Professional Documents
Culture Documents
Overview of Networking
Basics of Networking
3
Communications – activity associated with distributing or exchanging
information
Telecommunications – technology of communications at a distance that
permits information to be created any where and used everywhere with
little delay
A network is a way to get “stuff” between 2 or more “things”
Examples: Mail, phone system, conversations, railroad system,
highways and roads
4
Must have a message
Message must have a transmitter
Message must have a medium
Message must be understood
Message must have some level of security
5
Essentials for Network
6
A typical network
7
SKILLS FOR INDIA
Topologies
Bus Topology
Bus: each node is daisy-chained (connected one right after the other)
along the same backbone. Information sent from a node travels along the
backbone until it reaches its destination node. Each end of a bus network
must be terminated with a resistor (terminator) at each end. If the
message is missed or not recognized, it reaches the end of the cabling
and dissipates at the terminator.
9
Ring Topology
Similar to a bus network, rings have
nodes daisy chained, but the end of
the network in a ring topology comes
back around to the first node, creating
a complete circuit. Each node takes a
turn sending and receiving
information through the use of a
token. The token along with any data
is sent from the first node to the
second node which extracts the data
addressed to it and adds any data it
wishes to send. Then second node
passes the token and data to the third
node, etc. until it comes back around
to the first node again. Only the node
with the token is allowed to send data
. All other nodes must wait for the
token to come to them.
10
Star Topology
11
HybridTopology
13
Tree or Hierarchical Network Topology
In Network topology, a central
root node, the top of the
hierarchy is connected to
second level network and
second level network is
connected to the lower level
network.
A tree topology may be define
as a combination of star and
bus topology where multiple
networks are connected
through a single back bone
connection.
Each node in a hierarchy level
has point to point links with
each adjacent node on its
below level. 14
SKILLS FOR INDIA
Network Components
Hubs
A hub or network hub connects the computers and devices and sends
messages and data from one device to all others.
If the computer in the network want to send the message to laptop
through the hub, the message will get sent by the hub to all the
computers and devices on the network. They need to identify that
message is not for them. And the laptop receiver will accept the message
as it was intended for the same.
printer
hub
Desktop computer
16
Routers
17
Routers
internet
router
printer
switch
Desktop computer
18
Switch
The switch connects the computer network components and it knows the
address of each item and so when the desktop computer wants to talk to the
laptop it only sends the message to the laptop and nothing else.
printer
switch laptop
Types of Network
Major Categories of Networks
21
Local Area Network
22
Metropolitan Area Network
23
MAN Architecture
24
Wide Area Network
25
WAN Architecture
26
Personal Area Network
28
Other types of Area Networks
29
Data Flow
Direction of data
keyboard desktop
30
Data Flow
Half Duplex: In half duplex mode, each station or node can transmit and
receive but not at the same time.
When one device is sending the other can only receive and vice versa.
Walkie talkies are the good example of halp duplex mode.
31
Data Flow
Full Duplex: In full duplex mode, both stations can transmit and receive
simultaneously.
The full duplex mode is like a two way street with traffic following in both
directions at the same time. The capacity of the channel is divided between
signals travelling in both directions.
32
SKILLS FOR INDIA
OSI Model
ISO/OSI Reference Model
34
ISO/OSI Reference Model
Establish/manage connection
End-to-end control & error checking
(ensure complete data transfer): TCP
The physical layer defines electrical and physical specifications for devices.
In particular, it defines the relationship between a device and a transmission
medium, such as a copper or fiber optical cable.
The major functions and services performed by the physical layer are:
Establishment and termination of a connection to
a communications medium
Participation in the process whereby the communication resources are
effectively shared among multiple users. For example, contention resolution
and flow control
36
Modulation, or conversion between the representation of digital data in
user equipment and the corresponding signals transmitted over a
communications channel. These are signals operating over the physical
cabling (such as copper and optical fiber) or over aradio link
37
Layer 2: Data link layer
The data link layer provides the functional and procedural means to transfer
data between network entities and to detect and possibly correct errors that
may occur in the physical layer. Originally, this layer was intended for point-
to-point and point-to-multipoint media, characteristic of wide area media in
the telephone system. Local area network architecture, which included
broadcast-capable multi access media, was developed independently of the
ISO work in IEEE Project 802. IEEE work assumed sub-layering and
management functions not required for WAN use. In modern practice, only
error detection, not flow control using sliding window, is present in data link
protocols such as Point-to-Point Protocol (PPP), and, on local area networks,
the IEEE 802.2 LLC layer is not used for most protocols on the Ethernet,
and on other local area networks, its flow control and acknowledgment
mechanisms are rarely used. Sliding window flow control and
acknowledgment is used at the transport layer by protocols such as TCP, but
is still used in niches where X.25 offers performance advantages.
38
The ITU-T G.hn standard, which provides high-speed local area
networking over existing wires (power lines, phone lines and coaxial
cables), includes a complete data link layer which provides both error
correction and flow control by means of a selective repeat Sliding
Window Protocol.
Both WAN and LAN service arrange bits, from the physical layer, into
logical sequences called frames. Not all physical layer bits necessarily
go into frames, as some of these bits are purely intended for physical
layer functions. For example, every fifth bit of the FDDI bit stream is
not used by the layer.
39
Layer 3: Network layer
40
Layer 3: Network layer
41
An example of this latter case is CLNP, or IPv6 ISO 8473. It manages
the connectionless transfer of data one hop at a time, from end system
to ingress router, router to router, and from egress router to destination end
system. It is not responsible for reliable delivery to a next hop, but only for
the detection of erroneous packets so they may be discarded. In this scheme,
IPv4 and IPv6 would have to be classed with X.25 as subnet access
protocols because they carry interface addresses rather than node addresses.
42
Layer 4: Transport layer
The transport layer provides transparent transfer of data between end users,
providing reliable data transfer services to the upper layers. The transport
layer controls the reliability of a given link through flow control,
segmentation/desegmentation, and error control. Some protocols are state-
and connection-oriented. This means that the transport layer can keep track
of the segments and retransmit those that fail. The transport layer also
provides the acknowledgement of the successful data transmission and
sends the next data if no errors occurred.
43
OSI defines five classes of connection-mode transport protocols ranging
from class 0 (which is also known as TP0 and provides the least features) to
class 4 (TP4, designed for less reliable networks, similar to the Internet).
Class 0 contains no error recovery, and was designed for use on network
layers that provide error-free connections. Class 4 is closest to TCP,
although TCP contains functions, such as the graceful close, which OSI
assigns to the session layer. Also, all OSI TP connection-mode protocol
classes provide expedited data and preservation of record boundaries.
Although not developed under the OSI Reference Model and not strictly
conforming to the OSI definition of the transport layer, the Transmission
Control Protocol (TCP) and the User Datagram Protocol (UDP) of the
Internet Protocol Suite are commonly categorized as layer-4 protocols
within OSI.
44
Layer 5: Session layer
45
Layer 6: Presentation layer
The original presentation structure used the basic encoding rules of Abstract
Syntax Notation One (ASN.1), with capabilities such as converting
an EBCDIC-coded text file to an ASCII-coded file,
or serialization of objects and other data structures from and to XML.
46
Layer 7: Application layer
The application layer is the OSI layer closest to the end user, which means
that both the OSI application layer and the user interact directly with the
software application. This layer interacts with software applications that
implement a communicating component. Such application programs fall
outside the scope of the OSI model. Application-layer functions typically
include identifying communication partners, determining resource
availability, and synchronizing communication. When identifying
communication partners, the application layer determines the identity and
availability of communication partners for an application with data to
transmit. When determining resource availability, the application layer must
decide whether sufficient network or the requested communication exist. In
synchronizing communication, all communication between applications
requires cooperation that is managed by the application layer.
47
Comparison with TCP/IP Model
In the TCP/IP model of the Internet, protocols are deliberately not as rigidly
designed into strict layers as in the OSI model.[10] RFC 3439 contains a
section entitled "Layering considered harmful (section link here )."
However, TCP/IP does recognize four broad layers of functionality which
are derived from the operating scope of their contained protocols, namely
the scope of the software application, the end-to-end transport connection,
the internetworking range, and the scope of the direct links to other nodes on
the local network.
Even though the concept is different from the OSI model, these layers are
nevertheless often compared with the OSI layering scheme in the following
way: The Internet application layer includes the OSI application layer,
presentation layer, and most of the session layer. Its end-to-end transport
layer includes the graceful close function of the OSI session layer as well as
the OSI transport layer.
48
The internetworking layer (Internet layer) is a subset of the OSI network
layer (see above), while the link layer includes the OSI data link and
physical layers, as well as parts of OSI's network layer. These comparisons
are based on the original seven-layer protocol model as defined in ISO 7498,
rather than refinements in such things as the internal organization of the
network layer document.
50
Inter Vlan Communication
51
Configuration on Router
Router#config ter
Router(config)#interface fastethernet 0/0
Router(config-if)#no ip address
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#interface fastethernet 0/0.1
Router(config-if)#encapsulation dot1q 1
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no sh
Router(config-if)#exit
Router(config)#interface fastethernet 0/0.2
Router(config-if)#encapsulation dot1q 3
Router(config-if)#ip address 11.0.0.1 255.0.0.0
Router(config-if)#no sh
52
Configuration on Router
Router(config-if)#exit
Router(config)#interface fastethernet 0/0.3
Router(config-if)#encapsulation dot1q 5
Router(config-if)#ip address 12.0.0.1 255.0.0.0
Router(config-if)#no sh
Router(config-if)#exit
53
Configuration on Core switch
(1) Configure switch as VTP server
(2) Create Vlans
(3) Configure interface connected to router as Trunk
(4) Configure interfaces connected to other switches as trunk (if
required)
Configuration on Pc
Configure IP and Gateway
54
VTP provides the following benefits:
VLAN configuration consistency across the network
Mapping scheme that allows a VLAN to be trunked over mixed media
Accurate tracking and monitoring of VLANs
Dynamic reporting of added VLANs across the network
Plug-and-play configuration when adding new VLANs
55
As beneficial as VTP can be, it does have disadvantages that are normally
related to the spanning tree protocol (STP) as a bridging loop propagating
throughout the network can occur. Cisco switches run an instance of STP for
each VLAN, and since VTP propagates VLANs across the campus LAN,
VTP effectively creates more opportunities for a bridging loop to occur.
Before creating VLANs on the switch that will propagate via VTP, a VTP
domain must first be set up. A VTP domain for a network is a set of all
contiguously trunked switches with the same VTP domain name. All
switches in the same management domain share their VLAN information
with each other, and a switch can participate in only one VTP management
domain. Switches in different domains do not share VTP information.
Using VTP, each Catalyst Family Switch advertises the following on its trunk
ports:
Management domain
Configuration revision number
Known VLANs and their specific parameters
56
Document Amendment History
57
T H A N K Y O U. . .
All information, including graphical representations, etc provided in this presentation is for exclusive use of current Globsyn
Skills students and faculty. No part of the document may be reproduced in any form or by any means, electronic or otherwise,
without written permission of the owner.
58
SKILLS FOR INDIA
Network Storage
A network storage system maintains copies of digital data across high-
speed local area network (LAN) connections. It is designed to back up files,
databases and other data to a central location that can easily accessed via
standard network protocols and tools.
Storage is an essential aspect of any computer. Hard drives and USB keys,
for example, are designed to hold the data generated by individuals on their
PCs, but when these types of local storage fail, the data is lost. Additionally,
the process of sharing local data with other computers can be time-
consuming, and sometimes the amount of local storage available is
insufficient to store everything desired. Network storage addresses these
problems by providing a reliable, external data repository for all computers
on the LAN to share efficiently. Besides freeing up local storage space,
network storage systems also typically support automated backup programs
to prevent critical data loss.
60
Evolution in Storage Architecture
61
Network-attached storage
63
NAS
Scalability: good
Availability: as long as the LAN and NAS device work,
generally good
Performance: limited by speed of LAN, traffic conflicts,
inefficient protocol
Management: OK
Connection: homogeneous vs. heterogeneous
64
What is SAN about
Data is Asset
How to Store Data
How to Access Data
How to Manage Data Storage
65
Storage Area Network (SAN)
66
Storage Area Network (SAN)
67
SAN vs. NAS
68
Fibre Channel
69
Benefits of SAN
70
Easy Migration to SAN
71
Document Amendment History
72
T H A N K Y O U. . .
All information, including graphical representations, etc provided in this presentation is for exclusive use of current Globsyn
Skills students and faculty. No part of the document may be reproduced in any form or by any means, electronic or otherwise,
without written permission of the owner.
73
SKILLS FOR INDIA
75
User 1 User 2 User 3 User n
Operating System
Computer Hardware
77
Features
78
Supports Internetworking such as routing and WAN ports
User management and support for login and logoff, remote access,
system management
Clustering capabilities, fault tolerant and and high availability systems
79
Remote Login with an example
telnet cs.yale.edu
81
Remote File Transfer
82
Example:
83
File location is not transparent to the user
No real file sharing
Remember: User at the Uni of Vermont must have login permission on
“cs.yale.edu“
FTP provides a way to allow a user to copy files remotely
Remote copying is accomplished through “anonymous FTP“ method
84
Anonymous FTP Method
85
www.trainsignaltraining.com/.../ftp_iis7_10.png
86
FTP mechanism is implemented (similar to telnet implementation)
Daemon on remote site -> watches for connection requests to system„s
FTP port
Login authentication is accomplished ->user can execute commands
remotely
Telnet daemon executes any command for user
FTP daemon responds to a predefined set of file-related commands
87
Get: transfer a file from the remote machine to the local machine
Put: transfer from the local machine to the remote machine
Ls or dir: list files in the current directory on the remote machine
Cd: change the current directory on the remote machine
88
Network and Operating System Security
89
Travels over private leased lines, shared lines like the internet, wireless
connections, or dial-up lines
Intercepting these data could be harmful as breaking into a computer
Interruption of communications could constitute a remote denial-of-
service attack
Diminishing user„s use of and trust in
the system
90
Novell NetWare
Is a NOS
Used cooperative multitasking to run several services on a PC
File sharing instead of disk sharing
NDS (Novell Directory Services)
Server administration
Desktop Management
Software distribution
Integrated cache
Enhanced security
91
Novell NetWare Protocols
92
93
Linux
94
95
SKILLS FOR INDIA
97
98
When you get the message to
"press any key to boot from CD...", press any key.
Once the boot from CD-ROM has started, it will display at the top of the
screen :
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
Setup will configure then your screen resolution.
The system will try to connect via the Internet to the Microsoft website, you can select to "Skip" that step.
You will be prompted to enter the first Usernames (which will be defined as Administrators)
and you will get the new XP Welcome screen :
119
ALL SET TO GO………
120
Step By Step Windows Server 2003 Installation
Guide
121
Windows Server 2003 operating systems take the best of Windows 2000
Server technology and make it easier to deploy, manage, and use. The
result: a highly productive infrastructure that helps make your network a
strategic asset for your organization .
Windows Server 2003 SP2 provides enhanced security, increased
reliability, and a simplified administration to help enterprise customers
across all industries.
122
Microsoft Windows Server 2003 R2 Standard Edition Requirements
Computer and processor
PC with a 133-MHz processor required; 550-MHz or faster processor
recommended; support for up to four processors on one server
Memory
128 MB of RAM required; 256 MB or more recommended; 4 GB maximum
Hard disk
1.2 GB for network install; 2.9 GB for CD install
Drive
CD-ROM or DVD-ROM drive
Display
VGA or hardware that supports console redirection required; Super VGA
supporting 800 x 600 or higher-resolution monitor recommended
123
Check System Requirements
Check Hardware and Software Compatibility
Determine Disk Partitioning Options
Choose the Appropriate File System: FAT, FAT32, NTFS
Decide on a Workgroup or Domain Installation
Complete a Pre-Installation Checklist
After you made sure you can go on, start the installation process
Beginning the installation process
You can install Windows Server 2003 in several methods – all are valid
and good, it all depends upon your needs and your limitations
In this tutorial we are installing directly from a CD by booting your
computer with the CD
Start the computer from the CD 124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
Document Amendment History
149
T H A N K Y O U. . .
All information, including graphical representations, etc provided in this presentation is for exclusive use of current Globsyn
Skills students and faculty. No part of the document may be reproduced in any form or by any means, electronic or otherwise,
without written permission of the owner.
150
SKILLS FOR INDIA
Linux Installation
Installation Requirements
152
Linux installation requirements
Minimum installation
80386SX or better
2 MB RAM
Floppy disk drive
40MB hard drive
Video card
Monitor
153
Linux installation requirements
Realistic installation
Text based
• 80386 or better
• 8 MB RAM
GUI based
• 80486 or Pentium class
• 16 MB RAM
154
Linux recommended hardware
Before installation
Check hardware compatibility!!!
• www.redhat.com/support/hardware
Make sure you have enough disk space
Decide which installation method to use
CD-ROM
Hard Drive
Ftp
Http
156
Decide how to start the installation
Bootable CD-ROM
Local media boot disk
Included with Official RedHat Linux 6.2 set
Network boot disk
PCMCIA boot disk
• Used if CD-ROM drive is attached to PC
through PCMCIA card
157
A Note on Workstation Installations
There are two types available, we will choose KDE for this
presentation
GNOME
• www.gnome.org
KDE
• www.kde.org
158
RedHat Installation
160
Choose the keyboard that best fits your system – If no exact match,
choose the best GENERIC match and click Next
161
Choose the mouse that best fits your system – If no exact match,
choose the best GENERIC match and click Next
162
Read over the help text in the left and then click Next
163
Choose to Install and select KDE Workstation and click Next
164
For ease of installation, continue with Automatic Partitioning and click
Next
Note: everything will be erased!
165
Again, for ease of installation and use, leave defaults selected and click
Next
166
Choose your Network device type, then enter your IP Address,
Netmask, Network, and Broadcast addresses and click Next
Unsure? Ask your network administrator
167
Choose your time zone by clicking on the map, ex. Pacific – Tijuana,
and click Next
168
Set the ROOT PASSWORD - Write it down and keep it in a secure
place!
You can add Users at this time too, then click Next
169
Continue with the option detected for your system and click Next
170
Choose the monitor that best fits your system - If none exist, choose
the best GENERIC monitor and click Next
171
Continue with the video hardware detected for you unless you know it
is incorrect (change it) and click Next
172
Almost done!!! Click Next
If you would rather quit, this is your last chance! – You can reboot
and safely exit the installation now
Be sure
to read
the
Caution
Note!
173
At this point, you can sit back and relax while RedHat is installed
Depending on the speed of your system, the installation will take
from about 15 minutes to 1 hour
174
Insert a blank, formatted disk into the floppy drive and click Next
175
Congratulations!!!
You can now click Exit to reboot your system and start to use
Linux
176
Document Amendment History
177
T H A N K Y O U. . .
All information, including graphical representations, etc provided in this presentation is for exclusive use of current Globsyn
Skills students and faculty. No part of the document may be reproduced in any form or by any means, electronic or otherwise,
without written permission of the owner.
178
SKILLS FOR INDIA
180
Names and addresses in general
181
Naming History
1970‟s ARPANET
Host.Txt maintained by the SRI-NIC
Pulled from a single machine
Problems
• Traffic and load
• Name collisions
• Consistency
DNS related in 1983 by paul mock-apetris (rfcs 1034 and 1035),
modified, updated, and enhanced by a myriad of subsequent rfcs
182
DNS
183
DNS Features: Global Distribution
184
DNS Features: Loose Coherency
185
DNS Features: Scalability
186
DNS Features: Reliability
Data is replicated
Data from master is copied to multiple slaves
Clients can query
Master server
Any of the copies at slave servers
Clients will typically query local caches
DNS protocols can use either UDP or TCP
If UDP, DNS protocol handles retransmission, sequencing, etc.
187
DNS Features: Dynamicity
188
Document Amendment History
189
T H A N K Y O U. . .
All information, including graphical representations, etc provided in this presentation is for exclusive use of current Globsyn
Skills students and faculty. No part of the document may be reproduced in any form or by any means, electronic or otherwise,
without written permission of the owner.
190
SKILLS FOR INDIA
191
Dynamic Assignment of IP addresses
192
Solutions for dynamic assignment of IP
addresses
Not only assign IP address, but also default router, network mask, etc.
Sent as UDP messages (UDP Port 67 (server) and 68 (host))
Use limited broadcast address (255.255.255.255):
These addresses are never forwarded
194
DHCP
195
BOOTP Interaction
(b)
(a)
Argon Argon
00:a0:24:71:e4:44 BOOTP Server 128.143.137.144
00:a0:24:71:e4:44 DHCP Server
BOOTP Request BOOTP Response:
00:a0:24:71:e4:44 IP address: 128.143.137.144
Sent to 255.255.255.255 Server IP address: 128.143.137.100
Boot file name: filename
(c)
BOOTP can be used for
downloading memory image for
diskless workstations
Assignment of IP addresses to hosts
is static
196
DHCP Interaction (simplified)
Argon
128.143.137.144
00:a0:24:71:e4:44 DHCP Server
DHCP Response:
IP address: 128.143.137.144
Default gateway: 128.143.137.1
Netmask: 255.255.0.0
197
BOOTP/DHCP Message Format
Hardware Address
OpCode Hardware Type Hop Count
Length
Unused (in BOOTP)
Number of Seconds
Flags (in DHCP)
Transaction ID
Client IP address
Your IP address
Server IP address
Gateway IP address
Options
200
DHCPACK: Acknowledgement from server to client with parameters,
including IP address.
DHCPNACK: Negative acknowledgement from server to client,
indicating that the client's lease has expired or that a requested IP address is
incorrect.
DHCPDECLINE: Message from client to server indicating that the
offered address is already in use.
DHCPRELEASE: Message from client to server canceling remainder of a
lease and relinquishing network address.
DHCPINFORM: Message from a client that already has an IP address
(manually configured for example), requesting further configuration
parameters from the DHCP server.
201
DHCP Operation
DHCP Client
00:a0:24:71:e4:44 DHCP Server
DHCPDISCOVER
DCHP DISCOVER Sent to 255.255.255.255
DHCP Server
DHCP Client
00:a0:24:71:e4:44 DHCPOFFER DHCP Server
DHCPOFFER
DCHP OFFER
DHCP Server
202
DHCP Operation
DHCP Client
00:a0:24:71:e4:44 DHCP Server
DHCPREQUEST
DHCP Client
00:a0:24:71:e4:44 DHCP Server
DHCPRELEASE
DCHP RELEASE
204
Client Server Interactions
205
The client receives one or more DHCPOFFER messages from one or
more servers
The client chooses one based on the configuration parameters
offered and broadcasts a DHCPREQUEST message that includes
the server identifier option to indicate which message it has selected
and the requested IP address option, taken from your IP address in
the selected offer
In the event that no offers are received, if the client has knowledge
of a previous network address, the client may reuse that address if its
lease is still valid, until the lease expires
206
The servers receive the DHCPREQUEST broadcast from the client
Those servers not selected by the DHCPREQUEST message use
the message as notification that the client has declined that server's
offer
The server selected in the DHCPREQUEST message commits the
binding for the client to persistent storage and responds with a
DHCPACK message containing the configuration parameters for
the requesting client
207
The combination of client hardware and assigned network address constitute
a unique identifier for the client's lease and are used by both the client and
server to identify a lease referred to in any DHCP messages.
The your IP address field in the DHCPACK messages is filled in with the
selected network address. The client receives the DHCPACK message with
configuration parameters. The client performs a final check on the
parameters, for example with ARP for allocated network address, and notes
the duration of the lease and the lease identification cookie specified in the
DHCPACK message. At this point, the client is configured.If the client
detects a problem with the parameters in the DHCPACK message (the
address is already in use on the network, for example), the client sends a
DHCPDECLINE message to the server and restarts the configuration
process.
208
The client should wait a minimum of ten seconds before restarting the
configuration process to avoid excessive network traffic in case of looping.
On receipt of a DHCPDECLINE, the server must mark the offered address
as unavailable (and possibly inform the system administrator that there is a
configuration problem).
If the client receives a DHCPNAK message, the client restarts the
configuration process.
The client may choose to relinquish its lease on a network address by
sending a DHCPRELEASE message to the server.
The client identifies the lease to be released by including its network
address and its hardware address.
209
DHCP Pros
210
DHCP Cons
211
Document Amendment History
212
T H A N K Y O U. . .
All information, including graphical representations, etc provided in this presentation is for exclusive use of current Globsyn
Skills students and faculty. No part of the document may be reproduced in any form or by any means, electronic or otherwise,
without written permission of the owner.
213
SKILLS FOR INDIA
A message transfer agent receives mail from either another MTA, a mail
submission agent (MSA), or a mail user agent (MUA). The transmission
details are specified by the Simple Mail Transfer Protocol (SMTP). When a
recipient mailbox of a message is not hosted locally, the message is relayed,
that is, forwarded to another MTA. Every time an MTA receives an email
message, it adds aReceived trace header field to the top of the header of the
message,[4] thereby building a sequential record of MTAs handling the
message. The process of choosing a target MTA for the next hop is also
described in SMTP, but can usually be overridden by configuring the MTA
software with specific routes.
216
A MTA works in the background, while the user usually interacts directly
with a mail user agent. One may distinguish initial submission as first
passing through an MSA – port 587 is used for communication between an
MUA and an MSA while port 25 is used for communication between
MTAs, or from an MSA to an MTA, this distinction is first made in RFC
2476.
For recipients hosted locally, the final delivery of email to a recipient
mailbox is the task of a message delivery agent (MDA). For this purpose
the MTA transfers the message to the message handling service component
of the message delivery agent. Upon final delivery, the Return-Path field is
added to the envelope to record the return path.
217
Install a Windows Server 2003 Print Server
218
Click Local printer attached to this computer, click to clear
the Automatically detect and install my Plug and Play printer check box,
and then click Next
Click the port for your printer, and then click Next
Click the printer make and model or provide the drivers from the printer
manufacturer media, and then click Next
NOTE: If you are prompted to keep or not keep your existing printer driver,
either keep the existing driver or replace the existing driver. If you replace
the driver, you must provide the manufacturer driver for this printer.
Click Next to continue.
•Accept the default name of the printer or provide a different name, and then
click Next.
•Click the Share as option, type the share name, and then click Next.
219
Document Amendment History
220
T H A N K Y O U. . .
All information, including graphical representations, etc provided in this presentation is for exclusive use of current Globsyn
Skills students and faculty. No part of the document may be reproduced in any form or by any means, electronic or otherwise,
without written permission of the owner.
221
SKILLS FOR INDIA
223
Since a backup system contains at least one copy of all data worth saving,
the data storage requirements are considerable. Organizing this storage
space and managing the backup process is a complicated undertaking. A
data repository model can be used to provide structure to the storage. In the
modern era of computing there are many different types of data storage
devices that are useful for making backups. There are also many different
ways in which these devices can be arranged to provide geographic
redundancy, data security, and portability.
224
Types of Backup
Normal
Copy
Incremental
Differential
Daily Backup
225
Selecting Backup Devices and Media
Many tools are available for backing up data. Some are fast and
expensive. Others are slow but very reliable. The backup solution that's
right for your organization depends on many factors, including
Capacity The amount of data that you need to back up on a routine
basis. Can the backup hardware support the required load given your
time and resource constraints?
Reliability The reliability of the backup hardware and media. Can
you afford to sacrifice reliability to meet budget or time needs?
Extensibility The extensibility of the backup solution. Will this
solution meet your needs as the organization grows?
Speed The speed with which data can be backed up and recovered.
Can you afford to sacrifice speed to reduce costs?
Cost The cost of the backup solution. Does it fit into your budget?
226
Recovering Data Using the Restore Wizard
Make sure that the backup set you want to work with is loaded into the
library system, if possible.
Start Backup. In the Welcome tab, click Restore Wizard, and then click
Next.
227
Select the check box next to any drive, folder, or file that you want to
restore. If the media set you want to work with isn't shown, click Import
File, and then type the path to the catalog for the backup.
To restore system state data, select the check box for System State as well as
other data you want to restore. If you're restoring to the original location, the
current system state will be replaced by the system state data you're
restoring. If you restore to an alternate location, only the registry, Sysvol,
and system boot files are restored. You can only restore system state data on
a local system.
Tip By default, Active Directory and other replicated data, such as Sysvol,
aren't restored on domain controllers. This information is instead replicated
to the domain controller after you restart it, which prevents accidental
overwriting of essential domain information. To learn how to restore Active
Directory, see the "Restoring Active Directory" section of this chapter.
228
Click Next. Click Advanced if you want to override default options, and
then follow steps 5–7. Otherwise, skip to step 8.
Select the restore location using one of the following options:
Original Location Restores data to the folder or files it was in when it was
backed up.
Alternate Location Restores data to a folder that you designate, preserving
the directory structure. After selecting this option, enter the folder path to
use or click Browse to select the folder path.
Single Folder Restores all files to a single folder without preserving the
directory structure. After selecting this option, enter the folder path to use or
click Browse to select the folder path.
Do Not Replace The Files On My Computer (Recommended) Select this
option if you don't want to copy over existing files.
Replace The File On Disk Only If the File On Disk Is Older Select this
option to replace older files on disk with newer files from the backup.
Always Replace The File On My Computer Select this option to replace
all the files on disk with files from the backup.
229
If they're available, you can choose to restore security and system files using
the following options:
Restore Security:Restores security settings for files and folders on
NTFS volumes.
Restore Removable Storage Database:Restores the Removable
Storage configuration if you archived SystemRoot%\System32\
Ntmsdata. Choosing this option will delete existing Removable Storage
information.
Restore Junction Points, Not The Folder And File Data They
Restores network drive mappings but doesn't restore the actual data to
the mapped network drive. Essentially, you're restoring the folder that
references the network drive.
Click Next, and then click Finish. If prompted, type the path and name of the
backup set to use. You can cancel the backup by clicking Cancel in the
Operation Status and Restore Progress dialog boxes.
When the restore is completed, click Close to complete the process or click
Report to view a backup log containing information about the restore
operation. 230
T H A N K Y O U. . .
All information, including graphical representations, etc provided in this presentation is for exclusive use of current Globsyn
Skills students and faculty. No part of the document may be reproduced in any form or by any means, electronic or otherwise,
without written permission of the owner.
231
SKILLS FOR INDIA
233
Classification Access Control List
Types of ACL based on Protocol: -
(1) IP Access Control List
(2) IPX Access Control List
(3) Apple talk Access Control List
234
Classification Access Control List
Types of ACL based on Order of rules: -
(1) Deny, permit
(2) Permit, deny
235
Flow chart of Inbound ACL
A Packet is received
Yes
No
Is there any The packet
macthine rule in ACL is dropped.
from top-down
order?
Yes
The packet Yes No
Is it The packet
is passed to
permit is dropped.
RE
? 236
IP Standard ACL (Numbered)
In Standard ACL, we are only able to specify source address for the
filtering of packets. The syntax to create IP standard ACL are: -
Router#conf ter
Router(config)#access-list <no> <permit|deny> <source>
Router(config)#exit
<source> Single pc host 192.168.10.5
192.168.10.5
192.168.10.5 0.0.0.0
N/w 200.100.100.0 0.0.0.255
Subnet 200.100.100.32 0.0.0.15
All any
237
Example: - 172.16.0.16 – 18 should not access Internet; rest of all other pc
should access Internet.
Internet
Router
172.16.0.1
172.16.x.x
Router#conf ter
Router(config)#access-list 30 deny 172.16.0.16
Router(config)#access-list 30 deny 172.16.0.17
Router(config)#access-list 30 deny 172.16.0.18
Router(config)#access-list 30 permit any
Router(config)#exit
238
IP Standard ACL (Named)
In Numbered ACL editing feature is not available that is we are not
able to delete single rule from the ACL. In Named ACL editing
feature is available.
Router#config ter
Router(config)#ip access-list standard <name>
Router(config-std-nacl)#<deny|permit> <source>
Router(config-std-nacl)#exit
Router#conf ter
Router(config)#ip access-list standard abc
Router(config-std-nacl)#deny 172.16.0.16
Router(config-std-nacl)#deny 172.16.0.17
Router(config-std-nacl)#deny 172.16.0.18
Router(config-std-nacl)#permit any
Router(config-std-nacl)#exit
239
To control Telnet access using ACL
If we want to control telnet with the help of ACL then we can create
a standard ACL and apply this ACL on vty port. The ACL that we
will create for vty will be permit – deny order.
240
IP Extended ACL (Numbered)
Extended ACL are advanced ACL. ACL,
which can control traffic flow on the basis
of five different parameters that are: -
(i) Source address
(ii) Destination address
(iii) Source port
(iv) Destination port
(v) Protocol (layer 3/layer 4)
241
The syntax to create Extended ACL
Router#conf ter
Router(config)#access-list <no> <deny|permit> <protocol>
<source> [<s.port>]
<destination> [<d.port>]
router(config)#exit
<no> -> 100 to 199
<protocol> -> layer ¾
IP
TCP
UDP
ICMP
IGRP
242
The syntax to create Extended ACL
<Source port> no (1 to 65535) or
<Destination port> telnet/www/ftp etc.
<Source> Single pc
<Destination> 192.168.10.4 0.0.0.0
host 192.168.10.4
N/w
200.100.100.0 0.0.0.255
Subnet
172.30.0.32 0.0.0.7
All
Any
243
To display ACL
Router#show access-lists or
Router#show access-list <no>
244
Switch port ACL
You can only apply port ACLs to layer 2 interfaces on your switches
because they are only supported on physical layer 2 interfaces. You
can apply them as only inbound lists on your interfaces, and you can
use only named lists as well.
245
Switch#conf ter
Switch(config)#mac access-list extended abc
Switch(config-ext-mac)#deny any host 000d.29bd.4b85
Switch(config-ext-mac)#permit any any
Switch(config-ext-mac)#do show access-list
Switch(config-ext-mac)#int f0/6
Switch(config-if)#mac access-group abc
246
Lock and Key (Dynamic ACLs)
These ACLs depends on either remote or local Telnet authentication in
combination with extended ACLs. Before you can configure a dynamic
ACL, you need to apply an extended ACL on your router to stop the flow
of traffic through it.
Reflexive ACLs
247
Time-Based ACLs
In this you can specify a certain time of day and week and then
identity that particular period by giving it a name referenced by a
task. The reference function will fall under whatever time constraints
you have dictated. The time period is based upon the router‟s clock,
but it is highly recommended that using it in conjunction with
Network Time Protocol (NTP) synchronization.
Router#conf ter
Router(config)#time-range no-http
Router(config-time-range)#periodic
<Wednesday|weekdays|weekend> 06:00 to 12:00
Router(config-time-range)#exit
Router(config)#time-range tcp-yes
Router(config-time-range)#periodic weekend 06:00 to 12:00
Router(config-time-range)#exit
248
Router(config)ip access-list extended time
Router(config-ext-nacl)#deny tcp any any eq www time-range
no-http
Router(config-ext-nacl)#permit tcp any any time-range tcp-yes
Router(config-ext-nacl)#interface f0/0
Router(config-if)#ip access-group time in
Router(config-if)#do show time-range
249
Document Amendment History
250
T H A N K Y O U. . .
All information, including graphical representations, etc provided in this presentation is for exclusive use of current Globsyn
Skills students and faculty. No part of the document may be reproduced in any form or by any means, electronic or otherwise,
without written permission of the owner.
251