Networking Essentials
Networking Essentials
http://www.netgear.com
CONTENTS
Introduction to Networking 1
Purpose of Network 5
Types of Network 7
Networking Terminology 10
Topology 14
Architecture 17
OSI 19
Network Cabling 21
MAC Address 29
IP Address 30
DHCP 31
Ethernet Standard 44
CSMA/CA 49
Hub 50
Switch 52
http://www.netgear.com
Router 56
What is NAT 58
Firewall 62
VPN 63
Dynamic DNS 64
Logical Ports 65
DMZ 71
http://www.netgear.com
Introduction to Networking
2010
Introduction to Networking
The idea of networking is like telecommunications, an easy way to copy, move and share data,
resources and information from one computer to another.
These are the basic things that you need to establish a computer network:
Computer - Programmable machine that receives input, stores and manipulates data,
and provides output in a useful format.
Network Interface Card - Acts as the physical interface or connection between the
computer and the network medium/cable
Network Cables - Used to connect and transfer data between computers and a network
A computer network, commonly called as a network, consists of two or more computers that
are interconnected to each other in order to share resources and allow electronic
communications. Computers on a network may be linked through cables, telephone lines, Radio
waves, satellites or infrared light beams
Other devices such as printers, scanners, storages, cameras and IP phones can also be joined in
a computer network using network appliance like hubs, switches and routers.
There are different types of network, common network used nowadays are Local Area Network
and Wide Area Network.
1|Page
http://www.netgear.com
Introduction to Networking
2010
Local Area Network is a computer network covering a small physical area, like a home, office, or
small groups of buildings, such as a school, or small office. While Wide Area Network is a
computer network that covers a broad area.
Internet is a global system of interconnected computer networks that use the standard Internet
Protocol to serve billions of users worldwide. It is a network of networks that consists of
millions of private, public, academic, business, and government networks, of local to global
scope, that are linked by a broad array of electronic and optical networking technologies
Through Networking computers connected to the network can send and receive electronic
messages to each other.
2|Page
http://www.netgear.com
Introduction to Networking
2010
Through Networking computers connected to the network can access, share, edit and modify
data and information that are shared from other computer and/or server.
3|Page
http://www.netgear.com
Introduction to Networking
2010
Through networking, it is also possible to exchange data and information even if the
destination is in a remote locations, this can be done if both networks are connected to the
Internet. Most companies that have different sites usually have this type of setup.
Through Networking, computers connected to the network can access network devices such as
storage, scanner and printer that are shared from the computer and/or server.
4|Page
http://www.netgear.com
Introduction to Networking
2010
Storage devices – a device that is use to store data, hold and process information.
Scanners – device that optically scans images, printed text, object, and converts it to
digital image
5|Page
http://www.netgear.com
Introduction to Networking
2010
Purpose of Networking
Network devices that are commonly shared in the network are printers, storages,
scanners and network drives. Computer connected on a network may access and use the
network devices shared on the network.
People can communicate efficiently and easily via e-mail, video/audio conference,
telephone via VoIP, online banking and video/audio streaming.
Sharing software
Advantages of Networking
Speed
Sharing and transferring files within Networks is faster compared to file transfer without
the use of computer networking. This will save time and will still maintain the integrity
of the data.
Cost
Individually licensed copies of many popular software programs can be costly. Deploying
multiple computers with identical applications can turn into multiple computers that
shares one application. This can be done in a network environment that has an
application server.
6|Page
http://www.netgear.com
Introduction to Networking
2010
Security
Valuable data and applications on a network are password protected. Only authenticated
users are allowed to access valuable data and applications shared in a network
environment. A domain server is needed to implement securities and policies in a
network environment.
Centralize
Software can be loaded on one computer, commonly known as server, to centralize the
updates and easily track files using a computer connected to the server. There are
different servers that can be deployed in a network environment; these servers are file
servers, print servers, proxy servers, domain servers, web servers, ftp servers,
application servers and the like.
Flexibility
Access to resources are not just in the local network but can also be done in a remote
location.
Disadvantages of Networking
Although Networking is known to its flexibility and efficiency, there are disadvantages:
Server failure can cause applications and resources to stop working; this may cause data
and performance loss.
System that lacks security is vulnerable to hackers that allow them to steal valuable data
and information.
Users work dependent on Network that may cause inefficient and poor performance in
case the network goes down
Consistent monitoring
Maintenance and schedule backup
Strong security and redundancy
Up to date software and hardware
Knowledgeable Network Engineers
7|Page
http://www.netgear.com
Introduction to Networking
2010
Types of Network
Also known as LAN, a computer network covering a small physical area, like a
home, office, or small groups of buildings, such as a school, or small office.
8|Page
http://www.netgear.com
Introduction to Networking
2010
9|Page
http://www.netgear.com
Introduction to Networking
2010
A LAN, local area network based on wireless network technology mostly referred
as Wi-Fi. In WLAN no wires are used, but radio signals are the medium for
communication. Wireless network cards are required to be installed in the
systems for accessing any wireless network around. Mostly wireless cards
connect to wireless routers or wireless access points for communication among
computers or accessing WAN, internet.
10 | P a g e
http://www.netgear.com
Introduction to Networking
2010
Also known as SAN, is use for data storage and it has no use for most of the
organization but data oriented organizations.
Also known as PAN, a computer network used for communication among computer
devices, including telephones and personal digital assistants, in proximity to an
individual's body
11 | P a g e
http://www.netgear.com
Introduction to Networking
2010
Networking Terminology
IEEE is the world’s largest professional association, formed in 1963, dedicated to advancing
technological innovation and excellence for the benefit of humanity. IEEE and its members
inspire a global community through IEEE's highly cited publications, conferences, technology
standards, and professional and educational activities.
IEEE 802 is a family of IEEE standards that deals with Local Area Networks (LAN), Metropolitan
Area Networks (MAN). The image below shows different IEEE standards and its description.
12 | P a g e
http://www.netgear.com
Introduction to Networking
2010
Bandwidth - The rated throughput capacity of a given network media or protocol. It is also the
amount of data that can be transmitted in a fixed amount of time.
Bit - A unit of information having just two possible values, as either of the binary digits 0 or 1.
Byte - A series of consecutive binary digits that are operated upon as a unit. There are 8 bits in
a byte.
Category 5 - A type of twisted pair network wiring in which there is a certain number of twists
per foot. It is the most commonly used network cabling.
13 | P a g e
http://www.netgear.com
Introduction to Networking
2010
Coaxial Cable - A type of cable consisting of two insulating layers and two conductors most
commonly used in older networks.
Collision - An attempt by two devices to transmit over the network at the same time usually
resulting in the data being lost.
DNS (Domain Name System) - An internet service that translates domain names into IP
addresses. For example www.google.com translates to 66.102.7.99.
Dynamic DNS - A method of keeping a domain name linked to a changing IP address using a
pool of available IP addresses so you can use applications that require a static IP address.
Domain - A group of computers and devices on a network that are administered as a unit.
DHCP (Dynamic Host Configuration Protocol) - A TCP/IP protocol that dynamically assigns an IP
address to a computer. Dynamic addressing simplifies network administration because the
software keeps track of IP addresses rather than requiring a network administrator to do so.
Ethernet - is the most widely installed local area network technology. It was developed during
the late 1970s through a partnership of DEC, Intel, and Xerox.
Fiber Optic - A cable technology that uses glass (or plastic) threads (fibers) to transmit data; it
is a very fast technology
Gateway - A device on a network that serves as an entrance to another network and routes
traffic
Hardware (MAC) address - A unique address associated with a particular network device
Hub - A common connection point for computers and devices in a network that takes an
incoming signal and repeats it on all other ports
Internet - Term used to refer to the world's largest internetwork, connecting thousands of
networks worldwide. Also known as the World Wide Web (www)
IP address - A 32-bit address assigned to hosts using the TCP/IP protocol. Each
computer/device on the public internet has a unique IP address. An example of an IP address is
192.168.1.
14 | P a g e
http://www.netgear.com
Introduction to Networking
2010
LAN (Local Area Network) - Computer/data network which is confined in a limited geographical
area.
MAC Address (Media Access Control) - A unique identifier attached to most forms of
networking equipment. It is burned into the device and cannot be changed
Megabit - A measure of data transmission speed – 1 million bits per second or approximately
125,000 characters per second
Megabyte - A unit of measure for memory or hard disk storage capacity. 1024 megabytes = 1
gigabyte.
Network - A group of computers and devices that can communicate with each other and share
resources.
Network Interface Card (NIC) - A hardware device inside a computer or other network device
that enables communication with a network.
Packet - The unit of data sent across a network. Data is broken up into packets for sending
over a packet switching network.
PING (Packet Internet Groper) - A command used to test connectivity to a device over a TCP/IP
network.
Protocol - Rules determining the format and transmission of data over a network
Proxy Servers - Proxy servers contain a repository of internet sites recently visited and cached
for quicker access at a future date.
Proxy servers can be configured with firewall software. This helps protect the
network from attack by hackers.
Files can be filtered for computer viruses before being passed on to the network.
Organizations can control access of users to outside sites.
Since there is only one point of communication, there is a large saving on line
costs.
RJ-45 - Standard connectors used for unshielded twisted-pair cable. Most commonly used with
Cat5 network cabling.
15 | P a g e
http://www.netgear.com
Introduction to Networking
2010
Server - A computer that handles requests for data, email, files, and other network services
from other computers (clients)
Subnet - A portion of a network that shares a common address component but is on a different
segment than the rest of the network.
TI Line - A high speed dedicated data line that supports a transmission rate of 1.544 Mbps
TCP/IP - Transmission Control Protocol/Internet Protocol, a suite of protocols used as the basis
of the nation's internetwork (Internet). It can also be used on internal networks.
UNC (Universal Naming Convention) Path - A UNC provides a naming convention for identifying
network resources.UNC names consist of three parts, a server name, a share name, and an
optional file path.
WAN (wide area network) - A network linking together networks located in other geographic
area
16 | P a g e
http://www.netgear.com
Introduction to Networking
2010
17 | P a g e
http://www.netgear.com
Topology
2010
Topology
In computer networking, topology refers to the layout of connected devices. Network topologies
may be physical or logical.
Physical topology means the physical design of a network including the devices, location and
cable installation. Logical topology refers to how data is actually transferred in a network as
opposed to its physical design
Bus Topology
Bus networks use a common backbone to connect all devices. The backbone functions as a
shared communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a broadcast message
onto the wire that all other devices see, but only the intended recipient actually accepts and
processes the message
Ring Topology
In a ring network, every device has exactly two neighbors for communication purposes. All
messages travel through a ring in the same direction (either "clockwise" or "counterclockwise").
A failure in any cable or device breaks the loop and can take down the entire network.
To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring
topologies are found in some office buildings or school campuses
18 | P a g e
http://www.netgear.com
Topology
2010
Star Topology
A star network features a central connection point called a "hub" that may be a hub, switch or
router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Tree topologies integrate multiple star topologies together onto a bus. In its simplest form,
only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree
of devices. This bus/star hybrid approach supports future expandability of the network much
better than a bus (limited in the number of devices due to the broadcast traffic it generates) or
a star (limited by the number of hub connection points) alone.
19 | P a g e
http://www.netgear.com
Topology
2010
Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous topologies,
messages sent on a mesh network can take any of several possible paths from source to
destination A mesh network in which every device connects to every other is called a full mesh.
http://www.netgear.com
Topology
2010
Is a star network that is expanded and an additional networking device is connected to the
central or main networking device.
21 | P a g e
http://www.netgear.com
Peer to peer and Client Server Architecture
2010
Architecture
The term architecture can refer to either hardware or software, or to a combination of hardware
and software. The architecture of a system always defines its broad outlines, and may define
precise mechanisms as well.
Open Architecture
An Open architecture allows the system to be connected easily to devices and programs
made by other manufacturers. Open architectures use off-the-shelf components and
conform to approved standards.
Close Architecture
A system with a closed architecture, on the other hand, is one whose design is
proprietary, making it difficult to connect the system to other systems.
Peer-to-Peer Architecture
It is a method in which the individual computers are linked to share programs/files. Often
referred to as peer-to-peer or P2P, this type of architecture allows you to connect two or more
computers in order to pool their resources. Individual resources such as disk drives, CD-ROM
drives, scanners and even printers are transformed into shared resources that are accessible
from each of the computer.
22 | P a g e
http://www.netgear.com
Peer to peer and Client Server Architecture
2010
Client server architecture is a network setup in which the clients are separate from servers. In a
client-server environment like Windows NT, files are stored on a centralized, high speed file
server computer that is made available to client computers. Network access speeds are usually
faster than those found on peer-to-peer networks, which is reasonable given the vast numbers
of clients that this architecture can support. Nearly all network services like printing and
electronic mail are routed through the file server, which allows networking tasks to be tracked.
Client sends a request message to the server for some work to be done
23 | P a g e
http://www.netgear.com
Peer to peer and Client Server Architecture
2010
Server processes the request and send a reply back to the client
Client server architecture is also known as two-tier architecture.
24 | P a g e
http://www.netgear.com
OSI Model
2010
Open System Interconnection (OSI) reference model released in 1984 was the descriptive
network model that the ISO created. It provided vendors with a set of standards that ensured
greater compatibility and interoperability among various network technologies produced by
companies around the world.
Benefits of OSI
Reduces complexity
Standardizes interfaces
Ensures interoperability between different vendors
Application Layer
Provides network services to application processes
Also known as network process to applications
Presentation Layer
Ensure data is readable by receiving system
Format of data
Data structures
Negotiates data transfer syntax for application layer
Also known as data representation
Session Layer
Establishes, manages, and terminates sessions between applications
Also known as Interhost communication
Transport Layer
Concerned with transportation issues between hosts
25 | P a g e
http://www.netgear.com
OSI Model
2010
Network Layer
Logical addressing
Best effort delivery
Also known as best path determination
Physical Layer
Wires, connectors, voltage, data rates
Also known as Binary Transmission (0’s and 1’s only)
26 | P a g e
http://www.netgear.com
OSI Model
2010
Protocols are needed to make the computers understand one another. TCP/IP is the common
network protocols used in Networking. TCP/IP consists of four layers these are:
Application - Layer in TCP/IP that works the same as Application, Presentation and
Session layer in OSI model when combined
Transport - Layer in TCP/IP that works that same as Transport layer in OSI model
Internet - Layer in TCP/IP that works that same as Network layer in OSI model
Network Access - Layer in TCP/IP that works that same as Data Link and Physical layer
in OSI model when combined
27 | P a g e
http://www.netgear.com
Cables & Connectors
2010
Network Cabling
Cable is the medium through which information usually moves from one network device to
another. Various networks use a variety of cable types.
The type of cable chosen for a network is related to the network's topology, protocol, and size.
Understanding the characteristics of different types of cable and how they relate to other
aspects of a network is necessary for the development of a successful network.
STP cabling includes metal shielding over each individual pair of copper wires. This type
of shielding protects cable from external EMI (electromagnetic interferences)
UTP cable is a medium that is composed of 4 pairs of wires. UTP cable is used in a
variety of networks. Each of the eight individual copper wires in UTP cable is covered by
an insulating material. In addition, the wires in each pair are twisted around each other.
28 | P a g e
http://www.netgear.com
Cables & Connectors
2010
Coaxial Cable
Coaxial cable is a type of cable for high bandwidth data transmission use that typically
consists of a single copper wire that is surrounded by a layer of insulation and then by a
grounded shield of braided wire or an extruded metal tube. The whole thing is usually
wrapped in another layer of insulation and, finally, in an outer protective layer.
29 | P a g e
http://www.netgear.com
Cables & Connectors
2010
30 | P a g e
http://www.netgear.com
Cables & Connectors
2010
Thicknet (10Base5)
Thicknet cabling, also called thick wire Ethernet, is a rigid coaxial cable approximately
1-cm thick used for the original Ethernet networks. Thicknet is also called ―yellow
Ethernet‖ or ―yellow garden hose.‖
Thinnet (10Base2)
Thinnet, also known as thin Ethernet, was the most popular medium for Ethernet LANs
in the 1980s. Thinnet is rarely used on modern networks, although you may encounter
it on networks installed in the 1980s or on newer small office or home office LANs
IEEE has designated Thinnet as 10Base2 Ethernet, with the ―10‖ representing its data
transmission rate of 10 Mbps, the ―Base‖ representing the fact that it uses baseband
transmission, and the ―2‖ representing its maximum segment length of 185 (or roughly
200) m.
31 | P a g e
http://www.netgear.com
Cables & Connectors
2010
Is a technology that uses glass (or plastic) threads (fibers) to transmit Data. They consist
of a bundle of glass threads, each of which is capable of transmitting messages
modulated onto light waves.
A fiber-optic system is similar to the copper wire system that fiber-optics is replacing.
The difference is that fiber-optics use light pulses to transmit information down fiber lines
instead of using electronic pulses to transmit information down copper lines.
32 | P a g e
http://www.netgear.com
Cables & Connectors
2010
Multi-Mode cable
Has a little bit bigger diameter. Multimode fiber gives you high bandwidth at high
speeds over medium distances. Light waves are dispersed into numerous paths, or
modes, as they travel through the cable's core.
Types of Connectors
RJ-45
RJ11
33 | P a g e
http://www.netgear.com
Cables & Connectors
2010
BNC Connector
The basic BNC connector is a male type mounted at each end of a cable. This
connector has a center pin connected to the center cable conductor and a metal tube
connected to the outer cable shield. A rotating ring outside the tube locks the cable
to any female connector.
Ethernet Cabling
With the Ethernet cabling standard, you can have two wiring configurations. First, the
cable can be wired straight across, with pin 1 at one connector directly wired to pin 1 at
the other connector. In this configuration, each of the eight pins is wired directly to each
other. Second, the cable can be wired so that some pins are receivers on one end and
34 | P a g e
http://www.netgear.com
Cables & Connectors
2010
transmitters on the other end of the Ethernet cable For each Ethernet Standard, there
may be a separate category of cable. Ethernet uses these types of UTP cables:
Straight Through
A straight through cable has similar type of wiring on both ends. If the color coding on
both the ends is same, it is a straight through cable. It is usually use to connect different
devices. This is used when connecting 2 different kinds of category device (DTE and
DCE).
35 | P a g e
http://www.netgear.com
Cables & Connectors
2010
In a UTP implementation of a straight-through cable, the wires on both cable ends are in
the same order. You can determine that the wiring is a straight-through cable by
holding both ends of the UTP cable side by side and seeing that the order of the wires
on both ends is identical
Crossover
A crossover cable has similar type of wiring on both ends. If the color coding on
both the ends is different, it is a crossover cable. This is commonly used to connect
same devices, like DTE connected to another DTE or DCE connected to another DCE.
36 | P a g e
http://www.netgear.com
Cables & Connectors
2010
Comparison:
T568A and T568B are the two wiring standards for an 8-position modular connector, permitted
under the TIA/EIA-568-A wiring standards document. The only difference between T568A and
T568B is that the orange and green wire pairs (pairs two and three) are interchanged
37 | P a g e
http://www.netgear.com
Cables & Connectors
2010
38 | P a g e
http://www.netgear.com
MAC Address
2010
MAC Address
The Media Access Control address (MAC) can be equated to the serial number of the NIC. Every
IP packet is sent out of your NIC wrapped inside an Ethernet frame which uses MAC addresses
to direct traffic on your locally attached network.
MAC addresses therefore only have significance on the locally attached network. As the packet
hops across the Internet, its source/destination IP address stays the same, but the MAC
addresses are reassigned by each router on the way using a process called ARP.
MAC addresses are usually written in one of the following two formats:
00:13:21:0F:83:DF 00-13-21-0F-83-DF
MAC address is a 48 bit address
MAC address are 12 digit Hexadecimal {0-9} {A- F} Address
The First Octet of the MAC Address is known as Group Unique 00 : 13 : 21 : 0F : 83 : DF
The Second and Third Octet of the MAC Address is known as Organization Unique
Identifier (OUI)
00 : 13 : 21 : 0F : 83 : DF
39 | P a g e
http://www.netgear.com
IP Address
2010
IP Address
Internet Protocol Address, a unique identifier of a node in a TCP/IP network. This is a layer 3
address which is composed of 32 bits and considered to be a Logical address, which can be
represented by numbers starting from 0 to 255, 8 bits per octet.
Consists of 4 octets separated by periods. These octets are in decimal form converting it
into hexadecimal format will result to bits, each octet consists of 8 bits.
40 | P a g e
http://www.netgear.com
IP Address
2010
41 | P a g e
http://www.netgear.com
DHCP
2010
DHCP
Allows client machines to receive an IP address, DNS information, etc automatically
Before DHCP users had to type in all this information by hand, which is bad:
o Easy to mistype something when entering by hand
o Manually changing network configuration every time you move your laptop is a
pain
o Bootp resolved some of these issues and DHCP still uses the same port as bootp
DHCP stands for Dynamic Host Configuration Protocol
DHCP is a protocol for assigning dynamic IP addresses to devices on a network
With dynamic addressing, a device can have a different IP address every time it
connects to the network. In some systems, the device's IP address can even change
while it is still connected
DHCP also supports static and dynamic IP addresses
DHCP Basics
A client leases an IP address from a DHCP server for a given amount of time
When lease expires, the client must ask DHCP server for a new address (clients attempt
to renew lease after 50% of the lease time has expired)
Typical leases may last for 30 seconds, 24 hours, or longer.
Several messages are sent back and forth between a client and the DHCP server before it
can successfully obtain an IP address
Dynamic addressing simplifies network administration because the software keeps track
of IP addresses rather than requiring an administrator to manage the task. This means
that a new computer can be added to a network without manually assigning it a unique
IP address
DHCP is a Client-Server networking Protocol
DHCP uses the concept of a ―lease‖ or amount of time that a given IP address will be
valid for a computer. The lease time can vary depending upon the network configuration
Four phases of DHCP are IP lease request, IP lease offer, IP lease selection and IP lease
acknowledgement
42 | P a g e
http://www.netgear.com
DHCP
2010
43 | P a g e
http://www.netgear.com
DHCP
2010
1. DHCP Discover
D A client sends out a DHCP DISCOVER packet. This is usually a broadcast packet. It
will contain only the client's hardware address (MAC)
The server receives the DHCP DISCOVER packet and responds by sending a response to
the client
Discover packet contains only MAC Address of the PC
Hardcoding the addresses of DHCP servers kind of defeats the purpose of automatic
configuration
Solution: A client using DHCP will broadcast a DISCOVER message to all computers on
its subnet (addr 255.255.255.255) to figure out the IP address of any DHCP servers
Most routers are configured to pass this request within the campus or enterprise
2. DHCP Offer
O The client receives the DHCP OFFER packet
The client might receive more than one offer if you have more than one DHCP server on
the network. If the client likes the offer, it sends a DHCPREQUEST packet to the server.
This indicates a formal request to lease the IP address offered by the server
(Optionally) sent from server in response to a DISCOVER
Contains an IP address, other configuration information as well (subnet mask, DNS
servers, default gateway, search domains, etc)
Note that all DHCP servers that receive a DISCOVER request may send an OFFER; since a
client typically does not need > 1 IP address, more messages needed
44 | P a g e
http://www.netgear.com
DHCP
2010
45 | P a g e
http://www.netgear.com
DHCP
2010
3. DHCP Request
• R The DHCP server receives the DHCPREQUEST packet and grants the client its
request to lease the IP address. The server sends a DHCPACK to the client. This is the
official notification that the address has been granted
• Sent by client to request a certain IP address
– Usually the one sent by an OFFER, but also used to renew leases. Also can be
sent to try to get same address after a reboot
• This message is broadcast
• Most OSs by default will send a REQUEST for the first OFFER they receive – this means
that if there is a rogue DHCP server on your subnet, most clients will ignore the OFFERs
from the campus DHCP servers (since the OFFER from the rogue server gets to the user’s
PC first)!
46 | P a g e
http://www.netgear.com
DHCP
2010
47 | P a g e
http://www.netgear.com
DHCP
2010
DHCP Release
• Sent by client to end a lease
• Not strictly required, but is the ―polite‖ thing to do if done with the IP (could just let the
lease expire)
• Some clients may not send RELEASEs in an attempt to keep the same IP address for as
long as possible
48 | P a g e
http://www.netgear.com
Domain Name System
2010
1. An application program on a host accesses the domain system through a DNS client,
called the resolver
2. Resolver contacts DNS server, called name server
3. DNS server returns IP address to resolver which passes the IP address to application
• Reverse lookups are also possible, i.e., find the hostname given an IP address
49 | P a g e
http://www.netgear.com
Domain Name System
2010
50 | P a g e
http://www.netgear.com
Domain Name System
2010
51 | P a g e
http://www.netgear.com
Domain Name System
2010
Example:
• Hosts and DNS domains are named based on their position in the domain tree
• Every node in the DNS domain tree can be identified by a unique Fully Qualified Domain
Name (FQDN). The FQDN gives the position in the DNS tree.
http://www.netgear.com
Domain Name System
2010
• The resolution of the hierarchical name space is done by a hierarchy of name servers
53 | P a g e
http://www.netgear.com
Domain Name System
2010
54 | P a g e
http://www.netgear.com
Domain Name System
2010
• Authority for the root domain is with the Internet Corporation for Assigned Numbers
and Names (ICANN)
• ICANN delegates to accredited registrars (for gTLDs) and countries for country code top
level domains (ccTLDs)
• Authority can be delegated further
• Chain of delegation can be obtained by reading domain name from right to left.
• Unit of delegation is a ―zone‖.
• Each zone is anchored at a specific domain node, but zones are not domains.
• A DNS domain is a branch of the namespace
• A zone is a portion of the DNS namespace generally stored in a file (It could consists of
multiple nodes)
• A server can divide part of its zone and delegate it to other servers
• For each zone, there must be a primary name server and a secondary name server
– The primary server (master server) maintains a zone file which has information
about the zone. Updates are made to the primary server
– The secondary server copies data stored at the primary server.
55 | P a g e
http://www.netgear.com
Domain Name System
2010
Adding a host:
• When a new host is added (―gold.cs.virginia.edu‖) to a zone, the administrator adds the
IP information on the host (IP address and name) to a configuration file on the primary
server
• The root name servers know how to find the authoritative name servers for all top-level
zones.
• There are only 13 root name servers
• Root servers are critical for the proper functioning of name resolution
56 | P a g e
http://www.netgear.com
Domain Name System
2010
Root Servers
57 | P a g e
http://www.netgear.com
Domain Name System
2010
b) Otherwise, it will query other name servers, starting at the root tree
4. When the name server has the answer it sends it to the resolver.
58 | P a g e
http://www.netgear.com
Domain Name System
2010
Types of Queries:
Recursive query: When the name server of a host cannot resolve a query, the server
issues a query to resolve the query
Iterative queries: When the name server of a host cannot resolve a query, it sends a
referral to another server to the resolver
Recursive Queries
• In a recursive query, the resolver expects the response from the name server
• If the server cannot supply the answer, it will send the query to the ―closest known‖
authoritative name server (here: In the worst case, the closest known server is the root
server)
59 | P a g e
http://www.netgear.com
Domain Name System
2010
• The root sever sends a referral to the ―edu‖ server. Querying this server yields a referral
to the server of ―virginia.edu‖
• … and so on
Iterative Queries
• In an iterative query, the name server sends a closest known authoritative name server a
referral to the root server.
• This involves more work for the resolver
Caching
• To reduce DNS traffic, name servers caches information on domain name/IP address
mappings
60 | P a g e
http://www.netgear.com
Domain Name System
2010
• When an entry for a query is in the cache, the server does not contact other servers
• Note: If an entry is sent from a cache, the reply from the server is marked as ―un-
authoritative‖
61 | P a g e
http://www.netgear.com
Ethernet
2010
Ethernet Standard
Ethernet is a type of cabling commonly used in high-speed wired computer networks. You'll
find Ethernet cabling in Local Area Networks (LANs). It's also commonly used with broadband
Internet, connecting the cable modem or DSL modem to a wired router or a wireless router. To
use Ethernet with your computer, it will need an Ethernet card, which is an expansion card that
provides an Ethernet jack and the hardware and software needed to transmit over the Ethernet
network.
Ethernet referred to as IEEE 802.3, but that designation refers to the standard by which Ethernet
works. Sometimes, Ethernet is called 10BASE-T, 100BASE-TX, or 1000BASE-T, depending on
the maximum speed of a particular cable.
There are three modes of channel operation between the devices. Each type is suited for a
particular type of application and has its own advantages and disadvantages.
Simplex
Data in simplex channel is always one way. Simplex requires only one channel. Simplex
channels are not often used because it is not possible to send back error or control
signals to the transmit end.
Data sent from Keyboard to CPU - CPU never sends data to keyboard but the
keyboard sends characters to CPU. Only a one way communication is possible.
Print command sent from Computer to Printer – Printer never sends data back to
computer, once a command is been sent from the printer that page will be printed.
Only a one way communication is possible.
62 | P a g e
http://www.netgear.com
Ethernet
2010
63 | P a g e
http://www.netgear.com
Ethernet
2010
Half Duplex
A half-duplex channel can send and receive, but not at the same time. Only one end
transmits at a time, the other end receives. In addition, it is possible to perform error
detection and request the sender to retransmit information that arrived corrupted.
Walkie-Talkie – Communication is possible from both the sides but one person
speaks at one time and once completed the other person speaks
Full Duplex
In full duplex data can travel in both directions simultaneously. Unlike half duplex, there
is no need to switch from transmit to receive mode. However, like half duplex mode it is
possible to perform error detection and request the sender to retransmit information
that arrived corrupted. In this mode chances of collision are more. Example for the Full
Duplex mode of communication:
64 | P a g e
http://www.netgear.com
Ethernet
2010
Simplex allows raw bits that comprises of 0's and 1's to be transmitted in one direction
only for e.g. computer A to computer B only
Half duplex allows the raw bits to be transmitted in both directions but one way at a
time for e.g. from computer A to computer B and then from computer B to computer A
Full duplex allows data to be transmitted in both directions simultaneously for e.g. from
computer A to computer B and from computer B to computer A at the same time
Collision Domain
The domain, where the effect of collision is immediately hit upon, is defined as the
collision domain
It is typically confined to a subnet, i.e., a LAN segment
Collision management is done in the Data Link Layer
Broadcast Domain
The portion of a network that is reachable by a network broadcast, which is a request
for an address resolution or an announcement of availability
Unlike a collision domain, a broadcast can be initiated at various protocol layers
Thus the domain can be within a LAN segment or routed across LAN segments
65 | P a g e
http://www.netgear.com
Ethernet
2010
A Collision is an event that happens on an Ethernet network when two stations simultaneously
"talk" on the wire. Collisions are a normal part of life in an Ethernet network and under most
circumstances should not be considered a problem. Even though a lot of people know that
collisions do happen on a network, what they don't know is that there are two different types of
collisions, Early Collision and Late Collision.
Is the protocol used in Ethernet networks to ensure that only one network node is transmitting
on the network wire at any one time.
Carrier Sense - means that every Ethernet device listens to the Ethernet wire before it
attempts to transmit. If the Ethernet device senses that another device is transmitting, it
will wait to transmit.
Multiple Access - means that more than one Ethernet device can be sensing (listening
and waiting to transmit) at a time.
Collision Detection - means that when multiple Ethernet devices accidentally transmit at
the same time, they are able to detect this error.
66 | P a g e
http://www.netgear.com
Ethernet
2010
1. After listening to the wire to see if other hosts are transmitting, two hosts send data
simultaneously.
2. Their data will collide, and that's where Collision Detection comes in. The collision itself
generates "noise", and the hosts that just sent data will realize that their data was involved in
that collision.
67 | P a g e
http://www.netgear.com
Ethernet
2010
3. The Hosts whose Data was involved in the collision tell the other Hosts not to send data. The
hosts will generate a Jam Signal
That is an effective technique, but the two hosts still have to send their data. What if they send
the data at the exact same time again? To avoid that possibility, both hosts that transmitted
data will invoke a random timer, and when that timer expires, the hosts will begin the entire
CSMA/CD process again - and that process always begins with listening to the segment to see
if another host is currently sending data. In this way, the hosts that were involved in the first
collision have a very slim chance of being involved in another one right away.
68 | P a g e
http://www.netgear.com
Ethernet
2010
Is a method of controlling network access similar to CSMA/CD, in that nodes listen to the
network and transmit only when it is free. However, CSMA/CA prevents the collisions before
they happen.
It is a protocol that is used in wireless Ethernet. One issue with the wireless LAN is that it
cannot sense the link before transmitting; therefore collision detection is not possible.
CSMA/CA Process
69 | P a g e
http://www.netgear.com
Ethernet
2010
70 | P a g e
http://www.netgear.com
Introduction to Hub & Switch
2010
HUB
A Hub is a small, simple, inexpensive network device that joins multiple computers together.
They only regenerate the signal and broadcast it out all of their ports
A Hub is used in a wired network to connect Ethernet cables from a number of devices
together.
Hub allows each device to talk to each other using broadcast
Hubs are very simple devices because they do not require any configuration. It does not
have user interface, it is basically plug and play.
Work on Layer 1 of OSI
Using a Hub, it uses broadcast when sending a message. If computer1 sends a message to
computer2, it is not just computer2 who will receive the message; computers 3, 4 and 5 will
also receive the message.
71 | P a g e
http://www.netgear.com
Introduction to Hub & Switch
2010
How it works
http://www.netgear.com
Introduction to Hub & Switch
2010
SWITCH
It is generally like a hub but contains more intelligence as it is able to inspect packets to
determine the source and destination of the data being sent.
Using a switch, when computer1 sends a message to computer2, only computer 2 will receive
the message, this is called Unicast.
73 | P a g e
http://www.netgear.com
Introduction to Hub & Switch
2010
74 | P a g e
http://www.netgear.com
Introduction to Hub & Switch
2010
For Multicast, computer1 can send a message to computer 2 and 3 only, computer 4 and 5 will
not receive the message sent by computer 1.
Switch can also send using broadcast; this can be happened because a switch has a CAM table.
75 | P a g e
http://www.netgear.com
Introduction to Hub & Switch
2010
How it works
1. On the first time it’s sending to an unknown recipient, it will send a broadcast to all ports
2. It learns the MAC address of the recipient and sends back data only to the designated port
where data came from.
76 | P a g e
http://www.netgear.com
Introduction to Hub & Switch
2010
77 | P a g e
http://www.netgear.com
Introduction to Hub & Switch
2010
Most hub and unmanaged switches are plug and play, meaning there’s no special configuration
to do when a network problem arise caused by it. Below are the troubleshooting steps that can
be done to check if the Hubs and unmanaged switches are still working properly.
Power cycle
Check physical connectivity between the hub/switch and the computers
Check the Ethernet cable used to connect the hub/switch and the computers
Check the LED lights. Blinking port means there is an activity. Solid light means there’s
no activity.
78 | P a g e
http://www.netgear.com
Introduction to Hub & Switch
2010
Do loopback test; connect the ports of the switch to itself. Through this you can identify
which port is working or which one is not, by looking into the ports that are on during
loopback test.
Check the network settings of the computers connected to the switch; make sure it is
configured properly.
79 | P a g e
http://www.netgear.com
Introduction and Features of a Router
2010
What is a router?
A router is a device that joins multiple networks together, and determines the path of a
packet from source to destination. It relies on its routing table to know what best path to take,
works under Layer 3 of OSI.
The above setup shows that SITE A network sent a message to SITE B, green lines are the
best path determined by routers to effectively deliver the message sent by SITE A to SITE B.
Router uses its routing table to identify the best path from its source to destination. In the OSI
Layer, router works under Layer 3 which is Network Layer. The job or responsibility of Network
layer is Logical addressing and Best effort delivery.
For most home users, they may want to set-up a LAN or WLAN and connect all
computers to the Internet without having to pay a full broadband subscription service to their
ISP for each computer on the network. In many instances, an ISP will allow you to use a router
and connect multiple computers to a single Internet connection and pay a nominal fee for each
additional computer sharing the connection. This is when home users will want to look at
smaller routers, often called broadband routers that enable two or more computers to share an
Internet connection. Within a business or organization, you may need to connect multiple
80 | P a g e
http://www.netgear.com
Introduction and Features of a Router
2010
computers to the Internet, but also want to connect multiple private networks — and these are
the types of functions a router is designed for.
81 | P a g e
http://www.netgear.com
Introduction and Features of a Router
2010
82 | P a g e
http://www.netgear.com
Network Address Translation
2010
What is NAT?
The image above illustrates a network with two computers using NAT.
NAT
Network Address Translation (NAT) translates multiple IP addresses on the private LAN
to one public address that is sent out to the Internet
Network Address Translation is used by a device (firewall, router or computer) that sits
between an internal network and the rest of the world.
NAT works in Network Layer
Types of NAT:
1. Static NAT
2. Dynamic NAT
3. NAT Overloading or PAT
83 | P a g e
http://www.netgear.com
Network Address Translation
2010
Static NAT
Static NAT is mapping an unregistered IP address to a registered IP address on a one-
to-one basis.
It is particularly useful when a device needs to be accessible from outside the network.
Eg: Web hosting
Here, the computer with the IP address of 192.168.0.1 will always translate to 203.31.218.208
Dynamic NAT
Dynamic NAT also establishes a one-to-one mapping between unregistered and
registered IP address, but the mapping could vary depending on the registered address
available in the pool.
84 | P a g e
http://www.netgear.com
Network Address Translation
2010
85 | P a g e
http://www.netgear.com
Network Address Translation
2010
Here, the computer with the IP address of 192.168.0.1 will translate to the first available
address in the range from 203.31.218.210 to 203.31.218.213
86 | P a g e
http://www.netgear.com
Network Address Translation
2010
PAT
Also called NAT Over loading, it maps multiple unregistered IP addresses to a single
registered IP address by using different ports.
The other names for PAT are single address NAT, port-level multiplexed NAT,NAPT
(Network Address Port Translation), IP Masquerading.
It is used in SOHO routers.
The NAT always re-assigns the source port number. It attempts to assign the same port
value of the original request. However, if the original source port has already been used,
it starts to scan from the start of the particular range to find the first available port and
assigns it to the translation
87 | P a g e
http://www.netgear.com
Firewall
2010
Firewall
Firewall is used to prevent unauthorized access to or from a private network. Firewalls
can be implemented in both hardware and software
Firewalls are frequently used to prevent unauthorized Internet users from accessing
private networks connected to the Internet
All messages entering or leaving the LAN pass through the firewall, which examines
each message and blocks those that do not meet the specified security criteria
88 | P a g e
http://www.netgear.com
VPN
2010
VPN
Virtual private networks (VPNs) are wide area networks logically defined over public
transmission systems that serve an organization’s users, but isolate that organization’s
traffic from other users of the same public lines
They provide a way of constructing a WAN from existing public transmission systems
For example, an organization can carve out a private WAN on the Internet to serve only
its offices across the country, while keeping the data secure and isolated from other
(public) traffic
89 | P a g e
http://www.netgear.com
Dynamic DNS
2010
Dynamic DNS
Dynamic DNS is a system which allows the domain name data held in a name server to
be updated in real time
The most common use for this is in allowing an Internet domain name to be assigned to
a computer with a varying (dynamic) IP address
This makes it possible for other sites on the Internet to establish connections to the
machine without needing to track the IP address themselves
A common use is for running server software on a computer that has a dynamic IP
address, as is the case with many consumer Internet service providers.
Proxy Server
When a high level of security is required, a proxy Server may be used to provide a
gateway between a local area network and the Internet
The local network is protected by firewall software installed on the proxy server. This
software enables the proxy server to keep the two worlds separate
All outward HTTP requests from the local network pass through the proxy server and
similarly all information retrieved comes back in via the proxy server and is then passed
back to the client
90 | P a g e
http://www.netgear.com
Logical Ports
2010
Logical Ports
Logical Ports allow different applications on the same computer to utilize network
resources without interfering with each other
There are 65536 Logical Ports ranging from 0 to 65535
Well known ports, Registered ports and Dynamic / Private ports are the three category
of logical ports
Port Classifications:
Example: FTP 20 & 21, DNS : 53, TFTP : 69, NTP : 123
NETSTAT
91 | P a g e
http://www.netgear.com
Logical Ports
2010
Netstat command displays active TCP connections, TCP/IP statistics, ports on which the
computer is listening, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols) other
parameters of netstat commands are ―netstat –a‖, netstat –n‖, netstat –s‖ and netstat –p.
92 | P a g e
http://www.netgear.com
Logical Ports
2010
93 | P a g e
http://www.netgear.com
Logical Ports
2010
TCP vs UDP
94 | P a g e
http://www.netgear.com
Logical Ports
2010
95 | P a g e
http://www.netgear.com
Logical Ports
2010
Port Forwarding
Port Forwarding lets a network host create a tunnel through the firewall over the
Internet.
It allows a user from the internet access a private computer (Web Server, FTP Server,
Game Server Etc.,) residing inside a network that is protected by a firewall. The private
computer will need to declare the port number it uses for the service on the firewall.
No Port Forwarding:
96 | P a g e
http://www.netgear.com
Logical Ports
2010
Port Triggering
Port Triggering allows computers behind a NAT-enabled router access a special server
or use a special application on the Internet using a specified port number
In Port Triggering, the port used by the computer from the LAN to send traffic to the
internet is monitored by the router since the reply from that sent traffic may be sent
back on a different port number; thus the router will open it automatically for the
sender. In theory it is basically port forwarding in dynamic mode where the return port
number may be different but will still be allowed to go through the firewall.
How it works
Stage 1: For example the private computer sends traffic for authentication to a web server in
the internet using a random registered port 6667 (depends on the application).
The firewall will let the traffic to pass through normally and the web server will receive the
traffic for authentication from the private computer.
97 | P a g e
http://www.netgear.com
Logical Ports
2010
Stage 2: Firewall receives reply from web server in the internet but web server uses known port
113 for Ident Protocol (specified in RFC 1413, is an Internet protocol that helps identify the user
of a particular TCP connection).
If NO Port Triggering was declared, the firewall drops the traffic because it does not know what
computer from the LAN was receiving it since traffic was being sent on a different port number.
If Port Triggering was declared on the firewall, the firewall will let the traffic go through and be
received by the private computer behind the firewall regardless of what port number was used
by the web server.
98 | P a g e
http://www.netgear.com
Logical Ports
2010
DMZ
The point of a DMZ is that connections from the internal and the external network to the
DMZ are permitted, whereas connections from the DMZ are only permitted to the
external network — hosts in the DMZ may not connect to the internal network
This allows the DMZ's hosts to provide services to the external network while protecting
the internal network in case intruders compromise a host in the DMZ
For someone on the external network who wants to illegally connect to the internal
network, the DMZ is a dead end
99 | P a g e
http://www.netgear.com
Self Assessment Questions
2010
Questions:
100 | P a g e
http://www.netgear.com
Answer to Self Assessment Questions
2010
Answers:
http://www.netgear.com
Answer to Self Assessment Questions
2010
25. The point of a DMZ is that connections from the internal and the external network to the
DMZ are permitted, whereas connections from the DMZ are only permitted to the external
network — hosts in the DMZ may not connect to the internal network
102 | P a g e
http://www.netgear.com
NETGEAR Inc.
350 East Plumeria Drive
San Jose, California http://www.netgear.com