Itnet02 Module
Itnet02 Module
TABLE OF CONTENT…………………………………………………............. 1
CHAPTER 1
DEVICES FOR CONNECTING NETWORKS……………………………... 3
LAN TRANSMISSION DEVICES……………………………………… 3
MULTISTATION ACCESS UNIT (MAU or MSAU) …………………. 5
HUB……………………………………………………………………… 7
BRIDGE…………………………………………………………………. 8
ROUTER………………………………………………………………… 10
SWITCH…………………………………………………………………. 13
GATEWAY ……………………………………………………………… 16
WAN TRANSMISSION DEVICES……………………………………… 17
FREQUENTLY USED WAN TRANSMISSION DEVICES……………. 18
CABLE TV MODEMS…………………………………………………... 19
DSL MODEMS and ROUTERS………………………………………… 20
ACCESS SERVERS……………………………………………………... 21
SUMMARY …………………………………………………………. 22
CHAPTER 2
CONNECTING THROUGH A WIRELESS NETWORK…………………... 23
CURRENT WIRELESS NETWORKING TECHNOLOGIES.…………. 23
RADIO WAVE TECHNOLOGIES……………………………………… 23
IEEE 802.11 RADIO WAVE NETWORKING…………………………. 25
WIRELESS COMPONENTS……………………………………………. 25
WIRELESS NETWORKING ACCESS METHODS……………………. 27
TRANSMISSION SPEEDS……………………………………………… 27
ALTERNATIVE RADIO WAVE TECHNOLOGIES…………………... 28
SUMMARY…………………………………………………………. 31
CHAPTER 3
SHARING RESOURCES ON A NETWORK………………………………. 32
WHAT IS PEER-TO-PEER NETWORKING?......................................... 32
PEER-TO-PEER NETWORKING FOR HOME USE…………………... 33
PEER-TO-PEER NETWORKING FOR OFFICE USE…………………. 33
CONFIGURING USER ACCOUNTS…………………………………… 33
CONFIGURING USER ACCOUNTS IN WINDOWS 7………………... 33
CONFIGURING ACCOUNTS IN UNIX/LINUX………………………. 33
CONFIGURING ACCOUNTS IN MAC OS X…………………………. 33
IMPLEMENTING A VIRTUAL PRIVATE NETWORK (VPN)………. 34
STORAGE AREA NETWORKS (SAN)………………………………… 34
SUMMARY…………………………………………………………. 35
1
CHAPTER 4
UNDERSTANDING AN IP ADDRESS……………………………………... 36
HOW IP ADDRESSING WORKS………………………………………. 36
IP AS A CONNECTIONLESS PROTOCOL……………………………. 36
USING INTERNET PROTOCOL VERSION 4 (IPV4) ………………… 37
IPV4 ADDRESS RULES………………………………………………… 38
USING INTERNET PROTOCOL VERSION 6 (IPV6) ………………… 39
FEATURES OF IPV6……………………………………………………. 39
THE ROLE OF SUBNET MASK………………………………………... 39
CREATING SUBNETWORKS………………………………………...... 40
STATIC IP CONFIGURATION - WINDOWS 7………………………... 40
TO ENABLE DHCP OR CHANGE OTHER TCP/IP
SETTINGS IN WINDOWS IN WINDOWS 8.1……………………. 44
TO ENABLE DHCP OR CHANGE OTHER TCP/IP
SETTINGS IN WINDOWS IN WINDOWS 10……………………. 44
SUMMARY…………………………………………………………. 45
2
Chapter 1
Learning Objectives:
DISCUSSION PROPER
REPEATER
A repeater operates at the physical layer. Its job is to regenerate the signal over
the same network before the signal becomes too weak or corrupted so as to extend
the length to which the signal can be transmitted over the same network. An
important point to be noted about repeaters is that they do not amplify (expand) the
signal. When the signal becomes weak, they copy the signal bit by bit and regenerate
it at the original strength. It is a 2 port device.
NOTE: as the signal travel it tends to weaken
3
Figure 1-1 Two LAN segment connected by a Repeater
Uses of Repeaters
4
9. Increase communication distance of T-carrier lines.
Types of Repeaters
According to the domain of LANs they connect, repeaters can be divided into two
categories:
• Local Repeaters − they connect LAN segments separated by small
distance.
• Remote Repeaters − they connect LANs that are far from each other.
Advantages of Repeaters
1. Repeaters are simple to install and can easily extend the length or the
coverage area of networks.
2. They are cost effective.
3. Repeaters don’t require any processing overhead. The only time they need
to be investigated is in case of degradation of performance.
4. They can connect signals using different types of cables.
Disadvantages of Repeaters
5
However, every message passes through every computer, each passing it on
to the next in a continuing circle until it arrives at its proper destination. This leaves
the token-ring topology vulnerable in that a single non-operating node can break
the ring.
The MAU solves this problem because it has the ability to bypass non-
operating nodes and maintain the ring structure.MAU technology evolved into
newer devices: Control Access Unit (CAU): allows several connected, stack able
units to count as one MAU. CAUs also come with options for gathering information
used in network performance management.
Figure 1-3 Several MAUs can be interconnected via their Ring-In/ Ring-Out
ports to expand the network.
6
3. Amplify data signals.
4. Expand token ring network by daisy-chain connections.
5. Provide for orderly movement of data.
6. Shut down ports to malfunctioning nodes.
HUB
It is a central network device connecting nodes in a star topology. It is basically
a multiport repeater. It connects multiple wires coming from different branches. For
example, the connector in star topology which connects different stations. Hubs
cannot filter data, so data packets are sent to all connected devices. In other
words, collision domain of all hosts connected through hub remains one. Also, they
do not have the intelligence to find out best path for data packets which leads to
inefficiencies and wastage.
Functions of a Hub
1. Centrally connect multiple nodes into one network.
2. Permit connections on single or multiple LANs.
3. Provide multi-protocol services.
7
4. Consolidate the network backbone.
5. Provide connections for several different media types.
6. Enable centralized network management and design.
Types of Hub
Active Hub - these are the hubs which have their own power supply and can
clean, boost, and relay the signal along with the network. It serves both as a
repeater as well as wiring centre. These are used to extend the maximum distance
between nodes.
Passive Hub - these are the hubs which collect wiring from nodes and power
supply from active hub. These hubs relay signals onto the network without
cleaning and boosting them and can’t be used to extend the distance between
nodes.
Intelligent Hub - it work like active hubs and include remote management
capabilities. They also provide flexible data rates to network devices. It also
enables an administrator to monitor the traffic passing through the hub and to
configure each port in the hub.
BRIDGE
8
Figure 1-5 Bridge Connection
The working principle of a bridge is, it blocks or forwards the data depending
on the destination MAC address and this address is written into every data frame.
9
Functions of a Bridge
Types of Bridges
Local - directly connects two LANs in close proximity. Also used to segment
traffic to reduce bottlenecks.
Remote - join distant networks. Used to join networks in different cities or
states.
ROUTER
10
Figure 1-7 Router
11
General functions of a Router
Routing Table
The functioning of a router depends largely upon the routing table stored in it.
The routing table stores the available routes for all destinations. The router consults
the routing table to determine the optimal route through which the data packets can
be sent.
A routing table typically contains the following entities
• IP addresses and subnet mask of the nodes in the network.
• IP addresses of the routers in the network.
• Interface information among the network devices and channels.
12
6. In static routing, additional In dynamic routing, additional
resources are not required. resources are required.
7. In static routing, failure of link In dynamic routing, failure of link does
disrupts the rerouting. not interrupt the rerouting.
Types of Routers
SWITCH
13
Switches are more advanced than hubs and less capable than routers. Unlike
hubs, switches can limit the traffic to and from each port so that each device
connected to the switch has a sufficient amount of bandwidth. For this reason, you
can think of a switch as a "smart hub." However, switches don't provide the firewall
and logging capabilities that routers do. Routers can often be configured by
software (typically via a Web interface), while switches only work the way the
hardware was designed.
14
Types of Switches
15
GATEWAY
Functions of a Gateway
1. Convert common protocols to specialized type.
2. Convert message formats from one format to another.
3. Translate different addressing schemes.
4. Link a host computer to a LAN.
5. Provide terminal emulation for connections to host.
6. Direct electronic mail to the right network destination.
7. Connect networks with different architectures.
16
Types of Gateways
On basis of direction of data flow, gateways are broadly divided into two
categories:
• Unidirectional Gateways - they allow data to flow in only one direction.
Changes made in the source node are replicated in the destination node,
but not vice-versa. They can be used as archiving tools.
• Bidirectional Gateways- they allow data to flow in both directions.
They can be used as synchronization tools.
17
FREQUENTLY USED WAN TRANSMISSION DEVICES
When an analog facility is used for data communication between two digital
devices called Data Terminal Equipment (DTE), modems are used at each end.
DTE can be a terminal or a computer.
The modem at the transmitting end converts the digital signal generated by DTE
into an analog signal by modulating a carrier. This modem at the receiving end
demodulates the carrier and hand over the demodulated digital signal to the DTE.
ISDN Adapters
Integrated Services Digital Network (ISDN) is a circuit-switched telephone
network system that transmits both data and voice over a digital line. It is a set of
communication standards to transmit data, voice, and signaling. These digital lines
could be copper lines. It was designed to move outdated landline technology to
digital. ISDN connections have a reputation for providing better speeds and higher
quality than traditional connections. Faster speeds and better connections allow data
transmissions to travel more reliably.
18
Figure 1-12 ISDN Adapter
CABLE TV MODEMS
Cable modem, modem used to convert analog data signals to digital form and
vice versa, for transmission or receipt over cable television lines, especially for
connecting to the Internet.
A cable modem modulates and demodulates signals like a telephone modem
but is a much more complex device. Data can be transferred over cable lines much
more quickly than over traditional phone lines. Transmission rates range from about
8 megabits per second (Mbps) for basic services to some 50 Mbps for premium
services. Uses two channels (frequencies) to communicate, the upstream and
downstream. Upstream transmits outgoing data, sound, TV signals while
downstream receives and blend incoming signals. Modem speeds may differ
upstream and downstream.
19
Figure 1-13 Upstream and Downstream system
20
ACCESS SERVERS
It combines WAN communications into one device. Internet Service Providers
(ISP) use Network Attached Storage (NAS) to provide Internet access to their
remote users. NAS works by enabling simultaneous connections between multiple
remote users through a dial-up connection, wired/wireless medium or multiple
supported analog/digital connectivity interfaces. Upon successful user
authentication, Internet access is granted.
21
SUMMARY
Early networks use repeaters to expand network communications when the
Institute of Electrical and Electronics Engineers (IEEE) limits are reached or to
extend the range of wireless communications. Some network devices incorporate
repeater functions as they implement more complex network options such as
filtering and forwarding packets and frames
Routers and switches incorporate some bridging functions for networking and
are used in centralized star-based networks to connect segments and to link
networks to one another. Routers and switches can be equipped with intelligence to
help in collecting network data and for centralized network management. Routers
are popular because they control traffic patterns and they play a dual role providing
both LAN and WAN connectivity
Switches are popular because they are faster than hubs. Hub is commonly used
to connect segments of a LAN. It contains multiple ports. When a packet arrives at
one port, it is copied to the other ports so that all segments of the LAN can see all
packets. Switch support any packet protocol. It filters and forwards packets between
LAN segments.
Analog modems used over PTSN lines have been used for many years in the
past. Cable modems have a widespread presence because they can be used over
existing cable TV lines and offer high-speed access. Access servers provide a single
unit in which to combine all types of telecommunications connectivity (modems,
T-1, ISDN, and DSL).Remote routers are used to join LANs at remote sites into
WANs.
22
Chapter 2
Learning Objectives:
DISCUSSION PROPER
23
number of cycles occurring each second. In fact, an old convention for the unit for
frequency is cycles per second (cps). 802.11 WLANs use radio waves having
frequencies of 2.4 GHz and 5 GHz, which means that the signal includes
2,400,000,000 cycles per second and 5,000,000,000 cycles per second, respectively.
The amplitude of a radio wave indicates its strength. The measure for
amplitude is generally power, which is analogous to the amount of effort a person
needs to exert to ride a bicycle over a specific distance. Radio waves have
amplitudes with units of watts, which represent the amount of power in the signal.
Watts have linear characteristics that follow mathematical relationships we are all
very familiar with. For example, the result of doubling 10 milliwatts (mW) is 20
mW.
Spread spectrum radio components use either direct sequence or frequency
hopping for spreading the signal. Direct sequence modulates a radio carrier by a
digital code with a bit rate much higher than the information signal bandwidth.The
ffrequency range is 902–928 MHz range and data transfer range is 1–600 Mbps.
Other radio wave technologies include Bluetooth, HiperLAN, Infrared, WiMAX,
HiperMAN, and cellular phone.
24
Advantages to radio wave communications
1. Can save money where it is difficult or expensive to run cable.
2. Useful in situations where portable computers deployed.
3. Relatively easy and inexpensive to install.
WIRELESS COMPONENTS
Wireless networks use an Access Point (AP), also called a Wireless Access
point (WAP), to provide a gateway to the wired network and a wireless local area
network adapter (WLAN adapter or simply wireless adapter) to provide a link
between a wireless client PC and the AP.
An Access Point connects to the wired network (or directly to a cable/DSL
modem) and can simultaneously provide wireless links to many wireless adapters.
A typical AP allows 32 or 64 wireless adapters to be connected simultaneously.May
support the following types of network interfaces: AUI, 10Base2, 10BaseT,
100Base technologies, 1000Base technologies, 40 GB Ethernet technologies, 100
GB Ethernet technologies, FDDI, Cable modem port, or DSL telecommunications
port.
An Antenna is a device that radiates and receives radio waves. Most are either
directional or omnidirectional.
• Directional Antenna sends radio waves in one main direction.
Amplifies signal better than omnidirectional antenna. It gains
25
amplification of radiated signal and for application transmitting signals
between buildings, each building has an antenna, antennas connected
to access points, signal has more gain in one direction and small portion
of signal is radiated outward.
26
WIRELESS NETWORKING ACCESS METHODS
TRANSMISSION SPEEDS
The rate at which data are moved across a communications channel. Following
are the transmission speeds of common LAN and WAN technologies. It correspond
to the Physical layer of the OSI model.
Transmission speeds are defined through four IEEE standards: 802.11a, 802.11b,
802.11g, and 802.11n. There are two newer very-high-speed wireless LAN standards
under development: 802.11ac and 802.11ad.
• 802.11a transmits data over a wireless network. It uses a 5
GHz frequency band and supports data transfer rates of 54 Mbps, or
6.75 megabytes per second.
• 802.11b outlines speeds in the 2.4 GHz frequency range with a
minimum speed of 1 Mbps up to the maximum speed of 11 Mbps.
• 802.11g has very Fast operating speed and signal range is also good and
is not easily obstructed. It supports three transmission methods on the
2.4 GHz band.There’s a restrictions and considerations using 802.11g
that devices must support minimum speeds by standard, slightly shorter
range than 802.11b, smaller bandwidth (90 MHz) than 802.11a or
802.11b and devices combine with 802.11b devices on one LAN.
• 802.11n uses a technology called multiple-input multiple-output
(MIMO) with spatial multiplexing. Multiple frames can be aggregated
together in one transmission. Number of times a channel must be
acquired and released is significantly reduced due to frame aggregation,
making it more efficient than other 802.11 technologies can use 20 and
40 MHz channels within the 2.4 and 5 GHz bands. At this writing, most
802.11n devices have a top speed of 300+ Mbps.
27
• 802.11ac is currently under development. It designed around the
technologies used by 802.11n and expands transmission capabilities to
use the 80 MHz channel for even wider bandwidth.
• 802.11ad is also under development. It targeted at accomplishing
transmission speeds of roughly 7 Gbps. Operates using the 60 MHz
channel. Designed for shorter transmission distances (likely to be
restricted by walls and manufacturers are looking at 802.11ad for Wi-Fi
based phone communications and HD movies on big-screen wireless
TVs.
Bluetooth
Occurs in 2.4 GHz range (2.4–2.4835 GHz. Uses high wattage transmissions
that can reach up to 100 meters and can use asynchronous or synchronous
communication.
Bluetooth devices are divided into three classes based on range:
• Class 1: up to about 100 meters.
• Class 2: up to about 10 meters such as wireless devices such as
keyboards, mice, microphones, and audio devices.
• Class 3: up to about 1 meter used for close range transmissions such as
medical monitoring devices, watches, and exercise monitoring.
Infrared Technologies
Broadcasts in single direction or all directions. Advantages of infrared medium
are inexpensive, difficult to intercept and not susceptible to Radio-Frequency
Interference (RFI) or Electromagnetic Interference (EMI). Slow data transmissions
(between 1 and 16 Mbps), does not penetrate walls and experiences interference
from strong visible light, these are the disadvantages of infrared medium.
28
with a reach of up to 48 kilometers (30 miles).WiMAX can be a cost-effective way
to create a network over several miles.
Wireless Hotspots
The locations that provide a public access point to users. There’s two type of
wireless hotspots:
• Stationary: examples include a library, an airport, a coffee shop, or
hotel.
• Mobile: 3G and 4G networks make it possible for individuals to create
their own wireless hotspots from any location that is accessible by a cell
phone.
Microwave Technologies
Have theoretical bandwidth up to 720 Mbps and beyond work in one of two
ways:
• Terrestrial Microwave two directional parabolic antennas (dishes. It
performed in ranges of 4–6 GHz and 21–23 GHz. Uses of terrestrial
microwave transmission, the cabling costs are too high whereas cabling
and wireless options not possible.
• Satellite Microwave transmits signal between three antennas, one
antenna on a satellite in space. Connection speeds are currently at 2-3
Mbps with newer systems providing up to 12 Mbps. The user equipment
needed for satellite communication are satellite dish about 2 or 3 feet in
diameter, digital modems to transmit and receive signals, coaxial (TV-
like) cables from the modems to dish ,USB cable from modems to a USB
port on computer and software from provider to enable computer setup.
29
Figure 2-4 Terrestrial and Satellite Microwave
30
SUMMARY
31
CHAPTER 3
Learning Objectives:
1. Explain how to use peer-to-peer networking in a home or office.
2. Configure user accounts.
3. Explain virtual private networks.
4. Explain storage area networks.
DISCUSSION PROPER
Files, folders, software, printers, and peripherals on one computer can be shared
and made available to others. No special host computer, such as a server, is needed
to allow workstations to communicate and share resources, although in some cases
the server can be used as a powerful workstation. Figure 3-1 above shows a peer-
to-peer network.
32
Peer-to-Peer Networking for Home Use
Many people have set up a peer-to-peer network for home use. Even if your
home has only two computers, a peer-to-peer network can make sense of sharing a
printer, an Internet connection, and a file. If you have more computers in your home,
the network makes even more sense for the same reasons plus others, such as
keeping backup copies of financial files on two computers.
33
in a home, public library, or other child location, parental controls are useful
features that can be configured. Types of accounts that can be created:
• Administrator: used to manage the computer and operating system.
• Standard: grants access privileges for general users.
• Sharing only: grants access only to shared resources (files and
folders) but not applications.
• Group: contains only other users or groups.
• Managed with parental controls: establishes parental controls
on an account.
34
Figure 3-2 A basic Storage Area Network
SUMMARY
Peer-to-peer networks are relatively easy to set up and inexpensive to maintain.
As networks grow in size and require more centralized management, peer-to-
peer is not a good option.
Also configure file permissions in Windows, Mac OS X, and UNIX/Linux
systems.
A Virtual Private Network (VPN) enables remote users to access shared
resources through secure tunnels.
A Storage Area Network (SAN) can be used to group storage devices on a
subnet for sharing storage among multiple servers.
35
Chapter 4
UNDERSTANDING AN IP ADDRESS
Learning Objectives:
DISCUSSION PROPER
IP as a Connectionless Protocol
IP is a connectionless protocol because its primary mission is to provide
network-to-network addressing and routing information and to change the size of
packets when the size varies from network to network, such as from Ethernet to
FDDI.
36
Using Internet Protocol version 4 (IPv4)
IPv4 address format is called the dotted decimal notation address. It is 32 bits
long and contains four fields, which are decimal values representing 8-bit binary
octets. An IPv4 address in binary octet format looks like this:
10000001.00000101.00001010.01100100. This number converts to 129.5.10.100
in decimal format. Part of the address is the network identifier (network ID), and
another part is the host identifier (host ID).
There are five IP address classes, Class A through Class E, and each is used
with a different type of network. The address classes reflects the size of the network
and whether the packet is unicast or multicast.
• Unicast is a transmission in which one packet is sent from a server to
each client the requests a file or an application, as is done with a video
presentation. If five clients request the video presentation, the server
sends five packets per each transmission to the five clients.
• Multicast, means that the server is able to treat all five clients as a group
and send one packet per transmission that reaches all five clients.
Multicast can be used to significantly reduce network traffic when
transmitting multimedia applications.
• Broadcast, which sends a communication to all points on a specific
network (router are often configured so that they do not forward
broadcasts to other networks).
37
Figure 4-3 IP Address as a 32-Bit Binary Number
38
Using Internet Protocol version 6 (IPv6)
IPv6 developed through IETF initiative. The IPv6 overcomes limitations of
IPv4, because IPv4 has no provision for network security or advanced routing
options and IPv4 offers no options for handling streaming video or video
conferencing.IPv6 uses eight 16-bit hexadecimal fields
example:1042:0071:0000:0000:07ac:0522:210c:425b.
Features of IPv6
• 128-bit address capability.
• Single address associated with multiple interfaces.
• Address auto configuration and CIDR addressing.
• 40-byte header instead of IPv4’s 20-byte header.
• New IP extension headers for special needs.
• Includes more routing and security options.
• Use of IP security (IPsec).
• Simpler automatic address configuration.
• More compact and efficient routing tables.
• Replacement of ARP by Neighbor Discovery.
39
octet and all binary 0s in the remaining octets:
11111111.00000000.00000000.00000000 (255.0.0.0).
Creating Subnetworks
To divide the network into subnetworks, the subnet mask contains a subnet ID,
determined by the network administrator, which the network and hosts IDs.
Example, the entire third octet in a Class B address could be designated to indicate
the subnet ID, which would be an octet of
11111111.11111111.11111111.00000000 (255.255.255.0).
Note that using a subnet mask to divide a network into a series of smaller
networks enables Layer 3 device effectively ignore traditional address class
designations, and therefore, it creates more options for segmenting networks
through multiple subnets ad additional network addresses. A newer way to ignore
address class designation is using Classless Interdomain Routing (CIDR)
addressing, which puts a slash (/) after the dotted decimal notation. For example,
165.100.18.44/18, meaning 18 bits needed for network ID, 14 for host ID (32 -18)
40
2. Click on the Network and Sharing Center option.
41
4. Right-click on the Local Area Connection icon, then select Properties.
42
6. In the window that opens, click the Use the following IP address: radio
button. In the IP address: Subnet mask: and Default gateway: number fields,
insert the numbers that were assigned to you by OIT.
7. Next, click the Use the following DNS server addresses: radio button. Next,
in the Preferred DNS server: and Alternate DNS server: number fields,
input the numbers that were assigned by OIT. Then click the OK button.
43
8. Click OK in the other window. You can now start using your new internet
connection. If for some reason the internet connection doesn't start working
right away, restart the computer and try again.
1. Select the Start button, start typing View network connections, and then
select View network connections in the list.
2. Right-click the connection that you want to change, and then select Properties. If
you're prompted for an administrator password or confirmation, type the password
or provide confirmation.
3. Select the Networking tab. Under This connection uses the following items,
select either Internet Protocol Version 4 (TCP/IPv4) and then
select Properties.
4. To specify IPv4 IP address settings, do one of the following:
• For a Wi-Fi network, select Wi-Fi > Manage known networks. Choose the
network you want to change the settings for, then select Properties.
44
• For an Ethernet network, select Ethernet, then select the Ethernet network
you’re connected to.
• When you select Automatic (DHCP), the IP address settings and DNS server
address setting are set automatically by your router or other access point
(recommended).
• When you select Manual, you can manually set your IP address settings and
DNS server address.
SUMMARY
IP enables data transfer and routing with packet addressing. UDP used with IP
(instead of TCP) in certain non-critical situations.
IPv4 is predominantly in use today but has the limitation that IPv4 addresses
are almost all used up.
IPv6 is newest version of IP which is not yet employed on many networks.
A subnetting, or sub networking, is the process of splitting a single large
network into two or more strands. This means that an otherwise mammoth and
unwieldy network can be subdivided into smaller, more localized networks.
The IP Configuration window configures the Internet Protocol parameters,
allowing the device to receive and send IP packets. In its factory
default configuration, the switch operates as a multiport learning bridge with
network connectivity provided by the ports on the switch.
45