Networking Essentials
Networking Essentials
Networking Essentials
Models of network
There are three types of network models
1. Centralized Computing
2. Work Group (peer-to-peer)
3. Domain (Client-Server)
Centralized Computing:
It is the oldest model of networking based on the idea of having one very large and powerful central
computer, to which a number of computer terminals are directly connected. In the early days of
computing, this central computer would invariably have been a mainframe computer (often called
the host computer). This arrangement allowed many users to access the resources of the "host"
mainframe computer simultaneously
Workgroup (Peer to peer):
A workgroup is a collection of computers on a local area network (LAN) that share common resources
and responsibilities. You simply use the same Workgroup for all the computers and a unique name for
each computer. Being a peer-to-peer (P2P) network design all computers acts as a client because there
is no centralized server. The user on each computer determines which data on that computer is shared
on the network. Security is also managed by the user of the devices.
The Microsoft Windows family of operating systems supports assigning of computers to named
workgroups. Macintosh networks offer a similar capability through the use of AppleTalk zones. The
Open Source software package Samba allows UNIX and Linux systems to join existing Windows
workgroups.
Criteria for selecting peer to peer
1. Where 10 to 15 or fewer users will be sharing resources.
2. No server is available.
3. Nobody has the time or knowledge to act as a network administrator.
4. There is little or no concerns about security (security in data processing is the ability to protect
data from unauthorized access or, theft or damage)
5. The organization and the network will experience only limited growth within the foreseeable
future.
Advantages of using peer to peer
They are easy to configure
Computers communicate easily.
They dont require additional server hardware or software
Users can manage their own resources.
They dont require a network administrator
They reduce total cost of network setup.
Disadvantages of using peer to peer
1. They provide a limited number of connections for shared resources.
2. Computers with shared resources suffer from sluggish performance.
3. They dont allow for central management
4. Users are responsible for managing resources. These resources include data in shared
directories, printers, fax cards, and so on.
5. They offer very poor security.
PREPARED BY RADHAKRISHNA K
NETWORKING ESSENTIALS
PREPARED BY RADHAKRISHNA K
NETWORKING ESSENTIALS
A domain does not refer to a single location or specific type of network configuration. The computers
in a domain can share physical proximity on a small LAN or they can be located in different parts of the
world. As long as they can communicate, their physical position is irrelevant.
Networking Standards:
A network standard is in short a reference model to make sure products of different vendors can work
together in a network; The International Organization for Standardization (ISO) lays out those
standards.
A network protocol is a set of rule, which govern communication between two or more devices or
computer; or, a set of rule and regulation for the communication between devices within a network.
For example in order for you to be able to internet you need to have the 'tcp/ip'-protocol enabled.
In short, a network standard helps vendors to create products that can all work together; a network
protocol allows different network devices to communicate with each other.
There are a lot of different network standards that the majority of computers use. There are standards
for both physical hardware and for signaling. For example, IEEE 802.11g is a wireless networking
standard. It includes specifications for the type of radio that is used, how strong the signal can be
amplified, a standard set of encryption schemes, etc.
Another standard is Ethernet, also known as IEEE 802.3. This is a standard for hardwired networks.
When people talk about Cat 5 cable, this is usually what they mean. It defines what types of wiring can
be used, transmission power requirements, connector styles, etc.
There are also protocols. TCP/IP is basically the protocol that runs the internet and most LANs that
exist today. When people talk about IP addresses, subnet masks, default gateways, etc. those usually
pertain to this. Note that TCP/IP is a protocol that is used in conjunction with things like 802.11g or
Ethernet.
Baseband:
Baseband systems use digital signaling over a single frequency. Signals flow in the form of discrete
pulses of electricity or light. With baseband transmission, the entire communication channel capacity is
used to transmit a single data signal. The digital signal uses the complete bandwidth of the cable,
which constitutes a single channel. A cable's total bandwidth is the difference between the highest and
lowest frequencies that are carried over that cable.
Each device on a baseband network transmits bidirectional, and some can transmit and receive at the
same time.
PREPARED BY RADHAKRISHNA K
NETWORKING ESSENTIALS
PREPARED BY RADHAKRISHNA K
NETWORKING ESSENTIALS
1. range - both wireless and wired transmissions gradually dissipate in strength over longer reaches
2. interference - on wireless networks, radio interference or physical obstructions like walls also
dampen communication signals
3. wire size - on wired networks, thinner wires suffer from higher (more) attenuation than thicker
wires
Cross Talk:
Crosstalk is a disturbance caused by the electric or magnetic fields of one telecommunication signal
affecting a signal in an adjacent circuit. In a telephone circuit, crosstalk can result in your hearing part
of a voice conversation from another circuit. The phenomenon that causes crosstalk is called
electromagnetic interference (EMI). It can occur in microcircuits within computers and audio
equipment as well as within network circuits. The term is also applied to optical signals that interfere
with each other.
Cables (UTP, STP, FOC& Co-axial) & connector:
Cable is the medium through which information usually moves from one network device to another.
There are several types of cable which are commonly used with LANs. In some cases, a network will
utilize only one type of cable, other networks will use a variety of cable types. The type of cable
chosen for a network is related to the network's topology, protocol, and size. Understanding the
characteristics of different types of cable and how they relate to other aspects of a network is
necessary for the development of a successful network.
Unshielded Twisted Pair (UTP) Cable
Shielded Twisted Pair (STP) Cable
Coaxial Cable
Fiber Optic Cable
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is
the most popular and is generally the best option for networks
PREPARED BY RADHAKRISHNA K
NETWORKING ESSENTIALS
Shielded twisted pair cable is available in three different configurations:
1. Each pair of wires is individually shielded with foil.
2. There is a foil or braid shield inside the jacket covering all wires (as a group).
3. There is a shield around each individual pair, as well as around the entire group of wires
(referred to as double shield twisted pair).
Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between
the center conductor and a braided metal shield. The metal shield helps to block any outside
interference from fluorescent lights, motors, and other computers.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted
pair.
There are two common types of fiber cables -- single mode and multimode. Multimode cable has a
larger diameter; however, both cables provide high bandwidth at high speeds. Single mode can provide
more distance, but it is more expensive.
PREPARED BY RADHAKRISHNA K
NETWORKING ESSENTIALS
Media
Type
UTP
STP
Max Segment
Length
Speed
100m
101000Mbps
100m
10100Mbps
500m(Thicknet)
10100Mbps
Coaxial
185m(Thinnet)
10km, and
farther (singlemode)
FiberOptic
2km and
farther
(multimode)
100Mbps to
100Gbps
(Singlemode)
100Mbps to
9.92Gbps
(multimode)
Cost
Advantages
Disadvantages
Least Expensive
Easy to install;widely
available and widely
used
Susceptible to
interference; can
cover only a
limited distance.
More Expensive
than UTP
Reduced crosstalk;
more resistant to EMI
than Thinner or UTP
Difficult to work
with; can cover
only a limited
distance.
Relatively
inexpensive, but
more costly than
UTP
Less susceptible to
EMI interference than
other types of copper
media
Difficult to work
with(Thicknet);
limited bandwidth;
limited application
(Thinnet); damage
to cable can bring
down entire
network
Expensive
Cannot be tapped, so
security is better; can
be used over great
distances; is not
susceptible to EMI;
has a higher data rate
than coaxial and
twisted-pair cable
Difficult to
terminate
Networking Devices:
Modem
The word "modem" is a contraction of the words modulator-demodulator. A modem is typically used to
send digital data over a phone line
The sending modem modulates the data into a signal that is compatible with the phone line, and the
receiving modem demodulates the signal back into digital data. Wireless modems convert digital data
into radio signals and back.
PREPARED BY RADHAKRISHNA K
NETWORKING ESSENTIALS
Hub:
Hub is a common connection point for devices in a network. A hub contains multiple ports
Hub broadcasts the packets to all the ports including the incoming port.
Repeaters:
Network repeaters regenerate incoming electrical, wireless, or optical signals. With physical media
like Ethernet or Wi-Fi, data transmissions can only span a limited distance before the quality of the
signal degrades. Repeaters attempt to preserve signal integrity and extend the distance over which
data can safely travel.
Bridges
Bridge is a device which connects two segments of a network. Bridges inspect incoming traffic and
decide whether to forward or discard it. An Ethernet bridge, for example, inspects each incoming
Ethernet frame - including the source and destination MAC addresses, and sometimes the frame size. If
the destination address is not on the other side of the bridge it will not transmit the data.
Packet forwarding is performed using software.
Usually Bridges have 2 ports can go up to a max of 16 ports.
CSU/DSU:
A Channel Service Unit (CSU) is a device that connects a terminal to a digital line. A Data Service Unit
(DSU) is a device that performs protective and diagnostic functions for a telecommunications line.
Typically, the two devices are packaged as a single unit, CSU/DSU.
You can think of a CSU/DSU as a very high-powered and expensive modem. Such a device is required
for both ends of a T-1 or T-3 connection; the units at both ends must be from the same manufacturer.
PREPARED BY RADHAKRISHNA K
NETWORKING ESSENTIALS
wired connections while others are wireless. Most NICs support wired either Ethernet or Wi-Fi wireless
standards. Ethernet NICs plug into the system bus of the PC and include jacks for network cables, while
Wi-Fi NICs contain built-in transmitters / receivers (transceivers).
Switch:
A network switch is a small hardware device that joins multiple computers together within one local
area network (LAN). Technically, network switches operate at layer two (Data Link Layer) of the OSI
model.
Network switches appear nearly identical to network hubs, but a switch generally contains more
intelligence (and a slightly higher price tag) than a hub. Unlike hubs, network switches are capable of
inspecting data packets as they are received, determining the source and destination device of each
packet, and forwarding them appropriately. By delivering messages only to the connected device
intended, a network switch conserves network bandwidth and offers generally better performance than
a hub.
As with hubs, Ethernet implementations of network switches are the most common. Mainstream
Ethernet network switches support either 10/100 Mbps Fast Ethernet or Gigabit Ethernet (10/100/1000)
standards.
Different models of network switches support differing numbers of connected devices. Most consumergrade network switches provide either four or eight connections for Ethernet devices. Switches can be
connected to each other, a so-called daisy chaining method to add progressively larger number of
devices to a LAN.
PREPARED BY RADHAKRISHNA K
NETWORKING ESSENTIALS
Managed switches can be modified to suit the functionality of a particular network. They are managed
by an embedded simple network management protocol (SNMP), secure shell or via a serial console.
There are two types of managed switches: smart switches and enterprise managed switches. Smart
switches fall between unmanaged and managed switches. They offer most of the features of managed
switches without their cost or complexity. A smart switch is able to configure virtual LANs, ports and
set up trucking. Smart switches are ideally used in fast LANs, which are those that support gigabit data
transfer. Enterprise managed switches are also called fully managed switches. They have a wide range
of management features, including a web interface, SNMP agent and command-line interface.
Additional features include the ability to restore, backup, modify and display configurations. They have
more features than traditional managed and unmanaged switches and are generally more expensive.
They are found in large enterprises, which are comprised of a large number of connections and nodes.
Router
Routers connect networks. A router links computers to the Internet, so users can share the connection
(NAT). A router acts as a dispatcher, choosing the best path for information to travel so it's received
quickly.
The router is the only device that sees every message sent by any computer on either of the company's
networks.
The Router looks at the IP Address to route the packets.
All but the most basic of networks require devices to provide connectivity and functionality.
Understanding how these networking devices operate and identifying the functions they perform are
essential skills for any network administrator.
ARP (Address Resolution Protocol):
In computer networking, the Address Resolution Protocol (ARP) is the method for finding a host's
hardware address when only its network layer address is known. ARP is primarily used to translate IP
addresses to Ethernet MAC addresses.
ARP is used in four cases of two hosts communicating:
When two hosts are on the same network and one desires to send a packet to the other
When two hosts are on different networks and must use a gateway/router to reach the other
host.
When a router needs to forward a packet for one host through another router.
When a router needs to forward a packet from one host to the destination host on the same
network
Reverse Address Resolution Protocol (RARP) is a network layer protocol used to resolve an IP address
from a given hardware address (such as an Ethernet address). It has been rendered obsolete by BOOTP
and the more modern DHCP, which both support a much greater feature set than RARP.
RARP is the complement of ARP
PREPARED BY RADHAKRISHNA K
10
NETWORKING ESSENTIALS
1 126*
N.H.H.H
255.0.0.0
128 191
10
N.N.H.H
255.255.0.0
16,382 (214
65,534 (216 2)
2)
192 223
110
N.N.N.H
255.255.255.0
2,097,150
(221 2)
224 239
1110
240 254
1111
254 (28 2)
Note: Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is reserved for loopback and
diagnostic functions.
PREPARED BY RADHAKRISHNA K
11
NETWORKING ESSENTIALS
Subnet Masks:
A network mask helps you know which portion of the address identifies the network and which portion
of the address identifies the node. Class A, B, and C networks have default masks, also known as
natural masks, as shown here:
Default subnet masks:
Class A - 255.0.0.0 - 11111111.00000000.00000000.00000000
Class B - 255.255.0.0 - 11111111.11111111.00000000.00000000
Class C - 255.255.255.0 - 11111111.11111111.11111111.00000000
Private IP Address
Class Private Networks
10.0.0.0
255.0.0.0
192.168.0.0
10.0.0.0 - 10.255.255.255
Subnetting:
Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C
network. If you do not subnet, you are only able to use one network from your Class A, B, or C
network, which is unrealistic.
Each data link on a network must have a unique network ID, with every node on that link being a
member of the same network. If you break a major network (Class A, B, or C) into smaller subnetworks,
it allows you to create a network of interconnecting subnetworks. Each data link on this network would
then have a unique network/subnetwork ID. Any device, or gateway, connecting n
networks/subnetworks has n distinct IP addresses, one for each network / subnetwork that it
interconnects.
In order to subnet a network, extend the natural mask using some of the bits from the host ID portion
of the address to create a subnetwork ID. For example, given a Class C network of 204.17.5.0 which has
a natural mask of 255.255.255.0, you can create subnets in this manner:
204.17.5.0 11001100.00010001.00000101.00000000
255.255.255.224 - 11111111.11111111.11111111.11100000
--------------------------|sub|---By extending the mask to be 255.255.255.224, you have taken three bits (indicated by "sub") from the
original host portion of the address and used them to make subnets. With these three bits, it is possible
to create eight subnets. With the remaining five host ID bits, each subnet can have up to 32 host
addresses, 30 of which can actually be assigned to a device since host ids of all zeros or all ones are not
allowed (it is very important to remember this). So, with this in mind, these subnets have been
created.
204.17.5.0 255.255.255.224
host address range 1 to 30
204.17.5.32 255.255.255.224 host address range 33 to 62
204.17.5.64 255.255.255.224 host address range 65 to 94
204.17.5.96 255.255.255.224 host address range 97 to 126
204.17.5.128 255.255.255.224 host address range 129 to 158
204.17.5.160 255.255.255.224 host address range 161 to 190
204.17.5.192 255.255.255.224 host address range 193 to 222
204.17.5.224 255.255.255.224 host address range 225 to 254
No of subnetworks can be calculated with the Formula 2 to the power of x where x is no bits added to
the network
PREPARED BY RADHAKRISHNA K
12
NETWORKING ESSENTIALS
Routing:
Routing is the process of moving packets through an internetwork, such as the Internet.
Routing actually consists of two separate, but related, tasks:
1. Define paths for the transmission of packets through an internetwork.
2. Forwarding packets based upon the defined paths
Static vs. Dynamic Routing
Routing can be accomplished by manually entering the information necessary for packets to reach any
part of the internetwork into each router. This is called STATIC ROUTING.
Static routing works reasonably well for very small networks, but does not scale well. When using static
routing, the routing tables on each router must be updated each time the network topology changes
such as when a network link fails.
In most networks, routing is managed automatically by dynamic routing. In dynamic routing, routing
protocols create and maintain the routing tables automatically. Dynamic routing responds much more
quickly to network changes (and network failures) than static routing.
Cabling:
A network cabling that connects a computer to a network device. For example, straight through cables
are cables that connect a computer to a network hub, network switch, and network routers. These are
the standard network cables you would find at the store, unless labeled as a cross-over cable.
To create your own network cables you will first need the equipment we have listed below.
1) Cat5, Cat5e, Cat6, or Cat7 cable - This cabling can be purchased in large spindles at stores that
specialize in cabling. Cat5 cabling is the most commonly used cable used today for networks
2) RJ-45 connectors - These connectors can be purchased at most electronic stores and computer
stores and usually come in bulk packages. It's always a good idea to get more than you expect you
will need.
3) Crimping tool - These tools are often purchased at electronic stores such as radio shack. To create
a network cable you will need a crimper that is capable of crimping a RJ-45 cable (not just a RJ-11
cable, which looks similar to a RJ-45).
4) Wire stripper / Knife - If you plan on making several network cables you should also consider
getting a wire stripper cable of stripping Cat5, Cat6, or your cable of choice. If you do not plan on
creating many network cables a knife will suffice. For simplicity and to prevent potential issues we
recommend a wire stripper.
Once you have the necessary equipment needed to create your own network cables you need to
determine the network cable you wish to create. There are two major network cables: a straight
through cable and a crossover cable. Below are some examples of what cable is used for each of the
examples.
Straight Through Wired Cables:
Straight Through refers to cables that have the pin assignments on each end of the cable. In other
words, Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 etc. Straight-Through wired cables
are most commonly used to connect a host to client. When we talk about cat5e patch cables, the
PREPARED BY RADHAKRISHNA K
13
NETWORKING ESSENTIALS
Straight-Through wired cat5e patch cable is used to connect computers, printers, and other network
client devices to the router switch or hub (the host device in this instance).
PREPARED BY RADHAKRISHNA K
14
NETWORKING ESSENTIALS
Network Troubleshooting:
Any troubleshooting task is basically a series of steps. The actual steps you take will vary from problem
to problem. Later steps in the process may depend on the results from earlier steps. Still, it is worth
thinking about and mapping out the steps since doing this will help you remain focused and avoid
needless steps.
There are 7 steps for Network Troubleshooting, and they are
Identify the problem
Establish a theory
Test the theory
Establish a plan of action
Implement the solution or escalate
Verify full system functionality
Document finding, actions and outcomes
Ping: Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP
networks. So, ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)..C :/> ping hostname.com
Example: C :/> ping www.google.com
Netstat:It displays protocol statistics and current TCP/IP network connections. i.e. local address,
remote address, port numbers, etc.
PREPARED BY RADHAKRISHNA K
15
NETWORKING ESSENTIALS
The syntax is (at command prompt)C :/> netstat n
Traceroute: Traceroute is a command, which can show you the path a packet of information takes
from your computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop' from
router to router takes.
The syntax is (at command prompt)..C :/> tracert hostname.com
Ethereal:Ethereal is a freeware sniffing tool that can be used to view packets on the network. This tool
is especially useful to detect any intrusion attempts. It can be used in Linux, UNIX and Windows
operating systems.
Shows the packets that have been captured during the time.
Shows the select packet in 1 in more details. Every option in the 2 window is in
expand/collapse form. If expanded more details of the packet can be observed.
Shows the actual packet captured.
PREPARED BY RADHAKRISHNA K
16