Network Connectivity And Management

  • Uploaded by: Manmohan garg
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Network Connectivity And Management as PDF for free.

More details

  • Words: 1,789
  • Pages: 56
NETWORK CONNECTIVITY AND MANAGEMENT AT HCL Info-Tech Systems Jaipur By

Manmohan Garg [email protected]

INTRODCTION • Representation of a network: Types and topologies of networks. • OSI reference model. • Network components and their features. • Data-Center internal connectivity. • UPS Connectivity in the Data-Center. • Network management. • Scope of improvement. • References.

TYPES OF NETWORKS • LAN – Local area network is a small geographical area such as our school board.

• MAN – Metropolitan area network is a network over a larger geographical area such as the provincial government.

• WAN – Wide area network is a network used over an extremely large geographical area such as the federal government.

Representation of a network 2.Physical Topologies

2. Logical Topologies

NETWORKS ARE BROKEN INTO 3 TOPOLOGIES. • BUS TOPOLOGY Allows information to be directed from one computer to the other. Lots of binary collision though.

2. STAR TOPOLOGY is the most common type used. All computers are attached to a hub. Less collisions and most efficient.

3. RING TOPOLOGY Uses a token to pass information from 1 computer to the other.

• A disadvantage of a token ring is if one computer is broken or down, the message cannot be passed to the other computers.

OSI reference Model The Open Systems Interconnection Basic Reference Model.

THE PHYSICAL LAYER It is concerned with transmitting raw bits over a communication channel though hubs, wires (cat5UTP), modems, network card.

CAT5 cable Speeds up to 100 Mbps.

COMMUNICATION CHANNELS

When looking at network cables in the way the wire ends are connected within the RJ45. 3.Straight though cables

2.

Cross-over cables

Crimping Tool

Hubs • Hubs are layer 1 devices. They regenerates the signal and broadcast it out all the rest of their ports. • Classifications of hubs 4.Active or Passive hubs. 5.Intelligent or Dumb hubs.

THE DATA-LINK LAYER The data link layer takes raw transmission and transforms it into a line that appears free of transmission errors in the network layer. • There are smart devices such as switches in the Data-Link Layer. • These devices takes decision on the MAC address.

• Data link layer sends frames small fixed length pieces of data.

SWITCH • A switch is a Layer 2 device. • They make decisions based on MAC addresses.

• Switches make decisions based on the MAC table.

THE NETWORK LAYER The network layer is concerned with controlling the operation of the subnet.

IP Address • An Internet Protocol address is a logical address that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its nodes.

IP Address

Structure of an IP address

Subnet mask It is used to identify the network and host bits in an IP address.

Broadcast Address It is used to send data to all of the devices on a network. • Broadcast IP addresses end with binary 1s in the host part of the address. • Class B Broadcast Address Example: 176.10.255.255

Loopback The IP address 127.0.0.1 is used as the loopback address. It is used by the host computer to send a message back to itself.

Subnetting Subnetworks are smaller divisions of networks. • Subnet addresses are locally assigned by a network administrator. • Subnets reduce a broadcast domain.

Subnet Addresses • It has Class A, B, or C network portion plus a subnet field and a host field. • For subnet field Bits are borrowed from the host field

• The minimum number of bits we can borrow is two.

Calculating Subnets • We will subnet the IP address: 223.14.17.0 3.What class IP address is this? Class C 4.Class C default subnet mask: 255.255.255.0 5.Let we Need: 13 subnets 10 hosts on each subnet

Now we have to determine how many bits to borrow from the host ID.

• For the 4 bits borrowed each bit can be a 1 or a 0 leaving you with 24 or 16 possible combinations. • The same goes for the 4 leftover host bits.

But there are only 14 available subnets and hosts on each subnet. • Because you cannot use the first and last subnet. • Last one is the broadcast address and first one is the network address. To get the new subnet mask we will Add the place values to get 128 + 64 + 32 + 16 = 240 the last octet decimal value of the subnet mask.

The ranges of host addresses for each subnet.

ROUTERS • A router is a Layer 3 device. • It Forwards data depending on the Network address (IP), not the Hardware (MAC) address. • The purpose of a router is to examine incoming packets (Layer 3 data), choose the best path for them through the network. • It works in LAN, MAN and WAN environments.

• It is used to connect networks.

• It Limits the collision domain

THE TRANSPORT LAYER •





It provide logical communication between applications processes running on different hosts. It transport protocols that runs in end systems. Sender side: it breaks application messages into segments, passes to network layer. Receiver side: it reassembles segments into messages, passes to application layer. It has more than one transport protocol available to applications : TCP and UDP.

• Reliable, in-order delivery: TCP Connection-oriented and acknowledgment.

THE SESSION LAYER • The session layer allows different machines to establish sessions between them. • The Session layer provides the mechanism for managing the dialogue control and token management end- user application processes. • It provides communication between systems in simplex mode, half duplex and full duplex mode.

THE PRESENTATION LAYER • The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. • If any packets got lost along the way, or were damaged, then the presentation layer will send a sign to the sender that it requires the specific packet.

THE APPLICATION LAYER • It interfaces directly to and performs common application services for the application processes; it also issues requests to the presentation layer. • It has many end-user protocols to perform various tasks. • FTP - File Transfer Protocol It provides a standard system for sending and receiving files over IP networks.

• HTTP Protocol Web browsers and servers use the Hypertext Transfer Protocol (HTTP) protocol to communicate. • DHCP The Dynamic Host Configuration Protocol (DHCP) supports automatic address assignment and improved configuration management of IP

• IPv6 - Internet Protocol version 6 IPv6 promises to relieve the current IP address shortage, and this new version of the protocol may also increase performance and improve administration capabilities.

DATA CENTER INTERNAL CONNECTIVITY

RRVPNL 2*5 KVA UPS Status – (Rack Wise) Pw. Board 1 Pw. Board 2

Pw. Board 3

Pw. Board 4

Pw. Board 5

Pw. Board 6

• . UPS1

UPS2

UPS1

1A 1B

2A

4 Cooling 100 Fan 325

DNS

100

325 Firewall

UPS2

UPS1

3A 3B

San Switch 325

80

4 Cooling 100 Fan

325

325

Switch 325 250

250 San Storage

325

Appli. 1

Database 1

5A 5B

60 Cisco L3 Switch

Cisco L3 Switch

Web 1

UPS2

4A 4B

4 Cooling 100 Fan 60

325 Mail/SMTP

325

UPS1

4 Cooling 100 Fan

325

17” Color 100 325 Monitor 325

UPS2 2B

325 325 325 325

6A 6B

4 Cooling Fan File 1

Web 2

325

17” Color Monitor

100

Appli. 1

325

Database 1 325

File 2

4 Cooling Fan 17” Color Monitor

T&D Database

File 3

External DNS Linux

T&D Application

Pw. Board 7

UPS1

UPS2

4 Cooling Fan

7A 7B 60

Cisco L3 Switch

100

1A,2A,3A,4A,7A Power load on UPS No. – 1 1B,2B,3B,4B,7B Power load on UPS No. – 2 Power load of Cooling fans, Servers, Monitors, Switches shown in this diagram in Watts

APPLICATION SERVER • An application server is a software engine that delivers applications to client computers or devices, typically through the Internet and using the Hypertext Transfer Protocol. • The application server combines or works with a web (hypertext transfer protocol) server and is called a web application server .

DATABASE SERVER • A database server is a computer system or program that provides database services to other computers or computer programs. • Database servers store the database on a dedicated computer system, allow it to be accessed concurrently, maintain the integrity of the data, and handle transaction support and user authorization.

Domain Name System (DNS) Server • A DNS stores information such as the list of mail servers that accept email for a given domain. By providing a worldwide keyword-based redirection service, the Domain Name System is an essential component of contemporary Internet use. • For example: www.google.co.in, into IP addresses, e.g.

FILE SERVER • In the client/server model, a file server is a computer responsible for the central storage and management of data files. so that other computers on the same network can access the files. • A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device

MAIL SERVER • A mail server is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery. • As a rule, the system uses SMTP (Simple Mail Transfer Protocol) or ESMTP (extended SMTP) for sending e-mail, and either POP3(Post Office Protocol 3) or IMAP(Internet Message Access Protocol) for

PROXY SERVER • A proxy server is a server which services the requests of its clients by forwarding requests to other servers. • The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client

NETWORK MANAGEMENT Network management is the ability to control and monitor a computer network from a central location. It covers a wide area, including: • Security: Ensuring that the network is protected from unauthorized users. • Performance: Eliminating bottlenecks in the network. • Reliability: Making sure the network is available to users

TROUBLESHOOTING • Verifying the problem Narrow the scope 1. Try multiple websites 2. Try multiple services (browser, email, IM) 3. Put 146.186.157.6 in browser. Tests TCP/IP and gateway connection Tests DNS

Finding the problem • Try websites from another PC If problem exists on another machine Indicates problem outside of PCs

• Check all cabling • Reboot router and modem If problem isn’t on another machine Indicates problem on your PC 1. Check cabling at both ends. 2. Check TCP/IP settings. 3. Reboot PC.

Possible improvements in the RRVPNL network 2.No of routers can be increased: 3.DHCP server was not present 4.Backbone cable can be upgraded to fiber cable which support speedy data transfer. 5.Authentication methods can be useful

Thank You.

Related Documents


More Documents from ""