BASIC Computer Networks
Neeraj Rai
Se. Engineer
ISSD,9851017555
[email protected]
Copyright, 1996 © Dale Carnegie & Associates,
Objectives
To be acquainted with:
Introduction of Computer network
Network topology
Basic TCP/IP
Network Components
Network Troubleshooting
Proxy
Introduction
Interconnection of computers and
peripheral equipments .
Used for sharing resources (such as
printers and CD-ROMs), exchange
files, or allow electronic
communications.
Typical applications: World wide
web(WWW), FTP, Remote login.
Why Networking ?
• Do you prefer these?
A computer network can be two
computers connected
• Or this?
Switch
A computer network can also consist of, and is
usually made for, more than two computers:
Why Networking ?
- Sharing information
• Do you prefer these?
• Or this?
Why Networking ? Contd…
- Sharing hardware or software
• Do you prefer these?
• Or this?
Network Types
Based on network size: LAN and WAN
(and MAN)
Based on transmission media: Wired
(UTP, coaxial cables, fiber-optic
cables) and Wireless
Based on topology (connectivity):
Bus, Star, Ring
Local Area Networks
Small network, short
distance
A room, a floor, a
building
Limited by no. of
computers and
distance covered
Serve a department
within an organization
Wide Area Network
A network that uses long-range
telecommunication links to connect
2 or more LANs/computers housed
in different places far apart.
Towns, states, countries
Examples:
Intranet System of Nepal
Telecom
Internet
Metropolitan Area Network
A network that spans a metropolitan
area such as a city or suburban area.
Eg. Community Schools connected by
a network in Bhaktapur district
Topologies
Bus
Tree
Ring
Star
LAN Topologies
Bus and Tree
Multipoint medium
Transmission propagates throughout medium
Heard by all stations
Need to identify target station
Each station has unique address
Full duplex connection between station and tap
Allows for transmission and reception
Need to regulate transmission
To avoid collisions
To avoid hogging
Data in small blocks - frames
Terminator absorbs frames at end of medium
Frame Transmission on Bus LAN
Frame Transmission Ring LAN
Ring Topology
Repeaters joined by point to point links in closed
loop
Receive data on one link and retransmit on
another
Links unidirectional
Stations attach to repeaters
Data in frames
Circulate past all stations
Destination recognizes address and copies frame
Frame circulates back to source where it is
removed
Media access control determines when station can
insert frame
Star Topology
Each station connected directly to central
node
Usually via two point to point links
Central node can broadcast
Physical star, logical bus
Only one station can transmit at a time
Central node can act as frame switch
Choice of Topology
Reliability
Expandability
Performance
Needs considering in context of:
Medium
Wiring layout
Access control
BASIC TCP/IP
A set of protocols allowing communication across diverse
networks
Emphasize on robustness regarding to failure
Emphasize on Flexibility in operating on diverse networks
The TCP/IP model is the defacto model in use on the
internet
TCP/IP has easy remote access capabilities.
TCP/IP is FREE
TCP/IP Structure and Addressing
The TCP/IP Protocols Diagram shows a detailed picture of
the TCP/IP layers.
IP Address
An IP address is a 32-bit sequence of 1s and 0s.
To make the IP address easier to use, the address
is usually written as four decimal numbers
separated by periods.
This way of writing the address is called the dotted
decimal format.
IP Address (Version 4)
IP version 4 allows for 32 bits to be used in determining
the address of a system
232 =4,294,967,296 addresses
11111111 11111111 11111111 11111111
IP addresses are normally written as a sequence of four
decimal numbers separated by periods,
-Dotted Quad Notation : 192.168.17.62
Address consists of two portions
– Network Address
– Host Address
• Hosts whose addresses share a network number can send
local broadcasts to one another and communicate without a
router.
• Hosts with differing network numbers can communicate
only via a router/ Gateway
Address Structure
Class A
0 7 Bits of Network 24 Bits of Host Address
Address
– 0 In the first bit
– Remaining 7 binaries of first octet determines the Network
1 to 126 (00000000 binary to 01111111 binary).
– Rest 24 binaries of three octet determines the Host
224 - 2 = 16,777,214 hosts
Class B
10 14 Bits of Network 16 Bits of1 Host Address
Address
11001101 10011010 00001000 00000001
– 1 in the first bit and a 0 in the second bit of the first octet.
128 toNetwork
191 (10000000 binary to Host
10111111 binary).
– Remaining 14 binaries of first two octet determines Network
16384 Network addresses
– Rest 16 binaries determines Host
216 - 2 = 65,534 host addresses
Address Structure
Class C
110 21 Bits of Network Address 8 Bits of Host
Address
– 1s in the first two bits and 0 in the third bit of the first octet
192 to 223 (11000000 binary to 11011111 binary).
– Remaining 21 binaries of first three octet determine Network
addresses
There are 2,097,152 Class C Networks addresses.
-Rest 8 binaries determine Host
28 - 2 = 254 host addresses
Class D & E
– Network numbers with the first digit higher than 223 are reserved
for special purpose
Address Structure
IP Addresses Types
Public IP Address
IP Address used in Internet is known as Public IP
Address. No two machines that connect to a public
network can have the same IP address because
public IP addresses are global and standardized
Private IP address
Private IP addresses are a solution to the problem of
the exhaustion of public IP addresses. Addresses
that fall within these ranges are not routed on the
Internet backbone.
Connecting a network using private addresses
to the Internet requires the usage of NAT
Private IP Address
Class A - 10.0.0.0 to 10.255.255.255
Class B – 172.16.0.0 to 172.31.255.255
Class C – 192.168.0.0 to 192.168.255.255
TCP/IP Installation and Configuration
A two-step process
First, install the protocol
With many modern OS such as Windows XP, it is
automatically installed
Second, configure its properties
When TCP/IP is automatically installed, the
properties are set to be obtained from a DHCP
server
However, it is also possible to manually set the
properties
TCP/IP Installation Steps
Choose Network/
Start Properties
From Network
Neighborhood/ TCP/IP
Install Protocol
Properties. protocol
installed.
Add
OK
Choose TCP/IP End
Accessing the Window for TCP/IP
Properties
Under different Windows operating
systems the TCP/IP properties are
accessed in different ways
The best and the most consistent way to
access TCP/IP properties Windows is to go
through the Control Panel and then select the
Network Icon
Another way to access the properties is to go
through Network Neighborhood
Thereafter, select the network properties
(Based on the NIC) and then then continue to
select the TCP/IP properties
Accessing TCP/IP Properties Tab
Start Choose Network
From Network
Neighborhood/
Properties. TCP/IP/
Properties
Proceed
Define TCP/IP properties
TCP/IP Configuration Options
Dynamic IP
A DHCP server must be present in the network
to issue dynamic IP
In a number of cases, the MAC address of the
client is registered to prevent unauthorized
leasing of IP addresses to clients
Static IP
Obtain the IP address specifications from the
network administrator
DHCP and TCP/IP Configuration
Without a DHCP server
Requires the static assignment of IP addresses
and properties
The DHCP server need not reside on the same
subnet
With a DHCP server
IP addresses etc. are automatically assigned
by the DHCP server
Select the appropriate option for the TCP/IP
address to be dynamically assigned by the
DHCP server
TCP/IP Configuration Static
IP
Address
Subnet Mask
TCP/IP Advanced
Properties
Gateway
DNS
IP Address Assignment Summarized
IP Address
DHCP
Non-DHCP
Obtain IP Specify IP Address
Address
automatically
IP Address Subnet Mask
123.145.178.90 255.255.255.0
Gateway, DNS and WINS addresses
Network Components
NIC Card
HUB
Bridge
Switch
Router
Network Components
NIC (Network interface card) is a piece of computer
hardware designed to allow computers to communicate
over a computer network. It provides physical access to a
networking medium and often provides a low-level
addressing system through the use of MAC Address.
NIC Card
Network Components
Hub
Center of star topology
In Ethernet, multiport
repeater or concentrator
Bridge Hub
Connects 2 networks of
same technology –
extended LAN Ethernet Ethernet
Filters/forwards/floods
based on MAC Bridge
Link layer - frames
Switch Ethernet Ethernet
Connects 2+ networks – CIS C OSY S TEM S
T3
CIS COSY ST EM S
packet-switched network
CISCO SYSTEMS
STS-N
Reduces collisions Switch
Network Components
Originally gateway
Forwards packets Ethernet Ethernet
based on network CISC OSYSTEMS CISCOS YSTEMS
layer info (IP)
Separate
Router
broadcast
domains
In each domain,
CISCO SYSTEMS
Token-
ring
IP packet
encapsulated in
domain-specific
packet
How Does Everyone Connect
Together?
Network Troubleshooting
A wired or wireless computer network may face different
types of problems such as lost connectivity, security
related issues, unauthorized access, bottle neck, packet
loss, configuration problems and network application
related issues.
Successful troubleshooting requires a logical, consistent
and right approach by using the troubleshooting
techniques and tools.
Troubleshooting means recognizing, diagnosing and
solving the computer networking issues and as
system/network administrator your primary job
responsibility is to maintain the network connectivity,
security and performance.
Network Troubleshooting
Common Errors:
1. Request time out error
2. Host unreachable
3. Intermittent connectivity
4. Limited or no connectivity
Network Troubleshooting
IPconfig
The 'ipconfig' tool shows a computer's
TCP/IP configuration. It displays the IP
address, the network (subnet) mask and
the Internet/network gateway address (if
one is set for that network).
Use this tool to verify that the TCP/IP
configuration has been set up correctly.
Example: ipconfig
Network Troubleshooting
Start > Search programs and files>
cmd
ipconfig
Network Troubleshooting
Ping
'Ping' is the single most powerful troubleshooting
tool for networked computers.
The ping tool can at different times verify that
TCP/IP is installed correctly on a computer, that a
computer has joined the network successfully.
The ping command determines whether the remote
host(Server) is reachable or not.
Ex: ping 172.17.49.1
Send a message and then waits for a response
Reports computer is alive/not responding
Options
-L to Specify packet size.
-T for Repeatedly send one message/sec until program
stops.
Network Troubleshooting
Tracert
'Tracert" (pronounced "traceroute") sends a test network
message from a computer to a designated remote host
and tracks the path taken by that message.
‘Tracert' displays the name or IP address of each
intermediate router or other network gateway device the
message passes through to reach its destination.
'Tracert' is especially useful when diagnosing
connectivity problems on the Internet or corporate
network.
Traceroute determines the intermediate computers along
the path to a remote destination
Ex: traceroute 172.16.10.203
Provides more information than ping
Network Troubleshooting
Route
Another advanced network administration
tool is 'route‘.
‘Route’ supports manipulation and viewing
of a computer's routing table. 'Route' can
be used on networks to diagnose cases
where a computer cannot reach another
computer on the LAN.
Example :
Route print
Route add network 192.168.200.0 mask
255.255.255.0 gateway 172.17.13.129
What is a Proxy?
•Provides an interface identical to Subject’s
so that a proxy can be substituted for the
real subject.
•Use an extra level of indirection to support
distributed, controlled, or intelligent access.
•Controls access to the real subject and may
be responsible for creating and deleting it
Types of Proxies
•Remote Proxy
Provides a local representative for an object in a
different address space.
Responsible for encoding a request and its
arguments and for sending the encoded request to
the real subject in a different address space.
• Virtual Proxy
Creates expensive objects on demand.
May cache additional information about the real
subject so that they can postpone accessing it.
• Protection Proxy
Controls access to the original object. This is useful
when objects should have different access rights.
Check that the caller has the access permissions
required to perform a request.
Connecting To The Internet
Share the Internet connection transparently
for both
Dial-Up media
Always-available media( Such as LAN,
ADSL, LEASED etc.)
Windows Internet Connection Sharing
Goals
Enable multiple users in the home
to connect to the Internet
Enable telecommuting using the Internet as
a WAN (VPNs)
ICS Configuration
Computer with Internet access (ICS host)
configured to translate requests to and from
Internet on behalf of other computers on network
Acts as DHCP server, DNS resolver, and NAT
gateway for clients on its LAN
Network adapter on ICS host assigned IP address
of 192.168.0.1
Clients must be set up to obtain IP addresses
automatically
ICS host assigns clients IP addresses in range
of 192.168.0.2 through 192.168.0.255
Internet Connection Sharing
INTERNET
192.168.0.1
Modem
Computer I
192.168.0.2 192.168.0.3 192.168.0.4 192.168.0.5
Computer2 Computer3 Computer4 Computer5
REVIEW
THANK YOU