Professional Documents
Culture Documents
• Basic Networking
• Network Topology
– Bus Topology
– Ring Topology
– Star Topology
– Mesh Topology
– Star-Bus Hybrid Topology
– Star-Ring Hybrid Topology
• Media Access Control
– Carrier Sense Multiple Access With Collision Avoidance (C...
What we are going to learn
• Network Cabling
• Wide Area Network
– Circuit Switching
– Packet Switching
• SVC
• PVC
– Cell Switching
– ISDN
• B- Channel
• D-Channel
• PRI VS BRI
– FDDI
What we are going to learn
• Networking
computers allows
them to:
– Share data
– Access shared
printer and other
equipment
A Networking Lexicon
• Easier to scale
• May handle thousands of users
Server-Based Networking
Advantages
• Simplifies network administration
• Centralizes user accounts, security, and access
controls
• More powerful equipment
• More efficient access to network resources
• Single password for network logon
• Best choice for networks with 10 or more users or
network with heavily-used resources
Server-Based Networking
Disadvantages
• Combination networks
• Workstations function simultaneously as
peers on a peer-to-peer network and as
clients on server-based networks
• Modern operating systems can function both
as peers and as clients
– Windows Server 2003, Windows 2000, Windows XP
Networking
Host
Host
Host Host
Host
Host
Host Host
Host
Host
Host
• Switched
– Switched Ethernet
• May be single or multiple switches
– ATM LAN
– Fibre Channel
• Wireless
– Mobility
– Ease of installation
Networking Configuration
LAN (1)
46
Network Topologies (continued)
47
Bus Topology
• Bus topology
– A single backbone cable connects all the systems
– Visualizes connections as chain links
– Terminator attached to each end of bus cable segment
• Transmitting packet across bus
– Detected by all nodes on segment
– Given time limit to reach destination
• IEEE (Institute of Electrical and Electronics Engineers)
– Develops standards for network cabling, transmission
– Specifies length of bus segment
48
Bus Topology
49
Bus Topology (continued)
50
Ring Topology
53
54
Mesh Topology
• Mesh topology
– Every node connected to every other node in
network
– Provides network with fault tolerance
• Fault tolerance: built-in protection against failure
• If link breaks, nodes can still communicate
– Alternate communication paths increase as number
of nodes increase
• Mesh topology used less on LANs
– Expensive to implement
• Mesh topology often used in MANs and WANs
55
56
Star-Bus Hybrid Topology
57
Star-Ring Hybrid Topology
58
Media Access Control
Carrier Sense Multiple Access With
Collision detection (CSMA/CD)
2
Application Layer
• Gives end-user
applications access to
network resources
• Where is it on my
computer?
– Workstation or Server
Service in MS Windows
3
Presentation Layer
• Provides common data
formatting between
communicating
devices
• Components make
sure the receiving
station can read the
transferred data
3
Session Layer
• Allows applications to
maintain an ongoing
session
• Example – NetBIOS
• Where is it on my
computer?
– Workstation and
Server Service (MS)
– Windows Client for
NetWare (NetWare)
3
Transport Layer
• Provides reliable data
delivery
• It’s the TCP in TCP/IP
• Receives info from
upper layers and
segments it into packets
• Can provide error
detection and correction
3
Network Layer
• Provides network-wide
addressing and a
mechanism to move
packets between
networks (routing)
• Responsibilities:
– Network addressing
– Routing
• Examples:
– IP from TCP/IP
– IPX from IPX/SPX
3
Network Addresses
• Network-wide addresses
• Used to transfer data across subnets
• Used by routers for packet forwarding
• Example:
– IP Address
• Where is it on my computer?
– TCP/IP Software
Data Link Layer
• Places data and
retrieves it from the
physical layer and
provides error
detection capabilities
3
Sub-layers of the Data Link Layer
• MAC (Media Access Control)
– Gives data to the NIC
– Controls access to the media through:
• CSMA/CD Carrier Sense Multiple Access/Collision
Detection
• Token passing
• LLC (Logical Link Layer)
– Manages the data link interface (or Service Access Points
(SAPs))
– Can detect some transmission errors using a Cyclic
Redundancy Check (CRC). If the packet is bad the LLC
will request the sender to resend that particular packet.
Physical Layer
• Determines the specs for
all physical components
– Cabling
– Interconnect methods
(topology / devices)
– Data encoding (bits to
waves)
– Electrical properties
• Examples:
– Ethernet (IEEE 802.3)
– Token Ring (IEEE 802.5)
– Wireless (IEEE 802.11b)
3
Physical Layer (cont’d)
• What are the Physical Layer components on my
computer?
• NIC
– Network Interface Card
– Has a unique 12 character Hexadecimal number
permanently burned into it at the manufacturer.
– The number is the MAC Address/Physical address of a
computer
• Cabling
– Twister Pair
– Fiber Optic
– Coax Cable
How Does It All Work Together
• Each layer contains a Protocol
Data Unit (PDU)
– PDU’s are used for peer-to-peer
contact between corresponding
layers.
– Data is handled by the top three
layers, then Segmented by the
Transport layer.
– The Network layer places it into
packets and the Data Link frames
the packets for transmission.
– Physical layer coverts it to bits
and sends it out over the media.
– The receiving computer reverses
the process using the information
2
contained in the PDU.
2Cisco Academy Program Semester 1
TCP/IP
• Hub
– An unintelligent network device that
sends one signal to all of the stations
connected to it.
– All computers/devices are competing
for attention because it takes the data
that comes into a port and sends it out
all the other ports in the hub.
– Traditionally, hubs are used for star
topology networks, but they are often
used with other configurations to make
it easy to add and remove computers
without bringing down the network.
– Resides on Layer 1 of the OSI model
Network Hardware
• Switch
– Split large networks into small
segments, decreasing the number
of users sharing the same network
resources and bandwidth.
– Understands when two devices
want to talk to each other, and gives
them a switched connection
– Helps prevent data collisions and
reduces network congestion,
increasing network performance.
– Most home users get very little, if
any, advantage from switches, even
when sharing a broadband
connection.
– Resides on Layer 2 of the OSI
model.
Network Hardware
• Bridge
– Connects two LANs and
forwards or filters data packets
between them.
– Creates an extendedI network in
which any two workstations on
the linked LANs can share data.
– Transparent to protocols and to
higher level devices like routers.
– Forward data depending on the
Hardware (MAC) address, not
the Network address (IP).
– Resides on Layer 2 of the OSI
model.
Network Hardware
• Repeater
– Used to boost the signal
between two cable segments
or wireless access points.
– Can not connect different
network architecture.
– Does not simply amplify the
signal, it regenerates the
packets and retimes them.
– Resides on Layer 1 of the OSI
model.
Network Hardware
• Router
– A device that connects any number of
LANs.
– Uses standardized protocols to move
packets efficiently to their destination.
– More sophisticated than bridges,
connecting networks of different types
(for example, star and token ring)
– Forwards data depending on the
Network address (IP), not the Hardware
(MAC) address.
– Routers are the only one of these four
devices that will allow you to share a
single IP address among multiple
network clients.
– Resides on Layer 3 of the OSI model.
Network Hardware
Optional
USB Port
LAN Ports
WAN Port – for
- usually devices on
Modem the home
plugs in network
here
RJ-45
Connector
on UTP
cable
Network Addressing – how it
works
Private IP addresses assigned for
internal use (automatically by the
DHCP server or configured
manually by the user)
Public IP address assigned by the
Internet Service Provider (ISP)
Common Network Media
•Electrical (copper)
•Coaxial Cable
•Single copper conductor in the center surrounded by a plastic layer for
insulation and a braided metal outer shield.
•Twisted pair
•Four pairs of wires twisted to certain specifications.
•Available in shielded and unshielded versions.
• CAT5
– Ethernet cable standard defined by the Electronic
Industries Association and Telecommunications Industry
Association (EIA/TIA).
– Speeds up to 100 Mbps.
• Connector
– RJ-45 - Standard connectors used for unshielded
twisted-pair cable.
Ethernet Specifications
• 10BaseT
– Ethernet specification for unshielded twisted pair cable (category 3, 4, or 5), transmits
signals at 10 Mbps (megabits per second) with a distance limit of 100 meters per
segment.
• 10BaseF
– Ethernet specification for fiber optic cable, transmits signals at 10 Mbps (megabits per
second) with a distance limit of 2000 meters per segment.
• 100BaseT
– Ethernet specification for unshielded twisted pair cabling that is used to transmit data
at 100 Mbps (megabits per second) with a distance limit of 100 meters per segment.
• 1000BaseTX
– Ethernet specification for unshielded twisted pair cabling that is used to transmit data
at 1 Gbps (gigabits per second) with a distance limitation of 220 meters per segment.
Optical Fiber
•Infrared light is transmitted through fiber and confined
due to total internal reflection.
•Fibers can be made out of either plastic or glass.
•Used for high speed backbones and pipes over long
distances.
•Comparatively expensive.
Source : http://en.wikipedia.org/wiki/Optical_fiber
MAC Address
What is MAC Address
S Subnet Add
0 207.21.24.0/27
1 207.21.24.32/27
2 207.21.24.64/27
6 207.21.24.192/27 ……..
Sub 6 207.21.24.216/30
Sub 7 207.21.24.220/30
Supernetting
TCP/IP
IPX/SPX
AppleTalk
Protocols
• TCP/IP
• IPX/SPX
• AppleTalk
TCP/IP
• Data often is too large to be sent in a single segment. TCP splits the data
into multiple segments.
• TCP provides flow control through “windowing” to set the pace of how much
data is sent at a time – IE how many bytes per window, and how many
windows between ACKs.
Window Size = 1 Window Size = 3
Windowing and Window Size
Window size determines the amount of
Fast enough I didn’t get
data that you can transmit before for you? all of that,
receiving an acknowledgment. This is slow down.
how TCP assists in congestion control.
Sliding window refers to the fact
that the window size is negotiated
dynamically during the TCP
session.
Expectational acknowledgment
means that the acknowledgment
number refers to the octet that is
next expected.
If the source receives no
acknowledgment, it knows to
retransmit at a slower rate.
Sequence and ACK Numbers
Each TCP segment is numbered before transmission so that the
receiver will be able to properly reassemble the bytes in their
original order.
They also identify missing data pieces so the sender can retransmit
them.
Only the missing segments need to be re-transmitted.
ETHERNET
8 6 6 2 4
TCP Segment Format
Next expected
TCP octet
Number of 32-bit words in
the header
set to zero
Control setup and
termination of session
Number of octets sender is
Indicates the end of the urgent data willing to accept
• Sequence Number. TCP numbers each byte in the TCP data with
a sequence number.
– The sequence number identifies the first byte in the data
segment being transmitted from the sending TCP to the
receiving TCP.
• Acknowledgement Number. The acknowledgement number
contains the next sequence number the receiving station (sending
the acknowledgement) expects to receive. The Acknowledgement
flag is set.
– Offset. It is perhaps more descriptive to call this field the
TCP Header Length. This field is required because the
length of the options field is variable.
– It indicates where the TCP header ends and the data begins.
The header is 20 bytes without the options field.
• Reserved. This field is reserved for future use and is set to zero.
Details on TCP Fields (out of
syllabus) Contd
• TCP software uses the 6 Code Bits to determine the purpose and contents of
the segment.
– Urg This flag indicates that this segment contains an Urgent pointer field. The Urgent
Pointer field is explained below. 1 = Urgent, 0 = Not Urgent.
– Ack This flag indicates that this segment contains an Acknowledgement field. 1 =
Ack, 0 = No Ack.
– Psh The segment requests a Push. TCP software usually gathers enough data to fill
the transmit buffer prior to transmitting the data. 1 = Push, 0 = No Push. If an
application requires data to be transmitted even though a buffer may not be full then a
PUSH flag bit is set. At the receive side the PUSH makes the data available to the
application without delay.
– Reset This field will Reset the connection. 1 = Reset, 0 = No Reset.
– Syn This flag field is used to Synchronize sequence numbers to initiate a connection.
1 = Syn, 0 = No Syn
– Fin The Finish flag bit is used to indicate the termination of a connection. 1 = Fin, 0 =
No Fin.
• Urgent Pointer. This field presents a way for the sender to transmit emergency data to the
receiver. The URG flag must be set.
– The Urgent Pointer is a 16 bit positive offset that is added to the sequence number field in the TCP
header to obtain the sequence number of the last byte of the urgent data.
– The application determines where the urgent data starts in the data stream.
– The field is normally used by the application to indicate the pressing of an interrupt key during
Telnet/Rlogin or a file transfer abort during FTP.
UDP/TCP Operation Comparison
Data
. . .
ETHERNET FCS
DESTINATION SOURCE FIELD IP HEADER UDP DATAGRAM
PREAMBLE TYPE
ADDRESS ADDRESS
8 6 6 2 8-1500 4
• Internet Protocol.
• It is a layer 3 protocol.
• IP specifies the format of packets, also called datagrams, and the
addressing scheme.
• Most networks combine IP with a higher-level protocol called
Transmission Control Protocol (TCP), which establishes a virtual
connection between a destination and a source.
• IP is a connectionless protocol, which means that there is no
continuing connection between the end points that are
communicating. Each packet that travels through the Internet is
treated as an independent unit of data without any relation to any
other unit of data.
Version of IP
Network
ARP Access RARP Link Layer
Media
ARP and RARP
• Note:
– The Internet is based on IP addresses
– Data link protocols (Ethernet, FDDI, ATM) may have different (MAC)
addresses
• The ARP and RARP protocols perform the translation between IP
addresses and MAC layer addresses
• We will discuss ARP for broadcast LANs, particularly Ethernet
LANs
IP Output IP Input
Ethernet
Address Translation with ARP
ARP Request:
Argon broadcasts an ARP request to all stations
on the network: “What is the hardware address
ofArgon
Router137?”
Router137
128.143.137.144 128.143.137.1
00:a0:24:71:e4:44 00:e0:f9:23:a8:20
ARP Request:
What is the MAC address
of 128.143.71.1?
Address Translation with ARP
ARP Reply:
Router 137 responds with an ARP Reply which
contains the hardware address
Argon Router137
128.143.137.144 128.143.137.1
00:a0:24:71:e4:44 00:e0:f9:23:a8:20
ARP Reply:
The MAC address of 128.143.71.1
is 00:e0:f9:23:a8:20
ARP Packet Format
Ethernet II header
6 6 2 28 10 4
* Note: The length of the address fields is determined by the corresponding address length fields
Example
• ARP Request from Argon:
Source hardware address: 00:a0:24:71:e4:44
Source protocol address: 128.143.137.144
Target hardware address: 00:00:00:00:00:00
Target protocol address: 128.143.137.1
• HTTP
• FTP and TFTP
• SMTP
• POP3
• DNS
• DHCP
• SNMP
HTTP
Client Server
ftp> open server SYN
SYN|ACK
ACK
220 Service Ready
ACK
ftp> USER haggerty
ACK
331 User OK,password?
ACK
ftp> PASS mypass
ACK
230 User login OK
ACK
FTP Data Transfer
Client Server
PORT 192,168,0,173,19,137
200 Command Successful
NLST client.txt
ACK
150 Data Connection
ACK will be open shortly
Control connection
Data Connection
Command Description
get filename Retrieve file from server
1 mail
mail
server user
user server
2 agent
agent 3 6
4 5
Electronic Mail: more on SMTP
From: alice@crepes.fr
MIME version To: bob@hamburger.edu
Subject: Picture of yummy crepe.
method used MIME-Version: 1.0
to encode data Content-Transfer-Encoding: base64
Content-Type: image/jpeg
multimedia data
type, subtype, base64 encoded data .....
parameter declaration .........................
......base64 encoded data
encoded data
Q: What if an email contains text and multiple attachments?
An example
…
Message-ID: <4290a64281e9.4281e94290a6@cwru.edu>
Date: Wed, 07 Sep 2005 13:26:05 -0400
X-Mailer: iPlanet Messenger Express 5.2 HotFix 2.05 (built Mar 3 2005)
MIME-Version: 1.0
Content-Language: en
Subject: An example
X-Accept-Language: en
This is from the $MAIL box
Priority: normal
Content-Type: multipart/mixed; boundary="--3ccd3602166e4b" in the mail server
X-Clamav-Status: No
Status: O
X-UID: 20094
----3ccd3602166e4b
Content-Type: text/html; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: 7bit
----3ccd3602166e4b
Content-Type: application/pdf
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename=“example.pdf"
JVBERi0xLjQNJeLjz9MNCjg5IDAgb2JqIDw8L0xpbmVhcml6ZWQgMS9MIDI0MDQ3Ny9PIDkx
L0UgOTk5Mi9OIDIxL1QgMjM4NjUwL0ggWyA1NzYgNDY4XT4+DWVuZG9iag0gICAgICAgICAg
ICAgICAgDQp4cmVmDQo4OSAxNA0KMDAwMDAwMDAxNiAwMDAwMCBuDQowMDAwMDAxMDQ0IDAw
……
Zg0KMTE2DQolJUVPRg0K
----3ccd3602166e4b--
Q: When you receive an 3MB attachment, how
much space does it use in Case Webmail server?
Electronic Mail: MIME types
Content-Type: type/subtype; parameters
Text Video
• example subtypes: plain, • example subtypes: mpeg,
html quicktime
Image
• example subtypes: jpeg, Application
gif • other data that must be
processed by reader before
Audio “viewable”
• example subtypes: basic (8- • example subtypes: msword,
bit mu-law encoded), octet-stream
32kadpcm (32 kbps coding)
Electronic Mail: mail access protocols
• With POP3 you only have one folder, the Inbox folder. When
you open your mailbox, new mail is moved from the host
server and saved on your computer. If you want to be able to
see your old mail messages, you have to go back to the
computer where you last opened your mail.
• Simple.
• Allows the user to obtain a list of their Emails.
• Users can retrieve their emails.
• Users can either delete or keep the email on their
system.
• Minimizes server resources.
• POP3 “is intended to permit a workstation to
dynamically access a maildrop on a server host in a
useful fashion. Usually, this means that the POP3
protocol is used to allow a workstation to retrieve mail
that the server is holding for it.“
POP3
Server
Establish the Socket
Primary Primary
Thread Socket (101) Thread
Server Client
Server is OK
Server Client
Establish the Socket
USER brainware
Primary Primary
Thread Socket (101) Thread
Server Client
This user is OK
+OK
Primary Primary
Thread Socket (101) Thread
Server Client
Send the Password
PASS nopass123!@#
Primary Primary
Thread Socket (101) Thread
Server Client
The Password is OK
+OK
Primary Primary
Thread Socket (101) Thread
Server Client
Ask how the Server is Feeling…
STAT
Primary Primary
Thread Socket (101) Thread
Server Client
I’m Fine, Thanks!
+OK 2 320
Primary Primary
Thread Socket (101) Thread
Server Client
Got Any Mail?
LIST
Primary Primary
Thread Socket (101) Thread
Server Client
Yup…
Server Client
Message One
1 120
Primary Primary
Thread Socket (101) Thread
Server Client
Message Two
2 200
Primary Primary
Thread Socket (101) Thread
Server Client
End
.
Primary Primary
Thread Socket (101) Thread
Server Client
Get Message One
RETR 1
Primary Primary
Thread Socket (101) Thread
Server Client
Message One Coming!
Server Client
Message One Coming!
Server Client
End of Message 1
.
Primary Primary
Thread Socket (101) Thread
Server Client
Get Message One
DELE 1
Primary Primary
Thread Socket (101) Thread
Server Client
Message 1 Gone!
Server Client
QUIT
Primary Primary
Thread Socket (101) Thread
Server Client
QUIT – Commits/Updates
Primary Primary
Thread Socket (101) Thread
Server Client
Primary Primary
Thread Thread
Server Client
Domain names and IP addresses
1. An application program
on a host accesses the Hostname (neon.tcpip-lab.edu)
HTTP Resolver
domain system through a IP address (128.143.71.21)
IP address (128.143.71.21)
(neon.tcpip-lab.edu)
resolver
Hostname
2. Resolver contacts DNS
server, called name
server
Name
3. DNS server returns IP server
address to resolver which
passes the IP address to
application
Design principle of DNS
. (root)
Managed
• Below top-level domain, by UofT
administration of name math.toronto.edu ece.toronto.edu
space is delegated to
Managed by
organizations ECE Dept.
• Each organization can
neon.ece.toronto.edu
delegate further
Domain name system
• Example:
DNS domains are neon.cs.virginia.edu
., edu, virginia.edu,
cs.virginia.edu
Domain names
• Each server is responsible org server edu server gov server com server
(authoritative) for a
contiguous portion of the
DNS namespace, called a uci.edu .virginia.edu
server server
zone.
Adding a host:
• When a new host is added (“gold.cs.virginia.edu”) to a
zone, the administrator adds the IP information on the
host (IP address and name) to a configuration file on
the primary server
Root name servers
• Root servers
Addresses of root servers
IP address (128.143.71.21)
(neon.tcpip-lab.edu)
authorized to answer the
Hostname
query.
a) If yes, it responds.
b) Otherwise, it will query
other name servers,
starting at the root tree Name
server
4. When the name server has
the answer it sends it to the
resolver.
Recursive and Iterative Queries
• There are two types of queries:
– Recursive queries
– Iterative (non-recursive) queries
query
cs.virginia.edu
authoritative name server name server virginia.edu
server
(here: In the worst case, 4th query:
the closest known server neon.cs.virginia.edu
Resolver
is the root server) IP address of
neon.cs.virginia.edu
cs.virginia.edu
server
• The root sever sends a
Iterative queries
root server
• In an iterative query, the
name server sends a
closest known Name
ia .
ed
u
server in r
ve
authoritative name server .vi
rg
s er
. cs e
n am
a referral to the root y:
ne
o
u
n
query
o n u na
ne ed
e ry: i n ia .
u
• This involves more work 2
nd q
u
ral
o
t se
g
vir rver
.vir
g i n i a .ed
fe r . c s
n
for the resolver Re
rd q u e
ry : neo
. e du
virginia.edu
ia
3 .v i rgin server server
cs e
rr a l to n am
e
Ref
Resolver 4th query:
neon.cs.virginia.edu
IP address of cs.virginia.edu
neon.cs.virginia.edu server
Caching
for a zone:
Resource Records
db.mylab.com
Argon
Argon 128.143.137.144
(b)
00:a0:24:71:e4:44
(a) BOOTP Server 00:a0:24:71:e4:44
BOOTP Response:
DHCP Server
Argon
128.143.137.144
00:a0:24:71:e4:44 DHCP Server
DHCP Response:
IP address: 128.143.137.144
Default gateway: 128.143.137.1
Netmask: 255.255.0.0
BOOTP/DHCP Message Format
Hardware Address
OpCode Hardware Type Hop Count
Length
Unused (in BOOTP)
Number of Seconds
Flags (in DHCP)
Transaction ID
Client IP address
Your IP address
Server IP address
Gateway IP address
Options
• Message type is
Value Message Type
sent as an option.
1 DHCPDISCOVER
2 DHCPOFFER
3 DHCPREQUEST
4 DHCPDECLINE
5 DHCPACK
6 DHCPNAK
7 DHCPRELEASE
8 DHCPINFORM
Other options (selection)
DHCP Client
00:a0:24:71:e4:44 DHCP Server
DHCPDISCOVER
• DCHP DISCOVER Sent to 255.255.255.255
DHCP Server
DHCP Client
00:a0:24:71:e4:44 DHCPOFFER DHCP Server
DHCPOFFER
• DCHP OFFER
DHCP Server
DHCP Operation
• Renewing a Lease
(sent when 50% of DHCP Client
00:a0:24:71:e4:44
lease has expired) DHCP Server
DHCPREQUEST
If DHCP server
DHCPACK
sends DHCPNACK,
then address is
released.
DHCP Server
SNMP
Simple Network Management Protocol
Simple Network Management Protocol
SNMP agent
SNMP
manager
SNMP agent
SNMP
protocol
messages
SNMP agent
Simple Network Management Protocol
• Interactions in SNMP
Replies
Access
objects
Traps
Traps
Data
SNMP SNMP messages SNMP
UDP UDP
IP IP
IP Network
SNMP Protocol
• Internetwork Packet
Exchange/Sequenced
Packet Exchange
(IPX/SPX)
– Protocol originally
developed by Xerox
– Modified and
adopted by Novell
in the 1980s for the
NetWare network
operating system
– MS calls it NWLINK
– Combo of protocols
FIGURE 3-6 IPX/SPX compared to the
and carries network
OSI Model
addr. Info - routable
IPX/SPX Core Protocols
FIGURE 3-7
Components
of an IPX
datagram
IPX/SPX Core Protocols
• IPX address
– Easier than IP because it primarily relies on the
MAC address – still needs to be unique
– Contains two parts
• Network address (external network number)
– The network admin decides on an 8-bit hex address and
assigns it to a server
» Clients will use this as it’s primary server
• Node address – devices MAC address
• Socket address – communicate directly to process
• FULL address
– 000008A2:00805F059822:456h
– All 0’s (network) and all F’s (broadcast) are forbidden
Viewing the IPX Address
• NetBIOS name
– 16 or fewer alphanumeric characters
– Once NetBIOS has found the workstation’s name, it will discover
the MAC address and use that for further communication
– Should match DNS (host) name
• WINS (Windows Internet Naming Service)
– Converts NetBIOS name to IP address
– WINS vs. DNS
• NBT (NetBIOS over TCP/IP)
– Usage – non-routable wrapped in a routable protocol
– nbtstat –A ip_address
NetBIOS Addressing
• Viewing:
– Right-click the
Network
Neighborhood icon,
then click
Properties
– Click the
Identification tab
• AppleTalk zone
– Logical groups of computers defined on an AppleTalk network
– Enables users to share file and print services
– Zone names are used to describe the usage – e.g. ‘sales’
– Not suited for large networks – focus on TCP/IP
FIGURE 3-11
AppleTalk
protocol
compared to
OSI Model
AppleTalk Subprotocols
• AppleTalk node ID
– Unique 8-bit or 16-bit number identifying a computer
on an AppleTalk network
– AppleTalk randomly assigns a node id to each
workstation when connected to the network
• AppleTalk network number
– Unique 16-bit number identifying the network to which
an AppleTalk node is connected
– Allows nodes from several different networks to
communicate
Installing Protocols
• Click OK
• If TCP/IP is not already installed on workstation, follow
prompt and click Yes to restart your computer
• Verify protocol was installed by right-clicking Network
Neighborhood icon, then click Properties
• Verify Configuration tab is selected
• Click Cancel to close window
Chapter Summary
Way cool!
Overview
• Coaxial cable
• Unshielded
twisted pair
• Fiber optic
UTP characteristics
• Unshielded
• Twisted (why?) pairs of insulated conductors
• Covered by
insulating sheath
UTP categories
Unshielded
(no metal
shielding around
the 4 pairs) RJ-45
RJ-45
Connector Jack
4-Pair Unshielded Twisted
Pair Cable with RJ-45 Connector, Continued
RJ-45
Connector
Pen
4 Pairs
Separated
RJ-45 Plug in Wall Jack
Front: Back:
RJ-45 Jack 8 Wire Connectors
Solid-Wire Versus Stranded-Wire UTP
• Solid-Wire UTP
– Each of the eight wires is a solid wire surrounded by
insulation
– Solid wires have low attenuation and so can reach 100
meters
– Easy to connectorize (add connectors to)
– Brittle and easy to break if handled roughly. Not good
for runs through open office areas
Solid-Wire Versus Stranded-Wire UTP,
Continued
• Stranded-Wire UTP
– Each of the eight “wires” is really several thin strands
of wire surrounded by insulation
• Patch Cords
– Cut to popular lengths and connectorized at the factory
– Tested for quality
– Use stranded-wire UTP, which is sufficiently rugged for
open office areas
– TIA/EIA-568 specifies patch cords for the run from the
wall jack to the desktop because it is rugged and
flexible
Patch Cords Versus Bulk Wire,
Continued
• Bulk Wire
– Comes in spools of 50 meters or more
– Can be cut to precise lengths needed to connect
devices
– Solid-wire UTP for longer distance and to make
connectorization easier
– Cut, connectorized, and tested by the user, by the
organization, or by a LAN installer
Patch Cords vs Bulk Wire
• Patch Cords
– Come in packages
– At your local
computer store
– Available in a variety
of lengths
Putting Wires in Order, Continued
Pin Color
Pin 1 on this side
1 White-Orange T568B on both ends
2 Orange of the cord
3 White-Green
4 Blue
5 White-Blue
6 Green
7 White-Brown RJ-45 RJ-45
Connector Jack
8 Brown
Putting Wires in Order, Continued
Pin Color
1 White-Orange
NIC Transmits on
2 Orange 1 and 2 (Orange)
3 White-Green
4 Blue
NIC Receives on
5 White-Blue 3 and 6 (Green)
6 Green
7 White-Brown
T568B
8 Brown
Putting Wires in Order, Continued
Pin Color
1 White-Orange Fan out the wires in their
correct order, with white-
2 Orange
orange on the left and
3 White-Green brown on the right
4 Blue
5 White-Blue
T568B
6 Green
7 White-Brown
8 Brown
Connectorize the Cord
• Cut the wires straight across so that no more than 1.25 cm (a half inch)
of wires are exposed from the jacket
– This controls terminal cross-talk interference
• Be sure to cut straight across or the wires will not all reach the pins
when you push them into the connector in the next step!
Step 2 – Untwist wire ends
• Examine the
Pin Color
Connector
1 White-Orange
– Are the wires in the
correct order? 2 Orange
– Hint: as a rough first 3 White-Green
check, the 1st, 3rd, 5th,
4 Blue
and 7th wires from the
left should be mostly 5 White-Blue
white 6 Green
– If not, reinsert them in
7 White-Brown
the correct order
8 Brown
Stripper
Put Cord
Here
Stripped
Jacket
Crimp the Wire into the Connector
Step 7 - Crimp
Strain Relief
Area for Crimping
Top
Back: Front:
Hole for Connector
UTP Cord Pins
Spring Clip to
Hold Connector in
Test Your Cord
• Continuity Tester
– Test for wires being
in right slots and
making good
contact
– Place connectors of
cord into two ends
– Hit Test button
– Did it work?
Test Your Cord, Continued
• If It Didn’t Work
– Be sure you understand the problem
– If an open connection, one or more of the wires was
not pushed all the way to the end or the crimping did
not push the pin all the way through the insulation.
Next time, cut the wires straight across and crimp very
firmly
– If miswired, see where it was miswired
– Cut off the ends of the cord and reconnectorize
Test Your Cord, Continued
• Signal Testers
– Expensive testers
– Test for signal quality
– Test for breaks with
time domain
reflectometry (TDR),
which sends
signals and looks for
reflections that indicate
breaks
Wide Area Network
WAN-wide-area network
• Circuit switching
• Packet switching
• Cell switching
Circuit Switching
Using Modem>
Using ISDN>
Telecommuter/Remote Office
Speed
Comparison
of WAN
technology
transmission
speeds
FDDI Technology
IBM Token Can handle a computer failure but can?t recover from a broken
4/16 Twisted pair 1
Ring connection.
Not Can handle a computer failure but can?t recover from a broken
IEEE 802.5 4/16 1
specified connection.
CDDI 4/16 Twisted pair 2 Can recover from a brokenconnection (Self healing).
FDDI 100 Optical fiber 2 Can recover from a brokenconnection (Self healing).
FDDI Access Method
STS-768 40 Gbps
Optical Carrier (OC)
• Altering data.
This active attack takes place when data is interrupted in
transit and modified before it reaches its destination, or
when stored data is altered.
• Eavesdropping.
This passive attack takes advantage of network traffic
that is transmitted across the wire in clear text. The
attacker simply uses a device that monitors traffic and
“listens in” to discover information. You’ll hear this term
referred to as sniffing the wire, and sometimes as
snooping.
Security threats
• IP address spoofing.
One way to authenticate data is to check the IP
address in data packets. If the IP address is valid,
that data is allowed to pass into the private
network. IP address spoofing is the process of
changing the IP address so that data packets will
be accepted. IP address spoofing can be used to
modify or delete data, or to perpetuate an
additional type of attack.
Security threats
• Password pilfering.
A hacker will obtain user IDs and passwords, or even
encryption keys, to gain access to network data, which
can then be altered, deleted, or even used to create
another attack. This type of attack is usually done by
asking unsuspecting users, reading sticky notes
containing passwords that are posted next to
computers, or sniffing the wire for password
information. Sometimes a hacker will attempt to get
hired at a company merely to obtain an ID and
password with access rights to the network.
Security threats
• Denial of service.
This active attack is intended to cause full or partial
network outages so that people will not be able to use
network resources and productivity will be affected.
The attacker floods so many packets through the
network or through specific resources that other users
can’t access those resources. The denial-of-service
attack can also serve as a diversion while the hacker
alters information or damages systems.
Security threats
• Virus.
A virus is an attack on a system. It is a piece of
software code that is buried inside a trusted application
(or even an e-mail message) that invokes some action
to wreak havoc on the computer or other network
resources.
Security Protocols