Professional Documents
Culture Documents
Connecting equipment together via a communication channel to create a Network. Examples of equipment are: personal and mainframe computers, printers, plotters, fax machines, mobile etc Examples of communication channels: cable and phone lines and satellites, using copper wires, fiber optic cable, radio waves and infrared
Benefits of Network
Sharing of
Hardware: Hard disk, Printer, Plotter, Modem Software: Applications and Data Communication systems: Email, Voice Mail Windows NT/2000/2003/2008, Linux/Unix/Solaris, NetWare
Collectively, the sharing of data, information and devices is called resource sharing, the ultimate goal of networking.
The way in which networks offer Information and Resource sharing is via services.
Two or more computers Network Operating Systems (NOS) Controls the Network operation. Examples: Windows 98/ME, NT, 2000, XP, 2003, 2008, Vista, Windows 7, UNIX/LINUX, Netware. Network protocol that sets the communication rules TCP/IP Transmission Control Protocol/Internet Protocol IPX/SPX - Internetwork Packet eXchange / Sequenced Packet eXchange (Novell's NetWare protocol) NetBEUI - NetBIOS Enhanced User Interace (Developed by IBM & Microsoft for NetBIOS) AppleTalk - Macintosh SNA Systems Network Architecture (SNA) is IBM's proprietary
Modem/ Router for WAN Communication Network or communication medium over which data is sent cabling, telephone lines, wireless devices, and satellites using some form of data transmission, i.e., electrical signals, microwave, radio and light waves.
Client/Server Model
Clients send requests to a server, and the server sends a response back to the client.
Client/Server Model
Types of Servers
Mail Servers News Servers Proxy Servers Telnet Servers Web Servers
Application Servers Audio/Video Servers Chat Servers Fax Servers FTP Servers
Internetwork
Internetwork is created when you take two or more LANs or WANs and connect them via a Layer 3 i.e Network layer device such as router, and configure a logical network addressing scheme with a protocol like IP
Network segmentation
Breaking up a larger network into a number of smaller ones is called network segmentation and its accomplished using routers, switches and bridges
Broadcast storms
Multicasting Low bandwidth
Collision Domains
Networking devices that share the same medium (are connected to the same physical segment) are said to belong to the same collision or bandwidth domain
Collision Domains
The network area in Ethernet over which frames that have collided will be detected. Collisions are propagated by hubs and repeaters, but not by LAN switches, routers, or bridges
Broadcast Domain
A broadcast domain is a set of all devices on a network segment that hear all broadcasts sent on that segment.
Cabling Types
LANs typically use either copper or fiberoptic cabling. Copper cabling can include one strand of copper across which an electrical voltage is transmitted, or many strands of copper. Fiber-optic cabling uses light-emitting diodes (LEDs) and lasers to transmit data.
UTP Categories
Ethernet Cabling
The types of Ethernet cables available are: Straight-through cable Crossover cable Rolled cable
Straight-Through Cable
The straight-through cable is used to connect: Host (PC) to switch Host to hub Router to switch Router to hub
Straight-Through Cable
Straight-Through Cable
Straight-Through Cable
Straight-Through Cable
Crossover Cable
The crossover cable can be used to connect: Switch to Switch Hub to Hub Host to Host Hub to Switch Router direct to Host Router to Router
Crossover Cable
Crossover Cable
Crossover Cable
Rolled Cable
The Rolled cable is used to connect: Host to Router Console* Host to Switch Console*
Router or switch Console is a special port used for configuring and managing the Router / switch
Rolled Cable
Hubs
is a Layer 1 device Is a physical layer device is referred to as an Ethernet concentrator or a multi-port repeater regenerate data signals which allows networks to be extended to greater distances do not make any decisions when data signals are received no examination of the frame is performed and no forwarding decisions are made. Hubs exist within a single collision domain Hubs exist within a single broadcast domain
Attenuation
limits
the distance that a LAN can cover; the signal weakens as it travels through the network; due to the resistance in the cable or medium through which the signal travels causes the loss of signal strength
Repeaters
is a Layer 1 device Is a physical layer device Repeaters are the most basic form of forwarding devices. Repeaters dont see the contents of headers Do not make any decisions when data signals are received They simply amplify electrical signals. A repeater receives a frame, regenerates an exact copy of the frame, and forwards it along its way Repeaters are primarily used to extend the maximum length of a cable run Repeaters exist within a single collision domain increase the collision domain size; increase the broadcast domain size.
Switch
is a Layer 2 device
has the intelligence to make forwarding decisions based on MAC addresses contained within transmitted data frames
More efficient use of bandwidth and increased throughput. Divide the Collision Domain Single Broadcast Domain
Bridge
is a Layer 2 device used to divide, or segment, a network collects and selectively pass data frames between two network segments learns the MAC address of devices on each connected segment builds a bridging table forwards or blocks traffic based on bridging table results in smaller collision domains and greater network efficiency do not restrict broadcast traffic
Routers
Makes decisions based on groups of network addresses, or classes; Do not forward broadcasts unless they are programmed to do so; Divide both the collision domains and the broadcast domains; Are the most important devices to regulate traffic on large networks; Enable communication between two computers regardless of location or operating system
Routers
provide connectivity between networks and subnetworks bridges and switches provide segmentation within a single network or subnetwork
OSI
Examples of presentation layer protocols and standards include ASCII, BMP, GIF, JPEG, WAV, AVI, and MPEG.
OSI
PDU Term
TCP/IP
History of TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is an industry standard suite of protocols that is designed for large networks consisting of network segments that are connected by routers.
TCP/IP is the protocol that is used on the Internet, which is the collection of thousands of networks worldwide that connect research facilities, universities, libraries, government agencies, private companies, and individuals.
TCP/IP
The TCP/IP is the results of research conducted by the United States Department of Defense (DoD) Advanced Research Projects Agency (DARPA) in the late 1960s and early 1970s
In 1970, ARPANET hosts started to use Network Control Protocol (NCP), a preliminary form of what would become the Transmission Control Protocol (TCP). In 1972, the Telnet protocol was introduced. Telnet is used for terminal emulation to connect dissimilar systems. In the early 1970s, these systems were different types of mainframe computers.
In 1973, the File Transfer Protocol (FTP) was introduced. FTP is used to exchange files between dissimilar systems.
In 1974, the Transmission Control Protocol (TCP) was specified in detail. TCP replaced NCP and provided enhanced reliable communication services. In 1981, the Internet Protocol (IP) (also known as IP version 4 [IPv4]) was specified in detail. IP provides addressing and routing functions for end-toend delivery.
In 1982, the Defense Communications Agency (DCA) and ARPA established the Transmission Control Protocol (TCP) and Internet Protocol (IP) as the TCP/IP protocol suite. In 1983, ARPANET switched from NCP to TCP/IP. In 1984, the Domain Name System (DNS) was introduced. DNS resolves domain names (such as www.example.com) to IP addresses (such as 192.168.5.18). In 1995, Internet service providers (ISPs) began to offer Internet access to businesses and individuals. In 1996, the Hypertext Transfer Protocol (HTTP) was introduced. The World Wide Web uses HTTP. In 1996, the first set of IP version 6 (IPv6) standards were published.
TCP/IP
The Network Interface layer (also called the Network Access layer) sends TCP/IP packets on the network medium and receives TCP/IP packets off the network medium. TCP/IP was designed to be independent of the network access method, frame format, and medium. Therefore, TCP/IP can be used to communicate across differing network types that use LAN technologiessuch as Ethernet and 802.11 wireless LANand WAN technologiessuch as Frame Relay and Asynchronous Transfer Mode (ATM).
By being independent of any specific network technology, TCP/IP can be adapted to new technologies.
Internet Layer
The Internet layer responsibilities include addressing, packaging, and routing functions. The Internet layer is analogous to the Network layer of the OSI model.
The core protocols for the IPv4 Internet layer consist of the following:
The Address Resolution Protocol (ARP) resolves the Internet layer address to a Network Interface layer address such as a hardware address. The Internet Protocol (IP) is a routable protocol that addresses, routes, fragments, and reassembles packets. The Internet Control Message Protocol (ICMP) reports errors and other information to help you diagnose unsuccessful packet delivery. The Internet Group Management Protocol (IGMP) manages IP multicast groups.
Transport Layer
The Transport layer (also known as the Host-to-Host Transport layer) provides the Application layer with session and datagram communication services. The Transport layer encompasses the responsibilities of the OSI Transport layer. The core protocols of the Transport layer are TCP and UDP.
TCP/UDP
TCP provides a one-to-one, connection-oriented, reliable communications service. TCP establishes connections, sequences and acknowledges packets sent, and recovers packets lost during transmission. UDP provides a one-to-one or one-to-many, connectionless, unreliable communications service. UDP is used when the amount of data to be transferred is small . when an application developer does not want the overhead associated with TCP connections or when the applications or upper-layer protocols provide reliable delivery.
Application Layer
The Application layer allows applications to access the services of the other layers, and it defines the protocols that applications use to exchange data. The most widely known Application layer protocols are http,https,ftp,telnet,DNS,DHCP,SNMP,RIP,SMTP ..
MAC ADDRESS
For Network communications, each machine on the network segment needs a unique MAC address. Media Access Control Also known as hardware address or physical address The hardware devices use MAC address for communication. A MAC address is 48 bits in length and is represented as a hexadecimal number. The first six digits of a MAC address are associated with the vendor, or maker, of the NIC. Each vendor has one or more unique sets of six digits. These first six digits are commonly called the organizationally unique identifier (OUI). For example, Cisco Systemss OUI values is 00-00-0C 00-60-08 belong to 3Com corporation
http://www.coffer.com/mac_find
IP Address
An IP address is a numeric identifier assigned to each machine on an IP network. An IP address consists of 32 bits of information. These bits are divided into four sections,referred to as octets or bytes, each containing 1 byte An IP address is a logical or software address Size is 32 bit /4 Byte(IPv4) A system can have one or more IP address irrespective of no. of NIC
32 bit/4 Byte IP Address Software Address Network layer Layer 3 Used by software Multiple IP address can be assigned to PC Can be changed Normally stored in hard disk ex: 210.212.51.19
48 bit/6 Byte MAC Address Hardware Address Data Link Layer Layer 2 Used by hardware MAC address depends on no. of network adapter Cannot be changed Burned in NIC s ROM ex: 00-53-45-00-00-00
Physical Address
IP Address
You can depict an IP address using one of three methods: Dotted-decimal, as in 172.16.30.56 Binary, as in 10101100.00010000.00011110.00111000 Hexadecimal, as in AC.10.1E.38
IP Address
The network address uniquely identifies each network. In the IP address 172.16.30.56, for example, 172.16 is the network address.
The node address (Host address) is assigned to, and uniquely identifies, In the sample IP address 172.16.30.56, the 30.56 is the node address.
IP Address Classes
Class Class Class Class Class
A B C D E
IP Address Classes
C
D
E 11110
8 bits
*127 is reserved for loopback interface 255 is a reserved for broadcasting purposes
Class A IP address
1st octet = network address, octets 2-4 = host address 1st bits of 1st octet set to 0 up to (2^24 - 2) host addresses (16.8M)
Class B IP address
1st 2 octets = network address, octets 3-4 = host address 1st 2 bits of 1st octet set to 10 up to (2^16 - 2) host addresses (65534)
Class C IP address
1st 3 octets = network address, octet 4 = host address 1st 3 bits of 1st octet set to 110 up to (2^8 - 2) host addresses (254)
Private IP Addresses
Class A: 10.0.0.010.255.255.255 (1 Class A network) Class B: 172.16.0.0172.31.255.255 (16 Class B networks) Class C: 192.168.0.0192.168.255.255 (256 Class C networks)
???????
180.92.169.169
Public IP Addresses
Synonymous terms for public addresses are registered, routable, external, legal, non-reusable, global, and globally unique addresses
Private IP Addresses
Synonymous terms for private addresses are non-routable, internal, local, reusable, illegal, and unregistered.
Types of IP address
Static IP address
Manually configured by network administrator manageable for small networks requires careful checks to avoid duplication (IP conflicts)
assigned by server when host boots derived automatically from a range of addresses duration of lease negotiated, then address released back to server
IANA
The Internet Assigned Numbers Authority (IANA) is ultimately responsible for handing out and managing public addresses The Internet Assigned Numbers Authority (IANA) is responsible for the global coordination of the DNS Root, IP addressing, and other Internet protocol resource IANA coordinates the global pool of IP and AS numbers, providing them to Regional Internet Registries.
IANA
Users are assigned IP addresses by Internet service providers (ISPs). ISPs obtain allocations of IP addresses from a local Internet registry (LIR) or National Internet Registry (NIR), or from their appropriate Regional Internet Registry (RIR)
Normally we get public addresses directly from ISP, which, in turn, requests them from one of five upstream address registries: American Registry for Internet Numbers (ARIN) Reseaux IP Europeans Network Coordination Center (RIPE NCC) Asia Pacific Registry for Internet Numbers (APNIC) Latin American and Caribbean Internet Address Registry (LACNIC) African Network Information Centre (AfriNIC)
hostname ipconfig/ ifconfig / winipcfg arp ping tracert/traceroute pathping netstat getmac nslookup
hostname
Running the command would display the hostname for the computer
ipconfig Displays the current TCP/IP configuration and information on windows NT/2000/XP/2003/Vista/2008 winipcfg Displays the current TCP/IP configuration and information on windows 95/98 ifconfig Displays the current TCP/IP configuration and information on UNIX, Linux machine
Also used to manage DHCP configuration and the DNS client resolver cache.
ARP
A protocol that obtains the MAC address of a host and then creates a local database that maps the MAC address to the host's IP address. This database that lists the MAC and IP addresses is called an ARP table. Also used for adding static arp entry Allows you to view and edit the Address Resolution Protocol (ARP) cache. The ARP cache maps IPv4 addresses to media access control (MAC) addresses.
PING
A utility that is used to verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network. Simply to determine if a host is responding. PING uses ICMP to send echo request and echo reply messages that determine the validity of an IP address
tracert/traceroute
Tracert (Windows) Traceroute (Linux/Unix) show the route taken by packets across an IP network Determines the path taken to a destination by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination with incrementally increasing Time to Live (TTL) field values
pathping
Traces the route that an IPv4 or IPv6 packet takes to a destination and displays information on packet losses for each router and subnet in the path.
netstat
A utility used to display TCP/IP statistics and details about TCP/IP components and connections on a host. Information that can be obtained from the netstat command include: the port on which a particular TCP/IP service is running, whether or not a remote node is logged into a host, which network connections are currently established for a client, how many packets have been handled by a network interface since it was activated, and how many data errors have occurred on a particular network interface
getmac
Returns the media access control (MAC) address and list of network protocols associated with each address for all network cards in each computer, either locally or across a network.
NSLOOKUP
This utility allows you to query the DNS database from any computer on the network. You can find the DNS host name of a device by specifying its IP address, or vice versa. This utility is useful for verifying that a host is configured correctly or for troubleshooting DNS resolution problems
Troubleshooting IP Addressing
Open a DOS window and ping 127.0.0.1 This is the diagnostic or loopback address, and if you get a successful ping, your IP stack is then considered to be initialized. If it fails, then you have an IP stack failure and need to reinstall TCP/IP on the host.
Troubleshooting IP Addressing
From the DOS window, ping the IP address of the local host. If thats successful, then your Network Interface Card (NIC) card is functioning. If it fails, then there is a problem with the NIC card. This doesnt mean that a cable is plugged into the NIC, only that the IP protocol stack on the host can communicate to the NIC.
Troubleshooting IP Addressing
From the DOS window, ping the default gateway (router). If the ping works, it means that the NIC is plugged into the network and can communicate on the local network. If it fails, then you have a local physical network problem that could be happening anywhere from the NIC to the router.
NetBIOS Names
A NetBIOS name is a 16-byte name that identifies a NetBIOS application on the network. A NetBIOS name is either a unique or group name. When a NetBIOS application communicates with a specific NetBIOS application on a specific computer, a unique name is used. When a NetBIOS process communicates with multiple NetBIOS applications on multiple computers, a group name is used.