Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
• Networks
• Topology
• Ethernet
• Cable and modes of transmissions
• Devices used in networking
• Cable installation
• OSI model
• Protocols and TCP/IP model
• Addressing and types of logical Address
• IP address
• Subneting
• Router back panel
• Router accessing Modes
• Password setting in Router
• Telnet
• Switching
• Commands
1
Networks
One way to categorize the different types of computer network designs is by their scope
or scale. For historical reasons, the networking industry refers to nearly every type of
design as some kind of area network. Common examples of area network types are:
LAN and WAN were the original categories of area networks, while the others have
gradually emerged over many years of technology evolution.
Note that these network types are a separate concept from network topologies such as
bus, ring and star.
2
A LAN connects network devices over a relatively short distance. A networked office
building, school, or home usually contains a single LAN, though sometimes one building
will contain a few small LANs (perhaps one per room), and occasionally a LAN will span
a group of nearby buildings. In TCP/IP networking, a LAN is often but not always
implemented as a single IP subnet.
In addition to operating in a limited space, LANs are also typically owned, controlled,
and managed by a single person or organization. They also tend to use certain
connectivity technologies, primarily Ethernet and Token Ring.
As the term implies, a WAN spans a large physical distance. The Internet is the largest
WAN, spanning the Earth.
3
A WAN is a geographically-dispersed collection of LANs. A network device called a
router connects LANs to a WAN. In IP networking, the router maintains both a LAN
address and a WAN address.
A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are
not owned by any one organization but rather exist under collective or distributed
ownership and management. WANs tend to use technology like ATM, Frame Relay and
X.25 for connectivity over the longer distances.
A MAN is optimized for a larger geographical area than a LAN, ranging from several
blocks of buildings to entire cities. MANs can also depend on communications channels
of moderate-to-high data rates. A MAN might be owned and operated by a single
organization, but it usually will be used by many individuals and organizations. MANs
might also be owned and operated as public utilities. They will often provide means for
internetworking of local networks. Metropolitan area networks can span up to 50km,
devices used are modem and wire/cable
4
Devices used in networking
LAN Card
A LAN card, more commonly referred to as a NIC, is a device that allows computers to
be joined together in a LAN, or local area network. Networked computers communicate
with each other using a given protocol or agreed-upon language for transmitting data
packets between the different machines, known as nodes. The network interface card acts
as the liaison for the machine to both send and receive data on the LAN.
The most common language or protocol for LANs is Ethernet, sometimes referred to as
IEEE 802.3. A lesser-used protocol is Token Ring. When building a LAN, a network
interface card must be installed in each computer on the network and all NICs in the
network must be of the same architecture. For example, all must either be Ethernet cards,
Token Ring cards, or an alternate technology.
An Ethernet network interface card is installed in an available slot inside the computer.
The NIC assigns a unique address called a MAC (media access control) to the machine.
The MACs on the network are used to direct traffic between the computers. The back
plate of the network interface card features a port that looks similar to a phone jack, but is
slightly larger. This port accommodates an Ethernet cable, which resembles a thicker
version of a standard telephone line. Ethernet cable must run from each network interface
card to a central hub or switch. The hub or switch acts like a relay, passing information
between computers using the MAC addresses and allowing resources like printers and
scanners to be shared along with data.
A network interface card does not have to be hard wired with physical cable. Wireless
Ethernet cards are installed like their wired counterparts, but rather than a port for an
Ethernet cable, the card features a small antenna. The card communicates with the central
wireless switch or hub via radio waves. Wireless LANs may have some restrictions
5
depending on the material the building is made from. For example, lead in walls can
block signals between the network interface card and hub or switch.
When buying components for a LAN, make sure the NICs and hub or switch have the
same capabilities. The entire network must be either wired or wireless, so a wireless
network interface card cannot talk to a wired switch or hub. In addition, newer versions
of hardware will likely support more features and/or greater speeds than older versions.
Make sure your central switch or hub can utilize the highest capabilities of the network
interface card under consideration.
For those who wish to connect LANs located in different areas of the city, state or
country, ATM (asynchronous transfer mode) can create wide area networks or WANs by
connecting LANs together. LANs are still built with a network interface card in each
networked computer, but ATM uses broadband Internet access to link the LANs to online
ATM switches. This type of ATM WAN is referred to as an Internetwork.
A network switch is a small hardware device that joins multiple computers together
within one local area network (LAN). Technically, network switches operate at layer two
(Data Link Layer) of the OSI model.
Network switches appear nearly identical to network hubs, but a switch generally
contains more "intelligence" (and a slightly higher price tag) than a hub. Unlike hubs,
network switches are capable of inspecting data packets as they are received, determining
the source and destination device of that packet, and forwarding it appropriately. By
delivering each message only to the connected device it was intended for, a network
switch conserves network bandwidth and offers generally better performance than a hub.
6
As with hubs, Ethernet implementations of network switches are the most common.
Mainstream Ethernet network switches support 10 Mbps, 100 Mbps, or 10/100 Mbps
Ethernet standards.
Routers
Routers are physical devices that join multiple wired or wireless networks together.
Technically, a wired or wireless router is a Layer 3 gateway, meaning that the
wired/wireless router connects networks (as gateways do), and that the router operates at
the network layer of the OSI model.
Home networkers often use an Internet Protocol (IP) wired or wireless router, IP being
the most common OSI network layer protocol. An IP router such as a DSL or cable
modem broadband router joins the home's local area network (LAN) to the wide-area
network (WAN) of the Internet.
7
Ethernet hub
A special type of network device called the hub can be found in many home and small business networks.
Though they've existed for many years, the popularity of hubs has exploded recently, especially among
people relatively new to networking. Do you own a hub, or are you considering purchasing one? This
article explains the purpose of hubs and some of the technology behind them... (see below)
• passive
• active
• intelligent
Passive hubs do not amplify the electrical signal of incoming packets before broadcasting
them out to the network. Active hubs, on the other hand, do perform this amplification, as
does a different type of dedicated network device called a repeater. Some people use the
terms concentrator when referring to a passive hub and multiport repeater when
referring to an active hub.
Intelligent hubs add extra features to an active hub that are of particular importance to
businesses. An intelligent hub typically is stackable (built in such a way that multiple units
can be placed one on top of the other to conserve space). It also typically includes remote
management capabilities via SNMP and virtual LAN (VLAN) support.
Bridge
In computer networking, a bridge divides a LAN into two segments, selectively
forwarding traffic across the network boundary it defines. A bridge is not quite the same
as a switch.
Repeaters
Network repeaters regenerate incoming electrical, wireless or optical signals. With
physical media like Ethernet or Wi-Fi, data transmissions can only span a limited
distance before the quality of the signal degrades. Repeaters attempt to preserve signal
integrity and extend the distance over which data can safely travel.
9
Actual network devices that serve as repeaters usually have some other name. Active
hubs, for example, are repeaters. Active hubs are sometimes also called "multiport
repeaters," but more commonly they are just "hubs." Other types of "passive hubs" are
not repeaters. In Wi-Fi, access points function as repeaters only when operating in so-
called "repeater mode."
Higher-level devices in the OSI model like switches and routers generally do not
incorporate the functions of a repeater. All repeaters are technically OSI physical layer
devices.
Modem
Traditional modems used in dial-up networking convert data between the analog form
used on telephone lines and the digital form used on computers. Standard dial-up network
modems transmit data at a maximum rate of 56,000 bits per second (56 Kbps). However,
inherent limitations of the public telephone network limit modem speeds to 33.6 Kbps or
lower in practice.
Broadband modems that are part of cable and DSL Internet service use more advanced
signaling techniques to achieve dramatically higher network speeds than traditional
modems. Broadband modems are sometimes called "digital modems" and those used for
traditional dial-up networking, "analog modems." Cellular modems that establish Internet
connectivity through a digital cell phone also exist.
10
Topologies
In computer networking, topology refers to the layout of connected devices. This article
introduces the standard topologies of networking.
Think of a topology as a network's virtual shape or structure. This shape does not
necessarily correspond to the actual physical layout of the devices on the network. For
example, the computers on a home LAN may be arranged in a circle in a family room,
but it would be highly unlikely to find a ring topology there.
• bus
• ring
• star
• tree
• mesh
More complex networks can be built as hybrids of two or more of the above basic
topologies.
11
Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices. A single cable, the backbone functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message.
Ethernet bus topologies are relatively easy to install and don't require much cabling
compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both
were popular Ethernet cabling options many years ago for bus topologies. However, bus
networks work best with a limited number of devices. If more than a few dozen
computers are added to a network bus, performance problems will likely result. In
addition, if the backbone cable fails, the entire network effectively becomes unusable.
12
Ring Topology
In a ring network, every device has exactly two neighbors for communication purposes.
All messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down
the entire network.
To implement a ring network, one typically uses FDDI, SONET, or Token Ring
technology. Ring topologies are found in some office buildings or school campuses.
13
Star Topology
Many home networks use the star topology. A star network features a central connection
point called a "hub" that may be a hub, switch or router. Devices typically connect to the
hub with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure
in any star network cable will only take down one computer's network access and not the
entire LAN. (If the hub fails, however, the entire network also fails.)
14
Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest
form, only hub devices connect directly to the tree bus, and each hub functions as the
"root" of a tree of devices. This bus/star hybrid approach supports future expandability of
the network much better than a bus (limited in the number of devices due to the broadcast
traffic it generates) or a star (limited by the number of hub connection points) alone.
Mesh Topology
15
Topologies involve the concept of routes. Unlike each of the previous topologies,
messages sent on a mesh network can take any of several possible paths from source to
destination. (Recall that even in a ring, although two cable paths exist, messages can only
travel in one direction.) Some WANs, most notably the Internet, employ mesh routing.
A mesh network in which every device connects to every other is called a full mesh. As
shown in the illustration below, partial mesh networks also exist in which some devices
connect only indirectly to others.
Ethernet
Ethernet is standardized as IEEE 802.3. The combination of the twisted pair versions of
Ethernet for connecting end systems to the network, along with the fiber optic versions
for site backbones, is the most widespread wired LAN technology. It has been in use
from around 1980[1] to the present, largely replacing competing LAN standards such as
token ring, FDDI, and ARCNET.
16
Ethernet Cabling
Ethernet cabling is an important discussion, especially if you are planning on taking the
Cisco exams. Three types of Ethernet cables are available:
_ Straight-through cable
_ Crossover cable
_ Rolled cable
We will look at each in the following sections.
Straight-Through Cable
The straight-through cable is used to connect
_ Host to switch or hub
_ Router to switch or hub
Four wires are used in straight-through cable to connect Ethernet devices. It is relatively
simple to create this type; Figure 1.22 shows the four wires used in a straight-through
Ethernet cable. Notice that only pins 1, 2, 3, and 6 are used. Just connect 1 to 1, 2 to 2, 3
to 3, and 6 to 6 and you’ll be up and networking in no time. However, remember that this
would be an Ethernet-only cable and wouldn’t work with voice, Token Ring, ISDN, and
so on.
Crossover Cable
The crossover cable can be used to connect
17
_ Switch to switch
_ Hub to hub
_ Host to host
_ Hub to switch
_ Router direct to host
The same four wires are used in this cable as in the straight-through cable; we just
connect different pins together. Figure 1.23 shows how the four wires are used in a
crossover Ethernet cable. Notice that instead of connecting 1 to 1, 2 to 2, and so on, here
we connect pins 1 to 3 and 2 to 6 on each side of the cable.
Rolled Cable
Although rolled cable isn’t used to connect any Ethernet connections together, you can
use a rolled Ethernet cable to connect a host to a router console serial communication
(com) port. If you have a Cisco router or switch, you would use this cable to connect
your PC running HyperTerminal to the Cisco hardware. Eight wires are used in this cable
to connect serial devices, although not all eight are used to send information, just as in
Ethernet networking.
Figure 1.24 shows the eight wires used in a rolled cable.
18
The OSI Reference Model
One of the greatest functions of the OSI specifications is to assist in data transfer between
disparate Hosts—meaning, for example, that they enable us to transfer data between a
UNIX host and a PC or a Mac. The OSI isn’t a physical model, though. Rather, it’s a set
of guidelines that application Developers can use to create and implement applications
that run on a network. It also provides a framework for creating and implementing
networking standards, devices, and internetworking schemes. The OSI has seven different
layers, divided into two groups. The top three layers define how the applications within
the end stations will communicate with each other and with users. The bottom four layers
define how data is transmitted end to end.
19
The upper layers
• Provides a user interface
• Presents data
• Handles processing such as encryption
• Keeps different applications’ data separate
Application
Presentation
Session
Transport
Network
Data Link
Physical
We understand that the user interfaces with the computer at the
Application layer and also that the upper layers are responsible for applications
communicating between hosts. Remember that none of the upper layers knows anything
about networking or network addresses. That’s the responsibility of the four bottom
layers. Lower Layer you can see that it’s the four bottom layers that define how data is
transferred through a physical wire or through switches and routers. These bottom layers
also determine how to rebuild a data stream from a transmitting host to a destination
host’s application.
20
open network protocol set. Defining the etiquette of communication models, it remains
today the most popular means of comparison for protocol suites.
The OSI reference model has seven layers:
_ Application layer (layer 7)
_ Presentation layer (layer 6)
_ Session layer (layer 5)
_ Transport layer (layer 4)
_ Network layer (layer 3)
_ Data Link layer (layer 2)
_ Physical layer (layer 1)
The Application Layer
The Application layer of the OSI model marks the spot where users actually
communicate to the computer. This layer only comes into play when it’s apparent that
access to the networks going to be needed soon. Take the case of Internet Explorer (IE).
You could uninstall every trace of networking components from a system, such as
TCP/IP, NIC card, and so on, and you could still use IE to view a local HTML document
—no problem. But things would definitely get messy if you tried to do something like
view an HTML document that must be retrieved using HTTP or nab a file with FTP or
TFTP. That’s because IE will respond to requests such as those by attempting to access
the Application layer. And what’s happening is that the Application layer is acting as an
interface between the actual application program—which isn’t at all a part of the layered
structure—and the next layer down by providing ways for the application to send
information down through the protocol stack. In other words, IE doesn’t truly reside
within the Application layer—it interfaces with Application layer protocols when it needs
to deal with remote resources. The Application layer is also possible for identifying and
establishing the availability of the intended communication partner and determining
whether sufficient resources for the intended communication exist. These tasks are
important because computer applications sometimes require more than only desktop
resources. Often, they’ll unite communicating components from more than one network
application. Prime examples are file transfers and email, as well as enabling remote
21
access, network management activities, client/server processes, and information location.
Many network applications provide services for communication over enterprise networks,
but for present and future internetworking, the need is fast developing to reach beyond
the limits of current physical networking.
The Presentation Layer
The Presentation layer gets its name from its purpose: It presents data to the Application
layer and is responsible for data translation and code formatting. This layer is essentially
a translator and provides coding and conversion functions. A successful data-transfer
technique is to adapt the data into a standard format before transmission. Computers are
configured to receive this generically formatted data and then convert the data back into
its native format for actual reading (for example, EBCDIC to ASCII). By providing
Translation services, the Presentation layer ensures that data transferred from the
Application layer of one system can be read by the Application layer of another one.
The OSI has protocol standards that define how standard data should be formatted. Tasks
like data compression, decompression, encryption, and decryption are associated with
this layer. Some Presentation layer standards are involved in multimedia operations too.
The Session Layer
The Session layer is responsible for setting up, managing, and then tearing down sessions
Between Presentations layer entities. This layer also provides dialog control between
devices, or nodes. It coordinates communication between systems and serves to organize
Their communication by offering three different modes: simplex, half duplex, and full
Duplex. To sum up, the Session layer basically keeps different applications’ data separate
From other applications’ data.
The Transport Layer
The Transport layer segments and reassembles data into a data stream. Services located
in the Transport layer segment and reassemble data from upper-layer applications and
unite it into the same data. They provide end-to-end data transport services and can
establish a logical connection between the sending host and destination host on an
internetwork.
22
Some of you are probably familiar with TCP and UDP already. (But if you’re not, no
worries—I’ll tell you all bout them in Chapter 2.) If so, you know that both work at the
Transport layer and that TCP is a reliable service and UDP is not. This means that
application developers have more options because they have a choice between the two
protocols when working with TCP/IP protocols.
IP Addressing
24
as a unique identifier, as in flat addressing, a part of the address is designated as the
network address and the other part is designated as either the subnet and host or just the
node address. In the following sections, I’m going to discuss IP network addressing and
the different classes of address we can use to address our networks.
Network Addressing
The network address (which can also be called the network number) uniquely identifies
each network. Every machine on the same network shares that network address as part of
its IP address. In the IP address 172.16.30.56, for example, 172.16 is the network address.
The node address is assigned to, and uniquely identifies, each machine on a network.
This part of the address must be unique because it identifies a particular machine—an
individual—as opposed to a network, which is a group. This number can also be referred
to as a host address. In the sample IP address 172.16.30.56, the 30.56 is the node address.
The designers of the Internet decided to create classes of networks based on network size.
For the small number of networks possessing a very large number of nodes, they created
the rank Class A network. At the other extreme is the Class C network, which is reserved
for the numerous networks with a small number of nodes. The class distinction for
networks between very large and very small is predictably called the Class B network.
Subdividing an IP address into a network and node address is determined by the class
designation of one’s network. Figure 2.12 summarizes the three classes of networks—
25
To ensure efficient routing, Internet designers defined a mandate for the leading-bits
section of the address for each different network class. For example, since a router knows
that a Class A network address always starts with a 0, the router might be able to speed a
packet on its way after reading only the first bit of its address. This is where the address
schemes define the difference between a Class A, a Class B, and a Class C address. In the
next sections, I’ll discuss the differences between these three classes, followed by a
discussion of the Class D and Class E addresses (Classes A, B, and C are the only ranges
that are used to address hosts in our networks).
26
or more. (Yes, I know 0 and 127 are not valid in a Class A network. I’ll talk about
reserved addresses in a minute.)
27
Variable Length Subnet Masks (VLSMs)
Our subnets would be (you know this part, right?) 0, 16, 32, 48, 64, 80, etc. This allows
us to assign 16 subnets to our internetwork. But how many hosts would be available on
each network? Well, as you probably know by now, each subnet provides only 14 hosts.
28
This means that each LAN has 14 valid hosts available—one LAN doesn’t even have
enough addresses needed for all the hosts! But the point-to-point WAN link also has 14
valid hosts. It’s too bad we can’t just nick some valid hosts from that WAN link and give
them to our LANs! All hosts and router interfaces have the same subnet mask—again,
this is called classful routing. And if we want this network to be more efficient, we
definitely need to add different masks to each router interface. But there’s still another
problem—the link between the two routers will never use more than two valid hosts! This
wastes valuable IP address space, and it’s the big reason I’m going to talk to you about
VLSM network design.
VLSM Design
Let’s take Figure above and use a classless design…which will become the new network
shown in Figure below In the previous example, we wasted address space—one LAN
didn’t have enough addresses because every router interface and host used the same
subnet mask. Not so good. What would be good is to provide only the needed number of
hosts on each router interface. To do this, we use what are referred to as Variable Length
Subnet Masks (VLSMs). Now remember that we can use different size masks on each
router interface. And if we use /30 on our WAN links and a /27, /28, and /29 on our
LANs, we’ll get 2 hosts per WAN interface, and 30, 14, and 8 hosts per LAN interface
29
ice! This makes a huge difference—not only can we get just the right amount of hosts
Different Protocols
A network protocol defines rules and conventions for communication between network
devices. Protocols for computer networking all generally use packet switching techniques
to send and receive messages in the form of packets.
Network protocols include mechanisms for devices to identify and make connections
with each other, as well as formatting rules that specify how data is packaged into
messages sent and received. Some protocols also support message acknowledgement and
data compression designed for reliable and/or high-performance network communication.
Hundreds of different computer network protocols have been developed each designed
for specific purposes and environments.
30
File Transfer Protocol (FTP)
File Transfer Protocol (FTP) is the protocol that actually lets us transfer files, and it can
accomplish this between any two machines using it. But FTP isn’t just a protocol; it’s also
a program Operating as a protocol, FTP is used by applications. As a program, it’s
employed by users to perform file tasks by hand. FTP also allows for access to both
directories and files and can accomplish certain types of directory operations, such as
relocating into different ones. FTP teams up with Telnet to transparently log you into the
FTP server and then provides for the transfer of files.
HTTP
31
HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic
images, sound, video, and other multimedia files) on the World Wide Web. As soon as a
Web user opens their Web browser, the user is indirectly making use of HTTP. HTTP is
an application protocol that runs on top of the TCP/IP suite of protocols (the foundation
protocols for the Internet).
HTTP concepts include (as the Hypertext part of the name implies) the idea that files can
contain references to other files whose selection will elicit additional transfer requests.
Any Web server machine contains, in addition to the Web page files it can serve, an
HTTP daemon, a program that is designed to wait for HTTP requests and handle them
when they arrive. Your Web browser is an HTTP client, sending requests to server
machines. When the browser user enters file requests by either "opening" a Web file
(typing in a Uniform Resource Locator or URL) or clicking on a hypertext link, the
browser builds an HTTP request and sends it to the Internet Protocol address (IP address)
indicated by the URL. The HTTP daemon in the destination server machine receives the
request and sends back the requested file or files associated with the request. (A Web
page often consists of more than one file.)
Telnet
32
Users begin a Telnet session by running the Telnet client software and then logging into
the Telnet server.
Switching
Circuit Switching
Switched circuits allow data connections that can be initiated when needed and
terminated when communication is complete. This works much like a normal telephone
line works for voice communication. Integrated Services Digital Network (ISDN) is a
good example of circuit switching. When a router has data for a remote site, the switched
circuit is initiated with the circuit number of the remote network. In the case of ISDN
circuits, the device actually places a call to the telephone number of the remote ISDN
circuit. When the two networks are connected and authenticated, they can transfer data.
When the data transmission is complete, the call can be terminated. Figure 3-3 illustrates
an example of this type of circuit.
Packet Switching
Packet switching is a WAN technology in which users share common carrier resources.
Because this allows the carrier to make more efficient use of its infrastructure, the cost to
the customer is generally much better than with point-to-point lines. In a packet switching
setup, networks have connections into the carrier’s network, and many customers share
the carrier’s network. The carrier can then create virtual circuits between customers’ sites
by which packets of data are delivered from one to the other through the network. The
section of the carrier’s network that is shared is often referred to as a cloud. Some
examples of packet-switching networks include Asynchronous Transfer Mode (ATM),
Frame Relay, Switched Multimegabit Data Services (SMDS), and X.25. Figure
3-4 shows an example packet-switched circuit.
33