Sunteți pe pagina 1din 43

CERTIFICATE

This is to certify that the practical training report titled Networking and Server Administration is submitted by Saadat Abubakr, enrollment number 1593 of the Department of Computer Sciences and Engineering in partial fulfillment of the requirement for the award of degree Bachelor of Engineering (B.E) in Computer Sciences and Engineering of the SSM College of Engineering And Technology, Parihaspora, Pattan Baramulla.

Head Of Deparment (CSE) Er. Yasmeen

Principal Dr. N.A. Shah

Acknowledgement

God gives us life to decorate it with knowledge. Life without knowledge is like without waste. An engineer without technical training is like a soldier without a weapon. The acknowledgement gives me a pleasure to express my grateful thanks to those who took keen interest in completing the training report. I am heartily indebted to my industrial training coordinators Mr. Jeet Singh and Mr. Prashant Singh at HP Educational Services for their valuable instructions. I am thankful to ER. Yasmeen ( HOD Department of CSE) & all faculty members. I think that without the help of the above people, I would not have been able to complete this training. It is due to the help of these people that this complete report is in your hand. I hope you would like my report and appreciate the effort. At last but not at least I am thankful to all my teachers & friends who have been always helping and encouraging me through the year.

31

31

31

31

CONTENTS

1. 2.

Company Profile Introduction Networking Elements of Network

6 7 8 9 11 14 18 20 22 24 26 28 30 31

3. 4. 5. 6. 7. 8. 9. 10. 11. 12.

Types Of Networks Networking Models Passive Components IP Addressing Router Routing Protocols Firewall Ethernet Standards Choosing the appropriate LAN devices References

31

Company Profile
Hewlett-Packard Company or HP is an American multinational information technology corporation headquartered in Palo Alto, California, United States. It provides products, technologies, software, solutions and services to consumers, small- and medium-sized businesses (SMBs) and large enterprises, including customers in the government, health and education sectors. HP is the world's leading PC manufacturer. It specializes in developing and manufacturing computing, data storage, and networking hardware, designing software and delivering services. Major product lines include personal computing devices, enterprise, and industry standard servers, related storage devices, networking products, software and a diverse range of printers, and other imaging products. HP Education Services is the most reputed name in High End Technical Education. HP mentors, Guides and encourages you to strive for excellence. HP has been in the education business for over 28 years and is present in more than 400 HP education centers and partner locations. We have trained professionals from the top most companies of the world. We do induction batches training for many companies. Bill Hewlett said about the culture of HP, the HP Way is "a core ideology ...

which includes a deep respect for the individual, a dedication to affordable quality and reliability, a commitment to community responsibility, and a view that the company exists to make technical contributions for the advancement and welfare of humanity."

31

Introduction
The globalization of the Internet has succeeded faster than anyone could have imagined. The manner in which social, commercial, political and personal interactions occur is rapidly changing to keep up with the evolution of this global network. In the next stage of our development, innovators will use the Internet as a starting point for their efforts - creating new products and services specifically designed to take advantage of the network capabilities. As developers push the limits of what is possible, the capabilities of the interconnected networks that form the Internet will play an increasing role in the success of these projects. The methods that we use to share ideas and information are constantly changing and evolving. Whereas the human network was once limited to face-to-face conversations, media breakthroughs continue to extend the reach of our communications. From the printing press to television, each new development has improved and enhanced our communication. As with every advance in communication technology, the creation and interconnection of robust data networks is having a profound effect. Early data networks were limited to exchanging character-based information between connected computer systems. Current networks have evolved to carry voice, video streams, text, and graphics between many different types of devices. Previously separate and distinct communication forms have converged onto a common platform.

31

Networking
A networking is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Inter-networking refers to the industry, products, and procedures that meet the challenge of creating and administering inter-networks. Initially, data networks were used by businesses to internally record and manage financial information, customer information, and employee payroll systems. These business networks evolved to enable the transmission of many different types of information services, including e-mail, video, messaging, and telephony. Intranets, private networks in use by just one company, enable businesses to communicate and perform transactions among global employee and branch locations. Companies develop extranets, or extended internetworks, to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists. Today, networks provide a greater integration between related functions and organizations than was possible in the past.

31

Elements of Network
The diagram shows elements of a typical network, including devices, media, and services, tied together by rules, that work together to send messages. We use the word messages as a term that encompasses web pages, e-mail, instant messages, telephone calls, and other forms of communication enabled by the Internet.

31

Intermediate Devices
Following figure shows some of the most common intermediate devices, used to direct and manage messages across the network, as well as other common networking symbols. Generic symbols are shown for: Switch - the most common device for interconnecting local area networks Firewall -provides security to networks Router - helps direct messages as they travel across a network Wireless Router - a specific type of router often found in home networks Cloud - used to summarize a group of networking devices, the details of which may be unimportant to the discussion at hand Serial Link - one form of WAN interconnection, represented by the lightning bolt-shaped line.

31

TYPES OF NETWORKS LAN (LOCAL AREA NETWORK)


These are privately owned networks within a single building or campus of up to few a kilometers in size. LANs are distinguished from other networks by three characteristics:
1) 2) 3)

Their size .2) Their transmission technology. 3) Their topology.

LANs are restricted in size, which means that the worst-case transmission time is bounded and known in advance. LANs often use a transmission technology consisting of a single cable to which all the machines are attached. LANs run at speeds of 10 to 100 Mbps, have low delays, and make very few errors.

31

WAN (WIDE AREA NETWORK)


It is a Computer network that spans a relatively large geographical area, often acountry or continent. Ty pically a WAN consists of two or more Local AreaNetwork.Computers connected to WAN are often connected through public networks such as telephone systems. They can also be connected through leased lines or satellites. The largest WAN in existence is Internet .WANs run at speed of maximum 2 to 10 Mbps.

31

WAN SETUP
For most WANs, the long distance bandwidth is relatively slow: on the order of kilobits per second (kbps) as opposed to megabits per second (Mbps) for localarea networks (LANs). For example, an Ethernet LAN has a 10 Mbp sbandwidth; a WAN using part or all of a T1 carrier has a bandwidth of 1.544Mbps . Three types of approaches are used to connect WANs:

31

1) Circuit switching, which provides a fixed connection (at least for the duration of a call or session), so that each packet takes the same path. Examples of this approach include ISDN, Switched 56, and Switched T1. 2) Packet switching, which establishes connections during the transmission process so that different packets from the same transmission may take different routes and may arrive out of sequence at the destination. Examples of this approach are X.25, frame relay, and ATM. 3) Leased lines, which can provide a dedicated connection for private us

NETWORK MODELS
Layering Concepts and Benefits Many benefits can be gained from the process of breaking up the functions or tasks of networking into smaller chunks, called layers,and defining standard interfaces between these layers. The layers break a large, complex set of concepts and protocols into smaller pieces, making it easier to talk about, to implement with hardware and software, and to troubleshoot.
31

The following list summarizes the benefits of layered protocol Specifications:

Humans can more easily discuss and learn about the many details of a protocol specification. Standardized interfaces among layers facilitate modular engineering. A better environ ment for interoperability is created. One vendor can writesoftware that implements higher layersfor example, a Web browserandanother can write software that i mplements the lower layersfor exa mple,Microsofts built-in TCP/IP software in its operating systems. Reduced complexity allows easier program changes and fa s t e r p r o d u c t evolution. One lay er uses the services of the layer immediately below it. Therefore,remembering what each layer does is easier. (For example, the network layer needs to deliver data from end to end. To do this, it uses data links to forward data to the next successive device along that end-to-end path.)

OSI NETWORK MODEL


The OSI model describes how information makes its way from application er computer. It divides one big problem in to seven smaller problems. Each lem is addressed by one of the seven layers of the OSI model. proprobgrams through a network medium to another application program in oth-

31

Functions of Network Layers in Brief:


APPLICATION LAYER
Used

for applications specifically written to run over the network

Allows access to network services that support applications; Directly represents the services that directly support user applications Handles network access, flow control and error recovery Example apps are file transfer, e-mail, Net BIOS-based applications

PRESENTATION LAYER
Translates from application to network format and vice-versa All different formats from all sources are made into a common uniform format that the rest of the OSI model can understand Responsible for protocol conversion, character conversion, data encryption / decryption, expanding graphics commands, data compression Sets standards for different systems to provide seamless communication from multiple protocol stacks Not always implemented in a network protocol

31

SESSION LAYER
Establishes, maintains and ends sessions across the network Responsible for name recognition (identification) so only the designated parties can participate in the session Provides synchronization services by planning check points in the datastream => if session fails, only data after the most recent checkpoint need be transmitted Manages who can transmit data at a certain time and for how long Examples are interactive login and file transfer connections, the session would connect and re-connect if there was an interruption; recognize names in sessions and register names in history
31

TRANSPORT LAYER
Additional connection below the session layer Manages the flow control of data between parties across the network Divides streams of data into chunks or packets; the transport layer of the receiving computer reassembles the message from packets "Train" is a good analogy => the data is divided into identical units Provides error-checking to guarantee error-free data delivery, with on losses or duplications Provides acknowledgment of successful transmissions; requests retransmission if some packets dont arrive error-free Provides flow control and error-handling TCP, ARP, RARP;

NETWORK LAYER
Translates logical network address and names to their physical address(e.g. computer name ==> MAC address) Responsible for addressing and determining routes for sending Managing network problems such as packet switching, data congestion and routing If router cant send data frame as large as the source computer sends, the network layer compensates by breaking the data into smaller units. At the receiving end, the network layer reassembles the data Think of this layer stamping the addresses on each train car IP; ARP; RARP, ICMP; RIP; OSFP

31

DATA LINK LAYER


Turns packets into raw bits 100101 and at the receiving end turns bits into packets. Handles data frames between the Network and Physical layers The receiving end packages raw data from the Physical layer into data frames for delivery to the Network layer Responsible for error-free transfer of frames to other computer via the Physical Layer This layer defines the methods used to transmit and receive data on the network. It consists of the wiring, the devices use to connect the NIC to the wiring, the signaling involved to transmit / receive data and the ability to detect signaling errors on the network media Logical Link Control Error correction and flow control Manages link control and defines SAPs

PHYSICAL LAYER
Transmits raw bit stream over physical cable Defines cables, cards, and physical aspects Defines NIC attachments to hardware, how cable is attached to NIC Defines techniques to transfer bit stream to cable

31

Passive Components
Passive components are those devices which are used to provide connectivity between different networking devices. It includes Cables Patch Panel Patch Cord I/O box Racks RJ-45 Connectors

CABLES
There are different Cabling options depending on the access method :

Twisted pair
The wires are twisted around each other to minimize interference from other twisted pairs in the cable. Twisted pair cables are available unshielded (UTP) or shielded (STP). UTP is the most common type and uses a RJ-45 Connector. Typical lengths are up to 100m.Twisted pair network uses a star topology.

Coaxial Cable
Coaxial cable uses BNC connectors. The maximum cable lengths are around 500m.Coaxial networks use a single bus topology.

31

Fiber Optic
UTP and Co-axial cables are not capable for driving the data signals for long distance i.e. UTP is capable of transmitting up to a distance 100 meters only By using the Fiber cables it is possible to send the data about 10 kilometers. Fiber optic cable uses SC, ST, LC connectors (most common in use is SC connector). There are two types of Fibre optic cable available. 1. Single mode: In this mode typical length is up to 12km and data rate is1000Mbps. The core diameter is about 9.25 nm cable is known as 1000 base LXcable. 2. Multi mode: This mode is further categorised in two: 1) SX: Typical length is up to 500m and data rate is 1000Mbps. 2) FX: Typical length is up to 220m and data rate is 100Mbps.

PATCH PANEL
A patch panel provides a convenient place to terminate (connect) all of the cable coming from different locations into the wiring closet. We connect the cables coming from various locations willing to connect to switch through the patch panel.

NEED OF PATCH PANEL


We can label the patch panel so we know that which wire belongs to which location.Without a patch panel, it is chaotic. If we want to disconnect a station from the switch, it's a lot easier if there's a label. Most cabling is wired "straight-through" from end to end. But sometimes we need to cross-wire some of the pairs between

31

switch and station, like with a cable modem, or cross-wire to connect two switches. With a patch panel, all of this cross-wiring is done in the patch cable.

IP ADDRESSING
Every machine on the internet has a unique identifying number, called an IP Address. A typical IP address looks like this:216.27.61.45. IP ADDRESS is a 32-bit number, usually written in dotted decimal form, that uniquely identifies an interface of some computer. This 32-bit number is divided into 4 octets each separated by a decimal. Out so many values certain values are restricted for use as typical IP address. For example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255is used for broadcast. Each IP address is split into 2 sections: 1)Network address 2)Host address. Individual IP address in same network all have a different value in the host part of address, but they have identical value in network part, just as in town there are different street address but same ZIP code.

IP Address Classes
There are five IP classes: Class A

31

This class is for very large networks, such as a major international company. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are each used to identify each host. Loopback - The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing. Class B - Class B is used for medium-sized networks. A good example is a larg ecollege campus. IP addresses with a first octet from 128 to191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host. Class C - Class C addresses are commonly used for small to mid-size business. IP addresses with a first octet from192 to 223 are part of this class. Class C addresses also include the second and third octets as part of Net identifier. The last octet is used to identify each host. Class D - It is used for multicast. It has first bit value of 1, second bit value of 1,third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast messages is intended for. Class E - It is used for experimental purpose only. Private IP It is not necessary that every time we make a network we are connected to some ISP (Internet Service Provider). So in that case we require some private IP also
31

which can be used in indigenous networks .In each class a range of IP addresses have been defined for this purpose CLASS A 10.0.0.1 to 10.255.255.244 CLASS B 172.16.0.1 to 172.34.255.254 CLASS C 192.168.0.0/16

SUBNETTING
Basically it is a process of subdividing networks into smaller subnets. In case we have 2-3 small networks but we cant buy IP address for each and every network. So here we use the basic concept of SUBNETTING i.e using IP address we will give them IP address and make them independent networks. For this we take some bits of host address and use them for network address so we have different independent networks. Example If subnet mask is 255.255.240.0 And an IP address for a computer is given as 142.16.52.4 142.16.0.0 is network address 0.0.48.0 is the subnet address 0.0.4.4 is the host address of the computer 10001110.00010000.00110100.00000100 is ANDed with11111111.11111111.11110000.00000000 and output is 10001110.00010000.00110000.00000000

31

here first two octets represents Network address and third octet represents subnet address .It can be compared with a postal address as there is only one ZIP code (Networkaddress), different streets (Subnet address), and different house number (Hostaddress).

ROUTER
Switch and the Hub can only interconnect devices in a single LAN. For interconnecting two LAN or two or more different networks anther device known as router is used. Its main job is to route ( sends ) packets to other networks and to do the routing ( establishing paths between networks ) it uses the IP address. A router is typically connected to at least two networks, commonly two LANs or WANs or a LAN and its ISPs network. Routers are located at gateways, the places where two or more networks connect. Routers to determine the best path for forwarding the packet are using forwarding tables

ROUTER INTERNAL COMPONENTS


Like a computer, a router has a CPU that varies in performance and capabilities depending upon router platform. It has typically 4 types of memory in it : ROM - It is used to store the routers bootstrap startup program, operating system software, and power-on diagnostic tests programs. We can also upgrade our ROM FLASH MEMORY

31

- It holds operating systems image(s). Flash memory is erasable, reprogrammable ROM. Our IOS software is present in this memory and we can upgrade it also. Flash content is retained even when we switch off or restart the router. RAM - It is used to store operational information such as routing tables, routersrunning configuration file. RAM also provides caching and packet buffering capabilities. Its content is lost when we switch off or restart the router. When we configure the router at that time actually we are writing in RAM.

NVRAM - It is used to store the routers startup configuration file. It does not losedata when power is switched off. So the contents of startup configuration files aremaintained even when we switch off or restart the router. ROUTERS NETWORK INTERFACES

Ethernet or Token Ring interface are configured to allow connection to a LAN. Synchronous serial interfaces are configured to allow connections to WANs. ISDN BRI interfaces are configured to allow connection to an ISDN WAN.
31

All cisco routers have a console port that provides an EIA/TIA-232asynchronous serial connection. Console port can be connected to computers serial connection to gain terminal access to router. Most routers also have an auxiliary portthat is very similar to console port but,is typically used for modem connection for remote router management.

CONFIGURING THE ROUTER

31

There are three methods for configuring the router: Through console port:- The console port is used for configuring a router locally with the help of a PC or a Laptop. The console port of the router is connected to the serial i.e COM port of the router. Through the AUX port:- The aux ( auxiliary ) port is accessed from a modem located faraway from a router through the PSTN ( Public Switched Telephone Network ) and the configuration is done. Through Telnet:- Line vty ( virtual terminal ) 0 to 4 are used for the configuring the router by telnet.

1)

2)

3)

ROUTING PROTOCOLS
ROUTING INFORMATION PROTOCOL (RIP)
RIP is a dynamic, distance vector routing protocol. RIP uses UDP port 520 for route updates. RIP calculates the best route based on hop count. This makes RIP very fast to converge RIP sends full table updates at regular intervals specified by the route-up datetimer (30 seconds is the default). It summarizes all routes it knows along classfull boundaries and sends the summary information to all other RIP routing devices. RIP updates can contain up to 25 messages. RIP TIMERS TIMER DEFAULT CONTROLS

31

Update tisements Timeout 'live' in the routing table.

30 sec. 180 sec

Interval between route update adverInterval a route should stay

This counter is reset every time the router hears an update for this route. Flush 240 sec. How long to wait from the time the route was received to delete a route (60 seconds after timeout). The routing-update timer controls the time between routing updates. Default is usually 30 seconds, plus a small random delay to prevent all RIP routers from sending updates simultaneously. The route-timeout timer controls when a route is no longer available. The default is usually 180 seconds. If a router has not seen the route in an update during this specified interval, it is dropped from the router's announcements. The route is maintained long enough for the router to advertise the route as down (hop count of 16).The route-flush timer controls how long before a route is completely flushed from the routing table. The default setting is usually 120 seconds.

IGRP
IGRP is a distance-vector routing protocol that considers a composite metric which, by default, uses bandwidth and delay as parameters instead of hop count. IGRP is not limited to the 15-hop limit of RIP. IGRP has a maximum hop limit of 100, by default, and can be configured to support a network diameter of 255.With IGRP, routers usually select paths with a larger minimum-link band widthover paths with a smaller hop count. Links do not have a hop count. They are exactly one hop. IGRP is available only on Cisco routers IGRP will load-balance traffic if there are several paths with equal cost to the destination IGRP sends its routing ta-

31

ble to its neighbors every 90 seconds. IGRP's default update period of 90 seconds is a benefit compared to RIP, which can consume excessive bandwidth when sending updates every 30 seconds. IGRP uses an invalid timer to mark a route as invalid after 270 seconds (three times the updatetimer). As with RIP, IGRP uses a flush timer to remove a route from the routingtable; the default flush timer is set to 630 seconds (seven times the update period and more than 10 minutes).If a network goes down or the metric for the network increases, the route is placed in holddown. The router accepts no new changes for the route until theholddown timer expires. This setup prevents routing loops in the network. The default hold down timer is 280 seconds (three times the update timer plus 10seconds).

IP ACCESS LIST
IP access lists causes a router to discard some packets based on criteria defined by the network engineer. The goal of these filters is to prevent unwanted traffic in the networkwhether to prevent hackers from penetrating the network, or just to prevent employees from using systems that they should not be using. Key features of access lists: Packets can be filtered as they enter an interface, before the routing decision. Packets can be filtered before they exit an interface, after the routing decision.

31

Deny is the term used in Cisco IOS software to imply that the packet will befiltered. Permit is the term used in Cisco IOS software to imply that the packet will notbe filtered The filtering logic is configured in the access list. At the end of every access list is an implied deny all traffic statement. Therefore, if a packet does not match any of your access list statements, it is blocked. Access lists have two major steps in their logic: matching and action. Matching logic examines each packet and determines whether it matches the access-list statement. As soon as an access-list statement is matched, there are two actions to choose from: deny and permit. Deny means to discard the packet, and permit implies that the packet should continue on its way.

FIREWALL
As the limits of networking is increasing unfolded so the danger of information leaking in and leaking out increases. So a mechanism is required to keep goodbits in and bad bits out. And for this we use FIREWALL.A firewall is a device of some kind that separates and protects our network - inmost cases, from the Internet. It restricts traffic to only what is acceptable, and monitors that what is happening. Every firewall has at least two network interfaces, one for the network it is intended

31

to protect, and one for the network it is exposed to. A firewall sits at the junction point or gateway between the two networks, usually a private network and a public network such as the Internet. It may be a hardware deviceor a software program running on a secure hostcomputer. Hardware device means a physical devise connected at the gateway which checks every incoming or outgoing packet. Software program means that software is loaded in computer that determines aswhat to allow and what to reject. A firewall examines all traffic routed between the two networks to see if it meets certain criteria. A firewall filters both inbound and outbound traffic.

Technologies
There are three different types of firewall technologies: 1)Packet Filtering 2)Proxy 3)Stateful Inspection

1.

Packet Filtering

A packet filtering firewall simply inspects incoming traffic at the transport layer of the OSI model. The packet filtering firewall analyzes TCP or UDP packets andcompare them to a set of established rules called as Access Control List (ACL).Packet filtering inspects packet nly for following elements Source IP address

31

Source Port Destination IP address Destination Port Protocol Proxy

2.

When a firewall is installed then no PC makes direct connection to the outside world. In that case they use proxy i.e each PC first of all sends request to proxy which then forwards the request to the internet or outside world for connection or data transfer.
3.

Stateful Inspection

It is a combination of Packet filtering and proxy services. This is the most secure technology and provides the most functionality because connections are not only applied to ACL, but are logged into a static table. After a connection is established, all session data is compared to the static table. If the session data does not match the state table information for that connection, then connection is dropped.\

CONFIGURING THE FIREWALL


Five basic commands are used to do a basic configuring of the firewall. interface nameif
31

ip-address nat Global

Ethernet Standards
The first LAN in the world was the original version of Ethernet. Robert Metcalfe and his coworkers at Xerox designed it more than thirty years ago. Ethernet operates in the lower two layers of the OSI model: the Data Link layer and the Physical layer. Ethernet operates across two layers of the OSI model. The model provides a reference to which Ethernet can be related but it is actually implemented in the lower half of the Data Link layer, which is known as the Media Access Control (MAC) sublayer, and the Physical layer only. Ethernet at Layer 1 involves signals, bit streams that travel on the media, physical components that put signals on media, and various topologies. Ethernet Layer 1 performs a key role in the communication that takes place between devices, but each of its functions has limitations. Ethernet at Layer 2 addresses these limitations. The Data Link sublayers contribute significantly to technological compatibility and computer communications. The MAC sublayer is concerned with the physical components that will be used to communicate the information and prepares the data for transmission over the media. The Logical Link Control (LLC) sublayer remains relatively independent of the physical equipment that will be used for the communication process.

31

Ethernet separates the functions of the Data Link layer into two distinct sublayers: the Logical Link Control (LLC) sublayer and the Media Access Control (MAC) sublayer. For Ethernet, the IEEE 802.2 standard describes the LLC sublayer functions, and the 802.3 standard describes the MAC sublayer and the Physical layer functions. Logical Link Control handles the communication between the upper layers and the networking software, and the lower layers, typically the hardware. The LLC sublayer takes the network protocol data, which is typically an IPv4 packet, and adds control information to help deliver the packet to the destination node. Layer 2 communicates with the upper layers through LLC. LLC is implemented in software, and its implementation is independent of the physical equipment. In a computer, the LLC can be considered the driver software for the Network Interface Card (NIC). The NIC driver is a program that interacts directly with the hardware on the NIC to pass the data between the media and the Media Access Control sublayer.

Media Access Control (MAC) is the lower Ethernet sublayer of the Data Link layer. Media Access Control is implemented by hardware, typically in the computer Network Interface Card (NIC).

31

The Ethernet MAC sublayer has two primary responsibilities: Data Encapsulation Media Access Control

Data Encapsulation Data encapsulation provides three primary functions: Frame delimiting Addressing Error Detection

Media Access Control


The MAC sublayer controls the placement of frames on the media and the removal of frames from the media. As its name implies, it manages the media access control. This includes the initiation of frame transmission and recovery from transmission failure due to collisions.

Choosing The Appropriate LAN Devices


Intranetwork Devices
To create a LAN, we need to select the appropriate devices to connect the end device to the network. The two most common devices used are hubs and switches.

Hub

31

A hub receives a signal, regenerates it, and sends the signal over all ports. The use of hubs creates a logical bus. This means that the LAN uses multiaccess media. The ports use a shared bandwidth approach and often have reduced performance in the LAN due to collisions and recovery. Although multiple hubs can be interconnected, they remain a single collision domain. Hubs are less expensive than switches. A hub is typically chosen as an intermediary device within a very small LAN, in a LAN that requires low throughput requirements, or when finances are limited. Hubs are less expensive than switches. A hub is typically chosen as an intermediary device within a very small LAN, in a LAN that requires low throughput requirements, or when finances are limited.

Switch
A switch receives a frame and regenerates each bit of the frame on to the appropriate destination port. This device is used to segment a network into multiple collision domains. Unlike the hub, a switch reduces the collisions on a LAN. Each port on the switch creates a separate collision domain. This creates a point-to-point logical topology to the device on each port. Additionally, a switch provides dedicated bandwidth on each port, which can increase LAN performance. A LAN switch can also be used to interconnect network segments of different speeds. In general, switches are chosen for connecting devices to a LAN. Although a switch is more expensive than a hub, its enhanced performance and reliability make it cost effective. There is a range of switches available with a variety of features that enable the interconnection of multiple computers in a typical enterprise LAN setting.

Server
31

In most common use, a server is a physical computer (a computer hardware system) dedicated to running one or more services (as a host), to serve the needs of the users of other computers on the network. Depending on the computing service that it offers it could be a database server, file server, mail server, print server, web server, gaming server, or some other kind of server. In computer networking, a server is a program that operates as a socket listener. It is often generalized to describe a host that is deployed to execute one or more such programs. It is a computer or series of computers that link other computers or electronic devices together. They often provide essential services across a network, either to private users inside a large organization or to public users via the internet. For example, when you enter a query in a search engine, the query is sent from your computer over the internet to the servers that store all the relevant web pages. The results are sent back by the server to your computer.

Windows Server 2003


Windows Server 2003 is a server operating system produced by Microsoft. Windows Server 2003 Web is meant for building and hosting Web applications, Web pages, and XML web services. It is designed to be used primarily as an IIS 6.0 Web server and provides a platform for developing and deploying XML Web services and applications that use ASP.NET technology, a key part of the .NET Framework. Microsoft Windows Server 2003 Standard is aimed towards small to medium sized businesses. Standard Edition supports file and printer sharing, offers secure Internet connectivity, and allows centralized desktop application deployment.

Dynamic Host Configuration Protocol

31

The Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to configure network devices so that they can communicate on an IP network. A DHCP client uses the DHCP protocol to acquire configuration information, such as an IP address, a default route and one or more DNS server addresses from a DHCP server. The DHCP client then uses this information to configure its host. Once the configuration process is complete, the host is able to communicate on the internet. The DHCP server maintains a database of available IP addresses and configuration information. When it receives a request from a client, the DHCP server determines the network to which the DHCP client is connected, and then allocates an IP address or prefix that is appropriate for the client, and sends configuration information appropriate for that client. Because the DHCP protocol must work correctly even before DHCP clients have been configured, the DHCP server and DHCP client must be connected to the same network link. In larger networks, this is not practical. On such networks, each network link contains one or more DHCP relay agents. These DHCP relay agents receive messages from DHCP clients and forward them to DHCP servers. DHCP servers send responses back to the relay agent, and the relay agent then sends these responses to the DHCP client on the local network link. DHCP servers typically grant IP addresses to clients only for a limited interval. DHCP clients are responsible for renewing their IP address before that interval has expired, and must stop using the address once the interval has expired, if they have not been able to renew it.

Domain Name System


Domain Name System (DNS) is a system for naming computers and network
31

services that maps those names to network addresses and organizes them into a hierarchy of domains. DNS naming is used on TCP/IP networks, such as the Internet and most corporate networks, to locate computers and services by using user-friendly names. When a user enters the DNS name of a computer in an application, DNS can look up the name and provide other information that is associated with the computer, such as its IP address or services that it provides for the network. This process is called name resolution. Name systems, such as DNS, make it easier to use network resources by providing users with a way to refer to a computer or service by a name that is easy to remember. DNS looks up that name and provides the numeric address that operating systems and applications require to identify the computer on a network. A DNS name consists of two or more parts separated by periods, or "dots" (.). The last (rightmost) part of the name is called the top-level domain (TLD). Other parts of the name are subdomains of the TLD or another subdomain. The names of the TLDs are either functional or geographical. Subdomains usually refer to the organization that owns the domain name.

Drive Mapping
Drive mapping is how Microsoft Windows and OS/2 associate a local drive letter (A through Z) with a shared storage area to another computer over a network. After a drive has been mapped, a software application on a client's computer can read and write files from the shared storage area by accessing that drive, just as if that drive represented a local physical hard disk drive. All data on various mapped drives will have certain permissions set and the user will need the particular security authorizations to access it.

Types of Servers

31

Application server, a server dedicated to running certain software applications. Catalog server,a central search point for information across a distributed network Communications server, carrier-grade computing platform for communications networks Database server, provides database services to other computer programs or computers Fax server, provides fax services for clients File server, provides file services Game server, a server that video game clients connect to in order to play online together.

ISA server,provides the two basic services of an enterprise firewall and a Web proxy/cache server

Name server or DNS server

Print server, provides printer services Proxy server, acts as an intermediary for requests from clients seeking re-

sources from other servers


Sound server, provides multimedia broadcasting, streaming. Standalone server, an emulator for clientserver (web-based) programs Web server a server that HTTP clients connect to in order to send commands

and receive responses along with data contents.

31

References
www.google.com www.wikipedia.com www.microsoft.com/learning/en/us/default.aspx Data Communication and Networking by Behrouz A Forouzan

31

S-ar putea să vă placă și