Академический Документы
Профессиональный Документы
Культура Документы
net/
Star networks are one of the most common computer network topologies. In its
simplest form, a star network consists of one central switch, hub or computer
which acts as a router to transmit messages. If the central node is passive, the
originating node must be able to tolerate the reception of an echo of its own
transmission, delayed by the two-way transmission time (i.e. to and from the
central node) plus any delay generated in the central node. An active star
network has an active central node that usually has the means to prevent echo-
related problems.
The star topology reduces the chance of network failure by connecting all of the
systems to a central node. When applied to a bus-based network, this central
hub rebroadcasts all transmissions received from any peripheral node to all
peripheral nodes on the network, sometimes including the originating node. All
peripheral nodes may thus communicate with all others by transmitting to, and
receiving from, the central node only. The failure of a transmission line linking
any peripheral node to the central node will result in the isolation of that
peripheral node from all others, but the rest of the systems will be unaffected.
Advantages of a Star Network
• Good performance.
• Easy to set up and to expand.
• Any non-centralised failure will have very little effect on the network,
whereas on a ring network it would all fail with one fault.
• Easy to detect faults
• Data Packets are sent quickly as they do not have to travel through any
unnecessary nodes.
• Expensive to install
• Extra hardware required
• If the host computer fails the entire system is affected.
Hierarchical Topology (also known as Tree)
The type of network topology in which a central 'root' node (the top level of the
hierarchy) is connected to one or more other nodes that are one level lower in
the hierarchy (i.e., the second level) with a point-to-point link between each of
the second level nodes and the top level central 'root' node, while each of the
second level nodes that are connected to the top level central 'root' node will
also have one or more other nodes that are one level lower in the hierarchy
(i.e., the third level) connected to it, also with a point-to-point link, the top level
central 'root' node being the only node that has no other node above it in the
hierarchy – the hierarchy of the tree is symmetrical, each node in the network
having a specific fixed number, f, of nodes connected to it at the next lower
level in the hierarchy, the number, f, being referred to as the 'branching factor'
of the hierarchical tree.
Notes:
1.) A network that is based upon the physical hierarchical topology must have
at least three levels in the hierarchy of the tree, since a network with a central
'root' node and only one hierarchical level below it would exhibit the physical
topology of a star.
2.) A network that is based upon the physical hierarchical topology and with a
branching factor of 1 would be classified as a physical linear topology.
3.) The branching factor, f, is independent of the total number of nodes in the
network and, therefore, if the nodes in the network require ports for connection
to other nodes the total number of ports per node may be kept low even though
the total number of nodes is large – this makes the effect of the cost of adding
ports to each node totally dependent upon the branching factor and may
therefore be kept as low as required without any effect upon the total number of
nodes that are possible.
4.) The total number of point-to-point links in a network that is based upon the
physical hierarchical topology will be one less that the total number of nodes in
the network.
5.) If the nodes in a network that is based upon the physical hierarchical
topology are required to perform any processing upon the data that is
transmitted between nodes in the network, the nodes that are at higher levels in
the hierarchy will be required to perform more processing operations on behalf
of other nodes than the nodes that are lower in the hierarchy.
Bus Topology
In bus topologies, all computers are connected to a single cable or "trunk or
backbone", by a transceiver either directly or by using a short drop cable. All
ends of the cable must be terminated, that is plugged into a device such as a
computer or terminator. Most bus topologies use coax cables.
The number of computers on a bus network will affect network performance,
since only one computer at a time can send data, the more computers you
have on the network the more computers there will be waiting send data. A line
break at any point along the trunk cable will result in total network failure.
Computers on a bus only listen for data being sent they do not move data from
one computer to the next, this is called passive topology.
Advantages
Disadvantages
• Difficult to administer/troubleshoot.
• Limited cable length and number of stations.
• If there is a problem with the cable, the entire network goes down.
• Maintenance costs may be higher in the long run.
• Performance degrades as additional computers are added or on heavy
traffic.
• Low security (all computers on the bus can see all data transmissions).
• Proper termination is required.(loop must be in closed path).
• If one node fails, the whole network will shut down.
• If many computers are attached, the amount of data flowing causes the
network to slow down.
MeshTopology
A Mesh topology Provides each device with a point-to-point connection to every
other device in the network. These are most commonly used in WAN's, which
connect networks over telecommunication links. Mesh topologies use routers to
determine the best path.
Mesh networks provide redundancy, in the event of a link failure, meshed
networks enable data to be routed through any other site connected to the
network. Because each device has a point-to-point connection to every other
device, mesh topologies are the most expensive and difficult to maintain.
Mesh networks differ from other networks in that the component parts can all
connect to each other via multiple hops, and they generally are not mobile.
Mobile ad-hoc networking (MANET), featured in many consumer devices, is a
subsection of mesh networking.
Mesh networks are self-healing: the network can still operate even when a
node breaks down or a connection goes bad. As a result, a very reliable
network is formed. This concept is applicable to wireless networks, wired
networks, and software interaction.
There are three distinct generations of wireless mesh architectures. In the first
generation one radio provides both backhaul (packet relaying) and client
services (access to a laptop). In the second generation, one radio relayed
packets over multiple hops while another provided client access. This
significantly improved backhaul bandwidth and latency. Third generation
wireless mesh products use two or more radios for the backhaul for higher
bandwidth and low latency. Third generation mesh products are replacing
previous generation products as more demanding applications like voice and
video need to be relayed wirelessly over many hops of the mesh network.
Ring
Disadvantages
• Because all stations are wired together, to add a station you must shut
down the network temporarily.
• It is difficult to troubleshoot the ring.
• Data packets must pass through every computer between the sender
and recipient Therefore this makes it slower.
• If any of the nodes fail then the ring is broken and data cannot be
transmitted successfully.
Wireless
A wireless network consists of wireless NICs and access points. NICs
come in different models including PC Card, ISA, PCI, etc. Access
points act as wireless hubs to link multiple wireless NICs into a single
subnet. Access points also have at least one fixed Ethernet port to
allow the wireless network to be bridged to a traditional wired Ethernet
network, such as the organization’s network infrastructure. Wireless
and wired devices can coexist on the same network.
1.2 Specify the main features of 802.2 (Logical Link Control), 802.3
(Ethernet), 802.5 (token ring), 802.11 (wireless), and FDDI (Fiber
Distributed Data Interface) networking technologies, including:
> 802.3 (Ethernet) Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) LAN Ethernet
Access method
100BASE-
TX
1.4 Recognize the following media connectors and describe their uses:
RJ-45 The "RJ" stands for Registered Jack. These connectors are used
with 10-100BaseT cables, and resemble telephone RJ-11 connectors,
but are larger. They are connected to the cable by crimping.
Used for Ethernet cable connectors, where usually 8 pins (4 pairs) are
used, e.g., a male-to-male cable to connect a cable or ADSL modem to
the computer Ethernet network card. Applications include other
networking services such as ISDN and T1.
8 4 2 brown
> F-Type
USB 2.0 is fully compatible with USB 1.1 and uses the same cables and
connectors.
USB has with two connector types. The first is Type A (on the right),
This connector connects to the PC's USB port.
The Type B (on the left) connector and is for connecting to the
relevant peripheral.
Where as the type A connector is truly standard, the Type B connector
could be changed in size etc. with individual peripherals meaning they
require there own unique cables.
> Coaxial Connectors
BNC connector for coaxial cables. These are either
soldered, or crimped to the end of the cable.
1.5 Recognize the following media types and describe their uses:
1.6 Identify the purposes, features and functions of the following network
components:
> Hubs
A hub or concentrator is a device used to connect all of the computers
on a star or ring network. A hub, is nothing more than a box with a
series of cable connectors in it. Hubs are available in a variety of sizes,
from four- and five-port devices designed for home and small business
networks to large rack-mounted units with up to 24 ports or more.
Installing a single hub is simply a matter of connecting it to a power
source and plugging in cables connected to the network interface
adapters in your computers. However, it's important for a network
technician to understand what goes on inside a hub.
Like network interface adapters, hubs are associated with specific
data-link layer protocols. Ethernet hubs are the most common,
because Ethernet is the most popular data-link layer protocol, but
Token Ring MAUs are hubs too, and other protocols, such as the Fiber
Distributed Data Interface (FDDI) also use hubs.
Small
Stackable hubs Hub
Wireless Network
Interface Card
Network Interface
Card
Every networked computer must also have a network adapter driver,
which controls the network adapter. Each network adapter driver is
configured to run with a certain type of network adapter.
A networked computer must also have one or more protocol drivers
(sometimes called a transport protocol or just a protocol). The protocol
driver works between the upper-level network software and the
network adapter to package data to be sent on the network.
In most cases, for two computers to communicate on a network, they
must use identical protocols. Sometimes, a computer is configured to
use multiple protocols. In this case, two computers need only one
protocol in common to communicate. For example, a computer running
File and Printer Sharing for Microsoft Networks that uses both NetBEUI
and TCP/IP can communicate with computers using only NetBEUI or
TCP/IP.
> ISDN (Integrated Services Digital Network) adapters
Integrated Services Digital Network adapters can be used to send
voice, data, audio, or video over standard telephone cabling. ISDN
adapters must be connected directly to a digital telephone network.
ISDN adapters are not actually modems, since they neither modulate
nor demodulate the digital ISDN signal.
Like standard modems, ISDN adapters are available both as internal
devices that connect directly to a computer's expansion bus and as
external devices that connect to one of a computer's serial or parallel
ports. ISDN can provide data throughput rates from 56 Kbps to 1.544
Mbps (using a T1 carrier service).
ISDN hardware requires a NT (network termination) device, which
converts network data signals into the signaling protocols used by
ISDN. Some times, the NT interface is included, or integrated, with
ISDN adapters and ISDN-compatible routers. In other cases, an NT
device separate from the adapter or router must be implemented.
ISDN works at the physical, data link, network, and transport layers of
the OSI Model.
> WAPs (Wireless Access Point)
A wireless network adapter card with a transceiver sometimes called
an access point, broadcasts and receives signals to and from the
surrounding computers and passes back and forth between the
wireless computers and the cabled network.
Access points act as wireless hubs to link multiple wireless NICs into a
single subnet. Access points also have at least one fixed Ethernet port
to allow the wireless network to be bridged to a traditional wired
Ethernet network..
> Modems
A modem is a device that makes it possible for computers to
communicate over telephone lines. The word modem comes from
Modulate and Demodulate. Because standard telephone lines use
analog signals, and computers digital signals, a sending modem must
modulate its digital signals into analog signals. The computers modem
on the receiving end must then demodulate the analog signals into
digital signals.
Modems can be external, connected to the computers serial port by an
RS-232 cable or internal in one of the computers expansion slots.
Modems connect to the phone line using standard telephone RJ-11
connectors.
> Transceivers (media converters)
Transceiver short for transmitter-receiver, a device that both transmits
and receives analog or digital signals. The term is used most
frequently to describe the component in local-area networks (LANs)
that actually applies signals onto the network wire and detects signals
passing through the wire. For many LANs, the transceiver is built into
the network interface card (NIC). Some types of networks, however,
require an external transceiver.
In Ethernet networks, a transceiver is also called a Medium Access Unit
(MAU).
Media converters interconnect different cable types twisted pair, fiber,
and Thin or thick coax, within an existing network. They are often used
to connect newer 100-Mbps, Gigabit Ethernet, or ATM equipment to
existing networks, which are generally 10BASE-T, 100BASE-T, or a
mixture of both. They can also be used in pairs to insert a fiber
segment into copper networks to increase cabling distances and
enhance immunity to electromagnetic interference (EMI).
> Firewalls
In computing, a firewall is a piece of hardware and/or software which
functions in a networked environment to prevent some
communications forbidden by the security policy, analogous to the
function of firewalls in building construction.
A firewall has the basic task of controlling traffic between different
zones of trust. Typical zones of trust include the Internet (a zone with
no trust) and an internal network (a zone with high trust). The
ultimate goal is to provide controlled connectivity between zones of
differing trust levels through the enforcement of a security policy and
connectivity model based on the least privilege principle.
There are three basic types of firewalls depending on:
• stateful firewalls
• stateless firewalls
> Infrared
Infrared (IR) radiation is electromagnetic radiation of a wavelength
longer than that of visible light, but shorter than that of microwave
radiation. The name means "below red" (from the Latin infra, "below"),
red being the color of visible light of longest wavelength.
> Bluetooth
Is an industrial specification for wireless personal area networks
(PANs). Bluetooth provides a way to connect and exchange
information between devices like personal digital assistants (PDAs),
mobile phones, laptops, PCs, printers and digital cameras via a secure,
low-cost, globally available short range radio frequency.
802.11 802.11x Infrared Bluetooth
802.11b >
11 Mbps
802.11g >
54 Mbps
FHSS
1.8 Identify factors which affect the range and speed of wireless service
(For example: interference, antenna type and environmental factors).
> 802.11g
Suffers from the same interference as 802.11b in the already crowded
2.4 GHz range. Devices operating in this range include microwave
ovens, Bluetooth devices, and cordless telephones.
Since the 2.4 GHz band is heavily used, using the 5 GHz band gives
802.11a the advantage of less interference. However, this high carrier
frequency also brings disadvantages. It restricts the use of 802.11a to
almost line of sight, necessitating the use of more access points; it
also means that 802.11a cannot penetrate as far as 802.11b since it is
absorbed more readily, other things (such as power) being equal.
> 802.11a
Transmits radio signals in the frequency range above 5 GHz. This
range is "regulated," meaning that 802.11a gear utilizes frequencies
not used by other commercial wireless products like cordless phones.
In contrast, 802.11b utilizes frequencies in the unregulated 2.4 GHz
range and encounters much more radio interference from other
devices.
> IEEE 802.11a / IEEE 802.11h
This is also a physical layer enhancement. IEEE 802.11a provides
significantly higher performance than 802.11b, at 54 Mbps. Unlike
802.11b, the 802.11a standard operates within the frequency range of
5.47 to 5.725 GHz and is not subject to the same interference from
other commercial electronic products. This higher frequency band
allows significantly higher speeds of communication over the 2.4 GHz
range.
802.11g APs are backward compatible with 802.11b APs. This
backward compatibility with 802.11b is handled through the MAC
layer, not the physical layer. On the negative side, because 802.11g
operates at the same frequency as 802.11b, it is subject to the same
interferences from electronic devices such as cordless phones. Since
the standard’s approval in June 2003, 802.11g products are gaining
momentum and will most likely become as widespread as 802.11b
products. Table II-1 displays basic 802.11b/a/g characteristics.
The common range of operation for 802.11b is 150 feet for a floor
divided into individual offices by concrete or sheet-rock, about 300 feet
in semi-open indoor spaces such as offices partitioned into individual
workspaces, and about 1000 feet in large open indoor areas.
Disadvantages of 802.11b include interference from electronic
products such as cordless phones and microwave ovens.
Range
The layout of your building can reduce the range.
Speed
2.1 Identify a MAC (Media Access Control) address and its parts.
2.2 Identify the seven layers of the OSI (Open Systems Interconnect) model
and their functions.
2.3 Identify the OSI (Open Systems Interconnect) layers at which the
following network components operate:
• PPTP
• Token ring
> TCP/IP
Transmission Control Protocol, A connection based Internet
protocol responsible for breaking data into packets, which the IP
protocol sends over the network. IP is located at the TCP/IP Internet
layer which corresponds to the network layer of the OSI Model. IP is
responsible for routing packets by their IP address.
IP is a connectionless protocol. which means, IP does not establish a
connection between source and destination before transmitting data,
thus packet delivery is not guaranteed by IP. Instead, this must be
provided by TCP. TCP is a connection based protocol and, is designed
to guarantee delivery by monitoring the connection between source
and destination before data is transmitted. TCP places packets in
sequential order and requires acknowledgment from the receiving
node that they arrived properly before any new data is sent.
TCP/IP model
Application layer
DHCP - DNS - FTP - HTTP - IMAP4 - IRC - NNTP - XMPP - MIME -
POP3 - SIP - SMTP - SNMP - SSH - TELNET - BGP - RPC - RTP -
RTCP - TLS/SSL - SDP - SOAP - L2TP - PPTP
Transport layer
This layer deals with opening and maintaining connections, ensuring that
packets are in fact received. This is where flow-control and connection
protocols exist, such as: TCP - UDP - DCCP - SCTP - GTP
Network layer
IP (IPv4 - IPv6) - ARP - RARP - ICMP - IGMP - RSVP - IPSec
Data link layer
ATM - DTM - Ethernet - FDDI - Frame Relay - GPRS - PPP
Physical layer
Ethernet physical layer - ISDN - Modems - PLC - RS232 - SONET/SDH -
G.709 - Wi-Fi
> IPX/SPX
Internetwork Packet Exchange/Sequenced Packet Exchange
developed by Novell and is used primarily on networks that use the
Novell NetWare network operating system. The IPX and SPX protocols
provide services similar to those offered by IP and TCP. Like IP, IPX is
a connectionless network layer protocol. SPX runs on top of IPX at the
transport layer and, like TCP, provides connection oriented,
guaranteed delivery.
IPX nodes do not have to be configured with a unique node identifier;
instead, they copy the MAC address of the network interface card into
the IPX node address field. The IPX header contains information about
which transport layer protocol receives a particular packet. With IPX,
this information is contained in the destination socket field. Servers
have pre specified destination socket numbers, so workstations always
know what value to use to send information to the server. In contrast,
these workstations assign source socket numbers dynamically for their
own protocols outside the server socket number's range.
IPX routing protocols require each logical network to have a different
network number in order to forward IPX packets correctly. But, unlike
IP, with IPX only servers and routers must be configured with a
network number. New network stations first use dynamic Routing
Information Protocol (RIP) routing packets to learn network
topography and configuration from servers and routers and then
configure themselves accordingly.
Because IPX is a connectionless protocol, NetWare servers are unable
to tell if a station's connection to the server is currently active. To
avoid reserving resources for inactive users, the NetWare server sends
a watchdog packet to a client after a predetermined length of
inactivity. The packet asks if the client is still connected and, if the
client does not respond, the server terminates the connection.
SPX is connection oriented and, thus, does not require the use of
watchdog packets. However, network devices will keep an SPX session
open by sending keep alive packets to verify the connection.
> NetBEUI
NetBIOS Enhanced User Interface was designed as a small, efficient
protocol for use in department-sized LANs of 20-200 computers that
do not need to be routed to other subnets. NetBEUI is used almost
exclusively on small, non-routed networks.
As an extension of NetBIOS, NetBEUI is not routable, therefore
networks supporting NetBEUI must be connected with bridges, rather
than routers, like NetBIOS, the NetBEUI interface must be adapted to
routable protocols like TCP/IP for communication over WANs.
> AppleTalk
AppleTalk is a LAN architecture built into all Apple Macintosh
computers. While AppleTalk is a proprietary network, many companies
now market AppleTalk based products, including Novell and Microsoft.
Similarly, designed to be link layer independent, AppleTalk supports
Apple's LocalTalk cabling scheme, but also runs over Ethernet
(EtherTalk), Token Ring (TokenTalk), and Fiber Distributed Data
Interface, or FDDI (FDDITalk).
AppleTalk node addresses are assigned dynamically to ensure minimal
network administration overhead. When a node running AppleTalk
starts up, it generates a random network layer protocol address and
then sends out a broadcast to determine whether that particular
address is already in use. If it is, the node with the conflicting address
responds and the broadcasting node selects a new address and
repeats the inquiry process.
2-2 Protocols and Standards
The “xxx” represents the host number field of the address that is
assigned by the local network administrator.
Class A - addresses are intended for very large networks and can
address up to 16,777,216 (224) hosts per network. The first digits of a
Class A addresses will be a number between 1 and 126, the network
ID start bit is 0 and default subnet mask is 255.0.0.0
Class B - addresses are intended for moderate sized networks and can
address up to 65,536 (216) hosts per network. The first digits of a
Class B address will be a number between 128 and 191, the network
ID start bit is 10 and the default subnet mask is 255. 255.0.0
Class C - intended for small networks and can address only up to 254
(28-2) hosts per network. The first digits of a Class C address will be a
number between 192 and 223, the network ID start bit is 110 and
their default subnet mask is 255. 255. 255.0
Basic Class A, B, and C Network Address's
2.8 Identify the differences between private and public network addressing
schemes.
2.10 Define the purpose, function and use of the following protocols used
in the TCP / IP (Transmission Control Protocol / Internet Protocol)
suite:
2.12 Identify the well-known ports associated with the following commonly
used services and protocols:
Telnet 23
• The computer must be one that you can leave on at all times so
that other computers on the network can access the Internet. If
the computer is turned off, the connection to the Internet will
not be available.
• If one computer has a DSL or cable modem, use that computer
as the ICS host computer.
• If you plan to use a shared printer for your network, the printer
should be installed on the ICS host computer.
2.16 Define the function of the following remote access protocols and
services:
5.15-
5.35/5.47- 25 54
~25
802.11a 1999 5.725/5.72 Mbit/ Mbit/ ~75 meters
meters
5-5.875 s s
GHz
6.5 11
2.4-2.5 ~35
802.11b 1999 Mbit/ Mbit/ ~100 meters
GHz meters
s s
25 54
2.4-2.5 ~25
802.11g 2003 Mbit/ Mbit/ ~75 meters
GHz meters
s s
• Apple file services (AFP 3.0) from any AppleShare client over
TCP/IP
• Windows (SMB/CIFS) file sharing using Samba
• Network File System (NFS) for UNIX and Linux file access
• Internet (FTP)
> Netware
NetWare 5
Client Support
NetWare 5 comes with Novell Client software for three client
platforms: DOS and Windows 3.1x, Windows 95/98, and Windows NT.
Interoperability
You can set the Novell Clients for Windows 95/98 and Windows NT to
work with one of three network protocol options: IP only, IP and IPX,
or IPX only.
Authentication
Centralized login authentication
File and Print Services
File Services NetWare offers two choices of mutually compatible file
services: Novell Storage Services (NSS) and the traditional NetWare
File System. Both kinds of file services let you store, organize,
manage, access, and retrieve data on the network.
NSS gathers all unpartitioned free space that exists on all the hard
drives connected to your server, together with any unused space in
NetWare volumes, and places it into a storage pool. You create NSS
volumes from this storage pool during server installation or later
through NWCONFIG.
Novell Distributed Print Services (NDPS) is the default and preferred
print system in NetWare. NDPS supports IP-based as well as IPX-
based printing.
Security
Novell has support for a public key infrastructure built into NetWare 5
using a public certificate, developed by RSA Security.
> Windows
Windows 2000 Server:
Client Support
Windows 3.x, Windows 95, Windows 98, and Windows NT Workstation
4.0.
Interoperability
Windows 2000 Server supports UNIX, Novell NetWare, Windows NT
Server 4.0, and Macintosh.
Authentication
Successful user authentication in a Windows 2000 computing
environment consists of two separate processes: interactive logon,
which confirms the user's identification to either a domain account or a
local computer, and network authentication, which confirms the user's
identification to any network service that the user attempts to access.
Types of authentication that Windows 2000 supports are:
Kerberos V5 is used with either a password or a smart card for
interactive logon. It is also the default method of network
authentication for services.The Kerberos V5 protocol verifies both the
identity of the user and network services.
Secure Socket Layer/Transport Layer Security (SSL/TLS)
authentication, is used when a user attempts to access a secure Web
server.
File and Print Services
You can add and maintain printers in Windows 2000 using the print
administration wizard, and you can add file shares using Active
Directory management tools. Windows 2000 also offers Distributed File
Services, which let you combine files on more than one server into a
single share.
Security
User-level security protects shared network resources by requiring that
a security provider authenticate a user’s request to access resources.
The domain controller , grants access to the shared resource by
verifying that the user name and password are the same as those on
the user account list stored on the network security provider. Because
the security provider maintains a network-wide list of user accounts
and passwords, each client computer does not have to store a list of
accounts.
Share-level security protects shared network resources on the
computer with individually assigned passwords. For example, you can
assign a password to a folder or a locally attached printer. If other
users want to access it, they need to type in the appropriate password.
If you do not assign a password to a shared resource, every user with
access to the network can access that resource.
> Appleshare IP (Internet Protocol)
Client Support
TCP/IP file sharing with Macintosh clients using Network File System
(NFS), and File Transfer Apple File Protocol 3.0.
Interoperability
Windows Server Message Block (SMB) file sharing.
File and Print Services
File Services:
Print Services:
• PAP (AppleTalk)
• LPR/LPD
Application Support
• HTTP
• Mail (SMTP, POP, IMAP and Authenticated Post Office Protocol
APOP)
• Mac CGI
3.2 Identify the basic capabilities needed for client workstations to connect
to and use network resources (For example: media, network
protocols and peer and server services)
3.3 Identify the appropriate tool for a given wiring task (For example: wire
crimper, media tester / certifier, punch down tool or tone generator).
Using this method, you can test for any major wiring faults that affect
internal UTP cable installations.
Example:
• If you fail to detect a signal on the contact to which you have the
generator connected at the other end, you have an open circuit.
• If you detect a signal on the wrong contact, you have punched
down the wires to the wrong contacts.
• If you detect a signal on two or more wires, you have a short.
• Simple to use
• Most inexpensive type of cable tester
• Useful for troubleshooting a single cable connection.
• source IP address
• source port
• destination IP address or port
• destination service like WWW or FTP
> Extranets
An extranet is a private network that uses Internet protocols, network
connectivity, to securely share part of an organization's information or
operations with suppliers, vendors, partners, customers or other
businesses. An extranet can be viewed as part of a company's Intranet
that is extended to users outside the company normally over the
Internet.
An extranet requires security and privacy. These can include firewalls,
server management, the issuance and use of digital certificates or
similar means of user authentication, encryption of messages, and the
use of virtual private networks (VPNs) that tunnel through the public
network.
Advantages
Disadvantages
> Intranet
Intranets differ from "Extranets" in that the former is generally
restricted to employees of the organization while extranets can
generally be accessed by customers, suppliers, or other approved
parties.
An intranet is a private computer network that uses Internet protocols,
network connectivity, to securely share part of an organization's
information or operations with its employees. Sometimes the term
refers only to the most visible service, the internal website. The same
concepts and technologies of the Internet such as clients and servers
running on the Internet protocol suite are used to build an intranet.
HTTP and other Internet protocols are commonly used as well,
especially FTP and e-mail.
• attempt to repair the file by removing the virus itself from the
file
• quarantine the file
• delete the infected file.
• tracert -d corp7.microsoft.com
To trace the path to the host named corp7.microsoft.com and use the
loose source route 10.12.0.1-10.29.3.1-10.1.44.1, type:
Syntax
tracert [-d] [-h MaximumHops] [-j HostList] [-w Timeout] [TargetName]
Parameters
-d Prevents tracert from attempting to resolve the IP addresses of
intermediate routers to their names. This can speed up the display of tracert
results.
-h MaximumHops Specifies the maximum number of hops in the path to
search for the target (destination). The default is 30 hops.
-j HostList Specifies that Echo Request messages use the Loose Source
Route option in the IP header with the set of intermediate destinations
specified in HostList. With loose source routing, successive intermediate
destinations can be separated by one or multiple routers. The maximum
number of addresses or names in the host list is 9. The HostList is a series
of IP addresses (in dotted decimal notation) separated by spaces.
-w Timeout Specifies the amount of time in milliseconds to wait for the ICMP
Time Exceeded or Echo Reply message corresponding to a given Echo
Request message to be received. If not received within the time-out, an
asterisk (*) is displayed. The default time-out is 4000 (4 seconds).
> ping
Verifies IP-level connectivity to another TCP/IP computer by sending
Internet Control Message Protocol (ICMP) Echo Request messages. The
receipt of corresponding Echo Reply messages are displayed, along
with round-trip times. Ping is the primary TCP/IP command used to
troubleshoot connectivity, reachability, and name resolution. Used
without parameters, ping displays help.
You can use ping to test both the computer name and the IP address
of the computer. If pinging the IP address is successful, but pinging
the computer name is not, you might have a name resolution problem.
In this case, ensure that the computer name you are specifying can be
resolved through the local Hosts file, by using Domain Name System
(DNS) queries, or through NetBIOS name resolution techniques.
To test a TCP/IP configuration by using the ping command:
> arp
Displays and modifies entries in the Address Resolution Protocol (ARP)
cache, which contains one or more tables that are used to store IP
addresses and their resolved Ethernet or Token Ring physical
addresses. There is a separate table for each Ethernet or Token Ring
network adapter installed on your computer.
Syntax
arp [-a [InetAddr] [-N IfaceAddr]] [-g [InetAddr] [-N IfaceAddr]] [-d InetAddr
[IfaceAddr]] [-s InetAddr EtherAddr [IfaceAddr]]
Parameters
-a [InetAddr] [-N IfaceAddr] Displays current ARP cache tables for all
interfaces. To display the ARP cache entry for a specific IP address, use arp
-a with the InetAddr parameter, where InetAddr is an IP address. To display
the ARP cache table for a specific interface, use the -N IfaceAddr parameter
where IfaceAddr is the IP address assigned to the interface. The -N
parameter is case-sensitive.
-g [InetAddr] [-N IfaceAddr] Identical to -a.
-d InetAddr [IfaceAddr] Deletes an entry with a specific IP address, where
InetAddr is the IP address. To delete an entry in a table for a specific
interface, use the IfaceAddr parameter where IfaceAddr is the IP address
assigned to the interface. To delete all entries, use the asterisk (*) wildcard
character in place of InetAddr.
-s InetAddr EtherAddr [IfaceAddr] Adds a static entry to the ARP cache that
resolves the IP address InetAddr to the physical address EtherAddr. To add
a static ARP cache entry to the table for a specific interface, use the
IfaceAddr parameter where IfaceAddr is an IP address assigned to the
interface.
Examples:
To display the ARP cache tables for all interfaces, type:
• arp -a
To display the ARP cache table for the interface that is assigned the IP
address 10.0.0.99, type:
• arp -a -N 10.0.0.99
To add a static ARP cache entry that resolves the IP address 10.0.0.80
to the physical address 00-AA-00-4F-2A-9C, type:
> netstat
Displays active TCP connections, ports on which the computer is
listening, Ethernet statistics, the IP routing table, IPv4 statistics (for
the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the
IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used
without parameters, netstat displays active TCP connections.
Netstat provides statistics for the following:
• CLOSE_WAIT
• CLOSED
• ESTABLISHED
• FIN_WAIT_1
• FIN_WAIT_2
• LAST_ACK
• LISTEN
• SYN_RECEIVED
• SYN_SEND
• TIMED_WAIT
Syntax
netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]
Parameters
-a Displays all active TCP connections and the TCP and UDP ports on
which the computer is listening.
-e Displays Ethernet statistics, such as the number of bytes and packets
sent and received. This parameter can be combined with -s.
-n Displays active TCP connections, however, addresses and port numbers
are expressed numerically and no attempt is made to determine names.
-o Displays active TCP connections and includes the process ID (PID) for
each connection. You can find the application based on the PID on the
Processes tab in Windows Task Manager. This parameter can be combined
with -a, -n, and -p.
-p Shows connections for the protocol specified by Protocol. In this case, the
Protocol can be tcp, udp, tcpv6, or udpv6. If this parameter is used with -s to
display statistics by protocol, Protocol can be tcp, udp, icmp, ip, tcpv6,
udpv6, icmpv6, or ipv6.
-s Displays statistics by protocol. By default, statistics are shown for the
TCP, UDP, ICMP, and IP protocols. If the IPv6 protocol for Windows XP is
installed, statistics are shown for the TCP over IPv6, UDP over IPv6,
ICMPv6, and IPv6 protocols. The -p parameter can be used to specify a set
of protocols.
-r Displays the contents of the IP routing table. This is equivalent to the route
print command.
Interval Redisplays the selected information every Interval seconds. Press
CTRL+C to stop the redisplay. If this parameter is omitted, netstat prints the
selected information only once.
/? - Displays help at the command prompt.
> nbtstat
Displays NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS
name tables for both the local computer and remote computers, and
the NetBIOS name cache. Nbtstat allows a refresh of the NetBIOS
name cache and the names registered with Windows Internet Name
Service (WINS). Used without parameters, nbtstat displays help.
Nbtstat command-line parameters are case-sensitive.
Syntax
nbtstat [-a RemoteName] [-A IPAddress] [-c] [-n] [-r] [-R] [-RR] [-s] [-S]
[Interval]
Parameters
-a RemoteName Displays the NetBIOS name table of a remote computer,
where RemoteName is the NetBIOS computer name of the remote
computer. The NetBIOS name table is the list of NetBIOS names that
corresponds to NetBIOS applications running on that computer.
-A IPAddress Displays the NetBIOS name table of a remote computer,
specified by the IP address (in dotted decimal notation) of the remote
computer.
-c Displays the contents of the NetBIOS name cache, the table of NetBIOS
names and their resolved IP addresses.
-n Displays the NetBIOS name table of the local computer. The status of
Registered indicates that the name is registered either by broadcast or with
a WINS server.
-r Displays NetBIOS name resolution statistics. On a Windows XP computer
that is configured to use WINS, this parameter returns the number of names
that have been resolved and registered using broadcast and WINS.
-R Purges the contents of the NetBIOS name cache and then reloads the
#PRE-tagged entries from the Lmhosts file.
-RR Releases and then refreshes NetBIOS names for the local computer
that is registered with WINS servers.
-s Displays NetBIOS client and server sessions, attempting to convert the
destination IP address to a name.
-S Displays NetBIOS client and server sessions, listing the remote
computers by destination IP address only.
Interval Redisplays selected statistics, pausing the number of seconds
specified in Interval between each display. Press CTRL+C to stop
redisplaying statistics. If this parameter is omitted, nbtstat prints the current
configuration information only once.
/? - Displays help at the command prompt.
> ipconfig
Displays all current TCP/IP network configuration values and refreshes
Dynamic Host Configuration Protocol (DHCP) and Domain Name
System (DNS) settings. Used without parameters, ipconfig displays the
IP address, subnet mask, and default gateway for all adapters.
Examples:
To display the basic TCP/IP configuration for all adapters, type:
• ipconfig
To display the full TCP/IP configuration for all adapters, type:
• ipconfig /all
• ipconfig /flushdns
To display the DHCP class ID for all adapters with names that start
with Local, type:
To set the DHCP class ID for the Local Area Connection adapter to
TEST, type:
> winipcfg
This utility allows users or adminstrators to see the current IP address
and other useful information about your network configuration.
You can reset one or more IP addresses. The Release or Renew
buttons allow you to release or renew one IP address. If you want to
release or renew all IP addresses click Release All or Renew All.
When one of these buttons is clicked, a new IP address is obtained
from either the DHCP service or from the computer assigning itself an
automatic private IP address.
To use the winipcfg utility:
> nslookup
Nslookup (Name Server lookup) is a UNIX shell command to query
Internet domain name servers.
For example if you did an nslookup on studynotes.net these are some
of the results you could obtain.
note: the results you get will be different than those below because I
have changed hosts.
Query Hostname Real Hostname IP Address
Nameserver NS2.TERA-BYTE.COM ns2.tera-byte.com 216.234.161.12
Nameserver NS1.TERA-BYTE.COM raptor.tera-byte.com 216.234.161.11
Nameserver NS3.TERA-BYTE.COM ns3.tera-byte.com 204.209.56.2
Mailserver studynotes.net (pref = 5) studynotes.net 216.194.69.204
Webserver www.studynotes.net studynotes.net 216.194.69.204
FTP server ftp.studynotes.net studynotes.net 216.194.69.204
Definitions
• Nameserver: These are the servers that the internet uses to find
out more about the domain. Usually they are an ISP's computer.
• Mailserver: Where email is sent to.
• Webserver: The domains website.
• FTPserver: FTP is file transfer protocol, this server is where files
may be stored.
• Hostname: The name of the host as given by the domain.
• Real Hostname: This is hostname that you get by reverse
resolving the IP address, may be different to the given
hostname.
• IP Address: Unique four numbered identifier that is obtained by
resolving the hostname.
4.2 Given output from a network diagnostic utility (For
example: those utilities listed in objective 4.1), identify the
utility and interpret the output.
see > Network Support Part 2
4.3 Given a network scenario, interpret visual indicators (For example: link
LEDs (Light Emitting Diode) and collision LEDs (Light Emitting
Diode)) to determine the nature of a stated problem.
Try reseating the cable connectors into the jacks, or replace the cable
with one that you know is functioning properly, and then see if both
link pulse lights come on.
Fast Link Pulse (FLP)
Fast Ethernet equipment that supports multiple speeds uses Fast Link
Pulse (FLP) signals, which differ from NLP signals in that they include a
16-bit data packet that the devices use to auto-negotiate their
connection speed. The data packet contains a link code word that
consists of a selector field and a technology ability field. The devices
use these fields to advertise their capabilities, including the speeds
they can run at and whether they support full-duplex (that is,
simultaneous bi-directional) communications.
By examining the link code word supplied by the other device, the
network interface adapter and the hub both configure themselves to
use the best transmission mode that they have in common according
to the following priorities:
FLP signals are fully compatible with the NLP signals that are used by
devices that cannot operate at multiple speeds.
It is important to understand that the link pulse LEDs are only an
indication that the network connection is wired properly. Just because
the LEDs are lit does not necessarily mean that the connection is
capable of carrying actual Ethernet traffic.
4-2 Network Support
Answer: c,e
Explanation: The best way to connect windows clients to linux (or
other nixes) is samba. samba allows linux to use smb/cifs on which
windows file sharing is built. ( This is not the offical position of
microsoft, but on that later) With samba installed and properly
configured on the server, the windows clients will be able to connect to
the server tcp/ip properly configured.
Whereas NFS would do the job, it would require third party software to
work with the windows 98 clients and would not likely be transparent
to the end users. SFU is only included in windows 2000, not windows
98. Note that ( big surprise here) microsoft highly recommends the
NFS and SFU be used for windows 2000 networks. WINE is a windows
emulator and would not help for network connectivity.
• a.optical tester
• b.protocol analyzer
• c.multimeter
• d.Tone generator
Answer: d The tone generator could be connected at the jack and the
probe used to find the other end
Explanation: An optical test would help to test fiberoptics but not cat
5 cable While a multimeter could, in theory be used, in most cases it is
impractical at best and usually impossible. A protocol analyzer would
be useless in this case. There is no traffic to analyze .
IP Address. . . . . . .: 192.168.2.16
• a.ip address
• b.no DNS server is assigned
• c.subnet mask is wrong
• d.wrong default gateway