You are on page 1of 23

:: Basic Networking Tutorial ::

What is a computer Network?


A network is any collection of independent computers that communicate with one
another over a shared network medium.A computer network is a collection of two or
more connected computers. When these computers are joined in a network, people can
share files and peripherals such as modems, printers, tape backup drives, or CD-R!
drives. When networks at multiple locations are connected usin" services available from
phone companies, people can send e-mail, share links to the "lobal #nternet, or conduct
videoconferences in real time with other remote users. As companies rely on applications
like electronic mail and database mana"ement for core business operations, computer
networkin" becomes increasin"ly more important.
$very network includes%
At least two computers &erver or Client workstation.
'etworkin" #nterface Card(s )'#C*
A connection medium, usually a wire or cable, althou"h wireless
communication between networked computers and peripherals is also
possible.
'etwork peratin" system software, such as !icrosoft Windows '+ or
,---, 'ovell 'etWare, .ni/ and 0inu/.
Types of Networks:
LANs (Local Area Networks)
A network is any collection of independent computers that communicate with one
another over a shared network medium. 0A's are networks usually confined to a
"eo"raphic area, such as a sin"le buildin" or a colle"e campus. 0A's can be small,
linkin" as few as three computers, but often link hundreds of computers used by
thousands of people. +he development of standard networkin" protocols and media has
resulted in worldwide proliferation of 0A's throu"hout business and educational
or"ani1ations.
WANs (Wide Area Networks)
Wide area networkin" combines multiple 0A's that are "eo"raphically separate. +his is
accomplished by connectin" the different 0A's usin" services such as dedicated leased
phone lines, dial-up phone lines )both synchronous and asynchronous*, satellite links, and
data packet carrier services. Wide area networkin" can be as simple as a modem and
remote access server for employees to dial into, or it can be as comple/ as hundreds of
branch offices "lobally linked usin" special routin" protocols and filters to minimi1e the
e/pense of sendin" data sent over vast distances.
nternet
+he #nternet is a system of linked networks that are worldwide in scope and facilitate data
communication services such as remote lo"in, file transfer, electronic mail, the World
Wide Web and news"roups.
With the meteoric rise in demand for connectivity, the #nternet has become a
communications hi"hway for millions of users. +he #nternet was initially restricted to
military and academic institutions, but now it is a full-fled"ed conduit for any and all
forms of information and commerce. #nternet websites now provide personal,
educational, political and economic resources to every corner of the planet.
ntranet
With the advancements made in browser-based software for the #nternet, many private
or"ani1ations are implementin" intranets. An intranet is a private network utili1in"
#nternet-type tools, but available only within that or"ani1ation. 2or lar"e or"ani1ations,
an intranet provides an easy access mode to corporate information for employees.
!ANs (!etropolitan area Networks)
+he refers to a network of computers with in a City.
"#N ("irtual #ri$ate Network)
34' uses a techni5ue known as tunnelin" to transfer data securely on the #nternet to a
remote access server on your workplace network. .sin" a 34' helps you save money by
usin" the public #nternet instead of makin" lon"6distance phone calls to connect securely
with your private network. +here are two ways to create a 34' connection, by dialin" an
#nternet service provider )#&4*, or connectin" directly to #nternet.
%ategories of Network:
Network can &e di$ided in to two main categories:
4eer-to-peer.
&erver 6 based.
#n peer-to-peer networkin" there are no dedicated servers or hierarchy amon" the
computers. All of the computers are e5ual and therefore known as peers. 'ormally each
computer serves as Client7&erver and there is no one assi"ned to be an administrator
responsible for the entire network.
4eer-to-peer networks are "ood choices for needs of small or"ani1ations where the users
are allocated in the same "eneral area, security is not an issue and the or"ani1ation and
the network will have limited "rowth within the foreseeable future.
+he term Client7server refers to the concept of sharin" the work involved in processin"
data between the client computer and the most powerful server computer.
The client'ser$er network is the most efficient way to pro$ide:
Databases and mana"ement of applications such as &preadsheets, Accountin",
Communications and Document mana"ement.
'etwork mana"ement.
Centrali1ed file stora"e.
+he client7server model is basically an implementation of distributed or cooperative
processin". At the heart of the model is the concept of splittin" application functions
between a client and a server processor. +he division of labor between the different
processors enables the application desi"ner to place an application function on the
processor that is most appropriate for that function. +his lets the software desi"ner
optimi1e the use of processors--providin" the "reatest possible return on investment for
the hardware.
Client7server application desi"n also lets the application provider mask the actual location
of application function. +he user often does not know where a specific operation is
e/ecutin". +he entire function may e/ecute in either the 4C or server, or the function may
be split between them. +his maskin" of application function locations enables system
implementers to up"rade portions of a system over time with a minimum disruption of
application operations, while protectin" the investment in e/istin" hardware and
software.
The () !odel:
pen &ystem #nterconnection )&#* reference model has become an #nternational
standard and serves as a "uide for networkin". +his model is the best known and most
widely used "uide to describe networkin" environments. 3endors desi"n network
products based on the specifications of the &# model. #t provides a description of how
network hardware and software work to"ether in a layered fashion to make
communications possible. #t also helps with trouble shootin" by providin" a frame of
reference that describes how components are supposed to function.
+here are seven to "et familiar with and these are the physical layer, data link layer,
network layer, transport layer, session layer, presentation layer, and the application layer.
4hysical 0ayer, is just that the physical parts of the network such as wires, cables,
and there media alon" with the len"th. Also this layer takes note of the electrical
si"nals that transmit data throu"hout system.
Data 0ink 0ayer, this layer is where we actually assi"n meanin" to the electrical
si"nals in the network. +he layer also determines the si1e and format of data sent
to printers, and other devices. Also # don(t want to for"et that these are also called
nodes in the network. Another thin" to consider in this layer is will also allow and
define the error detection and correction schemes that insure data was sent and
received.
'etwork 0ayer, this layer provides the definition for the connection of two
dissimilar networks.
+ransport 0ayer, this layer allows data to be broken into smaller packa"es for data
to be distributed and addressed to other nodes )workstations*.
&ession 0ayer, this layer helps out with the task to carry information from one
node )workstation* to another node )workstation*. A session has to be made
before we can transport information to another computer.
4resentation 0ayer, this layer is responsible to code and decode data sent to the
node.
Application 0ayer, this layer allows you to use an application that will
communicate with say the operation system of a server. A "ood e/ample would
be usin" your web browser to interact with the operatin" system on a server such
as Windows '+, which in turn "ets the data you re5uested.
Network Architectures:
*thernet
$thernet is the most popular physical layer 0A' technolo"y in use today. ther 0A'
types include +oken Rin", 2ast $thernet, 2iber Distributed Data #nterface )2DD#*,
Asynchronous +ransfer !ode )A+!* and 0ocal+alk. $thernet is popular because it
strikes a "ood balance between speed, cost and ease of installation. +hese benefits,
combined with wide acceptance in the computer marketplace and the ability to support
virtually all popular network protocols, make $thernet an ideal networkin" technolo"y
for most computer users today. +he #nstitute for $lectrical and $lectronic $n"ineers
)#$$$* defines the $thernet standard as #$$$ &tandard 8-,.9. +his standard defines rules
for confi"urin" an $thernet network as well as specifyin" how elements in an $thernet
network interact with one another. :y adherin" to the #$$$ standard, network e5uipment
and network protocols can communicate efficiently.
+ast *thernet
2or $thernet networks that need hi"her transmission speeds, the 2ast $thernet standard
)#$$$ 8-,.9u* has been established. +his standard raises the $thernet speed limit from ;-
!e"abits per second )!bps* to ;-- !bps with only minimal chan"es to the e/istin"
cable structure. +here are three types of 2ast $thernet% ;--:A&$-+< for use with level =
.+4 cable, ;--:A&$-2< for use with fiber-optic cable, and ;--:A&$-+> which utili1es
an e/tra two wires for use with level 9 .+4 cable. +he ;--:A&$-+< standard has
become the most popular due to its close compatibility with the ;-:A&$-+ $thernet
standard. 2or the network mana"er, the incorporation of 2ast $thernet into an e/istin"
confi"uration presents a host of decisions. !ana"ers must determine the number of users
in each site on the network that need the hi"her throu"hput, decide which se"ments of the
backbone need to be reconfi"ured specifically for ;--:A&$-+ and then choose the
necessary hardware to connect the ;--:A&$-+ se"ments with e/istin" ;-:A&$-+
se"ments. ?i"abit $thernet is a future technolo"y that promises a mi"ration path beyond
2ast $thernet so the ne/t "eneration of networks will support even hi"her data transfer
speeds.
Token ,ing
+oken Rin" is another form of network confi"uration which differs from $thernet in that
all messa"es are transferred in a unidirectional manner alon" the rin" at all times. Data is
transmitted in tokens, which are passed alon" the rin" and viewed by each device. When
a device sees a messa"e addressed to it, that device copies the messa"e and then marks
that messa"e as bein" read. As the messa"e makes its way alon" the rin", it eventually
"ets back to the sender who now notes that the messa"e was received by the intended
device. +he sender can then remove the messa"e and free that token for use by others.
3arious 4C vendors have been proponents of +oken Rin" networks at different times and
thus these types of networks have been implemented in many or"ani1ations.
+--
2DD# )2iber-Distributed Data #nterface* is a standard for data transmission on fiber optic
lines in a local area network that can e/tend in ran"e up to ,-- km );,> miles*. +he
2DD# protocol is based on the token rin" protocol. #n addition to bein" lar"e
"eo"raphically, an 2DD# local area network can support thousands of users.
#rotocols:
'etwork protocols are standards that allow computers to communicate. A protocol
defines how computers identify one another on a network, the form that the data should
take in transit, and how this information is processed once it reaches its final destination.
4rotocols also define procedures for handlin" lost or dama"ed transmissions or @packets.@
+C47#4 )for .'#<, Windows '+, Windows A= and other platforms*, #4< )for 'ovell
'etWare*, D$Cnet )for networkin" Di"ital $5uipment Corp. computers*, Apple+alk )for
!acintosh computers*, and 'et:#&7'et:$.# )for 0A' !ana"er and Windows '+
networks* are the main types of network protocols in use today.
Althou"h each network protocol is different, they all share the same physical cablin".
+his common method of accessin" the physical network allows multiple protocols to
peacefully coe/ist over the network media, and allows the builder of a network to use
common hardware for a variety of protocols. +his concept is known as @protocol
independence,@
&ome #mportant 4rotocols and their job%
#rotocol Acronym ts .o&
4oint-+o-4oint +C47#4 +he backbone
protocol of the
internet. 4opular
also for intranets
usin" the internet
+ransmission Control
4rotocol7internet
4rotocol
+C47#4 +he backbone
protocol of the
internet. 4opular
also for intranets
usin" the internet
#nternetwork 4acka"e
$/chan"e7&e5uenced
4acket $/chan"e
#4<7&4< +his is a standard
protocol for 'ovell
'etwork peratin"
&ystem
'et:#& $/tended .ser
#nterface
'et:$.# +his is a !icrosoft
protocol that doesn(t
support routin" to
other networks
2ile +ransfer 4rotocol 2+4 .sed to send and
receive files from a
remote host
Byper +ransfer 4rotocol B++4 .sed for the web to
send documents that
are encoded in
B+!0.
'etwork 2ile &ervices '2& Allows network
nodes or
workstations to
access files and
drives as if they
were their own.
&imple !ail +ransfer
4rotocol
&!+4 .sed to send $mail
over a network
+elnet .sed to connect to a
host and emulate a
terminal that the
remote server can
reco"ni1e
ntroduction to T%#'# Networks:
+C47#4-based networks play an increasin"ly important role in computer networks.
4erhaps one reason for their appeal is that they are based on an open specification that is
not controlled by any vendor.
What s T%#'#?
+C4 stands for +ransmission Control 4rotocol and #4 stands for #nternet 4rotocol. +he
term +C47#4 is not limited just to these two protocols, however. 2re5uently, the term
+C47#4 is used to refer to a "roup of protocols related to the +C4 and #4 protocols such
as the .ser Data"ram 4rotocol ).D4*, 2ile +ransfer 4rotocol )2+4*, +erminal $mulation
4rotocol )+$0'$+*, and so on.
The (rigins of T%#'#
#n the late ;AC-s, DAR4A )the Defense Advanced Research 4roject A"ency*, in the
.nited &tates, noticed that there was a rapid proliferation of computers in military
communications. Computers, because they can be easily pro"rammed, provide fle/ibility
in achievin" network functions that is not available with other types of communications
e5uipment. +he computers then used in military communications were manufactured by
different vendors and were desi"ned to interoperate with computers from that vendor
only. 3endors used proprietary protocols in their communications e5uipment. +he
military had a multi vendor network but no common protocol to support the
hetero"eneous e5uipment from different vendors
Net work %a&les and )tuff:
#n the network you will commonly find three types of cables used these are the, coa/ial
cable, fiber optic and twisted pair.
Thick %oa/ial %a&le
+his type cable is usually yellow in color and used in what is called thicknets, and has
two conductors. +his coa/ can be used in =---meter len"ths. +he cable itself is made up
of a solid center wire with a braided metal shield and plastic sheathin" protectin" the rest
of the wire.
Thin %oa/ial %a&le
As with the thick coa/ial cable is used in thicknets the thin version is used in thinnets.
+his type cable is also used called or referred to as R?-=8. +he cable is really just a
cheaper version of the thick cable.
+i&er (ptic %a&le
As we all know fiber optics are pretty darn cool and not cheap. +his cable is smaller and
can carry a vast amount of information fast and over lon" distances.
Twisted #air %a&les
+hese come in two flavors of unshielded and shielded.
0nshielded Twisted #air (0T#)
+his is the most popular form of cables in the network and the cheapest form that you can
"o with. +he .+4 has four pairs of wires and all inside plastic sheathin". +he bi""est
reason that we call it +wisted 4air is to protect the wires from interference from
themselves. $ach wire is only protected with a thin plastic sheath.
)hielded Twisted #air ()T#)
#s more common in hi"h-speed networks. +he bi""est difference you will see in the .+4
and &+4 is that the &+4 use(s metallic shield wrappin" to protect the wire from
interference.
-&omethin" else to note about these cables is that they are defined in numbers also. +he
bi""er the number the better the protection from interference. !ost networks should "o
with no less than a CA+ 9 and CA+ = is most recommended.
-'ow you know about cables we need to know about connectors. +his is pretty important
and you will most likely need the RD->= connector. +his is the cousin of the phone jack
connector and looks real similar with the e/ception that the RD->= is bi""er. !ost
commonly your connector are in two flavors and this is :'C ):ayonet 'aur Connector*
used in thicknets and the RD->= used in smaller networks usin" .+47&+4.
*thernet %a&ling
'ow to familiari1e you with more on the $thernet and it(s cablin" we need to look at the
;-(s. ;-:ase,, is considered the thin $thernet, thinnet, and thinwire which uses li"ht
coa/ial cable to create a ;- !bps network. +he cable se"ments in this network can(t be
over ;8= meters in len"th. +hese cables connect with the :'C connector. Also as a note
these unused connection must have a terminator, which will be a =--ohm terminator.
;-:ase=, this is considered a thicknet and is used with coa/ial cable arran"ement such as
the :'C connector. +he "ood side to the coa/ial cable is the hi"h-speed transfer and
cable se"ments can be up to =-- meters between nodes7workstations. Eou will typically
see the same speed as the ;-:ase, but lar"er cable len"ths for more versatility.
;-:ase+, the F+G stands for twisted as in .+4 ).nshielded +wisted 4air* and uses this
for ;-!bps of transfer. +he down side to this is you can only have cable len"ths of ;--
meters between nodes7workstations. +he "ood side to this network is they are easy to set
up and cheapH +his is why they are so common an ideal for small offices or homes.
;--:ase+, is considered 2ast $thernet uses &+4 )&hielded +wisted 4air* reachin" data
transfer of ;--!bps. +his system is a little more e/pensive but still remains popular as
the ;-:ase+ and cheaper than most other type networks. +his on of course would be the
cheap fast version.
;-:ase2, this little "uy has the advanta"e of fiber optics and the 2 stands for just that.
+his arran"ement is a little more complicated and uses special connectors and '#C(s
alon" with hubs to create its network. 4retty darn neat and not to cheap on the wallet.
An important part of desi"nin" and installin" an $thernet is selectin" the appropriate
$thernet medium. +here are four major types of media in use today% +hickwire for
;-:A&$= networks, thin coa/ for ;-:A&$, networks, unshielded twisted pair ).+4* for
;-:A&$-+ networks and fiber optic for ;-:A&$-20 or 2iber-ptic #nter-Repeater 0ink
)2#R0* networks. +his wide variety of media reflects the evolution of $thernet and also
points to the technolo"yIs fle/ibility. +hickwire was one of the first cablin" systems used
in $thernet but was e/pensive and difficult to use. +his evolved to thin coa/, which is
easier to work with and less e/pensive.
Network Topologies:
What is a Network topology?
A network topolo"y is the "eometric arran"ement of nodes and cable links in a 0A',
+here are three topolo"y(s to think about when you "et into networks. +hese are the star,
rind, and the bus.
&tar, a rin" topolo"y features a lo"ically closed loop. Data packets travel in a sin"le
direction around the rin" from one network device to the ne/t. $ach network device acts
as a repeater, meanin" it re"enerates the si"nal
Rin", in a star topolo"y each node has a dedicated set of wires connectin" it to a central
network hub. &ince all traffic passes throu"h the hub, the hub becomes a central point for
isolatin" network problems and "atherin" network statistics.
:us, the bus topolo"y, each node )computer, server, peripheral etc.* attaches directly to a
common cable. +his topolo"y most often serves as the backbone for a network. #n some
instances, such as in classrooms or labs, a bus will connect small work"roups
%ollisions:
$thernet is a shared media, so there are rules for sendin" packets of data to avoid
conflicts and protect data inte"rity. 'odes determine when the network is available for
sendin" packets. #t is possible that two nodes at different locations attempt to send data at
the same time. When both 4Cs are transferrin" a packet to the network at the same time,
a collision will result.
!inimi1in" collisions is a crucial element in the desi"n and operation of networks.
#ncreased collisions are often the result of too many users on the network, which results
in a lot of contention for network bandwidth. +his can slow the performance of the
network from the userIs point of view. &e"mentin" the network, where a network is
divided into different pieces joined to"ether lo"ically with a brid"e or switch, is one way
of reducin" an overcrowded network.
*thernet #roducts:
+he standards and technolo"y that have just been discussed help define the specific
products that network mana"ers use to build $thernet networks. +he followin" te/t
discusses the key products needed to build an $thernet 0A'.
Transcei$ers
+ransceivers are used to connect nodes to the various $thernet media. !ost computers
and network interface cards contain a built-in ;-:A&$-+ or ;-:A&$, transceiver,
allowin" them to be connected directly to $thernet without re5uirin" an e/ternal
transceiver. !any $thernet devices provide an A.# connector to allow the user to
connect to any media type via an e/ternal transceiver. +he A.# connector consists of a
;=-pin D-shell type connector, female on the computer side, male on the transceiver side.
+hickwire );-:A&$=* cables also use transceivers to allow connections.
2or 2ast $thernet networks, a new interface called the !## )!edia #ndependent #nterface*
was developed to offer a fle/ible way to support ;-- !bps connections. +he !## is a
popular way to connect ;--:A&$-2< links to copper-based 2ast $thernet devices.
Network nterface %ards:
'etwork interface cards, commonly referred to as '#Cs, and are used to connect a 4C to
a network. +he '#C provides a physical connection between the networkin" cable and the
computerIs internal bus. Different computers have different bus architecturesJ 4C# bus
master slots are most commonly found on >8C74entium 4Cs and #&A e/pansion slots are
commonly found on 98C and older 4Cs. '#Cs come in three basic varieties% 8-bit, ;C-bit,
and 9,-bit. +he lar"er the number of bits that can be transferred to the '#C, the faster the
'#C can transfer data to the network cable.
!any '#C adapters comply with 4lu"-n-4lay specifications. n these systems, '#Cs are
automatically confi"ured without user intervention, while on non-4lu"-n-4lay systems,
confi"uration is done manually throu"h a setup pro"ram and7or D#4 switches.
Cards are available to support almost all networkin" standards, includin" the latest 2ast
$thernet environment. 2ast $thernet '#Cs are often ;-7;-- capable, and will
automatically set to the appropriate speed. 2ull duple/ networkin" is another option,
where a dedicated connection to a switch allows a '#C to operate at twice the speed.
1u&s',epeaters:
Bubs7repeaters are used to connect to"ether two or more $thernet se"ments of any media
type. #n lar"er desi"ns, si"nal 5uality be"ins to deteriorate as se"ments e/ceed their
ma/imum len"th. Bubs provide the si"nal amplification re5uired to allow a se"ment to be
e/tended a "reater distance. A hub takes any incomin" si"nal and repeats it out all ports.
$thernet hubs are necessary in star topolo"ies such as ;-:A&$-+. A multi-port twisted
pair hub allows several point-to-point se"ments to be joined into one network. ne end of
the point-to-point link is attached to the hub and the other is attached to the computer. #f
the hub is attached to a backbone, then all computers at the end of the twisted pair
se"ments can communicate with all the hosts on the backbone. +he number and type of
hubs in any one-collision domain is limited by the $thernet rules. +hese repeater rules are
discussed in more detail later.
Network Type
!a/ Nodes
#er )egment
!a/ -istance
#er )egment
;-:A&$-+
;-:A&$,
;-:A&$=
;-:A&$-20
,
9-
;--
,
;--m
;8=m
=--m
,---m
Adding )peed:
While repeaters allow 0A's to e/tend beyond normal distance limitations, they still limit
the number of nodes that can be supported. :rid"es and switches, however, allow 0A's
to "row si"nificantly lar"er by virtue of their ability to support full $thernet se"ments on
each port. Additionally, brid"es and switches selectively filter network traffic to only
those packets needed on each se"ment - this si"nificantly increases throu"hput on each
se"ment and on the overall network. :y providin" better performance and more
fle/ibility for network topolo"ies, brid"es and switches will continue to "ain popularity
amon" network mana"ers.
Bridges:
+he function of a brid"e is to connect separate networks to"ether. :rid"es connect
different networks types )such as $thernet and 2ast $thernet* or networks of the same
type. :rid"es map the $thernet addresses of the nodes residin" on each network se"ment
and allow only necessary traffic to pass throu"h the brid"e. When a packet is received by
the brid"e, the brid"e determines the destination and source se"ments. #f the se"ments are
the same, the packet is dropped )@filtered@*J if the se"ments are different, then the packet
is @forwarded@ to the correct se"ment. Additionally, brid"es do not forward bad or
misali"ned packets.
:rid"es are also called @store-and-forward@ devices because they look at the whole
$thernet packet before makin" filterin" or forwardin" decisions. 2ilterin" packets, and
re"eneratin" forwarded packets enable brid"in" technolo"y to split a network into
separate collision domains. +his allows for "reater distances and more repeaters to be
used in the total network desi"n.
*thernet )witches:
$thernet switches are an e/pansion of the concept in $thernet brid"in". 0A' switches
can link four, si/, ten or more networks to"ether, and have two basic architectures% cut-
throu"h and store-and-forward. #n the past, cut-throu"h switches were faster because they
e/amined the packet destination address only before forwardin" it on to its destination
se"ment. A store-and-forward switch, on the other hand, accepts and analy1es the entire
packet before forwardin" it to its destination.
#t takes more time to e/amine the entire packet, but it allows the switch to catch certain
packet errors and keep them from propa"atin" throu"h the network. :oth cut-throu"h and
store-and-forward switches separate a network into collision domains, allowin" network
desi"n rules to be e/tended. $ach of the se"ments attached to an $thernet switch has a
full ;- !bps of bandwidth shared by fewer users, which results in better performance )as
opposed to hubs that only allow bandwidth sharin" from a sin"le $thernet*. 'ewer
switches today offer hi"h-speed links, 2DD#, 2ast $thernet or A+!. +hese are used to
link switches to"ether or "ive added bandwidth to hi"h-traffic servers. A network
composed of a number of switches linked to"ether via uplinks is termed a @collapsed
backbone@ network.
,outers:
Routers filter out network traffic by specific protocol rather than by packet address.
Routers also divide networks lo"ically instead of physically. An #4 router can divide a
network into various subnets so that only traffic destined for particular #4 addresses can
pass between se"ments. 'etwork speed often decreases due to this type of intelli"ent
forwardin". &uch filterin" takes more time than that e/ercised in a switch or brid"e,
which only looks at the $thernet address. Bowever, in more comple/ networks, overall
efficiency is improved by usin" routers.
What is a network firewall?
A firewall is a system or "roup of systems that enforces an access control policy between
two networks. +he actual means by which this is accomplished varies widely, but in
principle, the firewall can be thou"ht of as a pair of mechanisms% one which e/ists to
block traffic, and the other which e/ists to permit traffic. &ome firewalls place a "reater
emphasis on blockin" traffic, while others emphasi1e permittin" traffic. 4robably the
most important thin" to reco"ni1e about a firewall is that it implements an access control
policy. #f you donIt have a "ood idea of what kind of access you want to allow or to deny,
a firewall really wonIt help you. #tIs also important to reco"ni1e that the firewallIs
confi"uration, because it is a mechanism for enforcin" policy, imposes its policy on
everythin" behind it. Administrators for firewalls mana"in" the connectivity for a lar"e
number of hosts therefore have a heavy responsibility.
Network -esign %riteria:
$thernets and 2ast $thernets have desi"n rules that must be followed in order to function
correctly. !a/imum number of nodes, number of repeaters and ma/imum se"ment
distances are defined by the electrical and mechanical desi"n properties of each type of
$thernet and 2ast $thernet media.
A network usin" repeaters, for instance, functions with the timin" constraints of $thernet.
Althou"h electrical si"nals on the $thernet media travel near the speed of li"ht, it still
takes a finite time for the si"nal to travel from one end of a lar"e $thernet to another. +he
$thernet standard assumes it will take rou"hly =- microseconds for a si"nal to reach its
destination.
$thernet is subject to the @=->-9@ rule of repeater placement% the network can only have
five se"ments connectedJ it can only use four repeatersJ and of the five se"ments, only
three can have users attached to themJ the other two must be inter-repeater links.
#f the desi"n of the network violates these repeater and placement rules, then timin"
"uidelines will not be met and the sendin" station will resend that packet. +his can lead to
lost packets and e/cessive resent packets, which can slow network performance and
create trouble for applications. 2ast $thernet has modified repeater rules, since the
minimum packet si1e takes less time to transmit than re"ular $thernet. +he len"th of the
network links allows for a fewer number of repeaters. #n 2ast $thernet networks, there are
two classes of repeaters. Class # repeaters have a latency of -.K microseconds or less and
are limited to one repeater per network. Class ## repeaters have a latency of -.>C
microseconds or less and are limited to two repeaters per network. +he followin" are the
distance )diameter* characteristics for these types of 2ast $thernet repeater combinations%
+ast *thernet %opper +i&er
'o Repeaters
ne Class #
Repeater
ne Class ##
Repeater
+wo Class ##
Repeaters
;--m
,--m
,--m
,-=m
>;,mL
,K,m
,K,m
,,8m
L 2ull Duple/ !ode , km
When conditions re5uire "reater distances or an increase in the number of
nodes7repeaters, then a brid"e, router or switch can be used to connect multiple networks
to"ether. +hese devices join two or more separate networks, allowin" network desi"n
criteria to be restored. &witches allow network desi"ners to build lar"e networks that
function well. +he reduction in costs of brid"es and switches reduces the impact of
repeater rules on network desi"n.
$ach network connected via one of these devices is referred to as a separate collision
domain in the overall network.
Types of )er$ers:
-e$ice )er$ers
A device server is defined as a speciali1ed, network-based hardware device desi"ned to
perform a sin"le or speciali1ed set of server functions. #t is characteri1ed by a minimal
operatin" architecture that re5uires no per seat network operatin" system license, and
client access that is independent of any operatin" system or proprietary protocol. #n
addition the device server is a @closed bo/,@ deliverin" e/treme ease of installation,
minimal maintenance, and can be mana"ed by the client remotely via a Web browser.
4rint servers, terminal servers, remote access servers and network time servers are
e/amples of device servers which are speciali1ed for particular functions. $ach of these
types of servers has uni5ue confi"uration attributes in hardware or software that help
them to perform best in their particular arena.
#rint )er$ers
4rint servers allow printers to be shared by other users on the network. &upportin" either
parallel and7or serial interfaces, a print server accepts print jobs from any person on the
network usin" supported protocols and mana"es those jobs on each appropriate printer.
4rint servers "enerally do not contain a lar"e amount of memoryJ printers simply store
information in a 5ueue. When the desired printer becomes available, they allow the host
to transmit the data to the appropriate printer port on the server. +he print server can then
simply 5ueue and print each job in the order in which print re5uests are received,
re"ardless of protocol used or the si1e of the job.
!ultiport -e$ice )er$ers
Devices that are attached to a network throu"h a multiport device server can be shared
between terminals and hosts at both the local site and throu"hout the network. A sin"le
terminal may be connected to several hosts at the same time )in multiple concurrent
sessions*, and can switch between them. !ultiport device servers are also used to
network devices that have only serial outputs. A connection between serial ports on
different servers is opened, allowin" data to move between the two devices.
?iven its natural translation ability, a multi-protocol multiport device server can perform
conversions between the protocols it knows, like 0A+ and +C47#4. While server
bandwidth is not ade5uate for lar"e file transfers, it can easily handle host-to-host
in5uiry7response applications, electronic mailbo/ checkin", etc. And it is far more
economical than the alternatives of ac5uirin" e/pensive host software and special-
purpose converters. !ultiport device and print servers "ive their users "reater fle/ibility
in confi"urin" and mana"in" their networks.
Whether it is movin" printers and other peripherals from one network to another,
e/pandin" the dimensions of interoperability or preparin" for "rowth, multiport device
servers can fulfill your needs, all without major rewirin".
Access )er$ers
While $thernet is limited to a "eo"raphic area, remote users such as travelin" sales
people need access to network-based resources. Remote 0A' access, or remote access, is
a popular way to provide this connectivity. Access servers use telephone services to link
a user or office with an office network. Dial-up remote access solutions such as #&D' or
asynchronous dial introduce more fle/ibility. Dial-up remote access offers both the
remote office and the remote user the economy and fle/ibility of @pay as you "o@
telephone services. #&D' is a special telephone service that offers three channels, two C>
Mbps @:@ channels for user data and a @D@ channel for settin" up the connection. With
#&D', the : channels can be combined for double bandwidth or separated for different
applications or users. With asynchronous remote access, re"ular telephone lines are
combined with modems and remote access servers to allow users and networks to dial
anywhere in the world and have data access. Remote access servers provide connection
points for both dial-in and dial-out applications on the network to which they are
attached. +hese hybrid devices route and filter protocols and offer other services such as
modem poolin" and terminal7printer services. 2or the remote 4C user, one can connect
from any available telephone jack )RD>=*, includin" those in a hotel rooms or on most
airplanes.
Network Time )er$ers
A network time server is a server speciali1ed in the handlin" of timin" information from
sources such as satellites or radio broadcasts and is capable of providin" this timin" data
to its attached network. &peciali1ed protocols such as '+4 or udp7time allow a time
server to communicate to other network nodes ensurin" that activities that must be
coordinated accordin" to their time of e/ecution are synchroni1ed correctly. ?4&
satellites are one source of information that can allow "lobal installations to achieve
constant timin".
# Addressing:
An #4 )#nternet 4rotocol* address is a uni5ue identifier for a node or host connection on
an #4 network. An #4 address is a 9, bit binary number usually represented as > decimal
values, each representin" 8 bits, in the ran"e - to ,== )known as octets* separated by
decimal points. +his is known as @dotted decimal@ notation.
$/ample% ;>-.;KA.,,-.,--
#t is sometimes useful to view the values in their binary form.
;>- .;KA .,,- .,--
;---;;--.;-;;--;;.;;-;;;--.;;--;---
$very #4 address consists of two parts, one identifyin" the network and one identifyin"
the node. +he Class of the address and the subnet mask determine which part belon"s to
the network address and which part belon"s to the node address.
Address %lasses:
+here are = different address classes. Eou can determine which class any #4 address is in
by e/aminin" the first > bits of the #4 address.
Class A addresses be"in with -///, or ; to ;,C decimal.
Class : addresses be"in with ;-//, or ;,8 to ;A; decimal.
Class C addresses be"in with ;;-/, or ;A, to ,,9 decimal.
Class D addresses be"in with ;;;-, or ,,> to ,9A decimal.
Class $ addresses be"in with ;;;;, or ,>- to ,=> decimal.
Addresses be"innin" with -;;;;;;;, or ;,K decimal, are reserved for loopback and for
internal testin" on a local machine. NEou can test this% you should always be able to pin"
;,K.-.-.;, which points to yourselfO Class D addresses are reserved for multicastin".
Class $ addresses are reserved for future use. +hey should not be used for host addresses.
'ow we can see how the Class determines, by default, which part of the #4 address
belon"s to the network )'* and which part belon"s to the node )n*.
Class A -- ''''''''.nnnnnnnn.nnnnnnn.nnnnnnn
Class : -- ''''''''.''''''''.nnnnnnnn.nnnnnnnn
Class C -- ''''''''.''''''''.''''''''.nnnnnnnn
#n the e/ample, ;>-.;KA.,,-.,-- is a Class : address so by default the 'etwork part of
the address )also known as the 'etwork Address* is defined by the first two octets
);>-.;KA././* and the node part is defined by the last , octets )/./.,,-.,--*.
#n order to specify the network address for a "iven #4 address, the node section is set to
all @-@s. #n our e/ample, ;>-.;KA.-.- specifies the network address for ;>-.;KA.,,-.,--.
When the node section is set to all @;@s, it specifies a broadcast that is sent to all hosts on
the network. ;>-.;KA.,==.,== specifies the e/ample broadcast address. 'ote that this is
true re"ardless of the len"th of the node section.
#ri$ate )u&nets:
+here are three #4 network addresses reserved for private networks. +he addresses are
;-.-.-.-78, ;K,.;C.-.-7;,, and ;A,.;C8.-.-7;C. +hey can be used by anyone settin" up
internal #4 networks, such as a lab or home 0A' behind a 'A+ or pro/y server or a
router. #t is always safe to use these because routers on the #nternet will never forward
packets comin" from these addresses
&ubnettin" an #4 'etwork can be done for a variety of reasons, includin" or"ani1ation,
use of different physical media )such as $thernet, 2DD#, WA', etc.*, preservation of
address space, and security. +he most common reason is to control network traffic. #n an
$thernet network, all nodes on a se"ment see all the packets transmitted by all the other
nodes on that se"ment. 4erformance can be adversely affected under heavy traffic loads,
due to collisions and the resultin" retransmissions. A router is used to connect #4
networks to minimi1e the amount of traffic each se"ment must receive.
)u&net !asking
Applyin" a subnet mask to an #4 address allows you to identify the network and node
parts of the address. +he network bits are represented by the ;s in the mask, and the node
bits are represented by the -s. 4erformin" a bitwise lo"ical A'D operation between the
#4 address and the subnet mask results in the 'etwork Address or 'umber.
2or e/ample, usin" our test #4 address and the default Class : subnet mask, we "et%
;---;;--.;-;;--;;.;;;;----.;;--;--- ;>-.;KA.,>-.,-- Class : #4 Address
;;;;;;;;.;;;;;;;;.--------.-------- ,==.,==.---.--- Default Class : &ubnet !ask
;---;;--.;-;;--;;.--------.-------- ;>-.;KA.---.--- 'etwork Address
-efault su&net masks:
Class A - ,==.-.-.- - ;;;;;;;;.--------.--------.--------
Class : - ,==.,==.-.- - ;;;;;;;;.;;;;;;;;.--------.--------
Class C - ,==.,==.,==.- - ;;;;;;;;.;;;;;;;;.;;;;;;;;.--------
C#DR -- Classless #nterDomain Routin".
C#DR was invented several years a"o to keep the internet from runnin" out of #4
addresses. +he @classful@ system of allocatin" #4 addresses can be very wastefulJ anyone
who could reasonably show a need for more that ,=> host addresses was "iven a Class :
address block of C==99 host addresses. $ven more wasteful were companies and
or"ani1ations that were allocated Class A address blocks, which contain over ;C !illion
host addressesH nly a tiny percenta"e of the allocated Class A and Class : address space
has ever been actually assi"ned to a host computer on the #nternet.
4eople reali1ed that addresses could be conserved if the class system was eliminated. :y
accurately allocatin" only the amount of address space that was actually needed, the
address space crisis could be avoided for many years. +his was first proposed in ;AA, as
a scheme called &upernettin".
+he use of a C#DR notated address is the same as for a Classful address. Classful
addresses can easily be written in C#DR notation )Class A P 78, Class : P 7;C, and Class
C P 7,>*
#t is currently almost impossible for an individual or company to be allocated their own
#4 address blocks. Eou will simply be told to "et them from your #&4. +he reason for this
is the ever-"rowin" si1e of the internet routin" table. Dust = years a"o, there were less
than =--- network routes in the entire #nternet. +oday, there are over A-,---. .sin"
C#DR, the bi""est #&4s are allocated lar"e chunks of address space )usually with a subnet
mask of 7;A or even smaller*J the #&4Is customers )often other, smaller #&4s* are then
allocated networks from the bi" #&4Is pool. +hat way, all the bi" #&4Is customers )and
their customers, and so on* are accessible via ; network route on the #nternet.
#t is e/pected that C#DR will keep the #nternet happily in #4 addresses for the ne/t few
years at least. After that, #4vC, with ;,8 bit addresses, will be needed. .nder #4vC, even
sloppy address allocation would comfortably allow a billion uni5ue #4 addresses for
every person on earth
*/amining your network with commands:
4in"
4#'? is used to check for a response from another computer on the network. #t can tell
you a "reat deal of information about the status of the network and the computers you are
communicatin" with.
4in" returns different responses dependin" on the computer in 5uestion. +he responses
are similar dependin" on the options used.
4in" uses #4 to re5uest a response from the host. #t does not use +C4
.#t takes its name from a submarine sonar search - you send a short sound burst and listen
for an echo - a pin" - comin" back.
#n an #4 network, Qpin"I sends a short data burst - a sin"le packet - and listens for a sin"le
packet in reply. &ince this tests the most basic function of an #4 network )delivery of
sin"le packet*, itIs easy to see how you can learn a lot from some Qpin"sI.
+o stop pin", type control-c. +his terminates the pro"ram and prints out a nice summary
of the number of packets transmitted, the number received, and the percenta"e of packets
lost, plus the minimum, avera"e, and ma/imum round-trip times of the packets.
&ample pin" session
4#'? localhost );,K.-.-.;*% =C data bytes
C> bytes from ;,K.-.-.;% icmpRse5P- ttlP,== timeP, ms
C> bytes from ;,K.-.-.;% icmpRse5P; ttlP,== timeP, ms
C> bytes from ;,K.-.-.;% icmpRse5P, ttlP,== timeP, ms
C> bytes from ;,K.-.-.;% icmpRse5P9 ttlP,== timeP, ms
C> bytes from ;,K.-.-.;% icmpRse5P> ttlP,== timeP, ms
C> bytes from ;,K.-.-.;% icmpRse5P= ttlP,== timeP, ms
C> bytes from ;,K.-.-.;% icmpRse5PC ttlP,== timeP, ms
C> bytes from ;,K.-.-.;% icmpRse5PK ttlP,== timeP, ms
C> bytes from ;,K.-.-.;% icmpRse5P8 ttlP,== timeP, ms
C> bytes from ;,K.-.-.;% icmpRse5PA ttlP,== timeP, ms
localhost pin" statistics
;- packets transmitted, ;- packets received, -S packet loss
round-trip min7av"7ma/ P ,7,7, ms
meikroT
+he +ime +o 0ive )++0* field can be interestin". +he main purpose of this is so that a
packet doesnIt live forever on the network and will eventually die when it is deemed
@lost.@ :ut for us, it provides additional information. We can use the ++0 to determine
appro/imately how many router hops the packet has "one throu"h. #n this case itIs ,==
minus ' hops, where ' is the ++0 of the returnin" $cho Replies. #f the ++0 field varies
in successive pin"s, it could indicate that the successive reply packets are "oin" via
different routes, which isnIt a "reat thin".
+he time field is an indication of the round-trip time to "et a packet to the remote host.
+he reply is measured in milliseconds. #n "eneral, itIs best if round-trip times are under
,-- milliseconds. +he time it takes a packet to reach its destination is called latency. #f
you see a lar"e variance in the round-trip times )which is called @jitter@*, you are "oin" to
see poor performance talkin" to the host
N)L((20#
'&0M.4 is an application that facilitates lookin" up hostnames on the network. #t
can reveal the #4 address of a host or, usin" the #4 address, return the host name.
#t is very important when troubleshootin" problems on a network that you can verify the
components of the networkin" process. 'slookup allows this by revealin" details within
the infrastructure.
N*T)TAT
'$+&+A+ is used to look up the various active connections within a computer. #t is
helpful to understand what computers or networks you are connected to. +his allows you
to further investi"ate problems. ne host may be respondin" well but another may be less
responsive.
#config
+his is a !icrosoft windows '+, ,--- command. #t is very useful in determinin" what
could be wron" with a network.
+his command when used with the 7all switch, reveal enormous amounts of
troubleshootin" information within the system.
Windows ,--- #4 Confi"uration
Bost 'ame . . . . . . . . . . . . % cowder
4rimary D'& &uffi/ . . . . . . . %
'ode +ype . . . . . . . . . . . . % :roadcast
#4 Routin" $nabled. . . . . . . . % 'o
W#'& 4ro/y $nabled. . . . . . . . % 'o
W#'& 4ro/y $nabled. . . . . . . . % 'o
Connection-specific D'& &uffi/ . %
Description . . . . . . . . . . . %
WA' )4447&0#4* #nterface
4hysical Address. . . . . . . . . % ---=9->=---------
DBC4 $nabled. . . . . . . . . . . % 'o
#4 Address. . . . . . . . . . . . % ;,.A-.;-8.;,9
&ubnet !ask . . . . . . . . . . . % ,==.,==.,==.,==
Default ?ateway . . . . . . . . . % ;,.A-.;-8.;,=
D'& &ervers . . . . . . . . . . . % ;,.;-,.,>>.,
,->.;,K.;,A.,
Traceroute
+raceroute on .ni/ and 0inu/ )or tracert in the !icrosoft world* attempts to trace the
current network path to a destination. Bere is an e/ample of a traceroute run to
www.berkeley.edu%
T traceroute www.berkeley.edu
traceroute to amber.:erkeley.$D. );,8.9,.,=.;,*, 9- hops ma/, >- byte packets
; sf;-e9.wired.net ),-C.,,;.;A9.;* 9.;9= ms 9.-,; ms 9.C;C ms
, sf--e,s,.wired.net ),-=.,,K.,-C.99* ;.8,A ms 9.88C ms ,.KK, ms
9 paloalto-cr;-.bbnplanet.net );9;.;;A.,C.;-=* =.9,K ms >.=AK ms =.K,A ms
> paloalto-br;.bbnplanet.net );9;.;;A.-.;A9* >.8>, ms >.C;= ms 9.>,= ms
= sl-sj-,.sprintlink.net )>.-.;.CC* K.>88 ms 98.8-> ms K.K-8 ms
C ;>>.,9,.8.8; );>>.,9,.8.8;* C.=C- ms C.C9; ms C.=C= ms
K ;>>.,9,.>.AK );>>.,9,.>.AK* K.C98 ms K.A>8 ms 8.;,A ms
8 ;>>.,,8.;>C.=- );>>.,,8.;>C.=-* A.=-> ms ;,.C8> ms ;C.C>8 ms
A f=--.inr-CCC-eva.berkeley.edu );A8.;,8.;C.,;* A.KC, ms ;-.C;; ms ;-.>-9 ms
;- f---.inr-;-K-eva.:erkeley.$D. );,8.9,.,.;* ;;.>K8 ms ;-.8C8 ms A.9CK ms
;; f8--.inr-;---eva.:erkeley.$D. );,8.9,.,9=.;--* ;-.K98 ms ;;.CA9 ms ;,.=,- ms
,eturn to the top of the page
3:: #rogramming ::3
Active <
A&4
Assembly
:asic
C and CUU
C?#
Cobol
Cold2usion
C&&
Delphi
DB+!0
B+!0
Dava
Dava&cript
pen?0
4ascal
4erl
4B4
4ython
&V0
+cl7+M
3isual :asic
3R!0
W!0
<!0
3:: 1ardware ::3
Case
C4.
Bard Drive
!emory
!otherboard
3:: T )olutions ::3
Bostin" solutions
4ricin" &olutions
3:: %ertifications ::3
AU
Cisco
#+ &chools
!C&$
'etwork 4lus
3:: (ther ::3
:e"inners ?uide
'etworkin"
racle
&ecurity
&ite 4romotions
3:: () ::3
D&
0inu/
!ac&
Windows ,---
Windows A8
Windows '+
Windows <4
.ni/
3:: )oftwares ::3
9D &tudio !a/
Access
A0
2lash
#nternet $/plorer
!aya
utlook
4hotohop
Word

You might also like