Sunteți pe pagina 1din 84

NETWORK ESSENTIALS

Computer network is an interconnection of two or more computers and peripherals such as


printer and faxes.
Computer network allows
modem with a network.

the

user to share and transfer information using cables or

NEED FOR COMPUTER NETWORK


Computer network allows the user to share data with other users in a network for example
printers and faxes. Printer can be installed on one computer and can be accessed by other
users in a network by this the need of installing the printer is avoided on individual
computers. This results in cost effectiveness.
Computer network also allows the user to communicate with each other using instant
messaging tools to share ideas, files or solve queries.
TYPES OF NETWORKS

LOCAL AEA NETWORK (LAN)


A local area network (LAN) is a computer network covering a small physical area, like a
home, office, or small groups of buildings, such as a school, or an airport. The defining
characteristics of LANs, in contrast to wide area networks (WANs), include their usually
higher data-transfer rates, smaller geographic area, and lack of a need for leased
telecommunication lines.
Switched Ethernet is the most common Data Link Layer implementation on local area
networks. At the Network Layer, the Internet Protocol (i.e. TCP/IP) has become the standard.
Smaller LANs generally consist of one or more switches linked to each otheroften at least
one is connected to a router, cable modem, or ADSL modem for Internet access.
Larger LANs are characterized by their use of redundant links with switches using
the spanning tree protocol to prevent loops, their ability to manage differing traffic types
via quality of service (QoS), and to segregate traffic with VLANs. Larger LANs also contain
a wide variety of network devices such as switches, firewalls, routers, load balancers, and
sensors.[9]
LANs may have connections with other LANs via leased lines, leased services, or by
tunneling across the Internet using virtual private network technologies. Depending on how
the connections are established and secured in a LAN, and the distance involved, a LAN may
also be classified as METROPOLITAN AREA NETWORK (MAN)

CAMPUS AREA NETWORK (CAN)

A campus network is a computer network made up of an interconnection of local area


networks (LANs) within a limited geographical area.[1][2] The networking equipments
(switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc) are
almost entirely owned (by the campus tenant / owner: an enterprise, university, government
etc).
In the case of a university campus-based campus network, the network is likely to link a
variety of campus buildings including; academic departments, the university library and
student residence halls.

METROPOLITAN AREA NETWORK (MAN)

A metropolitan area network (MAN) is a large computer network that usually spans a city
or a large campus. A MAN usually interconnects a number of local area networks (LANs)
using a high-capacity backbone technology, such as fiber-optical links, and provides up-link
services to wide area networks (or WAN) and the Internet.
The IEEE 802-2001 standard describes a MAN as being
A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks
of buildings to entire cities. MANs can also depend on communications channels of
moderate-to-high data rates. A MAN might be owned and operated by a single organization,
but it usually will be used by many individuals and organizations. MANs might also be
owned and operated as public utilities. They will often provide means for internetworking
of local networks.
WIDE AREA NETWORK (WAN)
A wide area network (WAN) is a computer network that covers a broad area (i.e., any
network whose communications links cross metropolitan, regional, or national boundaries).
This is in contrast with personal area networks (PANs), local area networks (LANs), campus
area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a
room, building, campus or specific metropolitan area (e.g., a city) respectively.
WANs are used to connect LANs and other types of networks together, so that users and
computers in one location can communicate with users and computers in other locations.
Many WANs are built for one particular organization and are private. Others, built by Internet
service providers, provide connections from an organization's LAN to the Internet. WANs are
often built using leased lines. At each end of the leased line, a router connects to the LAN on
one side and a hub within the WAN on the other. Leased lines can be very expensive. Instead
of using leased lines, WANs can also be built using less costly circuit switching or packet
switching methods.
Network protocols including TCP/IP deliver transport and addressing functions. Protocols
including Packet over SONET/SDH, MPLS, ATM and Frame relay are often used by service
providers to deliver the links that are used in WANs. X.25was an important early WAN
protocol, and is often considered to be the "grandfather" of Frame Relay as many of the
underlying protocols and functions of X.25 are still in use today (with upgrades) by Frame
Relay.

There are also several ways to connect NonStop S-series servers to WANs, including via the
ServerNet Wide Area Network (SWAN) or SWAN 2 concentrator, which provides WAN
3

client connectivity to servers that have Ethernet ports and appropriate communications
software. You can also use the Asynchronous Wide Area Network (AWAN) access server,
which offers economical asynchronous-only WAN access. Several options are available for
WAN connectivity:

Options:

Description

Advantage Disadvantage
s
s

Leased

Point-to-Point
connection between
two computers or
LANs.

Most
Secure

Circuit
Switchin
g

A dedicated circuit
path is created
between end points.
Best example is dialup connections

Packet
Switchin
g

Devices transport
packets via a shared
single point-topoint/point-tomultipoint link across
a carrier internetwork.
Variable length
packets are
transmitted over PVC
or SVC
(Permanent/Switched
Virtual Circuits (SVC)

Cell
Relay

Similar to packet
switching, but uses
fixed length cells.
Data is divided in
fixed-length cells and

Less
Expensive

Bandwidth Sample Protocols


Range
Used

Expensive
PPP, HDLC,
SDLC, HNAS

Call Setup

Shared media
across link

Best for
Overhead can
simultaneo be
us use of
considerable
voice and
data
4

28 - 144
kbps

PPP,ISDN

X.25FrameRelay

ATM

transported across
virtual circuits
Transmission rates usually range from 1200 bps to 24 Mbps, although some connections such
as ATM and Leased lines can reach speeds greater than 156 Mbps. Typical communication
links used in WANs are telephone lines, microwave links & satellite channels.
Recently with the proliferation of low cost of Internet connectivity many companies and
organizations have turned to VPN to interconnect their networks, creating a WAN in that way.
Companies such as Cisco, New Edge Networks and Check Point offer solutions to create
VPN networks.

TOPOLOGIES
Topology is a pattern of computer devices and describes the way in which these devices are
connected. Topology can be physical or logical. Physical topology refers to the physical
structure of network, while a logical topology determines the way in which the data actually
passes through the network from one device to the other.
TYPES OF TOPOLOGIES
(1)
(2)
(3)
(4)
(5)
(6)

Star topology
Bus topology
Ring topology
Mesh topology
Tree topology
Hybrid topology

STAR TOPOLOGY

Star networks are one of the most common computer network topologies. In its simplest
form, a star network consists of one central switch, hub or computer, which acts as a conduit
to transmit messages. Thus, the hub and leaf nodes, and the transmission lines between them,
form a graph with the topology of a star. If the central node is passive, the originating node
must be able to tolerate the reception of an echo of its own transmission, delayed by the twoway transmission time (i.e. to and from the central node) plus any delay generated in the
central node. An active star network has an active central node that usually has the means to
prevent echo-related problems.
The star topology reduces the chance of network failure by connecting all of the systems to a
central node. When applied to a bus-based network, this central hub rebroadcasts all
transmissions received from any peripheral node to all peripheral nodes on the network,
sometimes including the originating node. All peripheral nodes may thus communicate with
all others by transmitting to, and receiving from, the central node only. The failure of a
transmission line linking any peripheral node to the central node will result in the isolation of
that peripheral node from all others, but the rest of the systems will be unaffected.
It is also designed with each node (file servers, workstations, and peripherals) connected
directly to a central network hub, switch, or concentrator.
Data on a star network passes through the hub, switch, or concentrator before continuing to
its destination. The hub, switch, or concentrator manages and controls all functions of the
network. It is also acts as a repeater for the data flow. This configuration is common
with twisted pair cable. However, it can also be used with coaxial cable or optical fibre cable.

Advantages

Better performance: Star topology prevents the passing of data packets through an
excessive number of nodes. At most, 3 devices and 2 links are involved in any
communication between any two devices. Although this topology places a huge overhead
on the central hub, with adequate capacity, the hub can handle very high utilization by
one device without affecting others.

Isolation of devices: Each device is inherently isolated by the link that connects it to
the hub. This makes the isolation of individual devices straightforward and amounts to
disconnecting each device from the others. This isolation also prevents any noncentralized failure from affecting the network.

Benefits from centralization: As the central hub is the bottleneck, increasing its
capacity, or connecting additional devices to it, increases the size of the network very
easily. Centralization also allows the inspection of traffic through the network. This
facilitates analysis of the traffic and detection of suspicious behavior.

Simplicity: This topology is easy to understand, establish, and navigate. Its simplicity
obviates the need for complex routing or message passing protocols. Also, as noted
earlier, the isolation and centralization it allows simplify fault detection, as each link or
device can be probed individually.

Easy to install and wire.

Easy to detect faults and to remove parts.

No disruptions to the network when connecting or removing devices.

Disadvantages
The primary disadvantage of a star topology is the high dependence of the system on the
functioning of the central hub. While the failure of an individual link only results in the
isolation of a single node, the failure of the central hub renders the network inoperable,
immediately isolating all nodes. The performance and scalability of the network also depend
on the capabilities of the hub. Network size is limited by the number of connections that can
be made to the hub, and performance for the entire network is capped by its throughput.
While in theory traffic between the hub and a node is isolated from other nodes on the
network, other nodes may see a performance drop if traffic to another node occupies a
significant portion of the central node's processing capability or throughput. Furthermore,
wiring up of the system can be very complex and high costing.

BUS TOPOLOGY

A bus network topology is a network architecture in which a set of clients are connected via
a shared communications line, called a bus. There are several common instances of the bus
architecture, including one in the motherboard of most computers, and those in some versions
of Ethernet networks.
Bus networks are the simplest way to connect multiple clients, but may have problems when
two clients want to transmit at the same time on the same bus. Thus systems which use bus
network architectures normally have some scheme of collision handling or collision
avoidance for communication on the bus, quite often using Carrier Sense Multiple Access or
the presence of a bus master which controls access to the shared bus resource.
A true bus network is passive the computers on the bus simply listen for a signal; they are
not responsible for moving the signal along. However, many active architectures can also be
described as a "bus", as they provide the same logical functions as a passive bus; for example,
switched Ethernet can still be regarded as a logical network, if not a physical one. Indeed, the
hardware may be abstracted away completely in the case of a software bus.
With the dominance of switched Ethernet over passive Ethernet, passive bus networks are
uncommon in wired networks. However, almost all current wireless networks can be viewed
as examples of passive bus networks, with radio propagation serving as the shared passive
medium.
The bus topology makes the addition of new devices straightforward. The term used to
describe clients is station or workstation in this type of network. Bus network topology uses a
broadcast channel which means that all attached stations can hear every transmission and all
stations have equal priority in using the network to transmit data.
The Ethernet bus topology works like a big telephone party line before any device can
send a packet, devices on the bus must first determine that no other device is sending a packet
on the cable. When a device sends its packet out over the bus, every other network card on
8

the bus sees and reads the packet. Ethernets scheme of having devices communicate like
they were in chat room is called Carrier Sense Multiple Access/ Collision Detection
(CSMA/CD). Sometimes two cards talk (send packets) at the same time. This creates a
collision, and the cards themselves arbitrate to decide which one will resend its packet first.
All PCs on a bus network share a common wire, which also means they share the data
transfer capacity of that wire or, in tech terms, they share its bandwidth.
This creates an interesting effect. Ten PCs chatting on a bus each get to use a much higher
proportion of its total bandwidth than, for instance, 100 PCs on the same bus (in this case,
one tenth compared to one hundredth). The more PCs on a bus, the more likely youll
have a communication traffic jam.

Advantages

Easy to implement and extend.

Easy to install.

Well-suited for temporary or small networks not requiring high speeds (quick setup).

Cheaper than other topologies.

Cost effective; only a single cable is used.

Easy identification of cable faults.

Reduced weight due to fewer wires.

Disadvantages

Limited cable length and number of stations.

If there is a problem with the cable, the entire network breaks down.

Maintenance costs may be higher in the long run.

Performance degrades as additional computers are added or on heavy traffic (shared


bandwidth).

Proper termination is required (loop must be in closed path).


9

Significant Capacitive Load (each bus transaction must be able to stretch to most
distant link).

It works best with limited number of nodes.

Slower data transfer rate than other topologies.

Only one packet can remain on the bus during one clock pulse.

RING TOPOLOGY

A ring network is a network topology in which each node connects to exactly two other
nodes, forming a single continuous pathway for signals through each node - a ring. Data
travels from node to node, with each node along the way handling every packet.
Because a ring topology provides only one pathway between any two nodes, ring networks
may be disrupted by the failure of a single link. A node failure or cable break might isolate
every node attached to the ring. FDDI networks overcome this vulnerability by sending data
on a clockwise and a counterclockwise ring: in the event of a break data is wrapped back onto
the complementary ring before it reaches the end of the cable, maintaining a path to every
node along the resulting "C-Ring". 802.5 networks -- also known as IBM Token Ring
networks -- avoid the weakness of a ring topology altogether: they actually use
a star topology at the physical layer and a Multistation Access Unit (MAU) toimitate a ring at
the datalink layer.

10

Many ring networks add a "counter-rotating ring" to form a redundant topology. Such "dual
ring" networks include Spatial Reuse Protocol, Fiber Distributed Data Interface (FDDI),
and Resilient Packet Ring.

Advantages

Very orderly network where every device has access to the token and the opportunity
to transmit

Performs better than a star topology under heavy network load

Can create much larger network using Token Ring

Does not require network server to manage the connectivity between the computers

Disadvantages

One malfunctioning workstation or bad port in the MAU can create problems for the
entire network

Moves, adds and changes of devices can affect the network

Network adapter cards and MAU's are much more expensive than Ethernet cards and
hubs

Much slower than an Ethernet network under normal load.

Misconceptions

"Token Ring is an example of a ring topology." 802.5 (Token Ring) networks do not
use a ring topology at layer 1. As explained above, IBM Token Ring (802.5)
networks imitate a ring at layer 2 but use a physical star at layer 1.

"Rings prevent collisions." The term "ring" only refers to the layout of the cables. It is
true that there are no collisions on an IBM Token Ring, but this is because of the layer 2
Media Access Control method, not the physical topology (which again is a star, not a
ring.) Token passing, not rings, prevents collisions.

"Token passing happens on rings." Token passing is a way of managing access to the
cable, implemented at the MAC sublayer of layer 2. Ring topology is the cable layout at
11

layer one. It is possible to do token passing on a bus (802.4) a star (802.5) or a ring
(FDDI). Token passing is not restricted to rings.

12

MESH TOPOLOGY

Mesh networking is a type of networking wherein each node in the network may act as an
independent router, regardless of whether it is connected to another network or not. It allows
for continuous connections and reconfiguration around broken or blocked paths by hopping
from node to node until the destination is reached. A mesh network whose nodes are all
connected to each other is a fully connected network. Mesh networks differ from other
networks in that the component parts can all connect to each other via multiple hops, and they
generally are not mobile. Mesh networks can be seen as one type of ad hoc network. Mobile
ad hoc networks (MANET) and mesh networks are therefore closely related, but MANET
also have to deal with the problems introduced by the mobility of the nodes. Mesh networks
are self-healing: the network can still operate when one node breaks down or a connection
goes bad. As a result, the network may typically be very reliable, as there is often more than
one path between a source and a destination in the network. Although mostly used in wireless
scenarios, this concept is also applicable to wired networks and software interaction. The
animation at the right illustrates how wireless mesh networks can self form and self heal.

13

Wireless mesh networks were originally developed for military applications and are typical of
mesh architectures. Over the past decade the size, cost, and power requirements of radios has
declined, enabling more radios to be included within each device acting as a mesh node. The
additional radios within each node enable it to support multiple functions such as client
access, backhaul service, and scanning (required for high speed handover in mobile
applications). Additionally, the reduction in radio size, cost, and power has enabled the mesh
nodes to become more modularone node or device now can contain multiple radio cards or
modules, allowing the nodes to be customized to handle a unique set of functions and
frequency bands.

TREE TOPOLOGY

Tree topology is also known as a hierarchical network.


The type of network topology in which a central 'root' node (the top level of the hierarchy) is
connected to one or more other nodes that are one level lower in the hierarchy (i.e., the
second level) with a point-to-point link between each of the second level nodes and the top
level central 'root' node, while each of the second level nodes that are connected to the top
level central 'root' node will also have one or more other nodes that are one level lower in the
hierarchy (i.e., the third level) connected to it, also with a point-to-point link, the top level
central 'root' node being the only node that has no other node above it in the hierarchy (The
hierarchy of the tree is symmetrical.) Each node in the network having a specific fixed
14

number, of nodes connected to it at the next lower level in the hierarchy, the number, being
referred to as the 'branching factor' of the hierarchical tree.This tree has individual peripheral
nodes.
1. A network that is based upon the physical hierarchical topology must have at least three
levels in the hierarchy of the tree, since a network with a central 'root' node and only one
hierarchical level below it would exhibit the physical topology of a star.
2. A network that is based upon the physical hierarchical topology and with a branching
factor of 1 would be classified as a physical linear topology.
3. The branching factor, f, is independent of the total number of nodes in the network and,
therefore, if the nodes in the network require ports for connection to other nodes the total
number of ports per node may be kept low even though the total number of nodes is large
this makes the effect of the cost of adding ports to each node totally dependent upon the
branching factor and may therefore be kept as low as required without any effect upon the
total number of nodes that are possible.
4. The total number of point-to-point links in a network that is based upon the physical
hierarchical topology will be one less than the total number of nodes in the network.
5. If the nodes in a network that is based upon the physical hierarchical topology are required
to perform any processing upon the data that is transmitted between nodes in the network,
the nodes that are at higher levels in the hierarchy will be required to perform more
processing operations on behalf of other nodes than the nodes that are lower in the
hierarchy. Such a type of network topology is very useful and highly recommended.

HYBRID TOPOLOGY
Hybrid networks use a combination of any two or more topologies in such a way that the
resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.).
For example, a tree network connected to a tree network is still a tree network, but two star
networks connected together exhibit a hybrid network topology. A hybrid topology is always
produced when two different basic network topologies are connected. Two common examples
for Hybrid network are: star ring network and star bus network

A Star ring network consists of two or more star topologies connected using
a multistation access unit (MAU) as a centralized hub.

A Star Bus network consists of two or more star topologies connected using a bus
trunk (the bus trunk serves as the network's backbone).
15

While grid networks have found popularity in high-performance computing applications,


some systems have used genetic algorithms to design custom networks that have the fewest
possible hops in between different nodes. Some of the resulting layouts are nearly
incomprehensible, although they function quite well.

NETWORKING
OSI (Open System Interconnection)

The Open Systems Interconnection model (OSI model) is a product of the Open Systems
Interconnection effort at the International Organization for Standardization. It is a way of
sub-dividing a communications system into smaller parts called layers. A layer is a collection
of conceptually similar functions that provide services to the layer above it and receives
services from the layer below it. On each layer an instance provides services to the instances
at the layer above and requests service from the layer below.
For example, a layer that provides error-free communications, across a network provides the
path needed by applications above it, while it calls the next lower layer to send and receive
packets that make up the contents of the path. Conceptually two instances at one layer are
connected by a horizontal protocol connection on that layer.

Layer 1: Physical Layer


The Physical Layer defines the electrical and physical specifications for devices. In
particular, it defines the relationship between a device and a transmission medium, such as a
16

copper or optical cable. This includes the layout of pins, voltages, cable
specifications, hubs, repeaters, network adapters, host bus adapters (HBAs used in storage
area networks) and more.
To understand the function of the Physical Layer, contrast it with the functions of the Data
Link Layer. Think of the Physical Layer as concerned primarily with the interaction of a
single device with a medium, whereas the Data Link Layer is concerned more with the
interactions of multiple devices (i.e., at least two) with a shared medium. Standards such
as RS-232 do use physical wires to control access to the medium.
The major functions and services performed by the Physical Layer are:

Establishment and termination of a connection to a communications medium.

Participation in the process whereby the communication resources are effectively


shared among multiple users.

Modulation, or conversion between the representation of digital data in user


equipment and the corresponding signals transmitted over a communications channel.
These are signals operating over the physical cabling (such as copper and optical fiber) or
over a radio link.

Ethernet incorporates both this layer and the Data Link Layer. The same applies to other
local-area networks, such as token ring, FDDI, ITU-TG.hn and IEEE 802.11, as well as
personal area networks such as Bluetooth.

Layer 2: Data Link Layer


The Data Link Layer provides the functional and procedural means to transfer data between
network entities and to detect and possibly correct errors that may occur in the Physical
Layer. Originally, this layer was intended for point-to-point and point-to-multipoint media,
characteristic of wide area media in the telephone system. Local area network architecture,
which included broadcast-capable multiaccess media, was developed independently of the
ISO work in IEEE Project 802. IEEE work assumed sublayering and management functions
not required for WAN use. In modern practice, only error detection, not flow control using
sliding window, is present in data link protocols such as Point-to-Point Protocol (PPP), and,
on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on the
Ethernet, and on other local area networks, its flow control and acknowledgment mechanisms
are rarely used. Sliding window flow control and acknowledgment is used at the Transport
17

Layer by protocols such as TCP, but is still used in niches where X.25 offers performance
advantages.

Layer 3: Network Layer


The Network Layer provides the functional and procedural means of transferring variable
length data sequences from a source to a destination via one or more networks, while
maintaining the quality of service requested by the Transport Layer. The Network Layer
performs network routing functions, and might also perform fragmentation and reassembly,
and report delivery errors. Routers operate at this layersending data throughout the
extended network and making the Internet possible. This is a logical addressing scheme
values are chosen by the network engineer. The addressing scheme is not hierarchical.
A number of layer management protocols belong to the Network Layer. These include routing
protocols, multicast group management, Network Layer information and error, and Network
Layer address assignment. It is the function of the payload that makes these belong to the
Network Layer, not the protocol that carries them.

Layer 4: Transport Layer


The Transport Layer provides transparent transfer of data between end users, providing
reliable data transfer services to the upper layers. The Transport Layer controls the reliability
of a given link through flow control, segmentation/desegmentation, and error control. Some
protocols are state and connection oriented. This means that the Transport Layer can keep
track of the segments and retransmit those that fail. The Transport layer also provides the
acknowledgement of the successful data transmission and if no error free data was transferred
then sends the next data.
Although not developed under the OSI Reference Model and not strictly conforming to the
OSI definition of the Transport Layer, typical examples of Layer 4 are the Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP).
Of the actual OSI protocols, there are five classes of connection-mode transport protocols
ranging from class 0 (which is also known as TP0 and provides the least features) to class 4
(TP4, designed for less reliable networks, similar to the Internet). Class 0 contains no error
recovery, and was designed for use on network layers that provide error-free connections.
Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which
OSI assigns to the Session Layer.
18

Perhaps an easy way to visualize the Transport Layer is to compare it with a Post Office,
which deals with the dispatch and classification of mail and parcels sent. Do remember,
however, that a post office manages the outer envelope of mail. Higher layers may have the
equivalent of double envelopes, such as cryptographic presentation services that can be read
by the addressee only. Roughly speaking, tunneling protocols operate at the Transport Layer,
such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or
end-to-end encryption with IPsec. While Generic Routing Encapsulation (GRE) might seem
to be a Network Layer protocol, if the encapsulation of the payload takes place only at
endpoint, GRE becomes closer to a transport protocol that uses IP headers but contains
complete frames or packets to deliver to an endpoint. L2TP carries PPP frames inside
transport packet.
Layer 5: Session Layer
The Session Layer controls the dialogues (connections) between computers. It establishes,
manages and terminates the connections between the local and remote application. It provides
for full-duplex, half-duplex, or simplex operation, and establishes check pointing,
adjournment, termination, and restart procedures. The OSI model made this layer responsible
for graceful close of sessions, which is a property of the Transmission Control Protocol, and
also for session check pointing and recovery, which is not usually used in the Internet
Protocol Suite. The Session Layer is commonly implemented explicitly in application
environments that use remote procedure calls.

Layer 6: Presentation Layer


The presentation layer provides a variety of coding and conversion functions that are applied
to application layer data. These functions ensure that information sent from the application
layer of one system would be readable by the application layer of another system thus
the Presentation Layer establishes context between Application Layer entities, in which the
higher-layer entities may use different syntax and semantics if the presentation service
provides a mapping between them. If a mapping is available, presentation service data units
are encapsulated into session protocol data units, and passed down the stack.
This layer provides independence from data representation (e.g., encryption) by translating
between application and network formats. The presentation layer transforms data into the
form that the application accepts. This layer formats and encrypts data to be sent across a
network. It is sometimes called the syntax layer.

Layer 7: Application Layer


The Application Layer is the OSI layer closest to the end user, which means that both the OSI
application layer and the user interact directly with the software application. This layer
19

interacts with software applications that implement a communicating component. Such


application programs fall outside the scope of the OSI model. Application layer functions
typically include identifying communication partners, determining resource availability, and
synchronizing communication. When identifying communication partners, the application
layer determines the identity and availability of communication partners for an application
with data to transmit. When determining resource availability, the application layer must
decide whether sufficient network or the requested communication exists. In synchronizing
communication, all communication between applications requires cooperation that is
managed by the application layer. Some examples of application layer implementations
include Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail
Transfer Protocol (SMTP) and X.400 Mail.
OSI model
7. Application Layer
NNTP SIP SSI DNS FTP Gopher HT
TP NFS NTP SMPP SMTP DHCP S
NMP Telnet
6. Presentation Layer
MIME XDR TLS SSL
5. Session Layer
Named
Pipes NetBIOS SAP SIP L2TP PPTP
4. Transport Layer
TCP UDP SCTP DCCP
3. Network Layer
IP ICMP IPsec IGMP IPX AppleTalk
2. Data Link Layer

20

ARP CSLIP SLIP Ethernet Frame


relay ITU-T G.hn DLL PPP
1. Physical Layer
RS-232 RS-449 V.35 V.34 I.430 I.431
T1 E1 POTS SONET/SDH OTN DSL
802.11a/b/g/n PHY 802.15.x PHY ITU-T
G.hn PHY Ethernet USB Bluetooth

Networking Medias
Network media refers to media mainly used in computer networks such as the Internet.
Network media is essentially driven by technological development, emerging from the
internet as a non-centralized medium in the late nineties; the term has more recently begun to
be applied to both the arts and industry. The following features distinguish Network Media
from classical media, such as broadcast media and the printed press:
Comparing Media Types
The choice of media type affects the type of network interface cards installed, the speed of
the network, and the ability of the network to meet future needs. Table below compares the
features of the common network media, including UTP, STP, coaxial cable, fiber-optic, and
wireless connections.
Comparing Media Types

21

Media
Type

Maximum Speed
Segment
Length

Comparative
Cost

Advantages Disadvantages

UTP

100 meters 10 Mbps


100 Mbps

Least expensive

Easy to in- Susceptible


to
stall, widely interference; can cover
available,
only a limited distance
widely used

STP

100 meters 10100


Mbps

More expensive Reduced


Difficult to work with;
than UTP
crosstalk,
can cover only a
less
sus- limited distance
ceptible to
EMI
than
UTP
or
Thinnet

Coaxial 500 meters 10100


(Thicknet) Mbps
185 meters
(Thinnet)

Relatively
Less
sus- Difficult to work with
inexpensive, but ceptible to (Thicknet);
limited
more costly than EMI
than bandwidth;
limited
UTP
other types application (Thinnet);
of
copper damage to cable can
media
bring down entire
network

22

Media
Type

Maximum Speed
Segment
Length

Coaxial 500 meters 10100


(Thicknet) Mbps
185 meters
(Thinnet)

Fiberoptic

Comparative Advantages
Cost

Disadvantages

Relatively
Less
sus- Difficult to work with
inexpensive, ceptible to EMI (Thicknet);
limited
but
more than other types bandwidth;
limited
costly
than of
copper application (Thinnet);
UTP
media
damage to cable can
bring down entire
network

3 km and 101000
Expensive
further (sin- Mbps (single-mode) gle-mode)
2 km and 100 Mbps
further
9.92 Gbps
(multimode) (multimode)

Wireless 50
km 154 Mbps Expensive
global

Cannot
be Difficult to terminate
tapped easily,
so security is
better; can be
used over great
distances; not
susceptible to
EMI;
higher
data rate than
coaxial
and
twisted-pair
Does
require
stallation
media

not Susceptible
to
in- atmospheric conditions
of

Twisted-Pair Cable
Twisted-pair is a copper wire-based cable that can be either shielded or unshielded. Twistedpair is the most common media for network connectivity. Unshielded twisted-pair (UTP)
cable, as shown, is a four-pair wire. Each of the eight individual copper wires in UTP cable is
covered by an insulating material. In addition, the wires in each pair are twisted around each
other. The advantage of UTP cable is its ability to cancel interference, because the twistedwire pairs limit signal degradation from electromagnetic interference (EMI) and radio
frequency interference (RFI). To further reduce crosstalk between the pairs in UTP cable, the
number of twists in the wire pairs varies. UTP, as well as shielded
twisted-pair (STP) cable, must follow precise specifications as to
how many twists or braids are permitted per meter.

Unshielded Twisted-Pair Cable


UTP cable is used in a variety of networks. When used as a networking medium, UTP cable
has four pairs of either 22- or 24-gauge copper wire. UTP used as a networking medium has
an impedance of 100 ohms, differentiating it from other types of twisted-pair wiring such as
that used for telephone wiring. Because UTP cable has an external diameter of approximately
0.43 cm (0.17 inches), its small size can be advantageous during installation. Also, because
23

UTP can be used with most of the major networking architectures, it continues to grow in
popularity.
Several categories of UTP cable exist:
Category 1Used for telephone communications; not suitable for transmitting data
Category 2Capable of transmitting data at speeds of up to 4 Mbps
Category 3Used in 10BASE-T networks; can transmit data at speeds up to 10 Mbps
Category 4Used in Token Ring networks; can transmit data at speeds up to 16 Mbps
Category 5Capable of transmitting data at speeds up to 100 Mbps
Category 5eUsed in networks running at speeds up to 1000 Mbps (1 Gbps)
Category 6Consists of four pairs of 24-gauge copper wires that can transmit data at
speeds up to 1000 Mbps
Shielded Twisted-Pair Cable
Shielded twisted-pair (STP) cable, as shown in Figure 4-2, combines the techniques of
shielding and the twisting of wires to further protect against signal degradation. Each pair of
wires is wrapped in a metallic foil. The four pairs of wires are then wrapped in an overall
metallic braid or foil, usually 150-ohm cable. Specified for use in Ethernet network
installations, STP reduces electrical noise both within the cable (pair-to-pair coupling, or
crosstalk) and from outside the cable (EMI and RFI). Token Ring network topology uses STP.
When you consider
using UTP and STP for your network
media, consider the
following:

Speed of either media type is usually satisfactory for local-area distances.

Both are the least-expensive media for data communication. UTP is less expensive
than STP.

Because most buildings are already wired with UTP, many transmission standards are
adapted to use it to avoid costly rewiring with an alternative cable type. Twisted-pair
cabling is the most common networking cabling.

Coaxial Cable
Coaxial cable consists of a hollow outer cylindrical conductor that surrounds a single inner
wire conducting element. This section describes the characteristics and uses of coaxial cable.
As shown in Figure, the single inner wire located in the center of a coaxial cable is a copper
conductor, surrounded by a layer of flexible insulation. Over this insulating material is a
woven copper braid or metallic foil that acts both as the second wire in the circuit and as a
shield for the inner conductor. This second layer, or shield, can help reduce the amount of
outside interference. An outer jacket covers this shield. The BNC connector shown looks
much like a cable-television connector and connects to an older NIC with a BNC interface.
Coaxial cable supports 10 to 100 Mbps and is relatively inexpensive, although more costly
24

than UTP. Coaxial cable can be laid over longer distances than twisted-pair cable. For
example, Ethernet can run approximately 100 meters using twisted-pair cable, but 500 meters
using coaxial cable.
Coaxial cable offers several advantages for use in LANs. It can be run with
fewer boosts from repeaters, which regenerate the signals in a network so
that they can cover greater distances between network nodes than either STP
or UTP cable. Coaxial cable is less expensive than fiber optic cable, and the
technology is well known. It has been used for many years for all types of data
communication. When you work with cable, consider its size. As the thickness, or diameter,
of the cable increases, so does the difficulty in working with it. Cable must often be pulled
through existing conduits and troughs that are limited in size. Coaxial cable comes in a
variety of sizes. The largest diameter, frequently referred to as Thicknet, was specified for use
as Ethernet backbone cable because historically it had greater transmission length and noise
rejection characteristics. However, Thicknet cable can be too rigid to install easily in some
environments because of its thickness. Generally, the more difficult the network media is to
install, the more expensive it is to install. Coaxial cable is more expensive to install than
twisted-pair cable, and Thicknet cable is almost with an outside diameter of only 0.35 cm,
sometimes referred to as Thinnet, was used in Ethernet networks. It was especially useful for
cable installations that required the cable to make many twists and turns. Because Thinnet
was easier to install, it was also cheaper to install. Thus, it was also referred to as Cheapernet.
Fiber-Optic Cable
Fiber-optic cable is a networking medium capable of conducting modulated light transmission. This section describes the types, characteristics, and uses of fiber-optic cable. Fiberoptic cable used for networking consists of two fibers encased in separate sheaths. Viewing it
in cross section, it can be seen that each optical fiber is surrounded by layers of protective
buffer material: usually a plastic shield, then a plastic such as Kevlar, and finally, an outer
jacket that provides protection for the entire cable. The plastic conforms to appropriate fire
and building codes. The purpose of the Kevlar is to furnish additional cushioning and
protection for the fragile, hair-thin glass fibers. Where buried fiber-optic cables are required
by codes, a stainless steel wire is sometimes included for added strength. Several connectors
can connect fiber to the networking device; the most common is a SC connector, which has
two optics; one connecting to transmit and the other connecting to receive the light-guiding
parts of an optical fiber are called the core and the cladding. The core is usually very pure
glass with a high index of refraction. When a cladding layer of glass or plastic with a low
index of refraction surrounds the core glass, light can be trapped in the fiber core. This
process is called total internal reflection, and it allows the optical fiber to act like a light pipe,
guiding light for long distances, even around bends. Fiber-optic cable is the most expensive
of the three types discussed in this lesson, but it supports higher rate line speeds. Fiber-optic
cable does not carry electrical impulses as copper wire does.
Instead, signals that represent bits are converted into pulses of
light. Two types of fiber-optic cable exist:

Single-modeSingle-mode fiber-optic cable allows


only one mode (or wavelength) of light to propagate
through the fiber. This type of cable is capable of higher
band-width and greater distances than multimode and is
often used for campus backbones. Single-mode cable
uses lasers as the light-generating method and is more

25

expensive than multimode cable. The maximum cable length of single-mode cable is
60+ km (37+ miles).

MultimodeMultimode fiber-optic cable allows multiple modes of light to


propagate through the fiber. Multimode cable is often used for workgroup
applications, using light emitting diodes (LEDs) as light-generating devices. The
maximum length of multimode cable is 2 km (1.2 miles).

The characteristics of the different media have a significant impact on the speed of data
transfer. Although fiber-optic cable is more expensive, it is not susceptible to EMI and is
capable of higher data rates than any of the other types of networking media discussed here.
Fiber-optic cable is also more secure because it does not emit electrical signals that could be
received by external devices.

Wireless Communications
Wireless networks are becoming increasingly popular, and they utilize a different type of
technology. Wireless communication uses radio frequencies (RFs) or infrared waves to
transmit data between devices on a LAN. For wireless LANs, a key component is the
wireless hub, or access point, used for signal distribution. To receive the signals from the
access point, a PC or laptop needs to install a
wireless adapter card, or wireless network
interface card (NIC). Figure shows a number of
wireless access points connected to an Ethernet
backbone to provide access to the Internet.
Wireless Access Points
Wireless signals are electromagnetic waves that
can travel through the vacuum of outer space and
through a medium such as air. No physical
medium is necessary for wireless signals, making them a versatile way to build a network.
They use portions of the RF spectrum to transmit voice, video, and data. Wireless frequencies
range from 3 kHz to 300 GHz. The data-transmission rates range from 9 kbps to 54 Mbps.
Figure 4-6 shows the electromagnetic spectrum chart.
Electromagnetic Spectrum
Electromagnetic waves are differentiated by their frequency. Low-frequency
electro-magnetic waves have a long wavelength (the distance from one peak to the next on
the sine wave), while high-frequency electromagnetic waves have a short wavelength. Some
common applications of wireless data communication include the following:
Accessing the Internet using a cellular phone
Home or business Internet connection over satellite
Beaming data between two handheld computing devices
Wireless keyboard and mouse for the PC
26

Another common application of wireless data communication is the wireless LAN (WLAN),
which is built in accordance with Institute of Electrical and Electronic Engineers (IEEE)
802.11 standards. WLANs typically use radio waves (for example, 902 MHz), microwaves
(for example, 2.4 GHz), and infrared (IR) waves (for example, 820 nm) for communication.
Wireless technologies are a crucial part of the future of networking.

27

Switch
A network switch is a computer networking device that connects network segments. The term
commonly refers to a network bridge that processes and routes data at the data link layer
(layer 2) of the OSI model. Switches that additionally process data at the network layer (layer
3 and above) are often referred to as Layer 3 switches or multilayer switches.

The term network switch does not generally encompass unintelligent or passive network
devices such as hubs and repeaters. The network switch, packet switch (or just switch) plays
an integral part in most Ethernet local area networks or LANs. Mid-to-large sized LANs
contain a number of linked managed switches. Small office/home office (SOHO) applications
typically use a single switch, or an all-purpose converged device such as gateway access to
small office/home broadband services such as DSL router or cable Wi-Fi router. In switches,
intended for commercial use, built-in or modular interfaces make it possible to connect
different types of networks, including Ethernet, Fiber Channel, ATM, ITU-T G.hn and
802.11. This connectivity can be at any of the layers mentioned. While Layer 2 functionality
is adequate for speed-shifting within one technology, interconnecting technologies such as
Ethernet and token ring are easier at Layer 3. In other cases, the switch is used to create a
mirror image of data that can go to an external device. Since most switch port mirroring
provides only one mirrored stream, network hubs can be useful for fanning out data to several
read-only analyzers, such as intrusion detection systems and packet sniffers.
This was how the internal data circulation occurred within a site but when we need to go for
the inter site communication that too when they are far from each other then the need for
router becomes essential as with the help of its VPN (virtual private network) we could easily
do that and that too efficiently but too make it more economical its always preferred to go for
some service provider.
Routers
Routers are used to tie multiple networks together. For example, you would use a router to
connect your networked computers to the Internet and thereby share an Internet connection
among many users. The router will act as a dispatcher, choosing the best route for your
information to travel so that you receive it quickly.
Routers analyze the data being sent over a network, change how it is packaged and send it to
another network or over a different type of network. They connect your business to the
outside world, protect your information from security threats, and can even decide which
computers get priority over others.

28

Depending on your business and your networking plans, you can choose from routers that
include different capabilities. These can include functions such as:
o Firewall: specialized software that examines incoming data and protects your
business network against attacks
o Virtual Private Network (VPN): A way to allow remote employees to safely access
your network remotely
o IP Phone network : Combine your company's computer and telephone network
using voice and conferencing technology, to simplify and unify your
communications
Now this was the way we made network and connected it with other networks so that our
motto of interconnection between different sites was achieved and there was proper flow of
the data going on as far that organization was concerned now this was not where all ended as
network management was also to be done which include:

Setting up servers running various applications needed for that organization

Installing workstations for that organizations employees

Setting other IT equipments like scanners , printers etc

Software management for that company

IP addressing scheme implemented

Firewall and intrusion protection system

Installation of IP based cameras to monitor entire proceedings at various sites.

29

IP ADDRESSING
One of the most important topics in any discussion of TCP/IP is IP addressing. An IP address
is a numeric identifier assigned to each machine on an IP network. It designates the specific
location of a device on the network. An IP address is a software address, not a hardware
addressthe latter is hard-coded on a network interface card (NIC) and used for finding
hosts on a local network. IP addressing was designed to allow hosts on one network to
communicate with a host on a different network regardless of the type of LANs the hosts are
participating in.
IP Terminology
Bit
A bit is one digit, either a 1 or a 0.
Byte
A byte is 7 or 8 bits, depending on whether parity is used.
Octet
An octet, made up of 8 bits, is just an ordinary 8-bit binary number.
Network address
This is the designation used in routing to send packets to a remote networkfor example,
10.0.0.0, 172.16.0.0, and 192.168.10.0.
Broadcast address
The address used by applications and hosts to send information to all nodes on a network is
called the broadcast address. Examples include 255.255.255.255, which is all networks, all
nodes; 172.16.255.255, which is all subnets and hosts on network 172.16.0.0; and
10.255.255.255, which broadcasts to all subnets and hosts on network 10.0.0.0.
The Hierarchical IP Addressing Scheme
An IP address consists of 32 bits of information. These bits are divided into four sections,
referred to as octets or bytes, each containing 1 byte (8 bits). IP address can be written using
one of three methods:
-Dotted-decimal, as in 172.16.30.56
-Binary, as in 10101100.00010000.00011110.00111000
-Hexadecimal, as in AC.10.1E.38

30

Network Addressing
The network address uniquely identifies each network. Every machine on the same network
shares that network address as part of its IP address. In the IP address 172.16.30.56, for
example, 172.16 is the network address. The node address is assigned to, and uniquely
identifies, each machine on a network. This part of the address must be unique because it
identifies a particular machinean individualas opposed to a network, which is a group.
This number can also be referred to as a host address.
In the sample IP address 172.16.30.56, the 30.56 is the node address. The designers of the
Internet decided to create classes of networks based on network size. For the small number of
networks possessing a very large number of nodes, they created the rank Class A network. At
the other extreme is the Class C network, which is reserved for the numerous networks with a
small number of nodes. The class distinction for networks between very large and very small
is predictably called the Class B network. Subdividing an IP address into a network and node
address is determined by the class designation of ones network.

Class D: Multicast
Class E: Research

Network Address Range: Class A


The designers of the IP address scheme said that the first bit of the first byte in a Class A
network address must always be off, or 0. This means a Class A address must be between 0
and 127 in the first byte, inclusive.
Consider the following network address:
0xxxxxxx
If we turn the other 7 bits all off and then turn them all on, well find the Class A range of
network addresses:
00000000 = 0
01111111 = 127
So, a Class A network is defined in the first octet between 0 and 127, and it cant be less or
more.

31

Network Address Range: Class B


In a Class B network, the RFCs state that the first bit of the first byte must always be turned
on but the second bit must always be turned off. If you turn the other 6 bits all off and then all
on, you will find the range for a Class B network:
10000000 = 128
10111111 = 191
So, a Class B network is defined when the first byte is configured from 128 to 191.
Network Address Range: Class C
For Class C networks, the RFCs define the first 2 bits of the first octet as always turned on,
but the third bit can never be on. Following the same process as the previous classes, convert
from binary to decimal to find the range. Heres the range for a Class C network:
11000000 = 192
11011111 = 223
So, an IP address that starts at 192 and goes to 223, it is a Class C IP address.
Network Address Ranges: Classes D and E
The addresses from 224 to 255 are reserved for Class D and E networks. Class D (224239)
is used for multicast addresses and Class E (240255) for scientific purposes.
Reserved IP Addresses
Address
Function
Network address of all
0s
Interpreted to mean this network or segment.
Network address of all
Interpreted to mean all networks.
1s
Network 127.0.0.1
Node address of all 0s
Node address of all 1s

Reserved for loopback tests.


Designates local node and allow node to send a
test packet to itself without generating traffic.
Interpreted to mean network address or any
host on specified network.
Interpreted to mean all nodes on
the specified network; for example,
128.2.255.255 means all nodes on network
128.2 (Class B address).

Entire IP address set to


all
Used by Cisco routers to designate the default
1s (same as
route. Could also mean any network.
255.255.255.255)

32

Class A Addresses
In a Class A network address, the first byte is assigned to the network address and the three
remaining bytes are used for the node addresses. The Class A format is as follows:
network.node.node.node
For example, in the IP address 49.22.102.70, the 49 is the network address and 22.102.70 is
the node address. Every machine on this particular network would have the distinctive
network address of 49.
Class A network addresses are 1 byte long, with the first bit of that byte reserved and the 7
remaining bits available for manipulation (addressing). As a result, the maximum number of
Class A networks that can be created are 128. Why? Because the remaining seven bits can be
either a 0 or a 1, thus 27, or 128.
The network address of all 0s (0000 0000) is reserved to designate the default route.
Additionally, the address 127, which is reserved for diagnostics, cant be used either, which
means that only the numbers 1 to 126 can be used to designate Class A network addresses.
This means the actual number of usable Class A network addresses is 128 minus 2, or 126.
The IP address 127.0.0.1 is used to test the IP stack on an individual node and cannot be used
as a valid host address. Each Class A address has 3 bytes (24-bit positions) for the node
address of a machine. This means there are 224or 16,777,216unique combinations and,
therefore, precisely that many possible unique node addresses for each Class A network.
Because node addresses with the two patterns of all 0s and all 1s are reserved, the actual
maximum usable number of nodes for a Class A network is 224 minus 2, which equals
16,777,214.
Class A Valid Host IDs
Heres an example of how to figure out the valid host IDs in a Class A network address:
All host bits off is the network address: 10.0.0.0.
All host bits on is the broadcast address: 10.255.255.255.
The valid hosts are the numbers in between the network address and the broadcast address:
10.0.0.1 through 10.255.255.254.
Class B Addresses
In a Class B network address, the first 2 bytes are assigned to the network address and the
remaining 2 bytes are used for node addresses. The format is as follows:
network.network.node.node
For example, in the IP address 172.16.30.56, the network address is 172.16 and the node
address is 30.56.
33

With a network address being 2 bytes (8 bits each), there would be 216 unique combinations.
But the Internet designers decided that all Class B network addresses should start with the
binary digit 1, then 0. This leaves 14 bit positions to manipulate, therefore 16,384 (that is,
214) unique Class B network addresses.
A Class B address uses 2 bytes for node addresses. This is 2 16 minus the two reserved
patterns (all 0s and all 1s), for a total of 65,534 possible node addresses for each Class B
network.
Class B Valid Host IDs
All host bits turned off is the network address: 172.16.0.0.
All host bits turned on is the broadcast address: 172.16.255.255.
The valid hosts would be the numbers in between the network address and the broadcast
address: 172.16.0.1 through 172.16.255.254.
Class C Addresses
The first 3 bytes of a Class C network address are dedicated to the network portion of the
address, with only 1 measly byte remaining for the node address. Heres the format:
network.network.network.node
Using the example IP address 192.168.100.102, the network address is 192.168.100 and the
node address is 102.
In a Class C network address, the first three bit positions are always the binary 110. The
calculation is as follows: 3 bytes, or 24 bits, minus 3 reserved positions leaves 21 positions.
Hence, there are 221, or 2,097,152, possible Class C networks.
Each unique Class C network has 1 byte to use for node addresses. This leads to 2 8 or 256,
minus the two reserved patterns of all 0s and all 1s, for a total of 254 node addresses for each
Class C network.
Class C Valid Host IDs
All host bits turned off is the network ID: 192.168.100.0.
All host bits turned on is the broadcast address: 192.168.100.255.
The valid hosts would be the numbers in between the network address and the broadcast
address: 192.168.100.1 through 192.168.100.254.

34

SUBNETTING
CHOOSING A CLASS
ADDRESS
CLASS

STARTIN
G BITS
(FIRST
BYTE)

START
ADDRES
S

FINISH
ADDRESS

CLASS A

0.0.0.0

CLASS B

10

128.0.0.0

CLASS C

110

192.0.0.0

126.255.255.25
5
191.255.255.25
5
223.255.255.25
5

NETWOR
K
EXITING
PER
CLASS
125

HOSTS
PER
NETWOR
K

16384

65532

2097152

254

16777216

SUNBET MASK = DEFINES NETWORK ID AND HOST ID. AND ALSO CLASS.
EX.
IP ADD.= 192.168.100.20
SUBNET MASK =

255.255.255.0

MEANS IST, 2nd and 3rd octets are net id and last octet is host id.
CLASS A = 255.0.0.0
CLASS B = 255.255.0.0
CLASS C = 255.255.255.0
For the subnet address scheme to work, every machine on the network must know which part
of the host address will be used as the subnet address. This is accomplished by assigning a
subnet mask to each machine. A subnet mask is a 32-bit value that allows the recipient of IP
packets to distinguish the network ID portion of the IP address from the host ID portion of the
IP address. The network administrator creates a 32-bit subnet mask composed of 1s and 0s.
The 1s in the subnet mask represent the positions that refer to the network or subnet
addresses. Not all networks need subnets, meaning they use the default subnet mask. This is
basically the same as saying that a network doesnt have a subnet address. Table 3.1 shows
the default subnet masks for Classes A, B, and C. These default masks cannot change. In
other words, you cant make a Class B subnet mask read 255.0.0.0. If you try, the host will
read that address as invalid and usually wont even let you type it in.
For a Class A network, you cant change the first byte in a subnet mask; it must read
255.0.0.0 at a minimum. Similarly, you cannot assign 255.255.255.255, as this is all 1sa
broadcast address. A Class B address must start with 255.255.0.0, and a Class C has to start
with 255.255.255.0.

35

Class
A

Format
network.node.node.node

Default
Mask
255.0.0.0

network.network.node.node

255.255.0.0

network.network.network.node

255.255.255.0

Subnet

PRIVATE IP ADDRESSES OR FREE IP's:CLASS A - 10.0.0.0 - 10.255.255.254


CLASS B - 172.16.0.0 - 172.31.255.254
CLASS C - 192.168.0.0 - 192.168.255.254
INVALID IP ADDRESSES:0.0.0.0 and 255.255.255.255
APIPA ADDRESSES (AUTOMATIC PRIVATE IP ADDRESSING)
169.254.0.1 - 169.254.255.254
LOOPBACK ADDRESSES - FOR check ur own NIC
127.0.0.1 - 127.255.255.254

MEDIA COMPARISION
Different types of medium are used for communication purpose. The characteristics of each
medium are given below:
Characteristics

UTP

STP

Coaxial Cables

Bandwidth

10 Mbps100Mbps
100
meters
Poor

10Mbps100Mbps
100 meters

10 Mbps

Low

Low

Maximum cable
Interference
rating
Installation cost

Cheap

Bend radius

360degree
s
/ feet
Low

Security

Fiber
Optic
Cables
100Mbps-1Gbps

200-500 meters or 2 km -100 segment


kilometers
Better than Better than twisted
Very
good
as
UTP
pair wires
compared to
Any other cable
Costly than Costly than twisted
Mostly costly to
UTP
pair wires
install
360degrees
360degrees/ feet
30 degrees/feet
/ feet
or 30 degrees/feet

36

High

Variable

Length

Subnet

Masks

(VLSMs)

To take one network and create many networks using sub-net masks of different lengths on
different types of network designs is called VLSM networking.
Why Bother with VLSM Design?
Suppose, you have just been hired by a new company and need to add on to the existing
network. There is no problem with starting over with a new IP address scheme. Should you
use a VLSM classless network or a classful network?
Lets just say you happen to have plenty of address space because you are using the Class A
10.0.0.0 private network address in your corporate environment and cant even come close to
imagining that youd ever run out of IP addresses. Why would you want to bother with the
VLSM design process?

Because by creating contiguous blocks of addresses to specific areas of your network, you
can then easily summarize your network and keep route updates with a routing protocol to a
minimum. Why would anyone want to advertise hundreds of networks between buildings
when you can just send one summary route between buildings and achieve the same result?
Summarization, also called Supernetting, provides route updates in the most efficient way
possible by advertising many routes in one advertisement instead of individually.

37

TCP/IP SERVICES
TCP/IP
TCP/IP is not a single protocol. It is a suite of protocols. A group of many protocols refers to
as TCP/IP.
Some of the important TCP/IP protocols are
TCP : It is used to transport data from one PC to another.
IP : It helps in transporting data through an internetwork,i.e.,from one network to another.
FTP (File Transfer Protocol) : It is used to transfer files from one PC to another. It is a
reliable protocol widely used in Internet to download/upload files.
TFTP (Trivial File Transfer Protocol) : It is a load and unreliable protocol used to transfer files.It is faster than FTP.
DNS : It is used to translate computer names into ip addresses.
DHCP : It is used to assign ip addresses to computers automatically.
BOOTP (Bootstrap protocol) :It is used to assign ip address to a client automatically and also used to send an operating
system to the client in case of diskless workstations.
HTTP : It is used to access websites from the Web Server on the client PC.
ARP (Address Resolution Protocol) : It is used to translate MAC address into ip address.
r - ARP (reverse ARP) :It is used to translate ip addresses into MAC addresses.
Telnet : It is used to access a remote computer and to do administrative tasks on it using a
commandline interface.
SNMP (Simple Network Management Protocol) : It is used to analyse and monitor network traffic.

38

INTRODUCTION TO ROUTER
It is an intelligent device. It works on networks layer. It is used for internet work
communication, packet switching, packet filtering and path selection. It has no of broadcast
and collision domain. By default router does not broadcast. Router understands different
topology and protocols. It works on full duplex mode.
ROUTER represents a separate network.
The Network layer (also called layer 3) manages device addressing, tracks the location of
devices on the network, and determines the best way to move data, which means that the
Network layer must transport traffic between devices that arent locally attached. Routers
(layer 3 devices) are specified at the Network layer and provide the routing services within an
internetwork. It happens like this: First, when a packet is received on a router interface, the
destination IP address is checked. If the packet isnt destined for that particular router, it will
look up the destination network address in the routing table. Once the router chooses an exit
interface, the packet will be sent to that interface to be framed and sent out on the local
network. If the router cant find an entry for the packets destination network in the routing
table, the router drops the packet. Two types of packets are used at the Network layer: data
and route updates.
Data packets Used to transport user data through the internetwork. Protocols used to support
data traffic are called routed protocols; examples of routed protocols are IP and IPv6.
Route update packets Used to update neighboring routers about the networks connected to
all routers within the internetwork. Protocols that send route update packets are called routing
protocols; examples of some common ones are RIP, RIPv2, EIGRP, and OSPF. Route update
packets are used to help build and maintain routing tables on each router.
Network addresses Protocol-specific network addresses. A router must maintain a routing
table for individual routing protocols because each routing protocol keeps track of a network
with a different addressing scheme (IP, IPv6, and IPX, for example).

3.2

39

Interface The exit interface a packet will take when destined for a specific network.
Metric It is the distance to the remote network. Different routing protocols use different ways
of computing this distance
Routers break up broadcast domains, which mean that by default, broadcasts arent
forwarded. Routers also break up collision domains, but you can also do that using layer 2
(Data Link layer) switches. Because each interface in a router represents a separate network,
it must be assigned unique network identification numbers, and each host on the network
connected to that router must use the same network number.
A router in an internetwork

o Each router interface is a broadcast domain. Routers break up broadcast domains by


default and provide WAN services.
o Routers, by default, will not forward any broadcast or multicast packets.
1
o Routers use the logical address in a Network layer header to determine the next hop
router to forward the packet to.
1
o Routers can use access lists, created by an administrator, to control security on the types
of packets that are allowed to enter or exit an interface.
2
o Routers can provide layer 2 bridging functions if needed and can simultaneously route
through the same interface.
o Routers provide connections between virtual LANs (VLANs).

The term routing is used for taking a packet from one device and sending it through the
network to another device on a different network. Routers dont really care about hosts
they only care about networks and the best path to each network. The logical network address
of the destination host is used to get packets to a network through a routed network, and then
the hardware address of the host is used to deliver the packet from a router to the correct
destination host.
To be able to route packets, a router must know, at a minimum, the following:
o Destination address
o Neighbor routers from which it can learn about remote networks
o Possible routes to all remote networks.
40

TYPES OF ROUTER MEMORY


ROM: Rom:- Read Only Memory Bootstrap/POST
Maintains instructions for power-on self test (POST) diagnostics
Stores bootstrap program and basic operating system software
Mini IOS
EEPROM 1: Is a type of electronically erasable, programmable ROM.
Holds the operating system image (IOS)
Allows software to be updated without removing and replacing
processor
Retains content when router is powered down or restarted
Can store multiple versions of IOS software
NVRAM : Provides storage for the startup configuration file
Retains content when router is powered down or restarted
16 bit register which decides boot sequence

chips on the

Configuration Register

RAM: Random Access Memory, also called dynamic RAM (DRAM)


Stores routing tables
Holds ARP cache
Performs packet buffering (shared RAM)
Provides temporary memory for the configuration file of the router while the router
is powered on
Loses content when router is powered down or restarted

41

MODES OF ROUTER
Router has three main modes of router:1. User Mode
2. Privilege Mode
3. Global/Configuration Mode

MODES

FUNCTION

USER

By default user is in this mode.


It is denoted as Router >.

PRIVILEGE

This mode is used to check the


configuration.
It is denoted as Router #

GLOBAL

Configurations are done in this


mode.
It is denoted as Router(config) #

Global Mode is further classified as:


(a.)
(b.)
(c.)

Router Mode
Line Mode
Interface Mode

MODES

FUNCTION

ROUTER

It is denoted as
Router (config-router)#

LINE

It is denoted as
Router(config-line) #

INTERFACE

It is denoted as
Router(config-if) #

BASIC COMMANDS
Command for user mode to privilege mode- enable
Command for privilege mode to user mode- disable
Command for privilege mode to global- configure terminal
Command for global mode to privilege mode- exit
42

PRIVILEGE MODE COMMANDS


1. show ip interface brief - for showing ip interfaces in brief
2. show running-configuration for checking running condition of RAM
3. show startup-configuration for checking the status of RAM
4. show ip route for checking routing table
5. show version for checking the status of version
6. show interface for all details of all interfaces present
7. show ip protocols for details of protocols
8. show history display last few commands entered
9. show clock for showing clock
10. terminal history size 50 to change size of number of commands shown in
history to 50.

43

ROUTING AND ROUTING PROTOCOLS


TYPES OF ROUTING

TYPES OF
ROUTING

STATIC
ROUTING

DEFAULT
ROUTING

DYNAMIC
ROUTING

STATIC ROUTING
Static routing is the simplest form of routing, but it is a manual process and does not work
well when the routing information has to be changed frequently or needs to be configured on
a large number of routing devices (routers).
DEFAULT ROUTING
Default routing is used to send packets with a remote destination network not in the routing
table to the next-hop router.
DYNAMIC ROUTING
Dynamic routing protocols are software applications that dynamically discover network
destinations and how to get to them.
There are two classifications of protocols

IGP - Interior Gateway Protocol. The name used to describe the fact that each system
on the internet can choose its own routing protocol. RIP and OSPF are interior
gateway protocols.
EGP - Exterior Gateway Protocol. Used between routers of different systems. There
are two of these, the first having the same name as this protocol description:

44

TYPES OF DYNAMIC ROUTING PROTOCOLS

RIP
IGRP
EIGRP
BGP
IS-IS
OSPF

ROUTING INFORMATION PROTOCOL (RIP)


RIP (Routing Information Protocol)
RIP is a true distance-vector routing protocol. RIP sends the complete routing table out to all
active interfaces every 30 seconds. RIP uses hop count to determine the best path to a remote
network, but it has a maximum allowable hop count of 15, by default meaning that 16 is
deemed unreachable. RIP works well in a small network, but its inefficient on large networks
with slow WAN links or on networks with a large number of routers installed.
There are two versions of RIP namely RIPv1 and RIPv2. RIPv1 sends classful updates and it
sends update on broadcast address 255.255.255.255 whereas RIPv2 can send classless
updates also and it uses multicast address 224.0.0.9 to update.
RIP Timers
RIP supports four types of timers as follows:
(a) Update Timer: It is the time interval between the updates
exchange by the router to the neighbor routes. It is by default
set to 30 sec.

45

(b) Hold Down Timer: It is the time interval which is used to keep the

network as active when it is not receiving information about network.


By default the hold down timer is 180 seconds.
(c) Invalid Timer: It is the time duration after which router will declare
network as down or invalid. It declares the router down or invalid after
180 seconds from the time hello packet was received.
(d) Flush Timer: It is a timer which is used to flush the entry i.e. delete the
entry of invalid network from routing table. By default it is 240
seconds.

Drawbacks of RIP

RIP has no knowledge of subnet addressing


It takes a long time to stabilize after a router or link failure.
Uses more broadcasting than OSPF requiring more network bandwidth.

Open Shortest Path First (OSPF)


OSPF (RFC 1257) is a link state protocol rather than a distance vector protocol. It tests the
status of its link to each of its neighbors and sends the acquired information to them. It
stabilizes after a route or link failure faster than a distance vector protocol based system.
OSPF uses IP directly, not relying on TCP or UDP. OSPF can:
Have routes based on IP type of service (part of IP header message) such as FTP or
Telnet.
Support subnets.
Assign cost to each interface based on reliability, round trip time, etc.
Distribute traffic evenly over equal cost routes.
Uses multicasting.
Costs for specific hops can be set by administrators. Adjacent routers swap
information instead of broadcasting to all routers.
OSPF (Open Shortest Path First)
This is the open standard routing protocol i.e. any vendor can use this. Suppose if there are
different vendors router and a very large network is to be employed then only OSPF is the
solution. OSPF works by using Dijkstra algorithm also known as shortest path first (SPF)
algorithm. OSPF converges very quickly, although not as quickly as EIGRP and it supports
equal cost routes to the destination. It has unlimited hop count. It is a link state routing
protocol.

46

Packet Types
1) Hello packet: This packet provides dynamic neighbor discovery and maintain neighbor
relationships. Hello packets are addressed to 224.0.0.5
2) Link State Advertisement: LSA is used to advertise the network to neighbor.
3) DBD: DBD is database descriptor packet. It sends a list of router IDs from whom the
router has an LSA and the current sequence number. This information is used to compare
information about the network.
4) LSR: Link State Request follows DBD to ask for any missing LSAs.
5) LSU: Link State Update replies to a link state request with the requested data.
6) LSAck: Link State Acknowledgement confirms receipt of link state information.
Neighborship
Following are the steps which are passed through the formation of neighbors:
1) Blocked: Initially all routers are in blocked state and in this state no information has been
received from the neighbor.
2) Init: This state indicates that the router has received a hello packet from its neighbor, but
the receiving routers ID was not included in the hello packet.
3) 2-Way: This state indicates that bi-drectional communication has been established
between two routers. In this DR/BDR election takes place.
DR/BDR
In OSPF, in any broadcast link, DR/BDR is elected. DR is known as designated router and
BDR is backup designated router. In this protocol all the updates are transferred to DR/BDR
in a broadcast link and DR will forward the update to everyone in broadcast link. This
decreases the update flooding when there is no DR/BDR routers. When a DR router goes
down then BDR takes its place and becomes DR and new BDR is elected. BDR always listen
and keeps an eye on DR.
The router which starts first with OSPF enabled will become DR and the second will become
BDR. This is by default. If in some case all routers start simultaneously then the router with
highest router priority will become the DR. if priority is same, which is same by default, then
the router with highest router ID will become DR and second highest will become the BDR.
DR/BDR election is on interface basis. Updates to DR/BDR are transmitted on multicast
address 224.0.0.5 and DR sends the reply on 224.0.0.6
Exstart State: In this state the master/slave are selected which is temporary only. Master/slave
are made for proper communication to establish between routers.
47

Exchange State: In this state the DBD packets are exchanged. First the master sends its dat to
slave and slave acknowledges and after that slave transmits and master acknowledges.
Loading State: In this state, the actual exchange of link state information occurs. Also
when there is something new in the network the update takes place at this stage only i.e.
loading takes place.
Full state: In this state, routers are fully adjacent with each other i.e. neighborship has been
established. All the network LSAs are exchanged and the router databases are fully
synchronized.

Router ID
Router ID is the unique name of router. It is like IP address only i.e. 32 bit. There are two
ways of providing router a router ID viz manually and automatically.
Manually: Providing router the router ID manually, is given by a command which is given
under OSPF process as follows:
Router(config)#router OSPF <process no.>
Router(config-router)#router id <ID as A.B.C.D>
Automatically: If manually router ID is not given then router itself assigns the ID. First it
checks the loopbacks. If loopbacks are there then highest loopback address is assigned to the
router as router ID. If loopbacks are not present then it checks the active interface and assigns
the highest IP as router ID. If there are no active interfaces and loopbacks then OSPF process
wont run.
OSPF Areas
If there are huge number of routers in a network then in OSPF they can be grouped to a
particular area. In OSPF each router has full map of a network. So larger the network, larger
the map will be and more the processing each router will take. Now that large network can be
divided into smaller areas in which every router now keeps the map of those router present in
its area.
To communicate between different areas there must be area 0 in between them which is
known as backbone area. The routers which connects two areas are known as ABR (area
border router). The router which connects different autonomous systems is known ASBR
(autonomous system border router). Area is formed on the interface basis.
OSPF Tables
a) Adjancy Table: In this table the list of all the neighbor routers with their router ID is
present with whom the adjancy has been established.
b) Database Table: In this table whole topology table is present i.e. the routers which are
present in a network are stored in this table.
48

c) Forwarding Table: This table is also known as routing table. In this all the best path to
routers are stored so that whenever packet comes to a router, the router sees the routing
table and forward the packet immediately.
Wild Card Bits
Wild card bits or wild card mask is derived from subnet mask by subtracting subnet mask
from 255.255.255.255 e.g. if a subnet mask is 255.255.255.240 then the wild card bit will be
0.0.0.15
Border Gateway Protocol (BGP)
Described by RFC 1267, 1268, and 1497. It uses TCP as a transport protocol. When two
systems are using BGP, they establish a TCP connection, then send each other their BGP
routing tables. BGP uses distance vectoring. It detects failures by sending periodic keep alive
messages to its neighbours every 30 seconds. It exchanges information about reachable
networks with other BGP systems including the full path of systems that are between them.
Interior Gateway Routing Protocol (IGRP)
IGRP is a distance vector interior-gateway protocol (IGP). Distance vector routing protocols
call for each router to send all or a portion of its routing table in a routing update message at
regular intervals to each of its neighbouring routers. As routing information proliferates
through the network, routers can calculate distances to all nodes within the internetwork.
Enhanced Interior Gateway Routing Protocol (EIGRP)
The Enhanced Interior Gateway Routing Protocol (EIGRP), referred to as an advanced
Distance Vector protocol, offers radical improvements over IGRP. Traditional DV protocols
such as RIP and IGRP exchange periodic routing updates with all their neighbors, saving the
best distance (or metric) and the vector (or next hop) for each destination. EIGRP differs in
that it saves not only the best (least-cost) route but all routes, allowing convergence to be
much quicker. Further, EIGRP updates are sent only upon a network topology change;
updates are not periodic.
It is a cisco proprietary protocol. It supports classless updates. It is a hybrid routing because it
has a characteristics of both distance vector and link state protocol. It sends distance vector
updates containing information about networks plus the cost of reaching them from the
perspective of the advertising router. It has link state characteristics as well it synchronizes
routing tables between neighbors at startup and then sends specific updates only when
topology changes occur. EIGRP has a maximum hop count of 255 but by default it is set to
100.
It is the only protocol that supports unequal cost load balancing. It uses DUAL (diffusing
update algorithm) algorithm to find best path. This protocol also has information about
backup path. EIGRP has fastest convergence time. Its hello timer is 5 sec and dead timer is 15
sec.
49

EIGRP has five packet types as:


a) Hello Packet: Hello packet establishes the neighborship and maintains the neighborship.
b) Update Packet: Update packets are used to exchange information about network.

c) Query Packets: These packets are used to send the request to neighbor about network.
d) Reply Packet: It is used to send the response of query packet.
e) Ack Packet: These packets are used to send the acknowledgement for update, query, and
reply packet.
EIGRP has three tables to maintain:
1) Neighbor Table: It keeps the list of its neighbors in the neighbor table. This table also
contains the neighbors IP address, Interface, SRTT (smooth round trip time), RTO
(retransmission time out) timer, and it also contains the uptime of a neighborship. It only
trusts the routes coming from a neighbor. If the router whos entry is not listed in
neighbor table, EIGRP will not accept its update.
2) Topology Table: All the routes which are learnt by an EIGRP router are kept in topology
table. It contains the backup routes to a destination.

3) Routing Table: It contains the list of best paths for a destination. Only this is the table
which is used by router to forward packet for destination. From here the route is taken
and the packet is forwarded.
EIGRP metric is Bandwidth, Load, Delay, MTU (maximum transfer unit), and Reliability. By
default bandwidth and delay are used.
IS-IS: Intermediate System to Intermediate System Routing Protocol
Intermediate System-to-Intermediate System (IS-IS) is a routing protocol developed by the
ISO. It is a link-state protocol where IS (routers) exchange routing information based on a
single metric to determine network topology. It behaves similar to Open Shortest Path First
(OSPF) in the TCP/IP network.

50

ACL (Access Control List)


Access control list is used to provide the packet filtering function in the network. ACL is used
to permit or deny the unwanted packets or they can be used to control that which network
will or will not be advertised by dynamic routing protocol.

The packet is always compared with each line of the access list in sequential order.

The packet is compared with lines of the access list only until a match is made. Once the
packet matches the condition on a line of the access list, the packet is acted upon and no
further comparison takes place.

There is an implicit deny at the end of each access list i.e. if a packet doesnt match the
condition on any of the lines in the access list, the packet will be discarded.

There are two main types of access list:


1) Standard Access List
2) Extended Access List
Standard Access List
Standard IP access list filter network traffic by examining the source IP address in a packet.
Standard access lists are created by using the access list numbers 1 to 99 or 1300 to 1999.
Access list types are generally differentiated using a number. Based on the number used when
the access list is created, the router knows which type of syntax to expect as the list is
entered.
The access list is first created and applied on the interface as shown below:

51

Extended Access List


Extended access list checks source IP, destination IP, and protocol like TCP, UDP, IP etc. On
the basis of all these things the packet is either permit or deny as per the list created.
Extended access list range is 100 to 199 or 2000 to 2699.
For best results standard access list should be applied near the destination and extended
access list should be applied near the source.
The configuration of extended access list is as:

52

Network Address Translation/ Port Address Translation (NAT/PAT)


In computer networking, network address translation (NAT) is the process of
modifying network address information in datagram (IP) packet headers while in transit
across a traffic routing device for the purpose of remapping one IP address space into another.
Most often today, NAT is used in conjunction with network masquerading (or IP
masquerading) which is a technique that hides an entire IP address space, usually consisting
of private network IP addresses (RFC 1918), behind a single IP address in another, often
public address space. This mechanism is implemented in a routing device that
uses stateful translation tables to map the "hidden" addresses into a single IP address and
readdresses the outgoing Internet Protocol (IP) packets on exit so that they appear to originate
from the router. In the reverse communications path, responses are mapped back to the
originating IP address using the rules ("state") stored in the translation tables. The translation
table rules established in this fashion are flushed after a short period unless new traffic
refreshes their state.
As described, the method enables communication through the router only when the
conversation originates in the masqueraded network, since this establishes the translation
tables. For example, a web browser in the masqueraded network can browse a website
outside, but a web browser outside could not browse a web site in the masqueraded network.
However, most NAT devices today allow the network administrator to configure translation
table entries for permanent use. This feature is often referred to as "static NAT" or port
forwarding and allows traffic originating in the "outside" network to reach designated hosts in
the masqueraded network.
In the mid-1990s NAT became a popular tool for alleviating the problem of IPv4 address
exhaustion. It has become a standard, indispensable feature in routers for home and smalloffice Internet connections.
Most systems using NAT do so in order to enable multiple hosts on a private network to
access the Internet using a single public IP address (see gateway). However, NAT breaks the
originally envisioned model of IP end-to-end connectivity across the Internet, introduces
complications in communication between hosts, and affects performance.
NAT obscures an internal network's structure: all traffic appears to outside parties as if it
originated from the gateway machine.

53

Network address translation involves over-writing the source or destination IP address and
usually also the TCP/UDP port numbers of IP packets as they pass through the router.
Checksums (both IP and TCP/UDP) must also be rewritten as a result of these changes.

There are two levels of network address translation.

Basic NAT. This involves IP address translation only, not port mapping.

PAT (Port Address Translation). Also called simply "NAT" or "Network Address
Port Translation, NAPT". This involves the translation of both IP addresses and port
numbers.

All Internet packets have a source IP address and a destination IP address. Both or either of
the source and destination addresses may be translated.
Some Internet packets do not have port numbers: for example, ICMP packets. However, the
vast bulk of Internet traffic is TCP and UDP packets, which do have port numbers. Packets
which do have port numbers have both a source port number and a destination port number.
Both or either of the source and destination ports may be translated.
NAT which involves translation of the source IP address and/or source port is called source
NAT or SNAT. This re-writes the IP address and/or port number of the computer which
originated the packet.
NAT which involves translation of the destination IP address and/or destination port number
is called destination NAT or DNAT. This re-writes the IP address and/or port number
corresponding to the destination computer.
SNAT and DNAT may be applied simultaneously to Internet packets.

54

Full-cone NAT, also known as oneto-one NAT

Once an internal address


(iAddr:iPort) is mapped to an
external address (eAddr:ePort),
any packets from iAddr:iPort will
be sent through eAddr:ePort.

Any external host can send


packets to iAddr:iPort by sending
packets to eAddr:ePort.

(Address) restricted cone NAT

Once an internal address


(iAddr:iPort) is mapped to an
external address (eAddr:ePort),
any packets from iAddr:iPort will
be sent through eAddr:ePort.

An external host (hAddr:any)


can send packets to iAddr:iPort
by sending packets to
eAddr:ePort only if iAddr:iPort
has previously sent a packet to
hAddr:any. "Any" means the port
number doesn't matter.

Port-restricted cone NAT


Like an address restricted cone NAT,
but the restriction includes port
numbers.

Once an internal address


(iAddr:iPort) is mapped to an
external address (eAddr:ePort),
any packets from iAddr:iPort will
be sent through eAddr:ePort.

55

An external host
(hAddr:hPort) can send packets
to iAddr:iPort by sending packets
to eAddr:ePort only if iAddr:iPort
has previously sent a packet to
hAddr:hPort.

Symmetric NAT

Requests from internal IP


address and port combinations to
different external IP address and
port pairs are mapped to the
external NAT address on a unique
port. This also applies to all
requests from the same host to
different destinations.

Only an external host that


receives a packet from an internal
host can send a packet back.

NAT and TCP/UDP


"Pure NAT", operating on IP alone, may or may not correctly parse protocols that are totally
concerned with IP information, such as ICMP, depending on whether the payload is
interpreted by a host on the "inside" or "outside" of translation. As soon as the protocol stack
is climbed, even with such basic protocols as TCP and UDP, the protocols will break unless
NAT takes action beyond the network layer.
The major transport layer protocols, TCP and UDP, have a checksum that covers all the data
they carry, as well as the TCP/UDP header, plus a "pseudo-header" that contains the source
and destination IP addresses of the packet carrying the TCP/UDP header. For an originating
NAT to successfully pass TCP or UDP, it must recompute the TCP/UDP header checksum
based on the translated IP addresses, not the original ones, and put that checksum into the
TCP/UDP header of the first packet of the fragmented set of packets. The receiving NAT
must recompute the IP checksum on every packet it passes to the destination host, and also
recognize and recompute the TCP/UDP header using the retranslated addresses and pseudo56

header. This is not a completely solved problem. One solution is for the receiving NAT to
reassemble the entire segment and then recompute a checksum calculated across all packets.

STATIC NAT
Static NAT is a simple one-to-one mapping of private and public addresses. This is required
to support inbound connections from your public network into your private network. For each
local address defined, there has to be an associated globally unique address.

Dynamic NAT
Dynamic NAT can only be used to establish connections from within the private network out
to the public network. A pool of network addresses is maintained and used when an outbound
connection is made. Each connection is assigned a unique public address. The maximum
number of simultaneous connections is equal to the number of public addresses in the pool.
This is similar to a one-to-one correspondence between addresses. Dynamic NAT allows you
to communicate with the Internet through a dynamic NAT address. The figure below
illustrates Dynamic NAT.
57

DRAWBACKS
Hosts behind NAT-enabled routers do not have end-to-end connectivity and cannot participate
in some Internet protocols. Services that require the initiation of TCP connections from the
outside network, or stateless protocols such as those using UDP, can be disrupted. Unless the
NAT router makes a specific effort to support such protocols, incoming packets cannot reach
their destination. Some protocols can accommodate one instance of NAT between
participating hosts ("passive mode" FTP, for example), sometimes with the assistance of an
application-level gateway, but fail when both systems are separated from the Internet by
NAT. Use of NAT also complicates tunneling protocols such as IPsec because NAT modifies
values in the headers which interfere with the integrity checks done by IPsec and other
tunneling protocols.
End-to-end connectivity has been a core principle of the Internet, supported for example by
the Internet Architecture Board. Current Internet architectural documents observe that NAT is
a violation of the End-to-End Principle, but that NAT does have a valid role in careful design.
58

There is considerably more concern with the use of IPv6 NAT, and many IPv6 architects
believe IPv6 was intended to remove the need for NAT.
Because of the short-lived nature of the stateful translation tables in NAT routers, devices on
the internal network lose IP connectivity typically within a very short period of time unless
they implement NAT keep-alive mechanisms by frequently accessing outside hosts. This
dramatically shortens the power reserves on battery-operated hand-held devices and has
thwarted more widespread deployment of such IP-native Internet-enabled devices.

BENFITS
The primary benefit of IP-masquerading NAT is that it has been a practical solution to the
impending exhaustion of IPv4 address space. Even large networks can be connected to the
Internet with as little as a single IP address. The more common arrangement is having
machines that require end-to-end connectivity supplied with a routable IP address, while
having machines that do not provide services to outside users behind NAT with only a few IP
addresses used to enable Internet access.
Some have also called this exact benefit a major drawback, since it delays the need for the
implementation of IPv6

59

SWITCHING BASICS
Network Interface Card
A network interface card, network adapter, network interface controller (NIC), or LAN adapter is a computer hardware component designed to allow computers to communicate over a
computer network. It is both an OSI layer 1 (physical layer) and layer 2 (data link layer)
device, as it provides physical access to a networking medium and provides a low-level
addressing system through the use of MAC addresses.

Various functions which a switch performs:Address learning Layer 2 switches and bridges remember the source hardware address of
each frame received on an interface, and they enter this information into a MAC database
called a forward/filter table.
Forward/filter decisions When a frame is received on an interface, the switch looks at the
destination hardware address and finds the exit interface in the MAC database. The frame is
only forwarded out the specified destination port.
Loop avoidance If multiple connections between switches are created for redundancy
purposes, network loops can occur. Spanning Tree Protocol (STP) is used to stop network
loops while still permitting redundancy.
Address Learning
When a switch is first powered on, the MAC forward/filter table is empty, as shown in figure.
Empty forward/filter table on a switch
MAC Forward/Filter Table
E0/0: E0/1: E0/2:
E0/3:

60

Host A

Host B

Host C

Host D

When a device transmits and an interface receives a frame, the switch places the frames
source address in the MAC forward/filter table, allowing it to remember which interface the
sending device is located on. The switch then has no choice but to flood the network with this
frame out of every port except the source port because it has no idea where the destination
device is actually located. If a device answers this flooded frame and sends a frame back,
then the switch will take the source address from that frame and place that MAC address in
its database as well, associating this address with the interface that received the frame. Since
the switch now has both of the relevant MAC addresses in its filtering table, the two devices
can now make a point-to-point connection. The switch doesnt need to flood the frame as it
did the first time because now the frames can and will be forwarded only between the two
devices. This is exactly the thing that makes layer 2 switches better than hubs. In a hub
network, all frames are forwarded out all ports every time no matter what. Following figure
shows the processes involved in building a MAC database.
How switches learn hosts locations
MAC Forward/Filter Table
E0/0: 0000.8c01.000A
E0/1: 0000.8c01.000B
E0/2:E0/3:

61

Host A sends a frame to Host B. Host As MAC address is 0000.8c01.000A;


Host Bs MAC address is 0000.8c01.000B.
The switch receives the frame on the E0/0 interface and places the source address in the
MAC address table. Since the destination address is not in the MAC database, the frame is
forwarded out all interfacesexcept the source port. Host B receives the frame and responds
to Host A. The switch receives this frame on interface E0/1 and places the source hardware
address in the MAC database. Host A and Host B can now make a point-to-point connection
and only the two devices will receive the frames. Hosts C and D will not see the frames, nor
are their MAC addresses found in the database because they havent yet sent a frame to the
switch. If Host A and Host B dont communicate to the switch again within a certain amount
of time, the switch will flush their entries from the database to keep it as current as possible.

Forward/Filter Decisions
When a frame arrives at a switch interface, the destination hardware address is compared to
the forward/filter MAC database. If the destination hardware address is known and listed in
the database, the frame is only sent out the correct exit interface. The switch doesnt transmit
the frame out any interface except for the destination interface. This preserves bandwidth on
the other network segments and is called frame filtering. But if the destination hardware
address is not listed in the MAC database, then the frame is flooded out all active interfaces
except the interface the frame was received on. If a device answers the flooded frame, the
MAC database is updated with the devices location (interface). If a host or server sends a
broadcast on the LAN, the switch will flood the frame out all active ports except the source
port by default. Remember, the switch creates smaller collision domains, but its still one
large broadcast domain by default.
Forward/filter table
Switch#sh mac address-table
1 0005.dccb.d74b Fa0/4
1 000a.f467.9e80 Fa0/5
1 000a.f467.9e8b Fa0/6

62

Since Host As MAC address is not in the forward/filter table, the switch will add the source
address and port to the MAC address table and then forward the frame to Host D. If Host Ds
MAC address was not in the forward/filter table, the switch would have flooded the frame out
all ports except for port Fa0/3.
Now lets take a look at the output of a show mac address-table:
Switch#sh mac address-table
Vla Mac Address
Type
n
1
1
1
1
1
1
1
1

DYNAMI
C
DYNAMI
000a.f467.9e80
C
DYNAMI
000a.f467.9e8b
C
DYNAMI
000a.f467.9e8c
C
0010.7b7f.c2b0 DYNAMI
C
DYNAMI
0030.80dc.460b
C
0030.9492.a5dd DYNAMI
C
DYNAMI
00d0.58ad.05f4
C
0005.dccb.d74b

Ports

Fa0/1
Fa0/3
Fa0/4
Fa0/3
Fa0/3
Fa0/3
Fa0/1
Fa0/1

Loop Avoidance
Redundant links between switches are a good idea because they help prevent complete
63

network failures in the event one link stops working. This is because frames can be flooded
down all redundant links simultaneously, creating network loops as well as other evils.
Heres a list of some of the ugliest problems:
If no loop avoidance schemes are put in place, the switches will flood broadcasts endlessly
throughout the internetwork. This is sometimes referred to as a broadcast storm.
Broadcast storm

SPANNING TREE PROTOCOL (STP)

STP is a bridge-to-bridge protocol used to maintain a loop-free network.


STP establishes a root bridge, a root port, and designated ports.
With STP, the root bridge has the lowest bridge ID, which is made up of the bridges
priority and MAC address.
With STP, ports transition through four states: blocking, listening, learning, and
forwarding.
If a change occurs to the network topology, STP maintains connectivity by
transitioning some blocked ports to the forwarding state.
RSTP significantly speeds the recalculation of the spanning tree when the network
topology changes.

Spanning-Tree Operation

One root bridge per network


One root port per non-root bridge
64

One designated port per segment


Non-designated ports are unused

65

VLANS (Virtual LANs)

A VLAN permits a group of users to share a common broadcast domain regardless of their
physical location in the internetwork. VLAN improve performance and security in switched
networks.
A Catalyst switch operates in a network like a traditional bridge. Each VLAN configured on
the switch implements address learning, forwarding/filtering decisions, and loop avoidance
mechanisms.
Ports belonging to a VLAN are configured with a membership mode that determines to which
VLAN they belong. Catalyst switches support two VLAN membership modes: static and
dynamic.
The IEEE 802.1Q protocol is used to transport frames for multiple VLANs between switches
and routers, and for defining VLAN topologies.

66

WAN (Wide Area Network) and Protocols involved


Below figures shows the different WAN connection types that can be used to connect distant
devices.
WAN connection types

Synchronous serial

Heres a list explaining the different WAN connection types:


Leased lines These are usually referred to as a point-to-point or dedicated connection. A
leased line is a pre-established WAN communications path that goes from the CPE through
the DCE switch, then over to the CPE of the remote site. The CPE enables DTE networks to
communicate at any time with no cumbersome setup procedures to muddle through before
transmitting data.
When youve got plenty of cash, this is really the way to go because it uses synchronous
serial lines up to 45Mbps. HDLC and PPP encapsulations are frequently used on leased lines.
Circuit switching When you hear the term circuit switching, think phone call. The big
advantage is costyou only pay for the time you actually use. No data can transfer before an
end-to-end connection is established. Circuit switching uses dial-up modems or ISDN and is
used for low-bandwidth data transfers.
Packet switching This is a WAN switching method that allows you to share bandwidth with
other companies to save money. Packet switching can be thought of as a network thats
designed to look like a leased line yet charges you more like circuit switching. But less cost
isnt always bettertheres definitely a downside: If you need to transfer data constantly, just
forget about this option. Instead, get yourself a leased line. Packet switching will only work
67

for you if your data transfers are the bursty typenot continuous. Frame Relay and X.25 are
packet-switching technologies with speeds that can range from 56Kbps up to T3 (45Mbps).
Frame Relay A packet-switched technology that made its debut in the early 1990s, Frame
Relay is a high-performance Data Link and Physical layer specification. Its pretty much a
successor to X.25, except that much of the technology in X.25 used to compensate for
physical errors (noisy lines) has been eliminated. An upside to Frame Relay is that it can be
more cost effective than point-to-point links, plus it typically runs at speeds of 64Kbps up to
45Mbps (T3). Another Frame Relay benefit is that it provides features for dynamic bandwidth
allocation and congestion control.

HDLC High-Level Data-Link Control (HDLC) was derived from Synchronous Data Link
Control (SDLC), which was created by IBM as a Data Link connection protocol. HDLC
works at the Data Link layer and creates very little overhead compared to LAPB. It wasnt
intended to encapsulate multiple Network layer protocols across the same linkthe HDLC
header doesnt contain any identification about the type of protocol being carried inside the
HDLC encapsulation. Because of this, each vendor that uses HDLC has its own way of
identifying the Network layer protocol, meaning each vendors HDLC is proprietary with
regard to its specific equipment.
PPP Point-to-Point Protocol (PPP) is a pretty famous, industry-standard protocol. Because all
multiprotocol versions of HDLC are proprietary, PPP can be used to create point-to-point
links between different vendors equipment. It uses a Network Control Protocol field in the
Data Link header to identify the Network layer protocol and allows authentication and multilink connections to be run over asynchronous and synchronous links.

68

IP Version-6
Internet Protocol version 6 (IPv6) is a version of the Internet Protocol that is designed to
succeed IPv4, the first publicly used implementation, which is still in dominant use currently.
It is an Internet Layer protocol for packet-switched internetworks. The main driving force for
the redesign of Internet Protocol is the foreseeable IPv4 address exhaustion.
IPv6 has a vastly larger address space than IPv4. This results from the use of a 128-bit
address, whereas IPv4 uses only 32 bits. The new address space thus supports 2 128
(about 3.41038) addresses. This expansion provides flexibility in allocating addresses and
routing traffic and eliminates the primary need for network address translation (NAT), which
gained widespread deployment as an effort to alleviate IPv4 address exhaustion.
IPv6 also implements new features that simplify aspects of address assignment (stateless
address autoconfiguration) and network renumbering (prefix and router announcements)
when changing Internet connectivity providers. The IPv6 subnet size has been standardized
by fixing the size of the host identifier portion of an address to 64 bits to facilitate an
automatic mechanism for forming the host identifier from Link Layer media addressing
information (MAC address).
IPv4 exhaustion
Estimates of the time frame until complete exhaustion of IPv4 addresses varied widely. In
2003, Paul Wilson (director of APNIC) stated that, based on then-current rates of
deployment, the available space would last for one or two decades. In September 2005, a
report by Cisco Systems suggested that the pool of available addresses would dry up in as
little as 4 to 5 years. As of May 2009, a daily updated report projected that the IANA pool of
unallocated addresses would be exhausted in June 2011, with the various Regional Internet
Registries using up their allocations from IANA in March 2012. There is now consensus
among Regional Internet Registries that final milestones of the exhaustion process will be
passed in 2010 or 2011 at the latest, and a policy process has started for the end-game and
post-exhaustion era.

Features and Differences From IPv4


In most regards, IPv6 is a conservative extension of IPv4. Most transport- and applicationlayer protocols need little or no change to operate over IPv6; exceptions are application
protocols that embed internet-layer addresses, such as FTP or NTPv3.

69

IPv6 specifies a new packet format, designed to minimize packet-header processing. Since
the headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are
not interoperable.

Larger address space


The most important feature of IPv6 is a much larger address space than that of IPv4:
addresses in IPv6 are 128 bits long, compared to 32-bit addresses in IPv4.

An illustration of an IP address (version 6), in hexadecimal and binary.

The very large IPv6 address space supports a total of 2 128 (about 3.41038) addressesor
approximately 51028 (roughly 295) addresses for each of the roughly 6.8 billion (6.8109)
people alive in 2010.
the longer addresses allow a better, systematic, hierarchical allocation of addresses and
efficient route aggregation. With IPv4, complex Classless Inter-Domain Routing (CIDR)
techniques were developed to make the best use of the small address space. Renumbering an
existing network for a new connectivity provider with different routing prefixes is a major
effort with IPv4. With IPv6, however, changing the prefix announced by a few routers can in
principle renumber an entire network since the host identifiers (the least-significant 64 bits of
an address) can be independently self-configured by a host.
The size of a subnet in IPv6 is 264 addresses (64-bit subnet mask), the square of the size of the
entire IPv4 Internet. Thus, actual address space utilization rates will likely be small in IPv6,
but network management and routing will be more efficient because of the inherent design
decisions of large subnet space and hierarchical route aggregation.

70

IPv6 Addressing and Expressions


Now we will understand how IP addresses are structured and used. We have already read
about the fact that at 128 bits, an IPv6 address is much larger than an IPv4 address. Because
of this, as well as the new ways the addresses can be used, it is believed that IPv6 will be
more complicated to manage. But it is not true. Following is a figure which has a sample
IPv6 address broken down into sections.
Shortened Expression
There are few tricks to help rescue us when writing these long addresses. For one thing, we
can actually leave out parts of the address to abbreviate it, but to get away with doing that we
have to follow a couple of rules.
First, we can drop any leading zeros in each of the individual blocks. After we do that, the
sample address from earlier would then look like this:
2001:db8:3c4d:12:0:0:1234:56ab
Interface ID
2001:0db8:3c4d:0012:0000:0000:1234:56ab
Global prefix Subnet
Again referring to our sample address, we can remove the two blocks of zeros by replacing
them with double colons, like this:
2001:db8:3c4d:12:: 1234:56ab
We replaced the blocks of all zeros with double colons. So if the address has four blocks of
zeros and each of them were separated, we just don't get to replace them all; the rule is that
we can only replace one contiguous block with double colon.
For example:
2001:0000:0000:0012:0000:0000:1234:56ab
And we just cant do this:
2001::12::1234:56ab
Instead, this is the best that we can do:
2001::12:0:0:1234:56ab
The reason why the above example is our best shot is that if we remove two sets of zeros, the
device looking at the address will have no way of knowing where the zeros go back in.
Basically, the router would look at the incorrect address and say, Well, do I place two blocks
into the first set of double colons and two into the second set, or do I place three blocks into
the first set and one block into the second set? And on and on it would go because the
information the router needs just isnt there.
Address Types
Were all familiar with IPv4s unicast, broadcast, and multicast addresses that basically define
who or at least how many other devices were talking to. Broadcasts, as we know, have been
eliminated in IPv6 because of their cumbersome inefficiency.
So lets find out what each of these types of IPv6 addressing and communication methods do
for us.

71

Unicast
Packets addressed to a unicast address are delivered to a single interface. For load balancing,
multiple interfaces can use the same address. There are a few different types of unicast
addresses, but we dont need to get into that here.
Global unicast addresses
These are your typical publicly routable addresses, and theyre the same as they are in IPv4.
Link-local addresses
These are like the private addresses in IPv4 in that theyre not meant to be routed. Think of
them as a handy tool that gives you the ability to throw a temporary LAN together for
meetings or for creating a small LAN thats not going to be routed but still needs to share and
access files and services locally.
Unique local addresses
These addresses are also intended for non-routing purposes, but they are nearly globally
unique, so its unlikely youll ever have one of them overlap. Unique local addresses were
designed to replace site-local addresses, so they basically do almost exactly what IPv4 private
addresses doallow communication throughout a site while being routable to multiple local
networks. Site-local addresses were denounced as of September 2004.
Multicast
Again, same as in IPv4, packets addressed to a multicast address are delivered to all
interfaces identified by the multicast address. Sometimes people call them one-to-many
addresses. Its really easy to spot a multicast address in IPv6 because they always start with
FF.
Anycast
Like multicast addresses, an anycast address identifies multiple interfaces, but theres a big
difference: the anycast packet is only delivered to one addressactually, to the first one it
finds defined in terms of routing distance. And again, this address is special because you can
apply a single address to more than one interface. You could call them one-to-one-of many
addresses, but just saying anycast is a lot easier.
Special Addresses
There are a plenty of special, reserved addresses in IPv6 they are there in IPv4. Lets go over
them now.
Theyre all special or reserved for specific use, but unlike IPv4, IPv6 gives us a galaxy of
addresses, so reserving a few here.
0:0:0:0:0:0:0:0

72

Equals ::. This is the equivalent of IPv4s 0.0.0.0, and is typically the source address of a host
when youre using stateful configuration.
0:0:0:0:0:0:0:1
Equals ::1. The equivalent of 127.0.0.1 in IPv4.

0:0:0:0:0:0:192.168.100.1
This is how an IPv4 address would be written in a mixed IPv6/IPv4 network environment.
2000::/3
The global unicast address range.
FC00::/7
The unique local unicast range.
FE80::/10
The link-local unicast range.
FF00::/8
The multicast range.
3FFF:FFFF::/32
Reserved for examples and documentation.
2001:0DB8::/32
Also reserved for examples and documentation.
2002::/16
Used with 6to4, which is the transition systemthe structure that allows IPv6 packets to be
transmitted over an IPv4 network without the need to configure explicit tunnels.

73

Wi-Fi
Wi-Fi is the name for the popular wireless networking technology that uses radio waves to
provide wireless high-speed Internet and network connections. The Wi-Fi Alliance, the
organization that owns the Wi-Fi (registered trademark) term specifically defines Wi-Fi as
any "wireless local area network (WLAN) products that are based on the Institute of
Electrical and Electronics Engineers' (IEEE) 802.11 standards."
The deregulation of certain radio-frequencies for unlicensed spread spectrum deployment
enabled the development of Wi-Fi products, Wi-Fi's onetime competitor HomeRF, Bluetooth,
and many other products such as some types of cordless telephones.
The inventors initially intended to use the technology for cashier systems; the first wireless
products were brought on the market under the name WaveLAN with raw data rates of 1
Mbit/s and 2 Mbit/s.
Below are some basic facts and pieces of information related to Wi-Fi which will help you
understand Wi-Fi much better and easier.
1. Wi-Fi is a wireless technology that lets digital devices such as PCs, laptops,
mobile phones to connect and access internet through a router without any
physical association with the wired network(LAN).Interestingly,Wireless
Fidelity,as such does not mean anything.It was actually a branding strategy
by the governing Alliance to make their service a bit more catchy and Hi-Fi.
2. Wi-Fi hotspots are the access points through which wireless internet is
accessed. Restaurants, coffee-shops, food joints offer free hotspots within their
premises as a mode of attraction. More hotspots correspond to more coverage
and heavy usage support(higher bandwidth support).
3. To establish a Wi-Fi connectivity, the two primary conditions are Wireless
adapter at users end(within the laptop or PC) and a Wi-Fi router(externally
placed).Most of new laptops and desktop computers come with built-in
wireless adapter.
4. Wi-Fi networks are very limited in range. A typical Wi-Fi router might have a
range of 30 m(~100 ft) indoor and 90 m(295 ft) outdoor. Range also varies
with selected frequency band. Wi-Fi in the 2.4 GHz frequency band has
slightly better range than Wi-Fi in the 5 GHz frequency band.

74

5. Wi-Fi is much more prone to security abuse than wired LAN.As the level of
openness is quite high, Wi-Fis encryption methods face continuous failure in
front of easily available softwares such as Aircrack. This is the reason why
private Wi-Fi networks prefer employing Whitelist IP Usage only.

Initially, Wi-Fi was used in place of only the 2.4GHz 802.11b standard, however the Wi-Fi
Alliance has expanded the generic use of the Wi-Fi term to include any type of network or
WLAN product based on any of the 802.11 standards, including 802.11b, 802.11a, dual-band,
and so on, in an attempt to stop confusion about wireless LAN interoperability.
Wi-Fi works with no physical wired connection between sender and receiver by using radio
frequency (RF) technology, a frequency within the electromagnetic spectrum associated with
radio wave propagation. When an RF current is supplied to an antenna, an electromagnetic
field is created that then is able to propagate through space. The cornerstone of any
wireless network is an access point (AP). The primary job of an access point is to broadcast a
wireless signal that computers can detect and "tune" into. In order to connect to an access
point and join a wireless network, computers and devices must be equipped with
wireless network adapters
Wi-Fi is supported by many applications and devices including video game consoles,
home networks, PDAs, mobile phones, major operating systems, and other types of consumer
electronics. Any products that are tested and approved as "Wi-Fi Certified" (a registered
trademark) by the Wi-Fi Alliance are certified as interoperable with each other, even if they
are from different manufacturers. For example, a user with a Wi-Fi Certified product can use
any brand of access point with any other brand of client hardware that also is also "Wi-Fi
Certified". Products that pass this certification are required to carry an identifying seal on
their packaging that states "Wi-Fi Certified" and indicates the radio frequencyband used
(2.5GHz for 802.11b, 802.11g, or 802.11n, and 5GHz for 802.11a).

75

Wireless Technology Standards


Because there are multiple technology standards for wireless networking, it pays to do your
homework before buying any equipment. The most common wireless technology
standards include the following:

802.11b: The first widely used wireless networking technology, known as 802.11b
(more commonly called Wi-Fi), first debuted almost a decade ago, but is still in use.

802.11g: In 2003, a follow-on version called 802.11g appeared offering greater


performance (that is, speed and range) and remains today's most common wireless
networking technology.
76

802.11n: Another improved standard called 802.11n is currently under development


and is scheduled to be complete in 2009. But even though the 802.11n standard has
yet to be finalized, you can still buy products based on the draft 802.11n standard,
which you will be able to upgrade later to the final standard.

All of the Wi-Fi variants (802.11b, g and n products) use the same 2.4 GHz radio frequency,
and as a result are designed to be compatible with each other, so you can usually use devices
based on the different standards within the same wireless network. The catch is that doing so
often requires special configuration to accommodate the earlier devices, which in turn can
reduce the overall performance of the network. In an ideal scenario you'll want all your
wireless devices, the access point and all wireless-capable computers, to be using the same
technology standard and to be from the same vendor whenever possible.
A General Misconception
A common misconception is that the term Wi-Fi is short for "wireless fidelity," however this
is not the case. Wi-Fi is simply a trademarked term meaning IEEE 802.11x

77

COMMANDS TO SET PASSWORDS ON A ROUTER

To set password on privilege mode:Router(config)#enable password daviet


(In encrypted form),
Router(config)#enable secret daviet

To set password on console port:Router(config)# line console 0


Router(config-line)#password daviet
Router(config-line)#login

To set password on telnet port:Router(config)#line vty 0 4


Router(config-line)#password daviet

To encrypt all the passwords:Router(config)#service password encryption

HOW TO BREAK PASSWORD ON A ROUTER

Sometimes the user forgets the password set by him on a router. To avoid such inconvenience
in the use of routers, below is given the method to break the password on a router.

As we know that, when a router boots up, it takes all of the previous data from its nonvolatile memory which flows in the following way:

78

This is due to the default registered value (i.e, 0x2102) being provided by Cisco to the router
while manufacturing it.
If we change this registered value from 0x2102 to 0x2142, then the router while booting up
will not demand any passwords being set up previously by the user because now it doesnt
takes the data present in NVRAM.

Commands required:While booting up, Press Ctrl+ Pause Break- to switch from USER MODE to ROMMOM
MODE.
Rommon>confreg 0x2142
Rommon>reset
Router>enable
Router#configure terminal
Router(config)#copy startup-config running-config
Now,all the data from startup configuration has got copied in the running configuration. Thus,
now we can set up cancel all previous passwords and set up new passwords.
Now, we have to follow the same procedure to again change the registered value from
0x2142 to 0x2102 so that the router follows its previous method of booting up.
Thus, now we have canceled the previous passwords on the router and set up new ones
without knowing the previous passwords.

79

ROUTER CONFIGURATION
1
2
3
4
5
6
7
8

Configure routers
Access Routers through Telnet
Security
Wi-Fi
Switching database(vlan database)
Trunking
Firewall
Configuration of routers through Propriety protocols(eigrp vlsm)

HOW TO START CONFIGURE ROUTER

80

CONFIGURE ROUTERS
To configure router first time through HyperTerminal using rollover cable Router
configuration process commands-:
1. Start the HyperTerminal .exe program (hypertrm.exe). Click on START,
then ACCESSORIES, then COMMUNICATIONS, then HYPERTERMINAL,
then chose the HyperTerminal entry that does not have an .ht extension.

2. This brings up this dialog. Enter a Name (like 'Direct-Com-1)


Chose an ICON - whatever you wish
Click OK
3. This dialog then appears. Click the selection arrow on the "Connect using" list
box, and select the COM port your modem is connected to-not the modem
name. When you select the COM port, the phone number to dial boxes are grayed.
Click OK

81

4. The COM port properties box comes up. For 56k modems, make sure that you set
the Bits per second to 2400
The other defaults shown here are correct
Click OK

5. You now get the HyperTerminal window where you are able to control your modem
with commands.

82

FUTURE SCOPE
Here are some examples of the skills students will be able to perform after completing
CCNA course:

83

BIBLIOGRAPHY
Books:Stevens W Richard., TCP/IP Illustrated Volume - I
Pearson Education, Second Edition.
Strebe Mathew, Tata McGraw Hill, Seventh Edition
CCNA: Cisco Certified Networking Associate, Study Guide, Todd Lemmle
Networking Essentials Module-III, JETKING Curriculum.
Sites:www.4shared.com
www.rapidshare.com
www.about.com
http://en.wikipedia.org/wiki/

84

S-ar putea să vă placă și