Sei sulla pagina 1di 143

A

ss
oc
ia
te
ID

:3
9

54
7

Networking Basics

C3: Protected

About the Author


Prashanth Perumal (159950)

Credential
Information:

MCP, MCITP (Exchange 2007), RHCE certified professional

Version and
Date:

NETWORK/PPT/0508/1.0

ss
oc
ia
te
ID

:3
9

54
7

Created By:

2007, Cognizant Technology Solutions

Confidential

Icons Used

Questions

ss
oc
ia
te
ID

Coding
Standards

:3
9

54
7

Tools

Hands on
Exercise

Demonstration

Test Your
Understanding

Reference

A Welcome
Break

Contacts

2007, Cognizant Technology Solutions

Confidential

Networking Basics: Overview


Introduction:

ss
oc
ia
te
ID

:3
9

54
7

This module would give an introduction about the Networking,


Topologies, and basic Network Troubleshooting.

2007, Cognizant Technology Solutions

Confidential

Networking Basics: Objectives


Objective:

ss
oc
ia
te
ID

:3
9

54
7

After completing this chapter, you will be able to:


Explain network topologies
Describe the transmission media
Describe network devices
Explain the wireless standards
Describe basic troubleshooting

2007, Cognizant Technology Solutions

Confidential

Introduction to Computer Networks


The following are the features of computer networking:
Networking is sharing of information and services.
Networking is possible when individuals or groups have information or

ss
oc
ia
te
ID

:3
9

54
7

abilities that they wish to share with others.


Computer networking provides the communication tools to allow
computers to share information and abilities.

2007, Cognizant Technology Solutions

Confidential

Introduction to Computer Networks


(Contd.)
The disadvantages of standalone systems are:

ss
oc
ia
te
ID

:3
9

Users have to communicate between each other


Components, such as floppy disk, notepads, and memos are required
Each computer has to maintain its own resources
Overhead cost is increased
Sharing resources and information is difficult for users

54
7

2007, Cognizant Technology Solutions

Confidential

Introduction to Computer Networks


(Contd.)
The advantages of networked systems are:
Efficient management of resources
Sharing applications

ss
oc
ia
te
ID

:3
9

Efficient communication

54
7

Fast data sharing

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Introduction to Computer Networks


(Contd.)

2007, Cognizant Technology Solutions

Confidential

Local Area Network (LAN)


The following are the features of LAN:
Covers a small area, such as a building or a cluster of buildings
Consists of computers that are connected to each other using cables

54
7

Suits business organizations situated in a single location


Is also called a cabled network

ss
oc
ia
te
ID

:3
9

Requires inexpensive bandwidth (typically 10/100 Mbps)

2007, Cognizant Technology Solutions

Confidential

10

Metropolitan Area Network (MAN)


The following are the features of MAN:
Covers an area of a city
Connects two or more LANs

54
7

Suits business organizations having offices distributed over different

ss
oc
ia
te
ID

:3
9

parts of a city
Requires more expensive bandwidth than LAN
Uses microwave or Optical Fiber Cable (OFC) is typically used as
transmission media

2007, Cognizant Technology Solutions

Confidential

Wide Area Network (WAN)


The following are the features of WAN:
Connects computer networks located in different countries or

ss
oc
ia
te
ID

:3
9

54
7

continents
The transmission media is typically hired from a thirdparty service
provider
Offices are connected typically through satellite or undersea OFC
Bandwidth is much more expensive than LAN or MAN

2007, Cognizant Technology Solutions

Confidential

Network Elements

ss
oc
ia
te
ID

:3
9

54
7

Network Elements

Network Services

Transmission Media

2007, Cognizant Technology Solutions

Network Topology
and Protocols
Confidential

13

Network Services

ss
oc
ia
te
ID

Peer-to-Peer

:3
9

54
7

Roles of Computer in Computer Networks

Client-Server

2007, Cognizant Technology Solutions

Combination

Confidential

14

Peer-to-Peer Networks

ss
oc
ia
te
ID

:3
9

54
7

The following are the features of a peertopeer network:


All computers provide and request services
There is no centralized control over the network
Security is weak
Typically consists of 10 or fewer computers
Operating systems such as Windows 95/98, Windows NT, Windows 2000
have builtin peertopeer networking

2007, Cognizant Technology Solutions

Confidential

Peer-to-Peer Networks (Contd.)


Advantages:
Low cost as expensive software and hardware are not required
Easy to implement

54
7

Resource sharing controlled by users

ss
oc
ia
te
ID

:3
9

No need of a dedicated network administrator

LOW COST

2007, Cognizant Technology Solutions

Confidential

Peer-to-Peer Networks (Contd.)


Disadvantages:
Low level of security
Heavy load on computers because of resource sharing

54
7

Resource sharing controlled by users

ss
oc
ia
te
ID

:3
9

Size of network limited to approximately 10 computers

2007, Cognizant Technology Solutions

Confidential

Client-Server Networks
The following are the features of a clientserver network:
Consists of client and server computers
Server computers are optimized to provide service

54
7

Client computers are optimized to request for service


Server computers also provide the security and administration feature

ss
oc
ia
te
ID

:3
9

for the network


Requires high configuration hardware for the server

2007, Cognizant Technology Solutions

Confidential

Client-Server Networks (Contd.)

ss
oc
ia
te
ID

:3
9

54
7

Advantages:
Strong central security
Central file storage
Resource sharing controlled by
administrators
Easy management of large
number of users

2007, Cognizant Technology Solutions

Confidential

Client-Server Networks (Contd.)


Disadvantages:
Requires high cost of server hardware and software

ss
oc
ia
te
ID

:3
9

54
7

Requires dedicated and welltrained network administrator

2007, Cognizant Technology Solutions

Confidential

Common Network Services


The following are the features of common network services:
Servers offer a variety of networked services to the clients
Servers use network operating systems to offer these services to

:3
9

File services
Print services
Message services
Application services
Database services

ss
oc
ia
te
ID

54
7

multiple clients simultaneously


The common network services offered by servers are:

2007, Cognizant Technology Solutions

Confidential

File Services
File services are offered by network applications designed to
efficiently store, retrieve, and move data files between a client
and a server.

54
7

File services perform the following functions:


File transfer

:3
9

File storage and data migration


File update synchronization

ss
oc
ia
te
ID

File archiving

2007, Cognizant Technology Solutions

Confidential

Print Services
Print services are offered by network applications that
manage access to printers.

54
7

They accept print job requests, manage print queues, and


interact with networked printers for network clients.
Print services perform the following functions:

:3
9

Provide multiple access from limited interfaces


Eliminate distant constraints

ss
oc
ia
te
ID

Handle simultaneous requests

and queue them


Share specialized equipment

2007, Cognizant Technology Solutions

Confidential

Message Services
Message services include storing, accessing, and delivering
text, binary, graphic, digitized video, and audio data.
Message services:

54
7

message
Perform the following functions:

Transport data from point to point and notify the user of awaiting

ss
oc
ia
te
ID

:3
9

Transfer computer generated notes and data between users


Organize and maintain user and device information directories

2007, Cognizant Technology Solutions

Confidential

Database Services
Database services provide serverbased data storage and
retrieval for clients who request data from specialized servers.

In the case of database services:

54
7

The client formulates the request and processes the response


The server evaluate the incoming request and returns data

:3
9

Database services perform the following functions:


Optimize computers that store, search, and retrieve database records

ss
oc
ia
te
ID

Control where data is stored geographically

Provide data security

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

26

Test Your Understanding


1. State the differences between PeertoPeer and ClientServer
Network services.

ss
oc
ia
te
ID

:3
9

54
7

2. What are the common network services?

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

28

Transmission Media
The following are the features of transmission media:
Before a network service can be shared, networked computers must have a

Cable
Wireless

ss
oc
ia
te
ID

:3
9

54
7

pathway to contact other computers.


Computers use electronic voltage, electromagnetic waves, or light pulses to
send signals.
The physical path through of the travel is called transmission media.
Media can be classified as:

Cable media are wires or fibers that conduct electricity or light.


Cable media provides a conductor for the electrical signal, whereas

wireless media do not.


Cable media is typically used in LANs.
Wireless media is typically used in WANs.

2007, Cognizant Technology Solutions

Confidential

Transmission Media (Contd.)

ss
oc
ia
te
ID

Twisted Pair Cable

:3
9

54
7

Types of Cables

Coaxial Cable

2007, Cognizant Technology Solutions

Fiber Optic Cable

Confidential

30

Transmission Media (Contd.)


During data transmission, signals can be affected by:
Attenuation
Crosstalk

:3
9

54
7

Electromagnetic Interference (EMI)

ss
oc
ia
te
ID

Disturbances

Attenuation

Crosstalk

2007, Cognizant Technology Solutions

EMI

Confidential

31

Attenuation

:3
9

54
7

When a signal travels over cables, the


resistance of cable wire interferes
with signal transmission. Therefore,
the signal becomes weak and
distorted. This distortion of signal is
called attenuation.

ss
oc
ia
te
ID

To overcome attenuation, perform


the following actions:
Regenerate or amplify the signal
For digital signal, use REPEATER

For analog signal, use Amplifier

2007, Cognizant Technology Solutions

Confidential

32

EMI and Crosstalk


EMI
During transmission, signals can get corrupted due to electromagnetic waves
emitted by an adjacent cable. This phenomenon is called Electromagnetic
Interference.
This problem can be overcome by using fiberoptic cables.

54
7

Crosstalk

Crosstalk occurs when signals of one cable get mixed with signals of an adjacent
cable due to EMI.
Crosstalk can be overcome using Shielded Twisted Pair (STP) cables.

ss
oc
ia
te
ID

:3
9

2007, Cognizant Technology Solutions

Confidential

Twisted Pair Cable


The following are the features of a twisted pair cable:
Copper wire is used in twisted pair cable.
It is formed by two insulated copper wires that are twisted together.
Multiple pairs are combined within a common jacket.

54
7

The following are the types of twisted pair cable:


Unshielded: Set of twisted pairs within a simple plastic encasement (UTP)
Shielded: Set of twisted pairs wrapped in a foil shielding (STP)

ss
oc
ia
te
ID

:3
9

2007, Cognizant Technology Solutions

Confidential

Twisted Pair Cable (Contd.)


UTP

54
7

Advantages

ss
oc
ia
te
ID

:3
9

Relatively inexpensive
Easy to install and manage
Less Cost

Unsuitable for > 100 Mbps speed


High rate of attenuation
Sensitive to EMI

STP

Disadvantages

Advantages

Higher bandwidth available than UTP


Less sensitive to EMI than UTP

Disadvantages

More expensive
Harder to install
Unsuitable for more than 155 Mbps

2007, Cognizant Technology Solutions

Confidential

35

Coaxial Cable
The following are the features of a coaxial cable:
It is made of two conductors that share a common axis.
The center is a insulated stiff solid copper wire.
The center, in turn, is surrounded by a metallic foil as a shield from EMI.
The outer cover is usually made of nonconducting material, such as teflon,
plastic, or rubber.

ss
oc
ia
te
ID

:3
9

54
7

2007, Cognizant Technology Solutions

Confidential

Coaxial Cable (Contd.)

ss
oc
ia
te
ID

Thinnet

:3
9

54
7

Coaxial Cable

Diameter 0.25 inch


Transmit signals up to 185
meter without attenuation
Less cost

2007, Cognizant Technology Solutions

Thicknet
Diameter 0.5 inch
Transmit signals up to 500
meter without attenuation
More cost

Confidential

Coaxial Cable (Contd.)


Advantages:
Simple to install
Less sensitive to EMI than a twisted pair cable

54
7

Disadvantages:

Moderately high attenuation

:3
9

Cabling is hard to manage and reconfigure


Moderately susceptible to EMI

ss
oc
ia
te
ID

Generally not used for more than 10 MBPS

2007, Cognizant Technology Solutions

Confidential

Fiber-Optic Cable
The following are the features of a fiberoptic cable:
It is made of a light conducting glass or plastic core.
The core is surrounded by a glass called cladding.

54
7

The cladding is covered by a tough outer sheath.


The core provides the light path and the cladding is provided to reflect

ss
oc
ia
te
ID

:3
9

light back into the core.


The fiberoptic cable is available in single mode and multimode
configuration.

2007, Cognizant Technology Solutions

Confidential

Fiber Optic Cable (Contd.)


Advantages:
Supports very high bandwidth (multiple GBPS)

Disadvantages:

54
7

Immune to interference

Low attenuation

:3
9

Relatively expensive cable and hardware


Connections require high precision manufacturing and complex

ss
oc
ia
te
ID

installation
Relatively complex to configure and install

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Transmission Media: Comparison Chart

2007, Cognizant Technology Solutions

Confidential

Wireless Connectivity
Wireless media transmit and receive electromagnetic signals
without an electrical or optical conductor

ss
oc
ia
te
ID

:3
9

54
7

Various forms of electromagnetic waves are used to carry


signals.

2007, Cognizant Technology Solutions

Confidential

Wireless Connectivity (Contd.)


Radio Wave: Lies between 10KHz to 1GHz of the
electromagnetic spectrum

Advantages:

54
7

Stations can be stationery or mobile

Disadvantages:

:3
9

Easier to set up and establish

May require frequency licensing and approved equipment

ss
oc
ia
te
ID

Highly susceptible to external interference and jamming

Only low bandwidths are possible (<=10MBPS)

2007, Cognizant Technology Solutions

Confidential

Wireless Connectivity (Contd.)


Microwave: Microwave can exist in two forms:
Terrestrial: Uses directional parabolic antennas that require

unobstructed line of sight.

54
7

Advantage: Can be established in a more cost effective and easier way than
cable in inhospitable terrain or congested area.
Disadvantage: Complex installation and line of sight required.

:3
9

Satellite: Uses beamed line of sight between directional parabolic

antennas located on earth and geosynchronous orbiting satellite:

ss
oc
ia
te
ID

Advantage: Can cover extremely large distances.


Disadvantage: Extremely expensive setup, but enduser cost may not be
that high.

2007, Cognizant Technology Solutions

Confidential

Wireless Connectivity (Contd.)


Infrared System: The following are the features of an infrared
system:
Uses light emitting diode (LEDs) to exchange data. Signals may be

ss
oc
ia
te
ID

:3
9

54
7

picked up by line of sight receivers or reflection from walls and ceilings.


Susceptible to high intensity light and atmospheric conditions.
Easy to install, but signals can not penetrate opaque objects.

2007, Cognizant Technology Solutions

Confidential

Media Connectivity
Media Connectivity Hardware: The interfaces and devices
that are used to connect computing devices and transmission
media are called media connectivity hardware.

54
7

Media connectivity hardware can be classified as:


Network connectivity hardware: Connect individual devices to a

ss
oc
ia
te
ID

:3
9

single network. For example, connecting a computer or printer to the


LAN.
Internetwork connectivity hardware: Connect multiple independent
networks together. For example, two campus LANs or multiple cities.

2007, Cognizant Technology Solutions

Confidential

Media Connectivity (Contd.)


Network Connectivity Hardware: The following hardware devices are

required to connect each computer to a media segment:

Modem

Interface Card

ss
oc
ia
te
ID

Connectors

:3
9

54
7

Network Connectivity Hardware

The following hardware devices are required to connect multiple segments of


transmission media for one large network:
Internetwork Connectivity Hardware

Hub

Switch
2007, Cognizant Technology Solutions

Router

Multiplexer
Confidential

Media Connectivity (Contd.)

ss
oc
ia
te
ID

:3
9

54
7

Transmission Media Connectors: Every medium has one or


more physical connectors to which various devices can be
attached.

SC/ST or MT- RJ for


Fiber Optic Cable

RJ-45 - UTP Cable

2007, Cognizant Technology Solutions

BNC - Coaxial Cable

Confidential

Media Connectivity (Contd.)


Network Interface Boards (NIB): NIBs are installed in a computer

ss
oc
ia
te
ID

:3
9

54
7

(typically) to connect the computer to the transmission media through the


transmission media connector.

Network interface card (NIC)

Connection between NIC and transmission


media (UTP cable)

2007, Cognizant Technology Solutions

Confidential

Media Connectivity (Contd.)

ss
oc
ia
te
ID

:3
9

54
7

Modems: Modems convert digital signals of a computer to


analog signals for use with telephone lines and viceversa.

2007, Cognizant Technology Solutions

Confidential

Media Connectivity (Contd.)


Repeaters:
Repeaters are analog devices connecting two cable segments. These are

54
7

amplifiers that do not understand frames, packets, or headers, but they


only understand VOLTs. Classic Ethernet are designed to allow four
repeaters to extend cable length up to 2500 meters.

Gateway:

:3
9

Gateway is a combination of hardware and software that links two

ss
oc
ia
te
ID

different types of networks. The device may be a specialized hardware


(such as a router), or may be a generalpurpose computer system
configured to act as a gateway.

2007, Cognizant Technology Solutions

Confidential

Media Connectivity (Contd.)


Hub:
Is a piece of network equipment that connects computers together
Passes the traffic to the network regardless of the intended destination

54
7

Generates a lot of unnecessary traffic into the network

ss
oc
ia
te
ID

:3
9

May be used for very small network

2007, Cognizant Technology Solutions

Confidential

Media Connectivity (Contd.)


Switch:
Is a piece of network equipment that connects computers together
Passes traffic based on address information on each packet

54
7

Identifies which devices are connected to its ports and forwards packets

ss
oc
ia
te
ID

:3
9

to appropriate port only


Allows simultaneous communications, improving bandwidth
Reduces the amount of unnecessary traffic
Is normally used in large network

2007, Cognizant Technology Solutions

Confidential

Media Connectivity (Contd.)


Router:
Is a network equipment that connects two or more separate networks
Passes traffic based on distance or cost

ss
oc
ia
te
ID

:3
9

through the best path


Is used for large networks

54
7

Maintains a table of all available routes and then forwards packets

2007, Cognizant Technology Solutions

Confidential

Transmission Media: Media Connectivity


Multiplexers:
Combine two or more separate signals on a single transmission media

ss
oc
ia
te
ID

:3
9

54
7

segment.
Are used to efficiently utilize the entire bandwidth of a transmission
media, which provides more capacity than what a single signal can
carry.

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

56

Test Your Understanding


1. List the types of cables used for data transmission.

2. State the differences between Thinnet, Thicknet, UTP, and


Fiber optics.

ss
oc
ia
te
ID

:3
9

54
7

3. What is the use of a Hub and Switch in a LAN ?

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

58

Network Topology

ss
oc
ia
te
ID

:3
9

54
7

It is the layout or actual arrangement of computers or other


network components on a computer network.

2007, Cognizant Technology Solutions

Confidential

Bus Topology
It is a linear topology where computers are connected to each other

through a common cable called Trunk Line.


Advantages:

It is simple and easy to setup


Failure of one computer does not effect the network
Requires the least amount of cable to connect computers
Easy to extend the network

:3
9

Disadvantages:

54
7

Inefficient under heavy network traffic


Large network is not feasible
Network fails when Trunk Line is damaged
Difficult to troubleshoot a bus network

ss
oc
ia
te
ID

2007, Cognizant Technology Solutions

Confidential

Star Topology
In a star topology, computers are connected through a central device called

a hub or a switch.
Advantages:
It is easy to add more computers to extend the network.
It is easy to troubleshoot the network problem.
Failure of one computer does not affect the network.

:3
9

Disadvantages:

54
7

Network fails when central device fails


Requires more cabling

ss
oc
ia
te
ID

2007, Cognizant Technology Solutions

Confidential

Ring Topology

:3
9

54
7

In a ring topology:
Computers are connected in a circle.
Data transmitted moves in a single direction.
A computer sends data along with a packet called Token.
Destination computer sends a receive note after receiving the token from source
computer.

ss
oc
ia
te
ID

Advantages:
Highly efficient in case of heavy network traffic
It allows equal access to all users

Disadvantages:
Adding or removing a computer disrupts the network
Troubleshooting is very difficult
When a computer fails, the network fails
2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Network Topology: Comparison Chart

2007, Cognizant Technology Solutions

Confidential

Others Topologies
Star - Bus Topology: The hubs of more than one star network are

ss
oc
ia
te
ID

:3
9

54
7

connected in a linear manner. Failure of a hub affects the data transmission


for computers connected to that hub.
Star - Ring Topology: A physical star connects two or more logical ring
networks to a central hub.
Physical Mesh Topology: All computers are directly connected to each
other. The failure of one computer does not affect network.

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

65

Test Your Understanding


1. List the types of network topologies.

ss
oc
ia
te
ID

:3
9

54
7

2. What is the advantage of using Star Network topology?

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

67

Network Protocols: Rules


All networks require rules so that entities can communicate
with each other.

Need for rules:

54
7

How is the transmission media physically set up?


How are bits transmitted over the network?

:3
9

How do network entities know when to transmit data?


How do network entities know how much data to be transmitted?

ss
oc
ia
te
ID

How a message is passed to intended recipients?


How do network entities contact each other?
How are network entities guaranteed that a message has been received

correctly?

2007, Cognizant Technology Solutions

Confidential

Network Models
The following are the facts regarding network models:
Because the networking industry grew in response to different needs,

ss
oc
ia
te
ID

:3
9

54
7

many different organizations created different rules to address these


needs. These rules are called protocols.
The differences between the protocols from different vendors creates
interoperability issues. This led to the attempt to create standards and
models to generalize the topics covered by networking protocols.
A model is a pattern that organizes general concepts as an easily
understood description.
Two popular network models serve as functional guidelines for dividing
the communication tasks:
Open System Interconnect (OSI)
Department of Defense (DOD)

2007, Cognizant Technology Solutions

Confidential

OSI Model
The OSI reference model consists of the following seven
layers:
Application

54
7

Presentation
Session
Network

ss
oc
ia
te
ID

Data Link

:3
9

Transport

Physical

2007, Cognizant Technology Solutions

Confidential

OSI Model (Contd.)


The layers are numbered starting with physical layer as layer
1 and each layer represents a group of specific tasks.

ss
oc
ia
te
ID

:3
9

54
7

Implementations that correspond with each layer


communicate with peer layers in other computers, but the
communication must happen by sending messages through
the lower layers operating in their own stack.

2007, Cognizant Technology Solutions

Confidential

Physical Layer
The physical layer coordinates the rules for transmitting bits.
This layer defines:

Physical network structures

54
7

Mechanical and electrical specifications for using the transmission

:3
9

medium
Bit transmission encoding and timing rules

ss
oc
ia
te
ID

The following network connectivity hardware are normally


associated with the OSI physical layer:
Hubs or switches

Transmission media connectors

Modems

2007, Cognizant Technology Solutions

Confidential

Data Link Layer


The data link layer describes methods for moving information between

multiple devices within the same logical network based on physical device
addressing.
The basic purposes for data link layer protocol implementations are :
Organizing physical layer bits into logical groups of information called frames
Detecting errors
Controlling data flow
Identifying computers on the network

:3
9

54
7

ss
oc
ia
te
ID

The network connectivity hardware associated with data link layer are:
Switches
Network Interface Boards

The data link layer protocols are:


HDLC
Frame Relay

2007, Cognizant Technology Solutions

Confidential

Network Layer
The network layer describes methods for moving information
between multiple independent networks based on network
layer addressing.

54
7

This layer defines:

Logical network structures and addressing

:3
9

Route discovery and selection

Network layer flow control and error control

ss
oc
ia
te
ID

The network connectivity hardware associated with network


layer is a router.
The network layer protocols are:
IP

IPX

2007, Cognizant Technology Solutions

Confidential

Transport Layer
The transport layer compensates for lack of reliable, or
connectionoriented connection services in the lower layers.

54
7

The layer also supports connectionless services. This layer


defines:
Connection and transaction identifiers
Connection services

:3
9

Segment development

ss
oc
ia
te
ID

The transport layer protocols:


TCP
SPX

UDP

2007, Cognizant Technology Solutions

Confidential

Session Layer

54
7

The session layer facilitates communication between service


requestors and provider. This layer establishes, maintains,
synchronizes, and manages dialog between communicating
entities.
Dialog control

:3
9

The layer defines:

ss
oc
ia
te
ID

Session administration

2007, Cognizant Technology Solutions

Confidential

Presentation Layer

54
7

The presentation layer transforms data into a mutually


agreedupon format that can be understood by each network
application and the computers on which the applications run.
This layer defines:
Encryption

:3
9

Translation

The presentation layer protocols are:

ss
oc
ia
te
ID

ASCII, EBCDIC

JPEG, MPEG, MIDI

2007, Cognizant Technology Solutions

Confidential

Application Layer
The application layer includes all the functions specific to each
network service. This layer provides file, print, message,
application, and database services.
Network services

:3
9

Service advertisement

54
7

This layer defines:

The application layer protocols are:

ss
oc
ia
te
ID

Telnet ( Port 23)


SMTP ( Port 25)

SNMP ( Port 69)


HTTP ( Port 80)

FTP (Port 21)

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Rule, Model and Protocol Relationships

2007, Cognizant Technology Solutions

Confidential

DoD Model and TCP/IP


The Department of Defence (DoD) reference model consists of
four layers:
Application: Used for resource sharing and remote access

54
7

Host-to-Host: Breaks data into datagrams and receive datagrams


Internet: Finds the route to destination
Network Access: Access

ss
oc
ia
te
ID

:3
9

communication network

2007, Cognizant Technology Solutions

Confidential

TCP/IP

File transfer
Remote login
Electronic mail
Remote printing
Remote executions
Name and terminal servers
Network file systems

ss
oc
ia
te
ID

:3
9

54
7

Overview of TCP/IP:
It provides the ability to facilitate communication and share resources
between varying networks and platforms.
TCP and IP are two separate protocols.
TCP is connectionoriented and IP is connectionless.
IP is a routable protocol, means two nodes communicating through IP do
not need to be physically on the same wire.
The following are the functions of TCP/IP:

2007, Cognizant Technology Solutions

Confidential

TCP/IP Addressing

ss
oc
ia
te
ID

:3
9

54
7

The following are the facts about TCP/IP addressing:


The central concept of networking is addressing.
Addresses have a defined format and all network devices must have a
unique identifier.
IP address is four byte (32 bit) and quantities in dotted decimal notation.
For example: 192.168.50.36
Each 8 bit piece is named as octet and the value must be between 0 and
255.
Understanding binary form of an IP address is important. For example:
192.168.50.36 =>11000000 10101000 00110010 00100100
Each address has two components:
Network: It identifies the nodes on the same physical network.
Host: It identifies workstations, servers, or other TCP/IP hosts within a
network.

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Introduction to TCP/IP Addressing

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

IP Addressing

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

IP Address Classes

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

IP Address Bit Patterns

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Recognizing Classes in IP Addresses

2007, Cognizant Technology Solutions

Confidential

Private Addressing Space


A small part of the overall address space has been classified as private

address space.
The following are the features of private address space:

54
7

:3
9

It is also known as RFC 1597 or RFC 1918 address space


Private address space is intended for use by anyone, but on private networks.
Internal networks are shielded from Internetbased attacks.
Computers with private addresses cannot directly communicate with the
Internet. This necessitates the use of a proxy to prevent unauthorized access.
The table below specifies the standard number of Networks and Hosts available
for Class A, Class B, and Class C

ss
oc
ia
te
ID

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Networks and Hosts

2007, Cognizant Technology Solutions

Confidential

Addressing Guidelines
The following are the network addressing guidelines:
The network ID must be unique
The number, 127, is reserved for diagnostic loopback function

54
7

The number, 255, is reserved for broadcast addressing


The address can be set to 0 (represents local network)

:3
9

The following are the host addressing guidelines:


The host ID must be unique in the network ID

ss
oc
ia
te
ID

The address can not be 255, because it is a broadcast address

The address can not be 0, because it means a network

2007, Cognizant Technology Solutions

Confidential

Introduction to DHCP and IPV6


DHCP:
The Dynamic Host Configuration Protocol (DHCP) provides Internet hosts with
configuration parameters. DHCP is an extension of BOOTP. DHCP consists of
two components: a protocol for delivering hostspecific configuration
parameters from a DHCP server to a host and a mechanism for allocation of
network addresses to hosts.

54
7

IPv6:

:3
9

IP version 6 (IPv6) is a new version of the Internet Protocol based on IPv4. IPv4
and IPv6 are demultiplexed at the media layer. For example, IPv6 packets are
carried over Ethernet with the content type 86DD (hexadecimal) instead of
IPv4s 0800.
IPv6 increases the IP address size from 32 bits to 128 bits, to support more
levels of addressing hierarchy, a much greater number of addressable nodes
and simpler autoconfiguration of addresses. Scalability of multicast addresses
is introduced. A new type of address called an anycast address is also defined, to
send a packet to any one of a group of nodes.

ss
oc
ia
te
ID

2007, Cognizant Technology Solutions

Confidential

Introduction to DHCP and IPV6


(Contd.)
Improved support for extensions and options:
IPv6 options are placed in separate headers that are located between

:3
9

54
7

the IPv6 header and the transport layer header. Changes in the way IP
header options are encoded allow more efficient forwarding, less
stringent limits on the length of options, and greater flexibility for
introducing new options in the future. The extension headers are: Hop
byHop Option, Routing (Type 0), Fragment, Destination Option,
Authentication, Encapsulation Payload.

ss
oc
ia
te
ID

Flow labeling capability:

A new capability has been added to enable the labeling of packets

belonging to particular traffic flows for which the sender requests


special handling, such as nondefault Quality of Service or realtime
service.

2007, Cognizant Technology Solutions

Confidential

UDP
User Datagram Protocol (UDP):
Provides a simple, but unreliable message service for transaction

ss
oc
ia
te
ID

:3
9

54
7

oriented services. Each UDP header carries both a source port identifier
and destination port identifier, allowing highlevel protocols to target
specific applications and services among hosts.

2007, Cognizant Technology Solutions

Confidential

Wireless Network Standards


The 802.11 family explained:
Home and business networkers looking to buy Wireless Local Area Network
(WLAN) gear face an array of choices. Many products conform to the 802.11a,
802.11b, 802.11g, or 802.11n wireless standards collectively known as WiFi
technologies. Additionally, Bluetooth, and various other non WiFi technologies
also exist, each also designed for specific networking applications.
This article describes the WiFi and related technologies, comparing and
contrasting them to help you make educated network building decisions.

802.11:

ss
oc
ia
te
ID

In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the
first WLAN standard. They called it 802.11 after the name of the group formed
to oversee its development. Unfortunately, 802.11 only supported a maximum
network bandwidth of 2 Mbps too slow for most applications. For this reason,
ordinary 802.11 wireless products are no longer manufactured.

:3
9

54
7

2007, Cognizant Technology Solutions

Confidential

Wireless Network Standards (Contd)


802.11b:
IEEE expanded on the original 802.11 standard in July 1999, creating

ss
oc
ia
te
ID

:3
9

54
7

the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps,


comparable to traditional Ethernet.
802.11b uses the same unregulated radio signaling frequency (2.4 GHz)
as the original 802.11 standard. Vendors often prefer using these
frequencies to lower their production costs. Being unregulated, 802.11b
gear can incur interference from microwave ovens, cordless phones,
and other appliances using the same 2.4 GHz range. However, by
installing 802.11b gear a reasonable distance from other appliances,
interference can easily be avoided.
Pros of 802.11b: Lowest cost; signal range is good and not easily
obstructed.
Cons of 802.11b: Slowest maximum speed; home appliances may
interfere on the unregulated frequency band.
2007, Cognizant Technology Solutions

Confidential

Wireless Network Standards (Contd)


802.11a:
While 802.11b was in development, IEEE created a second extension to

ss
oc
ia
te
ID

:3
9

54
7

the original 802.11 standard called 802.11a. Because 802.11b gained in


popularity much faster than did 802.11a, some folks believe that
802.11a was created after 802.11b. In fact, 802.11a was created at the
same time. Due to its higher cost, 802.11a is usually found on business
networks whereas 802.11b better serves the home market.
802.11a supports bandwidth up to 54 Mbps and signals in a regulated
frequency spectrum around 5 GHz. This higher frequency compared to
802.11b shortens the range of 802.11a networks. The higher frequency
also means 802.11a signals have more difficulty penetrating walls and
other obstructions.

2007, Cognizant Technology Solutions

Confidential

Wireless Network Standards (Contd)


Because 802.11a and 802.11b utilize different frequencies, the two technologies
are incompatible with each other. Some vendors offer hybrid 802.11a/b
network gear, but these products merely implement the two standards side by
side (each connected devices must use one or the other).
Pros of 802.11a: Fast maximum speed; regulated frequencies prevent signal
interference from other devices
Cons of 802.11a: Highest cost; shorter range signal that is more easily
obstructed

802.11g:

ss
oc
ia
te
ID

In 2002 and 2003, WLAN products supporting a newer standard called 802.11g
emerged on the market. 802.11g attempts to combine the best of both 802.11a
and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4
Ghz frequency for greater range. 802.11g is backwards compatible with
802.11b, meaning that 802.11g access points will work with 802.11b wireless
network adapters and vice versa.

:3
9

54
7

2007, Cognizant Technology Solutions

Confidential

Wireless Network Standards (Contd)


Pros of 802.11g: Fast maximum speed; signal range is good and not easily
obstructed.
Cons of 802.11g: Costs more than 802.11b; appliances may interfere on the
unregulated signal frequency.

802.11n:

54
7

The newest IEEE standard in the WiFi category is 802.11n. It was designed to
improve on 802.11g in the amount of bandwidth supported by utilizing multiple
wireless signals and antennas (called MIMO technology) instead of one.
When this standard is finalized, 802.11n connections should support data rates
of over 100 Mbps. 802.11n also offers somewhat better range over earlier WiFi
standards due to its increased signal intensity. 802.11n equipment will be
backward compatible with 802.11g gear.
Pros of 802.11n fastest maximum speed and best signal range; more resistant
to signal interference from outside sources.
Cons of 802.11n standard is not yet finalized; costs more than 802.11g; the use
of multiple signals may greatly interfere with nearby 802.11b/g based
networks.

ss
oc
ia
te
ID

:3
9

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

99

Test Your Understanding


1. Name the seven layers of the OSI model.
2. List the devices working in Layer1, Layer 2, and Layer 3.

3. What are the TCP Ports used for Telnet, FTP, and SMTP?

54
7

4. List the range of private IP address for Class A, Class B, and


Class C.

ss
oc
ia
te
ID

:3
9

5. Which of the following subnet masks lets a Class B network


allow subnets to have up to 150 hosts and up to 164 subnets?
255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.192.0

a)

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

101

ss
oc
ia
te
ID

:3
9

54
7

Layer 2 WAN Technologies

2007, Cognizant Technology Solutions

Confidential

Layer 2 WAN Technologies (Contd.)


Leased lines:
A leased line is also known as a pointtopoint or dedicated connection.
It is a single, preestablished WAN communication between both the ends of the
customers.
It is expensive.

54
7

Circuit switching:

It is a switching system in which a dedicated circuit path must exist between


sender and receiver for the duration of the call.
Circuit switching is used by the telephony company network when providing
basic telephone service or Integrated Services Digital Network (ISDN).

ss
oc
ia
te
ID

:3
9

Packet switching:

Transfer of data between two points over a shared medium


Sends packets across the network using the best path
Cost is based on usage

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

WAN Encapsulation Protocols

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Physical Layer: WAN Protocols

2007, Cognizant Technology Solutions

Confidential

54
7

Data Link Layer: WAN Protocols

SDLC: Synchronous Data Link Control

:3
9

HDLC: HighLevel Data Link Control

ss
oc
ia
te
ID

LAPB: Link Access Procedure, Balanced


Frame Relay: Simplified version of HDLC framing
PPP: PointtoPoint Protocol
X.25: Packet Level Protocol (PLP)

ISDN: Integrated Services Digital Network (datalink signaling)

2007, Cognizant Technology Solutions

Confidential

Data Link Layer: WAN Protocols


(Contd.)
HighLevel Data Link Control (HDLC):
HDLC is the default encapsulation type on pointtopoint, dedicated links.
It is Cisco proprietary.

PointtoPoint Protocol (PPP):

It provides routertorouter and hosttonetwork connections over synchronous


and asynchronous circuits
It was designed to work with several network layer protocols, such as IP and
IPX.
It also has built in security mechanisms such as PAP and CHAP.

ss
oc
ia
te
ID

:3
9

54
7

Serial Line Internet Protocol (SLIP):


It is a standard protocol for pointtopoint serial connections
It is predecessor to PPP.

Synchronous data link control (SDLC): Provides routertohost

(mainframe server) connections over synchronous circuits.


2007, Cognizant Technology Solutions

Confidential

Data Link Layer: WAN Protocols


(Contd.)
X.25/Link Access Procedure, Balanced (LAPB) ITUT:
It is a standard that defines how connections between Data Termination
Equipment (DTE) and Data Channel Equipment (DCE) are maintained for
remote terminal access.
It is a predecessor to frame relay.

54
7

Frame Relay

It is a industry standard, switched data link layer protocol that handles multiple
virtual circuits.
It eliminates some of the timeconsuming processes (such as error correction
and flow control) that were employed in X.25.

ss
oc
ia
te
ID

:3
9

Asynchronous Transfer Mode (ATM)


It is the international standard for cell relay in which multiple service types
(such as voice, video, or data) are conveyed in fixedlength (53byte) cells.
Fixedlength cells allow processing to occur in hardware, thereby reducing
transit delays.

2007, Cognizant Technology Solutions

Confidential

PPP Authentication Protocols


Password Authentication Protocol: PAP
It is a twoway handshake protocol.
Passwords are sent across the link in clear text.

54
7

Challenge Handshake Authentication Protocol: CHAP


It is a threeway handshake protocol.

:3
9

The local router sends a challenge message and the remote node

ss
oc
ia
te
ID

responds with a oneway hash function value (typically MD5). If the


value matches with its own, then authentication is acknowledged.

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

110

Test Your Understanding


1. Provide examples for Packet Switched and Circuit Switched
networks.

ss
oc
ia
te
ID

:3
9

54
7

2. State the differences between CHAP and PAP.

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

112

What is a Firewall?

ss
oc
ia
te
ID

:3
9

54
7

A firewall is a system or group of systems that manages access


between two networks.

2007, Cognizant Technology Solutions

Confidential

Firewall Operations

ss
oc
ia
te
ID

:3
9

54
7

Firewall operations are based on one of the following technologies:


Packet filtering: Limits information into a network, based on the static
packet header information.
Proxy server: Requests connections between a client on the inside of the
firewall and the Internet.
Stateful packet filtering: Combines the best of packet filtering and proxy
server technologies. It limits information into a network, based not only on
the source and destination address, but also on the packet data content.

2007, Cognizant Technology Solutions

Confidential

Stateful Inspection Firewall


Stateful Inspection Firewall:
Stateful Inspection, invented by Check Point Software Technologies, has

ss
oc
ia
te
ID

:3
9

54
7

emerged as the industry standard for network security solutions.


With stateful inspection, packets are intercepted at the network layer
for best performance (as in packet filters). However, data derived from
all communication layers is accessed and analyzed for improved
security (compared to layers 47 in applicationlayer gateways).
Stateful inspection then introduces a higher level of security by
incorporating communication and applicationderived state and context
information, which is stored and updated dynamically.

2007, Cognizant Technology Solutions

Confidential

Virtual Private Network (VPN)


VPN is a logical private network that operates over a shared or
public network infrastructure.

Virtual Private Network:

54
7

Use encryption and other security mechanisms to ensure that only

:3
9

authorized users can access the network, and that the data cannot be
intercepted
Is cost effective

ss
oc
ia
te
ID

A user can connect to a VPN by:


Using dedicated lines to local Internet service provider (ISP
Using dialup to local ISP

Using enterprise solution

2007, Cognizant Technology Solutions

Confidential

Virtual Private Network (Contd.)


Basic VPN Requirements:
User authentication
Address management

54
7

Data encryption

Key management for servers and client

:3
9

Protocols involved in VPN are:

PointtoPoint Tunneling Protocol (PPTP)

ss
oc
ia
te
ID

Layer Two Tunneling Protocol (L2TP)

IP Security Tunnel Mode (IPSEC)

2007, Cognizant Technology Solutions

Confidential

Virtual Private Network (Contd.)


Advantages:
VPN transfers information by encapsulating information into IP packets

Disadvantages:

:3
9

54
7

and sending to Internet.


Privacy is provided by tunneling/encryption.
Encryption scrambles the data.
No access is provided to unauthorized users.

ss
oc
ia
te
ID

ISP may have difficulty to determine the traffic path.


Traffic congestion is possible in Internet.
IP is dynamic and connectionless.

There is a challenge of balancing performance.

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Virtual Private Network (Contd.)

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Cognizant Data Network

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Cognizant Voice Network

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Cognizant Mailing Network

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

123

Test Your Understanding


1. What is the use of firewall in a corporate network?

ss
oc
ia
te
ID

:3
9

54
7

2. What are the advantages of a VPN?

2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

125

Networking Basics: Troubleshooting


The Network Status icon may show an "Acquiring network
address" message after an address is already acquired in
Windows XP Starter Edition:

54
7

To work around this problem, manually determine the network status.

:3
9

For example, try to access a network resource. Or, use the IPConfig tool
to verify the configuration. To use the IPConfig tool to verify the TCP/IP
configuration on the computer that is experiencing the problem, click
Start, click Run, and then type cmd. Then, use one of the follow methods:

ss
oc
ia
te
ID

Type ipconfig, and then press ENTER to view the basic network
configuration.
Type ipconfig /all, and then press ENTER to view a detailed configuration
report for all interfaces. This report includes any remote access adapters.

2007, Cognizant Technology Solutions

Confidential

Networking Basics: Troubleshooting


(Contd.)

Review the IPConfig output to determine the computer network configuration.


Use the following information to interpret the IPConfig output:

}
}

ss
oc
ia
te
ID

TCP/IP is configured for automatic configuration.


No Dynamic Host Configuration Protocol (DHCP) server was found.
No alternative configuration is specified.
This configuration has no default gateway for the interface.

:3
9

54
7

If a computer is manually configured by using an IP address that duplicates an


existing IP address that is already detected, the subnet mask appears as 0.0.0.0.
If the local IP address is 169.254.y.z and if the subnet mask is 255.255.0.0, the IP
address was assigned by the Automatic Private IP Addressing (APIPA) feature of
Windows XP Professional. This assignment indicates the following:

If the local IP address is returned as 0.0.0.0, the DHCP Media Sensing feature
override is turned on. The feature override is turned on because the network
adapter detected the lack of connection to a network or because TCP/IP detected an
IP address that duplicates a manually configured IP address.

2007, Cognizant Technology Solutions

Confidential

127

Networking Basics: Troubleshooting


(Contd.)
Possible issues and resolutions for slow connection speeds in
Windows XP:
Poor Phone Line Quality:

ss
oc
ia
te
ID

:3
9

54
7

Static on the line, occasional severe disruption while you are using the
phone line, or transmission of portions of someone else's phone
conversation may point to this issue. To resolve this behavior, call your
local telephone company to have them check the phone lines.
NOTE: Most telephone companies charge for services they perform inside a
home, but not for work on connections outside the home. Ask the
telephone company for information about service charges.

Internet Service Provider (ISP) Changes:

You can investigate possible ISP changes by finding out whether your ISP is
now part of another company or is reporting slow connections because of
network issues. To resolve such issues, you may need to switch to a more
reliable ISP.
2007, Cognizant Technology Solutions

Confidential

Networking Basics: Troubleshooting


(Contd.)

Multiple AnalogtoDigital Converters Between Computer and ISP:

Incorrect, Corrupted, or Multiple Modem Drivers:

54
7

Inability to connect through your phone line at any rate faster than 28.8 kilobits per
second (Kbps) may suggest this cause. To resolve this issue, call the telephone
company to find out about connection speeds in your area and how you can improve
them.

Environmental Interference:

ss
oc
ia
te
ID

:3
9

Frequent disconnections characterize this issue. To resolve this behavior, start your
computer in Safe mode and check for multiple modem drivers in the modem, sound,
video, and game controllers. Verify that the modem driver is correct. If it is not,
remove the current modem driver and install the correct one.

Modem sounds that come through other devices, coinciding with a slowdown of the
connection, may point to environmental interference. For example, modem sound
may come through computer speakers, and interference may come from some other
electronic item in the room. To resolve this behavior, separate the telephone lines
from other wires. Also, try testing the computer's ability to connect in a different
room, using a different telephone jack.

2007, Cognizant Technology Solutions

Confidential

Networking Basics: Troubleshooting


(Contd.)
Background Programs:

Normal ISP Operations:

54
7

The computer may slow down while you are running programs in the
background. To resolve this behavior, use the Msconfig utility to disable the
programs in the Startup folder. Restart the computer, and then test the
connection.

ss
oc
ia
te
ID

:3
9

Slow speeds can occur during peak hours for Internet use. If the ISP is
putting many connections into a small combined connection, normal
customer demand can overload the capacity of the combined connection.
To resolve this behavior, you may need to switch to a more reliable ISP.

2007, Cognizant Technology Solutions

Confidential

130

Networking Basics: Troubleshooting


(Contd.)
How can I reinstall TCP/IP on Windows XP?
When viewing the list of components for a network interface, you may notice
that the Uninstall button is disabled when Internet Protocol (TCP/IP) is
selected. In Windows XP, the TCP/IP stack is considered a core component of
the operating system; therefore, it is not possible to uninstall TCP/IP in
Windows XP.
In extreme cases, reinstalling the Internet Protocol stack may be the most
appropriate solution. With the NetShell utility, you can now reset the TCP/IP
stack back to a pristine state, to the same state as when the operating system
was installed.
The NetShell utility (netsh) is a commandline scripting interface for the
configuring and monitoring of Windows XP networking. This tool provides an
interactive network shell interface to the user.
In Windows XP, a reset command is available in the IP context of the NetShell
utility. When this command is executed, it rewrites pertinent registry keys that
are used by the Internet Protocol (TCP/IP) stack to achieve the same result as
the removal and the reinstallation of the protocol.

ss
oc
ia
te
ID

:3
9

54
7

2007, Cognizant Technology Solutions

Confidential

Networking Basics: Troubleshooting


(Contd.)

ss
oc
ia
te
ID

:3
9

54
7

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\P
arameters\
and
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCP\
Parameters\
Command Usage: netsh int ip reset [ log_file_name]
To successfully execute the command, you must specify a log file name
where actions taken by netsh will be recorded. For example, typing
either of the examples that are listed in the "Command Samples" section
later in this article at a command prompt would reset the TCP/IP stack
on a system and record the actions that were taken in the log file,
Resetlog.txt. The first sample creates the log file in the current directory,
while the second sample demonstrates the use of a path where the log
will be created. In either case, where the specified log file already exists,
the new log will be appended to the end of the existing file.
2007, Cognizant Technology Solutions

Confidential

132

Networking Basics: Troubleshooting


(Contd.)
How to configure a connection to a Virtual Private Network (VPN) in

Windows XP?
To set up a connection to a VPN, follow these steps:

ss
oc
ia
te
ID

:3
9

54
7

1. On the computer that is running Windows XP, confirm that the connection to the
Internet is correctly configured.
2. Click Start, and then click Control Panel.
3. In Control Panel, doubleclick Network Connections.
4. Click Create a new connection.
5. In the Network Connection Wizard, click Next.
6. Click Connect to the network at my workplace, and then click Next.
7. Click Virtual Private Network connection, and then click Next.
8. If you are prompted to, do one of the following:
}

If you use a dialup connection to connect to the Internet, click Automatically dial this
initial connection, and then click your dialup Internet connection from the list.
If you use a fulltime connection such as a cable modem, click Do not dial the initial
connection.

2007, Cognizant Technology Solutions

Confidential

Networking Basics: Troubleshooting


(Contd.)

ss
oc
ia
te
ID

:3
9

54
7

9. Click Next.
10. Type the name of your company or type a descriptive name for the connection,
and then click Next.
11. Type the host name or the Internet Protocol (IP) address of the computer that you
want to connect to, and then click Next.
12. Click Anyone's use if you want the connection to be available to anyone who logs
on to the computer, or click My use only to make it available only when you log on
to the computer, and then click Next.
13. Click to select the Add a shortcut to this connection to my desktop check box if
you want to create a shortcut on the desktop, and then click Finish.
14. If you are prompted to connect, click No.
15. In the Network Connections window, rightclick the new connection.
16. Click Properties, and then configure more options for the connection:
}

If you are connecting to a domain, click the Options tab, and then click to select the
Include Windows logon domain check box to specify whether to request Windows logon
domain information before you try to connect.
If you want the computer to redial the connection if the line is dropped, click the Options
tab, and then click to select the Redial if line is dropped check box.
2007, Cognizant Technology Solutions

Confidential

134

Networking Basics: Troubleshooting


(Contd.)

To use the connection, follow these steps:


1. Use one of the following methods:
}

Click Start, point to Connect To, and then click the new connection.
If you added a connection shortcut to the desktop, doubleclick the shortcut on the
desktop.

ss
oc
ia
te
ID

:3
9

54
7

2. If you are not currently connected to the Internet, Windows offers to connect to the
Internet.
3. After your computer connects to the Internet, the VPN server prompts you for your
user name and password. Type your user name and password, and then click
Connect. Your network resources should be available to you in just like they are
when you connect directly to the network.
4. To disconnect from the VPN, rightclick the icon for the connection, and then click
Disconnect.
Note: If you cannot connect to shared resources on the remote network by
computer, you can use the remote computer's IP address to connect by using UNC
(\\<IP_Address>\Share_name). Edit the hosts file in the
Windows\System32\Drivers\ folder, and add an entry to map the remote server's
name to its IP address. Then use the computer name in a UNC connection
(\\Server_name\Share_name).
2007, Cognizant Technology Solutions

Confidential

ss
oc
ia
te
ID

:3
9

54
7

Questions from participants

2007, Cognizant Technology Solutions

Confidential

136

Networking Basics: Summary


Computer networking provides the communication tools that
allow computers to share information and abilities.

Networks can be of the following forms: LAN, MAN, and WAN.

54
7

The common network services offered by servers are:


Print services
Message services

ss
oc
ia
te
ID

Application services

:3
9

File services

Database services

2007, Cognizant Technology Solutions

Confidential

Networking Basics: Summary (Contd.)


Cable media is typically used in LANs.
Wireless media is typically used in WANs.

54
7

During data transmission signals can be affected by:


attenuation, cross talk, and EMI.

:3
9

Types of network cables are twisted pair, coaxial, and fiber


optic cables.

ss
oc
ia
te
ID

Wireless connectivity includes radiowave, microwave, and


infrared.
Topology is the layout or actual arrangement of computers or
other network components on a computer network.

The different topologies are bus, star, ring, starbus, starring,


and mesh.
2007, Cognizant Technology Solutions

Confidential

Networking Basics: Summary (Contd.)


Protocols are rules that facilitate entities to communicate with
each other.

54
7

Two popular network models serve as functional guidelines


for dividing up communication tasks:
OSI (Open System Interconnect)

:3
9

DoD (Department of Defense)

ss
oc
ia
te
ID

TCP/IP provides the ability to facilitate communication and


share resources between varying networks and platforms.
TCP and IP are two separate protocols.
TCP is connectionoriented and IP is connectionless.

IP address is four byte (32 bit) and quantities in dotted


decimal notation.
2007, Cognizant Technology Solutions

Confidential

Networking Basics: Summary (Contd.)


Leased lines are dedicated circuits.

Circuitswitched connections use analog modems or ISDN for


dialup connections.

:3
9

54
7

Packetswitched services, such as ATM, frame relay, and X.25,


are used when you need to connect when you need to connect
a router to multiple destinations, but router only has a single
interface.

ss
oc
ia
te
ID

Each WAN connection uses an encapsulation protocol to


encapsulate traffic while it is crossing the WAN link.
PPP encapsulates networklayer protocol information over
pointtopoint links.

PPP encapsulation is of two types, PAP and CHAP.


2007, Cognizant Technology Solutions

Confidential

Networking Basics: Summary (Contd.)


Firewalls are used to protect confidential information from
those who do not explicitly need to access it.

54
7

Firewall protects our network from intrusions from the


Internet
Firewall.

ss
oc
ia
te
ID

:3
9

VPN is a logical private network that operates over a shared or


public network infrastructure.

2007, Cognizant Technology Solutions

Confidential

Networking Basics: Source


Book:
3Tier Server/Client at Work, Revised Edition Jeri Edwards
Client/Server Computing for Technical Professionals: Concepts and Solutions Johnson M.

54
7

URL:

:3
9

Hart, Barry Rosenberg


Client/Server Computing for Dummies by Doug Lowe, David Helda
Datacommunication by Tanen Baun
Basics of Networking by Cisco Press
IP addressing by Cisco Press

ss
oc
ia
te
ID

www.readingcollege.ac.uk/netgcrs/ courses/NTwkingTech/CSERV/01.htm
www.elearners.com/course/35259.htm
www.cisco.com

www.ciscopress.com

Disclaimer: Parts of the content of this course is based on the materials available from the Web sites and books
listed above. The materials that can be accessed from linked sites are not maintained by Cognizant Academy and
we are not responsible for the contents thereof. All trademarks, service marks, and trade names in this course are
the marks of the respective owner(s).
2007, Cognizant Technology Solutions

Confidential

142

ss
oc
ia
te
ID

:3
9

54
7

You have successfully completed


Networking Basics

Potrebbero piacerti anche