Professional Documents
Culture Documents
ON
NETWORKING
Submitted in partial fulfillment of the requirement for the award of degree of
Bachelors of Technology
In
Computer Science & Engineering
(Batch: )
ACKNOWLEDGEMENT
I owe a great many thanks to a great many people who helped and supported me
during the writing of this report .My deepest thanks to Lecturer Mr __________
the Guide of the project for guiding and correcting various documents of mine with
attention and care. He has taken pain to go through the project and make necessary
correction as and when needed. I express my thanks to the director
[Mr. _________] of, [Networker Mind], for extending his support.
Thanks and appreciation to the helpful people at [____], for their support. I would also thank
my Institution and my faculty members without whom this project would
have been a distant reality. I also extend my heartfelt thanks to my family and well
wishers.
TABLE OF CONTENTS
Sr.No.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Content
What is network?
What is networking?
Network Categories
Network Topology
Network Types
OSI model
Network Cabels
Network Devices
A Small School Network
Software used
Network addressing
Routing Protocols
DHCP
TFTP
Tunneling
Vlan
Appendix
Bibliography
What is a Network?
A network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams.
A computer network connects two or more devices together to share a
nearly limitless range of information and services, including:
Documents
Email and messaging
Websites
Databases
Music
Printers and faxes
Telephony and videoconferencing
What is networking?
Networks consist of the computers, wiring, and other devices, such as hubs, switches and
routers, that make up the network infrastructure. Some devices, such as network interface
cards, serve as the computers connection to the network. Devices such as switches and
routers provide traffic- control strategies for the network. All sorts of different technologies
can actually be employed to move data from one place to another, including wires, radio
waves, and even microwave technology.
Network Categories
There are two main types of network categories which are:
Server based
Peer-to-peer
Client/Server Networks
Server based networks, or client/server networks as they are properly called, has a machine
at the heart of its operations called the server. A server is a machine that provides services
over a network by responding to client requests. Servers rarely have individuals operating it,
and even then, it is usually to install, configure or manage its capabilities. The server's
essential role on the network is to be continuously available to handle the many requests
generated by its clients.
Server-based networks provide centralised control of the entire network environment. The
computer systems used for this role are generally more powerful than end-user machines,
incorporating faster CPUs, more memory, larger disk drives and other drive types installed,
like a tape drive for backup purposes. These are required, because servers are dedicated to
handling multiple simultaneous requests from their client communities.
Server based networks provide centralised verification of user accounts and passwords. Only
valid account name and password combinations are allowed access to the network.
Client/Server networks typically require a single login to the network itself, meaning that
users need to remember long password lists to access various resources. Concentrations of
resources on a single server, mean that they are easier to find, as opposed to the peer-to-peer
model, were resources were distributed throughout the network since they were attached to
multiple machines. The server being a central data repository, means that not only is data
more accessible to users, but it also makes life much easier in terms of performing backups,
since the data is in a location know to the administrator.
Server-based networks are easier to scale. Peer-to-peer networks bog down seriously as they
grow beyond ten users, and serious slow up with 20 users. On the other hand, client/server
networks can handle a few users, up to a thousand users as such networks grow to keep pace
with an organisations growth and expansion.
Unlike peer-to-peer networks, client/server networks don't come cheap. The server machine
itself may cost several thousands of pounds, along with the software to make it run; another
thousand pounds. Because of the complex nature of this kind of networking environment, a
dedicated administrator is required to be on site at all times to be involved in the day to day
running of the network. Hiring an individual of this nature adds considerably to the cost of
client/server networks.
Lastly, because the networks operability is so dependant upon the server, this introduces a
single point of failure, if the server goes down the network goes down. There are measures
available, that can legislate for such failures, however these techniques add even more cost to
this solution.
Advantages
Disadvantages
Peer-to-Peer Networking
This is a simple network configuration that requires some basic know-how to set up. Each of
the interconnected machines share dual capability and responsibility on the network. That is
to say, that each machine serves a dual purpose or role, i.e. they are both clients and servers
to some extent.
The server capability of the machines is very basic. The services provided by each, is no
more than the ability to share resources like files, folders, disk drives and printers. They even
have the ability to share Internet access.
However, the server functionality of these machines stops there. They cannot grant any of the
benefits mentioned previously, since these are functions provided only by a dedicated server
operating system.
Because all machines on the network have equal status, hence the term peers, there is no
centralised control over shared resources. Sharing is endorsed or repealed by each machine's
user. Passwords can be assigned to each individual shared resource whether it is a file, folder,
drive or peripheral, again done by the user.
Although this solution is workable on small networks, it introduces the possibility that users
may have to know and remember the passwords assigned to every resource, and then re-learn
them if the user of a particular machine decides to change them! Due to this flexibility and
individual discretion, institutionalised chaos is the norm for peer-to-peer networks.
Security can also be a major concern, because users may give passwords to other
unauthorised users, allowing them to access areas of the network that the company does not
permit. Furthermore, due to lack of centralisation, it is impossible for users to know and
remember what data lives on what machine, and there are no restrictions to prevent them
from over-writing the wrong files with older versions of the file.
It may appear that peer-to-peer networks are hardly worthwhile. However, they offer some
powerful incentives, particularly for smaller organisations. Networks of this type are the
cheapest and easiest to install, requiring only Windows95, a network card for each machine
and some cabling. Once connected, users can start to share information immediately and get
access to devices.As a result, networks of this type are not scalable and a limit of no more
Advantages
Disadvantages
The network topology describes the method used to do the physical wiring of the network.
The main ones are bus,
star, and ring.
1. Bus - Both ends of the network must be terminated with a terminator. A barrel
connector can be used to extend it.
2. Star - All devices revolve around a central hub, which is what controls the network
communications, and can communicate with other hubs. Range limits are about 100
meters from the hub.
3. Ring - Devices are connected from one to another, as in a ring. A data token is used to
grant permission for each computer to communicate.
There are also hybrid networks including a star-bus hybrid, star-ring network, and mesh
networks with connections between various computers on the network. Mesh networks
ideally allow each computer to have a direct connection to each of the other computers. The
topology this documentation deals with most is star topology since that is what ethernet
networks use.
Network types are often defined by function or size. The two most common categories of
networks are:
Other networks:A MAN (Metropolitan Area Network) is another category of network, though the term is not
prevalently used. A MAN is defined as a network that connects LANs across a city-wide
geographic area.
An internetwork is a general term describing multiple networks connected together. The
Internet is the largest and most well-known internetwork. Some networks are categorized by
their function, as opposed to their size.
A SAN (Storage Area Network) provides systems with high-speed, lossless access to
high-capacity storage devices.
A VPN (Virtual Private Network) allows for information to be securely sent across a
public or unsecure network, such as the Internet. Common uses of a VPN are to connect
branch offices or remote users to a main office.
What is a Protocol?
A protocol is a set of rules that governs the communications between computers on a network. In
order for two computers to talk to each other, they must be speaking the same language. Many
different types of network protocols and standards are required to ensure that your computer (no
matter which operating system, network card, or application you are using) can communicate
with another computer located on the next desk or half-way around the world. The OSI (Open
Systems Interconnection) Reference Model defines seven layers of networking protocols.
The OSI model consists of seven layers, each corresponding to a specific network function:
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data-link
1 Physical
ISO further developed an entire protocol suite based on the OSI model; however, the OSI
protocol suite was never widely implemented. The OSI model itself is now somewhat deprecated
modern protocol suites, such as the TCP/IP suite, are difficult to fit cleanly within the OSI
models seven layers. This is especially true of the upper three layers. The bottom (or lower) four
layers are more clearly defined, and terminology from those layers is still prevalently used. Many
protocols and devices are described by which lower layer they operate at.
The Presentation layer (Layer-6) controls the formatting and syntax of user data for the
application layer. This ensures that data from the sending application can be understood by the
receiving application. Standards have been developed for the formatting of data types, such as
text, images, audio, and video. Examples of Presentation layer formats include:
Text - RTF, ASCII, EBCDIC
Images - GIF, JPG, TIF
Audio - MIDI, MP3, WAV
Movies - MPEG, AVI, MOV
If two devices do not support the same format or syntax, the Presentation layer can provide
conversion or translation services to facilitate communication.
Additionally, the Presentation layer can perform encryption and compression of data, as required.
However, these functions can also be performed at lower layers as well. For example, the
Network layer can perform encryption, using IPSec.
The Transport layer (Layer-4) does not actually send data, despite itsname. Instead, this layer is
responsible for the reliable transfer of data, byensuring that data arrives at its destination errorfree and in order.
Transport layer communication falls under two categories:
Connection-oriented requires that a connection with specificagreed-upon parameters be
established before data is sent.
Connectionless requires no connection before data is sent.Connection-oriented protocols
provide several important services:
Segmentation and sequencing data is segmented into smallerpieces for transport. Each
segment is assigned a sequence number, sothat the receiving device can reassemble the data on
arrival.
Connection establishment connections are established, maintained, and ultimately
terminated between devices.
Acknowledgments receipt of data is confirmed through the use of acknowledgments.
Otherwise, data is retransmitted, guaranteeing delivery.
Flow control (or windowing) data transfer rate is negotiated to prevent congestion.
The TCP/IP protocol suite incorporates two Transport layer protocols:
Transmission Control Protocol (TCP) connection-oriented
User Datagram Protocol (UDP) connectionless
Additionally, the LLC sublayer can perform flow-control and error checking, though such
functions are often provided by Transport layerprotocols, such as TCP.
The MAC sublayer controls access to the physical medium, serving as mediator if multiple
devices are competing for the same physical link. Datalink layer technologies have various
methods of accomplishing this Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD), and Token
Ring utilizes a token. Ethernet is covered in great detail in another guide.
The Data-link layer packages the higher-layer data into frames, so that the data can be put onto
the physical wire. This packaging process is referred to as framing or encapsulation.
The encapsulation type will vary depending on the underlying technology.
Common Data-link layer technologies include following:
Ethernet the most common LAN data-link technology
Token Ring almost entirely deprecated
FDDI (Fiber Distributed Data Interface)
802.11 Wireless
Frame-Relay
ATM (Asynchronous Transfer Mode)
The data-link frame contains the source and destination hardware (or physical) address.
Hardware addresses uniquely identify a host within a network, and are often hardcoded onto
physical network interfaces.
However, hardware addresses contain no mechanism for differentiating one network from
another, and can only identify a host within a network.
The most common hardware address is the Ethernet MAC address.
Network Cables
Primary Cable Types
The vast majority of networks today are connected by some sort of wiring or cabling that acts as
a network transmission medium that carries signals between computers. Many cable types are
available to meet the varying needs and sizes of networks, from small to large.
Cable types can be confusing. Belden, a leading cable manufacturer, publishes a catalog that lists
more than 2200 types of cabling. Fortunately, only three major groups of cabling connect the
majority of networks:
Coaxial cable
Twisted-pair (unshielded and shielded) cable
Fiber-optic cable
The next part of this lesson describes the features and components of these three major cable
types. Understanding their differences will help you determine which type of cabling is
appropriate in a given context.
Coaxial Cable
At one time, coaxial cable was the most widely used network cabling. There were a couple of
reasons for coaxial cable's wide usage: it was relatively inexpensive, and it was light, flexible,
and easy to work with.
In its simplest form, coaxial cable consists of a core of copper wire surrounded by insulation, a
braided metal shielding, and an outer cover. Figure 2.1 shows the various components that make
up a coaxial cable.
The term shielding refers to the woven or stranded metal mesh (or other material) that surrounds
some types of cabling. Shielding protects transmitted data by absorbing stray electronic signals,
called noise, so that they do not get onto the cable and distort the data. Cable that contains one
layer of foil insulation and one layer of braided metal shielding is referred to as dual shielded.
For environments that are subject to higher interference, quad shielding is available. Quad
shielding consists of two layers of foil insulation and two layers of braided metal shielding.
The stranded, protective sleeve absorbs stray electronic signals so that they do not affect data
being sent over the inner copper cable. For this reason, coaxial cabling is a good choice for
longer distances and for reliably supporting higher data rates with less sophisticated equipment.
Which type of coaxial cable you select depends on the needs of your particular network.
Thinnet Cable Thinnet cable is a flexible coaxial cable about 0.64 centimeters (0.25 inches)
thick. Because this type of coaxial cable is flexible and easy to work with, it can be used in
almost any type of network installation. Figure shows thinnet cable connected directly to a
computer's network interface card (NIC).
RG-58 coaxial cable showing stranded wire and solid copper cores
Thicknet Cable Thicknet cable is a relatively rigid coaxial cable about 1.27 centimeters (0.5
inches) in diameter. Figure shows the difference between thinnet and thicknet cable. Thicknet
cable is sometimes referred to as Standard Ethernet because it was the first type of cable used
with the popular network architecture Ethernet. Thicknet cable's copper core is thicker than a
thinnet cable core.
Thicknet cable transceiver with detail of a vampire tap piercing the core
Thinnet vs. Thicknet Cable As a general rule, the thicker the cable, the more difficult it is to
work with. Thin cable is flexible, easy to install, and relatively inexpensive. Thick cable does not
bend easily and is, therefore, harder to install. This is a consideration when an installation calls
for pulling cable through tight spaces such as conduits and troughs. Thick cable is more
expensive than thin cable, but will carry a signal farther.
Coaxial-Cable Grades and Fire Codes
The type of cable grade that you should use depends on where the cables will be laid in your
office. Coaxial cables come in two grades:
Polyvinyl chloride (PVC) is a type of plastic used to construct the insulation and cable jacket for
most types of coaxial cable. PVC coaxial cable is flexible and can be easily routed through the
exposed areas of an office. However, when it burns, it gives off poisonous gases.
A plenum is the shallow space in many buildings between the false ceiling and the floor above; it
is used to circulate warm and cold air through the building. Figure 2.11 shows a typical office
and where to useor not usePVC and plenum-grade cables. Fire codes give very specific
instructions about the type of wiring that can be routed through this area, because any smoke or
gas in the plenum will eventually blend with the air breathed by everyone in the building.
Plenum-grade cabling contains special materials in its insulation and cable jacket. These
materials are certified to be fire resistant and produce a minimum amount of smoke; this reduces
poisonous chemical fumes. Plenum cable can be used in the plenum area and in vertical runs (for
example, in a wall) without conduit. However, plenum cabling is more expensive and less
flexible than PVC cable.
You should consult your local fire and electrical codes for specific regulations and requirements
for running networking cable in your office.
Coaxial-Cabling Considerations
Consider the following coaxial capabilities when making a decision about which type of cabling
to use.
Use coaxial cable if you need a medium that can:
Twisted-Pair Cable
In its simplest form, twisted-pair cable consists of two insulated strands of copper wire twisted
around each other. Figure 2.12 shows the two types of twisted-pair cable: unshielded twistedpair (UTP) and shielded twisted-pair (STP) cable.
The 568A Commercial Building Wiring Standard of the Electronic Industries Association and the
Telecommunications Industries Association (EIA/TIA) specifies the type of UTP cable that is to
be used in a variety of building and wiring situations. The objective is to ensure consistency of
products for customers. These standards include five categories of UTP:
Category 1 This refers to traditional UTP telephone cable that can carry voice but not
data transmissions. Most telephone cable prior to 1983 was Category 1 cable.
Category 2 This category certifies UTP cable for data transmissions up to 4 megabits per
second (Mbps). It consists of four twisted pairs of copper wire.
Category 3 This category certifies UTP cable for data transmissions up to 16 Mbps. It
consists of four twisted pairs of copper wire with three twists per foot.
Category 4 This category certifies UTP cable for data transmissions up to 20 Mbps. It
consists of four twisted pairs of copper wire.
Category 5 This category certifies UTP cable for data transmissions up to 100 Mbps. It
consists of four twisted pairs of copper wire.
Most telephone systems use a type of UTP. In fact, one reason why UTP is so popular is because
many buildings are prewired for twisted-pair telephone systems. As part of the prewiring
process, extra UTP is often installed to meet future cabling needs. If preinstalled twisted-pair
cable is of sufficient grade to support data transmission, it can be used in a computer network.
Caution is required, however, because common telephone wire might not have the twisting and
other electrical characteristics required for clean, secure, computer data transmission.
One potential problem with all types of cabling is crosstalk. Figure shows crosstalk between two
UTP cables. (As discussed earlier in this lesson, crosstalk is defined as signals from one line
interfering with signals from another line.) UTP is particularly susceptible to crosstalk, but the
greater the number of twists per foot of cable, the more effective the protection against crosstalk.
Crosstalk occurs when signals from one line bleed into another line
STP cable
Use twisted-pair cable if:
Fiber-Optic Cable
In fiber-optic cable, optical fibers carry digital data signals in the form of modulated pulses of
light. This is a relatively safe way to send data because, unlike copper-based cables that carry
data in the form of electronic signals, no electrical impulses are carried over the fiber-optic cable.
This means that fiberoptic cable cannot be tapped, and its data cannot be stolen.Fiber-optic cable
is good for very high-speed, high-capacity data transmission because of the purity of the signal
and lack of signal attenuation.
Fiber-Optic Cable Composition
An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a
concentric layer of glass, known as the cladding. The fibers are sometimes made of plastic.
Plastic is easier to install, but cannot carry the light pulses for as long a distance as glass.
Because each glass strand passes signals in only one direction, a cable includes two strands in
separate jackets. One strand transmits and one receives. A reinforcing layer of plastic surrounds
each glass strand, and Kevlar fibers provide strength. See Figure for an illustration of fiber-optic
cable. The Kevlar fibers in the fiber-optic connector are placed between the two cables. Just as
their counterparts (twisted-pair and coaxial) are, fiber-optic cables are encased in a plastic
coating for protection.
Fiber-optic cable
Fiber-optic cable transmissions are not subject to electrical interference and are extremely fast,
currently transmitting about 100 Mbps with demonstrated rates of up to 1 gigabit per second
(Gbps). They can carry a signalthe light pulsefor many miles.
Fiber-Optic Cabling Considerations
Use fiber-optic cable if you:
Need to transmit data at very high speeds over long distances in very secure media.
Network devices
A Network card (also called a Network Adapter or Network Interface Card, or NIC for short)
acts as the interface between a computer and a network cable. The purpose of the network card is
to prepare, send, and control data on the network.
The orange (10 Mb/s) or red (100 Mb/s) LED indicates network activity (sending or
receiving data).
To prepare data to be sent the network card uses a transceiver, which transforms parallel data into
serial data. Each cart has a unique address, called a MAC address, assigned by the card's
manufacturer, which lets it be uniquely identified among all the network cards in the world.
Network cards have settings which can be configured. Among them are hardware
interrupts (IRQ), the I/O address and the memory address (DMA).
To ensure that the computer and network are compatible, the card must be suitable for the
computer's data bus architecture, and have the appropriate type of socket for the cable. Each card
is designed to work with a certain kind of cable. Some cards include multiple interface
connectors (which can be configured using jumpers, DIP switches, or software). The most
commonly used are RJ-45 connectors.
Note: Certain proprietary network topologies which use twisted pair cables employ RJ11 connectors. These topologies are sometimes called "pre-10BaseT ".
Finally, to ensure that the computer and network are compatible, the card must by compatible
with the computer's internal structure (data bus architecture) and have a connector suitable for
the kind of cabling used.
Hubs
A special type of network device called the hub can be found in many home and small business
networks. Though they've existed for many years, the popularity of hubs has exploded recently,
especially among people relatively new to networking.
A hub is a small rectangular box, often made of plastic, that receives its power from an ordinary
wall outlet. A hub joins multiple computers (or other network devices) together to form a single
network segment. On this network segment, all computers can communicate directly with each
other. Ethernet hubs are by far the most common type, but hubs for other types of networks such
as USB also exist.
A hub includes a series of ports that each accept a network cable. Small hubs network four
computers. They contain four or sometimes five ports, the fifth port being reserved for "uplink"
connections to another hub or similar device. Larger hubs contain eight, 12, 16, and even 24
ports.
passive
active
intelligent
Passive hubs do not amplify the electrical signal of incoming packets before broadcasting them
out to the network.
Active hubs, on the other hand, do perform this amplification, as does a different type of
dedicated network device called a repeater. Some people use the terms concentrator when
referring to a passive hub and multiport repeater when referring to an active hub.
Intelligent hubs add extra features to an active hub that are of particular importance to businesses.
An intelligent hub typically is stackable (built in such a way that multiple units can be placed one
on top of the other to conserve space). It also typically includes remote management capabilities
via SNMPand virtual LAN (VLAN) support.
Hubs remain a very popular device for small networks because of their low cost.
A network switch is a small hardware device that joins multiple computers together within
one local area network (LAN). Technically, network switches operate at layer two (Data Link
Layer) of the OSI model.
Switches
Network switches appear nearly identical to network hubs, but a switch generally contains more
intelligence (and a slightly higher price tag) than a hub. Unlike hubs, network switches are
capable of inspecting data packets as they are received, determining the source and destination
device of each packet, and forwarding them appropriately. By delivering messages only to the
connected device intended, a network switch conserves network bandwidth and offers generally
better performance than a hub.
As with hubs, Ethernet implementations of network switches are the most common. Mainstream
Ethernet network switches support either 10/100Mbps Fast Ethernet or Gigabit
Ethernet(10/100/1000) standards.
Different models of network switches support differing numbers of connected devices. Most
consumer-grade network switches provide either four or eight connections for Ethernet devices.
Switches can be connected to each other, a so-called daisy chaining method to add progressively
larger number of devices to a LAN.
HUB vs SWITCH
hub:- It is a multiple-port repeater. any signals send via the hub is transmitted to all the the ports
on the hub
switch:- It transmit data only to the destination port.
hub: Each port of hub is collision domain&broadcast domain
switch: Each port of switch is collision domain & each vlan is broadcast domain
hub: is layer 1 device which do not breaks collision domain.ie if more devices are added the
bandwith will be shared.
switch is layer 2 device which breaks collision domain.ie every device connected to the switch
has the equal bandwidth.
Router
A router is specialized computer connected to more than one network running software that
allows the router to move data from one networkto another. Routers operate at the network layer
(OSI Model's layer 3). The primary function of a router is to connect networks together and keep
certain kinds of broadcast traffic under control. There are several companies that make
routers:Cisco (Linksys), Juniper, Nortel (Bay Networks),Redback, Lucent, 3Com, and HP just to
name a few.
Routers used in networks perform the following functions:
1.
Restrict broadcasts to the LAN
2.
Act as the default gateway.
3.
Move (route) data between networks
4.
Learn and advertise loop free paths
RESTRICT BROADCASTS TO THE LAN
Networks (especially Ethernet networks use broadcast communication at
the physical,datalink and network layer. Network layer broadcasts are transmissions sent to all
hosts using the network layer protocol (usually Internet Protocol [IP] or
IPX). Network broadcastcommunication is used to communicate certain kinds of information
that makes the networkfunction (ARP, RARP, DHCP, IPX-SAP broadcasts etc.). Since several
devices could attempt to transmit simultaneously and cause collisions, it is preferable to separate
large sets of hosts into different broadcast domains using a switch, or router.
As the number of hosts on the network increases, the amount of broadcast traffic increases. If
enough broadcast traffic is present on the network, then ordinary communication across
the network becomes difficult.
To reduce broadcasts, a network administrator can break up a network with a large number of
hosts into two smaller networks. Broadcasts are then restricted to each network, and the router
performs as the 'default gateway' to reach the hosts on the other networks.
routers ends up passing the data around in a circle, without reaching the destination, it's called a
'routing loop'. Packets get tossed around the loop until they die of old age: their 'Time To Live'
counter in the IP datagram is decremented as it passes through each router and eventually it
reaches zero and is discarded.
Software Used:-
GNS3 is an excellent complementary tool to real labs for network engineers, administrators and
people wanting to study for certifications such as Cisco CCNA, CCNP, CCIP and CCIE as well
as Juniper JNCIA, JNCIS and JNCIE.
It can also be used to experiment features of Cisco IOS, Juniper JunOS or to check
configurations that need to be deployed later on real routers.
Thanks to VirtualBox integration, now even system engineers and administrators can take
advantage of GNS3 to make labs and study for Redhat (RHCE, RHCT), Microsoft (MSCE,
MSCA), Novell (CLP) and many other vendor certifications.
This project is an open source, free program that may be used on multiple operating systems,
including Windows, Linux, and MacOS X
Network addressing
Routing protocols
Dhcp
Tftp
Tunneling
Vlan
Network addressing
IP addresses are broken into 4 octets (IPv4) separated by dots called dotted decimal notation. An
octet is a byte consisting of 8 bits. The IPv4 addresses are in the following form:
192.168.10.1
There are two parts of an IP address:
Network ID
Host ID
The various classes of networks specify additional or fewer octets to designate the network ID
versus the
host ID.
When a network is set up, a netmask is also specified. The netmask determines the class of the
network except for CIDR. When the netmask is setup, it specifies some number of most
significant bits with a 1's value and the rest have values of 0. The most significant part of the
netmask with bits set to 1's specifies the network address, and the lower part of the address will
specify the host address. When setting addresses on a network, remember there can be no host
address of 0 (no host address bits set), and there can be no host address with all bits set.
l 10.x.x.x
l 172.16.x.x - 172.31.x.x
l 192.168.x.x
Routing protocols
We use two routing protocols in our school network :-
1.static routing
Configuring Static Routes
The basic syntax for a static route is as follows:
Router(config)# ip route [destination_network] [subnet_mask] [next-hop]
Consider the following example:
RouterA will have the 172.16.0.0/16 and 172.17.0.0/16 networks in its routing table as directlyconnected routes. To add a static route on RouterA, pointing to the 172.18.0.0/16 network off of
RouterB: RouterA(config)# ip route 172.18.0.0 255.255.0.0 172.17.1.2
Notice that we point to the IP address on RouterBs fa0/0 interface as the next-hop address.
Likewise, to add a static route on RouterB, pointing to the 172.16.0.0/16 network off of RouterA:
RouterB(config)# ip route 172.16.0.0 255.255.0.0 172.17.1.1 To remove a static route, simply
type no in front of it: RouterA(config)# no ip route 172.18.0.0 255.255.0.0 172.17.1.2
On point-to-point links, an exit-interface can be specified instead of a next hop address. Still
using the previous diagram as an example:
RouterA(config)# ip route 172.18.0.0 255.255.0.0 fa0/1
RouterB(config)# ip route 172.16.0.0 255.255.0.0 fa0/0
A static route using an exit-interface has an Administrative Distance of 0, as opposed to the
default AD of 1 for static routes. An exit-interface is only functional on a point-to-point link, as
there is only one possible next-hop device.
Advertisements (LSAs).
OSPF sends updates (LSAs) when there is a change to one of its links, and will only send the
change in the update. LSAs are additionally refreshed every 30 minutes.
OSPF traffic is multicast either to address 224.0.0.5 (all OSPF routers) or 224.0.0.6 (all
Designated Routers).
OSPF uses the Dijkstra Shortest Path First algorithm to determine the shortest path.
OSPF is a classless protocol, and thus supports VLSMs. Other characteristics of OSPF include:
OSPF supports only IP routing.
OSPF routes have an administrative distance is 110.
OSPF uses cost as its metric, which is computed based on the bandwidth of the link. OSPF has
no hop-count limit.
OSPF Neighbors
OSPF forms neighbor relationships, called adjacencies, with other routers inthe same Area by
exchanging Hello packets to multicast address 224.0.0.5.Only after an adjacency is formed can
routers share routing information. Each OSPF router is identified by a unique Router ID. The
Router ID can be determined in one of three ways:
The Router ID can be manually specified.
If not manually specified, the highest IP address configured on any Loopback interface on the
router will become the Router ID.
If no loopback interface exists, the highest IP address configured on any Physical interface will
become the Router ID.
By default, Hello packets are sent out OSPF-enabled interfaces every 10 seconds for broadcast
and point-to-point interfaces, and 30 seconds for non broadcast and point-to-multipoint
interfaces. OSPF also has a Dead Interval, which indicates how long a router will wait
without hearing any hellos before announcing a neighbor as down. Default for the Dead
Interval is 40 seconds for broadcast and point-to-point interfaces, and 120 seconds for nonbroadcast and point-to-multipoint interfaces. Notice that, by default, the dead interval timer is
four times the Hello interval.
These timers can be adjusted on a per interface basis:
Router(config-if)# ip ospf hello-interval 15
Router(config-if)# ip ospf dead-interval 60
for a new lease. If the lease expires, the client will send a request as in the initial boot when the
client had no IP address. If this fails, the client TCP/IP stack will cease functioning.
Client Reservation
Client Reservation is used to be sure a computer gets the same IP address all the time. Therefore
since DHCP IP addressassignments use MAC addresses to control assignments, the following are
required for client reservation:
l MAC (hardware) address
l IP address
Exclusion Range
Exclusion range is used to reserve a bank of IP addresses so computers with static IP addresses,
such as servers may usethe assigned addresses in this range. These addresses are not assigned by
the DHCP server.
Tftp server
Trivial File Transfer Protocol (TFTP) is a simple protocol to transfer files. It has been
implemented on top of the User Datagram Protocol (UDP) using port number 69. TFTP is
designed to be small and easy to implement, and therefore it lacks most of the features of a
regular FTP. TFTP only reads and writes files (or mail) from/to a remote server. It cannot list
directories, and currently has no provisions for user authentication.
In TFTP, any transfer begins with a request to read or write a file, which also serves to request a
connection. If the server grants the request, the connection is opened and the file is sent in fixed
length blocks of 512 bytes. Each data packet contains one block of data, and must be
acknowledged by an acknowledgment packet before the next packet can be sent. A data packet of
less than 512 bytes signals termination of a transfer. If a packet gets lost in the network, the
intended recipient will timeout and may retransmit his last packet (which may be data or an
acknowledgment), thus causing the sender of the lost packet to retransmit that lost packet. The
sender has to keep just one packet on hand for retransmission, since the lock step
acknowledgment guarantees that all older packets have been received. Notice that both machines
involved in a transfer are considered senders and receivers. One sends data and receives
acknowledgments, the other sends acknowledgments and receives data.
TFTP typically uses UDP as its transport protocol, but it is not a requirement. Data transfer is
initiated on port 69, but the data transfer ports are chosen independently by the sender and
receiver during initialization of the connection. The ports are chosen at random according to the
parameters of the networking stack, typically from the range of Ephemeral ports.
Tunneling
An IP tunnel is an Internet Protocol (IP) network communications channel between two
networks. It is used to transport another network protocol by encapsulation of its packets.
IP tunnels are often used for connecting two disjoint IP networks that don't have a native routing
path to each other, via an underlying routable protocol across an intermediate transport network.
In conjunction with the IPsec protocol they may be used to create a virtual private
network between two or more private networks across a public network such as the Internet.
Another prominent use is to connect islands of IPv6 installations across the IPv4 Internet.
In IP tunnelling, every IP packet, including addressing information of its source and destination
IP networks, is encapsulated within another packet format native to the transit network.
At the borders between the source network and the transit network, as well as the transit network
and the destination network, gateways are used that establish the end-points of the IP tunnel
across the transit network. Thus, the IP tunnel endpoints become native IP routers that establish a
standard IP route between the source and destination networks. Packets traversing these endpoints from the transit network are stripped from their transit frame format headers and trailers
used in the tunnelling protocol and thus converted into native IP format and injected into the IP
stack of the tunnel endpoints. In addition, any other protocol encapsulations used during transit,
such as IPsec or Transport Layer Security, are removed.
IP in IP, sometimes called ipencap, is an example of IP encapsulation within IP and is described
in RFC 2003. Other variants of the IP-in-IP variety are IPv6-in-IPv4 (6in4) and IPv4-in-IPv6
(4in6).
IP tunneling often bypasses simple firewall rules transparently since the specific nature and
addressing of the original datagrams are hidden. Content-control software is usually required to
block IP tunnels.
Advantages of VLANs
VLANs provide the following advantages:
Broadcast Control In a pure Layer-2 environment, broadcasts are received by every host on the
switched network. In contrast, each VLAN belongs to its own broadcast domain (or IP subnet);
thus broadcast traffic from one VLAN will never reach another VLAN.
Security VLANs allow administrators to logically separate users and departments.
Flexibility and Scalability VLANs remove the physical boundaries of a network. Users and
devices can be added or moved anywhere on the physical network, and yet remain assigned to
the same VLAN. Thus, access to resources will never be interrupted.
VLAN Membership
VLAN membership can be configured one of two ways:
Statically Individual (or groups of) switch-ports must be manually assigned to a VLAN. Any
device connecting to that switch-port(s) becomes a member of that VLAN. This is a transparent
process the client device is unaware that it belongs to a specific VLAN.
Dynamically Devices are automatically assigned into a VLAN based on its MAC address.
This allows a client device to remain in the same VLAN, regardless of which switch port the
device is attached to. Cisco developed a dynamic VLAN product called the VLAN Membership
Policy Server (VMPS). In more sophisticated systems, a users network account can be used to
determine VLAN membership, instead of a devices MAC address. Catalyst switches that
participate in a VTP domain (explained shortly) support up to 1005 VLANs. Catalyst switches
configured in VTP transparent mode support up to 4094 VLANs.
Static VLAN Configuration
The first step in configuring VLANs is to create the VLAN:
Switch(config)# vlan 100
Switch(config-vlan)# name MY_VLAN
The first command creates VLAN 100, and enters VLAN configuration mode. The second
command assigns the name MY_VLAN to this VLAN.
Naming a VLAN is not required.
The list of VLANs is stored in Flash in a database file named vlan.dat. However, information
concerning which local interfaces are assigned to a specific VLAN is not stored in this file; this
information is instead stored in the startup-config file of each switch. Next, an interface (or range
of interfaces) must be assigned to this VLAN. The following commands will assign interface
fa0/10 into the newly created
MY_VLAN.
Switch(config)# interface fa0/10
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 100
The first command enters interface configuration mode. The second command indicates that this
is an access port, as opposed to a trunk port (explained in detail shortly). The third command
assigns this access port to VLAN 100. Note that the VLAN number is specified, and not the
VLAN name.
To view the list of VLANs, including which ports are assigned to each VLAN:
Switch# show vlan
VLAN Name Status Ports
----------------------------------------------1
default
active
fa0/1-9,11-24
100
MY_VLAN
active
fa0/10
1002
fddidefault
suspended
1003
token-ring
-default
suspended
1004
fddinet
-default
suspended
Appendix
Dhcp
Static routing
Ipv6
Ipv6(ospf)
tftp
tunneling
Vlan
Bibliography