You are on page 1of 144

Networking & Troubleshooting

Module 1 – Networking Primer

Kelvin Goh
Module 1 – Networking Primer
• Networking Primer
– Overview of Networking
– Benefits of Networking
– Network Concepts
– OSI Model
– Network Protocol Suites
– Network Ports and Addressing
• Networking Components
– Repeaters, Hubs, Routers, Bridges, Switches and
Modems
– Network Operating Systems
– Client Software
– Network Application
• Module 1 Summary
Overview of Networking

• What Is a Network?
Description of what actually a network is

• Why Build a Network?


The reason behind why we build a network

• The varieties of computer networks


Different types of computer networks
Overview of Networking
• What Is a Network?
– Networking Is All About Information
– If you've ever used a telephone, tracked a package with an
overnight shipper, or purchased a new car from a dealership,
you've used a network.
– Every network has rules, like other networks, there is a basic set
of rules for how a computer network should do its job might look
something like this:
• Information must be delivered reliably without any corruption of data.
• Information must be delivered consistently—the network should be
capable of determining where its information is going.
• Multiple computers must be able to identify each other across the network.
• There must be a standard way of naming and identifying the parts of the
network.
Overview of Networking
• Why Build a Network?
– There are a lot of reasons for building networks, whether they're
computer networks or car-dealer networks.
– However diverse the reasons, they ultimately boil down to a
couple basic points:
• Networks can increase efficiency
• Networks can help standardize policies, procedures, and practices among
network users
• Networks can bring together diverse ideas and issues into a common
forum, where they can be addressed in a global fashion rather than in a
haphazard, case-by-case fashion
• Networks help ensure that information is redundant—in other words, that it
exists in more than one mind (or computer) at a time
Overview of Networking
• The varieties of computer networks
– LAN: A Local Area Network, or LAN, is the least complex
organizational distinction of computer networks. A LAN is nothing
more than a group of computers linked through a network that are
all at a single site.
– MAN: a Metropolitan Area Network, or MAN, using high-speed
leased telephone lines or special hardware (radio, microwave, or
laser data transmission units) that allows full LAN-speed data
transfer.
– WAN: A Wide Area Network, or WAN, is geographically scattered
LANs or MANs joined together using high-speed phone lines.
– CAN: A Campus Area Network, or CAN, is similar to a MAN but
has full network-speed bandwidth running between all the LANs
on the network.
Benefits of Networking

• Simplified Resource Sharing


Resource Sharing Makes Easy

• Networking Is Faster
No more slow processing of data

• Centralized Management
Easy administration maintenance
Benefits of Networking
• Simplified Resource Sharing
– Resource sharing is easier over a network; whether the network
uses a peer or client/server configuration is immaterial.
– Shared Disk Space
• Networked computers can share their hard disk space with
each other.
– Shared Printers
• A third aspect of resource sharing is shared printers. It can
helps to reduce the capital expense.
Benefits of Networking
• Networking Is Faster
– Networking is faster than not networking.
– Just think about it:
• No more printing memos—use email!
• No more running from desk to desk to check everyone's
availability for a meeting—use the group calendar!
• No more wondering whose Rolodex has the name of the
person you need to call—you can get it from the contact
database.
• No more racing around from computer to computer to get the
file you need—just copy or open it from the network drive.
Benefits of Networking
• Centralized Management
– Centralized management saves time and money (two things
accountants appreciate) as well as the goodwill of the users and
the credibility of the administrator (two things the users and
administrators appreciate)
Network Concepts

• What networks are made of


– Network-specific hardware
– Network-specific software

• Network Topology
Network physical and logical layout

• Network Media
How computer connect to each other?
Network Concepts
• Network-specific hardware
– Network-specific hardware comes in two varieties.

Network Software

PC, Server Router, Hub, Switch, etc.


Network Concepts
• Network-specific software
– Network-specific hardware comes in three varieties.

Network Hardware

Wizard Title

Wizard Text

< Back N ext > Cancel

Servers

Network Network Application


Operating System
Client Software
Network Concepts
• Network Topology `
`
`

– Bus Topology HUB


` ` `
` `

` `

`
` ` ` `

– Star Topology `

`
HUB
`
` `

`
HUB
`
`

` `

`
` `

– Ring Topology
` `

`
`
` HUB `

` ` ` `
`
`
Star Ring
Star Bus

– Star Bus and Star Ring `


`

` `
`
`

– Physical Mesh Topology `

` `
` `

True Mesh Hybrid Mesh


Network Concepts
• Network Topology
– Bus Topology ` ` `

 Cable is just one or more wires


 Passive Technology
 When one computer sends a signal, everyone receive, but
only one can accepts the information
 Only one computer at a time can send a message
Network Concepts
• Network Topology
– Bus Topology ` ` `

 Advantages of the Bus


o Simple, reliable easy to use and understand
o Least amount of cable to connect, less expensive
o Easy to extend
 Disadvantages of the Bus
o Heavy network traffic can slow a bus considerably
o Each barrel connector weakens the signal
o Difficult to troubleshoot a bus
Network Concepts
• Network Topology `
` `

– Star Topology ` HUB `

` `
`

 Cables run from the computers to a central hub


 Used in concentrated networks when the endpoints are
directly reachable from a central location, when network
expansion is expected, and when greater reliability is needed
 Computer communicates with a central hub that resends the
message either to all the computers (broadcast star network)
or only to the destination computer (switched star network)
Network Concepts
• Network Topology
– Star Topology
`
` `

` HUB `

` `
`

 Advantages of the Star


o Easy to modify and add new computers without disturbing the rest of
the network
o Center of a star network is a good place to diagnose network faults
o Single computer failures do not necessarily bring down the whole star
network
o Can use several cable types in the same network with a hub that can
accommodate multiple cable types
 Disadvantages of the Star
o If the central hub fails, the whole network fails to operate
o Require a device at the central point to rebroadcast or switch network
traffic
o It costs more to cable, requires more cable than other networking
topologies
Network Concepts
• Network Topology `

– Ring Topology `
`

 Each computer is connected to the next computer, with the


last one connected to the first, each retransmits what it
receives from the previous computer
 Used in high-performance network, networks requiring that
bandwidth be reserved for time-sensitive features, eg video,
audio
 Messages flow around the ring in one direction
 Some ring networks do token passing
Network Concepts
• Network Topology `

– Ring Topology `
`

 Advantages of the Ring


o Equal access to the token, no one computer can monopolize the
network
o Allow the network to degrade gracefully as more users are added
 Disadvantages of the Ring
o Failure of one computer on the ring can affect the whole network
o Difficult to troubleshoot
o Adding or removing computers disrupts the network
Network Concepts
• Network Topology
`

– Star Bus and Star Ring


` `

` HUB `

 Combination of topologies of bus, star, and ring


` `

` `

` HUB `

Star Bus ` `

o Combine the bus and the star ` `

HUB
o Linking several star hub together with bus trunks
` `

` `
`

Star Ring Star Bus

 Also called star wired ring


 Network cables are laid out much like star network,
` `

` `

but a ring is implemented in the central hub


` `

Star Ring
Network Concepts
• Network Topology `

– Physical Mesh Topology `


`

 Having redundant links between devices


` `

Hybrid Mesh
 Hybrid mesh: Contain some redundant links
 True mesh: Has a link between each device in the network
 Advantages of the Mesh `

o Fault tolerance ` `

o Guaranteed communication channel capacity


o Relatively easy to troubleshoot ` `

 Disadvantages of the Mesh True Mesh

o Difficulty of installation and reconfiguration


o Higher cost of maintaining redundant links
Network Concepts
• Network Medium
- Physical path between network hardware
- Several types of network media: copper coaxial, copper
unshielded twisted-pair, optical fiber, wireless
- Affects nearly every aspect of communication
Network Concepts
• Network Medium
- Copper coaxial
 Consists of a hollow outer cylindrical conductor that surrounds a single
inner wire conductor
 Outer conductor is covered with a jacket or shield
 Inner conductor is held in place by insulating rings or a solid dielectric
material
 Less susceptible to interference and crosstalk than the twisted pair
 Transmit both analog and digital signals
Outer sheath
Outer conductor

Insulation

Inner conductor
Network Concepts
• Network Medium
- Copper unshielded twisted-pair
 Consists of two insulated copper wires arranged in a regular spiral pattern
 A number of pairs are bundled into a cable by wrapping them in a tough
protective sheath
 The twisting decreases the crosstalk interference between adjacent pairs
in a cable
Network Concepts
• Network Medium
- Copper unshielded twisted-pair
 Come in five categories:
o Category 1 is not rated for performance.
o Category 2 is used for telephone wiring and is rated to a maximum
data rate of 1 megabit per second.
o Category 3 is the lowest level that can be used for networking. It is
used for Ethernet 10BASE-T and has a maximum data rate of 16
megabits per second.
o Category 4 is used for Token-Ring and Ethernet 10BASE-T. Its
maximum data rate is 20 megabits per second.
o Category 5 is used for Ethernet 100BASE-T and has a maximum
data rate of 155 megabits per second.
Network Concepts
• Network Medium
- Optical fiber
 Made using glasses and plastics
 Using optical ray to transmit information
 Consists of 3 concentric sections: Two innermost layer (core, cladding)
with two type of glass with different indexes of refraction
 Optical fibers are grouped together into optical cables
 Optical fiber can carry data at very high bit rates—in some cases, up to
622 megabits per second.
Jacket

Cladding

Core
Network Concepts
• Network Medium
- Wireless
- Transmission are achieved by means of an antenna
- Directional transmission: electromagnectic beam is focused,
thus antennas must be aligned carefully
- Omnidirectional transmission: transmitted signal spreads out
in all directions and can be received by many antennas
- Radio and Infrared are wireless medium
Open Systems Interconnect (OSI) Model
• Introducing the Open Systems Interconnect (OSI) Model
• The OSI Model Lower Layers Functions
– Physical Layer
– Data Link Layer
• The OSI Model Middle Layers Functions
– Network Layer
– Transport Layer
• The OSI Model Upper Layers Function
– Session Layer
– Presentation Layer
– Application Layer
– Upper Layer Devices
Open Systems Interconnect (OSI) Model
• Introducing the Open Systems Interconnect (OSI) Model
– Developed by the International Organization for Standardization
(ISO)
– To provide “common ground’ when describing any network
protocol
– Consists of 7 layers
– OSI Model is only a model, it is not a protocol
– It is a stalwart of networking theory
– Each layer performs a specific function
Open Systems Interconnect (OSI) Model
• Introducing the Open Systems Interconnect (OSI) Model

Layer 7 Application Application 7

Layer 6 Presentation Presentation 6

Layer 5 Session Session 5


Network
Layer 4 Protocol 4
Transport Suite
Transport
Layer 3 Network Network 3

Layer 2 Data Link Data Link 2

Layer 1 Physical Physical 1

Information Flow

Network Medium

How data travels through the layers of the OSI Model


Open Systems Interconnect (OSI) Model
• Introducing the Open Systems Interconnect (OSI) Model
– Application: Defines how interaction occurs between network services (applications)
and the network
– Presentation: Formats data exchange, data compression and redirection of data
streams
– Session: Defines how two computers establish, synchronize, maintain, and end a
session
– Transport: Data error-free checking, segmentize long data, logical address name
resolution and flow control in network communication
– Network: Logically addresses and translates logical names into physical address,
data prioritization, controls congestion and routes data
– Data Link: Takes raw data from the Physical layer and gives it a logical structure,
controls functions of logical network topologies and physical addressing as well as data
transmission connection
– Physical: Controls the functional interface
Open Systems Interconnect (OSI) Model
• The OSI Model Lower Layers Functions
– Physical Layer Concepts
 Controls the functional interface
 Deals with measurable, physical entities you can touch
 Protocols operate at this layer translate the ones and zeros of
the data into electrical ons and offs.
 Specifies the layout of the transmission media (topology)
- Physical Layer Devices
 Network Interface Card (NIC)
 Transceiver
 Repeaters
 Hubs
 MAUs
Open Systems Interconnect (OSI) Model
• The OSI Model Lower Layers Functions
– Data Link Layer Concepts
 Made up of two sublayers: Media Access Control (MAC) and
Logical Link Control (LLC)
 Creating, transmitting, and receiving packets
 Logical (MAC) addressing and logical link control processing
 Creating logical topologies and controlling media accesss
- Data Link Layer Devices
 Bridges
 Switches
Open Systems Interconnect (OSI) Model
• The OSI Model Middle Layers Functions
– Network Layer Concepts
 Defines protocols that ensures that the data arrive at the
correct destination
 Logically network addresses and translates logical names into
physical address
 Data prioritization, controls congestion and data routing
- Network Layer Devices
 Routers
 Brouters
 Layer 3 Switches
Open Systems Interconnect (OSI) Model
• The OSI Model Middle Layers Functions
– Transport Layer Concepts
 Reliable end-to-end error and flow control
 Logical address name resolution
- Transport Layer Implementations
 IPX/SPX Protocol
 TCP/IP Protocol
 NetBEUI
Open Systems Interconnect (OSI) Model
• The OSI Model Upper Layers Functions
– Session Layer Concepts
 Responsible for establish, maintain, and breaking session, or
dialogs
 Handles the actual connections between systems
 Different from service provided at Transport layer
 Operates at a higher level and looks at the bigger picture –
the entire conversation
Open Systems Interconnect (OSI) Model
• The OSI Model Upper Layers Functions
– Presentation Layer Concepts
 It changes the look, or presentation, of the data
 Deals with encryption and data compression
 Handles redirection of date streams
Open Systems Interconnect (OSI) Model
• The OSI Model Upper Layers Functions
– Application Layer Concepts
 Defines several standard network services
 Defines how interaction occurs between application and the
network
 Software applications that you use on your screen
Open Systems Interconnect (OSI) Model
• The OSI Model Upper Layers Functions
– Upper Layer Devices
 None of the upper layer devices operate at any specific layer
 Upper layer devices perform a range of functions for the
network
 They fall into the class of devices know as gateways
 Gateways can be either hardware or software
 For example, email gateway
Major Network Protocol Suites

• Protocol
How network communicate?

• TCP/IP
The Internet Standard

• Netware IPX/SPX
Novel Netware Protocol

• AppleTalk
Apple Computer Macintosh Protocol
Major Network Protocol Suites
• Protocol
– A protocol is a system of common rules that helps define the
complex process of transferring data.
– A common language of computer communication
Major Network Protocol Suites
• Transmission Control Protocol/Internet Protocol (TCP/IP)
– Protocol that carries data traffic over the Internet
– Refers to a suite of data communication protocols
– It is an open standard – no single company own it
– Often referred to as the DoD protocol suite or the Internet
protocol suite
– TCP/IP Features
 Logical addressing
 Routing
 Name service
 Error control and flow control
 Application support
Major Network Protocol Suites
• Transmission Control Protocol/Internet Protocol (TCP/IP)
– In contrast to OSI Model, TCP/IP uses only 4 layers
Application
Application/
Presentation FTP TELNET SMTP NFS
Process RIP

Session OSPF

Transport Host-to-Host TCP UDP DNS


ICMP
Network Internet IP
ARP

Data Link
Network
Physical
OSI Model TCP/IP Model TCP/IP Protocol suite mapped to the OSI Model
Major Network Protocol Suites
• Transmission Control Protocol/Internet Protocol (TCP/IP)
– Application: Provides applications for network troubleshooting, file transfer,
remote control, and Internet activities. Also supports the network Application
Programming Interfaces (APIs) that enable programs written for a particular
operating environment to access the network.
– Host-to-Host/Transport: Provides flow control, error control, and
acknowledgment services for the internetwork.
– Internet: Provides logical, hardware-independent addressing so that data can
pass among subnets with different physical architectures. Provides routing and
support delivery across the internetwork. Relates physical addresses (used at
the Network Access layer) to logical addresses.
– Network: Provides an interface with the physical network. Formats the data for
the transmission medium and addresses data for the subnet based on physical
hardware addresses. Provides error control for data delivered on the physical
network.
Major Network Protocol Suites
• NetWare IPX/SPX
– Developed by Novell Corp
– It is not an open standard
– It is a server-centric architecture
– Netware protocols are modular, can use with other protocols,
such as TCP/IP and AppleTalk
Major Network Protocol Suites
• NetWare IPX/SPX

Application
Presentation SAP NCP NLSP RIP

Session
Transport SPX
IPX NLSP RIP
Network
LSL
Data Link MLID

Physical
OSI Model Netware protocol suite mapped to the OSI Model
Major Network Protocol Suites
• AppleTalk
– Developed by Apple Computer Corp
– Can coexist with multiple protocols on large, complex networks
Application AppleTalk

Presentation AFP

Session ZIP PAP ASP


ADSP
Transport ATP NBP RTMP

Network DDP

Data Link AARP


LocalTalk
Physical EtherTalk TokenTalk

OSI Model AppleTalk protocol suite mapped to the OSI Model


Network Ports & Addressing

• Network Ports
Door and Windows of a network

• Network IP Addressing
Logical address for network

• Network Subnetting
How to group and maximize the use of IP
Network Ports & Addressing
• Network Ports
– Door for communication
– Each process that wants to communicate with another process
identifies itself to the protocol suite by one or more ports
– A port is a 16-bit number digit (65535 ports)
– Two types of ports:
 Well-known: Well-known ports belong to standard servers, it ranges from 0
to 1023
 Ephemeral: Any ports other than well-known ports is ephemeral port,
which is any ports greater than 1023. It ranges from 1024 to 65535.
Network Ports & Addressing
• Network IP Addressing
– An IP address is a 32-bit binary address, this 32-bit address is
subdivided into four 8-bit segments called octets.
– It is always refer as dotted decimal format
– A dotted decimal IP address: 209.121.131.14
– IP addresses fall into the following address classes:
 Class A addresses— The first 8 bits of the IP address are used for the
network ID. The final 24 bits are used for the host ID.
 Class B addresses— The first 16 bits of the IP address are used for the
network ID. The final 16 bits are used for the host ID.
 Class C addresses— The first 24 bits of the IP address are used for the
network ID. The final 8 bits are used for the host ID.
Network Ports & Addressing
• Network IP Addressing
– Address ranges for Class A, B, and C networks
Address Class Binary Address Must First Term of Dotted Decimal Excluded Addresses
Begin with Address Must Be

A 0 0 to 127 10.0.0.0 to 10.255.255.255

127.0.0.0 to 127.255.255.255

B 10 128 to 191 172.16.0.0 to 172.31.255.255

C 110 192 to 223 192.168.0.0 to 192.168.255.255


Network Ports & Addressing
• Network IP Addressing
– Special IP Addresses
 0.0.0.0 – Network itself
 255.255.255.255 – Broadcast
 127 network – Loopback
 Private address: used for the protected network:
o 10.0.0.0 to 10.255.255.255
o 172.16.0.0 to 172.31.255.255
o 192.168.0.0 to 192.168.255.255
Network Ports & Addressing
• Network Subnetting
– Process of dividing a block of IP addresses assigned as a Class
A, B, or C network into multiple smaller blocks of addresses.
– Same as IP address, it uses 32-bit binary address and is
subdivided into four 8-bit segments
– Using decimal dotted format
– Providing a means for grouping IP addresses in the address
space below the network ID
Networking Components
• Repeaters, Hubs, Routers, Bridges,
Switches and Modem
Networking Hardware

• Network Operating Systems


Networking Server Software

• Client Software
Networking Client Software

• Network Application
Application software that get things done
Networking Components
• Repeaters
– Simple two-port signal amplifiers
– Used in bus topology to extend the distance
– Receive a digital signal, amplify it, and transmit it
– Why use repeater?
• Cheap, effective way of extending cable lengths

Transmit A Jam A Transmit B Jam B

A common network repeater


Networking Components
• Hubs
– Most common piece of network hardware
– Each connector is designed to accept one twisted-pair cable
– Hubs come in two categories: chassis and stackable
 Chassis Hub
o Large box that is made to mount into a network rack (one or two feet
tall)
o Has slot for expansion card
o Able to support many connections
 Stackable Hub
o Slim line box that contain between 6 and 24 ports
o Can be rack-mounted or flush-mounted to a wall
o Able to expand easily
Networking Components
• Bridges
– Looks like a repeater
– Incorporates the functionality o a repeater (signal amplification),
and it can looks at the frames of data
– Protocol Independence
– Traffic Segmentation
Networking Components
• Switches
– Combination of hub and bridge technology
– Keep track of traffic
– Two modes of operation: cut-through and store-and-forward
 Cut-through
o Able to begin transmitting the frame on the destination port before it
receives it in its entirety
o Extremely fast performance
 Store-and-forward
o Able to check for errors, ensure bad frames are not propagated
across the network
o Able to support multiple topologies
– New technology: Virtual Local Area Network
Networking Components
• Routers
– A multi-port device that makes decisions on how to hand a frame
– An intelligent network connecting device that sends
communication traffic directly to the appropriate network
– Determine alternate routes in case of network failure
– Able to block traffic
Networking Components
• Modems (Modulator and Demodulator)
– Converts digital signals of a computer to analog signal and vice
versa
– Used to connect computers over telephone lines
– Two types of modems: External and Internal
 External Modem
o Stand-alone (separate) device
 Internal Modem
o Contained on a circuit board that is installed inside a computer or
inserted into a computer expansion slot
– Transmit data at rates up to 56K bps
Networking Components
• Network Operating System (NOS)
– More scalable and resourceful than Desktop Operating System
– To balance the needs of all users accessing the server
– Many Network Operating Systems now in the market
 Microsoft Windows NT/2000/2003
 Sun Solaris
 IBM AIX
 Linux (Red Hat, Suse, Mandrake, Debian, etc)
 Mac OS
 Novell Netware
 BSD Unix (OpenBSD, NetBSD, FreeBSD)
Networking Components
• Client Software
– To communicate with server for information
– Main tool for user to work
– Integrate with network for efficient and effective use of resources
– In-house developed or ready-made software
– Different types of client software:
 DOS Clients on Netware and Windows
 Windows Clients
 Macintosh Clients
Networking Components
• Network Applications
– Software to get things done
– Databases (Microsoft SQL, Oracle, DB2, MySQL)
– Electronic Messaging (Microsoft Mail, Novel Groupwise)
– Groupware (Microsoft Exchange, Novell Groupwise, Lotus
Domino/Notes)
– Office Suites (Corel Office, Microsoft Office, Lotus SmartSuite,
OpenOffice)
Module 1 Summary
• Networking Primer
– Overview of Networking
– Benefits of Networking
– Network Concepts
– OSI Model
– Network Protocol Suites
– Network Ports and Addressing
• Networking Components
– Repeaters, Hubs, Routers, Bridges, Switches and Modems
– Network Operating Systems
– Client Software
– Network Application
End of Module 1

Q&A

Thank You
Module 2 – Networking (From Small to Big)
• Local Area Network (LAN)

• Extending Your LAN – Wide Area Networks (WAN)

• Intranets, Extranets and Interconnecting Networks

• Future & Popular of Networking


– Wireless LANs

• Module 2 Summary
Local Area Network (LAN)
• Definition
LAN: A Local Area Network, or LAN, is the least complex
organizational distinction of computer networks. A LAN is nothing
more than a group of computers linked through a network that are all
at a single site.
• The following characteristics differentiate one LAN from another:
– topology: The geometric arrangement of devices on the network. For
example, devices can be arranged in a ring or in a straight line
– protocols: The rules and encoding specifications for sending data. The
protocols also determine whether the network uses a peer-to-peer or
client/server architecture
– media: Devices can be connected by twisted-pair wire, coaxial cables, or fiber
optic cables. Some networks do without connecting media altogether,
communicating instead via radio waves
Local Area Network (LAN)
• Local Area Network Technology
– Ethernet
– Fast Ethernet
– Gigabit Ethernet
– Token Ring
– Fiber Distributed Data Interface (FDDI)
– Wireless LANs
Local Area Network (LAN)
• Local Area Network Technology
– Ethernet
 Most widely used local area network (LAN) technology
 Supports a data transmission rate of 10 Mb/s
 Use coaxial cable, twisted pair wiring, or fiber optic cable
 Support “Bus” and “Star”
 Ethernet Media Access Control
o Half-Duplex Ethernet
o Full-Duplex Ethernet
Local Area Network (LAN)
• Local Area Network Technology
– Ethernet
 Physical Layer Standard
o 10Base5
o 10Base2
o 10Base-T
o 100Base-T
o 100Base-TX
o 1000Base-T
 Ethernet Cabling and Connectors
o Twisted Pair Cabling
o Coaxial Cabling
o Fiber Optic Cabling
o Ethernet Connectors
Local Area Network (LAN)
• Local Area Network Technology
– Fast Ethernet
 New version of Ethernet
 Supports a data transmission rate of 100 Mb/s
– Gigabit Ethernet
 New version of Ethernet
 Supports a data transmission rate of 1000 Mb/s (1 Gb/s)
Local Area Network (LAN)
• Local Area Network Technology
– Token Ring
• Second most widely used local area network (LAN)
technology after Ethernet
• Use ring topology with data being transmitted sequentially
from one ring station to the next
• The ring is initialized by circulating a token
• Defined by IBM in early 1980s
Local Area Network (LAN)
• Local Area Network Technology
– Token Ring
• Two types of token ring:
 Classic Token Ring
o Half-duplex
o Use share bandwidth
o Referred as shared Token Ring or half-duplex Token Ring
 Dedicated Token Ring
o Full-duplex
o no contention for a shared medium
Local Area Network (LAN)
• Local Area Network Technology
– Fiber Distributed Data Interface (FDDI)
• Specifies a 100-Mbps token-passing, dual-ring LAN using
fiber-optic cable
• Used as high-speed backbone technology
• Dual-ring architecture
• Uses optical fiber as the primary transmission medium, but
can also use copper
• FDDI over copper is referred to as Copper-Distributed Data
Interface (CDDI)
Local Area Network (LAN)
• Local Area Network Technology
– Fiber Distributed Data Interface (FDDI)
Local Area Network (LAN)
• Local Area Network Technology
– Wireless LANs

Wireless LAN
Extending Your LAN – Wide Area Networks (WAN)
• What is a WAN?
– A network that links together geographically dispersed computer
networks
– Basically two or more LANs tied together using high-speed phone
lines (such as T1 or 56K frame relay)
– A way to extend your network resources beyond the local area
Extending Your LAN – Wide Area Networks (WAN)
• WAN Hardware
– Bridges
A bridge is a network device that essentially does what its name describes: bridges two
LANs together
– Gateways: Protocol Translators
The term gateway can refer to a variety of different devices. At its most basic, a
gateway is a device that acts as a two-way path between networks. For example, in an
Internet connected network, a proxy server can be a gateway between the internal
network and the external Internet
Protocol translator—a device that can translate between two network protocols.
Typically, protocol translators translate NetWare IPX to TCP/IP so that users on
an IPX network can access the Internet or IP resources.
Extending Your LAN – Wide Area Networks (WAN)
• WAN Hardware
– Routers
A device that handles the traffic flow for data packets that are not addressed inside the
local network. In other words, a router is the long-distance post office sorting machine.
The process of sending a packet closer to its destination is called routing.
Extending Your LAN – Wide Area Networks (WAN)
• High-Speed Data Access
– Trunk Lines: T1 and T3
 Trunk lines are the backbone of long-distance networks
 Types of Trunks:
o T1: 1.544 megabits per second, often used to interconnect WAN
o T3: 44.736 megabits per second, often used by large corporate
 Possible Uses for Trunks:
o Can carry up to 24 separate voice phone lines
o Can carry up to 1.544 megabits per second of data
o Can use 12 voice channels (half the available channels) and use the
remaining bandwidth (about 768 kilobits per second) to carry data
o Can use only a small percentage of the bandwidth for a fractional T1
o Can use a T1 line to carry ISDN Primary Rate Interface
 Trunk lines are often called leased lines
 Trunk Line Speeds: 128, 256, 384, 512, 768, 896, 1.024,
1.152, 1.280, 1.408 Mbps
Extending Your LAN – Wide Area Networks (WAN)
• High-Speed Data Access
- Digital Subscriber Lines (DSL)
 As fast as a T1
 Can carry lots of data at very high speeds
 Can run over the same copper wire that your regular phone
lines
 DSL is available in a variety of methods:
o For Internet access, Asymmetric Digital Subscriber Line (ASDL) is
usually requested
o More useful for WANs are High-speed Digital Subscriber Lines
(HDSL)
o Rate Adaptive DSL (RADSL) is a useful tool for WANs that are more
spread out
o The fastest member of the family is VDSL, (Very high bit-rate Digital
Subscriber Line)
Extending Your LAN – Wide Area Networks (WAN)
• High-Speed Data Access
- Integrated Services Digital Network (ISDN)
 a set of international standards for access to advanced, all-
digital public telecommunications networks
 provides all of its services over an entirely digital transmission
system
 Components of ISDN
o ISDN CHANNELS
o ACCESS TYPES
o DEVICES
o INTERFACES
o PROTOCOLS
Extending Your LAN – Wide Area Networks (WAN)
• High-Speed Data Access
- Integrated Services Digital Network (ISDN)
 Components of ISDN
o ISDN CHANNELS
▫ Bearer channels (B channels)
▫ Delta (or "Demand") channels (D channels)
▫ High-capacity channels (H channels)
o ACCESS TYPES
▫ BASIC RATE ACCESS (BRA)
▫ PRIMARY RATE ACCESS (PRA)
o DEVICES
▫ Terminal Equipment (TE)
▫ Terminal Adapter (TA)
▫ Network Termination 1 (NT1)
▫ Network Termination 2 (NT2)
▫ Exchange Termination (ET)
Extending Your LAN – Wide Area Networks (WAN)
• High-Speed Data Access
- Integrated Services Digital Network (ISDN)
 Components of ISDN
o INTERFACES
o R Interface
o S Interface
o T Interface
o U Interface
o PROTOCOLS
o Link Access Protocol (LAPD, also known as Q.921)
o Q.931 protocol
Intranets, Extranets and Interconnecting Networks
• Intranet
– A company-specific, private network based on Internet
technology, and as such, it is a form of local area network
– Provide a cost-effective vehicle for communication
– Benefits of Intranets:
 Reduced operating costs
 Improved employee productivity
 Streamlined processing flows
 Improved internal and external communication
 New and improved customer service
 Cross-platform capability
Intranets, Extranets and Interconnecting Networks
• Intranet Components
– A computer network for resource sharing
– A network operating system that supports the TCP/IP protocol
– A server computer that can run Internet server software
– Server software that supports HyperText Transport Protocol
(HTTP) requests from browsers (clients)
– Desktop client computers equipped with network software
capable of sending and receiving TCP/IP packet data
– Browser software installed on each client computer
Intranets, Extranets and Interconnecting Networks
• Extranet
– Can be considered interorganizational internetworks
– Extranet Topology
 Private Extranet
 Hybrid Extranet
 Extranet Service Provider
 Public Extranet
Intranets, Extranets and Interconnecting Networks
• Extranet
– Extranet Topology
 Private Extranet
o A private extranet and the Internet are functionally
identical
o Primary difference between a private extranet and Internet
is a matter of scale and exclusivity
Organization A Organization B
Intranet Intranet

Extranet

Organization C Organization D
Intranet Intranet

A typical private extranet


Intranets, Extranets and Interconnecting Networks
• Extranet
– Extranet Topology
 Why Build a Private Extranet
o Greater protection from unauthorized uses of extranet
because no “public entrance”
o Greater control over performance variables
o Greater confidence in sharing sensitive or proprietary
information with business partner
o Improved protection against denial of service attacks
Intranets, Extranets and Interconnecting Networks
• Extranet
– Extranet Topology
 Public Extranet
o Public Extranet is simply an intranet that has been connected to the Internet
o Any client can access extranet resources
o Clients and resources connected to it may use resource outside the
boundaries of the designated extranet
Client
Intranet Internet
Client
Client
Resource

Extranet Intranet
Resource
Resource

Public extranets use Internet to link to users and resources


Intranets, Extranets and Interconnecting Networks
• Extranet
– Extranet Topology
 Why Build a Public Extranet
o Accessibility to the widest possible body of business
partners for extranet resources
o The cost of distributing applications to the widest possible
body is small
o Changes in extranet structure are relatively easy
o Availability of alternative and complementary resources
Intranets, Extranets and Interconnecting Networks
• Extranet
– Extranet Topology
 Hybrid Extranet
o Based on virtual private network, which use encrypted
channels across a public network to connect physically
separated parts of an extranet
o Combination of Private and Public extranet
Intranets, Extranets and Interconnecting Networks
• Extranet
– Extranet Topology
 Extranet Service Providers
o For organizations wishing to create extranets, but without
the resources or expertise to do so
o Providers offering extranet services fall into three
categories:
▫ Consulting firms
▫ Communications firms
▫ Special purpose networking organizations
Future & Popular Trends of Networking
• Wireless LANs
– Why use wireless networks
– What wireless LANs are
– Why wireless LANs are attractive to networkers
– Types of Wireless LAN Technology
– How do Wireless LANs Work
– Some Typical Wireless LAN Configurations
Future & Popular Trends of Networking
• Wireless LANs
– Why use wireless networks
 Installation flexibility
 Need no cables
 Excellent portability
 Installation Speed and Simplicity
 Scalability
 Increasing number of LAN users are becoming mobile
Future & Popular Trends of Networking
• Wireless LANs Application Topology

– What wireless LANs are Spread spectrum

 Data carried over radio


connectivity; the ability

waves or with infrared light In-office to roam in the office

 It is a plethora of standards
with a laptop computer

built around the TCP/IP and remain connected

protocol to the LAN.

 Wireless networks are


versatile ways to transfer Wireless networking Infrared LANs, radio LANs

data at fixed location

 Different kinds of wireless


networks lend to different Wireless networking Radio modems connected with VPN

applications: out-of-office wireless network provider

(RadioMail, Sprint, MCI, and so on)


Future & Popular Trends of Networking
• Wireless LANs
– Why wireless LANs are attractive to networkers
 Simplifies adds, moves, and changes
 Quickly deployable
 Offers mobility for users who don't work in a single location
Future & Popular Trends of Networking
• Wireless LANs
– Types of Wireless LAN Technology
 Narrow Technology
 Spread Spectrum Technology:
o A wideband radio frequency technique
o Two types of spread spectrum radio:
▫ Frequency Hopping (FHSS)
▫ Direct Sequence (DSSS)
 Infrared Technology
Future & Popular Trends of Networking
• Wireless LANs
– How do Wireless LANs Work
 Use radio airwaves to communicate
 Radio waves are often referred as radio carriers
 Date being transmitted is superimposed on the radio carrier so
that it can be accurately extracted at the receiving end
 Typical wireless LAN has a transmitter/receiver device, called
an Access Point (AP), connects to the wired network from a
fixed location using standard cabling
 End user access the wireless LAN through wireless LAN
adapter
Future & Popular Trends of Networking
• Wireless LANs
– Some Typical Wireless LAN Configurations
 Peer-to-Peer Network

 Client and Access Point (Infrastructure Mode)


`

Internet
`

 Multiple Access Points and Roaming `


Module 2 Summary
• Local Area Network (LAN)

• Extending Your LAN – Wide Area Networks (WAN)

• Intranets, Extranets and Interconnecting Networks

• Future & Popular of Networking


– Wireless LANs
End of Module 2

Q&A

Thank You
Module 3 – Network Design
• Network Design
– The Criteria for Building Your Network
– Designing Your Network
– How to Select Hardware and Software for Your Network

• Setting up Small Office Networks

• Module 3 Summary
Network Design
• Network Design
– The Criteria for Building Your Network
 What "best practices" are
o Because networking technology changes so rapidly, focusing on immediate
product details to the detriment of the big picture draws attention away from
the core infrastructural issues that modern networks face. This is where best
practices provide their value to the networking process. Note the benefits of
best practices:
▫ Best practices offer a perspective that enables network planners to step
out of the upgrade cycle long enough to take a long hard look at their
current practices
▫ Best practices offer a way to assess policies and procedures, codify
those policies and procedures that work, and discard those that are
nonproductive or counterproductive
▫ Best practices must be tested to demonstrably produce good results
▫ Codifying and instituting best practices often results in cost savings
Network Design
• Network Design
– The Criteria for Building Your Network
 The steps to successful implementations: plan, design,
implement, and tune
o Building a network is much the same as building a house. Change may be a
constant, but we can try to manage it with planning and adherence to some
very simple processes. The process is, simply stated, plan, design,
implement, and tune:
▫ Plan. Plan your network from a user perspective.
▫ Design. Design your network.
▫ Implement. Implementation is the process of physically realizing the
design.
▫ Tune. Tuning is the part of the process in which you try to rectify the
small flaws in your creation.
Network Design
• Network Design
– Designing Your Network
 Step 1: Identify the Uses of Your Network
o Defining the Organizational Purpose
o Informational Interviews
o Quantifying the Network
 Step 2: List Which Tasks Happen at Which Computers
o The Many-User Computer
o Simple Needs—Simple Computer
o Considerable On-Site Needs—Powerful Computer
o Low On-Site Needs—Considerable Network Needs
o Single-User Computers
o Average User—Average Power
o Power User—Powerful Computers
Network Design
• Network Design
– Designing Your Network
 Step 3: Determine the Degree of Centralization
o Easier Access to Files
o Stronger Security
o Access Rules: A Simple Example
o Easier Backup
o Easier Configuration Management
 Step 4: Making It Real—Drawing the Network
o Drawing the Logical Network Diagram
o Drawing the Physical Network Diagram
 Step 5: Writing the Specification and Getting Others‘ Input
o Writing the Specification Document
o Meeting with Other Users
Network Design
• Network Design
– Designing Your Network
 Step 6: Specifying Hardware
o Selecting Hardware
 Step 7: Building the Network
Network Design
• Network Design
– How to Select Hardware and Software for Your Network
 Selecting a Topology
 Selecting the Network Type: Client/Server or Peer to
Peer
 Selecting the Workstation Operating System and
Network Operating System
 Selecting the Network Protocol
Setting up Small Office Networks
• Hardware
– 15 Desktop Computers
– 20 Notebooks
– 3 Routers
– 5 Switches
– 2 Access Point
– 5 Hubs
– 2 Modems
• Requirement:
– To setup a network with 3 Offices connect to each other
– Wireless access point at 1 office
– Dial-up access at two offices
Module 3 Summary
• Network Design
– The Criteria for Building Your Network
– Designing Your Network
– How to Select Hardware and Software for Your Network

• Setting up Small Office Networks


End of Module 3

Q&A

Thank You
Module 4 – Network Maintenance
• Network Troubleshooting
• Troubleshooting Steps
• Troubleshooter’s Resources
• Troubleshooting Tips
• Diagnosing Real-World Problems
• Module 4 Summary
Network Maintenance
• Network Troubleshooting
– Narrowing down the problem
 Checking for simple stuff
o Correct login procedure and right
o Link lights
o Power switch
o Operator error
 Is Hardware or Software causing the problem?
 Is a particular workstation causing the problem, or is it the
server?
 Which segment(s) of the network are affected?
Network Maintenance
• Troubleshooting Steps
– Step 1: Identify the Exact Issue
– Step 2: Re-create the Problem
– Step 3: Isolate the Cause
– Step 4: Formulate a Correction
– Step 5: Implement the Correction
– Step 6: Test the Solution
– Step 7: Document the Problem and the Solution
– Step 8: Give Feedback
Network Maintenance
• Troubleshooting Steps
– Step 1: Identify the Exact Issue
 We asked certain question to identify the exact issue
o Which part of the Internet can’t be accessed?
o A particular Web site? A particular address? Any Web site?
o Which part of the network can’t be accessed?
o Is the Internet line down?
o Is the server down?
o Which server can’t be accessed?
Network Maintenance
• Troubleshooting Steps
– Step 2: Re-create the Problem
 When something is not working, write down exactly what is it
 Try to reproduce the problem occur by remember what you
have done
 By reproducing the problem, you will know exactly what have
happen to you network
 Eg, when you are trying to access the Intranet Web Server and
if the browser indicate an error message of “Cannot determine
DNS server”, you know that it is the problem of the DNS
Network Maintenance
• Troubleshooting Steps
– Step 3: Isolate the Cause
 If you can reproduce the problem, next step is to attempt to
determine the cause
 You may need to ask the following questions:
o Were you ever able to do this?
o If yes, when did you become unable to do it?
o Has anything changed since you were last able to do this?
o Are you doing anything differently from the way you
normally proceed?
o Were any error messages displayed?
o Are other people experiencing this problem?
Network Maintenance
• Troubleshooting Steps
– Step 4: Formulate a Correction
 Formulate a solution
 Come up with at least one possible solution
 Someone else in the company may have the answer
 Check Online resource and vendor documentation
Network Maintenance
• Troubleshooting Steps
– Step 5: Implement the Correction
 In this step, implement the formulated correction
 Based on the formulated correction, we will follow the proper
steps to solve the issue
 At this point, we can assume that someone did something by
accident to cause this to happen or that it was the result of a
software installation
Network Maintenance
• Troubleshooting Steps
– Step 6: Test the Solution
 Now you made the changes, test the solution to see if it solves
the problem
 We will repeat the repeat the operation that previously did not
work
 If the problem is not solved, go back to step 4, formulate a new
correction and also redo steps 5 and 6
 It is important to make note of what worked and what didn’t so
that you don’t make the same mistakes twice
Network Maintenance
• Troubleshooting Steps
– Step 7: Document the Problem and the Solution
 Network documentation is very important!
 Can refer back when a similar problem arises in the future
 Assemble your own database of information to troubleshoot
other problems
 Be sure to include information such as following:
o A description of the conditions surrounding the problem
o The Network OS version, the software version, type of equipment
o Whether you were able to reproduce the problem
o The solution you tried
o The ultimate solution
Network Maintenance
• Troubleshooting Steps
– Step 8: Give Feedback
 Most important steps in troubleshooting model
 Give feedback to the person who need to know, or the person
experiencing the problem
 Explain the problem and the solution
 It is a benefit to show the user exactly what happened –
prevent from happen again
 Use words and terms the person who experiencing the problem
understands
Network Maintenance
• Troubleshooter’s Resources
– Log Files
 Operating Systems log files
 Application log files
– Manufacturers’ Troubleshooting Resources
 README files
 Telephone support
 Technical support CD-ROM
 Technical support Web site
Network Maintenance
• Troubleshooter’s Resources
– Hardware Troubleshooting Tools
 A crossover cable
 A hardware loopback
 A tone generator
 A tone locator
– Software Troubleshooting Tools
 Protocol analyzers
 Performance-monitoring tools
Network Maintenance
• Troubleshooting Tips
– Don’t’ Overlook the Small Stuff
– Prioritize Your Problems
– Check the Software Configuration
– Don’t Overlook Physical conditions
– Don’t Overlook Cable Problems
– Check for Viruses
Network Maintenance
• Diagnosing Real-World Problems
– Ping Strangeness
– Duplicate IP Addresses
– Undeliverable Mail
– Connectivity Problems after a Server Upgrade
– Excessive Network Collisions
Network Maintenance
• Network Diagnose Tools
– Ping: To determine whether computer can reach the network
– IPconfig: Show TCP/IP configuration
– Hostname: Display computer name
– Tracert: Displays the name or IP address of each intermediate router or
other network gateway device the message passes through to reach its
destination.
– Arp: Maintains a list of computer names and their corresponding IP
addresses
– Route: Supports manipulation and viewing of a computer's routing table
– Getmac: To obtain the media access control (MAC) address for all network
adapters and network protocols installed on your computer
Network Maintenance
• Network Diagnose Tools
– Netstat: Displays TCP/IP protocol statistics and active connections to and
from your computer
– Nslookup: Displays information about Domain Name System (DNS) servers
– Pathping: Traces network routes. It combines features of Ping (Ping.exe)
and Trace Route (Tracert.exe)
Module 4 Summary
• Network Troubleshooting
• Troubleshooting Steps
• Troubleshooter’s Resources
• Troubleshooting Tips
• Diagnosing Real-World Problems
• Network Diagnose Tools
End of Module 4

Q&A

Thank You
Module 5 – Virtual Private Network
• Virtual Private Networking (VPN)
– Basics of VPN
– Usage of VPN
– VPN Product Options
– VPN Tunneling Protocols
– VPN Security
• Network Design Best Practice
• Module 5 Summary
Virtual Private Network
• Virtual Private Networking (VPN)
– Basics of VPN
 An authenticated and encrypted communication channel
across some form of public network, such as Internet
 A VPN is service independent
 Pre-requisite to establish a VPN:
o Each site must se up a VPN-capable device on the network perimeter
o Each site must know the IP subnet addresses used by the other site
o Both sites must agree on a method of authentication and exchange
digital certificates if required
o Both sites must agree on a method of encryption and exchange
encryption keys as required
Virtual Private Network
• Virtual Private Networking (VPN)
– Basics of VPN

VPN Host

Internet

Client
Server
VPN VPN
Gateway Encrypted channel Gateway
Network
Network
Virtual Private Network
• Virtual Private Networking (VPN)
– Usage of VPN
 Two specific application for which VPN is being used:
o Replacement for dial-in modem pools
Advantages
▫ Reduce support cost
▫ No more phone lines to maintain
▫ Not required to upgrade hardware
▫ Reduce infrastructure costs
Disadvantages
▫ Integrity of the remote workstation – whether it is secure
▫ Need to open another port through firewall, open more room for
attacker
Virtual Private Network
• Virtual Private Networking (VPN)
– Usage of VPN
 Two specific application for which VPN is being used:
o Replacement for dedicated WAN links
Advantages
▫ Can be used to connect two sites which are separated by large
distance – use Internet to connect, save cost
▫ May even be advantageous when two sites are close to each
other - do not need dedicated line
Disadvantages
▫ Integrity of the remote workstation
▫ Need to open another port through firewall, open more room for
attacker
Virtual Private Network
• Virtual Private Networking (VPN)
– VPN Product Options
 There are number of options available which fall into three
categories:
o Firewall-based VPN
▫ Most popular VPN solution
▫ Provides central point of management
o Router-based VPN
▫ Many routers use application-specific integrated circuit hardware
to prevent router overloading
▫ Poor at providing perimeter security
o Dedicated software or hardware
▫ Create additional point of administration and security management
Virtual Private Network
• Virtual Private Networking (VPN)
– VPN Tunneling Protocols
 Protocols that can be used for VPNs:
o Point-to-Point Tunneling Protocol (PPTP)
▫ Designed for client/server connectivity
▫ Sets up a single point-to-point connection between two computers
▫ Works at the data link layer
▫ Transmits over only IP networks
o IPSec
▫ Hybrid of L2F and PPTP
▫ Sets up a single point-to-point connection between two computers
▫ Works at the data link layer
▫ Transmit over multiple types of networks, not just IP
▫ Combined with IPSec for security
Virtual Private Network
• Virtual Private Networking (VPN)
– VPN Tunneling Protocols
 Protocols that can be used for VPNs:
o L2TP
▫ Handles multiple connections at the same time
▫ Provides secure authentication and encryption
▫ Supports only IP networks
▫ Focuses on LAN-to-LAN communication
▫ Works at the network layer, and provides security on top of IP
▫ Can work in tunnel mode or transport mode
Virtual Private Network
• Virtual Private Networking (VPN)
– VPN Security Issue
• VPN attract intruders because of their perceived inaccessibility
• Vulnerability increases as large volumes of encrypted data
begin flowing across the Internet
• Denial-Of-Service attack
Network Design Best Practice
• On converged voice-and-data networks, apply quality of service or another
prioritization scheme.
• To secure the company, place an impregnable wall at the LAN/WAN border to keep
outsiders out and insiders in.
• Redirect traffic from the Internet to local caching devices or to a content delivery
network
• Think of the network from user and content points of view, particularly because a
growing proportion of the user base will be mobile and working outside the range of
technology support.
• Use VPNs for smaller offices and individuals, and investigate VPNs as a strategic
direction throughout the company
• Change to a switched network. Give each user a dedicated pipe, and your worries
end
• Use multilayer switches to do everything — they can switch, route and balance loads
Module 5 Summary
• Virtual Private Networking (VPN)
– Basics of VPN
– Usage of VPN
– VPN Product Options
– VPN Tunneling Protocols
– VPN Security
• Network Design Best Practice
Q&A
Thank You

Kelvin Goh


kelvingoh@digitalalliance.net


+6012 3063710

You might also like