* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Name servers
Wireless security wikipedia , lookup
Internet protocol suite wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Distributed firewall wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Peer-to-peer wikipedia , lookup
Airborne Networking wikipedia , lookup
LAB MANUAL OF COMPUTER NETWORK PARUL INSTITUTE OF DEPARTMENT 150702-COMPUTER NETWORK SEMESTER – V LIST OF PRACTICALS PRACTICAL NO-1 TO STUDY DIFFERENT NETWORK TOPOLOGIES Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer or biological network. Essentially, it is the topological structure of a network, and may be depicted physically or logically. Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical. There are two basic categories of network topologies: 1. Physical topologies 2. Logical topologies The shape of the cabling layout used to link devices is called the physical topology of the network. This refers to the layout of cabling, the locations of nodes, and the interconnections between the nodes and the cabling. The physical topology of a network is determined by the capabilities of the network access devices and media, the level of control or fault tolerance desired, and the cost associated with cabling or telecommunications circuits. The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network's logical topology is not necessarily the same as its physical topology. For example, the original twisted pair Ethernet using repeater hubs was a logical bus topology with a physical star topology layout. Token Ring is a logical ring topology, but is wired a physical star from the Media Access Unit. The logical classification of network topologies generally follows the same classifications as those in the physical classifications of network topologies but describes the path that the data takes between nodes being used as opposed to the actual physical connections between nodes. The logical topologies are generally determined by network protocols as opposed to being determined by the physical layout of cables, wires, and network devices Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 1 LAB MANUAL OF COMPUTER NETWORK or by the flow of the electrical signals, although in many cases the paths that the electrical signals take between nodes may closely match the logical flow of data, hence the convention of using the terms logical topology and signal topology interchangeably. Logical topologies are often closely associated with Media Access Control methods and protocols. Logical topologies are able to be dynamically reconfigured by special types of equipment such as routers and switches. Diagram of different network topologies. The study of network topology recognizes eight basic topologies: Point-to-point Bus Star Ring or circular Mesh Tree Hybrid Daisy chain Point-to-point The simplest topology is a permanent link between two endpoints. Switched point-topoint topologies are the basic model of conventional telephony. The value of a permanent point-to-point network is unimpeded communications between the two endpoints. The value of an on-demand point-to-point connection is proportional to the number of potential pairs of subscribers, and has been expressed as Metcalfe's Law. Permanent (dedicated) Easiest to understand, of the variations of point-to-point topology, is a point-topoint communications channel that appears, to the user, to be permanently associated with the two endpoints. A children's tin can telephone is one example of a physical dedicated channel. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 2 LAB MANUAL OF COMPUTER NETWORK Within many switched telecommunications systems, it is possible to establish a permanent circuit. One example might be a telephone in the lobby of a public building, which is programmed to ring only the number of a telephone dispatcher. "Nailing down" a switched connection saves the cost of running a physical circuit between the two points. The resources in such a connection can be released when no longer needed, for example, a television circuit from a parade route back to the studio. Switched: Using circuit-switching or packet-switching technologies, a point-to-point circuit can be set up dynamically, and dropped when no longer needed. This is the basic mode of conventional telephony. Bus Bus network topology In local area networks where bus topology is used, each node is connected to a single cable. Each computer or server is connected to the single bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the intended recipient. If the machine address does not match the intended address for the data, the machine ignores the data. Alternatively, if the data matches the machine address, the data is accepted. Since the bus topology consists of only one wire, it is rather inexpensive to implement when compared to other topologies. However, the low cost of implementing the technology is offset by the high cost of managing the network. Additionally, since only one cable is utilized, it can be the single point of failure. If the network cable is terminated on both ends and when without termination data transfer stop and when cable breaks, the entire network will be down. Linear bus The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has exactly two endpoints (this is the 'bus', which is also commonly referred to as the backbone, or trunk) – all data that is transmitted between nodes in the network is transmitted over this common transmission medium and is able to be received by all nodes in the network simultaneously. Note: The two endpoints of the common transmission medium are normally terminated with a device called a terminator that exhibits the characteristic impedance of the transmission medium and which dissipates or absorbs the energy that remains in the signal to prevent the signal from being reflected or Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 3 LAB MANUAL OF COMPUTER NETWORK propagated back onto the transmission medium in the opposite direction, which would cause interference with and degradation of the signals on the transmission medium. Distributed bus The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has more than two endpoints that are created by adding branches to the main section of the transmission medium – the physical distributed bus topology functions in exactly the same fashion as the physical linear bus topology (i.e., all nodes share a common transmission medium). Notes: 1. All of the endpoints of the common transmission medium are normally terminated using 50 ohm resistor. 2. The linear bus topology is sometimes considered to be a special case of the distributed bus topology – i.e., a distributed bus with no branching segments. 3. The physical distributed bus topology is sometimes incorrectly referred to as a physical tree topology – however, although the physical distributed bus topology resembles the physical tree topology, it differs from the physical tree topology in that there is no central node to which any other nodes are connected, since this hierarchical functionality is replaced by the common bus. Star Star network topology In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. In Star topology every node (computer workstation or any other peripheral) is connected to central node called hub or switch. The switch is the server and the peripherals are the clients. The network does not necessarily have to resemble a star to be classified as a star network, but all of the nodes on the network must be connected to one central device. All traffic that traverses the network passes through the central hub. The Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 4 LAB MANUAL OF COMPUTER NETWORK hub acts as a signal repeater. The star topology is considered the easiest topology to design and implement. An advantage of the star topology is the simplicity of adding additional nodes. The primary disadvantage of the star topology is that the hub represents a single point of failure. However, according to O'Brien and Marakas, 2011, multiprocessor architecture has been commonly used as a solution to combat this disadvantage. Notes 1. A point-to-point link (described above) is sometimes categorized as a special instance of the physical star topology – therefore, the simplest type of network that is based upon the physical star topology would consist of one node with a single point-to-point link to a second node, the choice of which node is the 'hub' and which node is the 'spoke' being arbitrary. 2. After the special case of the point-to-point link, as in note (1) above, the next simplest type of network that is based upon the physical star topology would consist of one central node – the 'hub' – with two separate point-topoint links to two peripheral nodes – the 'spokes'. 3. Although most networks that are based upon the physical star topology are commonly implemented using a special device such as a hub or switch as the central node (i.e., the 'hub' of the star), it is also possible to implement a network that is based upon the physical star topology using a computer or even a simple common connection point as the 'hub' or central node. 4. Star networks may also be described as either broadcast multi-access or nonbroadcast multi-access (NBMA), depending on whether the technology of the network either automatically propagates a signal at the hub to all spokes, or only addresses individual spokes with each communication. Extended star A type of network topology in which a network that is based upon the physical star topology has one or more repeaters between the central node (the 'hub' of the star) and the peripheral or 'spoke' nodes, the repeaters being used to extend the maximum transmission distance of the point-to-point links between the central node and the peripheral nodes beyond that which is supported by the transmitter power of the central node or beyond that which is supported by the standard upon which the physical layer of the physical star network is based. If the repeaters in a network that is based upon the physical extended star topology are replaced with hubs or switches, then a hybrid network topology is created that is referred to as a physical hierarchical star topology, although some texts make no distinction between the two topologies. Distributed Star A type of network topology that is composed of individual networks that are based upon the physical star topology connected in a linear fashion – i.e., 'daisychained' – with no central or top level connection point (e.g., two or more 'stacked' hubs, along with their associated star connected nodes or 'spokes'). Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 5 LAB MANUAL OF COMPUTER NETWORK Ring Ring network topology A network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the ring. Mesh The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that communicating groups of any two endpoints, up to and including all the endpoints, is approximated by Reed's Law. Fully connected Fully connected mesh topology The number of connections in a full mesh = n(n - 1) / 2. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 6 LAB MANUAL OF COMPUTER NETWORK Note: The physical fully connected mesh topology is generally too costly and complex for practical networks, although the topology is used when there are only a small number of nodes to be interconnected (see combinatorial explosion). Partially connected Partially connected mesh topology The type of network topology in which some of the nodes of the network are connected to more than one other node in the network with a point-to-point link – this makes it possible to take advantage of some of the redundancy that is provided by a physical fully connected mesh topology without the expense and complexity required for a connection between every node in the network. Note: In networks that are based upon the partially connected mesh topology, the data that is transmitted between nodes in the network takes many shortest paths between nodes using a technology like Shortest Path Bridging, except in the case of a failure or break in one of the links, in which case the network uses the remaining alternative paths to the destination. This requires that the nodes of the network possess some type of algorithm to determine the correct path to use at any particular time. Tree Tree network topology The type of network topology in which a central 'root' node (the top level of the hierarchy) is connected to one or more other nodes that are one level lower in the hierarchy (i.e., the second level) with a point-to-point link between each of the second level nodes and the top level central 'root' node, while each of the second level nodes that are connected to the top level central 'root' node will also have one or more other nodes that are one level lower in the hierarchy (i.e., the third level) connected to it, also with a point-to-point link, the top level central 'root' node being the only node that has no other Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 7 LAB MANUAL OF COMPUTER NETWORK node above it in the hierarchy (The hierarchy of the tree is symmetrical.) Each node in the network having a specific fixed number, of nodes connected to it at the next lower level in the hierarchy, the number, being referred to as the 'branching factor' of the hierarchical tree.This tree has individual peripheral nodes. 1. A network that is based upon the physical hierarchical topology must have at least three levels in the hierarchy of the tree, since a network with a central 'root' node and only one hierarchical level below it would exhibit the physical topology of a star. 2. A network that is based upon the physical hierarchical topology and with a branching factor of 1 would be classified as a physical linear topology. 3. The branching factor, f, is independent of the total number of nodes in the network and, therefore, if the nodes in the network require ports for connection to other nodes the total number of ports per node may be kept low even though the total number of nodes is large – this makes the effect of the cost of adding ports to each node totally dependent upon the branching factor and may therefore be kept as low as required without any effect upon the total number of nodes that are possible. 4. The total number of point-to-point links in a network that is based upon the physical hierarchical topology will be one less than the total number of nodes in the network. 5. If the nodes in a network that is based upon the physical hierarchical topology are required to perform any processing upon the data that is transmitted between nodes in the network, the nodes that are at higher levels in the hierarchy will be required to perform more processing operations on behalf of other nodes than the nodes that are lower in the hierarchy. Such a type of network topology is very useful and highly recommended. definition : Tree topology is a combination of Bus and Star topology. Hybrid Hybrid networks use a combination of any two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree network connected to a tree network is still a tree network topology. A hybrid topology is always produced when two different basic network topologies are connected. Two common examples for Hybrid network are: star ring network and star bus network A Star ring network consists of two or more star topologies connected using a multistation access unit (MAU) as a centralized hub. A Star Bus network consists of two or more star topologies connected using a bus trunk (the bus trunk serves as the network's backbone). Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 8 LAB MANUAL OF COMPUTER NETWORK While grid and torus networks have found popularity in high-performance computing applications, some systems have used genetic algorithms to design custom networks that have the fewest possible hops in between different nodes. Some of the resulting layouts are nearly incomprehensible, although they function quite well. A Snowflake topology is really a "Star of Stars" network, so it exhibits characteristics of a hybrid network topology but is not composed of two different basic network topologies being connected. Definition : Hybrid topology is a combination of Bus,Star and ring topology. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 9 LAB MANUAL OF COMPUTER NETWORK PRACTICAL NO – 2 TO STUDY DIFFERENT TYPES OF PROTOCOLS The Open Systems Interconnection (OSI) model is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a prescription of characterising and standardising the functions of a communications system in terms of abstraction layers. Similar communication functions are grouped into logical layers. A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of that path. Two instances at one layer are connected by a horizontal connection on that layer. Layer 1: physical layer The physical layer defines electrical and physical specifications for devices. In particular, it defines the relationship between a device and a transmission medium, such as a copper or fiber optical cable. This includes the layout of pins, voltages, cable specifications, hubs, repeaters, network adapters, host bus adapters (HBA used in storage area networks) and more. The major functions and services performed by the physical layer are: Establishment and termination of a connection to a communications medium. Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control. Modulation or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link. Parallel SCSI buses operate in this layer, although it must be remembered that the logical SCSI protocol is a transport layer protocol that runs over this bus. Various physical-layer Ethernet standards are also in this layer; Ethernet incorporates both this layer and the data link layer. The same applies to other local-area networks, such as token ring, FDDI, ITUT G.hn and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 10 LAB MANUAL OF COMPUTER NETWORK Layer 2: data link layer The data link layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the physical layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. Local area network architecture, which included broadcast-capable multiaccess media, was developed independently of the ISO work in IEEE Project 802. IEEE work assumed sub layering and management functions not required for WAN use. In modern practice, only error detection, not flow control using sliding window, is present in data link protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on the Ethernet, and on other local area networks, its flow control and acknowledgment mechanisms are rarely used. Sliding window flow control and acknowledgment is used at the transport layer by protocols such as TCP, but is still used in niches where X.25 offers performance advantages. The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol. Both WAN and LAN service arrange bits, from the physical layer, into logical sequences called frames. Not all physical layer bits necessarily go into frames, as some of these bits are purely intended for physical layer functions. For example, every fifth bit of the FDDI bit stream is not used by the layer. WAN protocol architecture Connection-oriented WAN data link protocols, in addition to framing, detect and may correct errors. They are also capable of controlling the rate of transmission. A WAN data link layer might implement a sliding window flow control and acknowledgment mechanism to provide reliable delivery of frames; that is the case for Synchronous Data Link Control (SDLC) and HDLC, and derivatives of HDLC such as LAPB and LAPD. IEEE 802 LAN architecture Practical, connectionless LANs began with the pre-IEEE Ethernet specification, which is the ancestor of IEEE 802.3. This layer manages the interaction of devices with a shared medium, which is the function of a media access control (MAC) sublayer. Above this MAC sublayer is the media-independent IEEE 802.2 Logical Link Control (LLC) sublayer, which deals with addressing and multiplexing on multiaccess media. While IEEE 802.3 is the dominant wired LAN protocol and IEEE 802.11 the wireless LAN protocol, obsolete MAC layers include Token Ring and FDDI. The MAC sublayer detects but does not correct errors. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 11 LAB MANUAL OF COMPUTER NETWORK Layer 3: network layer The network layer provides the functional and procedural means of transferring variable length data sequences from a source host on one network to a destination host on a different network (in contrast to the data link layer which connects hosts within the same network), while maintaining the quality of service requested by the transport layer. The network layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer, sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme – values are chosen by the network engineer. The addressing scheme is not hierarchical. The network layer may be divided into three sublayers: 1. Subnetwork access – that considers protocols that deal with the interface to networks, such as X.25; 2. Subnetwork-dependent convergence – when it is necessary to bring the level of a transit network up to the level of networks on either side 3. Subnetwork-independent convergence – handles transfer across multiple networks. An example of this latter case is CLNP, or IPv6 ISO 8473. It manages the connectionless transfer of data one hop at a time, from end system to ingress router, router to router, and from egress router to destination end system. It is not responsible for reliable delivery to a next hop, but only for the detection of erroneous packets so they may be discarded. In this scheme, IPv4 and IPv6 would have to be classed with X.25 as subnet access protocols because they carry interface addresses rather than node addresses. A number of layer-management protocols, a function defined in the Management Annex, ISO 7498/4, belong to the network layer. These include routing protocols, multicast group management, network-layer information and error, and network-layer address assignment. It is the function of the payload that makes these belong to the network layer, not the protocol that carries Layer 4: transport layer The transport layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The transport layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state- and connection-oriented. This means that the transport layer can keep track of the segments and retransmit those that fail. The transport layer also provides the acknowledgement of the successful data transmission and sends the next data if no errors occurred. OSI defines five classes of connection-mode transport protocols ranging from class 0 (which is also known as TP0 and provides the least features) to class 4 (TP4, designed for Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 12 LAB MANUAL OF COMPUTER NETWORK less reliable networks, similar to the Internet). Class 0 contains no error recovery, and was designed for use on network layers that provide error-free connections. Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which OSI assigns to the session layer. Also, all OSI TP connection-mode protocol classes provide expedited data and preservation of record boundaries. Detailed characteristics of TP0-4 classes are shown in the following table: Feature Name TP0 TP1 TP2 TP3 TP4 Connection oriented network Yes Yes Yes Yes Yes Connectionless network No No No No Yes Concatenation and separation No Yes Yes Yes Yes Segmentation and reassembly Yes Yes Yes Yes Yes Error Recovery No Yes Yes Yes Yes Reinitiate connection (if an excessive number of PDUs are No Yes No Yes No unacknowledged) Multiplexing and demultiplexing over a single virtual circuit No No Yes Yes Yes Explicit flow control No No Yes Yes Yes Retransmission on timeout No No No No Yes Reliable Transport Service No Yes No Yes Yes An easy way to visualize the transport layer is to compare it with a Post Office, which deals with the dispatch and classification of mail and parcels sent. Do remember, however, that a post office manages the outer envelope of mail. Higher layers may have the equivalent of double envelopes, such as cryptographic presentation services that can be read by the addressee only. Roughly speaking, tunneling protocols operate at the transport layer, such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or end-to-end encryption with IPSec. While Generic Routing Encapsulation (GRE) might seem to be a network-layer protocol, if the encapsulation of the payload takes place only at endpoint, GRE becomes closer to a transport protocol that uses IP headers but contains complete frames or packets to deliver to an endpoint. L2TP carries PPP frames inside transport packet. Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the transport layer, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) of the Internet Protocol Suite are commonly categorized as layer-4 protocols within OSI. Layer 5: session layer The session layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 13 LAB MANUAL OF COMPUTER NETWORK Transmission Control Protocol, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The session layer is commonly implemented explicitly in application environments that use remote procedure calls. On this level, Inter-Process communication happen (SIGHUP, SIGKILL, End Process, etc.). Layer 6: presentation layer The presentation layer establishes context between application-layer entities, in which the higher-layer entities may use different syntax and semantics if the presentation service provides a mapping between them. If a mapping is available, presentation service data units are encapsulated into session protocol data units, and passed down the stack. This layer provides independence from data representation (e.g., encryption) by translating between application and network formats. The presentation layer transforms data into the form that the application accepts. This layer formats and encrypts data to be sent across a network. It is sometimes called the syntax layer. The original presentation structure used the basic encoding rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serialization of objects and other data structures from and to XML. Layer 7: application layer The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model. Application-layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exist. In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer. Some examples of application-layer implementations also include: On OSI stack: o FTAM File Transfer and Access Management Protocol o X.400 Mail o Common Management Information Protocol (CMIP) On TCP/IP stack: o Hypertext Transfer Protocol (HTTP), o File Transfer Protocol (FTP), o Simple Mail Transfer Protocol (SMTP) o Simple Network Management Protocol (SNMP). Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 14 LAB MANUAL OF COMPUTER NETWORK PRACTICAL NO - 3 TO STUDY DIFFERENT NETWORK DEVICES Computer network devices also known as communication devices and they constitute a data communication network. These devices are routers, switches, hubs, LAN cards, gateway, modems, hardware firewall, CSU/DSU, ISDN terminals and transceivers. In an Ethernet or WAN network, the data communication cannot be performed without these devices. Being an IT professional or a network administrator, you must have the good understanding of these devices. Based on your business requirements, you have the select the best devices for your network and before selection, make sure that they are compatible with each other. It is recommended that you select all the devices for your IT infrastructure from the same vendor. The top vendors are Cisco, D-Link, LinkSys, Baynet, RealTek, 3Com, NetGear, Intel, Nortel, and Lucent etc. A well designed IT infrastructure with the proper placement of the routers, servers, gateway and switches can reduce the operational cost and enhances the overall performance dramatically. Network Repeater A repeater connects two segments of your network cable. It retimes and regenerates the signals to proper amplitudes and sends them to the other segments. When talking about, ethernet topology, you are probably talking about using a hub as a repeater. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay which can affect network communication when there are several repeaters in a row. Many network architectures limit the number of repeaters that can be used in a row. Repeaters work only at the physical layer of the OSI network model. Bridge A bridge reads the outermost section of data on the data packet, to tell where the message is going. It reduces the traffic on other network segments, since it does not send all packets. Bridges can be programmed to reject packets from particular networks. Bridging occurs at the data link layer of the OSI model, which means the bridge cannot read IP addresses, but only the outermost hardware address of the packet. In our case the bridge can read the ethernet data which gives the hardware address of the destination address, not the IP address. Bridges forward all broadcast messages. Only a special bridge called a translation bridge will allow two networks of different architectures to be connected. Bridges do not normally allow connection of networks with different architectures. The hardware address is also called the MAC (media access control) address. To determine the network segment a MAC address belongs to, bridges use one of: Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 15 LAB MANUAL OF COMPUTER NETWORK Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. If the address is not in the bridging table, the packet is forwarded to all segments other than the one it came from. This type of bridge is used on ethernet networks. Source route bridging - The source computer provides path information inside the packet. This is used on Token Ring networks. Network Router A router is used to route data packets between two networks. It reads the information in each packet to tell where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet, readdress the packet to the proper ethernet address, and transmit it on that network. If it is destined for another network and must be sent to another router, it will re-package the outer packet to be received by the next router and send it to the next router. The section on routing explains the theory behind this and how routing tables are used to help determine packet destinations. Routing occurs at the network layer of the OSI model. They can connect networks with different architectures such as Token Ring and Ethernet. Although they can transform information at the data link level, routers cannot transform information from one data format such as TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or corrupted packets. If the routing table does not indicate the proper address of a packet, the packet is discarded. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 16 LAB MANUAL OF COMPUTER NETWORK Brouter There is a device called a brouter which will function similar to a bridge for network transport protocols that are not routable, and will function as a router for routable protocols. It functions at the network and data link layers of the OSI network model. Gateway A gateway can translate information between different network data formats or network architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with Apple brand computers. Most gateways operate at the application layer, but can operate at the network or session layer of the OSI model. Gateways will start at the lower level and strip information until it gets to the required level and repackage the information and work its way back toward the hardware layer of the OSI model. To confuse issues, when talking about a router that is used to interface to another network, the word gateway is often used. This does not mean the routing machine is a gateway as defined here, although it could be. Fig. : Juniper srx210 gateway Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 17 LAB MANUAL OF COMPUTER NETWORK PRACTICAL NO – 4 TO STUDY ABOUT DNS SERVER The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. A Domain Name Service resolves queries for these names into IP addresses for the purpose of locating computer services and devices worldwide. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the Internet. An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. For example, the domain name www.example.com translates to the addresses 192.0.43.10 (IPv4) and 2620:0:2d0:200::10 (IPv6). Unlike a phone book, however, DNS can be quickly updated and these updates distributed, allowing a service's location on the network to change without affecting the end users, who continue to use the same hostname. Users take advantage of this when they recite meaningful Uniform Resource Locators (URLs) and e-mail addresses without having to know how the computer actually locates the services. The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. Authoritative name servers are assigned to be responsible for their particular domains, and in turn can assign other authoritative name servers for their sub-domains. This mechanism has made the DNS distributed and fault tolerant and has helped avoid the need for a single central register to be continually consulted and updated. Additionally, the responsibility for maintaining and updating the master record for the domains is spread among many domain name registrars, who compete for the end-user's, domain-owner's, business. Domains can be moved from registrar to registrar at any time. The Domain Name System also specifies the technical functionality of this database service. It defines the DNS protocol, a detailed specification of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite. Structure Domain name space The domain name space consists of a tree of domain names. Each node or leaf in the tree has zero or more resource records, which hold information associated with the domain name. The tree sub-divides into zones beginning at the root zone. A DNS zone may consist of only one domain, or may consist of many domains and sub-domains, depending on the administrative authority delegated to the manager. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 18 LAB MANUAL OF COMPUTER NETWORK The hierarchical Domain Name System, organized into zones, each served by a name server Administrative responsibility over any zone may be divided by creating additional zones. Authority is said to be delegated for a portion of the old space, usually in the form of subdomains, to another nameserver and administrative entity. The old zone ceases to be authoritative for the new zone. Domain name syntax The definitive descriptions of the rules for forming domain names appear in RFC 1035, RFC 1123, and RFC 2181. A domain name consists of one or more parts, technically called labels, that are conventionally concatenated, and delimited by dots, such as example.com. The right-most label conveys the top-level domain; for example, the domain name www.example.com belongs to the top-level domain com. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 19 LAB MANUAL OF COMPUTER NETWORK The hierarchy of domains descends from right to left; each label to the left specifies a subdivision, or sub domain of the domain to the right. For example: the label example specifies a subdomain of the com domain, and www is a sub domain of example.com. This tree of subdivisions may have up to 127 levels. Each label may contain up to 63 characters. The full domain name may not exceed a total length of 253 characters in its external dotted-label specification.In the internal binary representation of the DNS the maximum length requires 255 octets of storage. In practice, some domain registries may have shorter limits. DNS names may technically consist of any character representable in an octet. However, the allowed formulation of domain names in the DNS root zone, and most other sub domains, uses a preferred format and character set. The characters allowed in a label are a subset of the ASCII character set, and includes the characters a through z, A through Z, digits 0 through 9, and the hyphen. This rule is known as the LDH rule (letters, digits, hyphen). Domain names are interpreted in case-independent manner Labels may not start or end with a hyphen. A hostname is a domain name that has at least one IP address associated. For example, the domain names www.example.com and example.com are also hostnames, whereas the com domain is not. Internationalized domain names The permitted character set of the DNS prevented the representation of names and words of many languages in their native alphabets or scripts. ICANN has approved the Internationalizing Domain Names in Applications (IDNA) system, which maps Unicode strings into the valid DNS character set using Puny code. In 2009 ICANN approved the installation of IDN country code top-level domains. In addition, many registries of the existing top level domain names (TLD)s have adopted IDNA. Name servers The Domain Name System is maintained by a distributed database system, which uses the client-server model. The nodes of this database are the name servers. Each domain has at least one authoritative DNS server that publishes information about that domain and the name servers of any domains subordinate to it. The top of the hierarchy is served by the root name servers, the servers to query when looking up (resolving) a TLD. Authoritative name server An authoritative name server is a name server that gives answers that have been configured by an original source, for example, the domain administrator or by dynamic DNS methods, in contrast to answers that were obtained via a regular DNS query to another name server. An authoritative-only name server only returns answers to queries about domain names that have been specifically configured by the administrator. An authoritative name server can either be a master server or a slave server. A master server is a server that stores the original (master) copies of all zone records. A slave Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 20 LAB MANUAL OF COMPUTER NETWORK server uses an automatic updating mechanism of the DNS protocol in communication with its master to maintain an identical copy of the master records. Every DNS zone must be assigned a set of authoritative name servers that are installed in NS records in the parent zone, and should be installed (to be authoritative records) as self-referential NS records on the authoritative name servers. When domain names are registered with a domain name registrar, their installation at the domain registry of a top level domain requires the assignment of a primary name server and at least one secondary name server. The requirement of multiple name servers aims to make the domain still functional even if one name server becomes inaccessible or inoperable. The designation of a primary name server is solely determined by the priority given to the domain name registrar. For this purpose, generally only the fully qualified domain name of the name server is required, unless the servers are contained in the registered domain, in which case the corresponding IP address is needed as well. Primary name servers are often master name servers, while secondary name server may be implemented as slave servers. An authoritative server indicates its status of supplying definitive answers, deemed authoritative, by setting a software flag (a protocol structure bit), called the Authoritative Answer (AA) bit in its responses. This flag is usually reproduced prominently in the output of DNS administration query tools (such as dig) to indicate that the responding name server is an authority for the domain name in question. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 21 LAB MANUAL OF COMPUTER NETWORK PRACTICAL NO – 5 TO STUDY THE DIFFERENT ELEMENTS IN WIRELESS Although we use the term wireless network loosely, there are in fact three different types of network. Wide area networks that the cellular carriers create, Wireless local area networks, that you create, and Personal area networks, that create themselves. They all have a part to play in developing wireless solutions, separately or in various combinations. This article describes these different types of network, and explains where each can add value. Wide Area Networks Wide Area Networks include the networks provided by the cell phone carriers such as Bell Mobility, Telus Mobility and Rogers Wireless. Originally providing cellular voice services, the carriers added data services as well, at first by overlaying digital data services on top of the early analogue voice services, and later by building out brand new generation voice-plus-data networks. Suffice it to say, wireless data services are available just about everywhere you can use a voice cell phone (Another article describes the types of service that are available). The carriers determine where to provide coverage based on their business strategy, and they also control Quality of Service (QoS). If you are a very large, powerful organization, the carriers may add additional network resources in your corporate tower, especially if you buy a large number of cell phones from them. Where would you use WANs? You would use WANs when reach is the most important aspect of your solution, and speed is less important. Reach is important if you are providing wireless solutions to the public at large, for example, or you want to give your employees wireless access to your corporate data, whether they are in the office, across town, out of town, or (in some cases) in other countries. You can't get too far in your study of wireless without running into technical terms. Here are some to start with: GSM/GPRS - the voice plus data network technology offered by Rogers Wireless, updated to EDGE in 2004 1XRTT (usually called 1X) - the latest voice plus data network technology offered by Bell Mobility and Telus Mobility Both of these networks are completely incompatible with one another. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 22 LAB MANUAL OF COMPUTER NETWORK Wireless Local Area Networks Wireless LANs are networks are set up to provide wireless connectivity within a finite coverage area. Typical coverage areas might be a hospital (for patient care systems), a university, the airport, or a gas plant. They usually have a well-known audience in mind, for example health care providers, students, or field maintenance staff. You would use WLANS when high data-transfer rate is the most important aspect of your solution, and reach is restricted. For example, in a hospital setting, you would require a high data rate to send patient X-rays wirelessly to a doctor, provided he is on the hospital premises. Wireless LANS work in an unregulated part of the spectrum, so anyone can create their own wireless LAN, say in their home or office. In principle, you have complete control over where coverage is provided. In practice, coverage spills over into the street outside exposing you to a particular range of vulnerabilities. Deliberately seeking WLAN vulnerabilities is called wardriving. Our region has its share of wardrivers, and a later article will describe our adventures during an International Wardriving Day. Wireless LANs have their own share of terminology, including: 802.11 - this is the network technology used in wireless LANs. In fact, it is a family of technologies such as 802.11a. 802.11b, etc., differing in speed and other attributes WiFi - a common name for the early 802.11b standard. In addition to creating your own private WLAN, some organizations (Starbucks) and some carriers (Telus Mobility) are providing high speed WLAN internet access to the public at certain locations. These locations are called hotspots, and for a price you can browse the internet at speeds about 20 times greater than you could get over your cell phone. Personal Area Networks These are networks that provide wireless connectivity over distances of up to 10m or so. At first this seems ridiculously small, but this range allows a computer to be connected wirelessly to a nearby printer, or a cell phone's hands-free headset to be connected wirelessly to the cell phone. The most talked about (and most hyped) technology is called Bluetooth. Personal Area Networks are a bit different than WANs and WLANs in one important respect. In the WAN and WLAN cases, networks are set up first, which devices then use. In the Personal Area Network case, there is no independent pre-existing network. The participating devices establish an ad-hoc network when they are within range, and the network is dissolved when the devices pass out of range. If you ever use Infrared (IR) to exchange data between laptops, you will be doing something similar. This idea of wireless devices discovering each other is a very important one, and appears in many guises in the evolving wireless world. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 23 LAB MANUAL OF COMPUTER NETWORK PAN technologies add value to other wireless technologies, although they wouldn't be the primary driver for a wireless business solution. For example, a wireless LAN in a hospital may allow a doctor to see a patient's chart on a handheld device. If the doctor's handheld was also Bluetooth enabled, he could walk to within range of the nearest Bluetooth enabled printer and print the chart. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 24 LAB MANUAL OF COMPUTER NETWORK PRACTICAL NO – 6 TO STUDY THE DIFFERENT TRANSMISSION MEDIA TRANSMISSION MEDIA The means through which data is transformed from one place to another is called transmission or communication media. There are two categories of transmission media used in computer communications. BOUNDED/GUIDED MEDIA UNBOUNDED/UNGUIDED MEDIA See all 2 photos Fig. : Coaxial cable TRANSMISSION MEDIA 1. BOUNDED MEDIA: Bounded media are the physical links through which signals are confined to narrow path. These are also called guide media. Bounded media are made up o a external conductor (Usually Copper) bounded by jacket material. Bounded media are great for LABS because they offer high speed, good security and low cast. However, some time they Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 25 LAB MANUAL OF COMPUTER NETWORK cannot be used due distance communication. Three common types of bounded media are used of the data transmission. These are Coaxial Cable Twisted Pairs Cable Fiber Optics Cable COAXIAL CABLE: Coaxial cable is very common & widely used commutation media. For example TV wire is usually coaxial. Coaxial cable gets its name because it contains two conductors that are parallel to each other. The center conductor in the cable is usually copper. The copper can be either a solid wire or stranded martial. Outside this central Conductor is a non-conductive material. It is usually white, plastic material used to separate the inner Conductor form the outer Conductor. The other Conductor is a fine mesh made from Copper. It is used to help shield the cable form EMI. Outside the copper mesh is the final protective cover. (as shown in Fig) The actual data travels through the center conductor in the cable. EMI interference is caught by outer copper mesh. There are different types of coaxial cable vary by gauge & impedance. Gauge is the measure of the cable thickness. It is measured by the Radio grade measurement, or RG number. The high the RG number, the thinner the central conductor core, the lower the number the thicker the core. Here the most common coaxial standards. 50-Ohm RG-7 or RG-11 : used with thick Ethernet. 50-Ohm RG-58 : used with thin Ethernet 75-Ohm RG-59 : used with cable television 93-Ohm RG-62 : used with ARCNET. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 26 LAB MANUAL OF COMPUTER NETWORK CHARACTERISTICS OF COAXIAL CABLE Low cost Easy to install Up to 10Mbps capacity Medium immunity form EMI Medium of attenuation ADVANTAGES COAXIAL CABLE Inexpensive Easy to wire Easy to expand Moderate level of EMI immunity DISADVANTAGE COAXIAL CABLE Single cable failure can take down an entire network STP UTP Twisted Pair Cable The most popular network cabling is Twisted pair. It is light weight, easy to install, inexpensive and support many different types of network. It also supports the speed of 100 mps. Twisted pair cabling is made of pairs of solid or stranded copper twisted along each other. The twists are done to reduce vulnerably to EMI and cross talk. The number of pairs in the cable depends on the type. The copper core is usually 22-AWG or 24AWG, as measured on the American wire gauge standard. There are two types of twisted pairs cabling Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 27 LAB MANUAL OF COMPUTER NETWORK 1. Unshielded twisted pair (UTP) 2. Shielded twisted pair (STP) 1. Unshielded twisted pair (UTP) UTP is more common. It can be either voice grade or data grade depending on the condition. UTP cable normally has an impedance of 100 ohm. UTP cost less than STP and easily available due to its many use. There are five levels of data cabling Category 1 These are used in telephone lines and low speed data cable. Category 2 These cables can support up to 4 mps implementation. Category 3 These cable supports up to 16 mps and are mostly used in 10 mps. Category 4 These are used for large distance and high speed. It can support 20mps. Category 5 This is the highest rating for UTP cable and can support up to 100mps. UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11 connector and 4 pair cable use RJ-45 connector. Characteristics of UTP low cost easy to install High speed capacity High attenuation Effective to EMI 100 meter limit Advantages of UTP Easy installation Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 28 LAB MANUAL OF COMPUTER NETWORK Capable of high speed for LAN Low cost Disadvantages of UTP Short distance due to attenuation 2. Shielded twisted pair (STP) It is similar to UTP but has a mesh shielding that’s protects it from EMI which allows for higher transmission rate. IBM has defined category for STP cable. Type 1 STP features two pairs of 22-AWG Type 2 This type include type 1 with 4 telephone pairs Type 6 This type feature two pairs of standard shielded 26-AWG Type 7 This type of STP consist of 1 pair of standard shielded 26-AWG Type 9 This type consist of shielded 26-AWG wire Characteristics of STP Medium cost Easy to install Higher capacity than UTP Higher attenuation, but same as UTP Medium immunity from EMI 100 meter limit Advantages of STP: Shielded Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 29 LAB MANUAL OF COMPUTER NETWORK Faster than UTP and coaxial Disadvantages of STP: More expensive than UTP and coaxial More difficult installation High attenuation rate Fiber Optics Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber optic cable light only moves in one direction for two way communication to take place a second connection must be made between the two devices. It is actually two stands of cable. Each stand is responsible for one direction of communication. A laser at one device sends pulse of light through this cable to other device. These pulses translated into “1’s” and “0’s” at the other end. In the center of fiber cable is a glass stand or core. The light from the laser moves through this glass to the other device around the internal core is a reflective material known as CLADDING. No light escapes the glass core because of this reflective cladding. Fiber optic cable has bandwidth more than 2 gbps (Gigabytes per Second) Characteristics Of Fiber Optic Cable: Expensive Very hard to install Capable of extremely high speed Extremely low attenuation No EMI interference Advantages Of Fiber Optic Cable: Fast Low attenuation No EMI interference Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 30 LAB MANUAL OF COMPUTER NETWORK Disadvantages Fiber Optics: Very costly Hard to install Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 31 LAB MANUAL OF COMPUTER NETWORK PRACTICAL NO – 7 TO STUDY IP ADDRESS AND SUBNET MASK A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting. All computers that belong to a subnet are addressed with a common, identical, mostsignificant bit-group in their IP address. This results in the logical division of an IP address into two fields, a network or routing prefix and the rest field or host identifier. The rest field is an identifier for a specific host or network interface. The routing prefix is expressed in CIDR notation. It is written as the first address of a network, followed by a slash character (/), and ending with the bit-length of the prefix. For example, 192.168.1.0/24 is the prefix of the Internet Protocol Version 4 network starting at the given address, having 24 bits allocated for the network prefix, and the remaining 8 bits reserved for host addressing. The IPv6 address specification 2001:db8::/32 is a large network with 296 addresses, having a 32-bit routing prefix. In IPv4 the routing prefix is also specified in the form of the subnet mask, which is expressed in quad-dotted decimal representation like an address. For example, 255.255.255.0 is the network mask for the 192.168.1.0/24 prefix. Traffic between subnetworks is exchanged or routed with special gateways called routers which constitute the logical or physical boundaries between the subnets. The benefits of subnetting vary with each deployment scenario. In the address allocation architecture of the Internet using Classless Inter-Domain Routing (CIDR) and in large organizations, it is necessary to allocate address space efficiently. It may also enhance routing efficiency, or have advantages in network management when subnetworks are administratively controlled by different entities in a larger organization. Subnets may be arranged logically in a hierarchical architecture, partitioning an organization's network address space into a tree-like routing structure. IPv4 subnetting The process of subnetting involves the separation of the network and subnet portion of an address from the host identifier. This is performed by a bitwise AND operation between the IP address and the (sub)network mask. The result yields the network address or prefix, and the remainder is the host identifier. Determining the network prefix An IPv4 network mask consists of 32 bits, a sequence of ones (1) followed by a block of 0s. The trailing block of zeros (0) designates that part as being the host identifier. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 32 LAB MANUAL OF COMPUTER NETWORK The following example shows the separation of the network prefix and the host identifier from an address (192.168.5.130) and its associated /24 network mask (255.255.255.0). The operation is visualized in a table using binary address formats. Binary form Dot-decimal notation 11000000.10101000.00000101.10000010 192.168.5.130 IP address Subnet mask 11111111.11111111.11111111.00000000 255.255.255.0 Network prefix 11000000.10101000.00000101.00000000 192.168.5.0 00000000.00000000.00000000.10000010 0.0.0.130 Host part The mathematical operation for calculating the network prefix is the binary and. The result of the operation yields the network prefix 192.168.5.0 and the host number 130. Subnetting Subnetting is the process of designating some high-order bits from the host part and grouping them with the network mask to form the subnet mask. This divides a network into smaller subnets. The following diagram modifies the example by moving 2 bits from the host part to the subnet mask to form a smaller subnet one quarter the previous size: Binary form Dot-decimal notation 11000000.10101000.00000101.10000010 192.168.5.130 IP address Subnet mask 11111111.11111111.11111111.11000000 255.255.255.192 Network prefix 11000000.10101000.00000101.10000000 192.168.5.128 00000000.00000000.00000000.00000010 0.0.0.2 Host part Special addresses and subnets Internet Protocol version 4 uses specially designated address formats to facilitate recognition of special address functionality. The first and the last subnets obtained by subnetting have traditionally had a special designation and, early on, special usage implications. In addition, IPv4 uses the all ones host address, i.e. the last address within a network, for broadcast transmission to all hosts on the link. Subnet zero and the all-ones subnet The first subnet obtained from subnetting has all bits in the subnet bit group set to zero (0). It is therefore called subnet zero The last subnet obtained from subnetting has all bits in the subnet bit group set to one (1). It is therefore called the all-ones subnet. The IETF originally discouraged the production use of these two subnets due to possible confusion of having a network and subnet with the same address The practice of avoiding subnet zero and the all-ones subnet was declared obsolete in 1995 by RFC 1878, an informational, but now historical document. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 33 LAB MANUAL OF COMPUTER NETWORK Subnet and host counts The number of subnetworks available, and the number of possible hosts in a network may be readily calculated. In the example (above) two bits were borrowed to create subnetworks, thus creating 4 (22) possible subnets. Network Network (binary) Broadcast address 192.168.5.0/26 192.168.5.64/26 192.168.5.128/26 192.168.5.192/26 11000000.10101000.00000101.00000000 11000000.10101000.00000101.01000000 11000000.10101000.00000101.10000000 11000000.10101000.00000101.11000000 192.168.5.63 192.168.5.127 192.168.5.191 192.168.5.255 The RFC 950 specification reserves the subnet values consisting of all zeros (see above) and all ones (broadcast), reducing the number of available subnets by two. However, due to the inefficiencies introduced by this convention it was abandoned for use on the public Internet, and is only relevant when dealing with legacy equipment that does not implement CIDR. The only reason not to use the all-zeroes subnet is that it is ambiguous when the prefix length is not available. All CIDR-compliant routing protocols transmit both length and suffix. RFC 1878 provides a subnetting table with examples. The remaining bits after the subnet are used for addressing hosts within the subnet. In the above example the subnet mask consists of 26 bits, leaving 6 bits for the host identifier. This allows for 64 combinations (26), however the all zeros value and all ones value are reserved for the network ID and broadcast address respectively, leaving 62 addresses. In general the number of available hosts on a subnet is 2n−2, where n is the number of bits used for the host portion of the address. RFC 3021 specifies an exception to this rule when dealing with 31-bit subnet masks (i.e. 1-bit host identifiers). In such networks, usually point-to-point links, only two hosts (the end points) may be connected and a specification of network and broadcast addresses is not necessary. A /24 network may be divided into the following subnets by increasing the subnet mask successively by one bit. This affects the total number of hosts that can be addressed in the /24 network (last column). Available Usable hosts Total subnets per subnet usable hosts 255.255.255.0 1 254 254 255.255.255.128 2 126 252 255.255.255.192 4 62 248 255.255.255.224 8 30 240 255.255.255.240 16 14 224 Prefix size Network mask /24 /25 /26 /27 /28 Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 34 LAB MANUAL OF COMPUTER NETWORK /29 /30 /31 255.255.255.248 32 255.255.255.252 64 255.255.255.254 128 6 2 2* 192 128 256 *only applicable for point-to-point links IPv6 subnetting The design of the IPv6 address space differs significantly from IPv4. The primary reason for subnetting in IPv4 is to improve efficiency in the utilization of the relatively small address space available, particularly to enterprises. No such limitations exist in IPv6, as the address space available, even to end-users, is large. An RFC 4291 compliant subnet always uses IPv6 addresses with 64 bits for the host portion. It therefore has a /64 routing prefix (128−64 = the 64 most significant bits). Although it is technically possible to use smaller subnets, they are impractical for local area networks based on Ethernet technology, because 64 bits are required for stateless address auto configuration. The Internet Engineering Task Force recommends the use of /64 subnets even for point-to-point links, which consist of only two hosts IPv6 does not implement special address formats for broadcast traffic or network numbers, and thus all addresses in a subnet are valid host addresses. The all-zeroes address is reserved as the Subnet-Router anycast address. The recommended allocation for an IPv6 customer site is an address space with an 80-bit (/48) prefix. This provides 65536 subnets for a site. Despite this recommendation, other common allocations are /56 (72 bits) as well as /64 prefixes for a residential customer network. Subnetting in IPv6 is based on the concepts of variable-length subnet masking (VLSM) and the Classless Inter-Domain Routing methodology. It is used to route traffic between the global allocation spaces and within customer networks between subnets and the Internet at large. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 35 LAB MANUAL OF COMPUTER NETWORK PRACTICAL NO – 8 TO STUDY THE DHCP SERVER What is DHCP? Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network. DHCP assigns an IP address when a system is started, for example: 1. A user turns on a computer with a DHCP client. 2. The client computer sends a broadcast request (called a DISCOVER or DHCPDISCOVER), looking for a DHCP server to answer. 3. The router directs the DISCOVER packet to the correct DHCP server. 4. The server receives the DISCOVER packet. Based on availability and usage policies set on the server, the server determines an appropriate address (if any) to give to the client. The server then temporarily reserves that address for the client and sends back to the client an OFFER (or DHCPOFFER) packet, with that address information. The server also configures the client's DNS servers, WINS servers, NTP servers, and sometimes other services as well. 5. The client sends a REQUEST (or DHCPREQUEST) packet, letting the server know that it intends to use the address. 6. The server sends an ACK (or DHCPACK) packet, confirming that the client has a been given a lease on the address for a server-specified period of time. When a computer uses a static IP address, it means that the computer is manually configured to use a specific IP address. One problem with static assignment, which can result from user error or inattention to detail, occurs when two computers are configured with the same IP address. This creates a conflict that results in loss of service. Using DHCP to dynamically assign IP addresses minimizes these conflicts. For a technical review of DHCP standards, see RFCs 2131 and 2132. How to Install the DHCP Service? Before you can configure the DHCP service, you must install it on the server. DHCP is not installed by default during a typical installation of Windows Standard Server 2003 or Windows Enterprise Server 2003. You can install DHCP either during the initial Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 36 LAB MANUAL OF COMPUTER NETWORK installation of Windows Server 2003 or after the initial installation is completed. How to Install the DHCP Service on an Existing Server 1. 2. 3. 4. 5. 6. Click Start, point to Control Panel, and then click Add or Remove Programs. In the Add or Remove Programs dialog box, click Add/Remove Windows Components. In the Windows Components Wizard, click Networking Services in the Components list, and then click Details. In the Networking Services dialog box, click to select the Dynamic Host Configuration Protocol (DHCP) check box, and then click OK. In the Windows Components Wizard, click Next to start Setup. Insert the Windows Server 2003 CD-ROM into the computer's CD-ROM or DVD-ROM drive if you are prompted to do so. Setup copies the DHCP server and tool files to your computer. When Setup is completed, click Finish. How to Configure the DHCP Service? After you have installed the DHCP service and started it, you must create a scope, which is a range of valid IP addresses that are available for lease to the DHCP client computers on the network. Microsoft recommends that each DHCP server in your environment have at least one scope that does not overlap with any other DHCP server scope in your environment. In Windows Server 2003, DHCP servers in an Active Directory-based domain must be authorized to prevent rogue DHCP servers from coming online. Any Windows Server 2003 DHCP Server that determines itself to be unauthorized will not manage clients. How to Create a New Scope 1. Click Start, point to Programs, point to Administrative Tools, and then click DHCP. 2. In the console tree, right-click the DHCP server on which you want to create the new DHCP scope, and then click New Scope. 3. In the New Scope Wizard, click Next, and then type a name and description for the scope. This can be any name that you want, but it should be descriptive enough so that you can identify the purpose of the scope on your network (for example, you can use a name such as "Administration Building Client Addresses"). Click Next. 4. Type the range of addresses that can be leased as part of this scope (for example, use a range of IP addresses from a starting IP address of 192.168.100.1 to an ending address of 192.168.100.100). Because these addresses are given to clients, Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 37 LAB MANUAL OF COMPUTER NETWORK they must all be valid addresses for your network and not currently in use. If you want to use a different subnet mask, type the new subnet mask. Click Next. 5. Type any IP addresses that you want to exclude from the range that you entered. This includes any addresses in the range described in step 4 that may have already been statically assigned to various computers in your organization. Typically, domain controllers, Web servers, DHCP servers, Domain Name System (DNS) servers, and other servers, have statically assigned IP addresses. Click Next. 6. Type the number of days, hours, and minutes before an IP address lease from this scope expires. This determines how long a client can hold a leased address without renewing it. Click Next, and then click Yes, I want to configure these options now to extend the wizard to include settings for the most common DHCP options. Click Next. 7. Type the IP address for the default gateway that should be used by clients that obtain an IP address from this scope. Click Add to add the default gateway address in the list, and then click Next. 8. If you are using DNS servers on your network, type your organization's domain name in the Parent domain box. Type the name of your DNS server, and then click Resolve to make sure that your DHCP server can contact the DNS server and determine its address. Click Add to include that server in the list of DNS servers that are assigned to the DHCP clients. Click Next, and then follow the same steps if you are using a Windows Internet Naming Service (WINS) server, by adding its name and IP address. Click Next. 9. Click Yes, I want to activate this scope now to activate the scope and allow clients to obtain leases from it, and then click Next. 10. Click Finish. 11. In the console tree, click the server name, and then click Authorize on the Action menu. Troubleshooting The following sections explain how to troubleshoot some of the issues that you may experience when you try to install and configure a Windows Server 2003-based DHCP server in a workgroup. Clients Cannot Obtain an IP Address If a DHCP client does not have a configured IP address, this typically indicates that the client was not able to contact a DHCP server. This can be caused by a network problem, or because the DHCP server is unavailable. If the DHCP server started and other clients can obtain valid addresses, verify that the client has a valid network connection and that all the related client hardware devices (including cables and network adapters) are working properly. The DHCP Server Is Unavailable Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 38 LAB MANUAL OF COMPUTER NETWORK If a DHCP server does not provide leased addresses to clients, it is frequently because the DHCP service did not start. If this is the case, the server may not be authorized to operate on the network. If you were previously able to start the DHCP service, but it has since stopped, use Event Viewer to check the System log for any entries that may explain why you cannot start the DHCP service. To restart the DHCP service: 1. Click Start, and then click Run. 2. Type cmd, and then press ENTER. 3. Type net start dhcpserver, and then press ENTER. -or1. Click Start, point to Control Panel, point to Administrative Tools, and then click Computer Management. 2. Expand Services and Applications, and then click Services. 3. Locate and then double-click DHCP Server. 4. Verify that Startup is set to Automatic and that Service Status is set to Started. If not, click Start. 5. Click OK, and then close the Computer Management window. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 39 LAB MANUAL OF COMPUTER NETWORK PRACTICAL NO – 9 STUDY THE WINDOWS 2000 SERVER Windows 2000 is a line of operating systems produced by Microsoft for use on personal computers, business desktops, laptops, and servers. Windows 2000 was released to manufacturing on December 15, 1999and launched to retail on February 17, 2000.It is the successor to Windows NT 4.0, and is the final release of Microsoft Windows to display the "Windows NT" designation. It was succeeded by Windows XP for desktop systems in October 2001 and Windows Server 2003 for servers in April 2003. Windows Me was released seven months after Windows 2000 and one year before Windows XP, but Windows Me was not intended to be, nor did it serve as the successor to Windows 2000. Windows Me was designed for home use, while Windows 2000 was designed for business Four editions of Windows 2000 were released, listed here in increasing ranking: Professional, Server, Advanced Server, and Datacenter Server. ditionally, Microsoft sold Windows 2000 Advanced Server Limited Edition and Windows 2000 Datacenter Server Limited Edition, which ran on 64-bit Intel Itanium microprocessors and they were released in 2001.While each edition of Windows 2000 was targeted at a different market, they shared a core set of features, including many system utilities such as the Microsoft Management Console and standard system administration applications. Support for people with disabilities has been improved over Windows NT 4.0 with a number of new assistive technologies,and Microsoft increased support for different languageand locale information. All versions of the operating system support the Windows NT file system, NTFS 3.0,the Encrypting File System, as well as basic and dynamic disk storage. The Windows 2000 Server family has additional features,including the ability to provide Active Directory services (a hierarchical framework of resources), Distributed File System (a file system that supports sharing of files) and fault-redundant storage volumes. Windows 2000 can be installed through either a manual or unattended installation. Unattended installations rely on the use of answer files to fill in installation information, and can be performed through a bootable CD using Microsoft Systems Management Server, by the System Preparation Tool. Microsoft marketed Windows 2000 as the most secure Windows version ever at the time; however, it became the target of a number of high-profile virus attacks such as Code Red and Nimda.For ten years after its release, it continued to receive patches for security vulnerabilities nearly every month until reaching the end of its lifecycle on July 13, 2010. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 40 LAB MANUAL OF COMPUTER NETWORK History Windows 2000 is a continuation of the Microsoft Windows NT family of operating systems, replacing Windows NT 4.0. The original name for the operating system was Windows NT 5.0. Beta 1 of NT 5.0 was released in September 1997, followed by Beta 2 in August 1998. On October 27, 1998, Microsoft announced that the name of the final version of the operating system would be Windows 2000, a name which referred to its projected release date.Windows 2000 Beta 3 was released in January 1999.Windows 2000's codenames are NT 5.0 and MemphisNT. Windows 2000 Service Pack 1 was codenamed "Asteroid" and Windows 2000 64-bit was codenamed "Janus."During development, there was a build for the Alpha which was abandoned some time after RC1after Compaq announced they had dropped support for Windows NT on Alpha. From here, Microsoft issued three release candidates between July and November 1999, and finally released the operating system to partners on December 12, 1999. The public could buy the full version of Windows 2000 on February 17, 2000. Three days before this event, which Microsoft advertised as "a standard in reliability," a leaked memo from Microsoft reported on by Mary Jo Foley revealed that Windows 2000 had "over 63,000 potential known defects." After Foley's article was published, Microsoft blacklisted her for a considerable time.However, Abraham Silberschatz et al. claim in their computer science textbook that "Windows 2000 was the most reliable, stable operating system Microsoft had ever shipped to that point. Much of this reliability came from maturity in the source code, extensive stress testing of the system, and automatic detection of many serious errors in drivers." InformationWeek summarized the release "our tests show the successor to NT 4.0 is everything we hoped it would be. Of course, it isn't perfect either." Wired News later described the results of the February launch as "lackluster." Novell criticized Microsoft's Active Directory, the new directory service architecture, as less scalable or reliable than its own Novell Directory Services (NDS) alternative. Windows 2000 was first planned to replace both Windows 98 and Windows NT 4.0. However, that changed later. Instead, an updated version of Windows 98 called Windows 98 Second Edition was released in 1999 and Windows Me was released in late 2000. Close to the release of Windows 2000 Service Pack 1, Microsoft released Windows 2000 Datacenter Server, targeted at large-scale computing systems with support for 32 processors, on September 29, 2000. On or shortly before February 12, 2004, "portions of the Microsoft Windows 2000 and Windows NT 4.0 source code were illegally made available on the Internet." The source of the leak remains unannounced. Microsoft issued the following statement: "Microsoft source code is both copyrighted and protected as a trade secret. As such, it is illegal to post it, make it available to others, download it or use it." Despite the warnings, the archive containing the leaked code spread widely on the filesharing networks. On February 16, 2004, an exploit "allegedly discovered by an individual studying the leaked source code" for certain versions of Microsoft Internet Explorer was reported. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 41 LAB MANUAL OF COMPUTER NETWORK New and updated features Windows 2000 introduced many of the new features of Windows 98 and Windows 98 SE into the NT line, such as the Windows Desktop Update, Internet Explorer 5 (Internet Explorer 6, which came in 2001, is also available for Windows 2000), Outlook Express, NetMeeting, FAT32 support, Windows Driver Model, Internet Connection Sharing, Windows Media Player, WebDAV support etc. Certain new features are common across all editions of Windows 2000, among them NTFS 3.0, the Microsoft Management Console (MMC), UDF support, the Encrypting File System (EFS), Logical Disk Manager, Image Color Management 2.0, support for PostScript 3-based printers, OpenType (.OTF) and Type 1 PostScript (.PFB) font support, the Data protection API (DPAPI), an LDAP/Active Directory-enabled Address Book, usability enhancements and multi-language and locale support. Windows 2000 also introduced USB device class drivers for USB printers, Mass storage class devices, and improved FireWire SBP-2 support for printers and scanners, along with a Safe removal applet for storage devices. Windows 2000 is also the first Windows version to support hibernation at the operating system level (OS-controlled ACPI S4 sleep state) unlike Windows 98 which required special drivers from the hardware manufacturer or driver developer. A new capability designed to protect critical system files called Windows File Protection was introduced. This protects critical Windows system files by preventing programs other than Microsoft's operating system update mechanisms such as the Package Installer, Windows Installer and other update components from modifying them. The System File Checker utility provides users the ability to perform a manual scan the integrity of all protected system files, and optionally repair them, either by restoring from a cache stored in a separate "DLLCACHE" directory, or from the original install media. Microsoft recognized that a serious error or a stop error could cause problems for servers that needed to be constantly running and so provided a system setting that would allow the server to automatically reboot when a stop error occurred Also included is an option to dump any of the first 64 KB of memory to disk (the smallest amount of memory that is useful for debugging purposes, also known as a minidump), a dump of only the kernel's memory, or a dump of the entire contents of memory to disk, as well as write that this event happened to the Windows 2000 event log. In order to improve performance on servers running Windows 2000, Microsoft gave administrators the choice of optimizing the operating system's memory and processor usage patterns for background services or for applications. Windows 2000 also introduced core system administration and management features as the Windows Installer, Windows Management Instrumentationand Event Tracing for Windows (ETW) into the operating system. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 42 LAB MANUAL OF COMPUTER NETWORK Plug and Play and hardware support improvements The most notable improvement from Windows NT 4.0 is the addition of Plug and Play with full ACPI and Windows Driver Model support. Similar to Windows 9x, Windows 2000 supports automatic recognition of installed hardware, hardware resource allocation, loading of appropriate drivers, PnP APIs and device notification events. The addition of the kernel PnP Manager along with the Power Manager are two significant subsystems added in Windows 2000.Windows 2000 introduced version 3 print drivers (user mode printer drivers). Driver Verifier was introduced to stress test and catch device driver bugs. Shell Windows 2000 introduces layered windows that allow for transparency, translucency and various transition effects like shadows, gradient fills and alpha blended GUI elements to top-level windows. Menus support a new Fade transition effect. The integrated media player in Windows Explorer playing a MIDI sequence. The Start Menu in Windows 2000 introduces personalized menus, expandable special folders and the ability to launch multiple programs without closing the menu by holding down the SHIFT key. A Re-sort button forces the entire Start Menu to be sorted by name. The Taskbar introduces support for balloon notifications which can also be used by application developers. Windows Explorer has been enhanced in several ways in Windows 2000. It is the first Windows NT release to include Active Desktop, first introduced as a part of Internet Explorer 4.0 (specifically Windows Desktop Update), and only pre-installed in Windows 98 by that time. It allowed users to customize the way folders look and behave by using HTML templates, having the file extension HTT. This feature was abused by computer viruses that employed malicious scripts, Java applets, or ActiveX controls in folder template files as their infection vector. Two such viruses are VBS/Roor-C and VBS.Redlof.a. Other features new to Explorer include customizable toolbars, autoSubject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 43 LAB MANUAL OF COMPUTER NETWORK complete in address bar and Run box, advanced file type association features and a Places bar in common dialogs. The "Web-style" folders view, with the left Explorer pane displaying details for the object currently selected, is turned on by default in Windows 2000. For certain file types, such as pictures and media files, the preview is also displayed in the left pane. Until the dedicated interactive preview pane appeared in Windows Vista, Windows 2000 had been the only Windows release to feature an interactive media player as the previewer for sound and video files, enabled by default. However, such a previewer can be enabled in previous versions of Windows with the Windows Desktop Update installed through the use of folder customization templates The default file tooltip displays file title, author, subject and comments; this metadata may be read from a special NTFS stream, if the file is on an NTFS volume, or from an OLE structured storage stream, if the file is a structured storage document. All Microsoft Office documents since Office 4.0 make use of structured storage, so their metadata is displayable in the Windows 2000 Explorer default tooltip. File shortcuts can also store comments which are displayed as a tooltip when the mouse hovers over the shortcut. The shell introduces extensibility support through metadata handlers, icon overlay handlers and column handlers in Explorer Details view. The right pane of Windows 2000 Explorer, which usually just lists files and folders, can also be customized. For example, the contents of the system folders aren't displayed by default, instead showing in the right pane a warning to the user that modifying the contents of the system folders could harm their computer. It's possible to define additional Explorer panes by using DIV elements in folder template filesThis degree of customizability is new to Windows 2000; neither Windows 98 nor the Desktop Update could provide it. The new DHTML-based search pane is integrated into Windows 2000 Explorer, unlike the separate search dialog found in all previous Explorer versions. The Indexing Service has also been integrated into the operating system and the search pane built into Explorer allows searching files indexed by its database. NTFS 3.0 Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 44 LAB MANUAL OF COMPUTER NETWORK Windows 2000 supports disk quotas, which can be set via the "Quota" tab found in the hard disk properties dialog box. Main article: NTFS Microsoft released the version 3.0 of NTFS (sometimes incorrectly called NTFS 5 in relation to the kernel version number) as part of Windows 2000; this introduced disk quotas (provided by QuotaAdvisor), file-system-level encryption, sparse files and reparse points. Sparse files allow for the efficient storage of data sets that are very large yet contain many areas that only have zeros. Reparse points allow the object manager to reset a file namespace lookup and let file system drivers implement changed functionality in a transparent manner. Reparse points are used to implement volume mount points, junctions, Hierarchical Storage Management, Native Structured Storage and Single Instance Storage. Volume mount points and directory junctions allow for a file to be transparently referred from one file or directory location to another. Encrypting File System The Encrypting File System (EFS) introduced strong file system-level encryption to Windows. It allows any folder or drive on an NTFS volume to be encrypted transparently by the user. EFS works together with the EFS service, Microsoft's CryptoAPI and the EFS File System Runtime Library (FSRTL). To date, its encryption has not been compromised. EFS works by encrypting a file with a bulk symmetric key (also known as the File Encryption Key, or FEK), which is used because it takes less time to encrypt and decrypt large amounts of data than if an asymmetric key cipher were used. The symmetric key used to encrypt the file is then encrypted with a public key associated with the user who encrypted the file, and this encrypted data is stored in the header of the encrypted file. To decrypt the file, the file system uses the private key of the user to decrypt the symmetric key stored in the file header. It then uses the symmetric key to decrypt the file. Because this is done at the file system level, it is transparent to the user. For a user losing access to their key, support for recovery agents that can decrypt files is built in to EFS. A Recovery Agent is a user who is authorized by a public key recovery certificate to decrypt files belonging to other users using a special private key. By default, local administrators are recovery agents however they can be customized using Group Policy.. Basic and dynamic disk storage Windows 2000 introduced the Logical Disk Manager and the disk part command line tool for dynamic storage. All versions of Windows 2000 support three types of dynamic disk volumes (along with basic disks) : simple volumes, spanned volumes and striped volumes: Simple volume, a volume with disk space from one disk. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 45 LAB MANUAL OF COMPUTER NETWORK Spanned volumes, where up to 32 disks show up as one, increasing it in size but not enhancing performance. When one disk fails, the array is destroyed. Some data may be recoverable. This corresponds to JBOD and not to RAID-1. Striped volumes, also known as RAID-0, store all their data across several disks in stripes. This allows better performance because disk reads and writes are balanced across multiple disks. Like spanned volumes, when one disk in the array fails, the entire array is destroyed (some data may be recoverable). In addition to these disk volumes, Windows 2000 Server, Windows 2000 Advanced Server, and Windows 2000 Datacenter Server support mirrored volumes and striped volumes with parity: Mirrored volumes, also known as RAID-1, store identical copies of their data on 2 or more identical disks (mirrored). This allows for fault tolerance; in the event one disk fails, the other disk(s) can keep the server operational until the server can be shut down for replacement of the failed disk. Striped volumes with parity, also known as RAID-5, functions similar to striped volumes/RAID-0, except "parity data" is written out across each of the disks in addition to the data. This allows the data to be "rebuilt" in the event a disk in the array needs replacement. Accessibility With Windows 2000, Microsoft introduced the Windows 9x accessibility features for people with visual and auditory impairments and other disabilities into the NT-line of operating systems. These included: Sticky Keys: makes modifier keys (ALT, CTRL and SHIFT) become "sticky": a user can press the modifier key, and then release it before pressing the combination key. (Activated by pressing Shift five times quickly.) Filter Keys: a group of keyboard-related features for people with typing issues, including: o SlowKeys: Ignore any keystroke not held down for a certain period. o BounceKeys: Ignore repeated keystrokes pressed in quick succession. o RepeatKeys: lets users slow down the rate at which keys are repeated via the keyboard's key-repeat feature. ToggleKeys: when turned on, Windows will play a sound when the CAPS LOCK, NUM LOCK or SCROLL LOCK key is pressed. SoundSentry: designed to help users with auditory impairments, Windows 2000 shows a visual effect when a sound is played through the sound system. MouseKeys: lets users move the cursor around the screen via the numeric keypad. SerialKeys: lets Windows 2000 support speech augmentation devices. High contrast theme: to assist users with visual impairments. Microsoft Magnifier: A screen magnifier that enlarges a part of the screen the cursor is over. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 46 LAB MANUAL OF COMPUTER NETWORK Additionally, Windows 2000 introduced the following new accessibility features: On-screen keyboard: displays a virtual keyboard on the screen and allows users to press its keys using a mouse or a joystick. Microsoft Narrator: Introduced in Windows 2000, this is a screen reader that utilizes the Speech API 5. Languages and locales Windows 2000 introduced the Multilingual User Interface (MUI). Besides English, Windows 2000 incorporates support for Arabic, Armenian, Baltic, Central European, Cyrillic, Georgian, Greek, Hebrew, Indic, Japanese, Korean, Simplified Chinese, Thai, Traditional Chinese, Turkic, Vietnamese and Western European languages. It also has support for many different locales. Games Windows 2000 included version 7.0 of the DirectX API, commonly used by game developers on Windows 98. The last version of DirectX that Windows 2000 supports is DirectX 9.0c (Shader Model 3.0), that shipped with Windows XP Service Pack 2. Microsoft published quarterly updates to DirectX 9.0c through the February 2010 release after which support was dropped in the June 2010 SDK. These updates contain bug fixes to the core runtime and some additional libraries such as D3DX, Audio 2, XInput and Managed DirectX components. The majority of games written for versions of DirectX 9.0c (up to the February 2010 release) can therefore run on Windows 2000. System utilities The Windows 2000 Computer Management console can perform many system tasks. It is pictured here starting a disk defragmentation. Windows 2000 introduced the Microsoft Management Console (MMC), which is used to create, save, and open administrative tools. Each of these is called a console, and most allow an administrator to administer other Windows 2000 computers from one centralised computer. Each console can contain one or many specific administrative tools, called snap-ins. These can be either standalone (with one function), or an extension (adding functions to an existing snap-in). In order to provide the ability to control what Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 47 LAB MANUAL OF COMPUTER NETWORK snap-ins can be seen in a console, the MMC allows consoles to be created in author mode or user mode. Author mode allows snap-ins to be added, new windows to be created, all portions of the console tree to be displayed and consoles to be saved. User mode allows consoles to be distributed with restrictions applied. User mode consoles can grant full access to the user for any change, or they can grant limited access, preventing users from adding snapins to the console though they can view multiple windows in a console. Alternatively users can be granted limited access, preventing them from adding to the console and stopping them from viewing multiple windows in a single console. The main tools that come with Windows 2000 can be found in the Computer Management console (in Administrative Tools in the Control Panel). This contains the Event Viewer—a means of seeing events and the Windows equivalent of a log file, a system information utility, a backup utility, Task Scheduler and management consoles to view open shared folders and shared folder sessions, configure and manage COM+ applications, configure Group Policy, manage all the local users and user groups, and a device manager. It contains Disk Management and Removable Storage snap-ins, a disk defragmenter as well as a performance diagnostic console, which displays graphs of system performance and configures data logs and alerts. It also contains a service configuration console, which allows users to view all installed services and to stop and start them, as well as configure what those services should do when the computer starts. CHKDSK has significant performance improvements. Windows 2000 comes with two utilities to edit the Windows registry, REGEDIT.EXE and REGEDT32.EXE. REGEDIT has been directly ported from Windows 98, and therefore does not support editing registry permissions. REGEDT32 has the older multiple document interface (MDI) and can edit registry permissions in the same manner that Windows NT's REGEDT32 program could. REGEDIT has a left-side tree view of the Windows registry, lists all loaded hives and represents the three components of a value (its name, type, and data) as separate columns of a table. REGEDT32 has a left-side tree view, but each hive has its own window, so the tree displays only keys and it represents values as a list of strings. REGEDIT supports right-clicking of entries in a tree view to adjust properties and other settings. REGEDT32 requires all actions to be performed from the top menu bar. Windows XP is the first system to integrate these two programs into a single utility, adopting the REGEDIT behavior with the additional NT features. The System File Checker (SFC) also comes with Windows 2000. It is a command line utility that scans system files and verifies whether they were signed by Microsoft and works in conjunction with the Windows File Protection mechanism. It can also repopulate and repair all the files in the Dllcache folder. Recovery Console Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 48 LAB MANUAL OF COMPUTER NETWORK The Recovery Console is usually used to recover unbootable systems. Main article: Recovery Console The Recovery Console is run from outside the installed copy of Windows to perform maintenance tasks that can neither be run from within it nor feasibly be run from another computer or copy of Windows 2000. It is usually used to recover the system from problems that cause booting to fail, which would render other tools useless, like Safe Mode or Last Known Good Configuration, or chkdsk. It includes commands like 'fixmbr', which are not present in MS-DOS. It has a simple command line interface, used to check and repair the hard drive(s), repair boot information (including NTLDR), replace corrupted system files with fresh copies from the CD, or enable/disable services and drivers for the next boot. The console can be accessed in either of the two ways: 1. Booting from the Windows 2000 CD, and choosing to start the Recovery Console from the CD itself instead of continuing with setup. The Recovery Console is accessible as long as the installation CD is available. 2. Preinstalling the Recovery Console on the hard disk as a startup option in Boot.ini, via WinNT32.exe, with the /cmdcons switch. In this case, it can only be started as long as NTLDR can boot from the system partition. Windows Scripting Host 2.0 Main article: Windows Script Host Windows 2000 introduced Windows Script Host 2.0 which included an expanded object model and support for logon and logoff scripts. Server family features The Windows 2000 server family consists of Windows 2000 Server, Windows 2000 Advanced Server, and Windows 2000 Datacenter Server. Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 49 LAB MANUAL OF COMPUTER NETWORK All editions of Windows 2000 Server have the following services and features built in: Routing and Remote Access Service (RRAS) support, facilitating dial-up and VPN connections using IPSec, L2TP or L2TP/IPsec, support for RADIUS authentication in Internet Authentication Service, network connection sharing, Network Address Translation, unicast and multicast routing schemes. Remote access security features: Remote Access Policies for setup, verify Caller ID (IP address for VPNs), callback and Remote access account lockout Autodial by location feature using the Remote Access Auto Connection Manager service Extensible Authentication Protocol support in IAS (EAP-MD5 and EAP-TLS) later upgraded to PEAPv0/EAP-MSCHAPv2 and PEAP-EAP-TLS in Windows 2000 SP4 DNS server, including support for Dynamic DNS. Active Directory relies heavily on DNS. IPSec support and TCP/IP filtering Smart card support Microsoft Connection Manager Administration Kit (CMAK) and Connection Point Services Support for distributed file systems (DFS) Hierarchical Storage Management support including remote storage, a service that runs with NTFS and automatically transfers files that are not used for some time to less expensive storage media Fault tolerant volumes, namely Mirrored and RAID-5 Group Policy (part of Active Directory) IntelliMirror, a collection of technologies for fine-grained management of Windows 2000 Professional clients that duplicates users' data, applications, files, and settings in a centralized location on the network. IntelliMirror employs technologies such as Group Policy, Windows Installer, Roaming profiles, Folder Redirection, Offline Files (also known as Client Side Caching or CSC), File Replication Service (FRS), Remote Installation Services (RIS) to address desktop management scenarios such as user data management, user settings management, software installation and maintenance. COM+, Microsoft Transaction Server and Distributed Transaction Coordinator MSMQ 2.0 TAPI 3.0 Integrated Windows Authentication (including Kerberos, Secure channel and SPNEGO (Negotiate) SSP packages for Security Support Provider Interface (SSPI)). MS-CHAP v2 protocol Public Key Infrastructure (PKI) and Enterprise Certificate Authority support Terminal Services and support for the Remote Desktop Protocol (RDP) Internet Information Services (IIS) 5.0 and Windows Media Services 4.1 Network Quality of Service featuresA new Windows Time service which is an implementation of Simple Network Time Protocol (SNTP) as detailed in IETF RFC 1769. The Windows Time service synchronizes the date and time of Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 50 LAB MANUAL OF COMPUTER NETWORK computers in a domain running on Windows 2000 Server or later. Windows 2000 Professional includes an SNTP client. Screenshot of Windows 2000 Server The Server editions include more features and components, including the Microsoft Distributed File System (DFS), Active Directory support and fault-tolerant storage. Distributed File System Main article: Distributed File System (Microsoft) The Distributed File System (DFS) allows shares in multiple different locations to be logically grouped under one folder, or DFS root. When users try to access a network share off the DFS root, the user is really looking at a DFS link and the DFS server transparently redirects them to the correct file server and share. A DFS root can only exist on a Windows 2000 version that is part of the server family, and only one DFS root can exist on that server. There can be two ways of implementing a DFS namespace on Windows 2000: either through a standalone DFS root or a domain-based DFS root. Standalone DFS allows for only DFS roots on the local computer, and thus does not use Active Directory. Domainbased DFS roots exist within Active Directory and can have their information distributed to other domain controllers within the domain – this provides fault tolerance to DFS. DFS roots that exist on a domain must be hosted on a domain controller or on a domain member server. The file and root information is replicated via the Microsoft File Replication Service (FRS). Active Directory Main article: Active Directory A new way of organizing Windows network domains, or groups of resources, called Active Directory, is introduced with Windows 2000 to replace Windows NT's earlier domain model. Active Directory's hierarchical nature allowed administrators a built-in way to manage user and computer policies and user accounts, and to automatically deploy programs and updates with a greater degree of scalability and centralization than provided in previous Windows versions. It is one of the main reasons many corporations Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 51 LAB MANUAL OF COMPUTER NETWORK migrated to Windows 2000.User information stored in Active Directory also provided a convenient phone book-like function to end users. Active Directory domains can vary from small installations with a few hundred objects, to large installations with millions. Active Directory can organise and link groups of domains into a contiguous domain name space to form trees. Groups of trees outside of the same namespace can be linked together to form forests. Active Directory services could always be installed on a Windows 2000 Server, Advanced Server, or Datacenter Server computer, and cannot be installed on a Windows 2000 Professional computer. However, Windows 2000 Professional is the first client operating system able to exploit Active Directory's new features. As part of an organization's migration, Windows NT clients continued to function until all clients were upgraded to Windows 2000 Professional, at which point the Active Directory domain could be switched to native mode and maximum functionality achieved. Active Directory requires a DNS server that supports SRV resource records, or that an organization's existing DNS infrastructure be upgraded to support this. There should be one or more domain controllers to hold the Active Directory database and provide Active Directory directory services. Volume fault tolerance Along with support for simple, spanned and striped volumes, the server family of Windows 2000 also supports fault-tolerant volume types. The types supported are mirrored volumes and RAID-5 volumes: Mirrored volumes: the volume contains several disks, and when data is written to one it is also written to the other disks. This means that if one disk fails, the data can be totally recovered from the other disk. Mirrored volumes are also known as RAID-1. RAID-5 volumes: a RAID-5 volume consists of multiple disks, and it uses blocklevel striping with parity data distributed across all member disks. Should a disk fail in the array, the parity blocks from the surviving disks are combined mathematically with the data blocks from the surviving disks to reconstruct the data on the failed drive "on-the-fly." Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 52 LAB MANUAL OF COMPUTER NETWORK PRACTICAL NO – 10 WRITE A C PROGRAM TO IMPLEMENT HAMMING CODE #include<stdio.h> #include<stdlib.h> char data[5]; int encoded[8],edata[7],syndrome[3]; int hmatrix[3][7] = { 1,0,0,0,1,1,1, 0,1,0,1,0,1,1, 0,0,1,1,1,0,1 }; char gmatrix[4][8]={"0111000","1010100","1100010","1110001"}; int main(){ int i,j; system("clear"); printf("\nHamming code----- Encoding\n"); printf("Enter 4 bit data : "); scanf("%s",data); printf("\nGenerator matrix\n"); for(i=0;i<4;i++) printf("%s\n",gmatrix[i]); printf("\nEncoded data "); for(i=0;i<7;i++) { for(j=0;j<4;j++) encoded[i]+=((data[j]-'0')*(gmatrix[j][i]'0')); encoded[i]=encoded[i]%2; printf("%d ",encoded[i]); } printf("\nHamming code----- Decoding\n"); printf("Enter encoded bits as recieved : "); for(i=0;i<7;i++) scanf("%d",&edata[i]); for(i=0;i<3;i++) { for(j=0;j<7;j++) syndrome[i]+=(edata[j]*hmatrix[i][j]); syndrome[i]=syndrome[i]%2; } for(j=0;j<7;j++) Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 53 LAB MANUAL OF COMPUTER NETWORK if((syndrome[0]==hmatrix[0][j]) (syndrome[1]==hmatrix[1][j])&& (syndrome[2]==hmatrix[2][j])) break; if(j==7) printf("\nError free\n"); else { printf("\nError recieved at bit number data\n",j+1); edata[j]=!edata[j]; printf("\nCorrect data should be : "); for(i=0;i<7;i++) printf("%d",edata[i]); } return 0; } && %d of Makefile a.out:hammingCode.c gcc -ggdb hammingCode.c PHONY:clean clean: rm a.out *~ output Hamming code----- Encoding Enter 4 bit data : 1011 Generator matrix 0111000 1010100 1100010 1110001 Encoded data 0 1 0 1 0 1 1 Hamming code----- Decoding Enter encoded bits as received : 0 1 0 1 1 1 1 Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 54 LAB MANUAL OF COMPUTER NETWORK Error received at bit number 5 of data Correct data should be : 0101011 Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 55 LAB MANUAL OF COMPUTER NETWORK PRACTICAL NO – 11 WRITE A C PROGRAM TO IMPLEMENT CRC CODE #include <stdio.h> #include <stdlib.h> main() { int i, j, n, g, a, ms[20], gen[20], b[20], q[20], s; printf("transmiter side"); printf("enter no of data bits"); scanf("%d", &n); printf("enter data"); for (i = 0; i < n; i++) scanf("%d", &ms[i]); printf("enter size of generator"); scanf("%d", &g); printf("enter generator"); for (j = 0; j < g; j++) scanf("%d", &gen[j]); printf("\n \t the generated matrix"); for (j = 0; j < g; j++) printf("%d", gen[j]); a = n + (g - 1); printf("\t \n the appended matrix is::"); for (i = 0; i < j; i++) ms[n + i] = 0; for (i = 0; i < a; i++) printf("%d", ms[i]); for (i = 0; i < n; i++) q[i] = ms[i]; for (i = 0; i < n; i++) Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 56 LAB MANUAL OF COMPUTER NETWORK { if (ms[i] == 0) { for (j = i; j < g + i; j++) { ms[j] = ms[j] ^ 0; } } else { ms[i] = ms[i] ^ gen[0]; ms[i + 1] = ms[i + 1] ^ gen[1]; ms[i + 2] = ms[i + 2] ^ gen[2]; ms[i + 3] = ms[i + 3] ^ gen[3]; } } printf("\n \t the crc is::"); for (i = n; i < a; i++) printf("%d", ms[i]); s = n + a; for (i = n; i < s; i++) q[i] = ms[i]; printf("\n"); for (i = 0; i < a; i++) printf("%d", q[i]); } Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 57 LAB MANUAL OF COMPUTER NETWORK Subject Coordinator: Hiren V Mer/PIYUSH KASHIYANI Page 58