6 an I( routin6 ta+le. In t8at ta+leG t8ey 8a)e eit8er static or %ynamic routes.
$8en an I( packet comes inG t8e router looks up t8e %estination I( in t8e I( routin6
ta+le. If t8at %estination I( is not foun% in t8e ta+le t8e router %rops t8e packetG unless
it 8as a %efault route. Routers form +roa%cast %omains +ecause t8ey %rop +roa%cast
packets. t8ree*layer switc8 is a routerG +ut a faster an% more sop8isticate%. T8e
switc8in6 fa+ric in a t8ree*layer switc8 allows faster ta+le lookup an% forwar%in6.
ccor%in6 to t8e confi6uration an% monitorin6 capa+ility of switc8es. It cate6ories in
to two cate6ories t8at isG "n#e% an% Unmn#e% 1witc8es.
Unmn#e% swit!4es /
n unmana6e% switc8 simply allows .t8ernet %e)ices to communicate wit8
one anot8erG suc8 as a (C or network printerG an% t8ose are typically w8at we call
Nplu6 an% play.O T8ey are s8ippe% wit8 a fi<e% confi6uration an% %o not allow any
c8an6es to t8is confi6uration.
"n#e% swit!4es /
#ana6e% switc8es pro)i%e all t8e features of an unmana6e% switc8 an%
pro)i%e t8e a+ility to confi6ureG mana6eG an% monitor your LN. n% t8is 6i)es you
6reater control o)er 8ow %ata tra)els o)er t8e network an% w8o 8as access to it. lsoG
mana6e% switc8es use protocols suc8 as t8e 1imple Network #ana6ement (rotocolG
or w8at we call 1N#(G for monitorin6 t8e %e)ices on t8e network. 1N#( is a
protocol t8at facilitates t8e e<c8an6e of mana6ement information +etween network
%e)ices. 1N#( @ueries can %etermine t8e 8ealt8 of t8e network or t8e status of a
particular %e)ice. 7y %isplayin6 t8is %ata in an easily un%erstoo% formatG IT mana6ers
locate% at a central site can monitor t8e performance of t8e network an% @uickly
%etect an% repair network pro+lems wit8out 8a)in6 to p8ysically interact wit8 t8e
switc8.
not8er important feature of a mana6e% switc8 is re%un%ancy. Re%un%ancy
pro)i%es t8e a+ility to safe6uar% a network in case a connection or ca+le fails +y
pro)i%in6 an alternate %ata pat8 for traffic. #ana6e% switc8es incorporate w8at is
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
$
calle% 1pannin6 Tree (rotocol stan%ar%G or 1T(G to pro)i%e pat8 re%un%ancy in t8e
network. Usin6 t8e spannin6*tree al6orit8mG 1T( pro)i%es re%un%ant pat8s w8ile
pre)entin6 loops t8at are create% +y multiple acti)e pat8s +etween switc8es. 1T(
allows for one acti)e pat8 at a time +etween two network %e)icesG pre)entin6 loops
an% esta+lis8in6 t8e re%un%ant links as a +ackup to keep inte6rate% systems a)aila+le
an% pre)entin6 e<pensi)e %owntimeG w8ic8 network a%ministrator can appreciate.
7.2 +,N $wit!4 "e!4nism n% Its ,%&nt#es
In a network w8ere a LN switc8 is use%G eac8 no%e 6ets a %irect connection
to a switc8. T8at isG a no%e 6ets a %e%icate% connection to t8e switc8 w8ic8 only it
!t8e no%e or t8e computer" an% t8e switc8 use. T8is %e%icate% connection makes it
possi+le for one no%e to ma<imiDe use of t8e +an%wi%t8 a)aila+le to it. fter allG no
ot8er no%e is competin6 wit8 it for +an%wi%t8. T8is means spee%y %ata transmission.
#oreo)erG t8e connection +etween t8e no%e an% t8e switc8 can +e ma%e usin6
ca+lin6 w8ic8 8as a separate route for %ata t8at t8e no%e is sen%in6 out an% a separate
route for %ata t8at t8e switc8 is forwar%in6 to t8e no%e. T8is eliminates pro+lems of
%ata collision. T8e LN switc8 is especially a )ast impro)ement o)er t8e network
8u+ since it 8as t8e a+ility to Nrea%O t8e source an% %estination no%e of a %ata packet
an% forwar% t8e packet only to t8e %estination no%e. $8ene)er t8e no%e transmits
%ata meant for anot8er no%e in t8e local area networkG t8e switc8 intercepts t8e %ataG
%etermines t8e %estination an% forwar%s t8e transmission to its inten%e% %estination.
1ince a %ata packet %oes not 6et +roa%caste% to unnecessary se6mentsG network
con6estion is minimiDe% an% network +an%wi%t8 is conser)e%.
7.) 1+,N
'LN stan%s for )irtual local area network. LN can +e %i)i%e% into
se)eral lo6ical LNs calle% 'LNs. T8is )irtual LN is also an I( su+net. T8e
w8ole i%ea of 'LN tec8nolo6y is to %i)i%e a LN into lo6icalG instea% of p8ysicalG
se6ments. .ac8 'LN is a work 6roup in t8e or6aniDation. If a person mo)es from
one 6roup to anot8erG t8ere is
no nee% to c8an6e t8e
p8ysical confi6uration. T8e
6roup mem+ers8ip in 'LNs
is %efine% +y softwareG not
8ar%ware. ny station can +e
lo6ically mo)e% to anot8er
'LN. ll mem+ers
+elon6in6 to a 'LN can
recei)e +roa%cast messa6es
sent to t8at particular
'LN.
)irtual local area
network !'LN" is
confi6ure% +y softwareG not +y p8ysical wirin6. #em+ers8ip in a 'LN can +e +ase%
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
2
on port num+ersG #C a%%ressesG I( a%%ressesG I( multicast a%%ressesG or a
com+ination of t8ese features. 'LNs are cost an% time*efficientG can re%uce network
trafficG an% pro)i%e an e<tra measure of security. In a tra%itional 'LNG switc8es ta6
t8e 'LN trafficG an% only t8e %e)ices on t8e same 'LN can communicate wit8
one anot8er. If %e)ices on %ifferent 'LNs nee% to communicateG t8ey woul% talk to
eac8 ot8er )ia a trunk port on a router. T8at trunk port an% t8e processin6 power of
t8e router woul% create a +ottleneck for communications. $it8 a Layer 3 switc8G
routin6 an% trunkin6 are performe% at )ery 8i68 spee%s.
7esi%es t8e functionality mentione% a+o)eG a 'LN 8as a num+er of ot8er
features suc8 asH
(erformance C +roa%cast control
1e6re6atin6 %epartments or proJect networks
1ecurity
7.).1 ,%&nt#es of 1+,Ns
'LNs allow network a%ministrators to or6aniDe LNs lo6ically instea% of
p8ysically. T8is is a key +enefit. T8is allows network a%ministrators to perform
se)eral tasksH
.asily mo)e workstations on t8e LN
.asily a%% workstations to t8e LN
.asily c8an6e t8e LN confi6uration
.asily control network traffic
Impro)e security
7.).2 T*pes of 1+,Ns
T8ree +asic 'LN types t8at are use% to %etermine an% control 'LN
mem+ers8ip assi6nmentsH
(ort*+ase% 'LNs
#C a%%ress +ase% 'LNs
(rotocol*+ase% 'LNs
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
'
;. NETWORK TO'O+OGA
network topolo6y %escri+es t8e confi6uration of a network !8ow t8e
network components are connecte% to6et8er".
T8ere are ;I'. main topolo6ies.

?!tors for se(e!tin# topo(o#ies
Desire% (erformance
Desire% Relia+ility
1iDe!No of no%es"
.<pan%a+ility of t8e system
Cost of t8e components
Delays in)ol)e% in routin6
;.1 $tr Topo(o#* H
T8e star topolo6y uses a central 8u+ t8rou68 w8ic8 all components are
connecte%. In a star topolo6yG eac8 %e)ice 8as a %e%icate% point*to*point link only to a
central controllerG usually calle% 3U7. T8e %e)ices are not %irectly linke% to one
anot8er. star topolo6y %oes not allow %irect traffic +etween %e)ices. T8e controller
acts as an e<c8an6eH if one %e)ice wants to sen% %ata to anot8erG it sen%s t8e %ata to
t8e controllerG w8ic8 t8en relays t8e %ata to t8e ot8er connecte% %e)ice. star
topolo6y is less e<pensi)e t8an mes8 topolo6y. .ac8 %e)ice nee%s only one link an%
one IEO port to connect it to any num+er of ot8ers. T8is factor also makes it easy to
install an% reconfi6ure. Computers in a network are
usually connecte% wit8 t8e 8u+G switc8 or router wit8
t8e Uns8iel%e% Twiste% (air !UT(" or 18iel%e%
Twiste% (air Ca+les.
Central %e)ice !8u+"H*Contains multiple ports to
connect t8e network %e)ices. ll network
transmissions sent t8rou68 it.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
4

,%&nt#eH If any comp. fails t8e remainin6
NE$ is unaffecte%. !If one link failsG only t8at link is affecte%. ll ot8er links remain
acti)e. ". Only n*1 lines are re@uire% for connectin6 n no%e.
Dis%&nt#es H If t8e 8ost fails Gt8e entire network fails.
;.2 Rin# Topo(o#* /
rin6 topolo6y connects si< stations. T8e rin6 topolo6y connects
workstations in a close% loop. .ac8 terminal is connecte% to T$O ot8er terminals !t8e
ne<t an% t8e pre)ious"G wit8 t8e last terminal +ein6 connecte% to t8e first. Data is
transmitte% aroun% t8e rin6 in one %irection onlyP eac8 station passin6 on t8e %ata to
t8e ne<t station till it reac8es its %estination.
;aulty workstations can +e isolate% from t8e rin6. $8en t8e workstation is powere%
onG it connects itself into t8e rin6. $8en power is offG it %isconnects itself from t8e
rin6 an% allows t8e information to +ypass t8e workstation. Information tra)els aroun%
t8e rin6 from one workstation to t8e ne<t. .ac8 packet of %ata sent on t8e rin6 is
prefi<e% +y t8e a%%ress of t8e station to w8ic8 it is +ein6 sent toG w8en a packet of
%ata arri)esG t8e workstation c8ecks to see if t8e packet a%%ress is t8e same as its own.
If it isG it 6ra+s t8e %ata in t8e packet. If t8e packet %oes not +elon6 to itG it sen%s t8e
packet to t8e ne<t workstation in t8e rin6. Rin6 systems use & pair ca+les !separate
sen%Erecei)e". T8e common implementation of t8is topolo6y is token rin6. +reak in
t8e rin6 causes t8e entire network to fail.
No central 8u+.
No central ca+le.
Network %e)ices connecte% in a rin6 formation from one %e)ice to t8e ne<t. Data
tra)els from one %e)ice to anot8er aroun% t8e rin6 in one %irection only. T8ereMs no
%an6er of collisions +ecause %ata always flows in one %irection. If a connection is
+rokenG t8e entire network 6oes %own.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
(
,%&nt#es /
.asy to install
%% or %elete is easy
;ault isolation is
simplifie%
Dis%&nt#es H
+reak in t8e rin6
can %isa+le t8e entire
network
%%ition of new
no%es increases t8e
%elay
Re@uires more complicate% control t8en star network
;.) 6us Topo(o#* /
T8e +us topolo6y connects workstations usin6 a sin6le ca+le. .ac8
workstation is connecte% to t8e ne<t workstation in a point to point fas8ion. ll
workstations connect to t8e same ca+le.
No central 8u+. Central ca+le to w8ic8 all %e)ices are attac8e%. Data transmission
%own t8e line from one %e)ice to anot8er .Only one %e)ice transmits at a time. .asy to
implement an% e<ten%. Re@uires less ca+le len6t8 t8an a star topolo6y 7UT If t8ere is
a pro+lem wit8 t8e ca+leG t8e entire network 6oes %own. (erformance %e6ra%es as
a%%itional computers are a%%e% or on 8ea)y traffic.
,%&nt#e H .ase of installation
Dis%&nt#e H Difficult reconnection an% fault isolation
;.0 "es4 Topo(o#* /
In mes8 networkG eac8 no%e is %irectly connecte% to all no%es on t8e network.
T8is type of network in)ol)es t8e concept of routes. In t8is type of networkG eac8
no%e may sen% messa6e to %estination t8rou68 multiple pat8s. It means t8at eac8 no%e
of mes8 network 8as se)eral possi+le pat8s to sen% !or to recei)e" messa6eG +ut in
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
*
7usG 1tarG Rin6 an% Tree topolo6ies eac8 no%e 8as only one pat8. T8e mes8 topolo6y
connects all computers to eac8 ot8er. T8e ca+le re@uirements are 8i68G +ut t8ere are
re%un%ant pat8s +uilt in. ny failure of one computer allows all ot8ers to continueG as
t8ey 8a)e alternati)e pat8s to ot8er computers. #es8 topolo6ies are use% in critical
connection of 8ost computers !typically telep8one e<c8an6es". lternate pat8s allow
eac8 computer to +alance t8e loa% to ot8er computer systems in t8e network +y usin6
more t8an one of t8e connection pat8s a)aila+le.
,%&nt#e /
It 8as multiple linksG so if one route is +locke% t8en ot8er routes can +e use%
for %ata communication.
.ac8 connection can 8a)e its own %ata loa%G so t8e traffic pro+lem is
eliminate%.
It ensures t8e %ata pri)acy or securityG +ecause e)ery messa6e tra)els alon6 a
%e%icate% link.
Trou+les8ootin6 of t8is topolo6y is easy as compare% to ot8er networks.
Its performance is not affecte% wit8 8ea)y loa% of %ata transmission.
mes8 topolo6y is ro+ust.
(oint to point links make fault i%entification an% fault isolation easy
Dis%&nt#e /
It +ecomes )ery e<pensi)e +ecause a lar6e num+er of ca+lin6 an% 119 ports
are re@uire%.
It is %ifficult to install.
;.3 Tree Topo(o#* /
:ust as name su66estG t8e network %esi6n is little confusin6 an% comple< to
un%erstan% at first +ut if we 8a)e +etter un%erstan%in6 of 1tar an% 7us topolo6ies t8en
Tree is )ery simple. Tree topolo6y is +asically t8e mi<ture of many 1tar topolo6y
%esi6ns connecte% to6et8er usin6 +us topolo6y. Tree topolo6ies are comprise% of t8e
multiple star topolo6ies on a +us. De)ices like 3u+ can +e %irectly connecte% to Tree
+us an% eac8 8u+ performs as root of a tree of t8e network %e)ices. Tree topolo6y is
)ery %ynamic in nature an% it 8ol%s potential of e<pan%a+ility of networks far +etter
t8an ot8er topolo6ies like 7us an% 1tar.
;.7 5*2ri% Topo(o#* /
3y+ri% network is t8e com+ination of
%ifferent topolo6ies suc8 as starG Rin6G #es8G
7us etc. ;or e<ampleG if a %epartment uses a
7us networkG secon% %epartment uses t8e rin6
networkG t8ir% %epartment uses t8e #es8
network an% fourt8 %epartment uses t8e star
network. ll t8e networks of %ifferent types !of
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
)
four %epartments" can +e connecte% to6et8er t8rou68 a central 8u+ !in t8e form of star
network" as s8own in t8e fi6ure +elow.
;i6ure!i"H* 3y+ri% topolo6y
A star backbone with three bus networks
;i6ure!ii"H*3y+ri% topolo6y
<. O$I RE?ERENCE "ODE+
I1O is t8e or6aniDation.O1I is t8e mo%el. T8e I1O is International 1tan%ar%
Or6aniDation. n I1O t8at co)er all aspect of network communication is t8e Open
system Interconnection mo%el. n open system is a set of protocols t8at allows any
two %ifferent systems to communicate re6ar%less of t8eir un%erlyin6 arc8itecture. T8e
O1I mo%el is a layere% framework for t8e %esi6n of network systems t8at allows
communication +etween all types of computer systems.O1I is Open 1ystems
Interconnection. No one really uses t8is in t8e real worl%. reference mo%el so
ot8ers can %e)elop %etaile% interfaces. Task of communication +roken up into
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
+
mo%ules or layers 'alueH T8e reference mo%el %efines 2 layers of functions t8at take
place at eac8 en% of communication an% wit8 eac8 layer a%%in6 its own set of special
relate% functions.
.ac8 layer e<pects some ser)ice from its lower layerG an% pro)i%es some ser)ice to its
8i68er layer
Top most layers is application !for e<.G email"

<.1. '4*si!( +*er /
T8e p8ysical layer is responsi+le for mo)ements of in%i)i%ual +its from one
8op !no%e" to t8e ne<t. (8ysical interface +etween %ata transmission %e)ice !e.6.
computer" an% transmission me%ium or network. It 1pecifies raw transmission %etails
like connectorsG me%iumG )olta6e le)elsG enco%in6s use% etc .(8ysical topolo6ies are
1tar an% 7us. Line confi6uration is p2p or multipoint. Transmission mo%e* 1imple<G
3alf* Duple<G Duple<
;i6ureH*(8ysical layer
T8e p8ysical layer is also concerne% wit8 t8e followin6H
'4*si!( !4r!teristi! of interf!es n% me%ium *WT8e p8ysical layer
%efine t8e c8aracteristics of t8e interface +etween t8e %e)ices an% t8e type of
transmission me%ium.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








4
,
Representtion of 2its *W T8e p8ysical layer %ata consist of a stream of a +its
!se@uence of 9s or 1s "wit8 no interpretation .it also %efines 8ow 9s an% 1s
c8an6e% into si6nals.
Dt rte *W Data rate means t8e transmission rate !t8e no of +its sent per
secon%"
$*n!4roniBtion of 2its *W (8ysical layer sync8roniDe% t8e sen%ers an%
recei)ers clocks of +it le)el.
+ine !onfi#urtion *WT8e p8ysical layer is concerne% wit8 t8e connection of
%e)ices to t8e me%ia.
'4*si!( topo(o#**WT8e p8ysical topolo6y %efines 8ow %e)ices are connecte%
to make a network.
Trnsmission mo%e*W T8e p8ysical layer also %efines t8e %irection of
transmission +etween two %e)ices Hsimple<G 8alf*%uple<G or full*%uple<.
<.2 Dt +ink +*er /
T8e %ata link layer is responsi+le for mo)in6 frames from one 8op !no%e" to t8e ne<t.
It makes t8e p8ysical layer appear error* free to t8e upper layer !network layer". It ensures
relia+le communication +etween two %irectly connecte% no%es. 3i68er layers can t8ink t8at a
relia+le link e<ists +etween two mac8inesG an% not worry a+out noiseG attenuationG error etc. It
Deals wit8 framin6G flow controlG error control etc. It responsi+le for 3op*to*3op
%eli)ery.
;i6ureH*Datalink layer
Ot8er responsi+ilities of t8e %ata link layer inclu%e t8e followin6H
?rmin#->T8e %ata link layer %i)i%es t8e stream of +its recei)e% from t8e network
layer into mana6ea+le %ata units calle% frames.
'4*si!( %%ressin#*WIf frames are to +e %istri+ute% to %ifferent systems on t8e
networkG t8e %ata link layer a%%s a 8ea%er to t8e frame to %efine t8e sen%er an%Eor
recei)er of t8e frame.
?(ow !ontro(->T8e %ata link layer imposes a flow control mec8anism to a)oi%
o)erw8elmin6 t8e recei)er.
Error !ontro(->.rror control is normally ac8ie)e% t8rou68 a trailer a%%e% to t8e en%
of t8e frame. It also uses a mec8anism to reco6niDe %uplicate frames.
,!!ess !ontro(->$8en two or more %e)ices are connecte% to t8e same inkG %ata link
layer protocols are necessary to %etermine w8ic8 %e)ice 8as control o)er t8e link at
any 6i)en time.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
-
<.) Network +*er H
T8e network layer is responsi+le for t8e %eli)ery of in%i)i%ual packets from
t8e source 8ost to t8e %estination 8ost.
;i6ureH*Network layer
Routin# H Network layer %eals primarily wit8 routin6 G sen%in6 packets from
source to %estination w8en t8ey are not %irectly connecte%. (ackets may not
reac8 in or%erG 6et lost etc.
+o#i!( %%ressin# H 3as some ot8er functionalities like lo6ical a%%ressin6.
<.0 Trnsport +*er /
T8e transport layer is responsi+le for process to process %eli)ery of t8e entire
messa6e. process is an application pro6ram runnin6 on a 8ost.
;i6ureH*Transport layer
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
$
Ot8er responsi+ility of t8e transport layer inclu%e t8e followin6H
'ro!ess to 'ro!ess De(i&er** Relia+leG in*or%er %eli)ery +etween any two
applications !not Just mac8ines"
1e6mentation an% Reassem+ly
Conne!tion !ontro(* T8e transport layer can +e eit8er connection oriente% or
connection less.
?(ow Contro(* ;low control is performe% .n% to .n%
Error Contro(* .rror correction is usually ac8ie)e% t8rou68 retransmission
<.3 $ession +*er /
T8e session layer is responsi+le for network %ialo6 control an%
sync8roniDation. T8e ser)ices pro)i%e% +y t8e first t8ree layers !p8ysicalG %ata linkG
an% network" are not sufficient for some process. It esta+lis8esG maintainsG an%
sync8roniDes t8e interaction amon6 communicatin6 systems.
;i6ureH*1ession layer
1pecific responsi+ilities of t8e session layer inclu%e t8e followin6H
Dialo6 Control*T8e session layer allows two systems to enter into a %ialo6
eit8er 8alf %uple< or full %uple<.
1ync8roniDation* T8e session layer allows to a%% c8eckpoints or
sync8roniDation points to a stream of %ata.
<.7 'resenttion +*er /
T8e presentation layer is responsi+le for translationG compressionG an%
encryption. T8e presentation layer is concerne% wit8 t8e synta< an% semantics of t8e
information e<c8an6e% +etKn two systems.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
2
;i6ureH* (resentation layer
1ome responsi+ilities of (resentation layerH*
Translation*t t8e sen%er c8an6es t8e information from its sen%er %epen%ent
format into a common format. T8e presentation layer at t8e recei)in6 mac8ine
c8an6es t8e common format into recei)er*%epen%ent format.
.ncryption*.ncrypte% t8e messa6e
Compression* compresse% t8e messa6e.
<.; ,pp(i!tion (*er /
T8e application layer is responsi+le for pro)i%in6 ser)ices to t8e user. T8e
application layer ena+les t8e userG w8et8er 8uman or softwareG to access t8e network.
It pro)i%es user interfaces an% support for ser)ices suc8 as electronic mailG remote file
access an% transferG s8are% %ata+ase mana6ementG an% ot8er type of %istri+ute%
information ser)ices.
;i6ureH*pplication layer
1pecific ser)ices pro)i%e% +y t8e application layerH
Network )irtual terminal
;ile transferG accessG an% mana6ement
#ail ser)ices
Directory ser)ices
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
'
=. ?irew((
;irewall is 8ar%wareG softwareG or a com+ination of +ot8 t8at is use% to
pre)ent unaut8oriDe% pro6rams or internet users from accessin6 a pri)ate network
an%Eor a sin6le computer. T8e wor% firewall ori6inally referre% literally to a wallG
w8ic8 was constructe% to 8alt t8e sprea% of a fire. In t8e worl% of computer firewall
protectionG a firewall refers to a network %e)ice w8ic8 +locks certain kin%s of network
trafficG formin6 a +arrier +etween a truste% an% an untruste% network. It is analo6ous
to a p8ysical firewall in t8e sense t8at firewall security attempts to +lock t8e sprea% of
computer attacks.
7asicallyG a firewallG workin6 closely wit8 a router pro6ramG e<amines eac8
network packet to %etermine w8et8er to forwar% it towar% its %estination. firewall
also inclu%es or works wit8 a pro<y ser)er t8at makes network re@uests on +e8alf of
workstation users. firewall is often installe% in a specially %esi6nate% computer
separate from t8e rest of t8e network so t8at no incomin6 re@uest can 6et %irectly at
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
4
pri)ate network resources. firewall is a secure an% truste% mac8ine t8at sits +etween
a pri)ate network an% a pu+lic network.
=.1 5ow Does ?irew(( "n#ement Work@
firewall mana6ement pro6ram can +e confi6ure% one of two +asic waysH
%efault*%eny policy. T8e firewall a%ministrator lists t8e allowe% network
ser)icesG an% e)eryt8in6 else is %enie%.
%efault*allow policy. T8e firewall a%ministrator lists network ser)ices w8ic8
are not allowe%G an% e)eryt8in6 else is accepte%.
=.2 ?irew(( te!4niCues
=.2.1 '!ket fi(terin# firew((
T8is type of firewall 8as a list of firewall security rules w8ic8 can +lock traffic
+ase% on I( protocolG I( a%%ress an%Eor port num+er. Un%er t8is firewall mana6ement
pro6ramG all we+ traffic will +e allowe%G inclu%in6 we+*+ase% attacks. In t8is
situationG you nee% to 8a)e intrusion pre)entionG in a%%ition to firewall securityG in
or%er to %ifferentiate +etween 6oo% we+ traffic !simple we+ re@uests from people
+rowsin6 your we+site" an% +a% we+ traffic !people attackin6 your we+site". packet
filterin6 firewall 8as no way to tell t8e %ifference. n a%%itional pro+lem wit8 packet
filterin6 firewalls w8ic8 are not stateful is t8at t8e firewall canMt tell t8e %ifference
+etween a le6itimate return packet an% a packet w8ic8 preten%s to +e from an
esta+lis8e% connectionG w8ic8 means your firewall mana6ement system confi6uration
will 8a)e to allow +ot8 kin%s of packets into t8e network.
=.2.2 $ttefu( firew((
T8is is similar to a packet filterin6 firewallG +ut it is more intelli6ent a+out
keepin6 track of acti)e connectionsG so you can %efine firewall mana6ement rules
suc8 as Lonly allow packets into t8e network t8at are part of an alrea%y esta+lis8e%
out+oun% connection.L ?ou 8a)e sol)e% t8e esta+lis8e% connection issue %escri+e%
a+o)eG +ut you still canMt tell t8e %ifference +etween L6oo%L an% L+a%L we+ traffic.
?ou nee% intrusion pre)ention to %etect an% +lock we+ attacks.
=.2.) Deep p!ket inspe!tion firew((
n application firewall actually e<amines t8e %ata in t8e packetG an% can
t8erefore look at application layer attacks. T8is kin% of firewall security is similar to
intrusion pre)ention tec8nolo6yG an%G t8ereforeG may +e a+le to pro)i%e some of t8e
same functionality.
T8ere are t8ree ca)eatsG 8owe)erH firstG for some )en%orsG t8e %efinition of
L%eepL e<ten%s to some particular %ept8 in t8e packet an% %oes not necessarily
e<amine t8e entire packet. T8is can result in missin6 some kin%s of attacks. 1econ%G
%epen%in6 on t8e 8ar%wareG a firewall may not 8a)e a%e@uate processin6 power to
8an%le t8e %eep packet inspection for your network. 7e sure to ask @uestions a+out
8ow muc8 +an%wi%t8 it can 8an%le w8ile performin6 suc8 inspection. n% finallyG
em+e%%e% firewall mana6ement tec8nolo6y may not 8a)e t8e fle<i+ility to 8an%le all
attacks.
=.2.0 ,pp(i!tion-wre firew((
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
(
1imilar to %eep packet inspection e<cept t8at t8e firewall un%erstan%s certain
protocols an% can parse t8emG so t8at si6natures or rules can specifically a%%ress
certain fiel%s in t8e protocol. T8e fle<i+ility of t8is approac8 to computer firewall
protection is 6reat an% permits t8e si6natures or rules to +e +ot8 specific an%
compre8ensi)e. T8ere are no specific %raw+acks to t8is approac8 to firewall security
as 6enerally it will yiel% impro)ements o)er a stan%ar% L%eep packet inspectionL
approac8. 3owe)erG some actual attacks may +e o)erlooke% !false ne6ati)es" +ecause
t8e firewall security parsin6 routines are not ro+ust enou68 to 8an%le )ariations in
real*worl% traffic.
=.2.3 ,pp(i!tion pro9* firew((
n application pro<y acts as an interme%iary for certain application traffic
!suc8 as 3TT(G or we+G traffic"G interceptin6 all re@uests an% )ali%atin6 t8em +efore
passin6 t8em alon6. 6ainG an application pro<y firewall is similar to certain kin%s of
intrusion pre)ention. T8e implementation of a full application pro<y isG 8owe)erG
@uite %ifficultG an% eac8 pro<y can only 8an%le one protocol !e.6. we+ or incomin6
email".
;or an application pro<y firewall to +e effecti)e as computer firewall
protectionG it 8as to +e a+le to un%erstan% t8e protocol completely an% to enforce
+lockin6 on )iolations of t8e protocol. 7ecause implementations of t8e protocol +ein6
e<amine% often %o not follow a protocol correctlyG or +ecause implementers a%% t8eir
own e<tensions to a protocolG t8is can result in t8e pro<y +lockin6 )ali% traffic !false
positi)es". 7ecause of t8ese kin%s of pro+lemsG en% users will often not ena+le t8ese
tec8nolo6ies.
=.) ?irew(( Ru(es
;irewalls rules can +e customiDe% as per your nee%sG re@uirements C security
t8reat le)els. ?ou can create or %isa+le firewall filter rules +ase% on suc8 con%itions
asH
I' ,%%resses/ 7lockin6 off a certain I( a%%ress or a ran6e of I(
a%%ressesG w8ic8 you t8ink are pre%atory.
Domin nmes/ ?ou can only allow certain specific %omain names to
access your systemsEser)ers or allow access to only some specifie% types
of %omain names or %omain name e<tension like .e%u or .mil.
'roto!o(s/ firewall can %eci%e w8ic8 of t8e systems can allow or 8a)e
access to common protocols like I(G 1#T(G ;T(G UD(GIC#(GTelnet or
1N#(.
'orts/ 7lockin6 or %isa+lin6 ports of ser)ers t8at are connecte% to t8e
internet will 8elp maintain t8e kin% of %ata flow you want to see it use%
for C also close %own possi+le entry points for 8ackers or mali6nant
software.
Ke*wor%s/ ;irewalls also can sift t8rou68 t8e %ata flow for a matc8 of
t8e keywor%s or p8rases to +lock out offensi)e or unwante% %ata from
flowin6 in.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
*
=.0 T*pes of ?irew((
=.0.1 $oftwre firew((/
New 6eneration Operatin6 systems come wit8 +uilt in firewalls or you can
+uy firewall software for t8e computer t8at accesses t8e internet or acts as t8e
6ateway to your 8ome network.
;or in%i)i%ual 8ome usersG t8e most popular firewall c8oice is a software
firewall. 1oftware firewalls are installe% on your computer !like any software" an%
you can customiDe itP allowin6 you some control o)er its function an% protection
features. software firewall will protect your computer from outsi%e attempts to
control or 6ain access your computerG an%G %epen%in6 on your c8oice of software
firewallG it coul% also pro)i%e protection a6ainst t8e most common TroJan pro6rams
or e*mail worms. #any software firewalls 8a)e user %efine% controls for settin6 up
safe file an% printer s8arin6 an% to +lock unsafe applications from runnin6 on your
system. %%itionallyG software firewalls may also incorporate pri)acy controlsG we+
filterin6 an% more. T8e %ownsi%e to software firewalls is t8at t8ey will only protect
t8e computer t8ey are installe% onG not a networkG so eac8 computer will nee% to 8a)e
a software firewall installe% on it.
=.0.2 5r%wre firew((/
8ar%ware firewall is
a small +o< t8at connects
+etween your computer an%
your mo%em. 3ar%ware
firewalls are usually routers
wit8 a +uilt in .t8ernet car%
an% 8u+. ?our computer or
computers on your network
connect to t8is router C
access t8e we+. 3ar%ware
firewalls can +e purc8ase% as
a stan%*alone pro%uct +ut
more recently 8ar%ware firewalls
are typically foun% in +roa%+an%
routersG an% s8oul% +e consi%ere%
an important part of your system
an% network set*upG especially for
anyone on a +roa%+an% connection.
3ar%ware firewalls can +e effecti)e
wit8 little or no confi6urationG an%
t8ey can protect e)ery mac8ine on a
local network. #ost 8ar%ware
firewalls will 8a)e a minimum of
four network ports to connect ot8er
computersG +ut for lar6er networksG
+usiness networkin6 firewall
solutions are a)aila+le. 8ar%ware
firewall uses packet filterin6 to
e<amine t8e 8ea%er of a packet to
%etermine its source an%
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
)
%estination. T8is information is compare% to a set of pre%efine% or user*create% rules
t8at %etermine w8et8er t8e packet is to +e forwar%e% or %roppe%.
=.3 T4e ,%&nt#es n% Dis%&nt#es of ?irew((
=.3.1 ,%&nt#es
1. feelin6 of increase% security t8at your (C an% contents are +ein6 protecte%.
2. Relati)ely ine<pensi)e or free for personal use.
3. New releases are +ecomin6 user frien%ly.
&. ?ou can monitor incomin6 an% out6oin6 security alerts an% t8e firewall
company will recor% an% track %own an intrusion attempt %epen%in6 on t8e
se)erity.
,. 1ome firewalls +ut not all can %etect )irusesG wormsG TroJan 8orsesG or %ata
collectors.
-. ll firewalls can +e teste% for effecti)eness +y usin6 pro%ucts t8at test for
leaks or pro+e for open ports.
=.3.2 Dis%&nt#es
1. ;irewalls e)ol)e %ue to crackerMs a+ility to circum)ent t8em increases.
2. Llways onL connections create% +y Ca+le an% D1L connections create maJor
pro+lems for firewalls. T8is can +e compare% to lea)in6 you car runnin6 wit8
t8e keys in it an% t8e %oors unlocke% w8ic8 a t8ief may interpret as an
in)itation to L(lease steal meL.
3. ;irewalls cannot protect you from internal sa+ota6e wit8in a network or from
allowin6 ot8er users access to your (C.
&. ;irewalls cannot e%it in%ecent material like porno6rap8yG )iolenceG %ru6s an%
+a% lan6ua6e. T8is woul% re@uire you to a%Just your +rowser security options
or purc8ase special software to monitor your c8il%renMs Internet acti)ity.
,. ;irewalls offer weak %efense from )iruses so anti)iral software an% an ID1
!intrusion %etection system" w8ic8 protects a6ainst TroJans an% port scans
s8oul% also complement your firewall in t8e layerin6 %efense.
-. 1ome firewalls claim full firewall capa+ility w8en itMs not t8e case. Not all
firewalls are create% e@ually or offer t8e same protection so itMs up to t8e user
to %o t8eir 8omework.
2. Cost )aries. T8ere are some 6reat free firewalls a)aila+le to t8e (C User +ut
t8ere are also a few 8i68ly recommen%e% pro%uctsG w8ic8 can only +e
purc8ase%. T8e %ifference may +e Just t8e amount of support or features t8at a
User can 6et from a free pro%uct as oppose% to a pai% one an% 8ow muc8
support t8at user t8inks 8e or s8e will re@uire.
4. firewall protection is limite% once you 8a)e an allowa+le connection open.
T8is is w8ere anot8er pro6ram s8oul% +e in place to catc8 TroJan 8orse )iruses
tryin6 to enter your computer as unassumin6 normal traffic.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
+
5. T8ere 8a)e +een claims ma%e +y ID1 !Intrusion Detection 1ystem" companies
w8ere TroJanMs were %etecte% suc8 as t8e RuF ;ireCracker ) 2.9 w8ic8
%isa+le% certain ;irewalls pro6rams t8us lea)in6 t8e (C )ulnera+le to
malicious actions.
1>. UT"
Unifie% T8reat #ana6ement !UT#" is a compre8ensi)e solution t8at 8as
recently emer6e% in t8e network security in%ustry. It is t8e e)olution of t8e tra%itional
firewall into an all*inclusi)e security pro%uct t8at 8as t8e a+ility to perform multiple
security functions in one sin6le applianceH network firewallin6G network intrusion
pre)ention an% 6ateway anti)irus !'"G 6ateway anti*spamG '(NG content filterin6G
loa% +alancin6 an% on*appliance reportin6.
T8e a%)anta6es of unifie% security lies in t8e fact t8at rat8er t8an a%ministerin6
multiple systems t8at in%i)i%ually 8an%le anti)irusG content filterin6G intrusion
pre)ention an% spam filterin6 functionsG or6aniDations now 8a)e t8e fle<i+ility to
%eploy a sin6le UT# appliance t8at takes o)er all t8eir functionality into a sin6le rack
mounta+le network appliance.
1>.1 5ow UT" se!ures t4e network
sin6le UT# appliance makes it )ery easy to mana6e a companyMs security
strate6yG wit8 Just one %e)ice to worry a+outG one source of support an% a sin6le way
to maintain e)ery aspect of your security solution. T8e UT# can pro)e to +e more
effecti)e a solution as its stren6t8 lies in t8e +un%le of solutions w8ic8 are inte6rate%
an% %esi6ne% to work to6et8er. lso from one sin6le centraliDe% consoleG all t8e
security solutions can +e monitore% an% confi6ure%. T8us it tweaks t8e solutions to
perfection.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








(
,
In t8is conte<tG UT#s represent all*in*one security appliances t8at carry
firewallG '(NG 6ateway anti*)irusG 6ateway anti*spamG intrusion pre)entionG content
filterin6G an% +an%wi%t8 mana6ement an% centraliDe% reportin6 as +asic features. T8e
UT# is t8usG a 8i68ly inte6rate% @ui)er of security solutionsG workin6 in tan%em t8at
systematically pro)i%es network security to or6aniDations. s t8ere is a customiDe%
O1 8ol%in6 all t8ese security features at one placeG t8ey ten% to work in unisonG
pro)i%in6 a )ery 8i68 t8rou68put. T8e UT# can pro)e 8i68ly effecti)e +ecause its
stren6t8 lies in t8e +un%le of solutions w8ic8 are inte6rate% an% %esi6ne% to work
to6et8er wit8out trea%in6 on eac8 ot8erKs toes.
1>.2 ,%&nt#es
1. Re%uce% comple<ityH 1in6le security solution. 1in6le 'en%or. 1in6le #C
2. 1implicityH )oi%ance of multiple software installation an% maintenance
3. .asy #ana6ementH (lu6 C (lay rc8itectureG $e+*+ase% 0UI for easy
mana6ement
&. (erformanceH Xero*8our protection wit8out %e6ra%in6 t8e network
performance
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
-
(. Trou+les8ootin6H 1in6le point of contact I 2& Y 2 )en%or support
-. Re%uce% tec8nical trainin6 re@uirementsG one pro%uct to learn.
2. Re6ulatory compliance
1>.) ?etures
1. war% winnin6 nti 1pam
wit8 0rey Listin6
tec8nolo6y
2. nti 'irus
3. $e+ (ro<y
&. UT# appliance $e+ ;ilter
,. 3ttp (ro<y
-. spam filters
2. internet filter
4. Intrusion pre)ention Content ;ilter
5. (2( 7lockin6 Intrusion (re)ention
1>.0 UT" ,pp(in!e 6enefits
1. 7i*%irectional scannin6 of all protocols
2. #ultiple automate% software up%ates per %ay
3. #ultiple nti*'irus 'en%ors supporte%
&. Intrusion (re)ention wit8 Xero Day (rotection
,. ;ull (O(3 C 1#T( Inte6ration
-. %)ance% nti*1pam wit8 6rey listin6
2. 1pyware is +locke% from enterin6 t8e network
4. #o%ule %eacti)ation capa+ility
5. 1cala+ility for LN 6rowt8 1U pplianceG fully loa%e%
19. No LN reconfi6uration necessary
11. $iDar% confi6uration setup
11. 'ROTOCO+
protocol is a set of rules t8at 6o)ern %ata communications. It
represents an a6reement +etween t8e communicatin6 %e)ices. $it8out a
protocolG two %e)ices may +e connecte% +ut not communicatin6G Just as a
person speakin6 ;renc8 cannot +e un%erstoo% +y a person w8o speaks only
:apanese.
11.1 ?T' D?i(e Trnsfer 'roto!o(E
Transferrin6 files from one computer to anot8er is one of t8e most common
tasks e<pecte% from a networkin6 or internetworkin6 en)ironment. s a matter of
factG t8e 6reatest )olume of %ata e<c8an6e in t8e Internet to%ay is %ue to file transfer.
Telnet allows you to interact wit8 an application runnin6 on a remote computerG +ut it
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
$
8as no facility for ena+lin6 you to copy a file from t8at computerKs 8ar% %isk to yoursG
nor for you to uploa% files to t8e remote system. T8at function is carrie% out usin6
;ile Transfer (rotocol !;T(".T8e ;T( specification caters for se)eral %ifferent file
typesG structures an% transfer mo%esG +ut in practice ;T( implementations reco6niDe
eit8er te<t files or +inary files. Te<t files are con)erte% from t8eir nati)e format to 2*
+it 1CII wit8 eac8 line terminate% +y a carria6e*returnG line*fee% pair for
transmission. T8ey are con)erte% +ack to t8e nati)e te<t file format +y t8e ;T( client.
;T( t8erefore pro)i%es a cross*platform transfer mec8anism for te<t files. 7inary files
are transmitte% e<actly as*is.
Data is transferre% as a continuous stream of +ytes. T8e TC( transport
protocol pro)i%es all t8e relia+ilityG makin6 sure t8at %ata t8at is lost is re*sent an%
c8eckin6 t8at it is recei)e% correctly. ;T( is unusual compare% to ot8er TC(
applications in t8at it uses two TC( connections. control connection is ma%e to t8e
well*known ;T( port num+er 21G an% t8is is use% to sen% ;T( comman%s an% recei)e
replies. separate %ata connection is esta+lis8e% w8ene)er a file or ot8er information
is to +e transferre%G an% close% w8en t8e %ata transfer 8as finis8e%. /eepin6 %ata an%
comman%s separate makes life easier for t8e client softwareG an% means t8at t8e
control connection is always free to sen% an 7OR !a+ort" comman% to terminate a
len6t8y %ata transfer.
;T( uses t8e ser)ices of TC(. It nee%s two TC( connections.
T8e well*known port 21 is use% for t8e control connection an% t8e well*known port 29
for t8e %ata connection.
llows a person to transfer files +etween two mac8ines.
Re@uires a person to supply lo6in name an% passwor% to 6ain entry .
Comman%H
ftp Z%omain[nameW
ftp Zip[a%%ressW
11.1.1 ,non*mous ?T'
special form of ;T( w8ic8 8as +ecome )ery popular.
Does not re@uire a person to know lo6in name an% passwor%.
In place of lo6in nameG type t8e wor% anonymous.
In place of passwor%G type t8e email a%%ress.
3u6e amount of resources are a)aila+le in anonymous ;T( sites.
11.1.2 5ow ?T' Works@
Two connections esta+lis8e%H control connection o)er port 21G t8at remains
all t8rou68 a session.
temporary port num+erG use% for e)ery file +ein6 transferre%.
New connection esta+lis8e% for e)ery file transfer.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
2
11.2 Te(net DTErmin+ NETworkE
Telnet is a 6eneral purpose clientEser)er application pro6ram.
llows a person sittin6 on one computer to work on anot8er computer.
1tarts a remote session on anot8er mac8ine.
Re@uires a person to supply lo6in name an% passwor% to 6ain entry.
Comman%H
telnet Z%omain[nameW
telnet Zip[a%%ressW
$8y re@uire%>
1. ;or usin6 software only a)aila+le on t8e remote 8ost.
2. ;or usin6 %e)ices !like printer" connecte% to t8e remote 8ost.
Typical scenario
#any users %o a telnet to a remote ser)erG an% work t8ere.
1er)er is a +i66er an% faster computer.
7y %efault connection is esta+lis8e% o)er port 23.
ny ot8er port num+er can also +e specifie%.
telnet sca.kiit.ac.in 2,
Telnet is a terminal emulation application t8at ena+les a workstation to
connect to a 8ost usin6 a TC(EI( link an% interact wit8 it as if it was a %irectly
connecte% terminal. It is a clientEser)er application. T8e ser)er runs on a 8ost on
w8ic8 applications are runnin6G an% passes information +etween t8e applications an%
t8e Telnet clients. T8e well*known port num+er for Telnet ser)ers is TC( port 23.
Telnet clients must con)ert t8e user %ata +etween t8e form in w8ic8 it is transmitte%
an% t8e form in w8ic8 it is %isplaye%. T8is is t8e %ifficult part of t8e applicationG t8e
terminal emulationG an% 8as little to %o wit8 t8e Telnet protocol itself. Telnet protocol
comman%s are principally use% to allow t8e client an% ser)er to ne6otiate t8e %isplay
optionsG +ecause Telnet clients an% ser)ers %onKt make assumptions a+out eac8 ot8ers
capa+ilities.TC( pro)i%es t8e relia+ility for TelnetG so neit8er t8e client nor t8e ser)er
nee% +e concerne% a+out re*sen%in6 %ata t8at is lostG nor a+out error c8eckin6. T8is
makes t8e Telnet protocol )ery simple. T8ere is no special format for TC( se6ments
t8at contain comman%s * t8ey simply form part of t8e %ata stream.
Data is sentG usually as 2*+it 1CIIG in TC( packets !w8ic8 you may recall are
calle% se6ments". +yte )alue of 2,,G interpret as comman% !IC"G means t8at t8e
+ytes w8ic8 follow are to +e treate% as Telnet comman%s an% not user %ata. T8is is
imme%iately followe% +y a +yte t8at i%entifies t8e comman% itselfG an% t8en a )alue.
#any comman%s are fi<e% len6t8G so t8e +yte after t8atG if not anot8er ICG woul% +e
treate% as user %ata. To sen% t8e +yte 2,, as %ataG two consecuti)e +ytes of )alue 2,,
are use%.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
'
11.) $imp(e "i( Trnsfer 'roto!o( -$"T'.
#ost wi%ely use% application on t8e Internet .
;or sen%in6 mailsH
1. 1imple #ail Transfer (rotocol !1#T("
2. #ultipurpose Internet #ail .<tension!#I#."
;or recei)in6 mailsH
1. (ost office protocol )ersion 3 !(O(3"
2. Internet #ail ccess (rotocol !I#("
T8e o+Jecti)e of 1imple #ail Transfer (rotocol !1#T(" is to transfer mail
relia+ly an% efficiently. 1#T( is in%epen%ent of t8e particular transmission
su+system an% re@uires only a relia+le or%ere% %ata stream c8annel. n important
feature of 1#T( is its capa+ility to relay mail across transport ser)ice en)ironments.
transport ser)ice pro)i%es an inter process communication en)ironment !I(C.".
n I(C. may co)er one networkG se)eral networksG or a su+set of a network. It is
important to realiDe t8at transport systems !or I(C.s" are not one*to*one wit8
networks. process can communicate %irectly wit8 anot8er process t8rou68 any
mutually known I(C.. #ail is an application or use of inter process communication.
#ail can +e communicate% +etween processes in %ifferent I(C.s +y relayin6 t8rou68
a process connecte% to two !or more" I(C.s. #ore specificallyG mail can +e relaye%
+etween 8osts on %ifferent transport systems +y a 8ost on +ot8 transport systems.
7ase% on R;C 421.
Transmits simple te<t messa6es only.

2*+it 1CII format . Uses
information written on en)elope of
mail .
#essa6e 8ea%er.
Contains recipient a%%ress an%
ot8er information.
Does not look at contents.
#essa6e +o%y.
#ail is create% +y user a6ent
pro6ram !mail client".
#essa6es @ueue% an% sent as
input to 1#T( sen%er pro6ram.
Typically a ser)er process.
Daemon on UNIF.
1en% mail or @ueue% mail
#ail #essa6e Contents
.ac8 @ueue% messa6e 8asH
#essa6e te<t
R;C 422 8ea%er wit8 messa6e
en)elope an% list of recipients.
#essa6e +o%yG compose% +y
user.
list of mail %estinations
Deri)e% +y user a6ent E 1#T(
ser)er from 8ea%er.
#ay re@uire e<pansion of
mailin6 lists.
1#T( 1en%er
Takes messa6e from @ueue.
Transmits to proper %estination
8ost .'ia 1#T( transaction.
O)er one or more TC(
connections to port 2,.
$8en all %estinations
processe%G messa6e is %elete%.
OptimiDation
If messa6e is sent to multiple
users on a 6i)en 8ostG it is sent
only once.
Deli)ery to users 8an%le% at
%estination 8ost.
If multiple messa6es are rea%y
for 6i)en 8ostG a sin6le TC(
connection can +e use%.
1a)es o)er8ea% of settin6 up
an% %roppin6 connection.
(ossi+le .rrors
3ost unreac8a+le
3ost out of operation
TC( connection fail %urin6
transfer
;aulty %estination a%%ress
User error
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
4
Tar6et user a%%ress 8as
c8an6e%
Re%irect if possi+le
Inform user if not
1en%er can re*@ueue mailG
0i)e up after a perio%
1#T( (rotocol I Relia+ility
Use% to transfer messa6es from
sen%er to recei)er o)er TC(
connection.
Uses port num+er 2,.
ttempts to pro)i%e relia+le
ser)ice.
No 6uarantee to reco)er lost
messa6es.
No en%*to*en% C/ to sen%er.
.rror in%ication report not
6uarantee%.
1#T( Recei)er
ccepts arri)in6 messa6e.
(laces in user mail+o< or
copies to out6oin6 @ueue for
forwar%in6.
Recei)er mustH
'erify local mail %estinations.
Deal wit8 errors
Transmission
Lack of %isk space
1#T( ;orwar%in6
#ostly %irect transfer from
sen%er 8ost to recei)er 8ost.
#ay 6o t8rou68 interme%iate
mail ser)ers )ia forwar%in6
capa+ility.
1en%er can specify route.
1#T( 1ystem O)er)iew
Comman%s an% responses
e<c8an6e% +etween sen%er an%
recei)er.
Initiati)e wit8 sen%er.
.sta+lis8es TC( connection.
1en%er sen%s comman%s to
recei)er.
e.6. 3.LO
Z%omainWZCRL;W
.ac8 comman% 6enerates
e<actly one reply.
e.6. 2,9 re@ueste% mail
action okP complete%.
1#T( Replies
1tarts wit8 3*%i6it co%e.
Lea%in6 %i6it in%icates
cate6ory.
2<< ** (ositi)e completion
reply
3<< ** (ositi)e interme%iate
reply
&<< ** Transient ne6ati)e
completion reply
,<< ** (ermanent ne6ati)e
completion reply
Operation (8ases
a" Connection setup
+" .<c8an6e of comman%*response
pairs
c" Connection termination
a" Connection 1etup
1en%er opens TC( connection
wit8 recei)er.
Once connecte%G recei)er
i%entifies itself.
229 Z%omainW ser)ice rea%y
1en%er i%entifies itself.
3.LLO
Recei)er accepts sen%erKs
i%entification.
2,9 O/
If mail ser)ice not a)aila+leG
t8e secon% step a+o)e +ecomesH
&21 ser)ice not a)aila+le
+" #ail Transfer Comman%s
T8e #IL ;RO# comman%
i%entifies ori6inator.
0i)es re)erse pat8 to +e use%
for error reportin6.
Recei)er returns 2,9 O/ or
appropriate failure E error
messa6e.
One or more RC(T TO
comman%s i%entify recipients
for t8e messa6e.
1eparate reply for eac8
recipient.
T8e DT comman% transfers
messa6e te<t.
.n% of messa6e in%icate% +y a
line containin6 Just perio% !."
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
(
c" Closin6 Connection
Two stepsH
1en%er sen%s UUIT an% waits
for reply.
T8en initiate TC( close
operation.
Recei)er initiates TC( close
after sen%in6 reply to UUIT.
n .<ample 1#T( 1ession
3ow to connect to an 1#T(
ser)er>
telnet ser)ername 2,
TC( connection 6ets
esta+lis8e% o)er port num+er
2,.
T8e telnet client an% t8e mail
ser)er can now start a %ialo6ue.
11.0 'O')
T8e client (O(3 software is
installe% on t8e recipient
mac8ineG an% t8e ser)er (O(3
software installe% on mail
ser)er.
T8e client !user a6ent" opens a
connection wit8 t8e ser)er on
TC( port num+er 119.
1en%s user name an% passwor%.
Can access t8e mailsG one +y
one.
Two mo%esH
Delete mo%e I mails %elete% as
t8ey are rea%
/eep mo%e I mails remain in
t8e mail+o<
(O(3 8as comman%s forH
Lo6 in
Lo6 out
;etc8 messa6es
Delete messa6es
I#(&
(ro)i%es t8e followin6 e<tra
featuresH
user can c8eck t8e email
8ea%er +efore %ownloa%in6.
user can searc8 t8e contents
of t8e email for a specific strin6
prior to %ownloa%in6.
user can createG %eleteG or
rename mail+o<es on t8e mail
ser)er.
user can create a 8ierarc8y of
mail+o<es in a fol%er for email
stora6e.
#ultipurpose Internet #ail
.<tension!#I#."
1#T( cannot transmit non*te<t
messa6es.
1olutions !like uuenco%e" e<ists
on
some systemsG +ut are not
stan%ar%iDe%.
\ Cannot transmit te<t t8at
inclu%es
international c8aracters !e.6. ]G
^G _G `G aG bG c".
Nee% 4 +it 1CII.
1er)ers may reJect mail o)er
certain siDe.
\ 1ome 1#T( implementations
%o not a%8ere to stan%ar%.
CRL;G truncate or wrap lon6
linesG remo)al of w8ite spaceG
etc.
O)er)iew of #I#.
;i)e new messa6e 8ea%er
fiel%sH
#I#.*)ersion
Content*type
Content*transfer*enco%in6
Content*I%
Content*%escription
num+er of content types and
transfer encoding formats
have been %efine%.
Content Types
Te<t +o%y
#ultipart
#i<e%G (arallelG lternati)e
#essa6e
R;C 422G (artialG
.<ternal*+o%y
Ima6e
Jpe6G 6if
'i%eo
mpe6
u%io
7asic
pplication
(ostscript
octet stream
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
*
#I#. Transfer .nco%in6s
1pecifies 8ow t8e mail +o%y is
wrappe% for transmission.
Content transfer enco%in6 fiel%
can 8a)e si< possi+le )alues.
2+itG 4+itG +inaryH no enco%in6
%one for t8ese t8ree.
(ro)i%e information a+out
nature of %ata.
Uuote%*printa+le
Data mostly printa+le 1CII
c8aracters.
Non*printin6 c8aracters represente%
+y 8e< co%e.
7ase-&
#aps ar+itrary +inary input onto
printa+le output.
F*token
Name% nonstan%ar% enco%in6.
"I"E 5e%er E9mp(e
;romH In%ranil 1en6upta
Zis6Riitk6p.ac.inW
ToH :aswin%er 8uJa
ZJassiRca%ence.comW
1u+JectH 1imple #essa6e
#I#.*'ersionH 1.9
Content*typeH multipartEmi<e%P
+oun%aryQLsimple +oun%aryL
T8is is t8e pream+le. It is to +e
i6nore%G t8ou68 it is a 8an%y
place for
mail composers to inclu%e an
e<planatory note.**simple
+oun%ary
T8is is implicitly type% plain
te<t. It %oes NOT en% wit8 a
line+reak.
** simple +oun%ary
Content*typeH te<tEplainP
c8arsetQus*ascii
T8is is e<plicitly type% plain
1CII te<t. It DO.1 en% wit8 a
line+reak.
**simple +oun%ary**
T8is is t8e epilo6ue. It is also to
+e i6nore%.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
)
UNIT - 2
$E1ER$
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
+
computerG or a software packa6eG t8at pro)i%es a specific kin% of ser)ice to
client software runnin6 on ot8er computers. T8e term can refer to a particular piece of
softwareG suc8 as a $$$ ser)erG or to t8e mac8ine on w8ic8 t8e software is runnin6G
e.6. LOur mail ser)er is %own to%ayG t8atMs w8y e*mail isnMt 6ettin6 out.L sin6le
ser)er mac8ine can !an% often %oes" 8a)e se)eral %ifferent ser)er software packa6es
runnin6 on itG t8us pro)i%in6 many %ifferent ser)ers to clients on t8e network.
1ometimes ser)er software is %esi6ne% so t8at a%%itional capa+ilities can +e a%%e% to
t8e main pro6ram +y a%%in6 small pro6rams known as ser)lets
1. WE6 $ER1ER
we+ ser)er is a computer pro6rams t8at %eli)ers !ser)es" contentG suc8 as t8is
we+ pa6eG usin6 t8e 3yperte<t Transfer (rotocol.
In ot8er wor%G a we+ ser)er is a computer t8at stores we+sites an% t8eir relate%
files for )iewin6 on t8e Internet. 'isitors wis8in6 to access t8e sites an% files simply
type in t8e correspon%in6 URL to t8e site t8ey wis8 to )iew. $e+ 8ostin6 is +i6
+usiness in t8e a6e of electronic commerce.
.)ery $e+ ser)er 8as an I( %%ress an% possi+ly a %omain name. ;or e<ampleG if
you enter t8e URL http://www.pcwebopedia.com/index.html in your +rowserG t8is
sen%s a re@uest to t8e ser)er w8ose %omain name is pcwebopedia.com. T8e ser)er
t8en fetc8es t8e pa6e name% index.html an% sen%s it to your +rowser. ny Computer
can +e turne% into a $e+ ser)er +y installin6 ser)er software an% connectin6 t8e
mac8ine to t8e Internet. T8ere are many $e+ ser)er software applicationsG inclu%in6
pu+lic %omain software from NC1 an% pac8eG an% commercial packa6es from
#icrosoftG Netscape an% ot8ers.3ere is mainly two type of ser)er use in wi%e ran6e
areH * II1 an% pac8e we+ ser)er.
1.1 II$
Internet Information 1er)ices !II1" formerly calle% Internet Information
1er)er G is a we+ ser)er application an% set of feature e<tension mo%ules create% +y
#icrosoft for use wit8 #icrosoft $in%ows. It is t8e worl%Ms secon% most popular we+
ser)er in terms of o)erall we+sites +e8in% t8e in%ustry lea%er pac8e 3TT( 1er)er.
T8e protocols supporte% in II1 2 inclu%eH ;T(G ;T(1G 1#T(G NNT(G an%
3TT(E3TT(1.
II1 is use% to make your computer a we+ ser)er. If we want to 8a)e a we+ ser)er for
%e)elopin6 %ynamic we+sites or want to pu+lis8 we+site on our own ser)er t8en we
install t8e II1. II1 is use% on win%ows plate form. ;or ot8er plate form we 8a)e
%ifferent we+ ser)ers. ..6. apac8e for Linu<. II1 takes re@uest from user an% e<ecutes
!response" t8e re@uire% files an% sen%s result +ack to t8e user.
1.1.1 Inst((tion
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








*
,
To install II1 you must 8a)e your operatin6 systems CD !$in F( or $in 2/". Click
1tartG point to Control (anel an% click %% or Remo)e (ro6rams.
Click t8e %%ERemo)e $in%ows Components +utton in t8e %% or Remo)e
(ro6rams
On t8e $in%ows Components win%owG click on t8e pplication 1er)er entry
an% click t8e Details +utton

h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
-
.n th/ Appl&cat&on S/01/0 pag/, cl&c2 on th/ Int/0n/t
In3o0mat&on S/01&c/s 4IIS5 /nt0% an6 cl&c2 th/ D/ta&ls b7tton
In th/ Int/0n/t In3o0mat&on S/01&c/ 4IIS5 6&alog bo8, p7t a
ch/c2 ma02 &n th/ 9o0l6 9&6/ 9/b S/01&c/ ch/c2 bo8 an6
cl&c2 .#
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
$
:l&c2 .# on th/ Appl&cat&on S/01/0 6&alog bo8
:l&c2 N/8t on th/ 9&n6o;s :ompon/nts 6&alog bo8
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
2
IIS S/01/0 Installat&on &n p0og0/ss
:l&c2 <&n&sh on th/ :ompl/t&ng th/ 9&n6o;s :ompon/nts
9&=a06 pag/
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
'
A3t/0 &nstallat&on o3 IIS a 7s/0 ;&ll b/ abl/ to con3&g70/ IIS acco06&ng
to h&s/h/0 0/>7&0/m/nt.
1.1.2 $e!urit* ?etures
II1 ,.9 an% 8i68er support t8e followin6 aut8entication mec8anismsH
7asic access aut8entication
Di6est access aut8entication
Inte6rate% $in%ows ut8entication
.N.T (assport ut8entication !not supporte% in $in%ows 1er)er 2994 an%
a+o)e"
II1 2., inclu%es t8e followin6 a%%itional security featuresH
Client Certificate #appin6
I( 1ecurity
Re@uest ;ilterin6
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
4
URL ut8oriDation
ut8entication c8an6e% sli68tly +etween II1 -.9 an% II1 2G most nota+ly in t8at t8e
anonymous user w8ic8 was name% LIU1R[dmac8inenameeL is a +uilt*in account in
'ista an% future operatin6 systems an% name% LIU1RL. Nota+lyG in II1 2G eac8
aut8entication mec8anism is isolate% into its own mo%ule an% can +e installe% or
uninstalle%.
1.2 ,p!4e We2 $er&er
T8e ,p!4e 5TT' we2 $er&er commonly referre% to as ,p!4eG is we+
ser)er software nota+le for playin6 a key role in t8e initial 6rowt8 of t8e $orl% $i%e
$e+. In 2995 it +ecame t8e first we+ ser)er software to surpass t8e 199 million we+
site milestone.

pac8e was t8e first )ia+le alternati)e to t8e Netscape
Communications Corporation we+ ser)er !currently known as 1un :a)a 1ystem $e+
1er)er"G an% 8as since e)ol)e% to ri)al ot8er Uni<*+ase% we+ ser)ers in terms of
functionality an% performance. T8e maJority of we+ ser)ers usin6 pac8e run a Uni<*
like operatin6 system.
pac8eG a pu+lic*%omain open source $e+ ser)er %e)elope% +y a loosely*knit
6roup of pro6rammers. T8e first )ersion of pac8eG +ase% on t8e NC1 8ttp% $e+
ser)erG was %e)elope% in 155,. Core %e)elopment of t8e pac8e $e+ ser)er is
performe% +y a 6roup of a+out 29 )olunteer pro6rammersG calle% t8e Apache Group.
3owe)erG +ecause t8e source co%e is freely a)aila+leG anyone can a%apt t8e ser)er for
specific nee%sG an% t8ere is a lar6e pu+lic li+rary of pac8e a%%*ons. In many
respectsG %e)elopment of pac8e is similar to %e)elopment of t8e Linu< operatin6
system. T8e ori6inal )ersion of pac8e was written for UNIFG +ut t8ere are now
)ersions t8at run un%er O1E2G $in%ows an% ot8er platforms.
T8e name is a tri+ute to t8e Nati)e merican pac8e In%ian tri+eG a tri+e well
known for its en%urance an% skill in warfare. common misun%erstan%in6 is t8at it
was calle% pac8e +ecause it was %e)elope% from e<istin6 NC1 co%e plus )arious
patc8esG 8ence t8e name a patc8y ser)erG or pac8e 1er)er.
1.2.1 ?etures
pac8e supports a )ariety of featuresG many implemente% as compile%
mo%ules w8ic8 e<ten% t8e core functionality. T8ese can ran6e from ser)er*si%e
pro6rammin6 lan6ua6e support to aut8entication sc8emes. 1ome common lan6ua6e
interfaces support (erlG (yt8onG TclG an% (3(. (opular aut8entication mo%ules inclu%e
mo%[accessG mo%[aut8G mo%[%i6estG an% mo%[aut8[%i6estG t8e successor to
mo%[%i6est. sample of ot8er features inclu%e 11L an% TL1 support !mo%[ssl"G a
pro<y mo%ule !mo%[pro<y"G a URL rewriter !also known as a rewrite en6ineG
implemente% un%er mo%[rewrite"G custom lo6 files !mo%[lo6[confi6"G an% filterin6
support !mo%[inclu%e an% mo%[e<t[filter".'irtual 8ostin6 allows one pac8e
installation to ser)e many %ifferent actual we+sites. ;or e<ampleG one mac8ine wit8
one pac8e installation coul% simultaneously ser)e www.e<ample.comG
www.test.comG test&2.test*ser)er.test.comG etc. pac8e features confi6ura+le error
messa6esG D7#1*+ase% aut8entication %ata+asesG an% content ne6otiation. It is also
supporte% +y se)eral 6rap8ical user interfaces !0UIs".
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
(
1.2.2 Use
pac8e is primarily use% to ser)e +ot8 static content an% %ynamic $e+ pa6es
on t8e $orl% $i%e $e+. #any we+ applications are %esi6ne% e<pectin6 t8e
en)ironment an% features t8at pac8e pro)i%es.
pac8e is use% for many ot8er tasks w8ere content nee%s to +e ma%e a)aila+le
in a secure an% relia+le way. One e<ample is s8arin6 files from a personal computer
o)er t8e Internet. user w8o 8as pac8e installe% on t8eir %esktop can put ar+itrary
files in pac8eMs %ocument root w8ic8 can t8en +e s8are%.
2. TE"IN,+ $ER1ER
T8e Terminal 1er)er component of t8e #icrosoft $in%ows 1er)erf 2993
operatin6 system can %eli)er t8e $in%ows %esktopG in a%%ition to $in%ows*+ase%
applicationsG from a centraliDe% ser)er to )irtually any %esktop computin6 %e)iceG
inclu%in6 t8ose t8at cannot run $in%ows. Terminal 1er)ices transmits only t8e user
interface of t8e pro6ram to t8e client computer. Terminal ser)ices in win%ows 1er)er
2993 can en8ance an enterpriseKs %eployment capa+ilities for a )ariety of scenariosG
allowin6 su+stantial fle<i+ility in application an% mana6ement infrastructure. T8e
client computer t8en returns key+oar% an% mouse clicks to +e processe% +y t8e ser)er.
Terminal 1er)er uses t8e Remote Desktop (rotocol !RD(" to communicate +etween
client an% ser)er. Client computers connectin6 to t8e terminal ser)er can run
$in%ows !inclu%in6 t8e #icrosoftf $in%owsf C. operatin6 system" or run on
ot8er operatin6 systems suc8 as t8e pple #acintos8 or e)en UNIF !usin6 a t8ir%*
party a%%*on". .ac8 user sees only t8eir in%i)i%ual sessionG w8ic8 is mana6e%
transparently +y t8e ser)er operatin6 system an% is in%epen%ent of any ot8er client
session.
2.1Termin( $er&i!es ,r!4ite!ture

Terminal 1er)ices consists of four componentsH
T8e $in%ows 1er)er 2993 multi*user kernel
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
*
T8e Remote Desktop client
T8e Terminal 1er)ices Licensin6 ser)iceG an%
1ession Directory 1er)ices.
2.1.1 "u(ti-user kerne( /
T8e multi*user kernel e<tensionsG ori6inally %e)elope% for $in%ows NT &.9
1er)erG Terminal 1er)er .%itionG 8a)e +een en8ance% an% fully inte6rate% as a
stan%ar% part of t8e $in%ows 1er)er 2993 family kernel. T8ese are resi%ent on t8e
ser)er at all timesG re6ar%less of w8et8er Terminal 1er)ices is ena+le% or not.
2.1.2 Remote Desktop !(ient/
T8e client software is an application t8at esta+lis8es an% maintains t8e
connection +etween a client an% a ser)er computer runnin6 Terminal 1er)ices.
2.1.) Termin( $er&i!es (i!ensin# ser&i!e/
T8is system allows terminal ser)ers to o+tain an% mana6e terminal ser)er
client access license !T1 CL" tokens for %e)ices an% users connectin6 to a terminal
ser)er.
2.1.0 $ession Dire!tor* $er&i!es/
T8e session %irectory !1D" keeps a list of sessions in%e<e% +y user nameG an%
allows a user to reconnect to t8e terminal ser)er w8ere t8e userKs %isconnecte% session
resi%es an% resume t8at session.
2.2 Components
Component Des!ription
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
)
C$R$$.e9e T8e Client*1er)er Runtime 1u+system is t8e process an% t8rea%
mana6er for all lo6on sessions.
R%pDD.s*s Captures t8e $in%ows user interface an% translates it into a form
t8at is rea%ily con)erte% +y RD($D into t8e RD( protocol
R%pWD.s*s Unwraps t8e multi*c8annel %ata an% t8en transfers it to t8e
appropriate session.
$"$$.e9e 1ession #ana6er creates an% mana6es all sessions.
Termsr&.e9e #ana6es client connections an% initiates creation an% s8ut%own of
connection conte<ts.
Term%%.s*s T8e RD( protocolG w8ic8 listens for RD( client connections on a
TC( port.
T%t!p.s*s (acka6es t8e RD( protocol onto t8e un%erlyin6 network protocolG
TC(EI(.
W(notif*.%(( Runs in t8e sessionKs $inLo6on process to create processes in t8e
user session.
Win)2k.s*s #ana6es t8e $in%ows 0UI en)ironment +y takin6 t8e mouse an%
key+oar% inputs an% sen%in6 t8em to t8e appropriate application.
Win+o#on.e9e T8is system ser)ice 8an%les user lo6ons an% lo6offs an% processes
t8e special $in%ows key com+ination Ctrl*lt*Delete. $inLo6on
is responsi+le for startin6 t8e $in%ows s8ell !w8ic8 is usually
$in%ows .<plorer".
s t8e $in%ows 1er)er 2993 Terminal 1er)er +oots an% loa%s t8e core
operatin6 systemG t8e Terminal 1er)er ser)ice !termsr).e<e" is starte% an% +e6ins
waitin6 for session connections. .ac8 connection is 6i)en a uni@ue session i%entifier
or N1essionIDO to represent an in%i)i%ual session to t8e Terminal 1er)erG an% eac8
process create% wit8in a session is Nta66e%O wit8 t8e associate% 1essionID to
%ifferentiate its namespace from any ot8er session namespaces.
T8e console session !Terminal 1er)er key+oar%G mouseG an% )i%eo" is always
t8e first to loa%G is treate% as a special*case client connectionG an% is assi6ne%
1essionID9. T8e console session starts as a normal $in%ows 1er)er 2993 sessionG
wit8 t8e confi6ure% $in%ows %isplayG mouseG an% key+oar% %ri)ers loa%e%.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
+
fter creatin6 t8e console sessionG t8e Terminal 1er)er ser)ice t8en calls t8e
$in%ows 1ession #ana6er !1#11..F." to create two i%le client sessionsG w8ic8
t8en await client connections. To create t8e i%le sessionsG t8e 1ession #ana6er starts
t8e Client*1er)er Run*time 1u+system !C1R11..F."G an% a new 1essionID is
assi6ne% to t8at process. T8e C1R11 process also in)okes t8e $inLo6on process
!$INLO0ON..F." an% t8e $in%ows #ana6er an% 0DI kernel mo%ule
!$in32k.sys" un%er t8e newly associate% 1essionID.
T8e $in%ows ima6e loa%er reco6niDes t8is $in32k.sys as a 1ession1pace
loa%a+le ima6e +y a pre%efine% +it set in t8e ima6e 8ea%er. It t8en relocates t8e co%e
portion of t8e ima6e into p8ysical memory wit8 pointers from t8e )irtual kernel
a%%ress space for t8at session if $in32k.sys 8as not alrea%y +een loa%e%. 7y %esi6nG it
always attac8es to a pre)iously loa%e% ima6eKs co%e !$in32k.sys" if one alrea%y
e<ists in memory !t8at isG from any acti)e application or session". T8e %ata !or non*
s8are%" section of t8is ima6e is t8en allocate% to t8e new session from a newly create%
1ession 1pace pa6ea+le kernel memory section.
Unlike t8e console sessionG Terminal 1er)er client sessions are confi6ure% to
loa% separate %ri)ers for t8e %isplayG key+oar%G an% mouse. T8e %isplay %ri)er is t8e
Remote Desktop (rotocol !RD(" %isplay %e)ice %ri)er !r%p%%.%ll"G an% t8e mouse an%
key+oar% %ri)ers are replace% wit8 t8e RD( %ri)er R%pw%.sys. T8ese %ri)ers allow
t8e RD( client session to +e +ot8 a)aila+le an% interacti)eG remotely. ;inallyG
Terminal 1er)er also in)okes a connection listener t8rea% for t8e RD( protocol
!Term%%.sys"G w8ic8 listens for RD( client connections on a TC( port.
t t8is pointG t8e C1R11 process e<ists un%er its own 1essionID namespaceG
wit8 its %ata instantiate% per process as necessary. ny processes create% from wit8in
t8is 1essionID will e<ecute wit8in t8e 1ession 1pace of t8e C1R11 process
automatically. T8is pre)ents processes wit8 %ifferent 1essionIDs from accessin6
anot8er session %ata.
2.) Inst((tion F Confi#urtion Termin( $er&i!es
Use t8e followin6 stepsH
1. C8oose t8e licensin6 mo%e.
2. Confi6ure t8e Terminal 1er)er role.
3. Create an a%ministrator account.
&. Create a computer account an% connect to t8e network.
,. Confi6ure Terminal 1er)er licensin6.
-. Re%irect #y Documents fol%ers.
2. Install client applications.
$tep 1/ C4oose t4e +i!ensin# "o%e /
To use Terminal 1er)er in your or6aniDationG you are re@uire% to 8a)e a $in%ows
1er)er 2993 license for e)ery terminal ser)er t8at you %eploy in your or6aniDation as
well as Terminal 1er)er Client ccess Licenses !CLs" for %e)ices t8at access t8e
terminal ser)ers. ;or terminal ser)ers t8at are runnin6 $in%ows 1er)er 2993G t8ere
are two types of Terminal 1er)er CLsH
(er De)ice
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








)
,
(er User
$8ic8 CL you c8oose %epen%s on 8ow you plan to use Terminal 1er)er. 7y %efaultG
Terminal 1er)er is confi6ure% in (er De)ice mo%eG +ut it can +e switc8e% to (er User
mo%e usin6 t8e Terminal 1er)ices Confi6uration tool !T1CC.msc". ?ou can ser)e
+ot8 license types from t8e same license ser)er.
Terminal 1er)er license ser)er on your network mana6es t8e Terminal 1er)ices
CLs. license ser)er stores all Terminal 1er)er CL tokens t8at 8a)e +een
installe% for a terminal ser)er an% tracks t8e license tokens t8at 8a)e +een issue% to
clients.
'er De&i!e +i!ensin# "o%e
(er De)ice CL pro)i%es eac8 client computer t8e ri68t to access a terminal ser)er
t8at is runnin6 $in%ows 1er)er 2993. T8e (er De)ice CL is store% locally an%
presente% to t8e terminal ser)er eac8 time t8e client computer connects to t8e ser)er.
(er De)ice licensin6 is a 6oo% c8oice forH
3ostin6 a userKs primary %esktop for %e)ices t8e customer owns or
controls.
T8in clients or computers t8at connect to a terminal ser)er for a lar6e
percenta6e of t8e workin6 %ay.
T8is type of licensin6 is a poor c8oice if you %o not control t8e %e)ice accessin6 t8e
ser)erG for e<ampleG computers in an Internet cafaG or if you 8a)e a +usiness partner
w8o connects to your terminal ser)er from outsi%e your network.
'er User +i!ensin# "o%e
In (er User licensin6 mo%e you must 8a)e one license for e)ery user. $it8 (er User
licensin6G one user can access a terminal ser)er from an unlimite% num+er of %e)ices
an% only nee%s one CL rat8er t8an a CL for eac8 %e)ice.
(er User licensin6 is a 6oo% c8oice in t8e followin6 situationsH
(ro)i%in6 access for roamin6 users.
(ro)i%in6 access for users w8o use more t8an one computerG for e<ampleG
a porta+le an% a %esktop computer.
(ro)i%in6 ease of mana6ement for or6aniDations t8at track access
to t8e network +y userG rat8er t8an +y computer.
In 6eneralG if your or6aniDation 8as more computers t8an usersG (er User
licensin6 mi68t +e a cost*effecti)e way to %eploy Terminal 1er)er +ecause you only
pay for t8e user to access Terminal 1er)erG rat8er t8an payin6 for e)ery %e)ice from
w8ic8 t8e user accesses Terminal 1er)er. C8eck t8e .UL for t8e applications t8at
you plan to 8ost to %etermine if t8ey support per user licensin6.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
-
$tep 2/ Confi#ure t4e Termin( $er&er Ro(e
On t8e ser)er runnin6 $in%ows 1er)er 2993 t8at you plan to use as an a%%itional
ser)erG confi6ure t8e Terminal 1er)er role.
To inst(( Termin( $er&er
1.Lo6 on to t8e a%%itional ser)er usin6 t8e local a%ministrator account.
2. 'erify t8at t8e $in%ows Time ser)ice is confi6ure% an% runnin6G an% t8at t8e time is
correct.
3. Click $trtG click "n#e Aour $er&erG an% t8en click ,%% or remo&e ro(e. T8e
Confi6ure ?our 1er)er $iDar% starts.
&. Click OK on t8e 're(iminr* $teps pa6e.
,. On t8e $er&er Ro(e pa6eG select t8e Termin( ser&er c8eck +o<G an% t8en click Ne9t.
-. Click Ne9t on t8e $ummr* of $e(e!tions pa6e to +e6in t8e confi6uration. ?our
computer will restart as part of t8e confi6uration.
$tep )/ Crete n ,%ministrtor ,!!ount
Ne<tG create a %omain a%ministrator account in or%er to mana6e your a%%itional
ser)er.
To !rete n %ministrtor !!ount for t4e %%ition( ser&er
1. Lo6 on to t8e computer runnin6 $in%ows 1er)er 2993 usin6 t8e local
a%ministrator account.
1. Click $trtG an% t8en click $er&er "n#ement.
2. In t8e console treeG click Users.
3. In t8e %etails paneG click ,%% User.
&. T8e %% User $iDar% starts.
On t8e Temp(te $e(e!tion pa6eG in t8e Temp(tes %ialo6 +o<G click
,%ministrtor Temp(te.
On t8e $et Up C(ient Computer pa6eG click Do not set up !omputer.
On t8e Comp(etin# t4e ,%% User WiBr% pa6eG click ?inis4.
$tep 0/ Crete Computer ,!!ount n% Conne!t to t4e Network
Ne<tG create a %omain a%ministrator account in or%er to mana6e your a%%itional
ser)er.
To create an a%ministrator account for t8e a%%itional ser)er
1. Lo6 on to t8e computer runnin6 $in%ows 1mall 7usiness 1er)er 2993 usin6
t8e local a%ministrator account.
1. Click $trtG an% t8en click $er&er "n#ement.
2. In t8e console treeG click Users.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
$
3. In t8e %etails paneG click ,%% User.
&. T8e %% User $iDar% starts.
On t8e Temp(te $e(e!tion pa6eG in t8e Temp(tes %ialo6 +o<G click
,%ministrtor Temp(te.
On t8e $et Up C(ient Computer pa6eG click Do not set up !omputer.
On t8e Comp(etin# t4e ,%% User WiBr% pa6eG click ?inis4.
$tep 3/ Crete Computer ,!!ount n% Conne!t to t4e Network
Ne<tG create an account for your a%%itional ser)er on t8e $in%ows 1mall 7usiness
1er)er networkG an% t8en Join t8e ser)er to t8e network.
To create a computer account
1. Lo6 on to t8e computer runnin6 $in%ows 1mall 7usiness 1er)er 2993 usin6
t8e +uilt*in %ministrator account.
1. Click $trtG an% t8en click $er&er "n#ement.
2. In t8e console treeG click $er&er Computers.
3. In t8e %etails paneG click $et Up $er&er Computers. T8e 1et Up 1er)er
$iDar% starts.
&. ;ollow t8e instructions in t8e wiDar% for creatin6 a ser)er computer.
To connect t8e terminal ser)er to t8e network
1. On t8e new ser)erG lo6 on usin6 t8e +uilt*in %ministrator account.
1. In Internet .<plorerG 6o to 8ttpHEEerver!ameEconnectcomputerG an% t8en click
Conne!t to t4e network now.
2. ;ollow t8e instructions in t8e wiDar% to connect t8is computer to t8e network.
Use t8e a%ministrator user name an% passwor% t8at you create% w8en you ran
t8e %% User $iDar%.
$tep 7/ Confi#ure Termin( $er&er +i!ensin#
fter you 8a)e Joine% t8e a%%itional ser)er to t8e networkG confi6ure t8e ser)er wit8
Terminal 1er)er licensin6. ;or information a+out a%%in6 an a%%itional ser)erG click
$trtG click 5e(p n% $upportG an% t8en searc8 for LTerminal 1er)er Licensin6.L
To confi6ure Terminal 1er)er Licensin6
1. Click $trtG click Contro( 'ne(G an% t8en click ,%% or Remo&e 'ro#rms.
1. Click ,%%:Remo&e Win%ows Components.
2. In t8e Components %ialo6 +o<G click Termin( $er&er +i!ensin#G an% t8en
click Ne9t.
3. On t8e Termin( $er&er +i!ensin# $etup pa6eG click Ne9t to accept t8e
%efault on t8at pa6e.
&. (ro)i%e t8e file system location w8ere t8e license ser)er %ata+ase s8oul% +e
installe% on t8e Terminal 1er)er license ser)erG click Ne9tG an% t8en click
?inis4. T8e %efault location for t8e license ser)er %ata+ase is
systemrootg1ystem32gL1er)er.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
2
,!ti&tin# t4e +i!ense $er&er /
fter a Terminal 1er)er license ser)er is acti)ate%G it +ecomes t8e repository for
Terminal 1er)er client licenses. Terminal 1er)er license ser)er can issue temporary
licenses for clients t8at allow use of terminal ser)ers for up to 129 %ays from t8e %ate
of t8e first client lo6on. fter t8is e)aluation perio% en%sG a terminal ser)er can no
lon6er allow clients to connect unless it locates a Terminal 1er)er license ser)er to
issue client licenses. Licensin6 wiDar% propertiesG suc8 as acti)ation met8o% an%
company informationG set %urin6 t8e acti)ation processG can +e c8an6e% later.
To acti)ate t8e license ser)er
1. Click $trtG click Contro( 'ne(G click ,%ministrti&e Too(sG an% t8en click
Termin( $er&er +i!ensin#.
1. In t8e console treeG ri68t*click t8e Terminal 1er)er license ser)er you want to
acti)ateG an% t8en click ,!ti&te $er&er to start t8e Terminal 1er)er License
1er)er cti)ation $iDar%.
2. In ,!ti&tion met4o%G select ,utomti! !onne!tion !recommen%e%"G an%
t8en click Ne9t. ;ollow t8e instructions in t8e wiDar%.
,%%in# C(ient +i!enses to t4e +i!ense $er&er /
?ou must purc8ase a client access license for eac8 client computer t8at connects to
t8e terminal ser)er an% install t8em on t8e license ser)er for users to +e a+le to use t8e
terminal ser)er. ;or more information a+out Terminal 1er)er licensin6G click $trtG
click 5e(p n% $upportG an% t8en searc8 for LTerminal 1er)er Licensin6.L
To install client license key packs
1. On t8e terminal ser)erG click $trtG click Contro( 'ne(G click
,%ministrti&e Too(sG an% t8en click Termin( $er&er +i!ensin#.
1. 'erify t8at t8e installation met8o% for t8e Terminal 1er)er license ser)er is set
to ,utomti! +y ri68t*clickin6 t8e Terminal 1er)er license ser)er for w8ic8
you want to install key packsG an% t8en clickin6 'roperties. On t8e
Inst((tion "et4o% ta+G c8an6e t8e installation met8o% if necessary.
2. In t8e console treeG ri68t*click t8e Terminal 1er)er license ser)er for w8ic8
you want to install key packsG click Inst(( +i!enses to start t8e Terminal
1er)er CL Installation $iDar%G an% t8en click Ne9t.
T8e pre)ious steps are not necessary if t8e Terminal 1er)er CL Installation
$iDar% is alrea%y starte%.
3. In (ro6ram an% Client License InformationG pro)i%e t8e re@uire% information
for your licensin6 pro6ram to recei)e your key packsG an% t8en click Ne9t.
T8e #icrosoft Clearin68ouse processes your re@uestG an% installs t8e
encrypte% client license key pack on your Terminal 1er)er license ser)er.
&. Click ?inis4 to complete t8e process.
T8e Terminal 1er)er license ser)er can now issue licenses to clients t8at
connect to a Terminal ser)er.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
'
$tep ;/ Re%ire!t "* Do!uments ?o(%ers
It is recommen%e% t8at you re%irect usersK #y Documents fol%ers to t8e ser)er
runnin6 $in%ows 1mall 7usiness 1er)er 2993 an% apply )olume @uotas to t8e
fol%ers. 7y %efaultG usersK #y Documents fol%ers are sa)e% wit8 t8e user profiles on
t8e terminal ser)er. If you use #y Documents Re%irection an% t8e +ackup feature of
1mall 7usiness 1er)er 2993G your usersK %ata will +e +acke% up alon6 wit8 t8e rest of
t8e ser)er. ;or information a+out re%irectin6 usersK #y Documents fol%ers from t8e
terminal ser)er to t8e $in%ows 1mall 7usiness 1er)er 2993G click $trtG click 5e(p
n% $upportG an% t8en searc8 for L;ol%er re%irection.L
To ensure t8at usersK #y Documents fol%ers sync8roniDe wit8 t8e ser)erG tell t8e
users to lo6 off from t8eir terminal ser)er sessions rat8er t8an simply close t8e
session.
$tep </ Inst(( C(ient ,pp(i!tions
?ou can use t8e client applications on t8e computer runnin6 $in%ows 1mall 7usiness
1er)er 2993 an% install t8em on t8e terminal ser)er. ?ou can also install ot8er client
applications on t8e terminal ser)er. ;or more information a+out installin6 an% runnin6
applications wit8 Terminal 1er)erG click $trtG click 5e(p n% $upportG an% t8e
searc8 for LTerminal 1er)er.L ;or more information a+out installin6 #icrosoft
Office 2993 in a Terminal 1er)er en)ironmentG see t8e w8itepaper LDeployin6 Office
2993 in a $in%ows Terminal 1er)ices .n)ironmentL at t8e #icrosoft $e+ site
!8ttpHEE6o.microsoft.comEfwlinkE>LinkI%Q2&521".
Inst((in# Out(ook
?ou can install #icrosofth Office Outlookh 2993 on t8e terminal ser)er from t8e
ser)er runnin6 1mall 7usiness 1er)er 2993.
To install Outlook
1. On t8e a%%itional ser)erG lo6 on usin6 t8e %omain a%ministrator account.
1. Click $trtG click RunG an% t8en type GGerver!ame.
2. Dou+le*click C(ient,ppsG an% t8en %ou+le*click out(ook2>>).
Dou+le*click $etup.e9eG an% t8en follow t8e 1etup instructions.
3. To close Outlook 1etup after installationG click Ne9tG an% t8en click
?inis4. .nsure t8at you close t8e wiDar% t8at launc8es alon6 wit8 1etup.
Inst((in# Internet E9p(orer /
?ou %o not nee% to install Internet .<plorer on t8e terminal ser)erP t8e correct )ersion
of Internet .<plorer is inclu%e% wit8 $in%ows 1er)er 2993. T8e ;a)orites menu an%
connection settin6s are confi6ure% +y Client 1etup. 1ome links on t8e ;a)orites menu
point to items t8at re@uire t8e installation of #icrosoft cti)eFh controls or
certificates. To prepare Internet .<plorer for t8ese linksG use t8e followin6 proce%ure.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
4
Confi#urin# ?9 for Termin( $er&er Users /
?ou can confi6ure t8e ser)er runnin6 $in%ows 1mall 7usiness 1er)er 2993 as t8e
fa< ser)er for Terminal 1er)er users +y installin6 t8e ;a< 1er)ice on t8e ser)er
runnin6 $in%ows 1mall 7usiness 1er)er 2993. ;or more information a+out 8ostin6
;a< 1er)ices on t8e a%%itional ser)erG click $trtG click 5e(p n% $upportG an% t8en
searc8 for LUsin6 ;a<.L
To confi6ure ;a< 1er)ices for Terminal 1er)er usersG you nee% to confi6ure t8e
terminal ser)er an% eac8 client computer t8at will use t8e ser)ice. Use t8e followin6
proce%ure to confi6ure t8e terminal ser)er for usin6 fa<. $8en you are confi6urin6
t8e client computers to use t8e Terminal 1er)erG you will also nee% to confi6ure t8e
client computers to use fa<.
To !onfi#ure t4e termin( ser&er for f9 /
1. ;rom t8e terminal ser)erG click $trtG click Contro( 'ne(G an% t8en
click ,%% or Remo&e 'ro#rms.
1. Click ,%%:Remo&e Win%ows Components.
2. 1elect t8e ?9 $er&i!es c8eck +o<G an% t8en click Ne9t.
3. Click Do not s4re t4is printerG an% t8en click Ne9t.
&. Click ?inis4.
$tep =/ Confi#ure C(ient Computers /
To confi6ure t8e client computers to access t8e terminal ser)erG you must install t8e
Remote Desktop Connection on eac8 client computer. fter you 8a)e installe% t8e
Remote Desktop ConnectionG you can confi6ure t8e client computers for ;a<
1er)ices.
To inst(( Remote Desktop Conne!tion on !(ient !omputers /
1. ;rom t8e client computerG click $trtG click RunG an% t8en typeH
GGerver!ameGclientapps
1. Click ts!(ient.
2. Dou+le*click t8e $in32 fol%erG an% t8en %ou+le*click $etup.e9e.
3. Complete t8e Remote Desktop Connection * Install18eil% $iDar%.
To !onfi#ure !(ient !omputers to use ?9 $er&i!es /
1. ;rom eac8 client computerG click $trtG click 'ro#rmsG click ,!!essoriesG
click Communi!tionsG click Remote Desktop Conne!tionG an% t8en lo6 on
to t8e terminal ser)er usin6 t8e Remote Desktop Connection.
1. Click $trtG click 'rinters n% ?9esG an% t8en %ou+le*click ,%% printer.
T8e %% (rinter wiDar% starts.
2. Click Ne9t.
3. Click , network printerH or printer tt!4e% to not4er !omputerG an%
t8en click Ne9t.
&. Click ?in% printer in t4e %ire!tor*G an% t8en click Ne9t .
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
(
,. In t8e ?in% 'rinters %ialo6 +o<G click ?in% Now.
In t8e searc8 results listG a printer name% ?9 s8oul% appear. 1elect t8e printer
name% ?9G an% t8en click OK.
-. Click No w8en aske% if you want to set t8is printer as t8e %efault printerG an%
t8en click ?inis4.
2.0 5ow to !onne!t !(ient wit4 Termin( ser&er
C(ient
To connect to Terminal ser)er remotely followin6 step re@uire%.
Click $trtG click ,(( 'ro#rmsG click ,!!essoriesG click Communi!tionG an% t8en
click Remote Desktop Conne!tion.
T8en a win%ow will +e appear like t8is
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
*
3ere a user can specify 8isE8er re@uirement.
fter Click on t8e Conne!t +utton t8e client will +e connecte% to t8e terminal ser)er
an% a terminal ser)er 0UI interface will appear on t8e client computer .
2.3 ,%&nt#es
,%&nt#e Des!ription
Rpi%H
!entr(iBe%
%ep(o*ment of
pp(i!tions
Terminal ser)er is 6reat for rapi%ly %eployin6 $in%ows*+ase% application
to
computin6 %e)ices across an enterprise* especially applications t8at are
fre@uently up%ate%G infre@uently use%G or 8ar% to mana6e.
$8en an application is mana6e% on terminal 1er)erG an% not on eac8
%e)iceG
a%ministrators can +e certain t8at users are runnin6 t8e latest )ersion of
t8e
application.
+ow-2n%wi%t4
!!ess to %t
Terminal ser)er consi%era+ly re%uces t8e amount of network +an%wi%t8
re@uire%
to access %ata remotely. Usin6 Terminal 1er)er to run an application o)er
+an%wi%t8*constraine% connectionsG suc8 as %ial*up or s8are% $N linksG
is )ery
effecti)e for remotely accessin6 an% manipulatin6 lar6e amount s of %ata
+ecause
only a screen )iew of t8e %ata is transmitte%G rat8er t8an t8e %ata itself.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
)
Win%ows
n*w4ere
Terminal 1er)er 8elps users +ecome more pro%ucti)e +y ena+lin6 access
to
current applications on any %e)ice* inclu%in6 un%er*powere% 8ar%ware
an%
Non*$in%ows %esktops. n% +ecause Terminal 1er)er lets you use
$in%ows anyw8ereG you can take a%)anta6e of e<tra processin6
capa+ilities from newerG li68ter*wei68t %e)ices suc8 as t8e (ocket (C.
'. WINDOW$ $ER1ER U'D,TE $ER1ICE$
-W$U$.
$1U1 pro)i%es a software up%ate ser)ice for #icrosoft $in%ows operatin6
systems an% ot8er #icrosoft software. $1U1 is a locally mana6e% system t8at works
wit8 t8e pu+lic #icrosoft Up%ate we+site to 6i)e system a%ministrators more control.
7y usin6 $in%ows 1er)er Up%ate 1er)icesG a%ministrators can mana6e t8e
%istri+ution of #icrosoft 8otfi<es an% up%ates release% t8rou68 automatic up%ates to
computers in a corporate en)ironment. $1U1 ser)er can o+tain up%ates eit8er from
#icrosoft Up%ate or from anot8er $1U1 ser)erG +ut at least one $1U1 ser)er in t8e
network must connect to #icrosoft Up%ate to 6et a)aila+le up%ates. T8e a%ministrator
can %eci%e 8ow many $1U1 ser)ers s8oul% connect %irectly to #icrosoft Up%ateG
+ase% on network confi6urationG +an%wi%t8G an% security consi%erations. T8ese
ser)ers can t8en %istri+ute up%ates to ot8er %ownstream $1U1 ser)ers.
$1U1 ori6inate% as 1oftware Up%ate 1er)ices !1U1"G w8ic8 %eli)ere% only
operatin6 system 8otfi<es an% patc8es. $1U1 +uil%s on 1U1 +y e<pan%in6 t8e ran6e
of software it can up%ate. T8e $1U1 infrastructure allows automatic %ownloa%s of
8otfi<esG up%atesG ser)ice packsG %e)ice %ri)ers an% feature packs to clients in an
or6aniDation from a central ser)er!s"G instea% of usin6 t8e pu+lic #icrosoft $in%ows
Up%ate we+site. T8is sa)es +an%wi%t8G time an% %isk spaceG as t8e in%i)i%ual
computers in a network %o not 8a)e to connect to an e<ternal ser)er t8emsel)esG +ut
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
+
connect to a local central ser)er. It also increases a%ministratorsM control an% allows
clients to o+tain up%ates in en)ironments t8at %o not 8a)e internet access.
).1 Inst((tion /
).1.1 $oftwre ReCuirements /
Computer runnin6 $in%ows 2993E2999 1er)er wit8 #icrosoft $in%ows
1er)er Up%ate 1er)ices !$1U1" installe%.
#icrosoft .N.T ;ramework )ersion 2.9 installe% on $1U1 ser)er.
).1.2 "inimum 5r%wre ReCuirements /
7ot8 t8e system partition an% t8e partition on w8ic8 we install $1U1 3.9 1(2
must +e formatte% wit8 t8e NT;1 file system.
#inimum 1 07 of free space on t8e system partition.
#inimum 2 07 of free space on t8e )olume on w8ic8 %ata+ase files will +e
store%.
#inimum 29 07 of free space is re@uire% on t8e )olume on w8ic8 content is
store%G 39 07 is recommen%e%
).1.) Inst((tion $teps/
$. Install software +y e<tractin6 t8e files in t8e $1U1.asyReporter.Dip file.
2. fter e<tractin6 t8e files na)i6ate to t8e fol%er w8ere t8e files w8ere e<tracte%
an% %ou+le*click on t8e setup.e<e file.
3. Click TNe<tK on t8e welcome screen.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








+
,
4. 6ree to t8e .n% User License 6reement an% click TNe<tK.
,. In t8e 1UL setup %ialo6 enter t8e 1UL ser)er instance for $1U1.
If $1U1 %ata+ase was installe% wit8 t8e %efault $#1D. %ata+ase t8en
enter LOCL3O1Tg$1U1 in t8e 1UL Instance te<t+o<.
If $1U1 %ata+ase was installe% on a %ifferent 1UL ser)er t8en enter t8e
name of t8e 1UL ser)er in t8e 1UL Instance te<t+o<.
.nter t8e %efault Root we+ location for $1U1. .nter a we+site title an% footer for t8e
$1U1 .asy Reporter we+site. Click TNe<tK.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
-
$. In t8e 1elect Installation %%ress %ialo6 c8oose t8e site t8at $1U1 is installe%
in !Default is Default $e+ 1ite".
i new we+site can +e create% +efore8an% an% t8en c8osen. T8e we+site will 8a)e to
8a)e 8ost 8ea%ers set an% our DN1 ser)er s8oul% 8a)e an alias !CN#." create% for
t8e site. .nter a )irtual %irectory name. T8is is t8e name t8at we will connect to in t8e
a%%ress +ar of our +rowser !i.e. 8ttpHEELOCL3O1TE$1U1Reports". Click TNe<tK.
2. Click TNe<tK to start t8e installation.
'. fter t8e setup is finis8e% rea% t8e rea%me an% click TNe<tK t8en Close.
).2 Confi#urin# t4e network/
fter we install $in%ows 1er)er Up%ate 1er)ices 3.9 1er)ice (ack 2 !$1U1
3.9 1(2"G t8e confi6uration wiDar% will launc8 automatically. $e can also run t8e
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
$
wiDar% later t8rou68 t8e Options pa6e of t8e $1U1 %ministration Console. 7y
%efaultG $1U1 3.9 1(2 is confi6ure% to use #icrosoft Up%ate as t8e location from
w8ic8 to o+tain up%ates. To o+tain up%ates from #icrosoft Up%ateG t8e $1U1 ser)er
uses port 49 for 3TT( protocol an% port &&3 for 3TT(1 protocol. T8is is not
confi6ura+le. If we 8a)e a pro<y ser)er on t8e networkG we can confi6ure $1U1 3.9
1(2 to use t8e pro<y ser)er. If t8ere is a corporate firewall +etween $1U1 an% t8e
InternetG we mi68t 8a)e to confi6ure t8e firewall to ensure t8at $1U1 can o+tain
up%ates.
NOTE/ lt8ou68 Internet connecti)ity is re@uire% to %ownloa% up%ates from
#icrosoft Up%ateG $1U1 offers us t8e a+ility to import up%ates onto networks t8at
are not connecte% to t8e Internet.
).) To spe!if* t4e w* t4is ser&er wi(( o2tin up%tes/
1. ;rom t8e confi6uration wiDar%G after Joinin6 t8e #icrosoft Impro)ement
(ro6ramG click Ne<t to select t8e upstream ser)er.
2. If we c8oose to sync8roniDe from #icrosoft Up%ateG we are finis8e% wit8 t8e
Options pa6e. Click Ne<tG or select 1pecify (ro<y 1er)er from t8e na)i6ation
pane.
'. If we c8oose to sync8roniDe from anot8er $1U1 ser)erG specify t8e ser)er
name an% t8e port on w8ic8 t8is ser)er will communicate wit8 t8e upstream
ser)er.
&. To use 11LG select t8e Use 11L w8en sync8roniDin6 up%ate information c8eck
+o<. In t8at case t8e ser)ers will use port &&3 for sync8roniDation. !#ake sure
t8at +ot8 t8is ser)er an% t8e upstream ser)er support 11L."
(. If t8is is a replica ser)erG select t8e NT8is is a replica of t8e upstream ser)erO
c8eck +o<.
*. t t8is pointG we are finis8e% wit8 upstream ser)er confi6uration. Click Ne<tG
or select 1pecify pro<y ser)er from t8e left na)i6ation pane.
).0 $trt W$U$/
To start t8e $1U1 %ministration ConsoleG click 1tartG point to ll (ro6ramsG
point to %ministrati)e ToolsG an% t8en click $in%ows 1er)er Up%ate 1er)ices 3.9.
).0.1 Confi#ure up%tes n% s*n!4roniBtion/
$e can %o t8ese proce%ures +y usin6 eit8er t8e $1U1 Confi6uration $iDar%
or t8e $1U1 %ministration Console.
1a)e an% %ownloa% information a+out our upstream ser)er an% pro<y ser)er.
C8oose t8e lan6ua6e of t8e up%ates.
1elect t8e pro%ucts for w8ic8 we want to recei)e up%ates.
C8oose t8e classifications of up%ates.
1pecify t8e sync8roniDation sc8e%ule for t8is ser)er.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
2
fter we confi6ure t8e network connectionG we can %ownloa% up%ates +y
sync8roniDin6 t8e $1U1 ser)er. 1ync8roniDation +e6ins w8en t8e $1U1 ser)er
contacts #icrosoft Up%ate. fter t8e $1U1 makes contactG $1U1 %etermines
w8et8er any new up%ates 8a)e +een ma%e a)aila+le since t8e last time we
sync8roniDe%. $8en we sync8roniDe t8e $1U1 ser)er for t8e first timeG all t8e
up%ates are a)aila+le an% are rea%y for our appro)al for installation. T8e initial
sync8roniDation may take a lon6 time.
).0.2 Confi#ure !(ient up%tes/
In $in%ows 1er)er Up%ate 1er)ices 3.9 !$1U1 3.9 1(2"G t8e $1U1 1etup
automatically confi6ures II1 to %istri+ute t8e latest )ersion of utomatic Up%ates to
eac8 client computer t8at contacts t8e $1U1 ser)er. T8e +est way to confi6ure
utomatic Up%ates %epen%s on t8e network en)ironment. In an en)ironment t8at uses
cti)e Directory ser)iceG we can use an e<istin6 %omainI+ase% 0roup (olicy o+Ject
!0(O" or create a new 0(O. In an en)ironment wit8out cti)e DirectoryG use t8e
Local 0(O. In t8is stepG we will confi6ure utomatic Up%ates an% t8en point t8e
client computers to t8e $1U1 ser)er.
). 6+,DE $ER1ER
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
'
+la%e ser)er is a strippe% %own ser)er computer wit8 a mo%ular %esi6n
optimiDe% to minimiDe t8e use of p8ysical space an% ener6y ;eatures an%
specifications
0.1 NEED O? 6+,DE $ER1ER
0enerallyG all IT %epartments face a
typical c8allen6e of increasin6 num+er of
ser)ers w8en %ifferent applications
re@uire separate infrastructure an%
platforms. s a result a lot of space is
re@uire% to 8ouse t8ese ser)ers an% t8at is
w8ere t8e pro+lem of real estate
mana6ement comes in as it lea%s to an
a%%itional financial +ur%en on t8e
company. T8is is +ecause w8en you are
e<pan%in6 p8ysicallyG you not only nee%
t8e space +ut also nee% t8e stan%ar%
re@uirements of +uil%in6 a fres8 ser)er
roomE%atacenter w8ic8 consists of powerG
coolin6G mana6ement G etc. ?ou nee% a
more powerful tec8nolo6y w8ic8 offers
t8e option of e<pansionG an% is less power
8un6ry in t8e ser)er space. T8usG +roa%ly
speakin6G consoli%ation aroun% a lesser
num+er of ser)ers is w8ere +la%e ser)ers
score.
0.2 ?E,TURE$
T8e %ifferent +la%e manufacturers )ary in specific confi6urations for t8eir +la%e
ser)ers an% c8assisG +ut t8e focus still remains to strip e<traneous components from
t8e +la%es so t8e +la%esM components can focus on essential processin6 an% ser)ices.
.ac8 +la%e is a ser)er +y itself an% 6enerally %e%icate% to a sin6le computin6 task
suc8 as file s8arin6G 11LG %ata processin6G $e+ pa6e ser)in6G cac8e mana6ement
G)i%eoEau%io streamin6G or firewall etc. 7la%e ser)ers pro)i%e 6reater IE9 connecti)ityG
8ot swap %ri)esG an% RID*, capa+ilities.
0.2.1 1irtu(iBtion
In a sin6le +la%e c8assisG you can 8a)e %ifferent operatin6 systemsG %ifferent memory
capacitiesG a mi< an% matc8 of 32*+it or -&*+it C(UsG an% so on. Once you 8a)e t8eseG
you can always run )irtualiDation software on top. lsoG +la%es let you pair your
%ynamic software wit8 %ynamic 8ar%wareG makin6 %eployment an% mana6ement of
)irtual ser)ers muc8 easier.
0.2.2 5ot $wppin#
3ot swappin6 is t8e a+ility to a%%G remo)e an% replace units at nee% wit8out 8a)in6 to
power*off t8e c8assis. 3ot swappin6 can apply to (1UsG networkG mana6ement an%
stora6e unitsG an% t8e +la%e ser)ers t8emsel)es. 3ot swappin6G couple% wit8
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
4
re%un%ancyG can 6i)e si6nificant relia+ility +enefits. It also ai%s maintenanceG +ecause
if a +la%e %e)elops a pro+lem it can +e remo)e% an% repaire% or replace% wit8out
%isruption of t8e ot8er +la%es in t8e system.
0.2.) 'ower/
T8e +la%e relies on t8e c8assis to pro)i%e (ower. In all c8assis power switc8in6
+alances power loa% an% re@uirements across t8e component +la%esM %eman%s. T8e
tec8nolo6y ensures t8at power isnMt waste% runnin6 un%eruse% +la%esG +ut in times of
8i68 %eman% t8ere is sufficient power a)aila+le. .mployin6 power supply unit
re%un%ancy is necessary for critical ser)ers.
0.2.0 Coo(in#
full c8assis may 6enerate consi%era+le 8eat from t8e acti)ity of component +la%esG
so 8i68 %eman% +la%e ser)ers re@uire effecti)e coolin6 from t8eir c8assis to operate
efficiently. T8e c8assisM internal mana6ement systems may s8ut %own t8e entire
system if t8e temperature rises a+o)e a certain point. ItMs criticalG t8enG to follow t8e
%irections of t8e +la%e ser)er c8assisM manufacturer w8en mana6in6 t8e ser)erMs
coolin6. T8is mi68t inclu%e air space aroun% t8e c8assisG t8e use of plu6s for empty
+aysG an% en)ironmental %eman%s for air temperature an% 8umi%ity.
0.2.3 $tor#e
T8ere may +e some limite% stora6e on a +la%e ser)erG an% t8ere may +e a%%itional
stora6e pro)i%e% +y a c8assis. 3owe)erG wit8 t8e use of a 1N Gt8e c8assis an% +la%es
can +e completely free of stora6eG remo)in6 t8e in8erent 8eatG noiseG an% relia+ility
pro+lems from t8e system completely. .)eryt8in6 from +ootin6 to %ata stora6e can +e
%one o)er t8e 1NG ena+lin6 t8e +la%e ser)ers to +e focuse% entirely on processin6.
T8is confi6uration can increase relia+ility an% re%uce space re@uirements +y
partitionin6 stora6e resources in one centraliDe% location an% computin6 resources in
anot8er. T8is also eliminates stora6e Despite t8e a%)anta6es of stora6e outsi%e t8e
+la%e c8assisG many +la%es 8a)e t8e capacity to take one or two 8ar% %ri)esG usually
1T.
0.2.7 +ED In%i!tors
7la%e ser)ers typically 8a)e a front panel containin6 a num+er of informational
L.DsG relatin6 to power an% system acti)ity. T8ere may a%%itionally +e in%icators of
system failureG w8ic8 may +e 6eneral or specific to +la%e components. T8ese optional
features will in)aria+ly come at a cost premium.
0.) $'ECI?IC,TION
#o%elH 7la%e Center 3129 Type 4432
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
(
"i!ropro!essor
1upports up to 2
microprocessor
Intel Fenon
(rocessor
,12 /7 .CC
L2cac8e
,33 #3D front
Isi%e +us!;71"
Dri&ers
1upport for up to
2 internal ID. 2.,
inc8 8ar% %isk
%ri)e!3DD"
1upport for up to
2 up to 2 ultra
329 1C1I 8ot
swap 3DD
a)aila+le in an
optional 1C1I
stora6e e<pansion
unit
Inte#rte% fun!tions/
Two 0i6a+it .t8ernet
controllers
TI Ra6e FL )i%eo
controller
Li68t (at8 Dia6nostics
T#
Local ser)ice processor
ID. 3DD controller
R1*&4, interface for
communication wit8
7la%e Center
mana6ement mo%ule
U17 +uses for
communication wit8
key+oar% G mouse G
%iskette %ri)e an% CD*
RO#
En&ironment
ir temperature H
7la%e ser)er on H19
9
C to 3,
9
C
ltitu%e H 9 to 51& m
7la%e ser)er off H *&9
9
to -9
9
C
3umi%ity
7la%e se)er on H 4j to 49j
7la%e ser)er off H ,j to 49j
"emor*
#inimum H,12
#7
#a<imum H &
07
$iBe
3ei68tH 2&., cm
Dept8H &&.- cm
$i%t8H 2.5 cm
#a<imum wei68tH ,.& k6
NOTE/ T8e O1 in t8e +la%e ser)er must pro)i%e U17 support for t8e +la%e ser)er to
reco6niDe an% use t8e key+oar% Gmouse GCD*RO# %ri)e G an% %iskette %ri)e. T8e
+la%e center unit uses U17
0.0 CO"'ONENT$ O? 6+,DE $ER1ER
1. C8assis
2. #ana6ement ser)er
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
*
!/a0 1&/; <0ont 1&/; Moth/0 boa06
3. 1N
0.0.1.C4ssisH Th/ chass&s 3o0ms th/ ho7s&ng 3o0 th/ bla6/ s/01/0s,
p0o1&6&ng th/ n/c/ssa0% s/01&c/s 3o0 th/ bla6/s. :hass&s 1a0% &n th/
n7mb/0 o3 bla6/s th/% acc/pt, 7s7all% 30om * to $*. It has t;o 1&/; 30ont
1&/; an6 0/a0 1&/; an6 &n b/t;//n th/s/ t;o 1&/; th/0/ &s a moth/0 boa06
o3 bla6/ s/01/0
(
#
(
#
1
#
7LO$.R
#
#
;
#
(
#
(
#
1
#
#
#
;
#

7LD.1
'
"
stan%s for (ower mo%ule G w8ic8 mana6e t8e power control for +la%e ser)er.
ll t8e & power mo%ule work simultaneously an% if one fails t8en ot8er take care of
t8e power control.
$
"
stan%s for 1witc8 mo%ule G w8ic8 is connecte% wit8 layer 3 switc8 . 7ot8 t8e
switc8 mo%ule work simultaneously an% if one fail t8en ot8er take care of t8em.
6+OWER is use% to keep t8e temperature of +la%e ser)er at re@uire% le)el .
"
"
stan%s for mana6ement mo%ule . It mana6e all t8e %eices wit8in a c8assis . 3ere
one is primary an% anot8er is secon%ary .$8en primary works t8en secon%ary 8ol%s
t8e i%le con%ition .T8is is calle% t8e 8eart of t8e 1ystem.
?
"
stan%s for fi+er mo%ule .$8ic8 is connecte% wit8 1N. 7ot8 t8e fi+er mo%ule
work simultaneously an% if one fail t8en ot8er take care of t8em
0.0.2 "n#ement ser&er
It use t8e I7# %irectory ser)er software an% installe% in any of t8e 7la%e . T8e +la%e
w8ic8 8as t8at software will act as an a%ministrator . It mana6e all t8e +la%es. It 8as
two 8ar% %isk an% a processor of 3.9 #3D
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
)
0.0.) $tor#e ,re
Network -$,N.
$tora6e ,rea Network
!1N" is a specialiDe%
G8i68*spee% network
attac8in6 ser)ers an%
stora6e %e)ices an% Gfor
t8is reason Git is
sometimes referre% to as
Nt8e network +e8in% t8e
ser)ers .O 1N allows
Nany*to IanyO connection
across t8e network Gusin6
internetwork elements
suc8 as routers
G6ateways G8u+s Gswitc8es
an% %irectors . stora6e
%e)ice is a mac8ine t8at contains not8in6 +ut a %isk or %isks for storin6 %ata. T8is
stora6e area is s8are% +y all +la%es. T8e %isk of t8is stora6e use t8e RID tec8nolo6y
to store t8e %ata. T8e %etails of RID is 6i)en in article &.,
Instea% of t8ese t8ree parts t8ere is also a key+oar% Gmonitor an% a mouse to monitor
t8e con%ition of all t8e +la%e ser)ers . $8ic8 are attac8e% t8ou68 t8e /'# switc8.
K1" ! Key+oar% H 1isual Display UnitH "ouse" swit!4 is a 8ar%ware %e)ice t8at
allows a user to control multiple computers from a sin6le key+oar%G )i%eo monitor
an% mouse. lt8ou68 multiple computers are connecte% to t8e /'#G typically a
smaller num+er of computers can +e controlle% at any 6i)en time.
0.3 R,ID
Re%un%ant rray of In%epen%ent Disks !RID" is t8e com+inin6 of se)eral 8ar% %ri)e
into a sin6le unit. T8ere are a num+er of RID le)elsG amon6 t8em t8e most popular
are RID 9G RID 1 an% RID ,G w8ic8 re@uire controllers to support t8em. Two
or more %isk %ri)e are com+ine% an% t8e result is fault tolerance an% 6oo%
performance. T8ese %isks %ri)es are usually use% on ser)ers .
Le)el Description
#ini*
mum
no. of
%isks
1pace
.ffici*
ency
;ault
Tolera*
nce
Ima6e
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
+
RID
9
In a RID 9 systemG %ata
are split up in +locks t8at
6et written across all t8e
%ri)es in t8e array. 7y
usin6 multiple %isks !at
least 2" at t8e same timeG
RID 9 offers superior
IEO performance. T8is
performance can +e
en8ance% furt8er +y usin6
multiple controllersG
i%eally one controller per
%isk
2 n 9
!none
"
RID
1
Data are store% twice +y
writin6 t8em to +ot8 t8e
%ata %isk !or set of %ata
%isks" an% a mirror %isk
!or set of %isks".If a %isk
failsG t8e controller uses
eit8er t8e %ata %ri)e or
t8e mirror %ri)e for %ata
reco)ery an% continues
operation
2
1
!siDe
of t8e
small
*est
%isk"
n*1
%isks
RID
,
RID , is t8e most
common secure RID
le)el. It is similar to
RID*3 e<cept t8at %ata
are transferre% to %isks +y
in%epen%ent rea% an%
write operations !not in
parallel". T8e %ata c8unks
t8at are written are also
lar6er. Instea% of a
%e%icate% parity %iskG
parity information is
sprea% across all t8e
%ri)es. ?ou nee% at least
3 %isks for a RID ,
array
3 n*1 1 %isk
0.3.1 ,D1,NT,GE$ ,ND DI$,D1,NT,GE$ O? R,ID
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








,
,
+e&e( ,%&nt#es Dis%&nt#es
RID 9
RID 9 offers 6reat performanceG +ot8
in rea% an% write operations. T8ere is
no o)er8ea% cause% +y parity controls.
ll stora6e capacity can +e use%G t8ere
is no %isk o)er8ea%.
T8e tec8nolo6y is easy to implement.
RID 9 is not
fault*tolerant. If
one %isk failsG all
%ata in t8e RID
9 array are lost. It
s8oul% not +e
use% on mission*
critical systems.
RID 1
RID 1 offers e<cellent rea% spee% an%
a write*spee% t8at is compara+le to t8at
of a sin6le %isk.
In case a %isk failsG %ata %o not 8a)e to
+e re+uil%G t8ey Just 8a)e to +e copie%
to t8e replacement %isk.
RID 1 is a )ery simple tec8nolo6y.
T8e main
%isa%)anta6e is
t8at t8e effecti)e
stora6e capacity
is only 8alf of t8e
total %isk capacity
+ecause all %ata
6et written twice.
1oftware RID 1
solutions %o not
always allow a
8ot swap of a
faile% %isk
!meanin6 it
cannot +e
replace% w8ile t8e
ser)er keeps
runnin6". I%eally
a 8ar%ware
controller is use%.
RID ,
Rea% %ata transactions are )ery fast
w8ile write %ata transaction are
somew8at slower !%ue to t8e parity t8at
8as to +e calculate%".
Disk failures 8a)e
an effect on
t8rou68putG
alt8ou68 t8is is
still accepta+le.
Like RID 3G t8is
is comple<
tec8nolo6y.
0.7 CON?IGUR,TION
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
-
T8e followin6 confi6uration pro6rams are pro)i%e% wit8 t8e +la%e ser)erH
1.Confi6uration E1etup Utility pro6ram H T8is is part of t8e +asic input Eoutput
system!7IO1" co%e in +la%e ser)er .
2.(F. +oot a6ent utility pro6ram H T8e (re+oot eFecution .n)ironment!(F." +oot
a6ent utility pro6ram is part of t8e 7IO1 co%e in t8e +la%e ser)er . Use it to select t8e
+oot protocol an% ot8er +oot options.
0 .7.1 Usin# t4e Confi#urtion :$etup Uti(it* pro#rm
Turn on t8e +la%e ser)er an% watc8 t8e monitor screen .
$8en t8e messa6e (ress ;1 for Confi6urationE1etup appears Gpress ;1
;ollow t8e instructions t8at appears on t8e screen .
Confi#urtion :$etup Uti(it* menu !4oi!es H T8e followin6 c8oices are on
t8e Confi6uration E1etup Utility main menu.
$*stem $ummr* H 1elect t8is c8oice to %isplay confi6uration G inclu%in6 t8e
type Gspee% Gan% cac8e siDes of t8e microprocessor an% t8e amount of installe%
memory.
$*stem Informtion H 1elect t8is c8oice to %isplay information a+out your
+la%e ser)er.
'ro%u!t Dt H 1elect t8is c8oice to )iew t8e mac8ine type an% mo%el of your
+la%e ser)er Gt8e serial num+er G an% t8e re)ision le)el or issue %ate of t8e
7IO1 .
De&i!es n% I:O ports H 1elect t8is c8oice to set t8e system %ate an% time G in
2&*8our format !8ourHminuteHsecon%".
$*stem $e!urit* H 1elect t8is c8oice to set a power* on passwor% . If your set
a power* on passwor% G you must type t8e power*on passwor% to complete t8e
system startup .
NOTE H If you for6et t8e power*on passwor% G you can re6ain access to t8e +la%e
ser)er t8rou68 one of t8e followin6 met8o%s
Remo)e t8e +la%e ser)er +attery an% t8e reinstall it.
C8an6e t8e position of t8e power*on passwor% o)erri%e switc8 to +ypass t8e
power*on passwor% c8eck t8e ne<t time t8e +la%e ser)er is turne% on .
NOTE / 18ut %own t8e O1 Gturn off t8e +la%e ser)er G an% remo)e t8e +la%e ser)er
from t8e 7la%eCenter unit to access t8e switc8es.
$trt Options H 1elect t8is c8oice to )iew or c8an6e t8e start options . T8is
c8oice appears only on t8e full Confi6uration E 1etup Utility main menu .
,%&n!e $etup H 1elect t8is c8oice to c8an6e settin6 for a%)ance% 8ar%ware
features .
$*stem 'rtition 1isi2i(it* H 1elect t8is c8oice to specify w8et8er t8e 1ystem
(artition is to +e )isi+le or 8i%%en .
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
$
"emor* $ettin#s H 1elect t8is c8oice to manually ena+le a pair of memory
DI##s.
C'U options H 1elect t8is c8oice to ena+le or %isa+le t8e microprocessor
cac8e .
'CI 6us Contro( H 1elect t8is c8oice to )iew an% set interrupts for (CI
%e)ices an% to confi6ure t8e master*latency*timer )alue for t8e +la%e ser)er.
Inte#rte% $*stem "n#ement 'ro!essor $ettin#s H 1elect t8is c8oice to
ena+le or %isa+le t8e Re+oot on 1ystem N#I option on t8e menu . If you
ena+le t8is option G t8e +la%e ser)er will automatically restart -9 secon%s after
t8e ser)ices processor issues a Non*#aska+le Interrupt !N#I" to t8e +la%e
ser)er .
Error +o#s H 1elect t8is c8oice to )iew or clear t8e (O1T error lo6.
1elect (O1T .rror Lo6 to )iew t8e t8ree most recent error co%es an% messa6es .
$&e $ettin#s H 1elect t8is c8oice to sa)e t8e c8an6es G ma%e in t8e settin6s.
Restore $ettin#s H 1elect t8is c8oice to cancel t8e c8an6es G ma%e in t8e
settin6 an% restore t8e pre)ious settin6s.
+o% Defu(t $ettin#s H 1elect t8is c8oice to cancel t8e c8an6es Gma%e in t8e
settin6 an% restore t8e )en%orKs settin6s.
E9it $etup H 1elect t8is c8oice to e<it from t8e Confi6uration E1etup Utility
pro6ram . If you 8a)e not sa)e% t8e c8an6es you 8a)e ma%e in t8e settin6sG
you are w8et8er you want to sa)e t8e c8an6es or e<it wit8out sa)in6 t8em.
0 .7.2 Usin# t4e 'IE 2oot #ent uti(it* pro#rm
1.Turn on t8e ser)er .
2.$8en t8e 7roa%com NetFtreme 7oot 6ent )F.F.F prompt appears Gpress
CtrlS1.
NOTE/
If t8e (F. setup prompt is not %isplaye% Guse t8e Confi6uration E1etup Utility
pro6ram to set t8e ena+le .t8ernet (F.ED3C( option .
7y %efault G you 8a)e 2 secon%s after t8e prompt appears on t8e screen to
press Ctrl S 1.
3. Use t8e arrow keys or press .nter to select a c8oice from t8e menu.
(ress .sc to return to t8e pre)ious menu.
(ress t8e ;& key to e<it
&. ;ollow t8e instructions on t8e screen to c8an6e t8e settin6 of t8e selecte% items G
t8en press .nter .
0.; Confi#urin# T4e Gi#2it Et4ernet Contro((ers /
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
2
Two .t8ernet controllers are inte6rate% on t8e +la%e ser)er system +oar% w8ic8
ena+les simultaneously transmission an% reception of %ata on t8e .t8ernet Local rea
Network !LN". 3owe)er a %e)ice
%ri)er must install to ena+le t8e +la%e
ser)er O1 to a%%ress t8e .t8ernet
controllers . ;or %e)ice %ri)ers an%
information a+out confi6urin6 your
.t8ernet controllers use t8e 7roa%com
NetFtreme 0i6a+it .t8ernet 1oftware
..t8ernet controllers support failo)erG
w8ic8 pro)i%es automatic re%un%ancy for
.t8ernet controllers . $it8out failo)er
only one .t8ernet controller from eac8
ser)er attac8e% to eac8 )irtual LN or
su+net. $it8 failo)er you can confi6ure
more t8an one .t8ernet controller from eac8 ser)er to attac8 to t8e same )irtual LN
or su+net . If you 8a)e confi6ure% t8e controllers for failo)er an% t8e primary link
fails G t8e secon%ary controller takes o)er . $8en t8e primary link is restore% G t8e
.t8ernet traffic switc8es +ack to t8e primary .t8ernet controller
NOTE H To support failo)er on t8e +la%e ser)er .t8ernet controllers G t8e .t8ernet
switc8 mo%ules in t8e 7la%eCenter unit must 8a)e i%entical confi6urations to eac8
ot8er.
0.< 6+,DE $ER1ER ,D1,NT,GE$ ,ND DI$,D1,NT,GE$
0.<.1 ,D1,NT,GE$
Tke (ess sp!e / 0reater %ensity an% +etter use of t8e ser)er form factor 8i68ly
re%uces t8e total space re@uirements of t8e +la%e ser)er %eployment as compare% to
tower or rack mounte% ser)ers.
Re%u!e% 'ower Consumption n% Impro&e% 'ower "n#ement : (ower
supplie% from t8e +la%e ser)er c8assis 8i68ly re%uces t8e total power supply
re@uirement an% also re%uces t8e power re@uire% per ser)er.
+ower "n#ement Cost / ser)er consoli%ation an% resource centraliDation
simplifies ser)er %eploymentG mana6ement an% a%ministration an% impro)es
mana6ementG re%un%ancy an% control.
$in#(e monitor / /'# switc8 8elps to monitor all t8e ser)er +y only one system .
$imp(ifie% C2(in# / 7la%e ser)ers simplify ca+lin6 re@uirements an% facilitate
8i68ly re%uce% wirin6. #ost of t8e wirin6 relate% interconnects are in+uilt into t8e
c8assis t8ere+y 6reatly re%ucin6 t8e nee% for separate wirin6.
Ese of up#r%e - s new processorG communicationsG stora6e an% interconnect
tec8nolo6y +ecomes a)aila+leG it can +e implemente% in +la%es t8at install into
e<istin6 e@uipmentG up6ra%in6 ser)er operation at a minimum cost an% wit8 no
%isruption of +asic ser)er functionality.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
'
Esier '4*si!( Dep(o*ment : 1ince t8e c8assis is responsi+le for pro)i%in6 t8e once
re%un%ant parts of a ser)erG %eployment of a +la%e ser)er simply in)ol)es t8e
placement of t8e c8assis an% sli%in6 in t8e +la%es. Re%un%ant power mo%ules an%
consoli%ate% communication +ays simplify inte6ration into %ata centers.
?(e9i2i(it*- 7la%e systems also pro)i%e si6nificant confi6uration fle<i+ilityG offerin6 a
c8oice amon6 myria% ser)ersG IEO options an% ot8er internal components. T8e c8assis
can accommo%ate a mi< of <4- !Intel or #D C(Us" an% Uni< RI1C ser)ersG stora6e
+la%esG workstations an% (C +la%esG as well as multiple IEO connections per +la%e.
0.<.2 DI$,D1,NT,GE$
E9pensi&e !onfi#urtion
lt8ou68 plu66in6 in a new ser)er +la%e into t8e +la%e ser)er is easy once t8e system
is runnin6G initial confi6uration can +e la+or*intensi)e an% e<pensi)e in comple<
application en)ironments. T8is %isa%)anta6e comes wit8 t8e fact t8at +la%e ser)ers
are specialiDe% computin6 e@uipment an% t8eir confi6uration an% a%ministration often
re@uires trainin6 pro)i%e% +y t8e )en%or w8ic8 may not +e c8eap unless you 8a)e a
special free*trainin6 %eal wit8 t8e )en%or.
E9pensi&e too( - e!onomies of s!(e.
If you %o not fill t8e +la%e c8assis wit8 ser)er +la%esG you are not fully utiliDin6 it.
7la%e c8assis are often ma%e to 8ol% 1& or 1- ser)er +la%es.
T8e 6eneral rule of t8um+ is t8at +la%e ser)ers are not suita+le an% economical for
applications re@uirin6 less t8an ,*19 ser)ers. pplications re@uirin6 less t8an ,*19
ser)er +la%es !19*29 C(Us" are +est %e)ote% to stan%alone ser)er systems.
In!ompti2(e C4ssis
7la%e systems )ary +etween manufacturers. Once you +ou68t +la%e ser)er from a
particular )en%orG it is not always easy to switc8 to anot8er )en%or +ecause of
ser)icin6 a6reements an% also +ecause a competitor is unlikely 6oin6 to 8a)e t8e
same e<pertise in your e@uipment as your )en%or. ?ou coul% t8eoretically use your
ser)er +la%es in competitorMs +la%e c8assisG +ut practically +la%e c8assis are not
stan%ar%iDe%. It is unlikely t8at I7# woul% 6et to6et8er wit8 Dell an% 3( to s8are
c8assis. C8assis is w8at makes t8eir pro%ucts uni@ue. 1er)er +la%es are often %esi6ne%
to only run in t8e companyMs own c8assis.
6usiness !se
7la%e ser)ers are not t8e +est solution for e)eryt8in6. If you 8a)e a )ery lar6e
transaction processin6 application re@uirin6 8i68 rea%Ewrite ratiosG t8en you may run
into +ottle neck wit8 your +us spee%sG memory limitationsG %isk accessG an% network
IEO. .mail an% $e+ ser)in6 are situations w8ere +la%e computin6 suits well.
5etin# n% !oo(in#
One often for6otten %isa%)anta6e is 3'C. $8ile in%i)i%ual stan%*alone ser)ers can
+e %istri+ute% t8rou68out t8e +uil%in6 an% may not necessarily nee% special
accommo%ations for coolin6G +la%e ser)ers +ein6 )ery powerful t8ese %ays pro%uce
massi)e amounts of 8eat per s@uare foot. If untreate%G t8is coul% melt t8em %own.
$8en purc8asin6 +la%e ser)ersG it is important to keep in min% t8at a%%itional
resources will +e nee%e% also for 3'C.
'. D5C' $ER1ER
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
4
D3C( 1er)er
assi6ns I( a%%resses to client
computers. T8is is )ery often
use% in enterprise networks to
re%uce confi6uration efforts.
ll I( a%%resses of all
computers are store% in a
%ata+ase t8at resi%es on a
ser)er mac8ine.
D3C( supports four strate6ies
for I( a%%ress allocation. T8ese are in%epen%ent features. particular ser)er can offer
any or none of t8em.
1. #anual. T8e uni@ue client i%entifier*to*I( a%%ress +in%in6 8as +een ma%e +y
an a%ministrator. T8erefore t8e D3C( ser)ice s8oul% not reallocate I(
a%%resses of t8is type to ot8er clients after t8e lease e<pires. T8is type of I(
a%%ress allocation is useful w8en t8e a%ministrator wants a 8ost to maintain
t8e same I( a%%ress +ut still wants to %etect w8en an I( a%%ress is no lon6er
+ein6 use%. n e<ample is a 8ost t8at pro)i%es a ser)ice locate% +y t8e I(
a%%ressG like mail.
2. (ermanent. T8e ser)erMs a%ministrator creates a confi6uration for t8e ser)er
t8at inclu%es only I( a%%ressesG an% 6i)es t8is confi6uration to clients. fter
an I( a%%ress is associate% wit8 a #C a%%ressG t8e association is permanent
unless t8e ser)erMs a%ministrator inter)enes. llocatin6 permanent I( a%%resses
8as t8e %raw+ack t8at suc8 I( a%%resses cannot +e reclaime% automatically.
3. Dynamic !t8rou68 leases wit8 limite% %uration". T8e ser)er tracks leases an%
6i)es I( a%%resses to D3C( clients automatically as t8ey +ecome a)aila+le
w8en leases e<pire. No interaction is nee%e% +y t8e a%ministrator. T8is is t8e
preferre% I( a%%ress type for non*7OOT( clients.
&. 7OOT(. %%resses t8at are reser)e% for use +y 7OOT( clients. T8is allows
an a%ministrator to enter a pool of I( a%%resses inten%e% only for 7OOT(
clients.
3.1 Inst((in# D5C' $er&er is &er* es* in win ser&er 2>>)
;irst you nee% to 6o to 1tartIWll (ro6ramsIW%ministrati)e ToolsIW#ana6e
?our 1er)er
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
(
3ere you nee% to select %% or remo)e a role
'erify t8e followin6 steps click on Ne<t
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
*
1elect 1er)er Role as D3C( 1er)er option click on Ne<t
1ummary selection click on Ne<t
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
)
Installin6 D3C( 1er)er in pro6ress
Now t8is will prompt new scope welcome screen click ne<t
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
+
scope is a collection of I( a%%resses for computers on a su+net t8at use
D3C(..nter t8e name an% %escription of your scope click ne<t
Now you nee% to %efine t8e ran6e of a%%resses t8at t8e scope will %istri+ute
across t8e network G t8e su+net mask for t8e I( a%%ress . .nter t8e appropriate
%etails an% click ne<t.
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
-
,
.nter t8e I( a%%ress ran6e t8at you want to e<clu%e an% click on ne<t
1elect lease %uration 8ow lon6 a client can use an I( a%%ress assi6ne% to it
from t8is scope. It is recommen%e% to a%% lon6er leases for a fi<e% network !in
t8e office for e<ample" an% s8orter leases for remote connections or laptop
computers an% click ne<t
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
$
-
?ou are 6i)en a c8oice of w8et8er or not you wis8 to confi6ure t8e D3C(
options for t8e scope now or later. ?ou can select ?esG I want to ra%io +utton
an% click ne<t
.nter t8e routerG or 6atewayG I( a%%ress click ne<t. T8e client computers will
t8en know w8ic8 router to use an% click ne<t
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
$
$
.nter t8e DN1 an% %omain name settin6s can +e entere%. T8e DN1 ser)er I(
a%%ress will +e %istri+ute% +y t8e D3C( ser)er an% 6i)en to t8e client click
ne<t
If you 8a)e $IN1 setup t8en 8ere is w8ere to enter t8e I( %%ress of t8e
$IN1 ser)er. ?ou can Just input t8e ser)er name into t8e appropriate +o< an%
press Resol)eO to allow it to fin% t8e I( a%%ress itself click ne<t
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
$
2
Now you nee% to acti)ate t8is scope now an% click ne<t
D3C( 1er)er new scope installation was finis8e% an% click finis8
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
$
'
Now your ser)er is now a D3C( ser)er messa6e an% click finis8
3.2 Confi#urin# D5C'
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
$
4
Now you nee% to 6o to 1tartkW%ministrati)e ToolskWD3C(
Ri68t Click on your ser)er click on ut8oriDe your D3C( 1er)er
ut8oriDation complete% now your D3C( ser)er is up an% runnin6
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
$
(
D3C( ser)ers permit you to reser)e an I( a%%ress for a client. T8is means t8at
t8e specific network client will 8a)e t8e same I( for as lon6 as you wante% it to. To
%o t8is you will 8a)e to know t8e p8ysical a%%ress !#C" of eac8 network card. .nter
t8e reser)ation nameG %esire% I( a%%ressG #C a%%ress an% %escription I c8oose
w8et8er you want to support D3C( or 7OOT( an% press a%%. T8e new reser)ation
will +e a%%e% to t8e list.
1o it is )ery easy to confi6ure D3C( ser)er in win ser)er 2993 now you can
confi6ure your win%ows client pc to c8eck your D3C( ser)er is workin6 or not.
If you want to install an% confi6ure win ser)er 2993 %omain controller wit8 DN1
setup c8eck 8ere .
3.) ,%&nt#es n% Dis%&nt#es
h
t
t
p
:
/
/
s
a
n
2
4
m
c
a
.
b
l
o
g
s
p
o
t
.
c
o
m
/
S
A
N
D
E
E
P
,

M
I
T
H
I
L
E
S
H

,

S
Y
E
D

L

,

!
A
"
I

#
A
N
T








$
$
*
,%&nt#es /
D3C( ser)ers offer a num+er of a%)anta6es o)er earlier met8o%s of 6ettin6 I(
a%%resses.
1. utomatic mana6ement of I( a%%ressesG inclu%in6 t8e pre)ention of %uplicate
I( a%%ress pro+lems
2. llows support for 7OOT( clientsG so you can easily transition your networks
from 7OOT( to D3C(
3. llows t8e a%ministrator to set lease timesG e)en on manually allocate% I(
a%%resses.
&. llows limitin6 w8ic8 #C a%%resses are ser)e% wit8 %ynamic I( a%%resses
,. llows t8e a%ministrator to confi6ure a%%itional D3C( option typesG o)er an%
a+o)e w8at is possi+le wit8 7OOT(
-. llows t8e %efinition of t8e pool or pools of I( a%%resses t8at can +e allocate%
%ynamically. user mi68t 8a)e a ser)er t8at forces t8e pool to +e a w8ole
su+net or network. T8e ser)er s8oul% not force suc8 a pool to consist of
conti6uous I( a%%resses.
2. llows t8e association of two or more %ynamic I( a%%ress pools on separate
I( networks !or su+nets". T8is is t8e +asic support for secon%ary networks. It
allows a router to act as a 7OOT( relay for an interface w8ic8 8as more t8an
one I( network or su+net I( a%%ress.
3ere are some features t8at are not part of t8e D3C( ser)er itselfG +ut relate% to t8e
way it is a%ministere%.
1. Central a%ministration of multiple ser)ers
2. T8e a+ility to make c8an6es w8ile t8e ser)er is runnin6 an% leases are +ein6
tracke%. ;or e<ampleG you can a%% or take away I( a%%resses from a poolG or
you can mo%ify parameters.
3. T8e a+ility to make 6lo+al mo%ifications !t8ose t8at apply to all entries" to
parametersG or to make mo%ifications to 6roups of clients or pools
&. T8e maintenance of a lease au%it trailG suc8 as a lo6 of t8e leases 6rante%
Dis%&nt#es/
$. .nl% som/ o3 th/ DH:P cl&/nt &mpl/m/ntat&ons ;o02 p0op/0l% ;&th
th/ DH:P
S/01/0 &n ;&n6o;s s/01/0 2--'.
2. Th/ &n3o0mat&on &n DH:P s/01/0 &s a7tomat&call% 6/l&1/0/6 to all th/
DH:P cl&/nts Th7s , &t b/com/ &mpo0tant to p7t co00/ct
&n3o0mat&on &nto DH:P s/01/0.
'. I3 th/0/ &s a s&ngl/ DH:P s/01/0 an6 &t &s not a1a&labl/, l/as/ ;&ll not
b/ 0/>7/st/6 o0 0/n/;/6 ,th&s ;a% &t ;&ll b/ s&ngl/ po&nt o3 3a&l70/
3o0 th/ n/t;o02.
4. In o06/0 to 7s/ DH:P on a m7lt& s/gm/nt n/t;o02 , DH:P s/01/0 o0
0/la% ag/nt sho7l6 b/ plac/6 on /ach s/gm/nt .%o7 can also /ns70/
that th/ 0o7t/0 &s 3o0;a06&ng "ootst0ap p0otocol "0oa6casts.

You might also like