Beruflich Dokumente
Kultur Dokumente
ON
Bachelor of Technology
in
Computer Science Engineering
1
ACKNOWLEDGEMENT
I would like to thank all the staff and the members of BSES/BYPL.
At last I would like to extend my sincere thanks to all the respondents to whom I visited
for giving their support and valuable information, which helped in completing my
project report.
2
PREFACE
As a part of the partial fulfillment of the B.Tech (C.S.E) program at Maharaja Surajmal
Institute of Technology, Janakpuri, 6 weeks summer training was done with
BSES/BYPL Karkardooma (Head Office), Delhi.
My aim during this summer training was to get acquainted with the industrial
environment and learn about the basics of computer networking and troubleshooting
and gain practical knowledge of the same.
This project report describes what was learnt at the above mentioned organization. The
report describes in detail fundamentals of networking, basic computer administration
and troubleshooting.
3
INDEX
i. Acknowledgement 2
ii. Preface 3
iii. Certificate
1. Company Profile 6
2. Softwares used in BSES 7
3. Introduction to Networking 10
What is networking?
Benefits of networking
4. Categories of networks 11
LAN
WAN
MAN
Internetwork
Client-Server
Peer-to-Peer
5. Network topologies 16
Star topology
Bus topology
Ring topology
Mesh topology
6. Networking Hardware 19
Hub
Switch
Repeater
Bridge
Brouter
Gateway
NIC
7. Network Architectures 26
Ethernet
Token Ring
FDDI
ATM
LocalTalk
8. Cables used in Networking 30
Twisted Pair cable
STP cable
4
UTP cable
Coaxial cable
Fiber optic cable
Wireless LAN
9. OSI 36
What is it and why is it important?
7 layers of the OSI model
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
10. Protocols 45
DHCP
TCP/IP suite
TCP
IP
IP addressing
Subnetting
IPv6
UDP
DNS
11. Sharing resources in a network 54
12. Network Troubleshooting 55
13. Basic administration 58
Formatting
Partitioning
Booting
File systems 62
Computer Management 66
Installation of softwares by domain users 68
Registry Editor 68
Group Policy 70
Back up 71
14. Troubleshooting 72
Remote Assistance 75
iv. Bibliography 76
5
COMPANY PROFILE
BSES-YPL stands for Bombay Sub-urban Electricity Services Yamuna Power Limited.
It is a Public Private Partnership (PPP) organization and is the smallest of the three
private distribution companies (discoms) in Delhi. The company supplies electricity to
over 10.46 lakh customers, covering a population base of nearly 42 lakh in Central and
East Delhi. For better management of its customer base, the company serves its
customers through three circles, further subdivided into 14 Divisions, each managed by
an empowered group of officials. The department categorization in BSES YPL at each
division is as follows:
• Admin
• Human Resources (HR)
• Information Technology (IT)
• Finance & Accounts
• EHV
• Customer Care
• O & M, etc...
BSES is a type of LAN. Each division in itself is a LAN. Networking plays a very
important role in the organization for sharing resources over the entire organization.
The main network server is located at the head office at Nehru Place with rest of the
divisions being domains. Karkardooma division has its own administrator and server
with all the remaining client PCs.
6
SOFTWARES USED IN BSES
1. SYMANTEC
It is the antivirus software used in BSES for protection of the computer data. Symantec
Version 11 is used. Scanning is scheduled itself for a particular date and time.
The IP address 10.8.51.60 is used for updation of the antivirus.
It is a very useful software for email purposes. Each domain user in the LAN network
has its own account with user id and password. This software is also used to log the
calls (troubleshooting problems faced by domain users) that are fulfilled by the IT
engineers.
FEATURES
• Provides a robust and productive user experience with a single point of access
to email, calendars, contacts, activities, instant messaging, feeds, office
documents, collaboration tools and business applications.
• Helps users manage their ever-growing inboxes effectively, with full-text
search, delegation, mail filtering and sorting, conversation views and flags.
• Helps increase user productivity with customizable widgets that can recognize
specific patterns of text in Lotus Notes documents; recognized text can be
7
clicked to perform the appropriate business action associated with that widget,
such as retrieving information from a flight number in an e-mail.
• Helps users instantly locate and connect with resources via presence awareness,
business cards and instant messaging incorporated in context within the inbox
and calendar.
• Helps minimize or eliminate the impact of computer viruses through robust
security features.
• Helps drive business value through composite application technology that
allows you to integrate and present line-of-business solutions and data from
multiple systems into a single view for end-users.
• Helps users to be productive even when disconnected from the network with
advanced replication technology.
3. MS OFFICE 2003
MS OFFICE 2003 is used for basic office services like MS WORD, MS EXCEL,
MSPOWERPOINT, etc.. A customized installation is done.
The WinZip and WinRAR softwares are used for file archiving and compressing,
archive managing, etc..
5. CAS
CAS is Consumer Application Support. This software is used in the consumer care
department for consumer related queries, complaints, electricity bills, metering,
electricity theft, GCC, etc... CAS installation is done by installing BAM, CAS and DLL
registration packages. Oracle 8i client is also customized installed before installation of
CAS since CAS requires Oracle platform to work on.
6. SAP
SAP stands for Systems Applications and Products. This software is now being used in
BSES in place of CAS for customer related queries. It is also used to create service
orders. The installation of SAP first requires the installation of Dot Net Framework.
7. WinVNC
The WinVNC software is the most important software in BSES as it is used for all
troubleshooting purposes. Whenever a user has any problem, troubleshooting is done
by taking VNC on another computer, that is, getting the complete desktop and access to
all resources of the user.
8
8. IPMessenger
The IPMessenger software version 2 is used in BSES within its own LAN. It is like any
other Messenger service (Yahoo, Gtalk, etc...) and is used for chatting and transferring
files. After installation, it can be simply configured by entering username, IP address
and group name.
9. SMART2K
The SMART2K software is very useful and used in BSES for calculation of the
electronic meter reading. It is used by the Consumer care department workers.
9
INTRODUCTION TO NETWORKING
Other computer
Computer LAN Card
Plotter
Modem
Networking Software
LAN
Cable
10
• Effective worldwide communications
• Easy, immediate information dissemination
• Worldwide, instantaneous access to information
CATEGORIES OF NETWORKS
A LAN connects network devices over a relatively short distance. A networked office
building, school, or home usually contains a single LAN, though sometimes one
building will contain a few small LANs, and occasionally a LAN will span a group of
nearby buildings. In IP networking, one can conceive of a LAN as a single IP subnet
(though this is not necessarily true in practice).
Besides operating in a limited space, LANs include several other distinctive features.
LANs are typically owned, controlled, and managed by a single person or organization.
One of the computers may be given a large-capacity disk drive and may become a
server to the other client computers. Softwares can then be stored on this central server
and used as needed by the whole group.
In addition to size, LANs are distinguished from other types of networks by their
transmission media and topology. They generally only one type of transmission
medium and common LAN topologies like bus, star and ring. They also use certain
specific connectivity technologies, primarily Ethernet and Token Ring.
11
For example, In the case of a university campus-based campus network, the network is
likely to link a variety of campus buildings including; academic departments,
the university library and student residence halls.
A campus area network is larger than a local area network but smaller than a
metropolitan area network (MAN) or wide area network (WAN).
Organizations do follow the strategy of CAN because they always try to maintain the
best outcome by investing less and with the wireless communication throughout their
building offices, they can manage their budget that they may be spending on the wiring,
hubs, switches etc. they can perform the same task by only connecting one or two
devices at their main office and providing signals to other departments which they can
use without any difficulty.
Campus Area networks (CAN) are economical, beneficial and easy to implement in the
specific kilometers of locality. It is very helpful for the universities and other corporate
organizations to work from any block and receive the same speed of data transfer.
Metropolitan Area Networks are networks that connect LANs together within a city by
using local exchange carriers. A MAN is a network with a size between a LAN and a
WAN.
A good example of a MAN is the part of the telephone company network that can
provide a high-speed DSL line to the customer. Another example is the cable TV
network that originally was designed for cable TV, but today can also be used for high-
speed data connection to the Internet.
Router Router
12
• WIDE AREA NETWORK (WAN)
Wide Area Network provides long-distance transmission of data, image audio and
video information over large geographic areas that may comprise a country, a continent
or even the whole world. A WAN like the Internet spans the whole world!
WANs differ from LANs in several important ways. Like the Internet, most WANs are
not owned by any one organization but rather exist under collective or distributed
ownership and management.
WANs can be of different types- switched WAN (X.25, Frame Relay, ATM) or point-
to-point WAN. The switched WAN connects the end systems, which usually comprise
a router that connects to another LAN or WAN. The point-to-point WAN is normally a
line leased from a telephone or cable TV provider that connects a home computer or a
small LAN to an Internet Service Provider (ISP). This type of WAN is often used to
provide Internet access.
Long distance carrier
Router Router
INTERNETWORK
When two or more networks (LAN, WAN or MAN) are connected, they become an
Internetwork, or Internet. An internetwork has subnetworks (network segments) that
have different network addresses. Internetworking includes everything from connecting
two small workgroup networks, each with perhaps two or three workstations, to
connecting thousands of computers—from notebook computers to mainframes—on
tens to hundreds of individual segments in a worldwide organization.
13
CLIENT SERVER NETWORK
Client/server network operating systems allow the network to centralize functions and
applications in one or more dedicated file servers. The file servers become the heart of
the system, providing access to resources and providing security. Individual
workstations (clients) have access to the resources available on the file servers. The
network operating system provides the mechanism to integrate all the components of
the network and allow multiple users to simultaneously share the same resources
irrespective of physical location. Novell Netware and Windows 2000 Server are
examples of client/server network operating systems.
• Centralized - Resources and data security are controlled through the server.
• Scalability - Any or all elements can be replaced individually as needs increase.
• Flexibility - New technology can be easily integrated into system.
• Interoperability - All components (client/network/server) work together.
• Accessibility - Server can be accessed remotely and across multiple platforms.
Workstation Workstation
Server
Workstation Workstation
14
Client
Response
Query Search
Server Database
PEER-TO-PEER NETWORK
15
NETWORK TOPOLOGIES
Topology means the way components are connected. The network topology describes
the method used to do the physical wiring of the network, that is, the way the individual
computers or devices are connected. The main ones are: bus, star and ring.
The choice of topology is dependent on:
- Type and number of equipments being used.
- Planned applications and rate of data transfers
- Requires response times
- Money considerations
- Length of cable needed
- Type of cable used
- Future growth (adding new hosts)
• STAR TOPOLOGY
16
- The primary disadvantage of star topology is the single point of failure that
could render the network unusable, that is, dependency of the whole
topology on one single point, the hub.
- Star topology requires more cable length and is more expensive than a linear
topology.
- This type of topology is also referred to as a hub and spoke topology,
mirroring the concept that the spokes(links) radiate out from a central
connection point (a hub or a switch).
• BUS TOPOLOGY
- In a bus topology, all the hosts are connected to a single physical link. The most
popular bus network is Ethernet in which physical link is a coaxial cable
connected to each host through a T-connector.
- The bus topology is inexpensive to build, and it is easy to add a new host to the
network just by tapping into the physical link. It also uses less cabling than
mesh or star topologies.
- The major disadvantage of a bus topology is that troubleshooting it is very
difficult due to stray communication signals that prevent hosts from transmitting
any further data onto the cable. Also, both ends of the network must be
terminated by a terminator.
- The bus topology has also limited capability to scale to changing network
requirements, difficult reconnection and fault isolation.
- This type of topology is normally used in 10BSE2 and 10BASE5 Ethernet
networks.
• RING TOPOLOGY
17
- In this type of topology, there is no single cable or central connection point that
is common to every host on the network.
- When one host wants to transmit data to another, the data is passed on to the
adjacent host for use by the adjacent host, or for retransmission by multiple
hosts until the data finally arrives at the intended destination. Also each host has
equal access to the transmission media.
- The major advantage to a ring topology is that multiple hosts may be permitted
to transmit data at the same time.
- Another benefit of this topology is the lower signal generation between hosts
that are not physically close to each other.
- In a ring topology, the signal that travels from one host to another is regenerated
as it is retransmitted by each host while travelling through the long stretch of the
cable.
- The primary disadvantage of ring topology is that if one host on the network
fails, the entire network may fail (a break in the ring). Also, installing a new
host into the ring means there will be a period of time that the network will be
disabled due to break in the ring.
• MESH TOPOLOGY
- In a mesh topology, every device has a dedicated point-to point link to every
other device.
18
- The use of dedicated links guarantees that each connection can carry its own
data load, thus eliminating the traffic problems that can occur when links must
be shared by multiple devices.
- A mesh topology is robust. If one link becomes unusable, it does not
incapacitate the entire system.
- It provides the advantage of privacy or security. This is because when every
message travels along a dedicated line, only the intended recipient sees it.
Physical boundaries prevent other users from gaining access to messages.
- Point-to-point links make fault identification and fault isolation easy. It enables
the network manager to discover the precise location of the fault and aids in
finding its cause and solution.
- One practical example of a mesh topology is the connection of telephone
regional offices in which each regional office needs to be connected to every
other regional office.
- The main disadvantage of mesh topology is the amount of cabling and the
number of I/O ports required. Installation and reconnection are difficult and the
bulk of wiring can be greater than the available space can accommodate. Also
the hardware required to connect each link can be prohibitively expensive.
NETWORKING HARDWARE
Networking hardware includes all computers, peripherals, interface cards and other
equipment needed to perform data-processing and communications within the
network.
HUB
Hubs are dumb broadcasters. They may connect many computers and send out the data
they receive to every computer connected to them. They work at the physical layer of
the OSI model. A hub is the central point in a star topology. It also provides additional
services (Managed, Switched, Intelligent hubs).
19
The simplest way to hook up more than two PCs in a network is using a hub. Hubs are
relatively simple and low in cost, and they are essentially multi-port repeaters or signal
booster amplifiers. They have no built-in intelligence; any packet of network data
which arrives via the input connections of any of their ports is simply beefed up and
sent out again via the output connections of all ports (including the one they came
from).
More than 8 PCs can be connected using hubs by cascading them. For the cascading to
work properly to expand your network, either use an uplink port on the lowerlevel hub
and link them with a normal straight through cable, or use normal ports on each and
link them with a crossover cable.
A hub processes data no matter which device it is addressed to, which causes
congestion. So it extends collision domain and cannot filter information.
SWITCH
A network switch is a device that forwards and filters OSI layer 2 datagrams (chunks of
data communication) between ports (connected cables) based on the MAC addresses in
the packets. It provides a central connection point for cables from workstations, servers,
and peripherals. In a star topology, twisted-pair wire is run from each workstation to a
central switch/hub.
Switches are multiport bridges/ smart hubs that send data directly to the destination
rather than everywhere in the network. Most switches are active, that is they electrically
amplify the signal as it moves from one device to another. Switches no longer
broadcast network packets as hubs did in the past, they memorize addressing of
computers and send the information to the correct location directly. Switches are:
20
• Usually installed in a standardized metal rack that also may store netmodems,
bridges, or routers
• Isolate traffic, relieving congestion, separates collision domains, reducing
collisions.
• Packet processing time is longer than in a hub, monitoring the network becomes
more complicated and it is more expensive too.
Switches divide the network in to smaller collision domains. Each segment into the
switch has its own collision domain. As packets arrive at the switch, it looks at the
MAC address in the header and decides which segment to forward the packet to.
Higher protocols like TCP/IP and IPX are buried deep inside the packet, so are
invisible to the switch. Once the destination segment has been determined, the packet is
forwarded without any delay.
REPEATER
Since a signal loses strength as it passes along a cable, it is often necessary to boost the
signal with a device called a repeater. The repeater electrically amplifies the signal it
receives and rebroadcasts it. Repeaters can be separate devices or they can be
incorporated into a concentrator. They are used when the total length of your network
cable exceeds the standards set for the type of cable being used. Repeaters work on the
Physical Layer of the OSI model and connect segments of the same network, even if
they use different media.
A good example of the use of repeaters would be in a local area network using a star
topology with unshielded twisted-pair cabling. The length limit for unshielded twisted-
pair cable is 100 meters. The most common configuration is for each workstation to be
connected by twisted-pair cable to a multi-port active concentrator. The concentrator
amplifies all the signals that pass through it allowing for the total length of cable on the
network to exceed the 100 meter limit.
21
- Receives a signal which it cleans up
- Re-times the signal to avoid collisions
- Transmits the signal onto the next segment
Repeaters require a small amount of time to regenerate the signal. This can cause a
propagation delay which can affect network communication when there are several
repeaters in a row. Many network architectures limit the number of repeaters that can
be used in a row. Repeaters work only at the physical layer of the OSI network model.
Repeater cannot filter data, extends the collision domain and cannot connect different
network architectures.
BRIDGE
A network bridge connects multiple network segments at the data link layer (layer 2) of
the OSI model. It is a device that allows you to segment a large network into two
smaller, more efficient networks. By subdividing LAN in to smaller segments, overall
reliability is increased and the network becomes easier to maintain. If you are adding to
an older wiring scheme and want the new network to be up-to-date, a bridge can
connect the two.
A bridge monitors the information traffic on both sides of the network so that it can
pass packets of information to the correct location. Most bridges can "listen" to the
network and automatically figure out the address of each computer on both sides of the
bridge. The bridge can inspect each message and, if necessary, broadcast it on the other
side of the network.
A bridge reads the outermost section of data on the data packet, to tell where the
message is going. It reduces the traffic on other network segments, since it does not
send all packets. Bridges can be programmed to reject packets from particular
networks. Bridging occurs at the data link layer of the OSI model, which means the
bridge cannot read IP addresses, but only the outermost hardware address (MAC
22
address) of the packet. To determine the network segment a MAC address belongs to,
bridges use one of:
• Transparent Bridging - They build a table of addresses (bridging table) as they
receive packets. If the address is not in the bridging table, the packet is
forwarded to all segments other than the one it came from. This type of bridge is
used on ethernet networks.
• Source route bridging - The source computer provides path information inside
the packet. This is used on Token Ring networks.
The bridge manages the traffic to maintain optimum performance on both sides of the
network but it does not allow unnecessary traffic through. Bridges can be used to
connect different types of cabling, or physical topologies and work with all protocols.
They must, however, be used between networks with the same protocol.
Bridges are fault tolerant by isolating fault segments and reconfiguring the paths in the
event of failure but they introduce network delays. Bridges are not efficient with
complex networks as shortest path may not always be chosen and may overload during
periods of high traffic. They might also cause broadcast storms on the network. Bridges
are slower than repeaters due to the additional processing of packets.
ROUTER
23
While bridges know the addresses of all computers on each side of the network, routers
know the addresses of computers, bridges, and other routers on the network. Routers
can even "listen" to the entire network to determine which sections are busiest -- they
can then redirect data around those sections until they clear up.
A router reads the information in each packet to tell where it is going. If it is destined
for an immediate network it has access to, it will strip the outer packet, readdress the
packet to the proper ethernet address, and transmit it on that network. If it is destined
for another network and must be sent to another router, it will re-package the outer
packet to be received by the next router and send it to the next router.
Router operates at network layer of the OSI model and can interconnect with different
types of complex networks (eg. Ethernet with token ring). Router segments the network
logically and limits the collision domain. Although they can transform information at
the data link level, routers cannot transform information from one data format such as
TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or
corrupted packets. If the routing table does not indicate the proper address of a packet,
the packet is discarded.
Routers can:
Routers are expensive and must use routable protocols; they are also slower than a
bridge.
BROUTER
A brouter functions both as a bridge and a router. It can work on networks using
different protocols.
Brouter can be programmed only to pass data packets using a specific protocol forward
to a segment. In this case, it functions in a similar manner to that of a bridge.
If a brouter is set to route data packets to the appropriate network with a routed
protocol such as IP, it functions as a router.
A brouter functions similar to a bridge for network transport protocols that are not
routable, and as a router for routable protocols. It functions at the network and data link
layers of the OSI network model.
24
GATEWAY
A gateway can translate information between different network data formats or network
architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP
can communicate with Apple brand computers. Most gateways operate at the
application layer, but can operate at the network or session layer of the OSI model.
A gateway may consist of hardware, software, or a combination of the two, and it may
provide translation at all or at only some of the different OSI layers, depending on the
types of systems it connects. Gateways will start at the lower level and strip
information until it gets to the required level and repackage the information and work
its way back toward the hardware layer of the OSI model.
The network interface card (NIC) provides the physical connection between the
network and the computer workstation. It is a piece of computer hardware designed to
allow computers to communicate over a computer network. It provides physical access
to a networking medium and often provides a low-level addressing system through the
use of MAC addresses. There is also a single RJ45 socket on the card’s mounting
bracket, to accept the network cable.
Each network interface card has its unique id (Media Access Control address). This is
written on a chip which is hardwired into it during manufacture. This address is
25
a six-byte (i.e., 48-bit) binary number, which is used by the network to identify the
node at which that PC is connected. The interface or NIC will only accept data packets
which carry this address in their destination address field and will always include the
same address code in the source address field of any data packets it transmits out to the
network.
Most NICs are internal, with the card fitting into an expansion slot inside the
computer. Some computers, such as Mac Classics, use external boxes which are
attached to a serial port or a SCSI port. Laptop computers can now be purchased with a
network interface card built-in or with network cards that slip into a PCMCIA slot.
Network interface cards are a major factor in determining the speed and performance of
a network. It is a good idea to use the fastest network card available for the type of
workstation you are using. The three most common network interface connections are
Ethernet cards, LocalTalk connectors, and Token Ring cards.
NETWORK ARCHITECTURES
ETHERNET
Ethernet is the most popular physical layer LAN technology in use today. Ethernet is
popular because it strikes a good balance between speed, cost and ease of installation.
These benefits, combined with wide acceptance in the computer marketplace and the
ability to support virtually all popular network protocols, make Ethernet an ideal
networking technology for most computer users today. It defines a number of wiring
26
and signaling standards for the Physical Layer of the OSI networking model as well as
a common addressing format and Media Access Control at the Data Link Layer.
The Institute for Electrical and Electronic Engineers (IEEE) defines the Ethernet
standard as IEEE Standard 802.3. This standard defines rules for configuring an
Ethernet network as well as specifying how elements in an Ethernet network interact
with one another. By adhering to the IEEE standard, network equipment and network
protocols can communicate efficiently.
FAST ETHERNET
For Ethernet networks that need higher transmission speeds, the Fast Ethernet standard
(IEEE 802.3u) has been established. This standard raises the Ethernet speed limit from
10 Megabits per second (Mbps) to 100 Mbps with only minimal changes to the existing
cable structure. There are three types of Fast Ethernet: 100BASE-TX for use with level
5 UTP cable, 100BASE-FX for use with fiber-optic cable, and 100BASE-T4 which
utilizes an extra two wires for use with level 3 UTP cable. The 100BASE-TX standard
has become the most popular due to its close compatibility with the 10BASE-T
Ethernet standard. For the network manager, the incorporation of Fast Ethernet into an
existing configuration presents a host of decisions. Managers must determine the
number of users in each site on the network that need the higher throughput, decide
which segments of the backbone need to be reconfigured specifically for 100BASE-T
and then choose the necessary hardware to connect the 100BASE-T segments with
existing 10BASE-T segments. Gigabit Ethernet is a future technology that promises a
migration path beyond Fast Ethernet so the next generation of networks will support
even higher data transfer speeds.
TOKEN RING
27
from one computer to the next. If a computer does not have information to transmit, it
simply passes the token on to the next workstation. If a computer wishes to transmit
and receives an empty token, it attaches data to the token. The token then proceeds
around the ring until it comes to the computer for which the data is meant. At this point,
the data is captured by the receiving computer. The sender can then remove the
message and free that token for use by others.
The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic
cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps.
Various PC vendors have been proponents of Token Ring networks at different times
and thus these types of networks have been implemented in many organizations.
FDDI
It is also a high-speed LAN technology. It is not generally used for direct connection to
desktop computers, but rather as a backbone technology. A backbone connects two or
more LAN segments to provide a path for transmitting packets among them. A simple
backbone might connect two servers through a high-speed link consisting of network
adapter cards and cable.
FDDI operates at the physical and data-link layers (levels one and two) of the OSI
model. It provides data transfer rates as high as 100 Mbps. In addition to being large
geographically, an FDDI local area network can support thousands of users. This
technology is fast and reliable but expensive.
28
ATM
ATM is extremely scalable; data transfer rates range from 25 Mbps to 2.4 gigabits per
Second (Gbps). This wide range of data transfer rates reflects the various ways in
which ATM can be used. The 25 Mbps rate is a new offering meant for desktop
environments. In LAN backbones, ATM provides data transfer rates of 100 Mbps and
155 Mbps. At the high end, WAN implementations using ATM and SONET together
have achieved data transfer rates of 2.4 Gbps.
LOCAL TALK
LocalTalk is a network protocol that was developed by Apple Computer, Inc. for
Macintosh computers. The method used by LocalTalk is called CSMA/CA (Carrier
Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except
that a computer signals its intent to transmit before it actually does so. LocalTalk
adapters and special twisted pair cable can be used to connect a series of computers
through the serial port. The Macintosh operating system allows the establishment of a
peer-to-peer network without the need for additional software. With the addition of the
server version of AppleShare software, a client/server network can be established.
29
The LocalTalk protocol allows for linear bus, star, or tree topologies using twisted pair
cable. A primary disadvantage of LocalTalk is speed. Its speed of transmission is only
230 Kbps.
4 Mbps - 16
Token Ring Twisted Pair Star-Wired Ring
Mbps
ATM Twisted Pair, Fiber 155-2488 Mbps Linear Bus, Star, Tree
Cable is the medium through which information usually moves from one network
device to another. There are several types of cable which are commonly used with
LANs. In some cases, a network will utilize only one type of cable, other networks will
use a variety of cable types. The type of cable chosen for a network is related to the
network's topology, protocol, and size. Understanding the characteristics of different
types of cable and how they relate to other aspects of a network is necessary for the
development of a successful network. The different types of cables used in networking
are:
30
It consists of two insulated strands of copper wire twisted around each other to form a
pair. One or more twisted pairs are used in a twisted-pair cable. The use of two wires
twisted together helps to reduce crosstalk and electromagnetic induction. The
transmission speed ranges from 2 million bits per second to 100 million bits per second.
Twisted pair cables are of two types:
• STP (shielded twisted pair)
• UTP.(unshielded twisted pair)
Shielded Twisted Pair cable has a foil or wire braid wrapped around the individual
wires of the pairs.
The STP cable uses a woven-copper braided jacket, which is a higher-quality, more
protective jacket than UTP.
STP is suitable for environments with electrical interference; however, the extra
shielding can make the cables quite bulky. Shielded twisted pair is often used on
networks using Token Ring topology.
31
cable. It is used in Ethernet 10Base-T and 100Base-T networks, as well as in home and
office telephone wiring.
The standard connector for unshielded twisted pair cabling in data networks is an RJ-45
connector. This is a plastic connector that looks like a large telephone-style connector.
UTP cables can be divided further into six categories:
Category 1 Traditional telephone cable. Carries voice only but not data and it has
two twisted pairs.
Category 2 Certified UTP for data transmission of up to 4 Mbps. It has two twisted
pairs and is used in LocalTalk.
Category 3 Certified UTP for data transmission of up to 10 Mbps. It has four
twisted pairs and is used in Ethernet.
Category 4 Certified UTP for data transmission of up to 16 Mbps. It has four
twisted pairs and is used in Token Ring network.
Category 5 Certified for data transmission of up to 100 Mbps. It has four twisted
pairs of copper wire and is used in Fast Ethernet.
Category 5e Certified for data transmission up to 1000 Mbps. It is used in Gigabit
Ethernet.
Category 6 Certified for data transmission up to
UTP WIRING
It is very important to know how exactly to wire UTP cables because it's the base of a
solid network and will help you avoid hours of frustration and troubleshooting if you do
it right the first time. On the other hand, if you are dealing with a poorly cabled
network, then you will be able to find the problem and fix it more efficiently.
The four pairs of UTP are connected according to the following color coding:
32
1. Green/white and Green
2. Orange/white and Blue
3. Blue/white and Orange
4. Brown/white and Brown.
The other end of UTP cable is also conneted to the RJ45 connector with crimper. Thus
the UTP wiring is done between PCs or between PCs and switch.
COAXIAL CABLE
The coaxial cable is made of two conductors that share the same axis.
In the center is a copper wire that is insulated by a plastic coating and then wrapped
with an outer conductor (usually a wire braid).
The outer conductor serves as electrical shielding for the signal being carried by the
inner conductor. A tough insulating plastic tube outside the outer conductor provides
physical and electrical protection.
Although coaxial cabling is difficult to install, it is highly resistant to signal
interference. In addition, it can support greater cable lengths between network devices
than twisted pair cable. Its transmission speed ranges from 200 million to more than
500 million bits per second. Coaxial cable is of two types:
• Thin (ThinNet)
• Thick (ThickNet).
ThinNet is .25 inches in diameter. 10Base2 refers to the specifications for thin coaxial
cable carrying Ethernet signals. The 2 refers to the approximate maximum segment
length being 200 meters. In actual fact the maximum segment length is 185 meters. It is
easy to install, small in diameter and shielded to reduce EMI interference but must be
grounded. Thin coaxial cable is popular in school networks, especially linear bus
networks. Its disadvantage is that one break and the whole network goes down.
ThickNet is .38 inches in diameter. 10Base5 refers to the specifications for thick
coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length
being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps
keep moisture away from the center conductor. This makes thick coaxial a great choice
when running longer lengths in a linear bus network. One disadvantage of thick coaxial
is that it does not bend easily and is difficult to install.
Coaxial cable is the better choice even though it costs more. It is a standard technology
that resists rough treatment and EMI. It is widely used for cable television systems,
office buildings, and other worksites for local area networks.
33
FIBRE OPTIC CABLE
Fiber optic cabling consists of a center glass core surrounded by several layers of
protective materials. It transmits modulated pulses of light rather than electronic signals
eliminating the problem of electrical interference. This makes it ideal for certain
environments that contain a large amount of electrical interference. It has also made it
the standard for connecting networks between buildings, due to its immunity to the
effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than
coaxial and twisted pair. It also has the capability to carry information at vastly greater
speeds. This capacity broadens communication possibilities to include services such as
video conferencing and interactive services.
It is immune to EMI and detection outside the cable and provides a reliable and secure
transmission media. It also supports very high bandwidths. It has a signal attenuation
rate of 0.25 to 2.0 KM. Transmission speed may reach trillions of bits per second. The
transmission speed of fiber optics is hundreds of times faster than for coaxial cables and
thousands of times faster than a twisted-pair wire.
The cost of fiber optic cabling is comparable to copper cabling; however, it is more
difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable
carrying Ethernet signals.
WIRELESS LAN
Not all networks are connected with cabling; some networks are wireless. Wireless
LANs use high frequency radio signals, infrared light beams, or lasers to communicate
between the workstations and the file server or hubs. Each workstation and file server
on a wireless network has some sort of transceiver/antenna to send and receive the data.
Information is relayed between transceivers as if they were physically connected. For
longer distance, wireless communications can also take place through cellular
telephone technology, microwave transmission, or by satellite.
Wireless networks are great for allowing laptop computers or remote computers to
connect to the LAN. Wireless networks are also beneficial in older buildings where it
may be difficult or impossible to install cables.
34
The two most common types of infrared communications used in schools are line-of-
sight and scattered broadcast. Line-of-sight communication means that there must be an
unblocked direct line between the workstation and the transceiver. If a person walks
within the line-of-sight while there is a transmission, the information would need to be
sent again. This kind of obstruction can slow down the wireless network.
Wireless LANs have several disadvantages. They provide poor security, and are
susceptible to interference from lights and electronic devices. They are also slower than
LANs using cabling.
The following table shows the type of cabling used in different types of networks:
OSI
The OSI (Open Systems Interconnect) model was developed by the International
Standards Organization (ISO) as a guideline for developing standards to enable the
interconnection of dissimilar computing devices. It is important to understand that the
OSI model is not itself a communication standard. In other words, it is not an agreed
method that governs how data is sent and received; it is only a guideline for developing
such standards.
35
The OSI Model: What It Is and Why It’s Important
It would be difficult to overstate the importance of the OSI model. Virtually all
networking vendors and users understand how important it is that network computing
products adhere to and fully support the networking standards the model has spawned.
The reasons are logical.
First, when a vendor’s products adhere to the standards the OSI model has spawned,
connecting those products to other vendors’ products is relatively simple. Conversely,
the further a vendor departs from those standards, the more difficult it becomes to
connect that vendor’s products to those of other vendors.
Second, if a vendor were to depart from the communication standards the model has
spawned, software development efforts would be very difficult because the vendor
would have to build every part of all necessary software, rather than often being able to
build on the existing work of other vendors.
The first two problems give rise to a third significant problem for vendors: A vendor’s
products become less marketable as they become more difficult to connect with other
vendors’ products unless the introduction of the vendor’s products is well ahead of the
introduction of other such products into the general marketplace.
36
The seven layers of the OSI model and the general purpose of each are:
Physical (1) Controls transmission of the raw bit stream over the transmission
medium. Standards for this layer define such parameters as the
amount of signal voltage swing, the duration of voltages (bits),
and so on.
Data link (2) Responsible for the reliability of the physical link established
at layer 1. Standards define how data frames are recognized
and provide necessary flow control and error handling at the
frame level.
Transport (4) Insulates the three upper layers, 5 through 7, from having to
deal with the complexities of layers 1 through 3 by providing the
functions necessary to guarantee a reliable network link. Among
other functions, this layer provides error recovery and flow
control between the two end points of the network connection.
Session (5) Establishes, manages, and ends user connections and manages
37
the interaction between end systems. Services include such
things as establishing communications as full or half duplex
and grouping data.
PHYSICAL LAYER
The physical layer is concerned with transmission of raw bits over a communication
channel. It specifies the mechanical, electrical and procedural network interface
specifications and the physical transmission of bit streams over a transmission medium
38
connecting two pieces of communication equipment. In simple terms, the physical layer
decides the following:
• Number of pins and functions of each pin of the network connector
(Mechanical)
• Signal Level, Data rate (Electrical)
• Whether simultaneous transmission in both directions
• Establishing and breaking of connection
• Deals with physical transmission
The Physical layer has two responsibilities: it sends bits and receives bits. Bits come
only in values of 1 or 0. The Physical layer communicates directly with the various
types of actual communication media. Different kinds of media represent these bit
values in different ways. Specific protocols are needed for each type of media to
describe the proper bit patterns to be used, how data is encoded into media signals and
the various qualities of the physical media's attachment interface. At the physical layer,
the interface between the Data Terminal Equipment (DTE) and the Data Circuit-
Terminating Equipment (DCE) is identified. The Physical layer's connectors (RJ-45,
BNC) and different physical topologies (Bus, Star, Hybrid networks) are defined by the
OSI as standards, allowing different systems to communicate.
The goal of the data link layer is to provide reliable, efficient communication between
adjacent machines connected by a single communication channel. Specifically:
1. Group the physical layer bit stream into units called frames. Note that frames are nothing
more than ``packets'' or ``messages''. By convention, we shall use the term ``frames'' when
discussing DLL packets.
2. Sender calculates the checksum and sends checksum together with data. The checksum
allows the receiver to determine when a frame has been damaged in transit or received
correctly.
3. Receiver recomputes the checksum and compares it with the received value. If they
differ, an error has occurred and the frame is discarded.
4. Error control protocol returns a positive or negative acknowledgment to the sender. A
positive acknowledgment indicates the frame was received without errors, while a negative
acknowledgment indicates the opposite.
5. Flow control prevents a fast sender from overwhelming a slower receiver. For example,
a supercomputer can easily generate data faster than a PC can consume it.
6. In general, data link layer provides service to the network layer. The network layer wants
to be able to send packets to its neighbors without worrying about the details of getting it
there in one piece.
39
The Datalink ensures that messages are delivered to the proper device and translates
messages from the Network layer into bits for the Physical layer to transmit. It formats
the message into data frames (notice how we are not using the term segments) and adds
a customized header containing the hardware destination and source address.
This defines how packets are placed on the media (cable). Contention media (Ethernet)
access is first come first served access where everyone shares the same bandwidth.
Physical addressing is defined here.
This sublayer is responsible for identifying Network layer protocols and then
encapsulating them when they are about to be transmitted onto the network or
decapsulate them when it receives a packet from the network and pass it onto the layer
above it, which is the Network layer. An LLC header tells the Datalink layer what to do
with a packet once a frame is received. For example, a host (computer) will receive a
frame and then look in the LLC header to understand that the packet is destined for the
IP protocol at the Network layer. The LLC can also provide flow control and
sequencing of control bits.
NETWORK LAYER
The Network layer is responsible for routing through an internetwork and for network
addressing. This means that the Network layer is responsible for transporting traffic
between devices that are not locally attached. It performs network routing functions,
and might also perform fragmentation and reassembly, and report delivery errors.
Routers, or other layer-3 devices, are specified at the Network layer and provide
routing services in an internetwork.
In the Open Systems Interconnection (OSI) communications model, the Network layer
knows the address of the neighboring nodes in the network, packages output with the
correct network address information, selects routes and quality of service and
recognizes and forwards to the Transport layer incoming messages for local host
domains (logical-physical address mapping). Among existing protocol that generally
map to the OSI network layer are the Internet Protocol (IP) part of TCP/IP and
NetWare IPX/SPX. Both IP Version 4 and IP Version 6 (IPv6) map to the OSI network
layer.
40
TRANSPORT LAYER
Services located in the Transport layer both segment and reassemble data from upper-
layer applications and unite it onto the same data stream. Application developers have
their choice of the two protocols TCP or UDP when working with TCP/IP protocols at
this layer.
SESSION LAYER
This layer allows users on different machines to establish session between them. A session
allows ordinary data transport but it also provides enhanced services useful in some
applications. A session may be used to allow a user to log into a remote time-sharing
machine or to transfer a file between two machines.
The Session layer is responsible for setting up, managing, maintaining and then tearing
down sessions between Presentation layer entities. The Session layer also provides
dialog control between devices, or nodes. It coordinates communication between
systems and serves to organize their communication by offering three different
modes: simplex, half-duplex and full-duplex. The session layer basically keeps one
application's data separate from other application's data.
1. Network File System (NFS): Was developed by Sun Microsystems and used
with TCP/IP and UNIX workstations to allow transparent access to remote
resources.
2. Structured Query Language (SQL): Was developed by IBM to provide users
with a simpler way to define their information requirements on both local and
remote systems.
3. Remote Procedure Call (RPC): Is a broad client/server redirection tool used for
disparate service environments. Its procedures are created on clients and
performed on servers.
41
4. X Window: Is widely used by intelligent terminals for communicating with
remote UNIX computers, allowing them to operate as though they were locally
attached monitors.
PRESENTATION LAYER
This layer is concerned with Syntax and Semantics of the information transmitted, unlike
other layers, which are interested in moving data reliably from one machine to other. Few
of the services that Presentation layer provides are:
1. Encoding data in a standard agreed upon way.
2. It manages the abstract data structures and converts from representation used inside
computer to network standard representation and back.
The Presentation Layer presents data to the Application layer. It's basically a translator
and provides coding and conversion functions. A successful data transfer technique is
to adapt the data into a standard format before transmission. Computers are configured
to receive this generically formatted data and then convert the data back into its native
format for reading. By providing translation services, the Presentation layer ensures
that data transferred from the Application layer of one system can be read by the
Application layer of another host.
The OSI has protocol standards that define how standard data should be formatted.
Tasks like data compression, decompression, encryption and decryption are associated
with this layer. Some Presentation layer standards are involved in multimedia
operations.
APPLICATION LAYER
The Application layer of the OSI model is where users communicate with the
computer. Application layer functions typically include identifying communication
partners, determining resource availability, and synchronizing communication. When
identifying communication partners, the application layer determines the identity and
availability of communication partners for an application with data to transmit. When
determining resource availability, the application layer must decide whether sufficient
network or the requested communication exists. In synchronizing communication, all
communication between applications requires cooperation that is managed by the
application layer. The user interfaces with the computer at the application layer.
42
activities, client/server processes. Some examples of Application Layer
implementations include:
• File transfer (FTP): Connect to a remote machine and send or fetch an arbitrary file.
FTP deals with authentication, listing a directory contents, ASCII or binary files,
etc.
• Remote login (telnet): A remote terminal protocol that allows a user at one site to
establish a TCP connection to another site, and then pass keystrokes from the local
host to the remote host.
• Mail (SMTP): Allow a mail delivery agent on a local machine to connect to a mail
delivery agent on a remote machine and deliver mail.
• News (NNTP): Allows communication between a news server and a news client.
• Web (HTTP): Base protocol for communication on the World Wide Web.
43
Communication in a network can be explained with the help of an example. Let there
be two identical computers and each computer is running an E-mail program. The E-
mail
program enables the users of the two computers to exchange messages. The
transmission of one brief message from computer A to computer B takes place in the
following way:
The transmission starts with the user of computer A pressing a key to send a mail
message to the user of computer B. The E-mail application is designed to talk to the
OSI application layer—it knows the proper protocol for doing so. The E-mail
application transfers the message to the OSI application layer. Using the functions built
into its protocol, the application layer accepts the message data and adds an application-
layer header to it. The application-layer header contains the information necessary for
the application layer in computer B to correctly handle the data when computer B
receives it.
After adding its header, the application layer in computer A passes the data to the
presentation layer below. The presentation layer treats everything received as data,
including the application-layer header, and appends its own header (the technical term
for this is “encapsulation”). The presentation-layer header contains the information
necessary for the presentation layer in computer B to correctly handle the data. After
adding its header, the presentation layer transfers the new data unit to the session layer.
This process is repeated through all layers in computer A until a final header is added at
the data-link layer. After the data-link–layer header is added, the data unit is known as
a “frame.” The data, or frame, is passed from the data-link layer to the physical
computers.
When the signal reaches computer B, layer one in computer B (the physical layer)
copies the data. Now the process is reversed. The physical layer in computer B transfers
the data to the data-link layer. The data-link layer removes the header information that
was attached by the corresponding layer in computer A, acts upon the information the
header contains, and transfers the data unit up to the network layer.
This process continues, with the headers being stripped off at each layer and the
instructions contained therein carried out, until the original data from computer A (the
message) is finally passed from the application layer to the E-mail application in
computer B. When the E-mail application receives the message, it displays the layer
and is transmitted across the transmission medium connecting the two message on the
screen for the user of computer B to read.
PROTOCOLS
44
take in transit, and how this information is processed once it reaches its final
destination. Protocols define the format, timing, sequence, and error checking used on
the network. Protocols also define procedures for handling lost or damaged
transmissions or "packets." TCP/IP (for UNIX, Windows NT, Windows 95 and other
platforms), IPX (for Novell NetWare), DECnet (for networking Digital Equipment
Corp. computers), AppleTalk (for Macintosh computers), and NetBIOS/NetBEUI (for
LAN Manager and Windows NT networks) are the main types of network protocols in
use today.
Although each network protocol is different, they all share the same physical cabling.
This common method of accessing the physical network allows multiple protocols to
peacefully coexist over the network media, and allows the builder of a network to use
common hardware for a variety of protocols. This concept is known as "protocol
independence”.
DHCP
45
request an IP address from the DHCP server during network initialization.
The request-and-grant process uses a lease concept with a controllable time
period, allowing the DHCP server to reclaim (and then reallocate) IP
addresses that are not renewed.
Automatic Allocation: The DHCP server permanently assigns a free IP
address to a requesting client from the range defined by the administrator.
This is like dynamic allocation, but the DHCP server keeps a table of past IP
address assignments, so that it can preferentially assign to a client the same
IP address that the client previously had.
Static Allocation: The DHCP server allocates an IP address based on a table
with MAC address/IP address pairs, which are manually filled in (perhaps
by a network administrator). Only requesting clients with a MAC address
listed in this table will be allocated an IP address. This feature is not
supported by all DHCP servers.
The TCP/IP Protocol Suite is the set of communications protocols used for
the Internet and other similar networks. It is commonly also known as TCP/IP, named
from two of the most important protocols in it: the Transmission Control
Protocol (TCP) and the Internet Protocol (IP), which were the first two networking
protocols defined in this standard. Modern IP networking represents a synthesis of
several developments that began to evolve in the 1960s and 1970s, namely
the Internet and local area networks, which emerged during the 1980s, together with the
advent of the World Wide Web in the early 1990s.
The Internet Protocol Suite, like many protocol suites, is constructed as a set of layers.
Each layer solves a set of problems involving the transmission of data. In particular, the
layers define the operational scope of the protocols within.
Often a component of a layer provides a well-defined service to the upper layer
protocols and may be using services from the lower layers. Upper layers are logically
closer to the user and deal with more abstract data, relying on lower layer protocols to
translate data into forms that can eventually be physically transmitted.
The TCP/IP model consists of 4 layers (RFC 1122). From lowest to highest, these are
the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.
46
TCP/IP PROTOCOL STACK
The Transmission Control Protocol is one of the most important and well-known
protocols in the world on networks today. Used in every type of network world-wide, it
enables millions of data transmissions to reach their destination and works as a bridge,
47
connecting hosts with one another and allowing them to use various programs in order
to exchange data.
TCP is defined by RFC 793 and was introduced to the world towards the end of 1981.
The motivation behind creating such a protocol was the fact that back in the early 80s,
computer communication systems were playing a very important role for the military,
education and normal office environments. As such, there was the need to create a
mechanism that would be robust, reliable and complete data transmission on various
mediums without great losses.
TCP was designed to be able to deliver all of the above, and so it was adopted promptly
by the rest of the world.
Transmission Control Protocol (TCP) supports the network at the transport layer. It
provides a reliable connection oriented service. Connection oriented means both the
client and server must open the connection before data is sent. TCP is defined by RFC
793 and 1122. TCP provides:
TCP relies on the IP service at the network layer to deliver data to the host. Since IP is
not reliable with regard to message quality or delivery, TCP must make provisions to
be sure that messages are delivered on time and correctly.
TCP is used in almost every type of network. As a protocol, it is not restricted to any
type of network topology, whether it be a local area network (LAN) or wide area
network (WAN). Being a transport protocol, we call it a transport protocol because it's
located in the transport layer of the OSI model its primary job is to get data from one
location to another, regardless of the physical network and location.
INTERNET PROTOCOL
Internet Protocol (IP) provides support at the network layer of the OSI model. All
transport protocol data packets such as UDP or TCP are encapsulated in IP data packets
to be carried from one host to another.
48
IP is a connection-less unreliable service meaning there is no guarantee that the data
will reach the intended host. The datagrams may be damaged upon arrival, out of order,
or not arrive at all. Therefore the layers above IP such as TCP are responsible for being
sure that correct data is delivered. IP provides for:
• Addressing.
• Type of service specification.
• Fragmentation and re-assembly.
• Security.
IP ADDRESSING
Each IP address is denoted by a “dotted decimal notation”. This means there are four
numbers, each separated by a dot. Each number represents a one byte value with a
possible mathematical range of 0-255. Briefly, the first one or two bytes, depending on
the class of network, generally will indicate the number of the network, the third byte
indicates the number of the subnet, and the fourth number indicates the host number. IP
addresses are broken into 4 octets (IPv4). An octet is a byte consisting of 8 bits. The
IPv4 addresses are in the following form:
192.168.10.1
The host number cannot be 0 or 255. None of the numbers can be 255 and the first
number cannot be 0. This is because broadcasting is done with all bits set in some
bytes. Broadcasting is a form of communication that all hosts on a network can read,
and is normally used for performing various network queries. An address of all 0's is
not used, because when a machine is booted that does not have a hardware address
49
assigned, it provides 0.0.0.0 as its address until it receives its assignment. This would
occur for machines that are remote booted or those that boot using DHCP.
The first three bits of the most significant octet of an IP address are defined as the class
of the address. Three classes (A, B, and C) are defined for universal unicast addressing.
Depending on the class derived, the network identification is based on octet boundary
segments of the entire address. Each class uses successively additional octets in the
network identifier, thus reducing the possible number of hosts in the higher order
classes (B and C).
The first octet (first 8 Bits or first byte) of an IP Address is enough for us to determine
the Class to which it belongs. And, depending on the Class to which the IP Address
belongs, we can determine which portion of the IP Address is the Network ID and
which is the Host ID.
50
SUBNETTING
51
IPV6
The rapid exhaustion of IPv4 address space, despite conservation techniques, prompted
the Internet Engineering Task Force (IETF) to explore new technologies to expand the
Internet's addressing capability. The permanent solution was deemed to be a redesign of
the Internet Protocol itself. This next generation of the Internet Protocol, intended to
replace IPv4 on the Internet, was eventually named Internet Protocol Version 6 (IPv6)
in 1995. The address size was increased from 32 to 128 bits or 16 octets. This, even
with a generous assignment of network blocks, is deemed sufficient for the foreseeable
future. Mathematically, the new address space provides the potential for a maximum of
2128, or about 3.403×1038 unique addresses. IPv6 has facilities that automatically change
the routing prefix of entire networks, should the global connectivity or the routing
policy change, without requiring internal redesign or renumbering. The large number of
IPv6 addresses allows large blocks to be assigned for specific purposes and, where
appropriate, to be aggregated for efficient routing.
The User Datagram Protocol (UDP) is one of the core members of the Internet
Protocol Suite, the set of network protocols used for the Internet. With UDP, computer
applications can send messages, in this case referred to as datagrams, to other hosts on
an Internet Protocol (IP) network without requiring prior communications to set up
special transmission channels or data paths.
UDP supports the network at the transport layer. It is an unreliable connection-less
protocol and is defined by RFC 768 and 1122. It is a datagram service. There is no
guarantee that the data will reach its destination. UDP is meant to provide service with
very little transmission overhead. It adds very little to IP data packets except for some
error checking and port direction. Time-sensitive applications often use UDP because
dropping packets is preferable to waiting for delayed packets, which may not be an
option in a real-time system. The following protocols or services use UDP: DNS,
SNMP, BOOTP, TFTP, NFS, RIP, RPC, VoIP, etc..
52
services. Ports 49152 through 65535 are dynamic ports that are not officially for any
specific service, and can be used for any purpose. They are used as temporary ports
primarily by clients when communicating with servers
DNS
53
In a network, resources (files, folders, software or hardware) can be shared so that other
users on the network are able to access them.
A shared server can be created for this purpose or users can even make their own
resources sharable to each other. This is done using IP Address.
- When a shared server is made, all the resources to be shared among users are
placed in it and it is given an IP address with a password. Other domain users
can now access the shared server by:
Start Run type: //ipaddressofsharedserver
A password will be asked on entering which, the domain user can access all the
shared resources from the shared server.
- If a user wants to make any resources sharable, then follow these steps:
Right click on the file/folder Click Properties Select ‘Sharing’ tab
Select ‘share this folder’
The folder becomes shared and is visible with a hand underneath the folder
name. Sharing options can be used to limit the number of users that can access
the folder and set permissions for them.
The shared folder can now be accessed by the other domain users by:
Start Run type: //ipaddress
Here, ipaddress is the IP address of the user who has shared its resource.
- Hardware like printers can also be shared within a network either by making a
shared print server with an IP address assigned to it which can be accessed by
all domain users, or by assigning the network printer an IP address and
configuring the printer software on each of the domain user’s system.
54
NETWORK TROUBLESHOOTING
1. PING
The "ping" program uses ICMP echo message requests and listens for ICMP echo
message reply messages from its intended host. Using the -R option with ping enables
55
the record route feature. If this option is used ping will set the record route (RR) in the
outgoing ICMP IP datagram.
If you do not get a reply, and there is no firewall software installed, your
network configuration, modem, Ethernet card, or cabling is probably at fault.
Triple check all your network settings.
2. TRACEROUTE
The "traceroute" program uses ICMP messaging and the time to live (TTL) field
in the IP header. It works by sending a packet to the intended host with a TTL
56
value of 1. The first router will send back the ICMP "time exceeded" message to
the sending host. Then the traceroute program will send a message with a TTL of
2, then 3, etc. This way it will get information about each router using the
information received in the ICMP packets. To get information about the
receiving host, the message is sent to a port that is not likely to be serviced by
that host. A ICMP "port unreachable" error message is generated and sent back.
This should begin listing the hops between the computer and network devices.
When the connection fails, determine which device is causing the issue by
reviewing the traceroute listing.
4. NETSTAT
57
BASIC ADMINISTRATION
FORMATTING
Formatting is the process of reinstalling a new file system on a hard disk. It is generally
done in case of a corrupted OS.
Formatting in Windows XP can be done in following steps:
Step 1- Insert your Windows XP installation disc into your CD or DVD drive.
Step 2 - Restart your computer and start Windows setup using Microsoft Windows
bootable XP disk
Step 3 - Press ENTER to set up Windows XP now
Step 4 - Accept Windows usage agreement
Step 5 - Setup start
Press enter to start the windows installation
If an existing Windows XP installation is detected by the system, you are prompted to
repair it.
Step 6 - Delete old partition using ‘D’ and format
Step 7 - Create a new partition in the unpartitioned space by pressing ‘C’ and enter the
size of the partition required.
58
Step 8 - Select format using NTFS (Quick) and hit Enter.
During formatting, if there is an error or a “death screen” shows up, then either the hard
disk or RAM is damaged due to which OS cannot copy file to a particular bad sector.
If a sector of the hard disk is damaged, the hard disk can only be used as slave, its data
saved on another external hard disk and it becomes useless.
• Low-level formatting means creating all the sectors, tracks, cylinders, and head
information on the drive.
• A low-level format performs three simultaneous functions:
1. It creates and organizes the sectors, making them ready to accept data.
2. It sets the proper interleave (records the sector header, trailer information, and
intersector and intertrack gaps).
3. It establishes the boot sector.
59
The high-level format is simply called "format" (the program used to perform a high-
level format is called FORMAT.COM).
This is the same format command used to prepare floppy disk drives. The high-level
format performs two major functions:
• It creates and configures the file allocation tables (FATs).
• It creates the root directory, which is the foundation on which files and
subdirectories are built.
PARTITIONING
• Partitions are logical divisions of a hard drive. HDD can have anywhere from 1
to 24 logical drives, identified as C to Z.
• Partitions exist for two reasons:
To divide the disk into several drive letters to make it easier to organize
data files.
To accommodate more than one operating system.
• Partitioning offers many advantages. It helps the computer run faster, crash less,
be more efficient in general, makes defragmentation and scan disks easier, fast
and easy isolation of data and control of selective file sharing.
60
• FDisk, which is free with Windows, and which will wipe out the contents of
existing partitions in making any changes to them (therefore, backups are
definitely recommended!).
• Third party partitioning programs, of which the best is still Partition Magic,
and which do not wipe out your data.
BOOTING PROCESS
Booting is a bootstrapping process that starts operating systems when the user turns on
a computer system. The booting process in windows XP consists of a list of detailed
procedures that the system undergoes to perform all system checks and load all
necessary files to bring the computer to an operable state. The booting process has
following steps:
As soon as you power up your computer, a self-test is performed by the power supply
to ensure that the volume and current levels are correct before the Power Good signal is
sent to the processor. When this first stage is cleared, the microprocessor will then
trigger the BIOS to perform a series of operations.
The BIOS, also known as the Basic Input Output System is a firmware or set of
instructions that resides on a ROM chip as contained in the motherboard. It first carries
out the P.O.S.T that performs and verifies all initial hardware checks, such as checking
if the system is initialized by a warm or cold start, detecting the presence of peripheral
devices and the amount of memory present. BIOS is a utility that gives us the facility to
enable or disable devices, see their status, set date and time, password (user and
supervisor), boot up sequence, etc..
The system will now attempt to determine the sequence of devices to load based on the
settings stored in the BIOS to start the operating system. It will start by reading from
the first bootup device. If it points to the floppy drive, it then searches for a floppy disk.
If it does not detect a bootable disk in the floppy drive, the system displays an error
message. If the floppy drive does not contain a disk, it detects the second device, which
is usually the hard disk. It'll then start by reading the boot code instructions located in
the master boot record and copies all execution into the memory when the instructions
are validated and no errors are found.
61
Once the POST is complete and the BIOS is sure that everything is working properly,
the BIOS will then attempt to read the MBR (Master Boot Record). Master boot record
holds the disk’s primary partition table and is present at position track 0, cylinder 0,
sector 1 of the hard disk. It identifies the primary partition, extended partitions and
active partition which are needed to determine the file system and locate the operating
system loader file - NTLDR.
The MBR looks at the BOOT SECTOR (the first sector of the active partition). That is
where NTLDR is located; NTLDR is the BOOT LOADER for Windows XP. NTLDR
allows memory addressing, initiate the file system, read the boot.ini and loads the boot
menu.
Once XP is selected from the Boot Menu, NTLDR will run NTDETECT.COM,
BOOT.INI and BOOTSECT.DOS to get the proper OS selected and loaded. The
system starts in 16-bit real mode and then moves into 32-bit protected mode.
NTDETECT.COM searches for hardware devices and checks if their drivers are
properly installed or not. BOOT.INI is a configuration file that shows the names of the
operating systems present in hard disk. IO.SYS, MSDOS.SYS, PAGEFILE.SYS,
CONFIG.SYS are other system files saved in MBR. The first two contain MS-DOS
commands, PAGEFILE.SYS consists of the system’s virtual memory and uses the
concept of paging/swapping for faster access, CONFIG.SYS is used to configure
different hardware components of the computer, reload all drivers and executes only at
the time of booting. Both NTLDR and NTDETECT.COM work together to enter all the
system registry into the registry editor.
NTLDR loads NTOSKRNL.EXE and HAL.DLL. Effectively, these two files are
windows XP. They must be located in %SystemRoot%System32. HAL.DLL
(Hardware Abstraction Layer) is a very important file since it provides for
communication with the motherboard.
NTLDR reads the registry, chooses a hardware profile and authorizes device drivers, in
that exact order.
FILE SYSTEMS
62
File system is a management tool that gives information about the FID (File
Identification Number) for the location of files in hard disks and drives. The file system
actually decides the manner that how data will be accurately arranged in the hard disk
drive. Whenever a file/folder is created, it is saved in the hard disk with an Inode
number or FID. Its subsequent folders maybe stored in any sector on the disk but its
Inode no. is linked with its parent file/folder’s Inode no.
Files in Windows XP can be organized on the hard disk in two different ways.
• The old FAT (File Allocation Table) file system was developed originally
(when the original IBM PCs came out) for MS-DOS on small machines and
floppy disks. There are variants — FAT12 is used on all floppy disks, for
example — but hard disk partitions in Windows XP can be assumed to use the
FAT32 version, or 32-bit File Allocation Table. FAT32 doesn’t provide security
and can cause cluster damage.
• Later, a more advanced file system was developed for hard disks in Windows
NT, called NTFS (the “NT File System”). This has matured, through several
versions, into the latest one that exists alongside FAT in Windows XP.
The file system used goes with an individual partition of the disk. You can mix the
two types on the same physical drive. Files can be moved between folders on an NTFS
partition and folders on a FAT partition or across a network to another machine that
might not even be running Windows. To convert FAT to NTFS:
Advantages of NTFS
NTFS supersedes the FAT file system as the preferred file system for
Microsoft’s Windows operating systems. NTFS has several improvements over FAT
and HPFS (High Performance File System) such as improved support for metadata and
the use of advanced data structures to improve performance, reliability, and disk space
utilization, plus additional extensions such as security access control lists (ACL)
and file system journaling. The NTFS file system provides various facilities like:
• File Encryption
63
• File/ folder Compression
This facility provided by NTFS is used to compress the hard disk space. Compression
is done by:
Select any file/folder Right click and select Properties Click on advance tab
Select compress contents to save disk space
The compressed folder then appears in blue color.
• Disk Quota
NTFS also allows administrator to set up disk quotas for other users on the system.
Disk Quota can be set by:
Select any local hard drive Right click and select properties Select Quota tab and
enable quota management
64
• No cluster formation or damage
There is no cluster formation or damage in NTFS due to which it is more reliable and
secure for recovery purposes.
• Journaling
NTFS has stronger means of recovering from troubles than does FAT. All changes to
files are “journalized,” which allows the system to roll back the state of a file after a
crash of the program using it or a crash of the system. Also, the structure of the file
system is less likely to suffer damage in a crash, and is therefore more easily reinstated
by CheckDisk (CHKDSK.EXE). If an NTFS partition is so damaged that it is not
possible to boot Windows, then only repair can be very difficult.
• Inherit Permissions
65
The main feature of the NTFS file system is that you can define local security for files
and folders stored on NTFS partitions. You can specify access permissions on files and
folders which control which users can access the NTFS files and folders. You can also
specify what level of security is allowed for users or group. NTFS permissions can be
set for folders and files. On NTFS partitions, permissions are applied to users who
access the computer locally, and who access a NTFS folder which has been shared over
the network.
By default, permissions of NTFS volumes are inheritable. What this means is that files
and subfolders inherit permissions from their associated parent folder. You can
however, configure files and subfolders not to inherit permissions from their parent
folder.
• Allow inheritable permissions from the parent to propagate to this object and all
child objects. Include these with entries explicitly defined here.
• Replace permission entries on all child objects with entries shown here that
apply to child objects.
When you clear inheritance of NTFS permissions from a parent container, you are
presented with two options: Copy and Remove. The Copy option will recurse the child
objects and write the NTFS permissions from the parent folder. The Remove option
removes all default NTFS-created permissions--that of Administrators, Users, Creator
Owner, System, etc.--from the list of Group or User Name. If you select this option,
you must add custom permissions before you apply the changes, because no users or
groups will have access to the folder until you add permissions.
COMPUTER MANAGEMENT
66
• Create and manage shared resources.
• Start and stop system services, such as Task Scheduler and Indexing Service.
The following table lists some of the most common tasks for managing computers, and
the tools that can be used to perform them:
67
Manage user profiles. User profiles
overview
This method isn’t that secured since it gives all administrative powers to the domain
users.
This method is better but while softwares installation, administrator password will be
asked or run as own user option can be used for a power user.
Also a Power User cannot change the name of any local drive or any modifications if
NTFS permissions are not given.
REGISTRY EDITOR
Registry editor is a very sensitive part of the Operating System. It is an advanced tool
for viewing and changing settings in system registry, which contains information about
how computer runs. Windows stores its configuration information in a database, known
as the registry, that is organized in a tree format. Although Registry Editor enables us to
inspect and modify the registry, normally we do not need to do so, and making
incorrect changes can break our system. An advanced user who is prepared to both edit
and restore the registry can safely use Registry Editor for such tasks as eliminating
duplicate entries or deleting entries for programs that have been uninstalled or deleted.
While this simplifies the administration of a computer or network, one incorrect edit to
the registry can disable the operating system.
68
To open Registry Editor
• Click Start, click Run, type regedit, and then click OK.
• Before making changes to the registry, make a backup copy.
For example, because members of the Administrators group have full access to
the registry, add only users who need such access to the Administrators group.
Alternately, you can use Registry Editor to set permissions for specific keys and
subtrees, or simply remove Registry Editor from the computers of users whom
you do not want to alter the registry.
• HKEY_LOCAL_MACHINE
Contains information about the local computer system, including hardware and
operating system data such as bus type, system memory, device drivers, and
startup control data.
69
• HKEY_CLASSES_ROOT
Contains information used by various OLE technologies and file-class
association data. A particular key or value exists
in HKEY_CLASSES_ROOT if a corresponding key or value exists in
either HKEY_LOCAL_MACHINE\SOFTWARE\Classes or HKEY_CURREN
T_USER\SOFTWARE\Classes. If a key or value exists in both places,
the HKEY_CURRENT_USER version is the one that appears
in HKEY_CLASSES_ROOT.
• HKEY_CURRENT_USER
Contains the user profile for the user who is currently logged on interactively
(as opposed to remotely), including environment variables, desktop settings,
network connections, printers, and program preferences. This subtree is an alias
of the HKEY_USERS subtree and points to HKEY_USERS\security ID of
current user.
• HKEY_USERS
Contains information about actively loaded user profiles and the default profile.
This includes information that also appears in HKEY_CURRENT_USER.
Users who are accessing a server remotely do not have profiles under this key
on the server; their profiles are loaded into the registry of their own computers.
• HKEY_CURRENT_CONFIG
Contains information about the hardware profile used by the local computer
system at startup. This information is used to configure settings such as the
device drivers to load and the display resolution to use. This subtree is part of
the HKEY_LOCAL_MACHINE subtree and points to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Hardware
Profiles\Current.
GROUP POLICY
Group Policy settings define the various components of the user's desktop environment
that a system administrator needs to manage, for example, the programs that are
available to users, the programs that appear on the user's desktop, and options for
the Start menu. To create a specific desktop configuration for a particular group of
users, use Group Policy Object Editor. Group Policy settings that you specify are
contained in a Group Policy object, which is in turn associated with selected Active
Directory® objects--sites, domains, or organizational units.
Group Policy applies not only to users and client computers, but also to member
servers, domain controllers, and any other Microsoft® Windows® 2000 computers
within the scope of management. By default, Group Policy that is applied to a domain
(that is, applied at the domain level, just above the root of Active Directory Users and
Computers) affects all computers and users in the domain.
70
With Group Policy we can do the following:
• Assign scripts. This includes such scripts as computer startup, shutdown, logon,
and logoff.
• Manage applications. With Group Policy you can assign, publish, update, or
repair applications by using Group Policy Software Installation.
BACK UP
The Winternal ERD Commander is a software that can be used to take backup of a
corrupted OS hard disk. It is a bootable CD that allows for connection of external hard
drive also. Even if OS is corrupt, the CD boots and the data in local hard drives (D, E,
and F) can be backed up onto the external hard drive.
2. ASR BACK UP
ASR sets should be created on a regular basis as part of an overall plan for system
recovery in case of system failure. ASR should be a last resort in system recovery, used
only after you have exhausted other options such as Safe Mode Boot and Last Known
Good Configuration. Automated System Recovery (ASR) is a two part system
recovery, ASR backup and ASR restore.
The backup portion is accomplished through the ASR wizard located in Backup
(Start All programs Accessories System tools Backup). The wizard backs
up the system state, system services and all disks associated with the operating system
components. At the end, it asks for a floppy drive. This floppy drive now contains
71
information about the backup, the disk configurations (including basic and dynamic
volumes) and how to accomplish a restore.
The restore part is accessed by hitting F2 when prompted for ASR backup during setup
from Windows XP installation CD. Enter the floppy when it is prompted for. ASR will
read the disk configurations from the floppy and restore all of the disk signatures,
volumes and partitions on, at a minimum, the disks required to boot up. (It will attempt
to restore all of the disk configurations, but under some circumstances, it may not be
able to). ASR then installs a simple installation of and automatically starts a restore
from backup using the backup created by the ASR wizard.
3. MASTER-SLAVE METHOD
When a hard disk gets corrupted due to some bad sector, then “Master-Slave” method
can be used to create backup of the damaged hard disk. In this method, the damaged
hard disk is inserted in another CPU with its own master hard disk (running properly)
and the jumper settings of that CPU are changed to make sure that damaged hard disk is
‘slave’ while running hard disk is ‘master’. In this way, booting takes place with the
master hard disk with all the contents of damaged hard disk (slave) available as further
local hard disk drives and thus the backup of damaged hard disk can be taken.
TROUBLESHOOTING
Startup Issues
73
- Get copies of the system configuration, emergency startup, recovery disks,
backups of core system files.
- Look for possible virus .
Operational Issues
Shutdown Issues
Computers can:
- Unexpectedly hang during normal operation
- Restart mode without warning
- Refuse to close when a proper shutdown
- Use safe mode or find another way to actually gain entry into the Windows
operating environment and run these tools.
- Most of these tools are available by clicking either
Start\Programs\Accessories\System Tools,
Start\Programs\Accessories\Administrative Tools, or via the Control Panel.
Some require command mode access.
- Use computer management, device manager, system configuration utility tools.
- Shutting down Windows improperly can leave a system in an unstable state and
corrupt important files.
74
- System hangs during shutdown due to an application that is not properly
releasing control or a runaway process.
- Two of the most valuable tools for resolving these problems are:
1. Selective startup
REMOTE ASSISTANCE
Remote assistance can be used to troubleshoot any problems occurring in the computer
system. Only one user can be given assistance at a time. An invitation file RA has to be
prepared first. The following steps can be undertaken:
- Press F1 and select “Ask for assistance”
- Invite a friend to connect to your computer with Remote Assistance.
- Click ‘Invite someone to help you’ and select ‘Save Invitation as a file’.
- Enter the name, invitation time and password. Then save this invitation file on
desktop.
- Put this file in a folder and then share it by giving password to the user, via
email.
- The expert accepts the remote assistance request by entering password and yes.
- The “Attempting to Start Remote Assistance Session with user” box appears.
Thus, remote assistance has now begun. Only chatting is possible in this case, users
cannot do anything but taking control is also possible.
75
BIBLIOGRAPHY
1. Wikipedia
2. www.esnips.com
3. www.firewall.cx
4. technet.microsoft.com
5. CISCO CCNA network guide
6. Notes from Mr.Hemant Chatterjee
76