NETWORKING Networking Fundamentals Computer Litarcy 101 An Educators' Guide to School Networks All about Networking
TYPES LAN MAN WAN CAN TAN
PHYSICAL TOPOLOGIES Linear Star Ring Tree Mesh
CABLING Classification Coaxial Twisted Pair Fiber Optic
LOGICAL TOPOLOGIES Ethernet Token Ring FDDI ATM
NETWORK PROTOCOLS NETWORK HARDWARE OSI model Hubs, Switches TCP/IP Repeaters, Bridges IPX Routers, Brouters NetBIOS/NetBEUI Gateway
Lan Wiring, Hardware, and Installation: An Online Course in Networking DEFINITIONS: A NETWORK consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
●
When any one of these computers are connected to a LAN they are referred to as a WORKSTATION. All computing devices on a network; workstations, printers, etc., are referred to as NODES.
●
When connecting a workstation, the interface hardware is referred to as an ADAPTER. Networking adapters are also commonly referred to as NETWORK INTERFACE CARDS or NICS.
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
●
Most NIC's break the information into FRAMES or PACKETS of information.
●
The LAN connection for a printer, however, is referred to as a PRINT SERVER and not a NIC.
●
The SERVER is the computer whose resources are shared with other computers.
●
SEGMENTS are trunks of cabling connecting devices to a routing device.
●
A BACKBONE is the foundation of the LAN/WAN where the servers are linked together in a common series of concentration devices.
●
A network where a server acts as a dedicated server and supplies information to workstations is called a CLIENT/SERVER network.
●
A PEER-TO-PEER network is a network where all computers act as both servers and clients and data files can be shared. This network has no one dedicated server.
A basic network is made up of primary components. 1. 2. 3. 4. 5.
A hub (which acts as the traffic cop on your small information highway. The hub acts as a switch to route information from one terminal to another through the use of cables. an interface card (hardware in each computer that connects to the hub) a server (the central storage computer for information). special cabling computers, printers, scanners, etc.
TYPES OF NETWORKS: The three basic types of networks include:
●
Local Area Network (LAN): A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart.
●
Metropolitan Area Network (MAN): A Metropolitan Area Network (MAN) covers larger geographic areas, such as cities or school districts. By interconnecting smaller networks within a large geographic area, information is easily disseminated throughout the network. Local libraries and government agencies often use a MAN to connect to citizens and private industries.
●
Wide Area Network (WAN): Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of network.
●
CAN: Campus Network
●
TAN: Tine Area Networks are 2 - 3 computers networked at home or in a small business.
NETWORK TOPOLOGIES There are two types of topology: physical and logical.
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
●
The physical topology of a network refers to the configuration of cables, computers, and other peripherals.
●
Logical topology is the method used to pass the information between workstations as can be seen in protocols.
PHYSICAL TOPOLOGIES 1. LINEAR BUS A linear bus topology or 10BASE2 bus topology consists of a main run of cable with a terminator at each end. All nodes (file server, workstations, and peripherals) are connected to the linear cable. ETHERNET AND LOCALTALK networks use a linear bus topology. Networking is simple. The network may have or hub or not.
DISADVANTAGES
●
Entire network shuts down if there is a break in the main cable.
●
Terminators are required at both ends of the backbone cable.
●
Difficult to identify the problem if the entire network shuts down.
●
Not meant to be used as a stand-alone solution in a large building.
2. STAR TOPOLOGY
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub or concentrator. A concentrator is a device that provides a central connection point for cables from workstations, servers, and peripherals. Most concentrators contain the ability to amplify the electrical signal they receive.
DISADANTAGES
●
Requires more cable length than a linear topology. If the hub or concentrator fails, nodes attached are disabled.
●
More expensive than linear bus topologies because of the cost of the concentrators.
This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable. A simple star topology is also used for 10BASE-T ETHERNET networks.
3. STAR-WIRED RING (TOKEN RING) A STAR-WIRED RING topology may appear (externally) to be the same as a star topology. Instead of having a concentrator at the center of the ring network, there is a device called a MAU (MULTISTATION ACCESS UNIT). Internally, the MAU of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or ring. The MAU does the same thing a hub does, but it works with TOKEN RING networks instead of Ethernet.
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
An illustration of a token ring's token passing A Token ring using Unshielded twisted pair in star or modified star transfers at 4 Mbps. A Token Ring configuration using shielded twisted pair in star or modified star configuration transfers at 4 or 16 Mbps. A local Ring Hub allows four-node connections on one MAU port cable. 64 - 72 (max.) nodes are recommended per ring for optimal performance. A double ring may have a maximum of 12 MAU's, each which can support 8 nodes. THe maximum distance between MAU and workstation is 45 m.; MAU to MAU is 120 m. In difference, FDDI (FIBER DISTRIBUTED DATA INTERFACE), pronounced fid-ee, also uses A COMPLEX token ring topology. FDII networks run on optical fiber cables instead of copper cabling. It's similar to Token Ring but can be connected to 2 MAUS so if one fails, the other can work. The FDDI has an added alternate ring. If a break occurs in either ring, it automatically reroutes the data transmission to the alternate ring. This ring supports speeds up to 100 Mbps. Has become the defacto high speed backbone. Maximum stations are 1000. THe distance limitation is 2 miles.
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
4. TREE TOPOLOGY A tree topology combines characteristics of linear bus and star topologies. It consists of groups of starconfigured workstations connected to a linear bus backbone cable. Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs. DISADVANTAGES
●
Overall length of each segment is limited by the type of cabling used.
●
If the backbone line breaks, the entire segment goes down.
●
More difficult to configure and wire than other topologies.
5-4-3 RULE: A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3 RULE. One aspect of the Ethernet protocol requires that a signal sent out on the network cable reach every part of the network within a specified length of time. Each concentrator or repeater that a signal goes through adds a small amount of time.
●
This leads to the rule that between any two nodes on the network there can only be a maximum of 5 segments
●
connected through 4 repeaters/concentrators.
●
In addition, only 3 of the segments may be populated (trunk) segments if they are made of coaxial cable. A populated segment is one which has one or more nodes attached to it.
This rule does not apply to other network protocols or Ethernet networks where all fiber optic cabling is used.
2. MESH TOPOLOGY
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
In a mesh topology, each device on the network is networked (cabled) to eachother. ADVANTAGES: Mesh topologies are installed where FAULT TOLERANCE is important. A single cable failure would not stop network communications between any two computers. The mesh topology is highly fault tolerant. DISADVANTAGES: More expensive and difficult to install. Requires more cabling since each device is cabled to eachother.
CABLING XBaseX classification: 10BaseT, 100BaseT and 10Base2 are networking standards and there are others.
●
The first number is an indication of the transmission speeds involved. It is listed in Mbps (Mega Bits Per Second).
●
The second portion designates Baseband or Broadband, how the data is sent across the cabling. In Baseband one signal takes up the entire bandwith of the cable. This data is digital.
With Broadband, the total bandwith of the cabling is divided and there will be many signals traveling through the cabling at a time. Broadband is analog. Broadband signals can travel father then Baseband.
●
The last portion is an indication of wire type and the approximate distances involved or the type of cabling.
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
TYPES OF CABLE There are three types of network wiring.
●
Coaxial
●
Twisted-Pair
●
Fiber
Each type of cabling has different requirements if it is to meet network standards.
IEEE 802.X SPECIFICATIONS THE INSTITUTE OF ELECTRICAL AND ELECTRONIC ENGINEERING (IEEE) published the 802 specifications. This designed standards for the physical components of a network.
●
802.1 Internetworking
●
802.2 Logical Link Control (LLC)
●
802.3 CSMA/CD LANs (Ethernet)
●
802.4 Token Bus LAN
●
802.5 Token Ring LAN
●
802.6 MAN
●
802.7 Broadband Technical Advisory Groups
●
802.8 Fiber Optic Technical Advisory Group
●
802.9 Integrated Voice and Data Networks
●
802.10 Network Security
●
802.11 Wireless Network, etc.
The 802 standards break the Data Link Layer further:
●
LOGICAL LINK CONTROL (LLC) - For error correction and control.
●
MEDIA ACCESS CONTROL (MAC) - gives physical addresses to device. Like the TO: and FRO: of an envelope.
1. COAXIAL CABLE Following the IEEE 802.3 Standard, coaxial cable is used for 10BASE2 (thin-net, CheaperNet) and 10BASE5 (thick-net) networking. No concentrator is needed. 10BASE2 is not the most reliable cabling. 10BASE2 and 10BASE5 are used in a LINEAR BUS topology.
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
With Ethernet 10Base2
●
255 devices cab be connected
●
maximum length of a segment is 185 meters
●
is usually standard industry RG-58 cable
●
❍
has a solid copper center conductor
❍
braided outer conductor
❍
50 ohm cable
❍
requires termination at both ends of segment using 50 ohm terminator.
Each computer connects to the computer with a T-Connector (BNC - British Naval Connector).
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
With Ethernet 10Base5
●
is usually standard industry RG-8 or RG-11 cable
●
maximum length of a segment is 500 meters
●
50 ohm cable
●
requires termination at both ends of segment using 50 ohm terminator.
10Base5 wire is connected not by BNC connectors but by AUI connectors. AUI connectors are a DB15 connector, that is, a D-shaped plug with 15 pins. These look just like RS-232 modem connectors, only about half as broad. These are common on equipment such as routers.
AUI Connector
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
10Base5 cable may also be connected by a vampire connector with clamps holding the cable in place. A vampire tap is a connection to a coaxial cable in which a hole is drilled through the outer shield of the cable so that a clamp can be connected to the inner conductor of the cable. This cable connection is made with a unit that clamps onto and "bites" into the cable, hence the vampire name.
Vampire Connectors Stripping & Terminating Coaxial Cable: Illustrated Tutorial.
2. TWISTED PAIR CABLING (STP and UTP) Coaxial and SHIELDED TWISTED PAIR (STP) have a copper braid of foil that offers good resistance to electrical noise, but the extra foil creates a larger, thicker cable, making it difficult to pull the cable through conduit and walls during installation. UNSHIELDED TWISTED PAIR (UTP) does not contain this aluminum shielding and is thinner and therefore easier to install. It offers less resistance to electrical noise. STP is used in Token Ring, ARCnet and Appletalk networks. UTP is used in Star Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM Topologies.
URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
Unshielded Twisted Pair(UTP) is the next step up from Coaxial. TP cabling is a cable made up of four pairs of insulated copper wires. UTP are 8 copper conductor, four pair wires.
RJ45 connectors are fitted on each end of the cable. They resemble a normal telephone plug (RJ11) with the exception of eight pins rather than four. The RJ45 cable connects to a NETWORK PATCH PANEL which is connected to the hub. The RJ45 is an 8 wire (4 pair) media connector.
DIRECTIONS: If at this point you have not made any patch cables, proceed to the crimpers, UTP cable, RJ45's and follow the directions "On Putting Together Patch Cables".
EAI/TIA 568 COMMERCIAL BUILDING WIRING STANDARD for Unshielded TP(UTP): UTP comes in levels of Category 1 - 5. The Electronics Industries Association and the Telecommunication Industries Association (EIA/TIA) created this standard for Unshield Twisted Pair cabling. The higher category cables contain more wire paths and higher number of twists to prevent EMI.
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM ●
URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html Category 1: not rated for performance
●
Category 2: used for telephone wiring - sasta rate of 1 magabit per second.
●
Category 3: lowest level that can be used for networking. Used for ETHERNET 10BASE-T. Data rate of 16 megabits per second.Used for data up to 10 Mps
●
Category 4: used for Token Ring and 10BASE-T. Maximum dat rate is 20 megabits per second.
●
Category 5: used for Ethernet 10BASE-T. Maximum date rate of 155 megabits per second. Used for voice/or data.
UTP (Unshieded Twisted Pair) is most commonly used in Category Three (CAT3) or Category Five (CAT5). The difference between the ratings is the number of twists per inch. Higher is better. CAT5 is probably the most commonly seen and used. It is inexpensive, reliable, easy to maintain and expand. COATING ON CABLES: Cable through the ceilings must be plenum-rated and riserrated and capable of withstanding environmental and fire conditions(riser) without giving off toxic gases(plenum) when it burns. PVC rated is the least expensive but highly flammable. Stripping and Terminating a Cat5 Cable: Illustrated Tutorial.
3. FIBER OPTIC CABLE Standard IEEE 802.8. Rather than using electrical impulses over wire, optical fiber transmits data using pulses of light. It is expensive to install and maintain. The average network administrator lacks the expertise to terminate each end. Fiber can carry data as high as 622 megabits per second. Fiber is not affected by EMI like copper cable and does build up a magnetic field to allow crosstalk. It is very light-weight compared to copper-based cable.
LOGICAL TOPOLOGIES A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following characteristics of a network: access method, allowed physical topologies, types of cabling, and speed of data transfer. Logical topologies instruct the hardware how to packet and transmit data across a physical topology.
1. ETHERNET The Ethernet protocol is by far the most widely used. The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over twisted pair, coaxial, or fiber optic cable at speeds of 10 Mbps.
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
The foundations of Ethernet is CSMA/CD (Carrier Sense Multiple Access/Collision Detection). In an Ethernet network, all computers share a single network segment, called a collision domain. When 2 computers transmit data along the segment simutaneoulsy, collision occurs. Each computer then can transmit data only when no other computer is transmitting. Ethernet uses CSMA/CD described in the IEEE standard 802.3.
MAX Max Devices Devices/ Max Cabling Distance/ Topology Length of Attached Termination Grounded Segment IRLs Segment Cable To: 2.5km (1.5 miles)
Standard Thick Ethernet (10Base5) COAXIAL
1640 ft. (500 m) 10 Mbps Speed
100 Workstations per trunk
maximum lngth of trunk 500 m. Bus
2 entire network trunk maximum 2500 m.
Backbone by use of transceivers
50-ohm resistor (both ends)
To earth
NICs with built-in BNC transceivers
50-ohm resistor (both ends)
To earth
5-4-3 RULE 925m (3035 ft.)
Thin Ethernet (10Base2) COAXIAL
Shielded (STP) 10Base-T TWISTED PAIR
607 ft. (185 m) 10 Mbps
30 Workstations per trunk
328 ft. (100 m) 16 - 155 Mbps
Bus
2
1024 workstations per network minimum cable length between workstations 20"
Token Ring
3
500m
Central hub managed or unmanaged
None needed
Star
3
500m
Central hub managed or unmanaged
None needed
Star
3
500m
Central hub managed or unmanaged
None needed
Star
2
4km
1023 workstations without bridging 5-4-3 RULE Unshielded (UTP) 10Base-T TWISTED PAIR
328 ft. (100 m) 10 Mbps Speed
Workstations only 328 ft. from concentrator minimum cable legnth between stations 8 ft. 1023 workstations without bridging 5-4-3 RULE
Unshielded (UTP) 100Base-T TWISTED PAIR
328 ft. (100 m) 100 Mbps Speed
Workstations only 328 ft. from concentrator minimum cable legnth between stations 8 ft.
10Base-FL FIBER OPTIC
1.2 miles (2 km)(w/5 segments max. is 500m) 100 Mbps -
2
Fiberoptic None hub or needed Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM repeater
URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
2 Gbps
The Ethernet standard has grown to include faster networks.
Cable Type
Speed
Data Transfer 100BASE-T (fast Ethernet)
Maximum Distance
100 megabits per second
20 m.
100BASE-FX (Fast Ethernet on optical fibers)
none
100BASE-T4
20 m.
Chart Taken from Data Comm Warehouse Technical Reference Guide
2. TOKEN RING Uses IEEE Standard 802.5, Token Ring is very different from Ethernet. In token ring a single packet is passed around the network. Every computer waits its turn. There are no collisons. Token Ring has the same bandwidth as Ethernet. Too many computers result in network slowness. FDDI is a faster Token Ring configuration (as described above).
3. ATM (Asynchronous Transfer Mode Following IEEE Standard 802.9, ATM is one of the newer topologies. It can carry voice and data over network wire or fiber. ATM transmits packets as 53byte cells that have a variety of identifiers to detmine such things as Quality of Service or wich packet is to be routed first. Packets are sent their need for bandwidth. For example, email would have a low priority and voice and video a higher priority and be sent first. ATM runs 25 - 622 megabits per second. It is also expensive.
NETWORK PROTOCOLS On top of the Logical Topologies are protocols. Protocols handle the translation of data from applications to the logical topology. THe OSI model explain how a network should work. The lower the level the less abstract and more concrete the layer is. Each layer communicates only with the layer above or below it while moving data.
OSI MODEL (Open Systems Interconnect) The seven-layer OSI (Open systems Interconnection) model, created by the ISO (International Standards Organization), defines internetworking environments. It provides a description of how software and hardware interact to permit communication between computers. An interface separates each layer from those above and below it; each layer provides services to the layer directly above it. This handy mnemonic will help you keep the layers in proper order:
7.
All
Application
6.
People
Presentation
5.
Seem
Session
4.
To
Transport
3.
Need
Network
2.
Data
Data Link
1.
Processing
Physical
LAYER
FUNCTION
Application Layer (Rx. the dashboard of your car. The different
Allows application processes to access network services. Manages communication between applications. Flow control and error recovery is handled here.
PROTOCOLS FTP, SNMP, SMPT NCP
HARDWARE Gateway
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
gauges make you aware of the information that you need to know in order to maintain speed limits and optimal performance for your vehicle. Presentation Layer (RX. the universal signs both on the highway and inside your vehicle.)
FORMAT - Functions as the network’s translator – handles protocol conversion, data translation and encryption, and data compression. The redirector operates here.
NCP
Gateway
Session Layer (Rx. the designated traffic lanes
TRAFFIC COP. Provides synchronization between computers; allows applications on two computers to establish a session.
None
Gateway
Transport Layer (Rx Speed recognition devices on a highway)
RESPONSIBLE FOR THE ACCURACY OF THE DATA TRANSMISSION. Ensures reliable delivery of packets. Repackages messages, dividing them into smaller packets.
Uses protocols TCP, SPX (Sequenced Packet Exchange) from IPX/SPX stack, and NWLink (Microsoft's implementation of IPX/SPX), NetBEUI SPX and TCP packets are connection protocols.
Gateway
Network Layer (Rx highway exit numbering scheme)
Establishes THE UNIQUE NETWORK ADDRESS AND MANAGES THE TRANSPORT OF INFORMATION PACKETS BETWEEN DIFFERENT NETWORKS. Routes the packets and determines the best route for sending them. Manages network traffic problems, packet switching, routing, and reassembling data.
IP, IPX, NetBEUI, DLC
Router, Brouter
Data Link Layer (Rx. Entry ramp/toll booth that allows access onto the highway)
DETERMINES HOW DEVICES CONNECTED WILL GAIN ACCESS. Determines how 1's nd 0's are asssembled into frames or packets of data. Sends data frames from the Network Layer to the Physical Layer. Contains the physical address of a device. Like the FROM: and TO: of a envelope.
None
Bridge, Remote Bridge, Brouter, Switch IEEE 802.X Standards Ethernet, Token Ring, FDDI
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
Physical Layer (Rx. determining if the road infrastructure will be built of concrete or asphalt.)
Transmits data bits between computers. Defines how 1's and 0's are interpreted from the medium. DEFINES CABLES, NETWORK INTERFACE CARDS, AND OTHER PHYSICAL ASPECTS.
None
The NIC CARDS, REPEATERS, CONCENTRATORS/HUBS, MAU's, SWITCHING HUBS etc. CABLES - IEEE 802.X
TRANSMISSION PATH
1. TCP/IP Network Protocol 1.
DEFINITION: Stands for Transmission Control Protocol/Internet Protocol. This is the protocol that carries data over the Internet. It is actually a set of protocols ❍
PPP - Point to Point Protocol
❍
SMPT - Simple Mail Transport
❍
TCP - Transmission Control Protocol
❍
IP - Internet Protocol that handles addresses, etc.
❍
FTP - File Transfer Protocol
MIME - Multipurpose Internet Mail Extensions, is more of a standard than a protocol. Used by e-mail applications, it is a method for sending files back and forth between computers through electronic mail. This allows formatted documents created through word processors or spreadsheet programs to be attached to an electronic mail message and arrive on the other end exactly as they were sent. TCP/IP uses 5 layers of the OSI model(1,2,3,4, and 7) ❍
2.
IP ADDRESSES: To communicate on the Internet, computers must have unique identifiers in order to differentiate one computer from another. This is accomplished through IP addresses. IP is made up of a 32-bit address or 4 "octet" address. An IP address consists of 4 parts separated by decimal points. 199.250.132.1 128.30.7.10 Every host has at least one unique IP address. In addition, every router has a unique IP address for every network adapter it possesses. However, all hosts on the same physical network must have the same network prefix. (For example, Take a look at the IP addresses on the side of each machine in the lab)
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
3.
DYNAMIC and STATIC NAMING: IP addresses can be assigned uniquely by the administrator or assigned dynamically by a DHCP (DOMAIN HOST CONFIGURATION PROTOCOL) server. DHCP is a dynamic router in that it builds and updates its own routing tables. It automates what the administrator has to do manually. Instead of dynamically naming a unique number for a network address, the server assigns a network address to whoever goes on the network next. Thus the network address of a computer or workstation will be different each time. It can also assign other things too, as a default gateway, DNS server, WINS server, and SUBNET MASK. See What is DHCP (Dynamic Host Configuration Protocol)? There are really 2 addresses in the TCP/IP packet
4.
❍
IP Addresses (starting address and ultimate ending address)
❍
MAC addresses (Stopping point along the way)
IP ADDRESS CLASSES: IP addresses are grouped in different classes. Classes are allocated to organizations that request them in address blocks. The INTERNIC assigns the addresses. Three classes are used for HOSTS. A network is divided into subnets. A SUBNET is a network on where you are currently located. That network can be made longer by adding more subnets. When a network packet is not addresed to its own network or subnets, it is forwarded to a DEFAULT GATEWAY (like a post office). THE NUMBER OF HOSTS THAT MAY BE ALLOWED IN A NETWORK IS DETERMINED BY CLASS: Each class uses special numbering scheme for Domain Names.
❍
Class A Addresses (very few left). Example: X.0.0.0 X = from 1 - 126. That is, 1.X.X.X - 126.X.X.X. First octet identifies the network, i.e. 1-126; and the last three identify the node. CLASS A DEFAULT SUBNET MASK = 255.0.0.0
11111111. 00000000 00000000 00000000 Network ❍
node
node
node
Class B Addresses 128.0.0.X - 191.255.X.X. The first two octets identify the network and the last two the node. CLASS B DEFAULT SUBNET MASK = 255.255.0.0
11111111. 11111111 00000000 00000000 Network ❍
Network
node
node
Class C Addresses: 192.0.0.X - 223.255.255.X The first three octets identify the network, and the last octet is the node. CLASS C DEFAULT SUBNET MASK = 255.255.255.0
11111111. 111111111 11111111 00000000 Network 5.
6.
Network
Network
Network
PORT NUMBERS: TCP/IP has its own protocols. Different TCP/IP Internet protocols use different port numbers to connect to web servers.
❍
HTTP uses default port 80 or 8080
❍
FTP (File Transfer Protocol) uses default port 21
❍
TELNET (text communication) uses default port 23
❍
SMNP uses default port 161
❍
SMTP (Simple Mail Transfer protocol) uses default port 25
DOMAIN NAME: Your IP address not only comes in numbers but has a Domain Name. It is easier to remember a name than a number. The DNS breaks addresses into groups and gives each level the responsibility for the levels under them. Each level is called a domain. A period separates each domain name from the next one. The right most portion of the address identifies the top level domain name which references the organization type. The following table lists commonly used domain names: .com = Commercial organizations .edu = Educational organizations .gov = Government (non-military) .mil = Military organizations .org = Non-profit association .net = Network resources Two services that the TCP/IP protocol uses to resolve domain name to IP adresses are ■
www.PDFonFly.com at 7/30/2009 8:05:57 AM HOST FILE : a test file that is kept on the local machine and contains aGenerated list of otherbyhosts and IP numbers. The domain name URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
resolver goes to this text field first.
❍
■
DNS Server: Every company has a DNS server that workstations may consult for a name to IP address resolution. THE DNS server contains FQDN (Fully Qualified Domain Names) to IP address matches. This database contains entries for every host within the organization. Only one DNS server will keep the master database.
■
LMHosts - WINS: A LMHost file resolves a NetBIOS name to an IP address. The file must be installed and kept up to date on each machine. The WINS server is a database that keeps track of IP addresses and NetBIOS names. The WINS server is dynamic in its configuration and updates.
TROUBLESHOOTING TCP/IP UTILITIES:
■
PING: The ping command is used to test connectivity to a host. It is a loop-back address. You can also Ping an address on the other side of your router to test the default gateway. To check if you have a path to an Internet host, enter the Ping command and the host's IP address at the command line, as in the following example: PING 204.32.23.67 NOTE: You can also use Ping with the DNS name of the host, such as www.wavetech.com.
■
TRACERT:This utility allows you to find the route used between you and the remote computer host. For example, say that you are having trouble reaching a host named www.yahoo.com. Type the following command at the command prompt: TRACERT WWW.yahoo.com and press enter.
■
WINIPCFG/IPCONFIG: A good utility to use to check the TCP/IP configuration on a Windows 95 workstation is WINIPCFG. You can quickly determine a computer's IP address, subnet mask, and default gateway using this utility. Windows NT has a command line utility, IPCONFIG that presents similar data about the IP configuration on an NT platform.
2. IPX Network Protocol IPX stands for Internet Packet Exchange. It is a Novell NetWare designed transport protocol. Novell Netware is an operating system made of FAT and DET(Directory Entry Table). Performs addressing and routing functions. Resides in the NETWORK layer. Requires some configuration. Requires the administrator to uniquely assign a network or cable segment address.
3. NetBIOS/NetBEUI Network Protocol Stands for Network Bios Input Output Sustem and Network Advanced User Interface. Microsoft designed this protocol for fast packet delivery in a small network without much configuration. It is not routable, but operates on the NETWORK and TRANSPORT layers of the OSI model.
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
NETWORK HARDWARE More than any feature, network hardware may determine the speed, quality and performance of a network.
Hubs A hub is a central connecting device that joins computers in a star configuration. Hubs may be passive or active. A passive hub merely connects computers to the network and does not process data in any way. Active hubs, sometimes called repeaters, regenerate the data in order to maintain signal strength. Some hubs have intelligence and can perform additional duties such as bridging, routing and switching.
Hub
Stackable Hub
Modular Hub
SWITCHES Fast Ethernet switches allow dedicated, high-speed connections at either 10BASE-T or 100BASE-TX. They are ideal for connecting servers or multiple hubs in small businesses that want the highest network performance possible to exchange large data files and images, and access real-time information. A switch does this by providing dedicated bandwidth to every device—server, PC, or hub—connected to one of its ports. They are intelligent in that they give priority to large bandwidth data.
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
Repeater A repeater is the simplest and least expensive of the three. Repeaters are usually small enough to fit in your hand and are used to connect two segments of network cable. Extends the signal and distance of the LAN. The repeater retimes and regenerates signals but does not change the data frame or packet in any way.
Transceiver A tranceiver connct different Ethernet nodes together in an organized fashion, and allows multiple Ethernet segment nodes to connect to eachother to create a segment.
Bridge A bridge is like a smart repeater. Bridges, like repeaters, can connect two network segments, but bridges are a little smarter about the data they transport. Most bridges have the capacity to listen to the network and figure out the address of each computer on both sides of the bridge. The bridge can then inspect each message that comes from one side and broadcast it to the other side of the bridge, if the message is intended for a computer that is on the other side. If the paket's destination is on the same side of the bridge, it is is discarded. This creates a more efficient scheme for data transport. The bridge
●
can connect segments that use different cable media types, like 10BaseT(Twister Pair) and 10Base5(Coaxial).
●
cannot connect different transport protocols - like Ethernet and Token Ring networks.
Routers A router is like super-intelligent bridge. They can link multiple LANs and look deeper into the data packet to determine its destination. Routers not only know the addresses of the computers on the network but are aware of all the other bridges and routers on the network and can decide the most efficient path in which to send data. The router uses a routing table of network addresses to determine where to forward the packet.When a router receives data, it discards the outer packet or frame or MAC address, repackages the data with network address, and retransmits the signal. By stripping off the outer layers of data Generated www.PDFonFly.com at 7/30/2009 8:05:57 AM before sending a packet, the total number of bits moving across the by network is URL:the http://www.millbury.k12.ma.us/hs/techrepair/networking.html reduced. The router at the receiving end then repackages data into a packet
of frame that is appropriate for its network. There are ROUTABLE and NONROUTABLE protocols.
●
TCP/IP and IPX/SPX are routable
●
NetBEUI is non-routable because it cannot work out of its own subnet.
Brouters A brouter is like a bridge that have advanced intelligence that allows them to take on duties that would normally require a router. These bridges are called brouters.
Gateways A gateway is like a super-intelligent router. Gateways are designed to connect radically different networks. Although slower than a bridge or router, a gateway has its own processor and memory to perform complex functions such as interpreting between computers that speak different languages through both protocol and bandwidth conversion. A gateway can convert a TCP/IP packet to a NetWare IPX packet and vice versa. An example of a gateway is a messaging gateway, which converts messages between different protocols. Keys To Remember: Repeaters, bridges, routers and gateways all extend and segment networks. Because of this, they’re often confused, as they may take on similar duties. The difference between these devices lies in the different degrees of data discrimination and handling capability. Repeater: Regenerates signals to span longer segments of network. Does not alter data. Bridge: Links two subnets (networks) that use the same media and protocol. May control data traffic and speed. Router: Allows the interconnection of two or more physically distinct networks and have advanced intelligence enabling it to determine the most efficient method of delivering data. Gateways: Designed to connect radically different networks.
QUIZ: Can you now recognize the topologies below
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html
FAULT TOLERANCE Fault tolerance involves storing data on multiple hard drives to insure against the failure of any individual drive. There are several levels of fault tolerance, referred to as RAID (Random Array of Inexpensive Disks) levels.
●
RAID Levels
●
FAULT TOLERANCE
●
RAID Levels
Internet Resources:
●
Network Basics (Network+)
Generated by www.PDFonFly.com at 7/30/2009 8:05:57 AM URL: http://www.millbury.k12.ma.us/hs/techrepair/networking.html