Documente Academic
Documente Profesional
Documente Cultură
Functions of Network
Communication
Sharing of hardware
Data sharing
Application sharing
Network models
Peer-to-peer
Decentralized
Cheaper and easier to implement
Client / Server
Centralized
security
Network Models
Hybrid
Client / Server
Processing occurs on workstations
and server
Security handled by server
Data storage on server with possible
local copies
Centralized
Distributed
printers
May connect to other networks
Topologies
Bus, Ring, Star, Mesh
Star
All computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.
Ring
Mesh
Each system has a point to point connection with every other system
The data link layer is responsible for moving frames from one hop (node) to
the next.
The physical layer is responsiblefor the movement of individual bits from one
hop (node) to the next.
Presentation
Session
Transport
Network
Data-Link
Physical
Basic of TCP/IP
IP address, Subnet mask, default gateway, Domain
name
system (DNS)
IP Address
Identifies the computer to the network
Required for TCP/IP communication
Must be unique on the network
Must not be chosen at random
Must be assigned by the administrator
What are the differences between static ip addressing and dynamic ip addressing?
With static IP addressing, a computer (or other device) is configured to always use the same
IP address. With dynamic addressing, the IP address can change periodically and is managed
by a centralized network service
What is IP?
It's a unique 32 bits software address of a node in a network.
What is private IP?
Three ranges of IP addresses have been reserved for private address and they are not valid for use on the
Internet. If you want to access internet with these address you must have to use proxy server.
If you do decide to implement a private IP address range, you can use IP addresses from any of the
following classes:
What are the functions of a network administrator?
Class A 10.0.0.0
10.255.255.255
Class B 172.16.0.0
172.31.255.255
installation of a network,
Class C 192.168.0.0
192.168.255.255
maintenance/troubleshooting of networks.
Network Devices
UnderStanding Switch
Receives messages form any device connected to it and then transmit the
message to that device for which the message was sent (in form of frame)
Unlike when hub receives data on any port then it transmit data to all the
connected devices. Only the device keep the message for which the message
was sent and other drops the messages thats why congestion (blocking)
happens
A Few benefits
High speed data exchange
Full duplex communication
Low Latency
Dedicated Comunication between devices
Class A , B , C Networks
Parameter
Function
Subnet mask
Indicates which Internet Protocol (IP) address bits identify the network
and which identify the host
Required for TCP/IP communication
Default gateway
Identifies the router that the computer should use to access other
networks
Identifies the DNS servers that the client will use to resolve host and
domain names into IP addresses
What is subneting ?
Understanding
routing
A router is a system connected to two or more networks that
forwards packets from one network to another.
Routers operate at the network layer of the Open System
Interconnection (OSI) reference model
Routers can connect networks running different data-link layer
protocols and different network media
Large internetworks often have redundant routers, providing
multiple routers to a destination
Routers select the most efficient route to each destination
Redundant Router
or
DMZ
Packet Filtering is the ability of a router or a firewall to discard
packets that dont meet certain criteria. A packet filtering router
should be able to filter IP packets based on the following four
fields:
Source IP address
Destination IP address
TCP/UDP source port
TCP/UDP destination port
Filtering is used to:
Allow/block
Allow/block
Allow/block
Allow/block
This log file keeps a history of all errors that have occurred and information that has been displayed on the servers
console. It is located in the SYS:\ETC directory on the server.
o
This log file registers all Abends on a NetWare server. An Abend (Abnormal END) is an error condition that can halt the
proper operation of the NetWare server.
o
The server log file lists any errors that occur on the server, including Abends and NDS errors, time and date that has
occurred.
Information
Warning
Error
1 Application layer:
This layer provides a means for the user to access information on the
network through an application. Many user applications that need to
communicate over the network interact with the Application layer
protocol directly. The user applications are not part of OSI Application
layer, use the networking services offered by the networking protocol
suite. Application layer functions typically include identifying
communication partners, and determining availability of required
resources. Some examples of application layer implementations include
Telnet, File Transfer Protocol (FTP), and Simple Mail Transfer Protocol
(SMTP).
2 Presentation layer:
Presentation layer converts local host computer data
representations into a standard network format for transmission on
the network. On the receiving side, it changes the network format
into the appropriate host computer's format so that data can be
utilized independent of the host computer. ASCII and EBCDIC
conversions, cryptography, and the like are handled here.
Examples of Presentation layer coding and conversion schemes
include common data representation formats, conversion of
character representation formats, common data compression
schemes, and common data encryption schemes.
Presentation layer implementations are not typically associated with
a particular protocol stack. Some well-known standards for video
include QuickTime and Motion Picture Experts Group (MPEG).
QuickTime is an Apple Computer specification for video and audio,
and MPEG is a standard for video compression and coding.
3. Session layer:
The session layer establishes, manages, and terminates communication sessions.
Communication sessions consist of service requests and service responses that occur
between applications located in different network devices. These requests and responses
are coordinated by protocols implemented at the session layer. Some examples of sessionlayer implementations include AppleTalk's Zone Information Protocol (ZIP), and Decent
Phase Session Control Protocol (SCP).
4. Transport layer:
Transport layer is responsible for providing reliable service between the hosts.
Upper layer datagrams are broken down into manageable datagrams and then
appropriate header information (such as sequence number, port number, etc.) is added
to the datagram before passing it on to the Network layer. Two frequently used transport
protocols are the TCP (Transmission Control Protocol) and the UDP (User Datagram
Protocol).
5 . Network layer:
Network layer is responsible for the routing of packets
through the entire network. The layer uses logical addressing for this
purpose. Note that the physical address (like MAC address) keeps
changing from hop to hop when a packet travels from source to
destination. As a result, an address that doesn't change is required to
ensure continuity between hops. This is nothing but logical address.
For IP networks, IP address is the logical address; and for Novell
network, IPX address is the logical address, and so on. This layer also
provides for congestion control, and accounting information for the
network. IP (Internet Protocol) is an example of a network layer
protocol.
7. Physical layer:
This is the bottom-most layer of the OSI model. The Physical layer
handles the bit-level communications across the physical medium. The
physical medium could be made up of wired electrical signals, or light, or
radio (wireless) signals. Physical layer specifications define characteristics
such as media, data rates, maximum transmission distances, and physical
connectors.