Network Design and Management
Network Design and Management
There are a number of details your network infrastructure design should show,
these include:
Important things to consider include balancing security issues with the desire for easy
access to information; building redundancy into the network in anticipation of
breakdowns; and standardizing hardware and software to keep maintenance costs in
check.
Network connectivity today means more than Ethernet cables and wireless access
points. People today are more connected while mobile than ever before and many of
them want access to company email and data while they are out of the office. Balancing
those needs while maintaining security is a challenge that needs to be addressed in the
design phase of any network.
This includes where data is stored, either in-house or offsite with cloud-based solutions,
what types of information should be accessible, who should be able to access it, and
which types of devices should be included. Firewalls and access servers need to be
secure without slowing down operations.
lOMoARcPSD|32559332
Redundancy means having backup devices in place for any mission-critical components
in the network. Even small organizations should consider using two servers. Two
identical servers, for example, can be configured with fail-safes so that one will take
over if the other fails or requires maintenance. A good rule of thumb is to have
redundant components and services in place for any part of a network that cannot be
down for more than an hour.
A CEO or director may require special consideration, but if 90 percent of the employees
use the same notebooks, with the same word processing and email programs, a software
or hardware patch across the organization can be conducted much less expensively than
if everyone used a different computer model with different software installed on each.
A detailed disaster recovery plan should be a part of any network design. This includes,
but is not limited to, provisions for back-up power and what procedures should be
followed if the network or server crashes. It should also include when data is backed
up, how it is backed up and where copies of the data are stored. A comprehensive
disaster recovery plan includes office disasters, building disasters, and metropolitan-
wide disasters.
In most cases, important data should be backed up daily. Many organizations do a full
weekly backup, with daily incremental backups that copy any files that have been
modified since the last weekly backup. Backup files should be stored in a secure
location off-site in the event of a building disaster, such as a fire.
While it is not always possible to anticipate how large an organization may be five
years in the future, some allowances for future growth must be built into the network
design. For example, Microsoft Small Business Server can be an excellent choice for
many small organizations. However, if your office already has sixty employees, Small
Business Server could soon be a wasted investment, as it has a limit of only 75 users.
lOMoARcPSD|32559332
Network design should factor in at least 20 percent growth per year, including
everything from switch ports to data backup systems.
The top-down design approach simplifies the design process by splitting the design tasks
to make it more focused on the design scope and performed in a more controlled manner,
which can ultimately help network designers to view network design solutions from a
business-driven approach.
Network Hardware
Network Adapters
A network adapter, more commonly known as Network Interface Card (NIC), is an
expansion board that makes it possible to connect a PC to a network. Network
adapters are needed for Ethernet and Token Ring networks, but not for online services
which use modems to make the connection. The adapters in a network are connected
to each other by cable.
Network adapters are available in different types such as desktop adapters, mobile
adapters, server adapters, and handheld adapters.
Hub
• An unintelligent network device that sends one signal to all of the stations
connected to it.
• All computers/devices are competing for attention because it takes the data
that comes into a port and sends it out to all the other ports in the hub.
• Traditionally, hubs are used for star topology networks, but they are often used
with other configurations to make it easy to add and remove computers
without bringing down the network.
• Resides on Layer 1 of the OSI model
Switch
• Split large networks into small segments, decreasing the number of users
sharing the same network resources and bandwidth.
• Understands when two devices want to talk to each other, and gives them a
switched connection
• Helps prevent data collisions and reduces network congestion, increasing
network performance.
• Most home users get very little, if any, advantage from switches, even when
sharing a broadband connection.
• Resides on Layer 2 of the OSI model.
Bridge
• Connects two LANs and forwards or filters data packets between them.
• Creates an extended network in which any two workstations on the linked LANs
can share data.
• Transparent to protocols and to higher level devices like routers.
lOMoARcPSD|32559332
• Forward data depending on the Hardware (MAC) address, not the Network
address (IP).
• Resides on Layer 2 of the OSI model.
Repeater
• Used to boost the signal between two cable segments or wireless access points.
• Can not connect different network architecture.
• Does not simply amplify the signal, it regenerates the packets and retimes them.
• Resides on Layer 1 of the OSI model.
Router
• A device that connects any number of LANs.
• Uses standardized protocols to move packets efficiently to their destination.
• More sophisticated than bridges, connecting networks of different types (for
example, star and token ring)
• Forwards data depending on the Network address (IP), not the Hardware
(MAC) address.
• Routers are the only one of these four devices that will allow you to share a
single IP address among multiple network clients.
• Resides on Layer 3 of the OSI model.
Additional Network Hardware Devices
Network Interface Cards (NICs)
1. Puts the data into packets and transmits packet onto the network.
2. May be wired or wireless.
Gateway
3. Connects networks with different protocols like TCP/IP network and
IPX/SPX networks.
4. Routers and Gateways often refer to the same device.
Proxy server
5. Isolates internal network computers from the internet.
6. The user first access the proxy server and the proxy server accesses the
internet and retrieves the requested web page or document. The user
then gets a copy of that page from the proxy server.
A connection medium, usually a wire or cable, although wireless communication
between networked computers and peripherals is also possible.
Coaxial Cable, Twisted pair,
Fiber-optic,
Atmosphere/Wireless –
Choose Media based on :
• Wiring configurations
• Distance and location limitations
• Speed
• Reliability
• Security
• Budget
Dialup over telephone line.
DSL (Digital Subscriber Line)
• High-speed (256 Kbps – 55 Mbps), Full-duplex.
lOMoARcPSD|32559332
Connectors
• RJ-45 - Standard connectors used for unshielded twisted-pair cable.
•
Network Softwares.
Purpose
Network Topology.
lOMoARcPSD|32559332
The topology defines how network devices (computers, printers..etc) are connected
and how the data flows from one device to another. There are two conventions while
representing the topologies. The physical topology defines how the devices are
physically wired. The logical topology defines how the data flows from one device to
another.
Network Topology.
The topology defines how the devices (computers, printers etc) are connected and how
the data flows from one device to another. There are two conventions while
representing the topologies. The physical topology defines how the devices are
physically wired. The logical topology defines how the data flows from one device to
another.
Bus topology:
Bus Topology is the simplest of network topologies. In this type of topology, all the
nodes (computers as well as servers) are connected to the single cable (called bus), by
the help of interface connectors. This central cable is the backbone of the network and
is known as Bus (thus the name). Every workstation communicates with the other
device through this Bus.
A signal from the source is broadcasted and it travels to all workstations connected to
bus cable. Although the message is broadcasted but only the intended recipient, whose
MAC address or IP address matches, accepts it. If the MAC /IP address of machine
doesn’t match with the intended address, machine discards the signal.
A terminator is added at the ends of the central cable, to prevent bouncing of signals. A
barrel connector can be used to extend it. Below I have given a basic diagram of a bus
topology and then have discussed advantages and disadvantages of Bus Network
Topology
1) There is a limit on central cable length and number of nodes that can be connected.
2) Dependency on central cable in this topology has its disadvantages. If the main
lOMoARcPSD|32559332
cable (i.e. bus ) encounters some problem, whole network breaks down.
3) Proper termination is required to dump signals. Use of terminators is a must.
4) It is difficult to detect and troubleshoot fault at individual station.
5) Maintenance costs can go higher with time.
6) Efficiency of Bus network reduces as the number of devices connected to it
increases.
7) It is not suitable for networks with heavy traffic.
8) Security is very low because all the computers receive the sent signal from the
source.
Ring Topology
Ring topology was in the beginning of LAN area. In a ring topology, each system is
connected to the next system.
Each device has a transceiver which behaves like a repeater which moves the signal
around the ring; ideal for token passing access methods. In this topology signal
degeneration is low; only the device that holds the token can transmit which reduces
collisions.
1) This type of network topology is very organized. Each node gets to send the data
when it receives an empty token. This helps to reduces chances of collision. Also in ring
topology all the traffic flows in only one direction at very high speed.
2) Even when the load on the network increases, its performance is better than that of
Bus topology.
3) There is no need for network server to control the connectivity between
workstations.
4) Additional components do not affect the performance of network.
5) Each computer has equal access to resources.
1) Each packet of data must pass through all the computers between source and
destination. This makes it slower than Star topology.
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different components.
4) Network cards are expensive as compared to Ethernet cards and hubs.
lOMoARcPSD|32559332
Star topology
In Star topology, all the components of network are connected to the central device
called “hub” which may be a hub, a router or a switch. Unlike Bus topology (discussed
earlier), where nodes were connected to central cable, here all the workstations are
connected to central device with a point-to-point connection. So it can be said that
every computer is indirectly connected to every other node by the help of “hub”.
All the data on the star topology passes through the central device before reaching the
intended destination. Hub acts as a junction to connect different nodes present in Star
Network, and at the same time it manages and controls whole of the network.
Depending on which central device is used, “hub” can act as repeater or signal booster.
Central device can also communicate with other hubs of different network. Unshielded
Twisted Pair (UTP) Ethernet cable is used to connect workstations to central node.
1) Too much dependency on central device has its own drawbacks. If it fails whole
network goes down.
2) The use of hub, a router or a switch as central device increases the overall cost of
the network.
3) Performance and as well number of nodes which can be added in such topology is
depended on capacity of central device.
Mesh topology.
A mesh physical topology is when every device on the network is connected to every
device on the network; most commonly used in WAN configurations Helps find the
quickest route on the network; provides redundancy. Very expensive and not easy to set
up.
1) Data can be transmitted from different devices simultaneously. This topology can
withstand high traffic.
lOMoARcPSD|32559332
2) Even if one of the components fails there is always an alternative present. So data
transfer doesn’t get affected.
3) Expansion and modification in topology can be done without disrupting other
nodes.
Hybrid topology
Hybrid, as the name suggests, is mixture of two different things. Similarly in this type of
topology we integrate two or more different topologies to form a resultant topology
which has good points(as well as weaknesses) of all the constituent basic topologies
rather than having characteristics of one specific topology. This combination of
topologies is done according to the requirements of the organization.
For example, if there exists a ring topology in one office department while a bus
topology in another department, connecting these two will result in Hybrid topology.
Remember connecting two similar topologies cannot be termed as Hybrid topology.
Star-Ring and Star-Bus networks are most common examples of hybrid network.
1) Reliable : Unlike other networks, fault detection and troubleshooting is easy in this
type of topology. The part in which fault is detected can be isolated from the rest of
network and required corrective measures can be taken, WITHOUT affecting the
functioning of rest of the network.
2) Scalable: Its easy to increase the size of network by adding new components,
without disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of the
organization and by optimizing the available resources. Special care can be given to
nodes where traffic is high as well as where chances of fault are high.
4) Effective: Hybrid topology is the combination of two or more topologies, so we can
design it in such a way that strengths of constituent topologies are maximized while
there weaknesses are neutralized. For example we saw Ring Topology has good data
reliability (achieved by use of tokens) and Star topology has high tolerance capability
(as each node is not directly connected to other but through central device), so these
two can be used effectively in hybrid star-ring topology.
lOMoARcPSD|32559332
Types of Networks:
LAN network is any collection of independent computers that communicate with one
another over a shared network medium. LANs are networks usually confined to a
geographic area, such as a single building or a college campus. LANs can be small,
linking as few as three computers, but often link hundreds of computers used by
thousands of people. The development of standard networking protocols and media
has resulted in worldwide proliferation of LANs throughout business and educational
organizations.
Wide area networking combines multiple LANs that are geographically separate. This
is accomplished by connecting the different LANs using services such as dedicated
leased phone lines, dial-up phone lines (both synchronous and asynchronous), satellite
links, and data packet carrier services. Wide area networking can be as simple as a
modem and remote access server for employees to dial into, or it can be as complex as
hundreds of branch offices globally linked using special routing protocols and filters to
minimize the expense of sending data sent over vast distances.
Internet
The Internet is a system of linked networks that are worldwide in scope and facilitate
data communication services such as remote login, file transfer, electronic mail, the
World Wide Web and newsgroups.
lOMoARcPSD|32559332
With the meteoric rise in demand for connectivity, the Internet has become a
communications highway for millions of users. The Internet was initially restricted to
military and academic institutions, but now it is a full-fledged conduit for any and all
forms of information and commerce. Internet websites now provide personal,
educational, political and economic resources to every corner of the planet.
Intranet
With the advancements made in browser-based software for the Internet, many
private organizations are implementing intranets. An intranet is a private network
utilizing Internet-type tools, but available only within that organization. For large
organizations, an intranet provides an easy access mode to corporate information for
employees.
VPN uses a technique known as tunneling to transfer data securely on the Internet to a
remote access server on your workplace network. Using a VPN helps you save money
by using the public Internet instead of making long–distance phone calls to connect
securely with your private network. There are two ways to create a VPN connection, by
dialing an Internet service provider (ISP), or connecting directly to Internet.
Because Internet protocols define the unit of transmission and specify how to send
it, TCP/IP can hide the details of network hardware, allowing many types of network
technologies to connect and exchange information. Internet addresses allow any
machine on the network to communicate with any other machine on the
network. TCP/IP also provides standards for many of the communications services
that users need.
TCP/IP provides facilities that make the computer system an Internet host, which can
attach to a network and communicate with other Internet hosts. TCP/IP includes
commands and facilities that allow you to:
• Transfer files between systems
• Log in to remote systems
• Run commands on remote systems
• Print files on remote systems
• Send electronic mail to remote users
• Converse interactively with remote users
• Manage a network
Note: TCP/IP provides basic network management capability. The Simple Network
Management Protocol (SNMP) provides more network management commands and
functions.
Network Architecture.
interacting with the other parts in a small number of well-defined ways. Layering
allows the parts of a communication to be designed and tested without a
combinatorial explosion of cases, keeping each design relatively simple.
The Open Systems Interconnection model (OSI model) is a product of the Open Systems
Interconnection effort at the International Organization for Standardization. It is a
way of sub-dividing a communications system into smaller parts called layers.
A layer is a collection of similar functions that provide services to the layer above it
and receives services from the layer below it. On each layer, an instance provides
services to the instances at the layer above and requests service from the layer below.
Types of Layers
Physical Layer
The Physical Layer defines the electrical and physical specifications for devices. In
particular, it defines the relationship between a device and a transmission medium,
such as a copper or optical cable. This includes the layout of pins, voltages, cable
specifications, hubs, repeaters, network adapters, host bus adapters (HBA used in
storage area networks) and more. Its main task is the transmission of a stream of bits
over a communication channel.
The Data Link Layer provides the functional and procedural means to transfer data
between network entities and to detect and possibly correct errors that may occur in
the Physical Layer. Originally, this layer was intended for point-to-point and point-to-
multipoint media, characteristic of wide area media in the telephone system. Local
area network architecture, which included broadcast-capable multiaccess media, was
developed independently of the ISO work in IEEE Project 802. IEEE work assumed
sublayering and management functions not required for WAN use. In modern practice,
only error detection, not flow control using sliding window, is present in data link
protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE
lOMoARcPSD|32559332
802.2 LLC layer is not used for most protocols on the Ethernet, and on other local area
networks, its flow control and acknowledgment mechanisms are rarely used. Sliding-
window flow control and acknowledgment is used at the Transport Layer by protocols
such as TCP, but is still used in niches where X.25 offers performance advantages.
Simply, its main job is to create and recognize the frame boundary. This can be done by
attaching special bit patterns to the beginning and the end of the frame. The input
data is broken up into frames.
Network Layer
The Network Layer provides the functional and procedural means of transferring
variable length data sequences from a source host on one network to a destination
host on a different network, while maintaining the quality of service requested by the
Transport Layer (in contrast to the data link layer which connects hosts within the
same network). The Network Layer performs network routing functions, and might
also perform fragmentation and reassembly, and report delivery errors. Routers
operate at this layer—sending data throughout the extended network and making the
Internet possible. This is a logical addressing scheme – values are chosen by the
network engineer. The addressing scheme is not hierarchical. It controls the operation
of the subnet and determine the routing strategies between IMP and insures that all
the packs are correctly received at the destination in the proper order.
Transport Layer
The Transport Layer provides transparent transfer of data between end users,
providing reliable data transfer services to the upper layers. The Transport Layer
controls the reliability of a given link through flow control,
segmentation/desegmentation, and error control. Some protocols are state and
connection oriented. This means that the Transport Layer can keep track of the
segments and retransmit those that fail. The Transport layer also provides the
acknowledgement of the successful data transmission and sends the next data if no
errors occurred. Some Transport Layer protocols, for example TCP, but not UDP,
support virtual circuits provideconnection oriented communication over an underlying
packet oriented datagram network .Where it assures the delivery of packets in the
order in which they were sent and assure that they are free of errors
.The datagram transportation deliver the packets randomly and broadcast it to
multiple nodes. Notes: The transport layer multiplexes several streams on to 1 physical
channel.The transport headers tells which message belongs to which connnection.
This Layer provide a user interface to the network where the user negotiate to
establish a connection ,the user must provide the remote address in which he want to
contact. The operation of setting up a session between 2 process is called "Binding" in
some protocols it is merged with the transport layer.
lOMoARcPSD|32559332
Presentation Layer
Application Layer
The Application Layer is the OSI layer closest to the end user, which means that both
the OSI application layer and the user interact directly with the software application.
This layer interacts with software applications that implement a communicating
component. Such application programs fall outside the scope of the OSI model.
Application layer functions typically include identifying communication partners,
determining resource availability, and synchronizing communication. When
identifying communication partners, the application layer determines the identity and
availability of communication partners for an application with data to transmit.
The Network Interface layer encompasses the Data Link and Physical layers of the OSI
model. Note that the Internet layer does not take advantage of sequencing and
lOMoARcPSD|32559332
Internet Layer
The Internet layer is responsible for addressing, packaging, and routing functions. The
core protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
• The Internet Protocol (IP) is a routable protocol responsible for IP addressing,
routing, and the fragmentation and reassembly of packets.
• The Address Resolution Protocol (ARP) is responsible for the resolution of the
Internet layer address to the Network Interface layer address such as a
hardware address.
• The Internet Control Message Protocol (ICMP) is responsible for providing
diagnostic functions and reporting errors due to the unsuccessful delivery of IP
packets.
• The Internet Group Management Protocol (IGMP) is responsible for the
management of IP multicast groups.
The Internet layer is analogous to the Network layer of the OSI model.
Transport Layer
The Transport layer (also known as the Host-to-Host Transport layer) is responsible
for providing the Application layer with session and datagram communication
services. The core protocols of the Transport layer are Transmission Control
Protocol (TCP) and the User Datagram Protocol (UDP).
• TCP provides a one-to-one, connection-oriented, reliable communications
service. TCP is responsible for the establishment of a TCP connection, the
sequencing and acknowledgment of packets sent, and the recovery of packets
lost during transmission.
• UDP provides a one-to-one or one-to-many, connectionless, unreliable
communications service. UDP is used when the amount of data to be
transferred is small (such as the data that would fit into a single packet), when
the overhead of establishing a TCP connection is not desired or when the
applications or upper layer protocols provide reliable delivery.
lOMoARcPSD|32559332
The Transport layer encompasses the responsibilities of the OSI Transport layer and
some of the responsibilities of the OSI Session layer.
Application Layer
The Application layer provides applications the ability to access the services of the
other layers and defines the protocols that applications use to exchange data. There
are many Application layer protocols and new protocols are always being developed.
The most widely-known Application layer protocols are those used for the exchange of
user information:
• The Hypertext Transfer Protocol (HTTP) is used to transfer files that make up
the Web pages of the World Wide Web.
• The File Transfer Protocol (FTP) is used for interactive file transfer.
• The Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail
messages and attachments.
• Telnet, a terminal emulation protocol, is used for logging on remotely to
network hosts.
Additionally, the following Application layer protocols help facilitate the use and
management of TCP/IP networks:
• The Domain Name System (DNS) is used to resolve a host name to an IP
address.
• The Routing Information Protocol (RIP) is a routing protocol that routers use to
exchange routing information on an IP internetwork.
• The Simple Network Management Protocol (SNMP) is used between a network
management console and network devices (routers, bridges, intelligent hubs) to
collect and exchange network management information.
Examples of Application layer interfaces for TCP/IP applications are Windows Sockets
and NetBIOS. Windows Sockets provides a standard application programming
interface (API) under Windows 2000. NetBIOS is an industry standard interface for
accessing protocol services such as sessions, datagrams, and name resolution. More
information on Windows Sockets and NetBIOS is provided later in this chapter.
LAN network is any collection of independent computers that communicate with one
another over a shared network medium.
LAN links computers, i.e., software and hardware, in the same area for the purpose of
sharing information. Usually LAN links computers within a limited geographical area
because they must be connected by a cable, which is quite expensive. People working in
LAN get more capabilities in data processing, work processing and other information
exchange compared to stand-alone computers. Because of this information exchange
most of the business and government organisations are using LAN.
LAN Hardware.
Gateways
• Hubs/Switches
lOMoARcPSD|32559332
• Cables
Components of LAN
• File Server-A file server is a computer responsible for the central storage and
management of data files so that other computers on the same network can
access the files. A file server allows users to share information over a network
without having to physically transfer files by floppy diskette or some other
external storage device.
• FTP Servers -File Transfer Protocol makes it possible to move one or more files
securely between computers while providing file security and organization as
well as transfer control.
• Mail Servers-Mail servers move and store mail over corporate networks (via
LANs and WANs )and across the Internet.
• Telnet Servers-A Telnet server enables users to log on to a host computer and
perform tasks as if they're working on the remote computer itself.
• Web Servers-At its core, a Web server serves static content to a Web browser
by loading a file from a disk and serving it across the network to a user's Web
browser. The browser and server talking to each other using HTTP.
• Network interface cards -Network interface cards (NIC), also called network
cards and network adapters include a cable socket allowing computers to be
connected to the network. All NICs have a unique address (sometimes called a
MAC address), placed in them by their manufacturer. Before sending data onto
the network, the network card also organizes data into frames and then sends
them out on the network. Notebook computers often use NICs that are plugged
into the PCMCIA port. Wireless LAN adapters are needed for WLANs.
• LAN Cables -One of the biggest problems faced by network system designers is
keeping radiation and interference under control. All wires act as antenna,
sending and receiving signals. As frequencies increase and wire lengths
increase, the radiation increases. The pressure is on network designers to
increase both the speed (with higher frequencies) and reach of networks (with
longer cables) to keep up with the increasing demands of industry.
lOMoARcPSD|32559332
• Every computer has the potential to communicate with any other computers in
the network.
• High degree of interconnection between computers.
Advantages
• The reliability of network is high because the failure of one computer in the
network does not effect the functioning for other computers.
• Addition of new computer to network is easy.
• Peripheral devices like magnetic disk and printer can be shared by other
computers.
Disadvantages
• If the communication line fails, the entire network system breaks down.
Use of LAN
• Personal computing
The term Wide Area Network (WAN) is used to describe a computer network spanning
a regional, national or global area. For example, for a large company the head
quarters might be at Nairobi and regional branches at mombasa, Nakuru, New york
and Calcutta. Here regional centers are connected to head quarters through WAN. The
distance between computers connected to WAN is larger. Therefore the transmission
medium used are normally telephone lines, microwaves and satellite links.
Characteristics of WAN
Examples of WAN
Remote Data Entry: Remote data entry is possible in WAN. It means sitting at any
location you can enter data, update data and query other information of any computer
attached to the WAN but Difference between LAN and WAN
• The speed of data transmission is much higher in LAN than in WAN. The
transmission speed in LAN varies from 0.1 to 100 megabits per second. In case
of WAN the speed ranges from 1800 to 9600 bits per second (bps).
below, and does not need to involve a server computer since the router can direct
Internet traffic.
The telecentre manager will need to determine in advance whether to make the
network wired, wireless or a combination of the two. Wireless networks are simpler to
set up but more attention needs to be paid to security with wireless networks. In
addition, not all desktop computers come with wireless adapters.
Imagine that a broadband Internet connection has just been installed at your
telecentre. Here are the steps for setting up a small LAN to connect computers to the
Internet.
Step 1: Install a router. This is as simple as plugging it into an electrical outlet, and
then using a CAT-5 cable to connect it to the Internet source. The Internet source will
vary with the type of connection. For a WiMax connection, for example, you might be
connecting directly to an antenna or to a modem connected to the antenna.
Step 2: Connect wired computers to the router. If the router has enough ports on the
back for all of the computers on your network, you can attach them directly using CAT-
5 cable. The router will act as the center of a star network. If the router does not have
enough ports, move on to step 3. You may also need to install the software that came
with the router onto one of the networked computers and use it to complete the initial
setup for the router.
Step 3: Connect a switch to the router. This should be done if the router does not have
enough ports for all the computers on your network, or if a group of computers is in
another room. The switch connects to one of the ports in the router via a CAT-5 cable,
and also will require an electrical outlet. Computers then connect to the switch,
forming a star network.
Step 4: Connect wireless computers to the router. If you have a wireless router and
computers with wireless adapters, connect each computer individually to the router by
using the tools in their operating systems for network connections (for Windows
computers these can be found in the control panel). If the router (or the switch) is not
wireless or if wireless access is needed in a different location, move on to step 5.
Step 5: Connect a wireless access point to the router. If additional wireless access is
needed, scout out the best location for this access (so that as many computers as
possible are in range). Then connect the wireless access point to one of the ports in the
router via a CAT-5 cable.
Working with CAT-5 Cable
In the above section for setting up a simple LAN, CAT-5 (or the faster CAT-5e) cable
plays a major role. It is needed to make connections to and from the router as well as
any switches, wireless access points and wired computers in the LAN. While CAT-5e
patch cables in various lengths can be purchased, it will be more economical for a
telecentre manager to buy a spool of CAT-5 cable and cut it into patch cables of the
desired length. The telecentre manager will need to attach RJ-45 connectors to each
end of the cables cut (a process called terminating). A crimping tool is required for this
procedure. It is important to note that CAT-5 cables should not be more than 100
meters in length, or the signals they carry become degraded. In addition, a telecentre
manager should be aware that after repeated handling some cables or RJ-45
connectors will fail. The tip box here shows the steps for terminating a CAT-5 cable.
Tips for Terminating a Cable
lOMoARcPSD|32559332
1. Take a segment of CAT-5 (or CAT-5e) cable and cut it to the desired length. If you
aren’t sure the length you need – always err on the side of extra length. You can
shorten a cable later but you can’t make it longer again!
2. Gently cut around the outer plastic covering of the wire, 1.2 cm from one end of the
wire. You can use the cutting blade on the crimping tool to do this (see Figure 2). Make
sure, however that you do not cut the plastic coating on the inner wires. Strip away the
end section of the outer plastic cover and inspect the inner wires to make sure they are
in good condition. If they are not, cut off the damaged section of cable and start over.
3. Spread out the individual wires and order them according to colors as shown below
(from left to right): White/Orange, Orange, White/Green, Blue, White/Blue, Green,
White/Brown, Brown
4. Once the wires are properly aligned, keep them neatly aligned and close together
while you cut off the uneven ends of the wires using the cutting blade on the crimping
tool (see Figure 3).
5. While keeping the wires properly aligned, insert them into an RJ-45 connector. There
are 8 small canals in the connector and one wire will fit into each canal. Make sure
that wires are aligned with the white/orange wire on the left and the golden pins of
the RJ-45 connector on top. The plastic tab will be on the bottom.
6. Insert the assembled connector into the crimping tool (there is only one way it fits)
and then press down firmly. This causes the pins to be pushed into the wires, making
electrical connections.
7. Repeat steps 2 - 6 on the other end of the cable.
8. Test the cable. The easiest way to do this is to use it to connect a computer to the
Internet. Use it to replace a cable in a set-up that you know works perfectly.
Working with IP Addresses
For most telecentre managers, the simple network set up should be ‘plug and play’. This
means that after the telecentre manager completes the physical set up, the network
works automatically. The most important factor that allows this to happen is that the
router acts as a DHCP server. This means that the router assigns IP addresses to the
computers on the network, thus allowing these computers to share information
amongst themselves and with other computers on the Internet.
In most cases the IP addresses that the router assigns will be dynamic, which means
that they change after some time. The router leases out a particular IP address for a
specific period of time, often 24 hours. Since there are a limited number of IP addresses
available for the router to use, this system prevents the IP addresses from being used
up by computers that are not often on the network. The telecentre manager can view
the IP address for a computer using a variety of methods, described in the tip box here.
Note that IP addresses for computers on a LAN will always begin with 192.168. This is
the range of addresses allotted for use on private networks. When a computer on the
LAN sends information out to the internet, it passes through a firewall (usually part of
the router) and the firewall attaches a different (public) IP address to that
information.
Tips for Finding a Computer’s IP Address
Several methods are shown below. Which you choose depends on your computer’s
operating system.
lOMoARcPSD|32559332
One of the more frustrating experiences for a telecentre user is to get set up to check
email or search for information on the Internet, only to discover that there is no
Internet service. Network failures like this can be external (due to a problem with the
ISP or the connection to the ISP) or internal (due to a problem with the LAN). A user
can also experience network problems that are due to hardware or software issues
with an individual computer. Once it is determined whether the problem is with a
particular computer (can other users reach the network?) or network-wide, then
troubleshooting can begin.
Failures with a Particular Computer
If a particular computer cannot connect to a LAN or the Internet when other
computers in the same area can, the first step is to determine if the specific location is
the cause of the problem. For example, if the computer is connecting wirelessly – is the
signal particularly weak there? Moving the computer to a different location where
another computer connected successfully would test this theory.
If connected by cables, the telecentre manager could try swapping patch cables with
one that is known to work. Once a problem with the patch cable has been eliminated,
the next step would be to swap the troubled computer with one that connected
successfully in another location. If the new computer cannot connect in this location,
then the problem could be with connectors, switches or router ports that the computer
work station ultimately connects to. If the swapped computer can connect, however,
the telecentre manager has determined that the problem is with the individual
computer and not with the location.
Tips for Troubleshooting a Computer that Won’t Connect to a Network
1. If the operating system has network diagnostic tools, run these to see if the computer
can fix the problem itself. For a Windows computer, follow the steps in the tip box
above (Method A) to view a network connection and then click on the ‘Diagnose’ box.
Also notice whether or not the computer is sending or receiving any packets from the
network. If the network diagram shows some packets being received gradually, then
the connection is just working slowly.
2. Try getting a new IP address. For a Windows computer go to the command prompt
line and type and Enter ‘ipconfig/release’ and then ‘ipconfig/renew’.
3. Restart the computer. This often will fix temporary problems with hardware or
software.
4. Use the Device Manager, which can found on many Windows computers (for
Windows XP go to Start → Control Panel → System → Device Manager). If a network
device has a (hardware) problem, a warning symbol will be displayed next to it, and
double clicking on that device would give details and suggested remedies for the
problem.
Failures with an Entire Network
In some situations, no computer on a LAN can access either the local intranet or the
Internet. In these cases, it is helpful to try and distinguish between the two problems.
For a Windows computer, the Network Connections or Network and Sharing Center
(see the tip box) shows the status of a connection, including whether it is local only or
local and Internet. The lights on the front of a router can also be used to indicate
whether or not it is connected to the Internet. Another useful diagnostic tool is to use a
computer on the LAN to ping various devices on the LAN and see which ones can be
lOMoARcPSD|32559332
Network management
lOMoARcPSD|32559332
Network management refers to the activities, methods, procedures, and tools that
pertain to the operation, administration, maintenance, and provisioning of networked
systems..
▪ Operation deals with keeping the network (and the services that the network
provides) up and running smoothly. It includes monitoring the network to spot
problems as soon as possible, ideally before users are affected.
▪ Administration deals with keeping track of resources in the network and how
they are assigned. It includes all the "housekeeping" that is necessary to keep the
network under control.
▪ Maintenance is concerned with performing repairs and upgrades—for example,
when equipment must be replaced, when a router needs a patch for an operating
system image, when a new switch is added to a network. Maintenance also involves
corrective and preventive measures to make the managed network run "better",
such as adjusting device configuration parameters.
▪ Provisioning is concerned with configuring resources in the network to support
a given service. For example, this might include setting up the network so that a
new customer can receive voice service.
Network Administration
Installation and configuration of the network is just the beginning of the job for the
network administrator. Once the network is in place, there are many maintenance
tasks involved in network administration. Users come and go, and new network
resources are added, involving network reconfiguration. Other tasks involve providing
a fault-tolerant network that can survive the inevitable device failure.
Performance
Windows provides a performance tool that consists of two parts, the System Monitor
and Performance Logs and Alerts.
The System Monitor part allows us to collect and view real-time data about memory,
disk, processor, network, and other activities in a graph, histogram, or report form.
The Performance Logs and Alerts part enables us to configure logs to record
performance data and system alerts to notify us when a counter’s value is above or
below a predefined threshold.
Third-party software products are also available to aid us in performance monitoring.
The Simple Network Management Protocol (SNMP) can be a very useful tool for doing
performance monitoring on our network. Most network devices now include SNMP as
a support protocol. With a good SNMP management software system, we can obtain
almost any statistical information we desire.
Event Viewer
In Windows XP includes the Event Viewer that maintains logs about program, security,
and events on our network. To open the Event Viewer, we click on Control Panel,
Administrative Tools, and the Event Viewer. We can get help about using the Event
Viewer from the Action drop menu and clicking Help.
The Event Viewer allows us to view, manage event logs, and gather information about
each user’s activity, monitor security events, and to view hardware and software
problems.
Quality of Service (QoS)
This is an effort to provide different prioritization levels for different types of traffic
over a network.
Various methods are used to achieve quality of service, including the Resource
ReSerVation Protocol (RSVP).* For example, streaming† video may have a higher
priority than Internet Control Message Protocol (ICMP)‡ traffic, as the consequences of
interrupting streaming video are more obvious than slowing down ICMP traffic.
On the Internet and in other networks, with QoS the transmission rates, error rates,
and other characteristics can be measured, improved, and, to some extent, guaranteed
in advance. QoS is of particular concern for the continuous transmission of high-
bandwidth video and multimedia information. Transmitting this kind of content
dependably is difficult in public networks using ordinary "best effort" protocols.
Microsoft Network Monitor is a packet analyzer that allows you to capture, view and
analyze network traffic. This tool is handy for troubleshooting network problems and
lOMoARcPSD|32559332
applications on the network. Main features include support for over 300 public and
Microsoft proprietary protocols, simultaneous capture sessions, a Wireless Monitor
Mode and sniffing of promiscuous mode traffic, amongst others.
When you launch Microsoft Network Monitor, choose which adapter to bind to from
the main window and then click “New Capture” to initiate a new capture tab. Within
the Capture tab, click “Capture Settings” to change filter options, adapter options, or
global settings accordingly and then hit “Start” to initiate the packet capture process.
Nagios
Nagios is a powerful network monitoring tool that helps you to ensure that your
critical systems, applications and services are always up and running. It provides
features such as alerting, event handling and reporting. The Nagios Core is the heart of
the application that contains the core monitoring engine and a basic web UI. On top of
the Nagios Core, you are able to implement plugins that will allow you to monitor
services, applications, and metrics, a chosen frontend as well as add-ons for data
visualisation, graphs, load distribution, and MySQL database support, amongst others.
Once you’ve installed and configured Nagios, launch the Web UI and begin to configure
host groups and service groups. Once Nagios has had some time to monitor the status
of the specified hosts and services, it can start to paint a picture of what the health of
your systems look like.
BandwidthD
BandwidthD monitors TCP/IP network usage and displays the data it has gathered in
the form of graphs and tables over different time periods. Each protocol (HTTP, UDP,
ICMP, etc) is color-coded for easier reading. BandwidthD runs discretely as a
background service.Installation is easy. Download and install Winpcap version 3.0 or
above (you’ll already have this installed if you have Wireshark on the same box), unzip
BandwidthD to a specified folder, edit the ../etc/bandwidthd.conf file accordingly,
double click on the “Install Service” batch file and then start the BandwidthD services
from the services.msc console. Once the service is running, give it some time to monitor
network traffic and load the index.html page to start viewing bandwidth statistics.
EasyNetMonitor
EasyNetMonitor is a super lightweight tool for monitoring local and remote hosts to
determine if they are alive or not. It is useful for monitoring critical servers from your
desktop, allowing you to get immediate notification (via a balloon popup and/or log
file) if a host does not respond to a periodic ping.
Once you launch EasyNetMonitor, it will appear as an icon in the notification area on
your desktop where the IP addresses / host names of the machines you want to
lOMoARcPSD|32559332
monitor can be added. Once you’ve added the machines you wish to monitor, be sure to
configure the ping delay time and notification setting.
Capsa Free
Capsa Free is a network analyzer that allows you to monitor network traffic,
troubleshoot network issues and analyze packets. Features include support for over
300 network protocols (including the ability to create and customize protocols), MSN
and Yahoo Messenger filters, email monitor and auto-save, and customizable reports
and dashboards.
When you launch Capsa, choose the adapter you want it to bind to and click “Start” to
initiate the capture process. Use the tabs in the main window to view the dashboard, a
summary of the traffic statistics, the TCP/UDP conversations, as well as packet
analysis.Fiddler
Fiddler is a web debugging tool that captures HTTP traffic between chosen computers
and the Internet. It allows you to analyze incoming and outgoing data to monitor and
modify requests and responses before they hit the browser. Fiddler gives you extremely
detailed information about HTTP traffic and can be used for testing the performance
of your websites or security testing of your web applications (e.g. Fiddler can decrypt
HTTPS traffic).
When you launch Fiddler, HTTP traffic will start to be captured automatically. To
toggle traffic capturing, hit F12. You can choose which processes you wish to capture
HTTP traffic for by clicking on “All Processes” in the bottom status bar, or by dragging
the “Any Process” icon from the top menu bar onto an open application.
NetworkMiner
NetworkMiner captures network packets and then parses the data to extract files and
images, helping you to reconstruct events that a user has taken on the network – it can
also do this by parsing a pre-captured PCAP file. You can enter keywords which will be
highlighted as network packets are being captured. NetworkMiner is classed as a
Network Forensic Analysis Tool (NFAT) that can obtain information such as hostname,
operating system and open ports from hosts. When you load NetworkMiner, choose a
network adapter to bind to and hit the “Start” button to initiate the packet capture
process.
Pandora FMS
you login to the Pandora FMS Web UI, start by going to the ‘Agent detail’ and ‘Services’
node from the left hand navigation pane. From here, you can configure monitoring
agents and services.
Zenoss Core
PRTG Network Monitor monitors network availability and network usage using a
variety of protocols including SNMP, Netflow and WMI. It is a powerful tool that offers
an easy to use web-based interface and apps for iOS and Android. Amongst others,
PRTG Network Monitor’s key features include:
(1) Comprehensive Network Monitoring which offers more than 170 sensor types for
application monitoring, virtual server monitoring, SLA monitoring, QoS monitoring
(2) Flexible Alerting, including 9 different notification methods, status alerts, limit
alerts, threshold alerts, conditional alerts, and alert scheduling
(3) In-Depth Reporting, including the ability to create reports in HTML/PDF format,
scheduled reports, as well as pre-defined reports (e.g. Top 100 Ping Times) and report
templates.When you launch PRTG Network Monitor, head straight to the configuration
wizard to get started. This wizard will run you through the main configuration settings
required to get the application up and running, including the adding of servers to
monitors and which sensors to use.
The Dude
The Dude is a network monitoring tool that monitors devices and alerts you when
there is a problem. It can also automatically scan all devices on a given subnet and
then draw and layout a map of your network.When you launch The Dude, you first
choose to connect to a local or remote network and specify credentials accordingly.
Click ‘Settings’ to configure options for SNMP, Polling, Syslog and Reports.
Splunk
lOMoARcPSD|32559332
Splunk is a data collection and analysis platform that allows you to monitor, gather
and analyze data from different sources on your network (e.g. event logs, devices,
services, TCP/UDP traffic, etc). You can set up alerts to notify you when something is
wrong or use Splunk’s extensive search, reporting and dashboard features to make the
most of the collected data. Splunk also allows you to install ‘Apps’ to extend system
functionality.
Note: When you first download and install Splunk, it automatically installs the
Enterprise version for you to trial for 60 days before switching to the Free version. To
switch to the Free version straight away, go to Manager > Licensing.When you login to
the Splunk web UI for the first time, add a data source and configure your indexes to
get started. Once you do this you can then create reports, build dashboards, and search
and analyze data.
Angry IP Scanner
ntopng
ntopng (‘ng’ meaning ‘next generation’) is the latest version of the popular network
traffic analyzer called ntop. ntopng will sit in the background and gather network
traffic, then display network usage information and statistics within a Web UI.
Note: Although originally aimed for use on Unix-based systems, there is a Windows
version available for a small fee, or a demo version limited to 2000 packets. If you are
comfortable running ntopng on a Unix-based box then you can get the full version for
free.
Total Network Monitor continuously monitors hosts and services on the local network,
notifying you of any issues that require attention via a detailed report of the problem.
The result of each probe is classified using green, red, or black colors to quickly show
whether the probe was successful, had a negative result or wasn’t able to
complete.When you launch Total Network Monitor, go to Tools > Scan Wizard to have
the wizard scan a specified network range automatically and assign the discovered
hosts to a group. Alternatively, create a new group manually to start adding
devices/hosts individually.
lOMoARcPSD|32559332
NetXMS
Once you login to NetXMS you need to first go to the “Server Configuration” window to
change a few settings that are dependent on your network requirements (e.g. changing
the number of data collection handlers or enabling network discovery). You can then
run the Network Discovery option for NetXMS to automatically discover devices on
your network, or add new nodes by right clicking on “Infrastructure Services” and
selecting Tools > Create Node.
Xymon
When you launch the Xymon Web UI, the main page lists the systems and services being
monitored by Xymon. Clicking on each system or service allows you to bring up status
information about a particular host and then drill down to view specific information
such as CPU utilization, memory consumption, RAID status, etc.
WirelessNetView
Note: Wireless Network Watcher is a small utility that goes hand in hand with
WirelessNetView. It scans your wireless network and displays a list of all computers
and devices that are currently connected, showing information such as IP adddress,
MAC address, computer name and NIC card manufacturer – all of which can be
exported to a html/xml/csv/txt file.
lOMoARcPSD|32559332
Xirrus Wi-Fi Inspector can be used to search for Wi-Fi networks, manage and
troubleshoot connections, verify Wi-Fi coverage, locate Wi-Fi devices and detect rogue
Access Points. Xirrus Wi-Fi Inspector comes with built-in connection, quality and speed
tests.
Once you launch Wi-Fi Inspector and choose an adapter, a list of available Wi-Fi
connections is displayed in the “Networks” pane. Details related to your current Wi-Fi
connection are displayed in the top right hand corner. Everything pretty much happens
from the top ribbon bar – you can run a test, change the layout, edit settings, refresh
connections, etc.
WireShark
This list wouldn’t be complete without the ever popular WireShark. WireShark is an
interactive network protocol analyzer and capture utility. It provides for in-depth
inspection of hundreds of protocols and runs on multiple platforms.
When you launch Wireshark, choose which interface you want to bind to and click the green shark fin
icon to get going. Packets will immediately start to be captured. Once you’ve collected what you need,
you can export the data to a file for analysis in another application or use the in-built filter to drill down and analyze
the captured packets at a deeper level from within Wireshark itself.
indicates the highest sequence number it can receive without overflowing its internal
buffers.
Communication Protocols
You may be wondering how do the computers send and receive data across
communication links. The answer is data communication software. It is this
software that enables us to communicate with other systems. The data communication
software instructs computer systems and devices as to how exactly data is to be
transferred from one place to another. The procedure of data transformation in the
form of software is commonly called protocol.
The data transmission software or protocols perform the following functions for the
efficient and error free transmission of data.
4. Error Control: Error detecting and recovering is the one of the main function
of communication software. It ensures that data are transmitted without any
error.
Protocols Properties
In computing, e-mail clients such as (MS outlook, outlook express and thunderbird) use
Post office Protocol to retreive emails from the remote server over the TCP/IP
connection. Nearly all the users of the Internet service providers use POP 3 in the email
clients to retrieve the emails from the email servers. Most email applications use POP
protocol.
Simple Mail Transfer Protocol is a protocol that is used to send the email messages
between the servers. Most email systems and email clients use the SMTP protocol to
send messages to one server to another. In configuring an email application, you need
to configure POP, SMTP and IMAP protocols in your email software. SMTP is a simple,
text based protocol and one or more recipient of the message is specified and then the
message is transferred. SMTP connection is easily tested by the Telnet utility. SMTP
uses the by default TCP port number 25
FTP or file transfer protocol is used to transfer (upload/download) data from one
computer to another over the internet or through or computer network. FTP is a most
commonly communication protocol for transferring the files over the internet.
Typically, there are two computers are involved in the transferring the files a server
and a client. The client computer that is running FTP client software such as Cuteftp
and AceFTP etc initiates a connection with the remote computer (server). After
successfully connected with the server, the client computer can perform a number of
the operations like downloading the files, uploading, renaming and deleting the files,
creating the new folders etc. Virtually operating system supports FTP protocols.
This is a hierarchical naming system for identifying host computers on networks or the
Internet. Each host name is comprised of domain labels separated by periods. If your
machine is connected to the Internet, you assign local domain name host names only,
and your higher level domain
name is assigned to you. For example, the domain name assigned to Osmania
University is osmania.ac.in has the higher level domain names of ac (academic) and in
(India). Examples of the host computers at Osmania University are called staff, results,
and www. Their host names in the domain are
NAT: (Network Address Translation)
Basic Network Address Translation (Basic NAT) is a method by which IP addresses are
mapped from one group to another transparent to end users. Network Address Port
lOMoARcPSD|32559332
The Internet Message Access Protocol known as IMAP is an application layer protocol
that is used to access the emails on the remote servers. POP3 and IMAP are the two
most commonly used email retrieval protocols. Most of the email clients such as
outlook express, thunderbird and MS outlooks support POP3 and IMAP. The email
messages are generally stored on the email server and the users generally retreive
these messages whether by the web browser or email clients. IMAP is generally used in
the large networks. IMAP allows users to access their messages instantly on their
systems.
TELNET is the terminal emulation protocol in a TCP/IP environment. TELNET uses the
TCP as the transport protocol to establish connection between server and client. After
connecting,TELNET server and client enter a phase of option negotiation that
determines the options that each side can support for the connection. Each connected
system can negotiate new options or renegotiate old options at any time. In general,
each end of the TELNET connection attempts to implement all options that maximize
performance for the systems involved. When a TELNET connection is first established,
each end is assumed to originate and terminate at a “Network Virtual Terminal”,or
NVT. An NVT is an imaginary device which provides a standard,network-wide,
intermediate representation of a canonical terminal. This eliminates the need for
“server” and “user” hosts to keep information about the characteristics of each other’s
terminals and terminal handling conventions.
Fiber distributed data interface (FDDI) provides a standard for data transmission in a
local area network that can extend a range of 200 kilometers. The FDDI uses token
ring protocol as its basis. FDDI local area network can support a large number of users
and can cover a large geographical area. FDDI uses fiber optic as a standard
communication medium. FDDI uses dual attached token ring topology. A FDDI network
contains two token rings and the primary ring offers the capacity of 100 Mbits/s. FDDI
is an ANSI standard network and it can support 500 stations in 2 kilometers.
UDP
lOMoARcPSD|32559332
The user datagram protocol is a most important protocol of the TCP/IP suite and is
used to send the short messages known as datagram. Common network applications
that uses UDP are DNS, online games, IPTV, TFTP and VOIP. UDP is very fast and light
weight. UDP is an unreliable connectionless protocol that operates on the transport
layer and it is sometimes called Universal Datagram Protocol.
TFTP
Trivial File Transfer Protocol (TFTP) is a very simple file transfer protocol with the
very basic features of the FTP. TFTP can be implemented in a very small amount of
memory. TFTP is useful for booting computers such as routers. TFTP is also used to
transfer the files over the network. TFPT uses UDP and provides no security features.
SNMP
The simple network management protocol (SNMP) forms the TCP/IP suite. SNMP is
used to manage the network attached devices of the complex network.
PPTP
The point to point tunneling protocol is used in the virtual private networks. PPP
works by sending regular PPP session. PPTP is a method of implementing VPN
networks.
earliest such protocol, still used in the Internet, is “EGP” (exterior gateway protocol).
Such protocols are now usually referred to as inter-AS routing protocols. RIP is
designed to work with moderate-size networks using reasonably homogeneous
technology. Thus it is suitable as an IGP for many campuses and for regional networks
using serial lines whose speeds do not vary widely. It is not intended for use in more
complex environments.
Internetwork Addressing
The role of an internetwork is to enable communications between devices connected to
two or more separate networks. An internetwork can span a small or large geographic
area, connecting LANs that belong to the same or different organizations.
A small internetwork can connect LANs on different floors of a building. The largest
internetwork in existence is the Internet, which is global in scope and serves as a
universal resource for message transfer between all types of networks
An internetwork like the Internet links all types of similar or dissimilar networks (e.g.,
Ethernet LANs, mobile telephone networks). In order to uniquely identify each device
on any network connected to the Internet in a consistent manner, an address called the
Internet protocol (IP) address is assigned to the network interface of each device. This
public IP address uniquely identifies both the device and the network to which the
device is connected.
NOTES: Non-unique private IP addresses may also be assigned to devices for internal use. Such
addresses cannot be used to send messages over the Internet.
lOMoARcPSD|32559332
The terms network identification (netid) and host identification (hostid) can be used to
describe the two parts of an IP address. In such cases, netid identifies the LAN
broadcast domain and hostid identifies the device within the LAN broadcast domain.
Using the same format for all addresses on an internetwork makes it possible to link
together all types of devices and networks. If necessary, any device can be reconfigured
to take the place of any other (e.g., in the event of a breakdown or an upgrade) through
a reassignment of the IP address.
The term IP address is often used to describe the internetwork address of a device,
since IP is used globally to link to the Internet. Alternate terms used to describe IP
addresses include:
1
Internet address.
Layer 3 address.
Subnet address.
Internetwork address.
Routing address.
A router connected to a network keeps a table of both the MAC address and the IP
address of each device on that network.
Networks and the servers that use them have never been more interdependent, in large
part because today’s complex and sophisticated online applications rely on multiple
components across many different systems. Networks must accommodate the critical
functions of network based servers (DNS, DHCP, gateways, etc.) as well as those of
database servers, application servers, file servers, and so on.
Being able to monitor and proactively manage each of these systems and their
applications is what differentiates a positive user experience from a negative one and
what, ultimately, leads to business success. The list of what today’s IT staff must
monitor and manage is incredibly long and complex:
Token Ring.
A Token Ring network is a local area network (LAN) in which all computers are
connected in a ring or star topology and a bit- or token-passing scheme is used in order
to prevent the collision of data between two computers that want to send messages at
the same time. The Token Ring protocol is the second most widely-used protocol on
local area networks after Ethernet. The IBM Token Ring protocol led to a standard
lOMoARcPSD|32559332
version, specified as IEEE 802.5. Both protocols are used and are very similar. The IEEE
802.5 Token Ring technology provides for data transfer rates of either 4 or 16 megabits
per second.
Frame Formats
The basic format of a Token Ring data frame is shown in the Figure and described in
bellow. The sizes of the fields in the figure are not representative of the sizes of the
fields in an actual frame. The data field makes up the vast majority of the frame.
Description
After the computer captures the token, it sends a data frame (such as the one shown in
the figure out on the network. The frame proceeds around the ring until it reaches the
computer with the address that matches the destination address in the frame. The
destination computer copies the frame into its receive buffer and marks the frame in
the frame status field to indicate that the information was received.
The frame continues around the ring until it arrives at the sending computer, where
the transmission is acknowledged as successful. The sending computer then removes
the frame from the ring and transmits a new token back on the ring.
Hardware Components
Hardware for Token Ring networks is centered on the hub, which houses the actual
ring. A Token Ring network can have multiple hubs, as described later in this lesson.
lOMoARcPSD|32559332
STP or UTP cabling connects the computers to the hubs; patch cables can further
extend the connections. Fiber-optic cable, "Basic Network Media," is especially well
suited to Token Ring networks. Together with repeaters, fiber-optic cable can greatly
extend the range of Token Ring networks. Cabling is joined to the components with
four kinds of connectors, discussed later in this section. Other Token Ring hardware
includes media filters, patch panels, and network interface cards.
The Hub
In a Token Ring network, the hub is known by several names that all mean the same
thing. These include:
• MAU (Multistation Access Unit).
• MSAU (MultiStation Access Unit).
• SMAU (stands for Smart Multistation Access Unit).
Cables attach the individual clients and servers to the MSAU, which works like other
passive hubs. Figure shows a hub in which the internal wiring circulates the token in a
clockwise direction. The internal ring automatically converts to an external ring at
each connection point when a computer is connected.
Hub Capacity
An IBM MSAU has 10 connection ports. It can connect up to eight computers. However,
a Token Ring network is not limited to one ring (hub). Each ring can have up to 33
hubs.
Each MSAU-based network can support as many as 72 computers that use unshielded
wire or up to 260 computers that use shielded wire.
Other vendors offer hubs with more capacity; the capacity depends on the vendor and
the hub model.
lOMoARcPSD|32559332
When one Token Ring is full—that is, when every port on an MSAU has a computer
connected to it—adding another ring (MSAU) can enlarge the network.
The only rule that must be followed is that each MSAU must be connected in such a way
so that it becomes part of the ring. Figure 3.27 shows 1, 2, and 3 MSAU connected and
maintaining a logical ring. An MSAU's ring-in and ring-out connection points make use
of patch cables to connect many MSAUs on top of each other while still forming a
continuous ring inside the MSAUs.
In a pure token-passing network, a computer that fails stops the token from
continuing. This in turn brings down the network. MSAUs were designed to detect
when a NIC fails, and to disconnect from it. This procedure bypasses the failed
computer so that the token can continue on.
In IBM's MSAUs, bad MSAU connections or computers are automatically by-passed and
disconnected from the ring. Therefore, a faulty computer or connection will not affect
the rest of the Token Ring network.
Cabling
The STP or UTP cable to a hub connects computers on a Token Ring network. Figure
3.28 shows cable length limits for three types of cabling. Token Rings use IBM Type 1, 2,
and 3 cabling. Most networks use IBM Cabling System Type 3 UTP cabling.
Each computer can be no more than 101 meters (330 feet) from an MSAU when
connected with Type 1 cable. Each computer can be up to 100 meters (about 328 feet)
from the MSAU when STP cabling is used, or 45 meters (about 148 feet) when UTP
cabling is used. The minimum length for shielded or unshielded cable is 2.5 meters
(about 8 feet).
lOMoARcPSD|32559332
According to IBM, the maximum cabling distance from an MSAU to a computer or a file
server is 46 meters (150 feet) when Type 3 cabling is used. Some vendors, however,
claim that data transmission can be reliable for up to 152 meters (500 feet) between
an MSAU and a computer.
The maximum distance from one MSAU to another is limited to 152 meters (500 feet).
Each single Token Ring can accommodate only 260 computers with STP cable and 72
computers with UTP cable.
Patch Cables
Patch cables extend the connection between a computer and an MSAU. They can also
join two MSAUs together. In the IBM cabling system, these are Type 6 cables and can be
any length up to 46 meters (150 feet). Patch cable will allow only 46 meters between a
computer and an MSAU.
The IBM cabling system also specifies a Type 6 patch cable for:
Connectors
Token Ring networks usually join cables to components with the following types of
connectors:
• Media interface connectors (MICs) for connecting Types 1 and 2 cable. These
are IBM Type A connectors, known elsewhere as universal data connectors.
They are neither male nor female; you can connect one to another by flipping
either one over.
• RJ-45 telephone connectors (8-pin) for Type 3 cable.
lOMoARcPSD|32559332
Media Filters
Media filters are required in computers that use Type 3 telephone twisted-pair cabling,
because they convert cable connectors and reduce line noise.
Patch Panels
A patch panel is used to organize cable that runs between a MSAU and a telephone
punchdown block. (Patch panels are discussed further later in this chapter. A
punchdown block is a kind of hardware that provides terminal connections for bare
network cable ends.)
Repeaters
Using repeaters can increase all Token Ring cable distances. A repeater actively
regenerates and retimes the Token Ring signal to extend distances between MSAUs on
the network. Using one pair of repeaters, MSAUs can be located up to 365 meters (1200
feet) apart using Type 3 cable, or 730 meters (2400 feet) apart using Type 1 or 2 cable.
Network Interface Cards
Token Ring NICs are available in both 4-Mbps and 16-Mbps models. The 16-Mbps cards
accommodate an increased frame length that requires fewer transmissions for the
same amount of data.
Implementing Token Ring cards requires caution because a Token Ring network will
run at only one of two possible speeds: 4 Mbps or 16 Mbps. If the network is a 4-Mbps
network, the 16-Mbps cards can be used because they will revert back to 4-Mbps mode.
A 16-Mbps network, however, will not accept the slower 4-Mbps cards because they
cannot increase speed.
Although several manufacturers make Token Ring NICs and other Token Ring
components, IBM currently sells the majority of them.
Fiber-Optic Cable
Token bus.
Token bus is a network implementing the token ring protocol over a "virtual ring" on
a coaxial cable. A token is passed around the network nodes and only the node
possessing the token may transmit. If a node doesn't have anything to send, the token is
passed on to the next node on the virtual ring. Each node must know the address of its
lOMoARcPSD|32559332
neighbor in the ring, so a special protocol is needed to notify the other nodes of
connections to, and disconnections from, the ring.
Token bus was standardized by IEEE standard 802.4. It is mainly used for industrial
applications. Token bus was used by General Motors for their Manufacturing
Automation Protocol (MAP) standardization effort.[3] This is an application of the
concepts used in token ring networks. The main difference is that the endpoints of the
bus do not meet to form a physical ring.
Due to difficulties handling device failures and adding new stations to a network, token
bus gained a reputation for being unreliable and difficult to upgrade.[4]
In order to guarantee the packet delay and transmission in Token bus protocol, a
modified Token bus was proposed in Manufacturing Automation Systems and flexible
manufacturing system (FMS).
A means for carrying Internet Protocol over token bus was developed.
CSMA/CD
Short for Carrier Sense Multiple Access / Collision Detection is a set of rules
determining how network devices respond when two devices attempt to use a data
channel simultaneously (called a collision). Standard Ethernet networks use CSMA/CD
to physically monitor the traffic on the line at participating stations. If no transmission
is taking place at the time, the particular station can transmit. If two stations attempt
to transmit simultaneously, this causes a collision, which is detected by all
participating stations. After a random time interval, the stations that collided attempt
to transmit again. If another collision occurs, the time intervals from which the
random waiting time is selected are increased step by step. This is known as
exponential back off. CSMA/CD is a type of contention protocol. Networks using the
CSMA/CD procedure are simple to implement but do not have deterministic
transmission characteristics. The CSMA/CD method is internationally standardized in
IEEE 802.3 and ISO 8802.3.
Server.
A server is a computer on a network that manages network resources. There are many
different types of servers. For example:
• File server: a computer and storage device dedicated to storing files. Any user
on the network can store files on the server.
• Print server: a computer that manages one or more printers, and a network
server is a computer that manages network traffic.
• Database server: a computer system that processes database queries.
lOMoARcPSD|32559332
When you are on the internet or are working in an networked environment you may
think you have problems with your network connection. However it would be helpful if
you could diagnose whether there is a problem and what it is.
Getting Help
When working with the tools you can get help by typing the command, then "/?" , e.g..
"ping /?" (minus the quotes).
If you are running a command, or want to view the help then you can send the results
to a file for viewing elsewhere or to send to a friend, colleague or helpdesk for
diagnosis. Simply enter >c:\<filename>.txt after your command to send the results to a
file instead of the screen. To use ping as an example:
ping /? >c:\ping.txt
ping www.dosprompt.info >c:\ping.txt
Scenario list
To help you choose the tool you need to diagnose your problem, this handy chart
outlines some of the potential problems and which tool will help you diagnose where
the problem is.
lOMoARcPSD|32559332
ping/pathping traceroute netstat net shell dns and dns lookup telnet
Cannot
connect to a
web site, ping/pathping trace route dns and dns lookup telnet
but can
connect to
others
Cannot
connect to
email, but ping/pathping trace route telnet
can browse
web sites
Suspect
malicious netstat dns and dns lookup
application
on machine
IP
networking
problems ping/pathping netstat net shell
on my local
machine
Ping is probably one of the most used Command Line tools and for good reason. it is a
quick and easy way to see whether the site or service you are trying to connect to is
actually alive. It is usually the first tool most network administrator use when faced
with any kind of problem. You can use results from other actions to carry out further
actions in Ping to discover where the problem may be.
Using Ping
To use ping, simply open a command prompt and enter ping then the name of the host
that you want to check, without the http, ftp etc or any directories, slashes or other
information.
ping www.dosprompt.info
ping 85.234.131.90
lOMoARcPSD|32559332
Getting the "Request timed out" doesn't always mean that the host you are pinging is
actually down. Some sites will block the "ping packets" from being returned as a
security measure, so they will never respond to a ping. There are other tests that you
can do to verify whether the host is alive or not, usingTelnet.
Infinite Ping
With an additional command you can ask your machine to keep pinging a machine
until you end it. This is useful if you are moving a cable that you think is a problem or
you have an intermittent fault.
To continuously ping a host, add the command "-t" to the end after the host. For
example:
ping www.dosprompt.info -t
To end the continuous ping, press Ctrl and C which sends a break to it.
Path Ping (Windows XP and Windows 2003 server and higher only)
Path ping is a new tool introduced by Microsoft which combines ping and Trace Route.
It analyzes the route in the same way that trace route does, but sends multiple pings to
each hop on the way. It then collects statistics on this route to tell you whether one
particular hop is being very slow, indicating a problem. This does make it a slower tool
than ping, but can provide more information useful for diagnosis.
Using pathping is very similar to the standard ping application. In a command prompt
enter the command "pathping" then the host or Ip address that you want to check. For
example:
pathping www.dosprompt.info
pathping 85.234.131.90
lOMoARcPSD|32559332
After pressing enter you will get one of two results. Either "unable to resolve target"
which means that the name doesn't exist or the pathping will begin, only to end with a
successful or failure result code. Refer to the tracert results table below for information
on these result codes.
If the process seems to be going on too long, then press Ctrl and C to end it.
Netsh Ping
You can also ping through the Netshell interface, allowing you to ping certain servers
and settings that are configured on your machine.
Trace Route
When you browse the Internet, your machine doesn't not connect directly to the other
site, it goes through many hops. This can be as few as one or two if you are connecting
to the web servers internally or at your internet service provider, to as many as 30 if
you are browsing to a web site hosted on the other side of the world. In most cases you
don't need to worry about how many hops you go through. the ISP will be routing your
traffic to the required host, possible over a number of routes to ensure that your
request reaches it and the reply gets back.
What Trace Route does is show you the route that it is taking.
If you are getting a problem where you cannot connect to a certain site, trace route
can help you diagnose whether it is a local problem, an ISP problem or a wider issue.
The trace route command is "tracert" and as with ping, you can trace to either an
name or an IP address. In an open command prompt windows, enter the command
tracert followed by the host you want to connect to.
tracert www.dosprompt.info
tracert 85.234.131.90
After pressing enter, the trace will either fail immediately, or you will get one of the
following result codes:
either the host or one of the hops on the way didn't respond in the
Request timed out
timeout period. This usually indicates there is a problem.*
this means that a device that the rest of the Internet is sending
Destination network traffic to the host cannot connect to it or doesn't know where to
unreachable send the traffic. Again, usually indicates a problem that is often
outside of your control.**
* If you get this message more than two or three times together in a trace, you can
usually do the CTRL-C key combination to stop it. Waiting for the timeout to complete
is a waste of time.
** If you get this immediately then your internal routing is at fault. If it occurs after
three or four hops then it is probably outside of your control.
If the problem is a hop outside of your ISP, there is very little that you can do. Hopefully
the problem will be resolved or routers will find an alternative route around the
problematic machine.
Netstat
Net Stat is a tool that tells you what your machine is connected to at the moment the
command is run. This makes it a very useful tool to see if your machine is connecting to
servers that you don't know about - possibly via the so called "Spy Ware" or "Ad Ware".
By adjusting the switches after the command you can change the way the information
is presented.
This tool can display information about the active connections, as well as whether the
machine is listening for connections - i.e. ready to receive a connection from another
machine.
Command Displays
netstat Active connections only, with the full domain name
netstat -a Active connections and listening ports with full domain name
Active connections and listening ports with full domain name and
netstat -ao
PID of application using it*
Active connections and listening ports but in numeric form (no
netstart -an
domain names)
Active connections and listening ports but in numeric form (no
netstat -ano
domain names) and PID of application using it*
netstat -<any of Repeats the command, updating the statistics after the number of
lOMoARcPSD|32559332
seconds indicated.
above> 30 Change the number to increase or decrease the frequency
Replace <any of the above> with either "a", "ao", "an" or "ano"
* By adding the PID (Process Identification) you can see which application or service
running on your machine is making the connection or is in a waiting state. To see the
lists of processes, start the Task Manger (CTRL - ALT - DELETE then press Task
manager, Right click on the taskbar and choose it from the options or press CTRL ALT
ESC).
Once Task manager is loaded, if you cannot see PID in the list of columns, add it from
the "View", "Select Columns" command.
If you have any of the following in a listening state on your machine and don't know
about running those type of applications then you may have an application on your
system that is waiting for a third party to connect
Port Information
25 SMTP Server - email server
80 Web server
110 POP3 Server - email server
If you see other ports that you want to check and the PID doesn't clarify their use then
you can look at the official list maintained by the IANA (Internet Assigned Numbers
Authority) here: http://www.iana.org/assignments/port-numbers . This lists the most
common port usage but is reliant on application providers registering the port use.
You could also do a search on Google for the word "port" and then the number to see if
anyone else has reported it or can tell you what it is.
Net Shell
With the latest versions of Windows, the TCP/IP component is core to the operating
system and therefore cannot be reinstalled, removed or disabled. This makes resolving
problems with it a little more complex than before. Microsoft introduced with Windows
2000 a new utility that runs from the command line to allow you to adjust and
diagnose the IP settings. This new command is called netsh (net shell). It takes preset
commands, looks at what is configured in the operating system for those settings then
uses them. Therefore you are testing the network settings as the operating system sees
them.
lOMoARcPSD|32559332
There are two ways to operate the Netsh commands, both of which require a command
prompt.
If you are going to be running lots of commands or want to look at the help files for
subcommands, then method 2 is the better choice.
When you are in the netsh command shell, the prompt changes from "c:\>" to "netsh>"
Below are some of the commands that you can run in a Netsh session and what they do.
There are lots of commands available and these are just a sample of what is available.
In all cases, if you are running it outside of netsh (netsh>) then you need to prefix the
command with "netsh" e.g:
Action Command
Try to connect to the mail server configured in
diag connect mail
Outlook Express
Try to connect to the news server configured in
diag connect news
Outlook Express
Try to connect to the Internet Explorer Proxy server
diag connect ieproxy
(if configured)
diag connect iphost <name>
Try to connect to a specific port on an IP address or <port>
host name diag connect iphost <ip address>
<port>
Show network configuration diag show all
Ping servers configured on your machine
(run diag ping alone for the list of available server diag ping <server type>
types)
Show the graphical interface diag gui
DNS
lOMoARcPSD|32559332
DNS is core to the operation of most networks and the Internet. It stands for Domain
Name Service and the best way to think of it is like a big phone book. Every machine on
the Internet has a unique IP address. DNS maps those addresses to friendly names. For
example www.bbc.co.uk is 212.58.224.125. Therefore if you are having problems with
DNS settings or DNS lookups, it can hinder your web browsing.
If you are getting errors when browsing about hosts not being found, especially of they
are popular sites like Microsoft, Yahoo or the BBC then your DNS could be at fault.
The first thing you should do is flush your DNS cache. This very simple, just start a
command prompt and enter the following text:
ipconfig /flushdns
This will clean out the cache held on your local machine forcing it to look to the servers
you have configured in your settings.
DNS Lookup
DNS lookups can be carried out from the command line using a tool called "nslookup".
This tool doesn't have online help without entering the main shell.
A name lookup will tell you whether:
To do a DNS lookup from a command line, open a command prompt and enter the
following command:
for example
nslookup www.bbc.co.uk
You can also do DNS lookups against other servers that don't belong to your ISP. This
can verify whether your ISP has a problem. If you are running internal DNS servers (for
example on a network) then using external DNS servers can be beneficial in
discovering if the problem is local or not. To do this you need to enter the "nslookup"
shell. Open a command prompt and just type "nslookup" (minus the quotes) and press
enter. You will be told what server you are currently using for DNS.
lOMoARcPSD|32559332
To change server enter the command "server" then the IP address of the alternative
DNS server that you want to use.
Then, to look up a host, just enter the name, for example www.bbc.co.uk .
set type=mx
An example of using nslookup and telnet together to test MX records and an email
server is here.
When you have finished, type exit to leave the nslookup shell.
WHOIS
WHOIS, which allows you to lookup information about a domain name, is not native to
Windows.
Extract the files, then place them in to \windows\system32. The command will then be
available to you in a standard prompt.
Telnet
Telnet is how everything on the Internet used to work. It is the way that you connect to
UNIX type servers and is very basic. Therefore it is an excellent way to test your
connectivity to hosts on and off your network.
With the more recent versions of Windows, telnet support from the command line has
been introduced. For older versions of Windows you will start the application from the
start menu.
You can telnet to any port on a machine to see if it is working correctly. The most
common telnet action is to connect to email servers. For example to connect to the
email servers for Microsoft you would enter the following command in a Command
Prompt:
telnet maila.microsoft.com 25