Академический Документы
Профессиональный Документы
Культура Документы
LAN:
WAN stands for Wide Area Network. A WAN may be spread across
several cities, states, and countries. WANs normally use public
switched networks, and telecom lines to communicate across
boundaries.
WAN vs LAN:
Hosts:
Workstations:
Servers:
File Server: A file server stores, and distributes files over the network
to work stations.
Print Server: A print server will have one or more printers attached
either directly or indirectly (through network), and are managed by the
print server. Typically, print requests from work stations go to the print
server, and the print server manages the print job for the work station.
Now, with the advent of Network Printers, the need for a separate
server computer for print services is diminishing.
Web Server: A Web Server holds and delivers web pages and other
web contents using HTTP, and other web based protocols.
Mail Server: A Mail Server is responsible for storing all incoming and
outgoing emails. It also receives and delivers individual emails to
respective work stations. The work stations normally use email client
software to communicate with the Mail Server.
Fax Server: Sends and receives faxes for the entire network without
the need for paper.
Client/Server Network:
Peer-to-Peer Network:
o Bus Topology
o Star Topology
o Ring Topology
o Mesh Topology
Bus Topology:
Star Topology:
Ring Topology:
Mesh Topology:
o Coaxial
o Twisted Pair
o Fiber Optic
o Wireless
Coaxial cable:
Note that this is for a typical coax (short for co-axial) cable and
available in different varieties. Most popular are RG-8, and RG-58
cables.
The 10Base5 topology uses an external transceiver to attach to the network interface card.
The NIC attaches to the external transceiver by an AUI cable to the DIX connector on the
card. Vampire tap, standard BNC, or N-series barrel connectors are used for connecting
the transceiver to thicknet cable. Each network segment must be terminated with
matching impedence at both ends.
2. Uses stranded
center conductor.
10Base5 Thicknet RG-8 1. 50 Ohm cable.
Twisted-Pair Cable:
Fiber-Optic Connector:
o The gateway
The Network Interface Card (NIC) used connect the computer to the
external network. It will normally have a PCI connector (Edge
connector) to connect to one of the PC expansion slots, and an RJ-45
connector to connect to external Ethernet. Note that the interface
connectors may differ depending upon the expansion bus being used
(for example, PCI, ISA, EISA, USB etc.), and the networking media being
used (for example, 10Base2, 10Base5, 10BaseT, etc.). Each of these
have their own interface specifications. Almost all NICs have LED
indicators showing the network connectivity.
Hub:
A Hub connects all the nodes of a network using Twisted Pair (UTP
or STP) cables. In a Hub, the signals received on one port are
transmitted to all other ports, and vice versa. All nodes (work stations)
connected using a Hub can listen to one another all the time. The
advantage of using a Hub is low cost, and easy integration. The
disadvantage is reduced bandwidth, and data security. The reduction
in bandwidth comes due to the fact that all workstations are in the
same collision domain. If two or more workstations try to transmit
during the same time, it results in collision of signals, and the signals
are lost altogether. As a result, the available bandwidth of the Ethernet
network is reduced.
48-port Switch
Bridge:
Transceivers:
Router:
Router
Gateways:
Gateways are the most complex devices with respect to the
functionality. They typically work at the upper most layers of OSI
model. A gateway is used to connect two different environments, such
as a Frame-Relay network and an X.25 network.
• Modems
• ISDN terminal adapters
• CSU/DSU
Modems:
CSU/DSU:
• Application
• Presentation
• Session
• Transport
• Network
• Data Link
• Physical
1 Application layer:
This layer provides a means for the user to access information on the network
through an application. Many user applications that need to communicate over the
network interact with the Application layer protocol directly. The user applications are
not part of OSI Application layer, use the networking services offered by the networking
protocol suite. Application layer functions typically include identifying communication
partners, and determining availability of required resources. Some examples of
application layer implementations include Telnet, File Transfer Protocol (FTP), and
Simple Mail Transfer Protocol (SMTP).
2 Presentation layer:
Presentation layer converts local host computer data representations into a
standard network format for transmission on the network. On the receiving side, it
changes the network format into the appropriate host computer's format so that data can
be utilized independent of the host computer. ASCII and EBCDIC conversions,
cryptography, and the like are handled here.
Examples of Presentation layer coding and conversion schemes include common
data representation formats, conversion of character representation formats, common data
compression schemes, and common data encryption schemes.
Presentation layer implementations are not typically associated with a particular
protocol stack. Some well-known standards for video include QuickTime and Motion
Picture Experts Group (MPEG). QuickTime is an Apple Computer specification for video
and audio, and MPEG is a standard for video compression and coding.
3. Session layer:
4. Transport layer:
Transport layer is responsible for providing reliable service between the hosts.
Upper layer datagrams are broken down into manageable datagrams and then appropriate
header information (such as sequence number, port number, etc.) is added to the
datagram before passing it on to the Network layer. Two frequently used transport
protocols are the TCP (Transmission Control Protocol) and the UDP (User Datagram
Protocol).
5 . Network layer:
Network layer is responsible for the routing of packets through the entire network.
The layer uses logical addressing for this purpose. Note that the physical address (like
MAC address) keeps changing from hop to hop when a packet travels from source to
destination. As a result, an address that doesn't change is required to ensure continuity
between hops. This is nothing but logical address. For IP networks, IP address is the
logical address; and for Novell network, IPX address is the logical address, and so on.
This layer also provides for congestion control, and accounting information for the
network. IP (Internet Protocol) is an example of a network layer protocol.
• Assembles bits into frames, making them ready for transmission over the
network.
• Provides error detection, and correction to transmitted frames. If the checksum is
not correct, it asks for retransmission. (Send a control message).
• Consists of two sub layers:
1. Logical Link Control (LLC): Defines how data is transferred over the
cable and provides data link service to the higher layers.
2. Medium Access Control (MAC): Controls media access by regulating the
communicating nodes using pre-defined set of rules. (i.e. Token passing,
Ethernet [CSMA/CD] all have MAC sub-layer protocol).
Different Data link layer protocols define different network and protocol
characteristics, including physical addressing, network topology, error notification,
sequencing of frames, and flow control. Physical addressing (as opposed to logical
addressing) defines how devices are addressed at the data link layer. The protocols used
in Data link layer are SLIP, PPP, and CSLP.
7. Physical layer:
This is the bottom-most layer of the OSI model. The Physical layer handles the
bit-level communications across the physical medium. The physical medium could be
made up of wired electrical signals, or light, or radio (wireless) signals. Physical layer
specifications define characteristics such as media, data rates, maximum transmission
distances, and physical connectors.
Some of the important standards that deal with physical layer specifications are:
RS-232(for serial communication lines), X.21, EIA 232, and G730.
Physical layer and Data link layer implementations can be categorized as either LAN or
WAN specifications.
MM-MM-MM-SS-SS-SS
The first half of a MAC address contains the ID number assigned to the adapter
manufacturer.
The second half of a MAC address is the serial number assigned to the adapter by the
manufacturer.
You can find the MAC address on your computer by typing "ipconfig
/all" at the command prompt of a Windows OS computer.
In the figure above, the value 00-C1-26-0D-DE-C9 represents the MAC address of the
host named "system". Whichever higher layer protocol you use, the MAC address
remains the same. In the MAC address given, 00-C1-26 is NIC manufacturer ID, and 0D-
DE-C9 is the serial number given to the adapter by the manufacturer.
2.3 Subnetting
Public networks are those that comply with regional government regulations, and
protocol standards. These are normally open to Corporates and general public for use.
One example of a public network is the Telcos that operate telephone network. Another
example of public data network is the Internet.
Public IP networks should use valid IP address range, whereas private networks may use
private/public ip address range. By using a public address range, a Company may
seamlessly integrate the Corporate network with public network. However, by using
private address range, it is possible to integrate with public network by using proxy
servers. A proxy server translates IP addresses according to a given set of rules.
Application Protocols:
The Application Protocol are built on the top of TCP/IP protocol suite.
The list of protocol include the following:
FTP is a Client Server protocol, used for copying files between an FTP
server and a client computer over a TCP/IP network. FTP is commonly
used to communicate with web servers to upload or download files.
FTP, the File Transfer Protocol, documented in RFC 959, is one of oldest
Internet protocols still in widespread use. FTP uses TCP protocol for
communication, and capable of transferring both binary files and text
files. Some popular FTP clients include FileZilla, and cuteFTP.
ARP Utility:
NETSTAT utility:
TRACERT Utility:
The tracert utility finds the route from the computer to any computer
on a network.
Ping Utility:
A ping response is shown in the figure above. Note that the local host is always resolved
to IP address 127.0.0.1. The example ping command given in the figure ensures that the
local host is reachable.
FTP utility:
The ftp utility allows reliably downloading and uploading files from and
to an FTP server across the Internet.
A typical FTP login screen is shown in the figure above. You can login to wayne.edu
anonymously, using username "anonymous", and any password. This is possible only
because wayne allows anonymous login.
Alternatively, you can also use your browser window to ftp to a site. In such case, you
need to use the qualified address ftp://ftp.wayne.edu.
winipcfg utility:
• It is a multi-user multi tasking: Several users can use the OS/NOS simultaneously
for running single or multiple tasks.
• Data, directory, process, hard disk etc are treated as a file. This is sometimes
confusing to those familiar with Windows OS, where devices are treated
separately from files and folders.
• The directories are in a hierarchical structure. The "Top" directory is “/”, which is
called slash or root.
• Every user will have his own directory, called home directory.
• UNIX/Linux uses standard TCP/IP protocol for communications
and network services.
• Unlike Windows, Unix is case-sensitive. For example, a file named Mydata.txt is
different from a file named mydata.txt.
Netware:
Macintosh:
Windows Server uses the same interface and, to some extent, the
same software as the desktop Windows versions. Earlier versions of
Windows did not support Networking. Now, ofcourse, all Windows OSes
support networking. Given below are the Windows OSes that support
networking:
• Windows 95
• Windows 98 and Windows 98 Second Edition
• Windows Millenium
• (ME)Windows NT
• Windows 2000
• Windows XP
• Windows 2000 Server
• Windows 2003 Server
1. Terminal Services
3. Security Services
• Kerberos Authentication
• Public Key Infrastructure (PKI)
• Network Access Protection
• Security Configuration Wizard
4. Networking and Access Technologies
3.2 Firewalls
A firewall is a device (sometimes it could be a system) that prevents
un-authorized access to a network from external sources. For example,
any network that is connected directly to the Internet need some kind
of firewall to protect the entire network from potential intrusions from
the Internet.
A "Firewall" may be implemented using one or more of the following
technologies:
• Proxy Server
• Network Address Translator (NAT)
• Packet filtering
• Access Control Lists (ACLs)
• DMZ
Sl. No. Firewall technology OSI layer at which the firewall operates
1. Proxy service Layer 7
2. Packet Filtering Layers 3 and 4
3. Stateful inspection Layers 2,3, and 4
Proxy servers:
• Static NAT
• Dynamic NAT
Packet Filtering:
• Source IP address
• Destination IP address
• TCP/UDP source port
• TCP/UDP destination port
3.3 VLANs
Using traditional LAN segmentation, all the segments will be in the
same broadcast domain. This effectively, reduces the efficiency of the
network. A traditional LAN segmentation is shown below.
VLANs: Using VLANs, the broadcast domain gets divided into the
number of VLANs. If there are three VLANs, as shown in the figure, the
broadcast domain will be split into three.
Figure 2: Segmentation using VLANs
o Mirroring
o Duplexing
o Data Striping
Disk Mirroring:
Disk Duplexing:
Duplexing also saves data to a mirror drive; the only major
difference between duplexing and mirroring is that duplexing uses two
separate controllers. Hence duplexing not only provides redundant disk
but also redundant controller. Duplexing provides fault tolerance even
if a controller fails.
Disk Striping:
Disk striping breaks up the data that are to be saved to the disk
into small portions and sequentially writes the portions to all disks
simultaneously in small areas called strips. These strips maximize
performance because all of the read/write heads are working
constantly.
Disk Striping
RAID: (Redundant Array of Inexpensive Disks)
RAID 0:
The RAID 0 is the commonly used disk. This method is the fastest
because all read/write heads are constantly being used without the
burden of parity or duplicate data being written. This RAID level
improves the performance; it does not provide fault tolerance.
RAID 1:
This is also commonly used disk. This level uses hard disks, one
mirrored to the other. RAID 1 is the most basic level of disk fault
tolerance. If the first hard disk fails, the second hard disk automatically
takes over. The parity or error-checking information is not stored.
Rather the drives have duplicate information. If both the drives fail a
new drive must be installed and configured. This level provides fault
tolerance.
RAID 2:
In this level individual bits are stripped across multiple disks. Multiple
redundancy drives in this configuration are dedicated to storing error-
correcting code.
RAID 3:
At this level data is striped across multiple hard drives using a parity
drive. The data are striped in bytes and not in bits as of RAID 2. This
configuration is popular because more data is written and read in one
operation that increases overall disk performance.
RAID 4:
RAID 5:
This level is commonly used; at this level the data and parity are
striped across three or more drives. This allows fast reads and writes.
This works well if one disk fails.
RAID 6:
Backup Types:
o Full
o Differential
o Incremental
Full backup:
Incremental backup:
An incremental backup stores all files that have changed since the
last Full, Differential, or Incremental backup. The chief advantage of an
incremental backup is that it takes the least time to complete, and
requires less storage space. However, during a restore operation, you
need to process each incremental back for complete restoration. This
could result in a lengthy restoration time compared to Full and/or
Differential backups.
Differential backup:
A differential backup contains all files that have changed since the
last full backup. The advantage of a differential backup is that it
shortens the backup and restore time compared to a full backup and
incremental backup.
The rotating backup tapes is the easiest way to manage a tape backup
scheme. Some of the rotations are,
Weekly Rotation:
Weekly Rotations are the simplest one. A tape is assigned to each
weekday and labeled with the name of the day. There will be five tapes
and each tapes are overwritten as the day of the week comes again.
Monthly Rotation:
Yearly Rotation:
Yearly backup can be build on top of the monthly system. The tapes
needed are 12, one for each month, labeled with the names of the
months.
Grandfather-Father-Son Rotation:
Virus Protection:
File viruses
Macro viruses
• On-demand
• On-access
• Establish symptoms.
• Identify the affected area.
• Establish what has changed.
• Select the most probable cause.
• Implement a solution.
• Test the result.
• Recognize the potential effects of the solution.
• Document the solution.
The next step is to determine what has changed. In this step also
self questions are asked and the changes are determined.
After the problem is observed and the cause is isolated, the next
step is to select the most probable cause for the problem. This
gets easier with time and experience.
After the changes are made the testing should be done on the
solution to find it it solves the problem. The user repeats the
operation that previously did not work, if it works the problem is
solved if not the steps 4,5 and 6 are to be redone.
Log Files:
The log files can indicate the general health of a server; log files
contain a running list of all errors, their description, the time and date
they occurred and other information.
This log file keeps a history of all errors that have occurred
and information that has been displayed on the server’s
console. It is located in the SYS:\ETC directory on the
server.
The server log file lists any errors that occur on the server,
including Abends and NDS errors, time and date that has
occurred.
§ Information
§ Warning
§ Error
o README files
o Telephone support
This file contains the latest information released about the software.
Tips, default settings and installation information are also found in the
file.
Telephone support:
o A crossover cable
o A hardware loopback
o A tone generator
o A tone locator
The standard Ethernet UTP crossover cable used in both situations has
its transmit and receive wire pairs crossed so that the transmit set on
one side is connected to the receive set on the other. In the following
figure four of the wires are crossed pin 2 & 3 connect to pin 4 & 6 and
pin 4 & 6 connect to pin 2 & 3.
Standard Ethernet 10Base-T crossover cable
o Protocol analyzers
o Performance-monitoring tools
Protocol Analyzer:
Performance-Monitoring Tools:
4.1 Repeaters:
As signals travel along a network cable (or any other medium of transmission), they degrade and
become distorted in a process that is called attenuation. If a cable is long enough, the attenuation
will finally make a signal unrecognizable by the receiver.
A Repeater enables signals to travel longer distances over a network. Repeaters work at the
OSI's Physical layer. A repeater regenerates the received signals and then retransmits the
regenerated (or conditioned) signals on other segments.
To pass data through the repeater in a usable fashion from one segment to the next, the packets
and the Logical Link Control (LLC) protocols must be the same on the each segment. This means
that a repeater will not enable communication, for example, between an 802.3 segment
(Ethernet) and an 802.5 segment (Token Ring). That is, they cannot translate an Ethernet packet
into a Token Ring packet. In other words, repeaters do not translate anything.
4.2 Bridges:
Like a repeater, a bridge can join segments or workgroup LANs. However, a bridge can also
divide a network to isolate traffic or problems. For example, if the volume of traffic from one or two
computers or a single department is flooding the network with data and slowing down entire
operation, a bridge can isolate those computers or that department.
In the following figure, a bridge is used to connect two segment segment 1 and segment 2.
Bridges simply pass all protocols along the network. Because all protocols pass across the
bridges, it is up to the individual computers to determine which protocols they can recognize.
A bridge works on the principle that each network node has its own address. A bridge forwards
the packets based on the address of the particular destination node.
As traffic passes through the bridge, information about the computer addresses is then stored in
the bridge's RAM. The bridge will then use this RAM to build a routing table based on source
addresses.
4.3 Routers:
Routers work at the Network layer of the OSI model meaning that the Routers can switc h and
route packets across multiple networks. They do this by exchanging protocol-specific information
between separate networks. Routers have access to more information in packets than bridges,
and use this information to improve packet deliveries. Routers are usually used in a complex
network situation because they provide better traffic management than bridges and do not pass
broadcast traffic.
Routers can share status and routing information with one another and use this information to
bypass slow or malfunctioning connections.
Routers do not look at the destination node address; they only look at the network address.
Routers will only pass the information if the network address is known. This ability to control the
data passing through the router reduces the amount of traffic between networks and allows
routers to use these links more efficiently than
bridges
4.4 Gateways:
Gateways make communication possible between different architectures and environments. They
repackage and convert data going from one environment to another so that each environment
can understand the other's environment data.
• Communication protocols
• Data formatting structures
• Languages
• Architecture
For example, electronic mail gateways, such as X.400 gateway, receive messages in one format,
and then translate it, and forward in X.400 format used by the receiver, and vice versa.
To process the data, the gateway:
· Decapsulates incoming data through the networks complete protocol stack. Encapsulates the
outgoing data in the complete protocol stack of the other network to allow transmission.
A NIC or Network Interface Card is a circuit board or chip, which allows the computer to
communicate to other computers on a Network. This board when connected to a cable or other
method of transferring data such as infrared can share resources, information and computer
hardware. Local or Wide area networks are generally used for large businesses as well as are
beginning to be found in homes as home users begin to have more then one computer. Utilizing
network cards to connect to a network allow users to share data such as companies being able to
have the capability of having a database that can be accessed all at the same time send and
receive e-mail internally within the company or share hardware devices such as printers.
4.6 Connectors:
Network cards have three main types of connectors. Below is an example of what a network card
may look like.
4.6.1 BNC connector: As illustrated in the above picture the BNC connector is a round connector,
which is used for thin net or 10Base-2 Local Area Network.
4.6.2 DB9 (RJ45 JACK): The DB9 connector not to be confused with the Serial Port or
sometimes referred to as the RJ45 JACK not to be confused with the RJ45 connection is used
with Token Ring networks.
4.6.3 DB15 Connector: The DB15 connector is used for a Thick net or 10Base-5 Local area
network.
4.6.4 RJ45 connector: Today one of the most popular types of connections used with computer
networks. RJ45 looks similar to a phone connector or RJ11 connector however is slightly larger.
LED -The LED's as shown in the above illustration indicates if it detects a network generally by a
green light which may flash as it communicates and then a red light which indicates collisions
which will generally flash or not flash at all.
4.7 Cables
The following is a few examples of some of the more commonly used types of cables found with
networks.
As illustrated in the above picture you can see three of the main types of cable used today. The
first two pictures illustrate Unshielded and Shielded twisted pair cables. Unshielded twisted-pair
cable is generally found in phone cables today and are used more often then shielded twisted
pair today as it has been found that simply twisting the cable provides more efficient means of
protection against interference. In addition shielded twisted-pair cable required the one end of the
cable to be grounded. If both ends were to be grounded however this would cause a grounding
loop causing low voltage and infinite amperage and various other hazards to the network.
The third picture in the above illustration shows a coaxial cable, which are the most commonly
used and known types of cables. This cable can be found for cable TV and when used with
networks utilize the BNC connector.
As illustrated in the above picture you can see three of the main types of cable used today. The
first two pictures illustrate Unshielded and Shielded twisted pair cables. Unshielded twisted-pair
cable is generally found in phone cables today and are used more often then shielded twisted
pair today as it has been found that simply twisting the cable provides more efficient means of
protection against interference. In addition shielded twisted-pair cable required the one end of the
cable to be grounded. If both ends were to be grounded however this would cause a grounding
loop causing low voltage and infinite amperage and various other hazards to the network.
The third picture in the above illustration shows a coaxial cable, which are the most commonly
used and known types of cables. This cable can be found for cable TV and when used with
networks utilize the BNC connector.