0% found this document useful (0 votes)
71 views23 pages

Networking Computer UAF TTS Topics

Networking in computer UAF TTS Topics.pptx topic : OSPF Layers, TCP/IP CLASSES OF IP, MEDIA ACCES CONTROL,ICMP,UDP,EXCHANGE SERVER, SSH, DNS, HTTP, VPN, NAT, PORT.

Uploaded by

Nazia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views23 pages

Networking Computer UAF TTS Topics

Networking in computer UAF TTS Topics.pptx topic : OSPF Layers, TCP/IP CLASSES OF IP, MEDIA ACCES CONTROL,ICMP,UDP,EXCHANGE SERVER, SSH, DNS, HTTP, VPN, NAT, PORT.

Uploaded by

Nazia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

What The Internet Protocol Address (or IP Address) is a unique address that

is IP computing devices such as personal computers, tablets, and


Address smartphones use to identify itself and communicate with other devices in
the IP network. Any device connected to the IP network must have a
unique IP address within the network. An IP address is analogous to a
street address or telephone number in that it is used to uniquely identify
an entity
IP address classes
With an IPv4 IP address, there are five classes of available IP ranges: Class A, Class B,
Class C, Class D and Class E, while only A, B, and C are commonly used. Each class
allows for a range of valid IP addresses, shown in the following table.
ClassAddress rangeSupportsClass A1.0.0.1 to 126.255.255.254Supports 16 million
hosts on each of 127 networks.
Class B128.1.0.1 to 191.255.255.254Supports 65,000 hosts on each of 16,000
networks.
Class C192.0.1.1 to 223.255.254.254Supports 254 hosts on each of 2 million
networks.
Class D224.0.0.0 to 239.255.255.255Reserved for multicast groups.
Class E240.0.0.0 to 254.255.255.254Reserved for future use, or research and
development purposes.Ranges 127.x.x.x are reserved for the loopback or localh
Open Systems Interconnection
Model (OSI Model)

Seven Layers

The Open Systems Interconnection (OSI) Model is a conceptual


and logical layout that defines network communication used by
systems open to interconnection and communication with other
systems.
The model is broken into seven subcomponents, or layers, each
of which represents a conceptual collection of services provided
to the layers above and below it. The OSI Model also defines a
logical network and effectively describes computer packet
transfer by using different layer protocols.
The OSI Model may also be referred to as the seven-layer OSI Model or the seven-
layer model.
Layer 4 – Transport
The Transport Layer deals with the coordination of the data
transfer between end systems and hosts. How much data to
send, at what rate, where it goes, etc. The best known
example of the Transport Layer is the Transmission Control
Protocol (TCP), which is built on top of the Internet Protocol
(IP), commonly known as TCP/IP. TCP and UDP port
numbers work at Layer 4, while IP addresses work at Layer
3, the Network Layer.
Layer 3 - Network
Here at the Network Layer is where you’ll find most of the
router functionality that most networking professionals care
about and love. In its most basic sense, this layer is
responsible for packet forwarding, including routing
through different routers. You might know that your Boston
computer wants to connect to a server in California, but
there are millions of different paths to take. Routers at this
layer help do this efficiently.
Secure Shell (SSH)

SSH, also known as Secure Shell or Secure Socket Shell, is a network


protocol that gives users, particularly system administrators, a secure
way to access a computer over an unsecured network. SSH also
refers to the suite of utilities that implement the SSH protocol.
Secure Shell provides strong authentication and encrypted data
communications between two computers connecting over an open
network such as the internet. SSH is widely used by network
administrators for managing systems and applications remotely,
allowing them to log into another computer over a network, execute
commands and move files from one computer to another.

SSH can also be used to create secure tunnels for other


application protocols, for example, to securely run X Window
Systemgraphical sessions remotely. An SSH server, by default,
listens on the standard Transmission Control Protocol (TCP)
port 22
What is DNS and how does it work?
The Domain Name System resolves the names of internet sites
with their underlying IP addresses adding efficiency and even
security in the process.
The Domain Name System (DNS) is one of the foundations of the
internet, yet most people outside of networking probably don’t
realize they use it every day to do their jobs, check their email or
waste time on their smartphones.
At its most basic, DNS is a directory of names that match with
numbers. The numbers, in this case are IP addresses, which
computers use to communicate with each other. Most descriptions of
DNS use the analogy of a phone book, which is fine for people over
the age of 30 who know what a phone book is.
How DNS servers work
The DNS directory that matches name to numbers isn’t
located all in one place in some dark corner of the internet.
Like the internet itself, the directory is distributed around the
world, stored on domain name servers that all communicate
with each other on a very regular basis to provide updates and
redundancies. With more than 332 million domain names
listed at the end of 2017, a single directory would be very
large indeed.
Each named site can correspond to more than one IP address.
In fact, some sites have hundreds or more IP addresses that
correspond with a single domain name. For example, the
server your computer reaches for www.google.com is likely
completely different from the server that someone in another
country would reach by typing the same site name into their
browser.
HTTP
The Hypertext Transfer Protocol (HTTP) is an application-level
protocol for distributed, collaborative, hypermedia information
systems. This is the foundation for data communication for the
World Wide Web (i.e. internet) since 1990. HTTP is a generic and
stateless protocol which can be used for other purposes as well
using extensions of its request methods, error codes, and
headers.
Basically, HTTP is a TCP/IP based communication protocol, that is
used to deliver data (HTML files, image files, query results, etc.)
on the World Wide Web. The default port is TCP 80, but other
ports can be used as well. It provides a standardized way for
computers to communicate with each other. HTTP specification
specifies how clients' request data will be constructed and sent to
the server, and how the servers respond to these requests.
Basic Features
There are three basic features that make HTTP a simple but powerful
protocol:
HTTP is connectionless: The HTTP client, i.e., a browser initiates an HTTP
request and after a request is made, the client waits for the response. The
server processes the request and sends a response back after which client
disconnect the connection. So client and server knows about each other
during current request and response only. Further requests are made on
new connection like client and server are new to each other.
HTTP is media independent: It means, any type of data can be sent by HTTP
as long as both the client and the server know how to handle the data
content. It is required for the client as well as the server to specify the
content type using appropriate MIME-type.
HTTP is stateless: As mentioned above, HTTP is connectionless and it is a
direct result of HTTP being a stateless protocol. The server and client are
aware of each other only during a current request. Afterwards, both of them
forget about each other. Due to this nature of the protocol, neither the
client nor the browser can retain information between different requests
across the web pages
What is NAT?
Network Address Translation (NAT) is designed for IP address
conservation.
It enables private IP networks that use unregistered IP addresses to
connect to the Internet. NAT operates on a router, usually
connecting two networks together, and translates the private (not
globally unique) addresses in the internal network into legal
addresses, before packets are forwarded to another network.
As part of this capability, NAT can be configured to advertise only
one address for the entire network to the outside world. This
provides additional security by effectively hiding the entire internal
network behind that address. NAT offers the dual functions of
security and address conservation and is typically implemented in
remote-access environments.
How does NAT work?
>Basically, NAT allows a single device, such as a router, to act
as an agent between the Internet (or public network) and a
local network (or private network), which means that only a
single unique IP address is required to represent an entire
group of computers to anything outside their network.
How do I configure NAT?
>In order to configure traditional NAT, you need to make at
least one interface on a router (NAT outside) and another
interface on the router (NAT inside) and a set of rules for
translating the IP addresses in the packet headers (and
payloads if desired) need to be configured. In order to
configure Nat Virtual Interface (NVI), you need at least one
interface configured with NAT enable along with the same set
of rules as mentioned above.
PORT:

On computer and telecommunication devices, a port (noun) is


generally a specific place for being physically connected to
some other device, usually with a socket and plug of some kind.
Typically, a personal computer is provided with one or
more serial ports and usually one parallel port. The serial port
supports sequential, one bit-at-a-time transmission to
peripheral devices such as scanners and the parallel port
supports multiple-bit-at-a-time transmission to devices such as
printers.
TCP/IP
The TCP/IP Model separates networking functions into discrete
layers. Each layer performs a specific function and is transparent to
the layer above it and the layer below it. Network models are used
to conceptualize how networks should work, so that hardware and
network protocols can interoperate. The TCP/IP model is one of
the two most common network models, the other being the OSI
Model.
The TCP/IP Model of networking is a different way of looking
at networking. Because the model was developed to
describe TCP/IP, it is the closest model of the Internet, which
uses TCP/IP.
The TCP/IP network model breaks down into four (4) layers:
a. Application Layer
b. Transport Layer
c. Internet Layer
d. Network Access Layer
1:-APPLICATION LAYER
The Application Layer provides the user with the interface to communication. This could be your
web browser, e-mail client (Outlook, Eudora or Thunderbird), or a file transfer client.
The Application Layer is where your web browser, a telnet, ftp, e-mail or other client application
runs. Basically, any application that rides on top of TCP and/or UDP that uses a pair of
virtual networksockets and a pair of IP addresses.
The Application Layer sends to, and receives data from, the Transport Layer.

2:-TRANSPORT LAYER
The Transport Layer provides the means for the transport of data segments across
the Internet Layer. The Transport Layer is concerned with end-to-end (host-to-host)
communication.
Transmission Control Protocol provides reliable, connection-oriented transport of data
between two endpoints (sockets) on two computers that use Internet Protocol to
communicate.
User Datagram Protocol provides unreliable, connectionless transport of data between two
endpoints (sockets) on two computers that use Internet Protocol to communicate.
The Transport Layer sends data to the Internet layer when transmitting and sends data to
the Application Layer when receiving.
INTERNET LAYER
The Internet Layer provides connectionless communication across one or more
networks, a global logical addressing scheme and packetization of data. The
Internet Layer is concerned with network to network communication.
The Internet Layer is responsible for packetization, addressing and routing of
data on the network. Internet Protocol provides the packetization, logical
addressing and routing functions that forward packets from one computer to
another.
The Internet Layer communicates with the Transport Layer when receiving and
sends data to the Network Access Layer when transmitting.
NETWORK ACCESS LAYER
The Network Access Layer provides access to the physical network.
This is your network interface card. Ethernet, FDDI, Token Ring, ATM, OC, HSSI,
or even Wi-Fi are all examples of network interfaces. The purpose of a network
interface is to allow your computer to access the wire, wireless or fiber optic
network infrastructure and send data to other computers.
The Network Access Layer transmits data on the physical network when sending
and transmits data to the Internet Layer when receiving.
What is Media Access Control Method?
A way to allow computers to transmit signals over network cabling, while ensuring
that only one computer transmits at a time. If two computers simultaneously place
signals on the wire, a collision can occur and data might be corrupted unless a
method is used to resolve the collision gracefully. Media access control methods
act like traffic lights by permitting the smooth flow of traffic on a network, and
they prevent or deal with collisions. Media access control methods are
implemented at the data-link layer of the Open Systems Interconnection (OSI)
reference model.
Four main media access control methods are used in networking:
a. Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which is used in
Ethernet networking
b. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), which is used in
AppleTalk networking
c. Token passing, which is used in Token Ring and Fiber Distributed Data Interface (FDDI)
networking
d. Demand priority, which is used in 100BaseVG networking
ICMP (Internet Control Message Protocol) is an error-reporting protocol
network devices like routers use to generate error messages to
the source IP address when network problems prevent delivery of
IP packets. ICMP creates and sends messages to the source IP
address indicating that a gateway to the Internet that a router,
service or host cannot be reached for packet delivery. Any IP
network device has the capability to send, receive or process
ICMP messages.
ICMP is not a transport protocol that sends data between systems.
While ICMP is not used regularly in end-user applications, it is used by network
administrators to troubleshoot Internet connections in diagnostic utilities
including ping and traceroute.
One of the main protocols of the Internet Protocolsuite, ICMP is used by routers,
intermediary devices or hosts to communicate error information or updates to other
routers, intermediary devices or hosts. The widely used IPv4 (Internet Protocol version
4) and the newer IPv6 use similar versions of the ICMP protocol (ICMPv4 and ICMPv6,
respectively).ICMP messages are transmitted as datagramsand consist of an IP header
that encapsulates the ICMP data. ICMP packets are IP packets with ICMP in the IP data
portion. ICMP messages also contain the entire IP header from the original message,
so the end system knows which packet failed
UDP (User Datagram Protocol)
UDP (User Datagram Protocol) is an alternative communications protocol to Transmission
Control Protocol (TCP) used primarily for establishing low-latency and loss-tolerating
connections between applications on the internet. Both UDP and TCP run on top of the Internet
Protocol (IP) and are sometimes referred to as UDP/IP or TCP/IP. But there are important
differences between the two.
Where UDP enables process-to-process communication, TCP supports host-to-host
communication. TCP sends individual packets and is considered a reliable transport medium;
UDP sends messages, called datagrams, and is considered a best-effort mode of
communications.
In addition, where TCP provides error and flow control, no such mechanisms are supported in
UDP. UDP is considered a connectionless protocol because it doesn't require a virtual circuit to
be established before any data transfer occurs.
UDP provides two services not provided by the IP layer. It provides port numbers to help
distinguish different user requests and, optionally, achecksum capability to verify that the data
arrived intact.
TCP has emerged as the dominant protocol used for the bulk of internet connectivity due to its
ability to break large data sets into individual packets, check for and resend lost packets, and
reassemble packets in the correct sequence. But these additional services come at a cost in
terms of additional data overhead and delays called latency.
1.Security at the core
Exchange 2019 runs on Windows Server 2019 Core, providing the most secure and reliable
platform possible for your messaging infrastructure.
2.Improved Performance
Exchange Server 2019 uses available processor cores, memory and storage more effectively than
ever before, as well as more intelligently managing internal system resources to help improve
end-user performance.
3.Simpler Administration 4.Mobile productivity
Exchange Server 2019 makes Connect, organize, get things done on the go.
administration easier for common tasks Outlook mobile is the most secure and compliant
such as calendar and delegate way to access Exchange Online on your mobile
management. device.
Updates for Exchange :

Exchange follows a quarterly delivery model to release Cumulative Updates (CUs) that
address customer-reported issues and to possibly add new functionality and/or features.
Critical product updates (packages that address a Microsoft-released security bulletin or
contain a change in time zone definitions) are released as needed on a monthly basis for
the most recently released CU and the preceeding CU.

With so many Outlook apps and services, it can be confusing to


know which version you're using. To find out, choose how you
access Outlook:Discover tips to work smarter in the new Office
Training Center.

Discover tips to work smarter in the new Office


Training Center.
Exchange Server 2019 brings a new set of technologies, features, and services to Exchange
Server, the messaging platform that provides email, scheduling, and tools for custom
collaboration and messaging service applications. Its goal is to support people and
organizations as their work habits evolve from a communication focus to a collaboration
focus. At the same time, Exchange 2019 helps lower the total cost of ownership whether
you deploy Exchange 2019 on-premises or provision your mailboxes in the cloud.
You can deploy Exchange Server 2016 and Exchange Server 2019 in a virtualized
environment. This topic provides an overview of the scenarios that are supported for
deploying Exchange on hardware virtualization software.
The following terms are used in this discussion of Exchange virtualization:
Cold boot: When bringing a system from a power-off state into a clean start of the
operating system, the action is a cold boot. No operating system state has been
persisted in this case.
Saved state: When a virtual machine is powered off, hypervisors typically have the
ability to save the state of the virtual machine, so when the machine is powered back
on, it returns to that saved state rather than going through a cold boot startup.
Planned migration: When a system administrator initiates the move of a virtual
machine from one hypervisor host to another, the action is a planned migration. The
action could be a single migration, or a system administrator could configure
automation to move the virtual machine on a timed basis. A planned migration could
also be the result of some other event that occurs in the system, other than hardware
or software failure.
The key point of a planned migration is the Exchange virtual machine is operating
normally and needs to be relocated for some reason. This relocation can be done via
technology (for example, Live Migration or vMotion). However, if the Exchange virtual
machine or the hypervisor host where the virtual machine is located experiences
some sort of failure condition, the outcome isn't characterized as a planned
migration.
Used to solve the user issue in outlook email. User ask any question and post it to forum if
he face any
difficulty while emailing or any other issue. The expert answering the questining within
seconds.

ISA SERVER

ISA Server (Internet Security and Acceleration Server)

Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to
Microsoft's Proxy Server 2.0 (see proxy server) and is part of
Microsoft's .NET support. ISA Server provides the two basic services of
an enterprise firewall and a Web proxy/cache server. ISA Server's firewall screens
all packet-level, circuit-level, and application-level traffic. The Web cache stores and
serves all regularly accessed Web content in order to reduce network traffic and
provide faster access to frequently-accessed Web pages. ISA Server also schedules
downloads of Web page updates for non-peak times.
ISA Server allows administrators to create policies for regulating usage based on user, group,
application, destination, schedule, and content type criteria. ISA Server is designed to work
with Windows 2000 and later operating systems and to take advantage of
Windows' Kerberos security. ISA Server includes a software development kit (SDK).
ISA Server comes in two editions, Standard Edition and Enterprise Edition. Standard Edition is
a stand-alone server that supports up to four processors. Enterprise Edition is for large-scale
deployments, server array support, multi-level policy, and computers with more than four
processors. Licenses are based on the number of processors.

You might also like