* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Slide 1
Survey
Document related concepts
Dynamic Host Configuration Protocol wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Wireless security wikipedia , lookup
Net neutrality law wikipedia , lookup
Distributed firewall wikipedia , lookup
Network tap wikipedia , lookup
TCP congestion control wikipedia , lookup
Deep packet inspection wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Airborne Networking wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Internet protocol suite wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Transcript
Managing Network connections Networking Cables Networking Cables Network Cabling Ethernet Topology • Bus topology – Connects each node in a line – Has no central connection point • Star topology – Connects all nodes to a centralized hub – More popular; easier to maintain Ethernet Topology Ethernet Using Star Topology Ethernet Hub Ethernet Using Star Bus Topology Repeaters • Devices that amplify signals on a network • Help overcome limitations on the length of cables that can be used • Two kinds – Amplifier repeater – Signal-regenerating repeater (used by Ethernet) Repeaters Wireless LANs (WLANs) • Make connections using a wireless NIC • Communicate directly or connect to a LAN by way of a wireless access point (AP) • Popular where cables are difficult to install • Slower than wired networks • Security is an issue • Standards – 1999 IEEE 802.11b (Wi-Fi, AirPort) – Bluetooth WLANs Token Ring • Physical star; logical ring • Transmits data at 4 Mbps or 16 Mbps • Uses a centralized device called a MAU (Multistation Access Unit) • Less popular than Ethernet Network Cards FDDI Token ring Network Cards Ethernet Wireless How NIC (Network Interface Card) Works • Network card – Sends and receives data to and from system bus in parallel – Sends and receives data to and from network in series – Uses a transceiver for signal conversion • Network in use is transparent to applications software using it • Network nodes are identified by a MAC (Media Access Control) address Ethernet Combo Card Considerations When Selecting a Network Card • Speed and type of network • Type of cable (shielded twisted-pair, coaxial, or fiber-optic) – except for wireless connections • Type of slot (PCI or ISA) Segmenting a Network • Decreases amount of traffic on overall network • Done through use of bridges and switches – More intelligent than hubs; make decisions about whether or not to allow traffic to pass, or where to forward that traffic – Use MAC addresses, which they store in routing tables, to determine where to send packets Bridges Bridges and Switches • Bridges – Send broadcast messages; not good for large networks – Effective at separating highvolume areas on a LAN – Work best when used to connect LANs that usually do not communicate outside their immediate network • Switches – Send a packet only to network segment for which it is destined Bridges and Switches Bridges Compared with Switches MAC Addresses • Unique addresses that are permanently embedded in a NIC and identify a device on a LAN • Expressed as six pairs of hexadecimal numbers and letters • A local address • Used at the lowest (physical) networking level for NICs and other devices on the same network to communicate MAC and IP Addresses • TCP/IP Overview • Configuring TCP/IP Clients • Using TCP/IP Utilities 27 Network Address Translation • Uses a single public IP address to access the Internet on behalf of all hosts on the network using other IP addresses • Proxy server sometimes does double duty as a firewall Proxy Server Connecting Networks with Routers • Responsible for data traveling across interconnected networks • Use IP addresses to determine path for packet • Stateless devices • Transmit data packet to a remote network only if data packet is a routable protocol Using Routers to Connect Networks Web browser in Chennai Web server in Newyork TCP/IP Overview • Transmission Control Protocol/Internet Protocol (TCP/IP) is an industry-standard suite of protocols used on local area networks (LANs) and wide area networks (WANs). • Microsoft Windows supports TCP/IP. 32 Architectural Overview of the TCP/IP 33 The TCP/IP Protocols • The TCP/IP protocols – Provide networking connectivity support for computers (called hosts) on LANs and WANs – Follow a set of standards for how computers communicate and how networks are interconnected – Follow the four-layer Department of Defense (DOD) model Application Layer • Software programs gain access to the network through the application layer. • This layer maps roughly to the session, presentation, and application layers of the Open Systems Interconnection (OSI) model. • The following TCP/IP utilities and services run at the application layer: – Hypertext Transfer Protocol (HTTP) – File Transfer Protocol (FTP) – Simple Mail Transfer Protocol (SMTP) 35 Application Layer (Cont.) • TCP/IP utilities and services that run at the application layer (Cont.): – Telnet – Domain Name System (DNS) – Simple Network Management Protocol (SNMP) • Microsoft TCP/IP provides two interfaces for applications to use: – WinSock – Network Basic Input/Output System (NetBIOS) 36 Transport Layer • Transport protocols – Provide communication sessions between computers – Define the type of transport service as either connection-oriented or connectionless datagramoriented • This layer maps roughly to the transport layer in the OSI model. • The transport layer protocols are – TCP: connection-oriented, reliable – UDP: connectionless, no guarantee of packet delivery 37 Internet Layer • The Internet layer protocols encapsulate transport layer data into units called datagrams, address them, and route them to their destinations. • This layer maps roughly to the network layer in the OSI model. • Windows implements three main protocols at this layer: – Internet Protocol (IP) – Address Resolution Protocol (ARP) – Internet Control Message Protocol (ICMP) 38 Link Layer • This layer sends and receives frames, which are packets of information transmitted on a network as a single unit. • The link layer is equivalent to the data-link and physical layers of the OSI model. • Two protocols often used for WAN connections are part of the TCP/IP suite: – Point-to-Point Protocol (PPP) – Serial Line Internet Protocol (SLIP) 39 Transmission Control Protocol • Transmission Control Protocol (TCP) is a reliable, connection-oriented delivery service. • TCP achieves reliability by using a system called positive acknowledgment with retransmission. • Many Internet client applications, such as Web browsers and FTP clients, rely on TCP to transmit files. • Virtually every application that transmits large amounts of data over a network uses TCP. 40 User Datagram Protocol (UDP) • Provides a connectionless datagram service that does not guarantee delivery or correct sequencing of delivered packets • Used by applications that – Do not require an acknowledgment of data receipt – Usually transmit small amounts of data at one time • Used by – Broadcast transmissions – Services and applications such as DNS, Dynamic Host Configuration Protocol (DHCP), and SNMP 41 Internet Protocol • Internet Protocol (IP) does the actual delivery of datagrams. • IP adds the following header fields to each packet: Source IP Address Destination IP Address Protocol Checksum Time to Live (TTL) 42 IP Addressing • Every host on a TCP/IP network must have a unique IP address (a 32-bit number that identifies both the host and the network the host is located on). • IP addresses are expressed in dotted-decimal format, such as 192.168.123.132. • Each set of four dotted-decimal numbers represents eight bits of the binary address. – The addresses range from 00000000 to 11111111, or, in decimal notation, from 0 to 255. 43 IP Addressing (Cont.) • An IP address is accompanied by a subnet mask. • The subnet mask, when compared to the IP address, identifies the part of the IP address that is the network identifier and the part that is the host identifier. – The 1s identify network bits and the 0s identify host bits. – In the subnet mask 255.255.0.0, the first 16 bits (2 octets) are the equivalent of all ones in binary form. • The first two octets of the IP address are the network identifier. • The last two octets represent the host identifier. 44 Why IP Address? • To communicate on the Internet, a computer must use an IP address that is registered with the Internet Assigned Numbers Authority (IANA). – In practice, you obtain a valid network address from your Internet service provider (ISP), not directly from the IANA. • The IANA assigns network identifiers only; the administrator assigns a unique host identifier to each computer. • There are three primary classes of network addresses: A, B, and C. – The actual class used is based on the size of the network. – Each address class has a different default subnet mask. 45 IP Address Classes 46 IP Address Class Characteristics • You can identify the class of an IP address by looking at the value of its first octet. • Because a Class A address uses only eight bits for its network ID, only 126 possible Class A addresses exist. 47 Guidelines for IP Address Assignments • There are several general guidelines for how to assign IP addresses: – – – – – The first octet of the network ID cannot be 127. The network and host ID bits cannot be all 1s. The network and host ID bits cannot be all 0s. The host ID for each computer must be unique. A unique network ID is required for each network and wide area connection. – A registered network ID is required for connecting to the Internet. – All TCP/IP hosts require unique host IDs. – Each host requires a subnet mask. 48 Using Private Addresses • Workstations protected by firewalls and computers that do not connect to the Internet can use unregistered, private IP addresses. • When building a private network, you should use one of the special ranges of private IP addresses, rather than assigning IP addresses randomly. 49 IP Address Ranges for Private Networks Class Network Addresses A 10.0.0.0 through 10.255.255.255 B 172.16.0.0 through 172.31.255.255 C 192.168.0.0 through 192.168.255.255 50 Routing • Routing is the process of choosing a path over which to send packets, which is the primary function of IP. • A router (also called a gateway) is a device that forwards packets from one physical network to another. • Routers match packet headers to a LAN segment and choose the best path for the packet, which optimizes network performance. 51 Packet Routing Example 52 IP Routing • To make routing decisions, the IP layer consults a routing table, which consists of a series of entries, called routes. • On a computer running Windows, a routing table is built automatically based on its TCP/IP configuration. • To view a routing table on a computer running Windows, at a command prompt, type route print, and then press Enter. 53 Cmd C:\> route print 54 Static and Dynamic IP Routing • Static routing can only use fixed routing tables. • Static routers require building and updating routing tables manually. • Use the Route.exe command to add static entries to the routing table. • Dynamic routing – Automatically updates routing tables – Uses routing protocols, such as Routing Information Protocol (RIP) and Open Shortest Path First (OSPF), to periodically transmit the contents of their routing tables to the other routers on the network 55 Installing TCP/IP • The Windows Xp setup program automatically installs TCP/IP if it detects a network interface adapter in the computer. • You need to manually install TCP/IP on a computer running Windows Xp only if – The default protocol selection was overridden during setup – You have deleted it from a connection • In Windows Xp, TCP/IP is implemented as a single module called Internet Protocol (TCP/IP), which is installed from the Network And Dial-Up Connections application in Control Panel. 56 Installing TCP/IP (Cont.) • To manually install TCP/IP: 1. 2. 3. Log on using an administrator account. Click Start, point to Settings, and then click Network And Dial-Up Connections. Right-click the Local Area Connection icon, and then select Properties to display the Local Area Connection Properties dialog box. 57 Installing TCP/IP (Cont.) • To manually install TCP/IP (Cont.): 4. Click Install. 5. In the Select Network Component Type dialog box, select Protocol, and then click Add. 6. In the Select Network Protocol dialog box, select Internet Protocol (TCP/IP) in the Network Protocol list, and then click OK. 7. Click Close. 58 Type the following commands in cmd and write what it shows Using Ipconfig.exe • Use Ipconfig.exe to view the TCP/IP configuration settings on a host, including IP address, subnet mask, and default gateway. – At the command prompt, type ipconfig or ipconfig /all and then press Enter. – Use the /all parameter to display more information. • Running Ipconfig is an easy way to view the IP address and other parameters that the DHCP server has assigned to your computer. 60 Using Ping • Ping is a command-line utility that uses Echo Request messages to determine if the TCP/IP stack of another computer on the network is functioning normally. • From a command prompt, type ping target (where target is the IP address or the name [DNS or NetBIOS, Example ping www.google.co.in] of the computer you are trying to contact). – A successful ping results in several reply messages from the target computer. – If the ping fails, one or both computers might have a networking hardware or software problem. – Example c:\> ping 192.168.1.2 61 Using Traceroute • Tracert.exe, a variant of Ping, displays the path that packets take to their destination. • From a command prompt, type tracert target (where target is the IP address or the name [DNS or NetBIOS] of the target computer). • Use Tracert.exe to isolate the location of a network communications problem, particularly when a router is suspected. • Example C:\> tracert.exe 192.168.1.2 62 Using Pathping • Pathping is a route tracing tool that – Sends packets to each router on the way to a final destination over a period of time – Computes results based on the packets returned from each hop • You can use Pathping.exe to isolate problems because it shows the degree of packet loss at any given router or link. • From the command line, type pathping target (where target is the IP address or the name [DNS or NetBIOS] of the target computer). • Example C:\> pathping.exe 192.168.1.2 63 Using Route.exe (Cont.) • The ROUTE PRINT command displays the current contents of the routing table. • To create a new entry, use ROUTE ADD with parameters that specify the values for the entry. • Example C:\> route.exe 192.168.1.2 64 Using Route.exe • Use Route.exe to create, delete, or modify static routes in a routing table on a computer running Windows 2000. • Route.exe uses the following syntax: ROUTE [-f] [-p][command[destination] [MASK netmask] [gateway] [METRIC metric] [IF interface]] • The Route.exe command variable takes one of four values: PRINT ADD DELETE CHANGE 65 Using Arp.exe • IP uses ARP to discover the hardware address that each datagram is transmitted to. • Resolved addresses are stored in an ARP cache. • Use Arp.exe to view or change the contents of the ARP cache. • Arp.exe uses the following syntax: ARP [-a {ipaddress}] [-n ipaddress] [s ipaddress hwaddress {interface}] [-d ipaddress {interface}] 66 Using Netstat.exe • Netstat.exe is a Windows 2000 command-line utility that displays information about – The current network connections of a computer using TCP/IP – The traffic generated by various TCP/IP protocols • Netstat.exe uses the following syntax: NETSTAT [interval] [-a] protocol] [-n] [-e] [-r] [-s] [-p 67 Using Nbtstat.exe • Nbtstat.exe is a Windows 2000 command-line utility that displays information about the NetBIOS over TCP/IP connections used by Windows 2000 when communicating with other Windows computers on a TCP/IP LAN. • Nbtstat.exe uses the following syntax: NBTSTAT [-a name] [-A ipaddress] [-c] [-n] [-r] [-R] [-s] [-S] [-RR] • The parameters for Nbtstat.exe are casesensitive. 68 Using Nslookup.exe • Nslookup.exe is a Windows 2000 commandline utility that enables you to generate DNS request messages and transmit them to a specific DNS server on the network. • Nslookup.exe uses the following syntax: NSLOOKUP DNSname DNSserver – DNSname specifies the DNS name you want to resolve. – DNSserver specifies the DNS name (or IP address of the DNS server) you want to query for the name you want to resolve. 69 DNS – Domain Name System Domain Names • A domain name is the sequence of labels from a node to the root, separated by dots (“.”s), read left to right – The name space has a maximum depth of 127 levels – Domain names are limited to 255 characters in length • A node’s domain name identifies its position in the name space "" edu com nominum west east dakota tornado metainfo www berkeley gov nwu int mil net nato army uu org Subdomains • One domain is a subdomain of another if its domain name ends in the other’s domain name – So sales.nominum.com is a subdomain of • nominum.com & com – nominum.com is a subdomain of com Name Resolution • Name resolution is the process by which resolvers and name servers cooperate to find data in the name space • Closure mechanism for DNS? – Starting point: the names and IP addresses of the name servers for the root zone (the “root name servers”) – The root name servers know about the top-level zones and can tell name servers whom to contact for all TLDs The Resolution Process • Let’s look at the resolution process step-bystep: annie.west.sprockets.com ping www.nominum.com. The Resolution Process • The workstation annie asks its configured name server, dakota, for www.nominum.com’s address dakota.west.sprockets.com What’s the IP address of www.nominum.com? annie.west.sprockets.com ping www.nominum.com. The Resolution Process • The name server dakota asks a root name server, m, for www.nominum.com’s address m.root-servers.net dakota.west.sprockets.com What’s the IP address of www.nominum.com? annie.west.sprockets.com ping www.nominum.com. The Resolution Process • The root server m refers dakota to the com name servers • This type of response is called a “referral” m.root-servers.net dakota.west.sprockets.com annie.west.sprockets.com ping www.nominum.com. Here’s a list of the com name servers. Ask one of them. The Resolution Process • The name server dakota asks a com name server, f, for www.nominum.com’s address What’s the IP address of www.nominum.com? m.root-servers.net dakota.west.sprockets.com f.gtld-servers.net annie.west.sprockets.com ping www.nominum.com. The Resolution Process • The com name server f refers dakota to the nominum.com name servers Here’s a list of the nominum.com name servers. Ask one of them. m.root-servers.net dakota.west.sprockets.com f.gtld-servers.net annie.west.sprockets.com ping www.nominum.com. The Resolution Process • The name server dakota asks a nominum.com name server, ns1.sanjose, for www.nominum.com’s address What’s the IP address of www.nominum.com? m.root-servers.net dakota.west.sprockets.com ns1.sanjose.nominum.net f.gtld-servers.net annie.west.sprockets.com ping www.nominum.com. The Resolution Process • The nominum.com name server ns1.sanjose responds with www.nominum.com’s address m.root-servers.net dakota.west.sprockets.com Here’s the IP address for www.nominum.com ns1.sanjose.nominum.net f.gtld-servers.net annie.west.sprockets.com ping www.nominum.com. The Resolution Process • The name server dakota responds to annie with www.nominum.com’s address Here’s the IP address for www.nominum.com m.root-servers.net dakota.west.sprockets.com ns1.sanjose.nominum.net f.gtld-servers.net annie.west.sprockets.com ping www.nominum.com. Resolution Process (Caching) • After the previous query, the name server dakota now knows: – The names and IP addresses of the com name servers – The names and IP addresses of the nominum.com name servers – The IP address of www.nominum.com • Let’s look at the resolution process again annie.west.sprockets.com ping ftp.nominum.com. Resolution Process (Caching) • The workstation annie asks its configured name server, dakota, for ftp.nominum.com’s address m.root-servers.net dakota.west.sprockets.com What’s the IP address of ftp.nominum.com? ns1.sanjose.nominum.net f.gtld-servers.net annie.west.sprockets.com ping ftp.nominum.com. Resolution Process (Caching) • dakota has cached a NS record indicating ns1.sanjose is an nominum.com name server, so it asks it for ftp.nominum.com’s address What’s the IP address of ftp.nominum.com? m.root-servers.net dakota.west.sprockets.com ns1.sanjose.nominum.net f.gtld-servers.net annie.west.sprockets.com ping ftp.nominum.com. Resolution Process (Caching) • The nominum.com name server ns1.sanjose responds with ftp.nominum.com’s address m.root-servers.net dakota.west.sprockets.com Here’s the IP address for ftp.nominum.com ns1.sanjose.nominum.net f.gtld-servers.net annie.west.sprockets.com ping ftp.nominum.com. Resolution Process (Caching) • The name server dakota responds to annie with ftp.nominum.com’s address Here’s the IP address for ftp.nominum.com m.root-servers.net dakota.west.sprockets.com ns1.sanjose.nominum.net f.gtld-servers.net annie.west.sprockets.com ping ftp.nominum.com. Try your own… LEARN , LEAP , LEAD…