0% found this document useful (0 votes)
684 views

Networking and Servers

This book contains the basic terms used in computer netwroking ,how the communication takes place on the internet .What is the role of servers , at which level they are responsible for network security .What are the different devices which are used in networking and what are their role.

Uploaded by

S KUMAR
Copyright
© Public Domain
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF or read online on Scribd
0% found this document useful (0 votes)
684 views

Networking and Servers

This book contains the basic terms used in computer netwroking ,how the communication takes place on the internet .What is the role of servers , at which level they are responsible for network security .What are the different devices which are used in networking and what are their role.

Uploaded by

S KUMAR
Copyright
© Public Domain
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF or read online on Scribd
You are on page 1/ 119

UNIT 1

Myicon.ico
1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.1. Definition of Computer Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2


1.2. Components of Data communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3. Types of computer networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.1. Local Area Networks (LANs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.2. Metropolitan Area Network (MAN) . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.3. Wide Area Network (WAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.4. Virtual Private Network (VPN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.4.1. Protocols used in VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3.4.2. Internet-based VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3.4.3. Intranet-based VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3.5. Personal Area Network (PAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

2. NETWORKING DEVICES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2.1. Repeater . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2. Hub . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.1. Passive Hubs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.2. Active Hubs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 9
1http://san24mca.blogspot.com/

2.1.3. Intelligent Hubs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9


2.3. Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.4. Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.5. Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.6. Network Interface Card (Ethernet) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 12
2.7. Modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.8. VoIP (Voice over Internet Protocol) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.8.1. Types of VoIP Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.9. Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 14
2.10. Connectors RJ 45 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 15
2.11. Direction of transmission or Data Flow . . . . . . . . . . . . . . . . . . . . . . . . .. 16
2.11.1. Simplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.11.2. Half-Duplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
SANDEEP, MITHILESH , SYEDUL , RABI KANT

2.11.3. Full-Duplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

3. TRANSMISSION MEDIUM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

3.1. Unguided Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18


3.2. Guided Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.3. Twisted-Pair Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.3.1. UTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.3.2. STP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.4. Coaxial cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.5. Optical Fiber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.6. Comparison of Different mode of Optical Fibers . . . . . . . . . . . . . . . . . . . 21
4. TRANSMISSION IMPAIRMENT………………………………………..…… 22

4.1. Attenuation……………………………………………….…….. 22
4.2. Distortion……………………………………………………….. 22
4.3. Noise………………………………………………………......... 23
4.3.1. Signal-to-Noise Ratio (SNR)………………..…….…. 23
4.3.2. Throughput………………………………..………….. 23

5. ACCESS POINT…......………………………………...………….................... 24

5.1 What is Wi-Fi?...............................................................................24


5.2 Types of Access Points………………………………………..…25
5.2.1 Motorola AP-5131………………….…………….……26
5.3 AP-5131 Configuration……………………………………..……28
6. SWITCH………………………………………………………………………..…35

6.1 TYPE OF SWITCHES …………………………………….….…35


6.1.1 Two-Layer Switches………………………………....…35
6.1.2 Three-Layer Switches………………………….……….36
6.2 LAN Switch Mechanism and Its Advantages……………………37
6.3 VLAN……………………………………………………...……..37
2http://san24mca.blogspot.com/

6.3.1 Advantages of VLANs…………………………..…….38


6.3.2 Types of VLANs………………………………….……38

7. NETWORK TOPOLOGY…………………………………………………..……39

7.1 Star Topology ……………………………………………………39


7.2 Ring Topology ……………………………………………..…….40
7.3 Bus Topology ……………………………………………………41
7.4 Mesh Topology …………………………………….………….…
41
7.5 Tree Topology ……………………………………………..….…42
7.6 Hybrid Topology ………………………………………...………43
SANDEEP, MITHILESH , SYEDUL , RABI KANT

8. OSI REFERENCE MODEL………………………………………………………44

8.1 Physical Layer ………………………………………...…………45


8.2 Data Link Layer …………………………………………………46
8.3 Network Layer ……………………………………………..……47
8.4 Transport Layer …………………………………………….……47
8.5 Session Layer ……………………………………………………48
8.6 Presentation Layer ………………………………………………48
8.7 Application layer …………………………………………...……49

9. FIREWALL……………………………………………………………….………50
9.1 How Does Firewall Management Work?.......................................50
9.2 Firewall techniques………………………………………………50
9.2.1 Packet filtering firewall………………..………………50
9.2.2 Stateful firewall………………………..………………51
9.2.3 Deep packet inspection firewall………………..………51
9.2.4 Application-aware firewall………………………..……51
9.2.5 Application proxy firewall……………….…….………51
9.3 Firewall Rules……………………………………………….……52
9.4 Types of Firewall…………………………………………………52
9.4.1 Software firewall………………………………….……52
9.4.2 Hardware firewall………………………………………..53
9.5 The Advantages and Disadvantages of Firewall ……………..…53
9.5.1 Advantages ………………………………………….…53
9.5.2 Disadvantages ……………………………….…………54

10. UTM…………………………………………………………………………..…55

10.1 How UTM secures the network…………………………………55


10.2 Advantages …………………………………………………..…56
10.3 Features…………………………………………………………56
10.4UTM Appliance Benefits..............................................................56

11. PROTOCOL………………………………………………………………..…….57

11.1 FTP [File Transfer Protocol]……………………………………57


11.1.1 Anonymous FTP………………………………………
3http://san24mca.blogspot.com/

58
11.1.2 How FTP Works?..........................................................58
11.2 TELNET [TErminaL NETwork]…………………….…….……
58
11.3 Simple Mail Transfer Protocol (SMTP)......................... .............59
11.4 POP3……………………………………………………….……61
SANDEEP, MITHILESH , SYEDUL , RABI KANT
UNIT -2

1.WEB SERVER……………………………………………………………… ….…65

1.1 IIS……………………………………………………….………..65
1.1.1 Installation……………………………………….……..66
1.1.2 Security Features…………………………………….…70
1.2 Apache Web Server…………… ………………………..………70
1.2.1 Features ……………………………………..…………71
1.2.2 Use………………………………….…………………..71

2. TEMINAL SERVER………………………………………………………………72

2.1Terminal Services Architecture ……………………………….…………72


2.1.1 Multi-user kernel ……………………………...……………72
2.1.2 Remote Desktop client………………………………………
72
2.1.3 Terminal Services licensing service…………...……………72
4http://san24mca.blogspot.com/

2.1.4 Session Directory Services…………………….……………72


2.2 Components………………………………………………………………73
2.3 Installation & Configuration Terminal Services…………………………75
2.4 How to connect client with Terminal server………………….…………82
2.5 Advantages…………………………………………………….…………83

3. WINDOWS SERVER UPDATE SERVICES (WSUS)…………………..………84

3.1 Installation ………………………………………………………….……84


3.1.1 Software Requirements ………………………………..……
84
3.1.2 Minimum Hardware Requirements ……………...…………84
3.1.3 Installation Steps……………………………………………85
SANDEEP, MITHILESH , SYEDUL , RABI KANT

3.2 Configuring the network…………………………………………………87


3.3 To specify the way this server will obtain updates………………………87
3.4 Start WSUS………………………………………………………………87
3.4.1 Configure updates and synchronization………………….…87
3.4.2 Configure client updates…………………………………….88

4.BLADE SERVER……………………………………………………………….…89

4.1 Need Of Blade Server…………………………………………………….89


4.2 Features ………………………………………………………………….89
4.2.1 Virtualization…………………………………………….…89
4.2.2 Hot Swapping…………………………………………….…90
4.2.3 Power……………………………………………………..…90
4.2.4 Cooling …………………………………………………..…90
4.2.5 Storage………………………………………………………90
4.2.6 LED Indicators………………………………………..…….90
4.3 Specification…………………………………………………….….…….91
4.4 Components Of Blade Server…………………………………………….91
4.4.1.Chassis………………………………………………………92
4.4.2 Management server …………………………………………
92
4.4.3 SAN & KVM………………………………………………. 92
4.5 RAID…………………………………………………………..…………93
4.5.1. Advantages And Disadvantages Of Raid…………….……94

4.6 Configuration……………………………………………………….……
954.6.1. Using the Configuration /Setup Utility program……....……95
4.6.2. Using the PXE boot agent utility program ….………...……97

4.7 Configuring The Gigabit Ethernet Controllers …………………….……97


4.8. Blade Server Advantages And Disadvantages……………..….......……98
4.8.1. Advantages……………….......……………………….……98
4.8.2. Disadvantages……….....……………………………...……99
5. DHCP Server………………………………………………………………...…100
5http://san24mca.blogspot.com/

5.1 Installing DHCP Server is very easy in win server 2003………….……101


5.2 Configuring DHCP………………………………………………...……110
5.3 Advantages and Disadvantages ……………………………………...…112
SANDEEP, MITHILESH , SYEDUL , RABI KANT
SANDEEP, MITHILESH , SYEDUL , RABI KANT 6http://san24mca.blogspot.com/
UNIT – 1

NETWORKING
1. INTRODUCTION
A network is a set of machines/devices (often referred to as nodes) connected by
communication links to communicate with each other. A node can be a computer,
printer, or any other device capable of sending and/or receiving data generated by
other nodes on the network.

 Two machines may be directly connected, or can communicate through other


machines
 Some machines are sources and destinations of data.
 Some devices do not generate data, but facilitate in the transfer (ex. a router)
 Networks are an interconnection of two or more computers such that they can
share resources and information.
 These computers can be linked together using a wide variety of Cables, or
telephone, or through satellites.

1.1 Definition of Computer Network


A computer network is an interconnected collection of autonomous computers.
7http://san24mca.blogspot.com/

 Two computer are interconnected if they are able to exchange information


 Two computers are autonomous if they are capable of operating
independently, that is, neither is capable of forcibly starting, stopping, or
controlling the other.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

1.2 Components of Data communication


A data communications system has five components.

1. Message : The message is the information (data) to be communicated. Popular


form of information includes text, numbers, pictures, audio, and video.
2. Sender : The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on….
3. Receiver : The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, video camera, and so on….
4. Transmission medium : The transmission medium is the physical path by
which a message travels from sender to receiver. Example of Transmission
media include twisted –pair wire, coaxial cable, fiber-optic cable, and radio
waves.
5. Protocol : A protocol is a set of rules
that govern data communications. It
represents an agreement between the
communicating devices. Without a
protocol, two devices may be
connected but not communicating, just
as a person speaking French cannot be
understood by a person who speaks
only Japanese.

1.3 Types of computer networks

1.3.1 Local Area Networks (LANs) : The computers are geographically close
together (that is, in the same building). It
confined to a single building or group of
8http://san24mca.blogspot.com/

building, Home, Office Building Or School


or University (KIIT). It is Either Wired or
wireless media. Wireless LANs are the
newest evolution in LAN technology.LAN
size is limited to a few kilometers.

1.3.2 Metropolitan Area Network (MAN) :

A metropolitan area network (MAN) is a network with a size between a LAN


and a WAN. It covers the area inside a town
or city. It consists of multiple LANs. It is
larger than local-area networks (LANs) but
SANDEEP, MITHILESH , SYEDUL , RABI KANT

smaller than wide-area networks (WANs). It is


characterized by very high-speed connections
using fiber optical cable or other digital
media.

Example- Telephone company network and cable TV network

1.3.3 Wide Area Network (WAN) : A wide area network (WAN) provides long-
distance transmission of data, image, audio, and video information over large
geographic areas that’s may comprise a country, a continent, or even the whole world.
It covers a large Geographical area (Kilometers).It consists of two or more LANs.
1.3.4 Virtual Private Network (VPN) : A Virtual Private Network (VPN) is a
network technology that creates a secure network connection over a public network
such as the Internet or a private network owned by a service provider. Large
corporations, educational institutions, and government agencies use VPN technology
to enable remote users to securely connect to a private network.

A VPN can connect multiple sites over a large distance just like a Wide Area
Network (WAN). VPNs are often used to extend intranets worldwide to disseminate
information and news to a wide user base. Educational institutions use VPNs to
connect campuses that can be distributed across the country or around the world.

In order to gain access to the private network, a user must be authenticated


using a unique identification and a password. An authentication token is often used to
gain access to a private network through a personal identification number (PIN) that a
user must enter. The PIN is a unique authentication code that changes according to a
specific frequency, usually every 30 seconds or so.

1.3.4.1 Protocols used in VPN :

There are a number of VPN protocols in use that secure the transport of data
traffic over a public network infrastructure. Each protocol varies slightly in the way
that data is kept secure.
9http://san24mca.blogspot.com/

IP security (IPSec) is used to secure communications over the Internet. IPSec


traffic can use either transport mode or tunneling to encrypt data traffic in a VPN. The
difference between the two modes is that transport mode encrypts only the message
within the data packet (also known as the payload) while tunneling encrypts the entire
data packet. IPSec is often referred to as a "security overlay" because of its use as a
security layer for other protocols.

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use
cryptography to secure communications over the Internet. Both protocols use a
"handshake" method of authentication that involves a negotiation of network
parameters between the client and server machines. To successfully initiate a
connection, an authentication process involving certificates is used. Certificates are
cryptographic keys that are stored on both the server and client.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Point-To-Point Tunneling Protocol (PPTP) is another tunneling protocol used


to connect a remote client to a private server over the Internet. PPTP is one of the
most widely used VPN protocols because of it's straightforward configuration and
maintenance and also because it is included with the Windows operating system.

Layer 2 Tunneling Protocol (L2TP) is a protocol used to tunnel data


communications traffic between two sites over the Internet. L2TP is often used in
tandem with IPSec (which acts as a security layer) to secure the transfer of L2TP data
packets over the Internet. Unlike PPTP, a VPN implementation using L2TP/IPSec
requires a shared key or the use of certificates.

Typical VPN connections are either Internet-based or intranet-based.


1.3.4.2 Internet-based VPNs :

By using an Internet-based VPN connection, you can avoid long-distance and


1-800 telephone charges while taking advantage of the global availability of the
Internet.

1.3.4.3 Intranet-based VPNs :


10http://san24mca.blogspot.com/

The intranet-based VPN connection takes advantage of IP connectivity on an


organization intranet.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Advantage:-

1. Cost Saving
2. Improved Scalability
3. Improved Security
4. Better Performance
5. Flexibility and Reliability
6. Greater Access to mobile user

Disadvantage:-

1. Less Bandwidth than Dedicated Line


2. Lack of Security

1.3.5 Personal Area Network (PAN) :

 Personal devices of one individual: His/her PC, laptop, cell phone, PDA
 To allow devices to communicate and work together.
 To permit devices to become smarter: spontaneously, network and work
together.
 PANs feasibility is growing with improvement of wireless technology:

 Bluetooth enabling devices to communicate automatically and wirelessly


when they are in range.
 PANs can keep portable devices synchronized with a desktop PC.
 E-clothing products (Jacket) equipped with a battery pack and devices.
11http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT
2. NETWORKING DEVICES
Computer network devices also known as communication devices and they
constitute a data communication network.  Network components and devices are the
physical entities connected to a network. There are many types of network devices
and increasing daily. The basic network devices are: Computers either a PC or a
Server, Hubs, Switches, Bridges, Routers, Gateways, Network interface cards (NICs),
Wireless access points (WAPs), Printers and Modems. In an Ethernet or WAN
network, the data communication cannot be performed without these devices.
Network devices are components used to connect computers or other electronic
devices together so that they can share files or resources like printers or fax machines.
A full list of Computer networking
devices is units that mediate data in
a computer network. Computer
12http://san24mca.blogspot.com/

networking devices are also called


network equipment, Intermediate
Systems (IS) or Interworking Unit
(IWU). Units which are the last
receiver or generate data are called
hosts or data terminal equipment.
These devices are broken into two
classifications.

 End User Devices : Include computers, printers, scanners, and other


devices that provide services directly to the user.
 Network devices : Include all devices that connect the end-user devices to
SANDEEP, MITHILESH , SYEDUL , RABI KANT

allow them to communicate.

End user devices that provide users with a connection to the network are also
called hosts.

These devices allow users to share, create, and obtain information. Host
devices can exist without a network, but without a network, host capabilities are
greatly reduced. Host devices are physically connected to the network media using a
network interface card (NIC). They use this connection to perform the tasks of
sending e-mails, printing reports, scanning pictures, or accessing databases.

2.1 Repeater
Repeaters are networking devices that exist at Layer 1, the Physical layer, of
the OSI reference model. To understand how a repeater works, it is important to
understand that as data leaves a source and goes out over the network, it is
transformed into either electrical or light pulses that pass along the networking
medium. These pulses are called signals. When signals leave a transmitting station,
they are clean and easily recognizable. A network repeater is a device used to expand
the boundaries of a wired or wireless (WiFi) local area network (LAN).

13http://san24mca.blogspot.com/

Repeaters are relatively simple pieces of equipment consisting of an antenna,


duplexer, receiver and transmitter. The reason that repeaters are needed is because a
SANDEEP, MITHILESH , SYEDUL , RABI KANT

radio's power is limited by its antenna size. The purpose of a repeater is to regenerate
incoming electrical, wireless or optical signals that are weaker signals and then
broadcast it. With physical media like Ethernet or Wi-Fi, data transmissions can only
span a limited distance before the quality of the signal degrades. Repeaters attempt to
preserve signal integrity and extend the distance over which data can safely travel.
Repeater is to retime network signals at bit level, allowing them to travel a longer
distance on the medium. The term repeater originally meant a single port “in” device
and a single port “out” device. Today multiple-port repeaters also exist. Repeaters are
classified as layer 1 devices in the OSI model because they act only on the bit level
and look at no other information.
2.2 Hub
The central connecting device in a computer network is known as a hub. A
USB hub is a device that expands a single USB port into several so that there are
more ports available to connect devices to a host system. Every computer is directly
connected with the hub. When data packets arrives at hub, it broadcast them to all the
LAN cards in a network and the destined recipient picks them and all other computers
discard the data packets. Hub has five, eight, sixteen and more ports and one port is
known as uplink port. Here are three types of network hubs: Passive Hubs, Active
Hubs and Intelligent Hubs.

2.2.1 Passive Hubs : One of the types of a network hub is the so-called passive hub.
It's a pass-through that does not do anything more than just broadcast signals it
receives through its input port, then sends it out through the output port. It does not do
anything to regenerate or process the signals because it only functions as a connector
of different wires in a topology.

2.2.2 Active Hubs : An active hub works more than just a connector but also
regenerates the data bits to ensure the signals are strong. Another name for an active
hub is a multiport repeater. It provides an active participation in the network aside
from acting as an interface. It participates in the data communication, such as storing
14http://san24mca.blogspot.com/

signals received through the input ports, before forwarding them. It can monitor the
data it is forwarding and sometimes help improve signals before forwarding them to
other connections. Such a feature makes troubleshooting of network problems easier.

2.2.3 Intelligent Hubs : An intelligent hub can perform everything that the passive
hub and active hub do, and help manage the network resources effectively to ensure
that the performance of the network is highly efficient. An intelligent hub can help in
troubleshooting by pinpointing the actual location of the problem and help identify the
root cause and resolution. It is very adaptable to different technologies without any
need to change its configuration. The intelligent hub performs different functions such
as bridging, routing, and switching and network management.

Hubs are considered Layer 1 devices because they only regenerate the signal
and repeat it out all their ports (network connections). Hubs amplify signals and
SANDEEP, MITHILESH , SYEDUL , RABI KANT

propagate signals through the network.


Hubs do not require filtering and path
determination or switching.

2.3Bridge

The bridges used in computer


networking are not like your typical
bridge. A bridge device filters data
traffic at a network boundary. Bridges
serve a similar function as switches.
Bridges reduce the amount of traffic on
a LAN by dividing it into two
segments. A bridge works on the principle that each network node has its own
address. A bridge forwards the packets based on the address of the particular
destination node. Bridges operate at the data link layer (Layer 2) of the OSI model,
which means the bridge cannot read IP addresses, but only the outermost hardware
address of the packet. In our case the bridge can read the Ethernet data which gives
the hardware address of the destination address, not the IP address. The hardware
address is also called the MAC (media access control) address. Bridges inspect
incoming traffic and decide whether to forward or discard it. To determine the
network segment a MAC address belongs to, bridges use one of:

 Transparent Bridging - They build a table of addresses (bridging table) as they


receive packets. If the address is not in the bridging table, the packet is
forwarded to all segments other than the one it came from. This type of bridge
is used on Ethernet networks.
 Source route bridging - The source computer provides path information inside
the packet. This is used on Token Ring networks.
15http://san24mca.blogspot.com/

Bridges can be used to:

 Expand the distance of a segment.


SANDEEP, MITHILESH , SYEDUL , RABI KANT

 Provide for an increased number of computers on the network.


 Reduce traffic bottlenecks resulting from an excessive number of attached
computers.

2.4 Switch

A network switch or switching hub is a


computer networking device that connects
network segments. Switch is multi-port device.
A networking switch runs in full-duplex mode,
meaning a machine on the LAN can receive and
transmit data simultaneously. This is much
faster than a networking hub. In the Open Systems Interconnection (OSI)
communications model, a switch performs the layer2 or Data-Link-Link function.
Some newer switches also perform routing functions (layer3 or the Network layer
functions in OSI) and are sometimes called IP switches. A network switch is a small
hardware device that joins multiple computers together within one local area network
(LAN).

Switch provides similar functions as a hub or a bridge but has more advanced
features that can temporarily connect any two ports together. It contains a switch
matrix or switch fabric that can rapidly connect and disconnect ports. Unlike Hub, a
switch only forward frame from one port to the other port where the destination node
is connected without broadcast to all other ports.

2.5 Router

In an environment consisting of
several network segments with different
protocols and architecture, a bridge may
not be adequate for ensuring fast
communication among all of the
segments. A complex network needs a
device, which not only knows the address
16http://san24mca.blogspot.com/

of each segment, but also can determine


the best path for sending data and
filtering broadcast traffic to the local
segment. Such device is called a Router.
A router is a device in computer
networking that forwards data packets to
their destinations, based on their
addresses. The work a router does it called routing, which is somewhat like switching,
but a router is different from a switch.

          Routers work at the Network layer of the OSI model meaning that the Routers
can switch and route packets across multiple networks. They do this by exchanging
protocol-specific information between separate networks. Routers have access to
SANDEEP, MITHILESH , SYEDUL , RABI KANT

more information in packets than bridges, and use this information to improve packet
deliveries. Routers are usually used in a complex network situation because they
provide better traffic management than bridges and do not pass broadcast traffic.
Routers can share status and routing information with one another and use this
information to bypass slow or malfunctioning connections. When data packets are
transmitted over a network (say the Internet), they move through many routers
(because they pass through many networks) in their journey from the source machine
to the destination machine. Routers work with IP packets, meaning that it works at the
level of the IP protocol.

Each router keeps information about its neighbors (other routers in the same or
other networks). This information includes the IP address and the cost, which is in
terms of time, delay and other network considerations. This information is kept in a
routing table, found in all routers.

Routers do not look at the destination node address; they only look at the
network address. Routers will only pass the information if the network address is
known. This ability to control the data passing through the router reduces the amount
of traffic between networks and allows routers to use these links more efficiently than
bridges . Unlike bridges and switches, which use the hardware-configured MAC
address to determine the destination of the data, routers use the logic network address
such as IP address to make decisions.        

2.6 Network Interface


Card (Ethernet)

Network interface cards


(NICs) are installed in a
computer to allow it to
17http://san24mca.blogspot.com/

communicate with a network.


They provide a transparent interface between the network and the computer.

An Ethernet network interface card is installed in an available slot inside the


computer. The NIC assigns a unique address called a MAC (media access control) to
the machine. The MACs on the network are used to direct traffic between the
computers. The back plate of the network interface card features a port that looks
similar to a phone jack, but is slightly larger. This port accommodates an Ethernet
cable, which resembles a thicker version of a standard telephone line. Ethernet cable
must run from each network interface card to a central hub or switch. The hub or
switch acts like a relay, passing information between computers using the MAC
addresses and allowing resources like printers and scanners to be shared along with
data.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

NICs come in many shapes and sizes. They can be installed internally or
externally, although an internal installation is more likely. The picture illustrates an
internally installed combo (more than one type of connection) card. This card is
somewhat unusual in that it supports three connections:

 The upper connection is an RJ45 female for UTP media.

 The middle connection is a BNC connector for thin coaxial media.

 The lower connection is a DB-15 connector for a thick Ethernet viper tap.
In order for a NIC to operate effectively, it must be able to carry out its interface
tasks with minimum disruption to the CPU of the computer in which it is installed.
Four methods of NIC to computer data transfer are used:

 Bus mastering DMA (direct memory access):


o Data enters the NIC from the network.
o The NIC's own CPU stores data in the NIC's RAM.
o NIC's CPU sends data to computer's motherboard when the network
transmission is complete.
o The computer's CPU is not interrupted - the NIC's CPU has ultimate
responsibility for data transfer.

 DMA:
o Data enters the NIC from the network.
o The NIC's CPU interrupts the computer's CPU.
o The computer's CPU stops other tasks and transfers the network data
into its RAM.

 Programmed I/O (input/output):


o Data enters the NIC from the network.
o The NIC's CPU loads the network data into a motherboard I/O address.
o The computer's CPU checks the I/O address for any network data.
18http://san24mca.blogspot.com/

o If there is any data, the computer's CPU transfers the data to its RAM.

 Shared memory:
o Data enters the NIC
from the network.
o The NIC's CPU stores
the data in the NIC's
RAM.
o The NIC's CPU
interrupts the
computer's CPU.
o The computer's CPU
stops other tasks and transfers the network data into its RAM.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

2.7 Modem

A modem (modulator-demodulator) is a device that modulates an analog


carrier signal to encode digital information, and also demodulates such a carrier signal
to decode the transmitted information. The goal is to produce a signal that can be
transmitted easily and decoded to reproduce the original digital data. Modems can be
used over any means of transmitting analog signals, from driven diodes to radio.

The most familiar example is a voice band modem that turns the digital data of
a personal computer into analog audio signals that can be transmitted over a telephone
line. Modems are generally classified by the amount of data they can send in a given
time, normally measured in bits per second (bit/s, or bps). They can also be classified
by Baud, the number of times the modem changes its signal state per second.
Asymmetric Digital Subscriber Line (ADSL) is one form of the Digital
Subscriber Line technology, a data communications technology that enables faster
data transmission over copper telephone lines than a conventional voice band modem
can provide. It does this by utilizing frequencies that are not used by a voice telephone
call. Currently, most ADSL communication is full-duplex. Full-duplex ADSL
communication is usually achieved on a wire pair by either frequency-division duplex
(FDD), echo-cancelling duplex (ECD), or time-division duplex (TDD). With standard
ADSL, the band from 26.000 KHz to 137.825 kHz is used for upstream
communication, while 138 kHz –
1104 kHz is used for downstream
communication.

2.8 VoIP (Voice over Internet


Protocol)

VoIP (Voice over Internet


Protocol) is simply the transmission of
voice traffic over IP-based networks. VoIP is a general term for a family of
transmission technologies for delivery of voice communications over IP networks
such as the internet or other packed switched networks. VoIP systems employ session
19http://san24mca.blogspot.com/

control protocols to control the set-up and tear-down of calls as well as audio codec
which encode speech allowing transmission over an IP network on digital audio via
an audio stream.

There are three methods of connecting to a VoIP network:

 Using a VoIP telephone


 Using a "normal" telephone with a VoIP adapter
 Using a computer with speakers and a microphone

2.8.1 Types of VoIP Calls


SANDEEP, MITHILESH , SYEDUL , RABI KANT

 VoIP telephone calls can be placed either to other VoIP devices, or to normal
telephones on the PSTN (Public Switched Telephone Network).

 Calls from a VoIP device to a PSTN device are commonly called "PC-to-
Phone" calls, even though the VoIP device may not be a PC.

 Calls from a VoIP device to another VoIP device are commonly called "PC-
to-PC" calls, even though neither device may be a PC.

2.9 Gateway

Gateways make communication possible between different architectures and


environments. They repackage and convert data going from one environment to
another so that each environment can understand
the other's environment data. A gateway
repackages information to match the
requirements of the destination system. Gateways
can change the format of a message so that it will
conform to the application program at the
receiving end of the transfer.

A gateway links two systems that do not use the


same:

 Communication protocols                                               
 Data formatting structures
 Languages
 Architecture

For example, electronic mail gateways, such as X.400 gateway, receive messages
in one format, and then translate it, and forward in X.400 format used by the receiver,
and vice versa.
2.10 Connectors RJ 45
Registered Jack-45, an eight-wire connector used commonly to connect
computers onto Local-area networks (LAN), especially Ethernets.
20http://san24mca.blogspot.com/

2.9.1 Configuring straight and cross patch cords:

Straight connection: It is used in LAN

End1 End 2
1. White(orange) 1. White(orange)
2. Orange 2. Orange
3. White(green) 3. White(green)
SANDEEP, MITHILESH , SYEDUL , RABI KANT

4. Blue 4. Blue
5. White(Blue) 5. White(Blue)
6. Green 6. Green
7. White(Brown) 7. White(Brown)
8. Brown 8. Brown

Cross connection: It is used in computer to computer data transform.

End1 End 2
1.White(orange) 1.White(Green)
2.Orange 2.Green
3.White(green) 3.White(Orange)
4.Blue 4.Blue
5.White(Blue) 5.White(Blue)
6.Green 6.Orange
7.White(Brown) 7.White(Brown)
8.Brown 8.Brown

21http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT

2.11 Direction of transmission or Data Flow:


Communication between two devices can be simplex, half duplex, and full duplex.
22http://san24mca.blogspot.com/

2.11.1 Simplex

In simplex mode, the


communication is unidirectional, as on
a one way street. Only one of the two devices on a link can transmit; the other can
only receive. In other words, Simplex refers to one-way communications where one
party is the transmitter and the other is the receiver. An example: simple radio, which
you can receive data from stations but can't transmit data. Keyboards and Traditional
Monitors are example of simplex devices. The keyboard can only introduce input; the
SANDEEP, MITHILESH , SYEDUL , RABI KANT

monitor can only accept output.

2.11.2 Half-Duplex

In half-duplex mode, each station can both transmit and receive, but not at the
same time. When one device is sending, the other can only receive, and vice versa. It
refers to two-way communications where only one party can transmit at a time. I.e.
in both directions but one at a time. The entire capacity of a channel is taken over by
whichever of the two devices is transmitting at the time. The half-duplex mode is used
in cases where there is no need for communication in both directions at the same time.
Example: a walkie-talkie and CB(citizen band)radios .
2.11.3 Full-Duplex

Full-Duplex:-In full duplex mode, both stations can transmit and receive
simultaneously. It refers to the transmission of data in two directions simultaneously.
For example, a telephone conversation because both parties can talk and listen at the
same time. In full duplex mode signals going in either direction share the capacity of
the link. It can occur in two ways either two separate physical paths or the capacity of
the channel is divided between signals traveling both directions.

3. TRANSMISSION MEDIUM
A transmission medium is a material substance (solid, liquid or gas) which
can propagate energy waves. For example, the transmission medium for sound
received by the ears is usually air, but solids and liquids may also act as transmission
media for sound. In other word, the transmission medium is the physical path by
which a message travels from sender to receiver. Example of Transmission media
include twisted –pair wire, coaxial cable, fiber-optic cable, and radio waves. The
absence of a material medium (the vacuum of empty space) can also be thought of as
a transmission medium for electromagnetic waves such as light and radio waves.
23http://san24mca.blogspot.com/

Signals are usually transmitted over some transmission media that are broadly
classified in to two categories:-

3.1 Unguided Media:


This is the wireless media that transport electromagnetic waves without using
a physical conductor. Signals are broadcast through air. This is done through radio
communication, satellite communication and cellular telephony.

3.2 Guided Media:


These are those that provide a conduit from one device to another that include
twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these
media is directed and is contained by the physical limits of the medium. Twisted-pair
SANDEEP, MITHILESH , SYEDUL , RABI KANT

and coaxial cable use metallic that accept and transport signals in the form of
electrical current. Optical fiber is a glass or plastic cable that accepts and transports
signals in the form of light.

3.3 Twisted-Pair Cable :

A twisted pair consists of two


conductors (normally copper), each with
its own plastic insulation, twisted together,
as shown in Figure.
One of the wires is used to carry signals to
the receiver, and the other is used only as a ground reference. The receiver uses the
difference between the two. In addition to the signal sent by the sender on one of the
wires, interference (noise) and crosstalk may affect both wires and create unwanted
signals. If the two wires are parallel, the effect of these unwanted signals is not the
same in both wires because they are at different locations relative to the noise or
crosstalk sources (e.g., one is closer and the other is farther). This results in a
difference at the receiver. By twisting the pairs, a balance is maintained. Twisted-pair
cable used in communications is categories in two different categories :

3.3.1 UTP
The most common twisted-pair cable used in communications is referred to as
unshielded twisted-pair (UTP).

3.3.2 STP
24http://san24mca.blogspot.com/

IBM has also produced a version of twisted-pair cable for its use called
shielded twisted-pair (STP). STP cable has a metal foil or braided-mesh covering that
encases each pair of insulated conductors. Although metal casing improves the quality
of cable by preventing the penetration of noise or crosstalk, it is bulkier and more
expensive
SANDEEP, MITHILESH , SYEDUL , RABI KANT

3.4 Coaxial cable


Coaxial cable, or coax, is an electrical cable with an inner conductor
surrounded by a flexible, tubular insulating layer, surrounded by a tubular conducting
shield.
Coaxial cable is used as a transmission line for radio frequency signals, in
applications such as connecting radio transmitters and receivers with their antennas,
computer network (Internet) connections, and distributing cable television signals.
One advantage of coax over other types of transmission line is that in an ideal coaxial
cable the electromagnetic field carrying the signal exists only in the space between the
inner and outer conductors. This allows coaxial cable runs to be installed next to
metal objects such as gutters without the power losses that occur in other transmission
lines, and provides protection of the signal from external electromagnetic interference.

3.5 Optical Fiber


An optical fiber cable is a cable containing one or more optical fibers. The
optical fiber elements are typically individually coated with plastic layers and
contained in a protective tube suitable for the environment where the cable will be
25http://san24mca.blogspot.com/

deployed. Optical Fiber consists of thin glass fibers that can carry information at
frequencies in the visible light spectrum and beyond.

The typical optical fiber consists of a very narrow strand of glass called the
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Core. A typical Core diameter is 62.5 microns (1 micron = 10-6 meters). Around the
Core is a concentric layer of glass called the Cladding. Typically Cladding has a
diameter of 125 microns .Coating the cladding is a protective coating consisting of
plastic, it is called the Jacket. Its purpose is to provide protection for the cladding and
core against such hazards as abrasion and moisture.
There are 3 primary types of transmission modes using optical fiber: They are
a) Step Mode Index
b) Graded Mode Index
c) Single Mode Index

Step Mode Index has a large core the light rays tend to bounce around,
reflecting off the cladding, inside the core. This causes some rays bounce back and
forth taking a longer path. Some take the direct path with hardly one reflections taking
shorted path.

The result is that the light rays arrive at the receiver at different times. The
signal becomes longer than the original signal. Typical Core diameter is 62.5 microns
and cladding diameter is 125 microns. LED light sources are used.

Graded Mode Index has a gradual change in the Core's Refractive Index.
This causes the light rays to be gradually bent back into the core path. This is
represented by a curved reflective path. The result is a better receive signal than Step
Index. Typical Core diameter: 42.5 microns & cladding diameter 145.5 microns. LED
light sources are used.
26http://san24mca.blogspot.com/

Single Mode Index has separate distinct Refractive Indexes for the cladding
and core. The light ray passes through the core with relatively few reflections off the
cladding. Single Mode is used for a single source of light (one color) operation. The
core diameter is very small: 9 microns & cladding diameter is 177.5 microns. It
SANDEEP, MITHILESH , SYEDUL , RABI KANT

requires a laser.
3.6 Comparison of Different mode of Optical Fibers:

4. TRANSMISSION IMPAIRMENT
Signals travel through transmission media, which are not perfect. The
27http://san24mca.blogspot.com/

imperfection causes signal impairment. This means that the signal at the beginning of
the medium is not the same as the signal at the end of the medium. What is sent is not
what is received. Three causes of impairment are attenuation, distortion, and noise.

4.1 Attenuation
Attenuation means a loss of energy. When a signal, simple or composite,
travels through a medium, it loses some of its energy in overcoming the resistance of
the medium. To compensate for this loss, amplifiers are used to amplify the signal.
Figure shows the effect of attenuation and amplification.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Decibel
To show that a signal has lost or gained strength, engineers use the unit of the
decibel. The decibel (dB) measures the relative strengths of two signals or one signal
at two different points. Note that the decibel is negative if a signal is attenuated and
positive if a signal is amplified.
dB =10 log10 p2/p1
4.2 Distortion

Distortion means that the signal changes its form or shape. Distortion can
occur in a composite signal made of different frequencies. Each signal component has
its own propagation speed (see the next section) through a medium and, therefore, its
own delay in arriving at the final destination. Differences in delay may create a
difference in phase if the delay is not exactly the same as the period duration. In other
words, signal components at the receiver have phases different from what they had at
the sender. The shape of the composite signal is therefore not the same. Figure shows
the effect of distortion on a composite signal.

4.3 Noise

Noise is another cause of impairment. Several types of noise, such as thermal


28http://san24mca.blogspot.com/

noise, induced noise, crosstalk, and impulse noise, may corrupt the signal. Thermal
noise is the random motion of electrons in a wire which creates an extra signal not
originally sent by the transmitter. Induced noise comes from sources such as motors
and appliances. These devices act as sending a antenna, and the transmission medium
acts as the receiving antenna. Crosstalk is the effect of one wire on the other. One
wire acts as a sending antenna and the other as the receiving antenna. Impulse noise is
a spike (a signal with high energy in a very short time) that comes from power lines,
lightning. Figure shows the effect of noise on a signal.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

4.3.1 Signal-to-Noise Ratio (SNR)

As we will see later, to find the theoretical bit rate limit, we need to know the
ratio of the signal power to the noise power. The signal-to-noise ratio is defined as

SNR = average signal power/average noise power


SNR is actually the ratio of what is wanted (signal) to what is not wanted (noise). A
high SNR means the signal is less corrupted by noise; a low SNR means the signal is
more corrupted by noise. As SNR is the ratio of two powers, it is often described in
decibel units, SNR dB , defined as

SNR cm =10 log10 SNR


4.3.2 Throughput

The throughput is a measure of how fast can send data through a network. In
other words, the bandwidth is a potential measurement of a link, the throughput is an
actual measurement of how fast data can send.
5. ACCESS POINT
An access point is nothing but a router that releases IP. Access point gets its IP
address range from the port address of the switch as port of switches are configured
according to VLAN. Access points are configured and installed according o the signal
location etc.

They have 14 broadcasting channels of 22 MHz each and separated by 5 MHz


guard band. If two devices come under same channel then they will establish path in a
loop with each other. In this case they can communicate with each other only and not
with any other device. All access points are connected to managed switch from where
29http://san24mca.blogspot.com/

DHCP server is connected in data centre. From access points stations are connected.
We can also configure access point as DHCP server. Access points can release up to a
maximum of 60 IP addresses and it varies with the device. Access point devices can
configure MAC address within itself. Access points are distinguished by SSID
(Service Set Identifier) and we can have multiple SSID to allocate particular
bandwidth. It also helps in managing access points. Access points are mainly used in
Wi-Fi technology to transmit data to and from wireless clients.

5.1 What is Wi-Fi?


Wi-Fi stands for wireless fidelity. It is a wireless technology that uses radio
frequency to transmit data through the air. Wi-Fi standards use the Ethernet protocol
SANDEEP, MITHILESH , SYEDUL , RABI KANT

and CSMA/CD (Carrier Sense Multiple Access with Collision Detection) for path
sharing. In short wi-fi is meant to be used generically when referring to any type of
802.11 networks.

Access points are configured using the 802.11 standards. 802.11 refers to a
family of specifications developed by IEEE for wireless LAN technology. 802.11
specifies an over-the-air interface between a wireless client and a base station or
between two wireless clients. There are several specifications in 802.11 family:-

 802.11a
 802.11b
 802.11e
 802.11f
 802.11g
 802.11h
 802.11i

 The original WLAN standard. Supports 1Mbps to 2 Mbps.


 Spectrum 2.4 GHz.
802.11  Layer 3 data rate 1.2Mbps.
 Transmission FHSS/DSSS.
 Limited bit rate but higher range.
 High speed WLAN standard for 5 GHz band spectrum.
 Supports 54 Mbps.
802.11a  Layer 3 data rate 33Mbps.
 Transmission through OFDM.
 Smallest range of all 802.11 standards but higher bit rate in
less crowded spectrum.

30http://san24mca.blogspot.com/

WLAN standard for 2.4 GHz band.


 Supports a maximum of 11 Mbps.
 Layer 3 data rate 6-7 Mbps.
802.11b  Transmission by DSSS.
 Compatible with 802.11
 Widely deployed due to higher range but bit rate is too slow
for many emerging applications.
 Address quality of service requirements for all IEEE WLAN
802.11e radio interfaces.
 Defines inter-access point communications to facilitate
802.11f multiple vendor-distributed WLAN networks.
 Establishes an additional modulation technique for 2.4 GHz
band.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

 Intended to provide speeds up to 54 Mbps.


802.11g  Layer 3 data rate is 32 Mbps.
 Transmission through OFDM.
 Compatible with 802.11 and 802.11b due to narrow
spectrum.
 Includes much greater security.
802.11h  Defines spectrum management of 5 GHz band for use in
Europe and Asia Pacific.
802.11i  Address the current security weakness for both authentication
and encryption protocols.
 The standard encompasses 802.1X, TKIP, and AES
protocols.
.

5.2 Types of Access Points:


Different types of access points are available in the market now-a-days like-
Avaya AP-6, Motorola AP-5131, D-Link DWL-3200AP, Cisco, Linksys etc.

5.2.1 Motorola AP-5131:


Electrical Characteristics :

Operating Voltage 48 Vdc (Nom)

Operating current 200 mA (Peak) @ 48 Vdc


31http://san24mca.blogspot.com/

170 mA (Nom) @ 48 Vdc

Radio Characteristics :

Transmitter Power 22 dBm Maximum (country, channel and data


rate dependent)

802.11b/g
19 dBm +/- dBm @1, 2, 5.5, 11 Mbps
19 dBm +/- dBm @6 and 9 Mbps
18 dBm +/- dBm @12 and 18 Mbps
17 dBm +/- dBm @24 and 36 Mbps
16 dBm +/- dBm @48 and 54 Mbps
SANDEEP, MITHILESH , SYEDUL , RABI KANT

802.11a
17 dBm +/- dBm @6 and 9 Mbps
16 dBm +/- dBm @12 and 18 Mbps
15 dBm +/- dBm @24 and 36 Mbps
14 dBm +/- dBm @48 and 54 Mbps

Operating Channels 802.11a radio- Channels 1-35 (4920-5825 MHz)


802.11b/g radio- Channels 1-13 (2412-2472
MHz)
Radio Data Rates 802.11a radio 6, 9, 12, 18, 24, 36, 48 and 54
Mbit/sec
802.11g radio 6, 9, 12, 18, 24, 36, 48 and 54
Mbit/sec
802.11b radio 1, 2, 5.5, 11 Mbps

Wireless Medium Direct Sequence Spread Spectrum (DSSS)


Orthogonal Frequency Division Multiplexing
(OFDM)

Antenna Options :
32http://san24mca.blogspot.com/

Both Radio 1 and Radio 2 require 1 antenna and can optimally use two
antennas per radio (4 antennas total for dual-radio models). Two antennas per radio
provide diversity that can improve performance and signal reception. Motorola
supports 2 antenna suites for the AP-5131. Radio 1 supports the 2.4 GHz radio and
Radio 2 refers to the AP-5131 5.2 GHz radio. However, there could be some cases
where a dual-radio AP-5131 is performing a Rogue AP detector function. In this
scenario, the AP-5131 is receiving in either 2.4 GHz or 5.2 GHz over Radio 1 or
Radio 2 antennas depending on which radio is selected for the scan.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

LED indicators :

AP-5131 utilizes seven LED indicators. Five LEDs display within four LED
slots on the front of the AP-5131 (on top of the AP-5131 housing) and two LEDs (for
above the ceiling installations) are located on the back of the device (the side
containing the LAN, WAN and antenna connectors). The five AP-5131 top housing
LEDs have the following display and functionality:-

Boot and Power Status Solid white indicates the AP-5131 is adequately
powered.
Error Conditions Solid red indicates the AP-5131 is experiencing
a problem condition requiring immediate
attention.

Ethernet Activity Flashing white light indicates data transfers and


Ethernet activity.

802.11a Radio Activity Flickering amber indicates beacons and data


transfers over the AP-5131 802.11a radio.

802.11b/g Radio Activity Flickering green indicates beacons and data


transfers over the AP-5131 802.11b/g radio.

The LEDs on the rear of the AP-5131 are viewed using a single (customer
installed) extended light pipe, adjusted as required to suit above the ceiling
installations. The LEDs displayed using the light pipe have the following colour
display and functionality:-

Boot and Power Status Solid white indicates the AP-5131 is adequately
powered.

Error Conditions Blinking red indicates the AP-5131 Rogue AP


33http://san24mca.blogspot.com/

Detection feature has located a rogue device.

Solid red indicates the AP-5131 is experiencing


a problem condition requiring immediate
attention.

5.3 AP-5131 Configuration :


1. Start browser and enter the following IP address in the address field
http://10.1.1.1

The AP-5131 login screen displays.


SANDEEP, MITHILESH , SYEDUL , RABI KANT
2. Log in using ‘admin’ as the default user ID and ‘motorola’ as the default
password. If the default login is successful, the ‘Change Admin Password’
window displays.
3. Change the password.
34http://san24mca.blogspot.com/

To define basic AP-5131 configuration:

1. Select System Configuration Quick Setup from the AP-5131 menu tree.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
35http://san24mca.blogspot.com/

2. Enter a ‘System Name’ for the AP-5131. The system name is useful if
multiple devices are being administered.
3. Select the ‘Country’ for the AP-5131’s country of operation from the drop-
down menu.

The AP-5131 prompts the user for the correct country code on the first login. A
warning message also displays stating that an incorrect country setting may result in
illegal radio operation. Selecting the correct country is central to legally operating the
AP-5131. Each country has its own regulatory restrictions concerning electromagnetic
emissions and the maximum RF signal strength that can be transmitted. To ensure
compliance with national and local laws, be sure to set.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

4. Optionally enter the IP address of the server used to provide system time to the
AP-5131 within the Time Server field.

Once the IP address is entered, the AP-5131’s Network Time Protocol (NTP)
functionality is engaged automatically.
5. Click WAN tab to set minimum set of parameters for using the WAN
interface.

36http://san24mca.blogspot.com/

a. Select the ‘Enable WAN Interface’ checkbox to enable a connection


between the AP-5131 and a larger network or outside world through the
SANDEEP, MITHILESH , SYEDUL , RABI KANT

WAN port. Disable this option to effectively isolate the AP-5131’s WAN
connection. No connections to a larger network or the internet will be
possible. MUs cannot communicate beyond the configured subnets.
b. Select the ‘This Interface is a DHCP Client’ checkbox to enable DHCP for
the AP-5131 WAN connection. This is useful, if the target corporate
network or Internet Service Provider (ISP) uses DHCP.
c. Specify an ‘IP address’ for the AP-5131’s WAN connection.
d. Specify a ‘Subnet Mask’ for the AP-5131’s WAN connection. This
number is available from the ISP for a DSL or a cable-modem connection
or from an administrator if the AP-5131 connects to a larger network.
e. Specify a ‘Default Gateway’ address for the AP-5131’s WAN connection.
The ISP or a network administrator provides this address.
f. Specify the address of a ‘Primary DNS Server’. The ISP or a network
administrator provides this address.
6. Optionally use the ‘Enable PPP over Ethernet’ checkbox to enable point-to-
point over Ethernet (PPPoE) for a high speed connection that supports this
protocol.
a. Select the ‘Keep Alive’ checkbox to enable occasional communications
over the WAN port even when the client communications to the WAN are
idle. Some ISPs terminate inactive connections, while others do not. In
either case, enabling Keep-Alive maintains the WAN connection, even
when there is no traffic. If the ISP drops the connection after the idle time,
the AP-5131 automatically re-establishes the connection to the ISP.
b. Specify a ‘Username’ entered when connecting to the ISP.
c. Specify a password entered when connecting to the ISP.

7. Click the ‘LAN’ tab to set a minimum set of parameters to use the AP-5131
LAN interface.
37http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT

a. Select the ‘Enable LAN Interface’ checkbox to forward data traffic over
the AP-5131 LAN connection. The LAN connection is enabled by default.
b. Use ‘This Interface’ drop-down menu to specify how network address
information is defined over the AP-5131’s LAN connection. Select ‘DHCP
Client’ if the larger corporate network uses DHCP. Select ‘DHCP Server’
to use the AP-5131 as a DHCP server over the LAN connection.
c. Enter the network-assigned ‘IP Address’ of the AP-5131.
d. The ‘Subnet Mask’ defines the size of the subnet.
e. Enter a ‘Default Gateway to define the IP address of a router the AP-5131
uses on the Ethernet as its default gateway.
f. Enter the ‘Primary DNS Server’ IP address.
g. If using DHCP Server use the ‘Address Assignment Range’ parameter to
specify a range of IP address reserved for mapping clients to the IP
addresses.

8. Enable the radio(s) using the ‘Radio Enable’ checkbox(es). If using a single
radio model, enable the radio, then select either 802.11a(5GHz) or
802.11b/g(2.4GHz) from the ‘RF Band of Operation’ field.
9. Select the ‘WLAN#1’ tab to define its ESSID security scheme for basic
operation.
a. Enter the ESSID (Extended Services Set Identification) and name
associated with the WLAN.
b. Use the ‘Available On’ checkboxes to define whether the target WLAN is
38http://san24mca.blogspot.com/

operating over the 802.11a or 802.11b/g radio. Ensure the radio selected
has been enabled.
c. Even an AP-5131 configured with minimal values must protect its data
against theft and corruption. A security policy should be configured for
WLAN1 as part of basic configuration outlined in this guide.
10. Click ‘Apply’ to save any changes to the AP-5131 Quick Setup screen.

Static WEP keys:


SANDEEP, MITHILESH , SYEDUL , RABI KANT
Wired Equivalent Privacy (WEP) is a part of 802.11 specifications. Static
WEP key operation requires keys on the client and AP that are used to encrypt data
sent between them. With WEP encryption, sniffing is eliminated and session
hijacking is difficult (or impossible). Client and AP are configured with a set of 4
39http://san24mca.blogspot.com/

keys, and when decrypting each is used in turn until decryption is successful. This
allows keys to be changed dynamically.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
To configure WEP128 :

1. From the AP-5131 Quick Setup Screen. Click the ‘Create’ button to the right
of the Security Policy item.
The ‘New Security Policy’ screen displays with the ‘Manually Pre-shared
key/No authentication’ and ‘No Encryption’ options selected.
2. Ensure the ‘Name’ of the security policy entered suits the intended
configuration or function of the policy. Multiple WLANs can share the same
security policy.
3. Select the ‘WEP 128 (104 bit key) checkbox. The ‘WEP 128 Setting’ field
displays within the ‘New Security Policy’ screen.
4. Configure the ‘WEP 128 Setting’ field as required to define the pass key used
to generate the WEP keys.
5. Click the ‘Apply’ button to save the security policy and return to the ‘AP-5131
Quick Setup’ screen. 40http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT
6. SWITCH
A LAN switch is a local area networking device that prevents data packet
collision, and maximizes transmission speed as well as bandwidth allocation. This is a
good replacement to a network hub and solves problems associated with expanding
41http://san24mca.blogspot.com/

networks.
Switch is an intelligent, active hub that establishes, maintains, and changes logical
connections over physical circuits. Switches flexibly connect transmitters and
receivers across networks of interconnected ports and links, thereby allowing network
resources to be shared by large numbers of end users. LAN switches are packet
switches that can support multiple simultaneous transmissions, reading the destination
address of each frame and forwarding it directly to the port associated with the target
device. There is a figure of switch with 8 ports.

6.1 TYPE OF SWITCHES


SANDEEP, MITHILESH , SYEDUL , RABI KANT

When we use the term switch, we must be careful because a switch can mean
two different things. We must clarify the term by adding the level at which the device
operates. We can have a two-layer switch or a three-layer switch. A three-layer
switch is used at the network layer; it is a kind of router. The two-layer switch
performs at the physical and data link layers.
6.1.1 Two-Layer Switches
A switch works at Layer 2 of the OSI model (data-link). It is a LAN device
that can also be called a multi-port bridge. A switch switches Ethernet frames between
Ethernet devices. This switches do not care about IP addresses nor do they even
examine IP addresses as the frames flow through the switch. However, unlike a hub
that just duplicates data and sends it out all ports.
A two-layer switch, as a bridge does, makes a filtering decision based on the
MAC address of the frame it received. However, a two-layer switch can be more
sophisticated. It can have a buffer to hold the frames for processing. It can have a
switching factor that forwards the frames faster. Some new two-layer switches, called
cut-through switches, have been designed to forward the frame as soon as they check
the MAC addresses in the header of the frame.
A bridge with a few ports can connect a few LANs together. A bridge with
many ports may be able to allocate a unique port to each station, with each station on
its own independent entity. This means no competing traffic (no collision, as we saw
in Ethernet).

6.1.2 Three-Layer Switches


A router, on the other hand, works at Layer 3 of the OSI model (Network). It
is a WAN device that connects a LAN to a WAN or a subnetted LAN to another
subnetted LAN. A router routes IP packets between IP networks. Routers do this
using an IP routing table. In that table, they have either static or dynamic routes.
When an IP packet comes in, the router looks up the destination IP in the IP routing
table. If that destination IP is not found in the table the router drops the packet, unless
it has a default route. Routers form broadcast domains because they drop broadcast
42http://san24mca.blogspot.com/

packets. A three-layer switch is a router, but a faster and more sophisticated. The
switching fabric in a three-layer switch allows faster table lookup and forwarding.
According to the configuration and monitoring capability of switches. It categories in
to two categories that is, Managed and Unmanaged Switches.

Unmanaged switches :
An unmanaged switch simply allows Ethernet devices to communicate with
one another, such as a PC or network printer, and those are typically what we call
“plug and play.” They are shipped with a fixed configuration and do not allow any
changes to this configuration.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Managed switches :
Managed switches provide all the features of an unmanaged switch and
provide the ability to configure, manage, and monitor your LAN. And this gives you
greater control over how data travels over the network and who has access to it. Also,
managed switches use protocols such as the Simple Network Management Protocol,
or what we call SNMP, for monitoring the devices on the network. SNMP is a
protocol that facilitates the exchange of management information between network
devices. SNMP queries can determine the health of the network or the status of a
particular device. By displaying this data in an easily understood format, IT managers
located at a central site can monitor the performance of the network and quickly
detect and repair network problems without having to physically interact with the
switch.
Another important feature of a managed switch is redundancy. Redundancy
provides the ability to safeguard a network in case a connection or cable fails by
providing an alternate data path for traffic. Managed switches incorporate what is
called Spanning Tree Protocol standard, or STP, to provide path redundancy in the
network. Using the spanning-tree algorithm, STP provides redundant paths while
preventing loops that are created by multiple active paths between switches. STP
allows for one active path at a time between two network devices, preventing loops
and establishing the redundant links as a backup to keep integrated systems available
and preventing expensive downtime, which network administrator can appreciate.

6.2 LAN Switch Mechanism and Its Advantages

In a network where a LAN switch is used, each node gets a direct connection
to a switch. That is, a node gets a dedicated connection to the switch which only it
(the node or the computer) and the switch use. This dedicated connection makes it
possible for one node to maximize use of the bandwidth available to it. After all, no
other node is competing with it for bandwidth. This means speedy data transmission.
43http://san24mca.blogspot.com/

Moreover, the connection between the node and the switch can be made using
cabling which has a separate route for data that the node is sending out and a separate
route for data that the switch is forwarding to the node. This eliminates problems of
data collision. The LAN switch is especially a vast improvement over the network
hub since it has the ability to “read” the source and destination node of a data packet
and forward the packet only to the destination node. Whenever the node transmits
data meant for another node in the local area network, the switch intercepts the data,
determines the destination and forwards the transmission to its intended destination.
Since a data packet does not get broadcasted to unnecessary segments, network
congestion is minimized and network bandwidth is conserved.

6.3 VLAN
SANDEEP, MITHILESH , SYEDUL , RABI KANT

VLAN stands for virtual local area network. A LAN can be divided into
several logical LANs called VLANs. This virtual LAN is also an IP subnet. The
whole idea of VLAN technology is to divide a LAN into logical, instead of physical,
segments. Each VLAN is a work group in the organization. If a person moves from
one group to another, there is no need to change the physical configuration. The group
membership in VLANs is defined by software, not hardware. Any station can be
logically moved to another VLAN. All members belonging to a VLAN can receive
broadcast messages sent to that particular VLAN.
A virtual local area network (VLAN) is configured by software, not by
physical wiring. Membership in a VLAN can be based on port numbers, MAC
addresses, IP addresses, IP multicast addresses, or a combination of these features.
VLANs are cost and time-efficient, can reduce network traffic, and provide an extra
measure of security. In a traditional VLAN, switches tag the VLAN traffic, and only
the devices on the same VLAN can communicate with one another. If devices on
different VLANs need to communicate, they would talk to each other via a trunk port
on a router. That trunk port and the processing power of the router would create a
bottleneck for communications. With a Layer 3 switch, routing and trunking are
performed at very high speeds.
Besides the functionality mentioned above, a VLAN has a number of other
features such as:

 Performance & broadcast control


 Segregating departments or project networks
 Security

6.3.1 Advantages of VLANs

VLANs allow network administrators to organize LANs logically instead of


physically. This is a key benefit. This allows network administrators to perform
several tasks:
44http://san24mca.blogspot.com/

 Easily move workstations on the LAN


 Easily add workstations to the LAN
 Easily change the LAN configuration
 Easily control network traffic
 Improve security

6.3.2 Types of VLANs

Three basic VLAN types that are used to determine and control VLAN
membership assignments:

 Port-based VLANs
SANDEEP, MITHILESH , SYEDUL , RABI KANT

 MAC address based


VLANs
 Protocol-based
VLANs

7. NETWORK
TOPOLOGY
A network topology describes the configuration of a network (how the
network components are connected together).

There are FIVE main topologies.

Factors for selecting topologies

 Desired Performance
 Desired Reliability
 Size(No of nodes)
 Expandability of the system
 Cost of the components
45http://san24mca.blogspot.com/

 Delays involved in routing

7.1 Star Topology :


The star topology uses a central hub through which all components are
connected. In a star topology, each device has a dedicated point-to-point link only to a
central controller, usually called HUB. The devices are not directly linked to one
another. A star topology does not allow direct traffic between devices. The controller
acts as an exchange: if one device wants to send data to another, it sends the data to
the controller, which then relays the data to the other connected device. A star
topology is less expensive than mesh topology. Each device needs only one link and
one I/O port to connect it to any number of others. This factor also makes it easy to
install and reconfigure. Computers in a network are usually connected with the hub,
SANDEEP, MITHILESH , SYEDUL , RABI KANT

switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair
Cables.

Central device (hub):-Contains multiple ports to


connect the network devices. All network
transmissions sent through it.
Advantage
: If any comp. fails the remaining N/W is unaffected. (If one link fails, only that link
is affected. All other links remain active. ). Only n-1 lines are required for connecting
n node.

Disadvantages : If the host fails ,the entire network fails.

7.2 Ring Topology :


A ring topology connects six stations. The ring topology connects
workstations in a closed loop. Each terminal is connected to TWO other terminals (the
46http://san24mca.blogspot.com/

next and the previous), with the last terminal being connected to the first. Data is
transmitted around the ring in one direction only; each station passing on the data to
the next station till it reaches its destination.

Faulty workstations can be isolated from the ring. When the workstation is powered
on, it connects itself into the ring. When power is off, it disconnects itself from the
ring and allows the information to bypass the workstation. Information travels around
SANDEEP, MITHILESH , SYEDUL , RABI KANT

the ring from one workstation to the next. Each packet of data sent on the ring is
prefixed by the address of the station to which it is being sent to, when a packet of
data arrives, the workstation checks to see if the packet address is the same as its own.
If it is, it grabs the data in the packet. If the packet does not belong to it, it sends the
packet to the next workstation in the ring. Ring systems use 4 pair cables (separate
send/receive). The common implementation of this topology is token ring. A break in
the ring causes the entire network to fail.

 No central hub.
 No central cable.
Network devices connected in a ring formation from one device to the next. Data
travels from one device to another around the ring in one direction only. There's no
danger of collisions because data always flows in one direction. If a connection is
broken, the entire network goes down.

Advantages :

 Easy to install
 Add or delete is easy
 Fault isolation is simplified

Disadvantages :

 A break in the ring can disable the entire network


 Addition of new nodes increases the delay
 Requires more complicated control then star network

7.3 Bus Topology :


The bus topology connects workstations using a single cable. Each
workstation is connected to the next workstation in a point to point fashion. All
workstations connect to the same cable.
47http://san24mca.blogspot.com/

No central hub. Central cable to which all devices are attached. Data transmission
down the line from one device to another .Only one device transmits at a time. Easy to
implement and extend. Requires less cable length than a star topology BUT If there is
a problem with the cable, the entire network goes down. Performance degrades as
additional computers are added or on heavy traffic.

Advantage : Ease of installation


SANDEEP, MITHILESH , SYEDUL , RABI KANT

Disadvantage : Difficult reconnection and fault isolation

7.4 Mesh Topology :


In mesh network, each node is directly connected to all nodes on the network.
This type of network involves the concept of routes. In this type of network, each
node may send message to destination through multiple paths. It means that each node
of mesh network has several possible paths to send (or to receive) message, but in
Bus, Star, Ring and Tree topologies each node has only one path. The mesh topology
connects all computers to each other. The cable requirements are high, but there are
redundant paths built in. Any failure of one computer allows all others to continue, as
they have alternative paths to
other computers. Mesh
topologies are used in critical
connection of host computers
(typically telephone exchanges).
Alternate paths allow each
computer to balance the load to
other computer systems in the
network by using more than one
of the connection paths
available.

Advantage :

 It has multiple links, so if one route is blocked then other routes can be used
for data communication.
 Each connection can have its own data load, so the traffic problem is
eliminated.
 It ensures the data privacy or security, because every message travels along a
48http://san24mca.blogspot.com/

dedicated link.
 Troubleshooting of this topology is easy as compared to other networks.
 Its performance is not affected with heavy load of data transmission.
 A mesh topology is robust.
 Point to point links make fault identification and fault isolation easy

Disadvantage :

 It becomes very expensive because a large number of cabling and 110 ports
are required.
 It is difficult to install.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

7.5 Tree Topology :


Just as name suggest, the network
design is little confusing and complex to
understand at first but if we have better
understanding of Star and Bus topologies then
Tree is very simple. Tree topology is basically
the mixture of many Star topology designs
connected together using bus topology. Tree
topologies are comprised of the multiple star
topologies on a bus. Devices like Hub can be
directly connected to Tree bus and each hub
performs as root of a tree of the network devices. Tree topology is very dynamic in
nature and it holds potential of expandability of networks far better than other
topologies like Bus and Star.

7.6 Hybrid Topology :

Hybrid network is the combination of different topologies such as star, Ring,


Mesh, Bus etc. For example, if a department uses a Bus network, second department
uses the ring network, third department uses the Mesh network and fourth department
uses the star network. All the networks of different types (of four departments) can be
connected together through a central hub (in the form of star network) as shown in the
figure below.

49http://san24mca.blogspot.com/

Figure(i):- Hybrid topology

A star backbone with three bus networks


SANDEEP, MITHILESH , SYEDUL , RABI KANT

Figure(ii):-Hybrid topology
8. OSI REFERENCE MODEL
ISO is the organization.OSI is the model. The ISO is International Standard
Organization. An ISO that cover all aspect of network communication is the Open
system Interconnection model. An open system is a set of protocols that allows any
two different systems to communicate regardless of their underlying architecture. The
OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems.OSI is Open Systems
Interconnection. No one really uses this in the real world. A reference model so
others can develop detailed interfaces. Task of communication broken up into
modules or layers Value: The reference model defines 7 layers of functions that take
place at each end of communication and with each layer adding its own set of special
related functions.

Each layer expects some service from its lower layer, and provides some service to its
higher layer

Top most layers is application (for ex., email)

File Transfer, Email, Remote Login 


50http://san24mca.blogspot.com/

8.1. Physical Layer :

The physical layer is responsible for movements of individual bits from one
hop (node) to the next. Physical interface between data transmission device (e.g.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

computer) and transmission medium or network. It Specifies raw transmission details


like connectors, medium, voltage levels, encodings used etc .Physical topologies are
Star and Bus. Line configuration is p2p or multipoint. Transmission mode- Simplex,
Half- Duplex, Duplex
Figure:-Physical layer

The physical layer is also concerned with the following:

 Physical characteristic of interfaces and medium ->The physical layer


define the characteristics of the interface between the devices and the type of
transmission medium.
 Representation of bits -> The physical layer data consist of a stream of a bits
(sequence of 0s or 1s )with no interpretation .it also defines how 0s and 1s
changed into signals.
 Data rate -> Data rate means the transmission rate (the no of bits sent per
second)
 Synchronization of bits -> Physical layer synchronized the senders and
51http://san24mca.blogspot.com/

receivers clocks of bit level.


 Line configuration ->The physical layer is concerned with the connection of
devices to the media.
 Physical topology->The physical topology defines how devices are connected
to make a network.
 Transmission mode-> The physical layer also defines the direction of
transmission between two devices :simplex, half-duplex, or full-duplex.

8.2 Data Link Layer :

The data link layer is responsible for moving frames from one hop (node) to the next.
It makes the physical layer appear error- free to the upper layer (network layer). It ensures
reliable communication between two directly connected nodes. Higher layers can think that a
SANDEEP, MITHILESH , SYEDUL , RABI KANT

reliable link exists between two machines, and not worry about noise, attenuation, error etc. It
Deals with framing, flow control, error control etc. It responsible for Hop-to-Hop
delivery.
Figure:-Datalink layer

Other responsibilities of the data link layer include the following:

 Framing->The data link layer divides the stream of bits received from the network
layer into manageable data units called frames.
 Physical addressing->If frames are to be distributed to different systems on the
network, the data link layer adds a header to the frame to define the sender and/or
receiver of the frame.
 Flow control->The data link layer imposes a flow control mechanism to avoid
overwhelming the receiver.
 Error control->Error control is normally achieved through a trailer added to the end
of the frame. It also uses a mechanism to recognize duplicate frames.
 Access control->When two or more devices are connected to the same ink, data link
layer protocols are necessary to determine which device has control over the link at
any given time.

52http://san24mca.blogspot.com/

8.3 Network Layer :

The network layer is responsible for the delivery of individual packets from
the source host to the destination host.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Figure:-Network layer

 Routing : Network layer deals primarily with routing , sending packets from
source to destination when they are not directly connected. Packets may not
reach in order, get lost etc.

 Logical addressing : Has some other functionalities like logical addressing.


8.4 Transport Layer :

The transport layer is responsible for process to process delivery of the entire
message. A process is an application program running on a host.

Figure:-Transport layer

Other responsibility of the transport layer include the following:

 Process to Process Delivery- Reliable, in-order delivery between any two


53http://san24mca.blogspot.com/

applications (not just machines)


 Segmentation and Reassembly
 Connection control- The transport layer can be either connection oriented or
connection less.
 Flow Control- Flow control is performed End to End
 Error Control- Error correction is usually achieved through retransmission
8.5 Session Layer :

The session layer is responsible for network dialog control and


synchronization. The services provided by the first three layers (physical, data link,
and network) are not sufficient for some process. It establishes, maintains, and
synchronizes the interaction among communicating systems.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Figure:-Session layer

Specific responsibilities of the session layer include the following:


 Dialog Control-The session layer allows two systems to enter into a dialog
either half duplex or full duplex.

 Synchronization- The session layer allows to add checkpoints or


synchronization points to a stream of data.

8.6 Presentation Layer :

The presentation layer is responsible for translation, compression, and


encryption. The presentation layer is concerned with the syntax and semantics of the
information exchanged bet’n two systems.

Figure:- Presentation layer


54http://san24mca.blogspot.com/

Some responsibilities of Presentation layer:-

 Translation-At the sender changes the information from its sender dependent
format into a common format. The presentation layer at the receiving machine
changes the common format into receiver-dependent format.

 Encryption-Encrypted the message

 Compression- compressed the message.

8.7 Application layer :

The application layer is responsible for providing services to the user. The
application layer enables the user, whether human or software, to access the network.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

It provides user interfaces and support for services such as electronic mail, remote file
access and transfer, shared database management, and other type of distributed
information services.
Figure:-Application layer

Specific services provided by the application layer:

 Network virtual terminal


 File transfer, access, and management
 Mail services
 Directory services
55http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT

9. Firewall
A Firewall is hardware, software, or a combination of both that is used to
prevent unauthorized programs or internet users from accessing a private network
and/or a single computer. The word firewall originally referred literally to a wall,
which was constructed to halt the spread of a fire. In the world of computer firewall
protection, a firewall refers to a network device which blocks certain kinds of network
traffic, forming a barrier between a
trusted and an untrusted network. It is
analogous to a physical firewall in the
sense that firewall security attempts to
block the spread of computer attacks.

Basically, a firewall, working


closely with a router program, examines
each network packet to determine
whether to forward it toward its
destination. A firewall also includes or
works with a proxy server that makes
network requests on behalf of workstation users. A firewall is often installed in a
specially designated computer separate from the rest of the network so that no
incoming request can get directly at private network resources. A firewall is a secure
and trusted machine that sits between a private network and a public network.

9.1 How Does Firewall Management Work?


56http://san24mca.blogspot.com/

A firewall management program can be configured one of two basic ways:

 A default-deny policy. The firewall administrator lists the allowed network


services, and everything else is denied.
 A default-allow policy. The firewall administrator lists network services which
are not allowed, and everything else is accepted.

9.2 Firewall techniques

9.2.1 Packet filtering firewall

This type of firewall has a list of firewall security rules which can block traffic
SANDEEP, MITHILESH , SYEDUL , RABI KANT

based on IP protocol, IP address and/or port number. Under this firewall management
program, all web traffic will be allowed, including web-based attacks. In this
situation, you need to have intrusion prevention, in addition to firewall security, in
order to differentiate between good web traffic (simple web requests from people
browsing your website) and bad web traffic (people attacking your website).A packet
filtering firewall has no way to tell the difference. An additional problem with packet
filtering firewalls which are not stateful is that the firewall can't tell the difference
between a legitimate return packet and a packet which pretends to be from an
established connection, which means your firewall management system configuration
will have to allow both kinds of packets into the network.

9.2.2 Stateful firewall


This is similar to a packet filtering firewall, but it is more intelligent about
keeping track of active connections, so you can define firewall management rules
such as "only allow packets into the network that are part of an already established
outbound connection." You have solved the established connection issue described
above, but you still can't tell the difference between "good" and "bad" web traffic.
You need intrusion prevention to detect and block web attacks.

9.2.3 Deep packet inspection firewall

An application firewall actually examines the data in the packet, and can
therefore look at application layer attacks. This kind of firewall security is similar to
intrusion prevention technology, and, therefore, may be able to provide some of the
same functionality.

There are three caveats, however: first, for some vendors, the definition of
"deep" extends to some particular depth in the packet and does not necessarily
examine the entire packet. This can result in missing some kinds of attacks. Second,
depending on the hardware, a firewall may not have adequate processing power to
handle the deep packet inspection for your network. Be sure to ask questions about
how much bandwidth it can handle while performing such inspection. And finally,
embedded firewall management technology may not have the flexibility to handle all
attacks.
57http://san24mca.blogspot.com/

9.2.4 Application-aware firewall

Similar to deep packet inspection except that the firewall understands certain
protocols and can parse them, so that signatures or rules can specifically address
certain fields in the protocol. The flexibility of this approach to computer firewall
protection is great and permits the signatures or rules to be both specific and
comprehensive. There are no specific drawbacks to this approach to firewall security
as generally it will yield improvements over a standard "deep packet inspection"
approach. However, some actual attacks may be overlooked (false negatives) because
the firewall security parsing routines are not robust enough to handle variations in
real-world traffic.

9.2.5 Application proxy firewall


SANDEEP, MITHILESH , SYEDUL , RABI KANT

An application proxy acts as an intermediary for certain application traffic


(such as HTTP, or web, traffic), intercepting all requests and validating them before
passing them along. Again, an application proxy firewall is similar to certain kinds of
intrusion prevention. The implementation of a full application proxy is, however,
quite difficult, and each proxy can only handle one protocol (e.g. web or incoming
email).

For an application proxy firewall to be effective as computer firewall


protection, it has to be able to understand the protocol completely and to enforce
blocking on violations of the protocol. Because implementations of the protocol being
examined often do not follow a protocol correctly, or because implementers add their
own extensions to a protocol, this can result in the proxy blocking valid traffic (false
positives). Because of these kinds of problems, end users will often not enable these
technologies.

9.3 Firewall Rules

Firewalls rules can be customized as per your needs, requirements & security
threat levels. You can create or disable firewall filter rules based on such conditions
as:

 IP Addresses: Blocking off a certain IP address or a range of IP


addresses, which you think are predatory.
 Domain names: You can only allow certain specific domain names to
access your systems/servers or allow access to only some specified types
of domain names or domain name extension like .edu or .mil.
 Protocols: A firewall can decide which of the systems can allow or have
access to common protocols like IP, SMTP, FTP, UDP,ICMP,Telnet or
SNMP.
 Ports: Blocking or disabling ports of servers that are connected to the
internet will help maintain the kind of data flow you want to see it used
for & also close down possible entry points for hackers or malignant
software.
 Keywords: Firewalls also can sift through the data flow for a match of
the keywords or phrases to block out offensive or unwanted data from
58http://san24mca.blogspot.com/

flowing in.

9.4 Types of Firewall

9.4.1 Software firewall:

New generation Operating


systems come with built in firewalls
or you can buy firewall software for
the computer that accesses the
internet or acts as the gateway to
your home network.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

For individual home users,


the most popular firewall choice is
a software firewall. Software
firewalls are installed on your
computer (like any software) and
you can customize it; allowing you
some control over its function and
protection features. A software
firewall will protect your computer
from outside attempts to control or
gain access your computer, and,
depending on your choice of
software firewall, it could also
provide protection against the most common Trojan programs or e-mail worms. Many
software firewalls have user defined controls for setting up safe file and printer
sharing and to block unsafe applications from running on your system. Additionally,
software firewalls may also incorporate privacy controls, web filtering and more. The
downside to software firewalls is that they will only protect the computer they are
installed on, not a network, so each computer will need to have a software firewall
installed on it.

9.4.2 Hardware firewall:

A hardware firewall is a small box that connects between your computer and
your modem. Hardware firewalls are usually routers with a built in Ethernet card and
hub. Your computer or computers on your network connect to this router & access the
web. Hardware firewalls can be purchased as a stand-alone product but more recently
hardware firewalls are typically found in broadband routers, and should be considered
an important part of your system and network set-up, especially for anyone on a
broadband connection. Hardware firewalls can be effective with little or no
configuration, and they can protect every machine on a local network. Most hardware
firewalls will have a minimum of four network ports to connect other computers, but
for larger networks, business
networking firewall solutions
are available. A hardware
firewall uses packet filtering
59http://san24mca.blogspot.com/

to examine the header of a


packet to determine its
source and destination. This
information is compared to a
set of predefined or user-
created rules that determine
whether the packet is to be
forwarded or dropped.

9.5 The Advantages and Disadvantages of Firewall


SANDEEP, MITHILESH , SYEDUL , RABI KANT

9.5.1 Advantages

1. A feeling of increased security that your PC and contents are being protected.
2. Relatively inexpensive or free for personal use.
3. New releases are becoming user friendly.
4. You can monitor incoming and outgoing security alerts and the firewall
company will record and track down an intrusion attempt depending on the
severity.
5. Some firewalls but not all can detect viruses, worms, Trojan horses, or data
collectors.
6. All firewalls can be tested for effectiveness by using products that test for
leaks or probe for open ports.
9.5.2 Disadvantages

1. Firewalls evolve due to cracker's ability to circumvent them increases.


2. "Always on" connections created by Cable and DSL connections create major
problems for firewalls. This can be compared to leaving you car running with
the keys in it and the doors unlocked which a thief may interpret as an
invitation to "Please steal me".
3. Firewalls cannot protect you from internal sabotage within a network or from
allowing other users access to your PC.
4. Firewalls cannot edit indecent material like pornography, violence, drugs and
bad language. This would require you to adjust your browser security options
or purchase special software to monitor your children's Internet activity.
5. Firewalls offer weak defense from viruses so antiviral software and an IDS
(intrusion detection system) which protects against Trojans and port scans
should also complement your firewall in the layering defense.
6. Some firewalls claim full firewall capability when it's not the case. Not all
firewalls are created equally or offer the same protection so it's up to the user
to do their homework.
7. Cost varies. There are some great free firewalls available to the PC User but
there are also a few highly recommended products, which can only be
purchased. The difference may be just the amount of support or features that a
User can get from a free product as opposed to a paid one and how much
support that user thinks he or she will require.
60http://san24mca.blogspot.com/

8. A firewall protection is limited once you have an allowable connection open.


This is where another program should be in place to catch Trojan horse viruses
trying to enter your computer as unassuming normal traffic.
9. There have been claims made by IDS (Intrusion Detection System) companies
where Trojan's were detected such as the RuX FireCracker v 2.0 which
disabled certain Firewalls programs thus leaving the PC vulnerable to
malicious actions.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
10. UTM
Unified Threat Management (UTM) is a comprehensive solution that has
recently emerged in the network security industry. It is the evolution of the traditional
firewall into an all-inclusive security product that has the ability to perform multiple
security functions in one single appliance: network firewalling, network intrusion
prevention and gateway antivirus (AV), gateway anti-spam, VPN, content filtering,
load balancing and on-appliance reporting.

The advantages of unified security lies in the fact that rather than administering
multiple systems that individually handle antivirus, content filtering, intrusion
prevention and spam filtering functions, organizations now have the flexibility to
deploy a single UTM appliance that takes over all their functionality into a single rack
mountable network appliance.

10.1 How UTM secures the network

A single UTM appliance makes it very easy to manage a company's security


strategy, with just one device to worry about, one source of support and a single way
to maintain every aspect of your security solution. The UTM can prove to be more
effective a solution as its strength lies in the bundle of solutions which are integrated
and designed to work together. Also from one single centralized console, all the
security solutions can be monitored and configured. Thus it tweaks the solutions to
61http://san24mca.blogspot.com/

perfection.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

In this context, UTMs represent all-in-one security appliances that carry


firewall, VPN, gateway anti-virus, gateway anti-spam, intrusion prevention, content
filtering, and bandwidth management and centralized reporting as basic features. The
UTM is thus, a highly integrated quiver of security solutions, working in tandem that
systematically provides network security to organizations. As there is a customized
OS holding all these security features at one place, they tend to work in unison,
providing a very high throughput. The UTM can prove highly effective because its
strength lies in the bundle of solutions which are integrated and designed to work
together without treading on each other’s toes.
10.2 Advantages

1. Reduced complexity:
Single security
solution. Single
Vendor. Single AMC
2. Simplicity: Avoidance
of multiple software
installation and
maintenance
3. Easy Management:
Plug & Play
Architecture, Web-
based GUI for easy
management
4. Performance: Zero-
hour protection without degrading the network performance
5. Troubleshooting: Single point of contact – 24 × 7 vendor support
6. Reduced technical training requirements, one product to learn.
7. Regulatory compliance

10.3 Features
62http://san24mca.blogspot.com/

1. Award winning Anti Spam with Grey Listing technology

2. Anti Virus

3. Web Proxy

4. UTM appliance Web Filter

5. Http Proxy

6. spam filters

7. internet filter
SANDEEP, MITHILESH , SYEDUL , RABI KANT

8. Intrusion prevention Content Filter

9. P2P Blocking Intrusion Prevention

10.4 UTM Appliance Benefits

1. Bi-directional scanning of all protocols


2. Multiple automated software updates per day
3. Multiple Anti-Virus Vendors supported
4. Intrusion Prevention with Zero Day Protection
5. Full POP3 & SMTP Integration
6. Advanced Anti-Spam with grey listing
7. Spyware is blocked from entering the network
8. Module deactivation capability
9. Scalability for LAN growth 1U Appliance, fully loaded
10. No LAN reconfiguration necessary
11. Wizard configuration setup

11. PROTOCOL
A protocol is
a set of rules that
govern data
communications. It
represents an agreement between the communicating devices. Without a
protocol, two devices may be connected but not communicating, just as a
person speaking French cannot be understood by a person who speaks only
Japanese.

11.1 FTP [File Transfer Protocol]


63http://san24mca.blogspot.com/

Transferring files from one computer to another is one of the most common
tasks expected from a networking or internetworking environment. As a matter of
fact, the greatest volume of data exchange in the Internet today is due to file transfer.
Telnet allows you to interact with an application running on a remote computer, but it
has no facility for enabling you to copy a file from that computer’s hard disk to yours,
nor for you to upload files to the remote system. That function is carried out using
File Transfer Protocol (FTP).The FTP specification caters for several different file
types, structures and transfer modes, but in practice FTP implementations recognize
either text files or binary files. Text files are converted from their native format to 7-
bit ASCII with each line terminated by a carriage-return, line-feed pair for
transmission. They are converted back to the native text file format by the FTP client.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

FTP therefore provides a cross-platform transfer mechanism for text files. Binary files
are transmitted exactly as-is.

Data is transferred as a continuous stream of bytes. The TCP transport


protocol provides all the reliability, making sure that data that is lost is re-sent and
checking that it is received correctly. FTP is unusual compared to other TCP
applications in that it uses two TCP connections. A control connection is made to the
well-known FTP port number 21, and this is used to send FTP commands and receive
replies. A separate data connection is established whenever a file or other information
is to be transferred, and closed when the data transfer has finished. Keeping data and
commands separate makes life easier for the client software, and means that the
control connection is always free to send an ABOR (abort) command to terminate a
lengthy data transfer.

FTP uses the services of TCP. It needs two TCP connections.

The well-known port 21 is used for the control connection and the well-known port 20
for the data connection.

• Allows a person to transfer files between two machines.


Requires a person to supply login name and password to gain entry .

• Command:
ftp <domain_name>

ftp <ip_address>

11.1.1 Anonymous FTP

• A special form of FTP which has become very popular.


• Does not require a person to know login name and password.
• In place of login name, type the word anonymous.
• In place of password, type the email address.
• Huge amount of resources are available in anonymous FTP sites.
64http://san24mca.blogspot.com/

11.1.2 How FTP Works?

• Two connections established: A control connection over port 21, that remains
all through a session.
• A temporary port number, used for every file being transferred.
• New connection established for every file transfer.

11.2 Telnet [TErminaL NETwork]


Telnet is a general purpose client/server application program.

• Allows a person sitting on one computer to work on another computer.


SANDEEP, MITHILESH , SYEDUL , RABI KANT

• Starts a remote session on another machine.


• Requires a person to supply login name and password to gain entry.
• Command:
telnet <domain_name>
telnet <ip_address>

• Why required?
1. For using software only available on the remote host.
2. For using devices (like printer) connected to the remote host.

• Typical scenario
Many users do a telnet to a remote server, and work there.
• Server is a bigger and faster computer.
• By default connection is established over port 23.
• Any other port number can also be specified.
telnet sca.kiit.ac.in 25

Telnet is a terminal emulation application that enables a workstation to


connect to a host using a TCP/IP link and interact with it as if it was a directly
connected terminal. It is a client/server application. The server runs on a host on
which applications are running, and passes information between the applications and
the Telnet clients. The well-known port number for Telnet servers is TCP port 23.
Telnet clients must convert the user data between the form in which it is transmitted
and the form in which it is displayed. This is the difficult part of the application, the
terminal emulation, and has little to do with the Telnet protocol itself. Telnet protocol
commands are principally used to allow the client and server to negotiate the display
options, because Telnet clients and servers don’t make assumptions about each others
capabilities.TCP provides the reliability for Telnet, so neither the client nor the server
need be concerned about re-sending data that is lost, nor about error checking. This
makes the Telnet protocol very simple. There is no special format for TCP segments
that contain commands - they simply form part of the data stream.
65http://san24mca.blogspot.com/

Data is sent, usually as 7-bit ASCII, in TCP packets (which you may recall are
called segments). A byte value of 255, interpret as command (IAC), means that the
bytes which follow are to be treated as Telnet commands and not user data. This is
immediately followed by a byte that identifies the command itself, and then a value.
Many commands are fixed length, so the byte after that, if not another IAC, would be
treated as user data. To send the byte 255 as data, two consecutive bytes of value 255
are used.

11.3 Simple Mail Transfer Protocol (SMTP)


Most widely used application on the Internet .
• For sending mails:
SANDEEP, MITHILESH , SYEDUL , RABI KANT

1. Simple Mail Transfer Protocol (SMTP)


2. Multipurpose Internet Mail Extension(MIME)
• For receiving mails:
1. Post office protocol version 3 (POP3)
2. Internet Mail Access Protocol (IMAP)

The objective of Simple Mail Transfer Protocol (SMTP) is to transfer mail


reliably and efficiently. SMTP is independent of the particular transmission
subsystem and requires only a reliable ordered data stream channel. An important
feature of SMTP is its capability to relay mail across transport service environments.
A transport service provides an inter process communication environment (IPCE).
An IPCE may cover one network, several networks, or a subset of a network. It is
important to realize that transport systems (or IPCEs) are not one-to-one with
networks. A process can communicate directly with another process through any
mutually known IPCE. Mail is an application or use of inter process communication.
Mail can be communicated between processes in different IPCEs by relaying through
a process connected to two (or more) IPCEs. More specifically, mail can be relayed
between hosts on different transport systems by a host on both transport systems.
• Based on RFC 821.
• Transmits simple text messages only.

7-bit ASCII format . Uses • Delivery to users handled at


information written on envelope of destination host.
mail . • If multiple messages are ready
for given host, a single TCP
• Message header.
connection can be used.
• Contains recipient address and
• Saves overhead of setting up
other information.
and dropping connection.
• Does not look at contents.
Possible Errors
• Message body.
• Mail is created by user agent • Host unreachable
program (mail client). • Host out of operation
• Messages queued and sent as • TCP connection fail during
input to SMTP sender program. transfer
• Typically a server process. Faulty destination address
• Daemon on UNIX. • User error
66http://san24mca.blogspot.com/

• Send mail or queued mail • Target user address has


Mail Message Contents changed
• Each queued message has: • Redirect if possible
• Message text • Inform user if not
• RFC 822 header with message • Sender can re-queue mail,
envelope and list of recipients. Give up after a period
• Message body, composed by SMTP Protocol – Reliability
user. • Used to transfer messages from
• A list of mail destinations sender to receiver over TCP
• Derived by user agent / SMTP connection.
server from header. • Uses port number 25.
• May require expansion of • Attempts to provide reliable
mailing lists. service.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

SMTP Sender • No guarantee to recover lost


• Takes message from queue. messages.
• Transmits to proper destination • No end-to-end ACK to sender.
host .Via SMTP transaction. • Error indication report not
• Over one or more TCP guaranteed.
connections to port 25. SMTP Receiver
• When all destinations • Accepts arriving message.
processed, message is deleted. • Places in user mailbox or
Optimization copies to outgoing queue for
• If message is sent to multiple forwarding.
users on a given host, it is sent • Receiver must:
only once. • Verify local mail destinations.
• Deal with errors
• Transmission
• Lack of disk space • Sender identifies itself.
SMTP Forwarding HELLO
• Mostly direct transfer from • Receiver accepts sender’s
sender host to receiver host. identification.
• May go through intermediate 250 OK
mail servers via forwarding • If mail service not available,
capability. the second step above becomes:
• Sender can specify route. 421 service not available
SMTP System Overview
• Commands and responses b) Mail Transfer Commands
exchanged between sender and
• The MAIL FROM command
receiver.
identifies originator.
• Initiative with sender.
• Gives reverse path to be used
Establishes TCP connection.
for error reporting.
• Sender sends commands to • Receiver returns 250 OK or
receiver. appropriate failure / error
e.g. HELO message.
<domain><CRLF> • One or more RCPT TO
• Each command generates commands identify recipients
exactly one reply. for the message.
e.g. 250 requested mail • Separate reply for each
action ok; completed. recipient.
67http://san24mca.blogspot.com/

SMTP Replies • The DATA command transfers


message text.
• Starts with 3-digit code.
• End of message indicated by a
• Leading digit indicates
line containing just period (.)
category.
c) Closing Connection
• 2xx -- Positive completion
reply • Two steps:
• 3xx -- Positive intermediate • Sender sends QUIT and waits
reply for reply.
• 4xx -- Transient negative • Then initiate TCP close
completion reply operation.
• 5xx -- Permanent negative • Receiver initiates TCP close
completion reply after sending reply to QUIT.
An Example SMTP Session
• How to connect to an SMTP
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Operation Phases
server?
a) Connection setup
telnet servername 25
b) Exchange of command-response
• A TCP connection gets
pairs established over port number
c) Connection termination 25.
• The telnet client and the mail
a) Connection Setup server can now start a dialogue.
• Sender opens TCP connection
with receiver. 11.4 POP3
• Once connected, receiver • The client POP3 software is
identifies itself. installed on the recipient
220 <domain> service ready machine, and the server POP3
software installed on mail • • Some SMTP implementations
server. do not adhere to standard.
• The client (user agent) opens a • CRLF, truncate or wrap long
connection with the server on lines, removal of white space,
TCP port number 110. etc.
• Sends user name and password. Overview of MIME
• Can access the mails, one by • Five new message header
one. fields:
• Two modes: • MIME-version
• Delete mode – mails deleted as • Content-type
they are read • Content-transfer-encoding
• Keep mode – mails remain in • Content-Id
the mailbox • Content-description
• POP3 has commands for: • A number of content types and
• Log in transfer encoding formats
• Log out have been defined.
• Fetch messages Content Types
• Delete messages • Text body
IMAP4 • Multipart
• Provides the following extra • Mixed, Parallel, Alternative
features: • Message
• A user can check the email • RFC 822, Partial,
header before downloading. • External-body
68http://san24mca.blogspot.com/

• A user can search the contents • Image


of the email for a specific string • jpeg, gif
prior to downloading. • Video
• A user can create, delete, or • mpeg
rename mailboxes on the mail • Audio
server. • Basic
• A user can create a hierarchy of • Application
mailboxes in a folder for email • Postscript
storage. • octet stream
MIME Transfer Encodings
Multipurpose Internet Mail • Specifies how the mail body is
Extension(MIME) wrapped for transmission.
• SMTP cannot transmit non-text • Content transfer encoding field
SANDEEP, MITHILESH , SYEDUL , RABI KANT

messages. can have six possible values.


• Solutions (like uuencode) exists • 7bit, 8bit, binary: no encoding
on done for these three.
• some systems, but are not • Provide information about
standardized. nature of data.
• • Cannot transmit text that • Quoted-printable
includes Data mostly printable ASCII
• international characters (e.g. â, characters.
å, ä, è, é, ê, ë). Non-printing characters represented
• Need 8 bit ASCII. by hex code.
• Servers may reject mail over
Base64
certain size.
Maps arbitrary binary input onto
printable output.
• X-token • mail composers to include an
• Named nonstandard encoding. explanatory note.--simple
boundary
MIME Header Example • This is implicitly typed plain
text. It does NOT end with a
linebreak.
• From: Indranil Sengupta
• -- simple boundary
<[email protected]>
• Content-type: text/plain;
• To: Jaswinder Ahuja
charset=us-ascii
<[email protected]>
• This is explicitly typed plain
• Subject: Simple Message
ASCII text. It DOES end with a
• MIME-Version: 1.0
linebreak.
• Content-type: multipart/mixed;
• --simple boundary--
boundary="simple boundary"
• This is the epilogue. It is also to
• This is the preamble. It is to be
be ignored.
ignored, though it is a handy
place for
69http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT
SANDEEP, MITHILESH , SYEDUL , RABI KANT 70http://san24mca.blogspot.com/

UNIT - 2
SEVERS
A computer, or a software package, that provides a specific kind of service to
client software running on other computers. The term can refer to a particular piece of
software, such as a WWW server, or to the machine on which the software is running,
e.g. "Our mail server is down today, that's why e-mail isn't getting out." A single
server machine can (and often does) have several different server software packages
running on it, thus providing many different servers to clients on the network.
Sometimes server software is designed so that additional capabilities can be added to
the main program by adding small programs known as servlets

1. WEB SERVER
A web server is a computer programs that delivers (serves) content, such as this
web page, using the Hypertext Transfer Protocol.

In other word, a web server is a computer that stores websites and their related
71http://san24mca.blogspot.com/

files for viewing on the Internet. Visitors wishing to access the sites and files simply
type in the corresponding URL to the site they wish to view. Web hosting is big
business in the age of electronic commerce.

Every Web server has an IP Address and possibly a domain name. For example, if
you enter the URL http://www.pcwebopedia.com/index.html in your browser, this
sends a request to the server whose domain name is pcwebopedia.com. The server
then fetches the page named index.html and sends it to your browser. Any Computer
can be turned into a Web server by installing server software and connecting the
machine to the Internet. There are many Web server software applications, including
public domain software from NCSA and Apache, and commercial packages from
Microsoft, Netscape and others.Here is mainly two type of server use in wide range
are: - IIS and Apache web server.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

1.1 IIS

Internet Information Services (IIS) formerly called Internet Information


Server , is a web server application and set of feature extension modules created by
Microsoft for use with Microsoft Windows. It is the world's second most popular web
server in terms of overall websites behind the industry leader Apache HTTP Server.
The protocols supported in IIS 7 include: FTP, FTPS, SMTP, NNTP, and
HTTP/HTTPS.

IIS is used to make your computer a web server. If we want to have a web server for
developing dynamic websites or want to publish website on our own server then we
install the IIS. IIS is used on windows plate form. For other plate form we have
different web servers. E.g. apache for Linux. IIS takes request from user and executes
(response) the required files and sends result back to the user.

1.1.1 Installation

To install IIS you must have your operating systems CD (Win XP or Win 2K). Click
Start, point to Control Panel and click Add or Remove Programs.

 Click the Add/Remove Windows Components button in the Add or Remove


Programs 72http://san24mca.blogspot.com/

 On the Windows Components window, click on the Application Server entry


and click the Details button
SANDEEP, MITHILESH , SYEDUL , RABI KANT

SANDEEP, MITHILESH , SYEDUL , RABI KANT 73http://san24mca.blogspot.com/
 On the Application Server page, click on the Internet Information Services
(IIS) entry and click the Details button

 In the Internet Information Service (IIS) dialog box, put a check mark in
the World Wide Web Service check box and click OK
74http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT
 Click OK on the Application Server dialog box

 Click Next on the Windows Components dialog box


75http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT

 IIS Server Installation in progress


 Click Finish on the Completing the Windows Components Wizard page
76http://san24mca.blogspot.com/

 After installation of IIS a user will be able to configure IIS according to his/her
requirement.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
1.1.2 Security Features

IIS 5.0 and higher support the following authentication mechanisms:

 Basic access authentication


 Digest access authentication
 Integrated Windows Authentication
 .NET Passport Authentication (not supported in Windows Server 2008 and
above)

IIS 7.5 includes the following additional security features:

 Client Certificate Mapping


 IP Security
 Request Filtering
 URL Authorization

Authentication changed slightly between IIS 6.0 and IIS 7, most notably in that the
anonymous user which was named "IUSR_{machinename}" is a built-in account in
Vista and future operating systems and named "IUSR". Notably, in IIS 7, each
77http://san24mca.blogspot.com/

authentication mechanism is isolated into its own module and can be installed or
uninstalled.

1.2 Apache Web Server


The Apache HTTP web Server commonly referred to as Apache, is web
server software notable for playing a key role in the initial growth of the World Wide
Web. In 2009 it became the first web server software to surpass the 100 million web
site milestone. Apache was the first viable alternative to the Netscape
Communications Corporation web server (currently known as Sun Java System Web
Server), and has since evolved to rival other Unix-based web servers in terms of
SANDEEP, MITHILESH , SYEDUL , RABI KANT

functionality and performance. The majority of web servers using Apache run a Unix-
like operating system.

Apache, a public-domain open source Web server developed by a loosely-knit


group of programmers. The first version of Apache, based on the NCSA httpd Web
server, was developed in 1995. Core development of the Apache Web server is
performed by a group of about 20 volunteer programmers, called the Apache Group.
However, because the source code is freely available, anyone can adapt the server for
specific needs, and there is a large public library of Apache add-ons. In many
respects, development of Apache is similar to development of the Linux operating
system. The original version of Apache was written for UNIX, but there are now
versions that run under OS/2, Windows and other platforms.
The name is a tribute to the Native American Apache Indian tribe, a tribe well
known for its endurance and skill in warfare. A common misunderstanding is that it
was called Apache because it was developed from existing NCSA code plus various
patches, hence the name a patchy server, or Apache Server.

1.2.1 Features

Apache supports a variety of features, many implemented as compiled


modules which extend the core functionality. These can range from server-side
programming language support to authentication schemes. Some common language
interfaces support Perl, Python, Tcl, and PHP. Popular authentication modules include
mod_access, mod_auth, mod_digest, and mod_auth_digest, the successor to
mod_digest. A sample of other features include SSL and TLS support (mod_ssl), a
proxy module (mod_proxy), a URL rewriter (also known as a rewrite engine,
implemented under mod_rewrite), custom log files (mod_log_config), and filtering
support (mod_include and mod_ext_filter).Virtual hosting allows one Apache
installation to serve many different actual websites. For example, one machine with
one Apache installation could simultaneously serve www.example.com,
www.test.com, test47.test-server.test.com, etc. Apache features configurable error
messages, DBMS-based authentication databases, and content negotiation. It is also
supported by several graphical user interfaces (GUIs).

1.2.2 Use
78http://san24mca.blogspot.com/

Apache is primarily used to serve both static content and dynamic Web pages
on the World Wide Web. Many web applications are designed expecting the
environment and features that Apache provides.

Apache is used for many other tasks where content needs to be made available
in a secure and reliable way. One example is sharing files from a personal computer
over the Internet. A user who has Apache installed on their desktop can put arbitrary
files in Apache's document root which can then be shared.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
2. TEMINAL SERVER
The Terminal Server component of the Microsoft Windows Server™ 2003
operating system can deliver the Windows desktop, in addition to Windows-based
applications, from a centralized server to virtually any desktop computing device,
including those that cannot run Windows. Terminal Services transmits only the user
interface of the program to the client computer. Terminal services in windows Server
2003 can enhance an enterprise’s deployment capabilities for a variety of scenarios,
allowing substantial flexibility in application and management infrastructure. The
client computer then returns keyboard and mouse clicks to be processed by the server.
Terminal Server uses the Remote Desktop Protocol (RDP) to communicate between
client and server. Client computers connecting to the terminal server can run
Windows (including the Microsoft™ Windows™ CE operating system) or run on
other operating systems such as the Apple Macintosh or even UNIX (using a third-
party add-on). Each user sees only their individual session, which is managed
transparently by the server operating system and is independent of any other client
session.

2.1Terminal Services Architecture


Terminal Services consists of four components:
79http://san24mca.blogspot.com/

 The Windows Server 2003 multi-user kernel


 The Remote Desktop client
 The Terminal Services Licensing service, and
 Session Directory Services.

2.1.1 Multi-user kernel :

The multi-user kernel extensions, originally developed for Windows NT 4.0


Server, Terminal Server Edition, have been enhanced and fully integrated as a
standard part of the Windows Server 2003 family kernel. These are resident on the
server at all times, regardless of whether Terminal Services is enabled or not.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

2.1.2 Remote Desktop client:

The client software is an application that establishes and maintains the


connection between a client and a server computer running Terminal Services.

2.1.3 Terminal Services licensing service:

This system allows terminal servers to obtain and manage terminal server
client access license (TS CAL) tokens for devices and users connecting to a terminal
server.

2.1.4 Session Directory Services:


The session directory (SD) keeps a list of sessions indexed by user name, and
allows a user to reconnect to the terminal server where the user’s disconnected session
resides and resume that session.

2.2 Components
80http://san24mca.blogspot.com/

Component Description

CSRSS.exe The Client-Server Runtime Subsystem is the process and thread


manager for all logon sessions.

RdpDD.sys Captures the Windows user interface and translates it into a form
that is readily converted by RDPWD into the RDP protocol

RdpWD.sys Unwraps the multi-channel data and then transfers it to the


appropriate session.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

SMSS.exe Session Manager creates and manages all sessions.

Termsrv.exe Manages client connections and initiates creation and shutdown of


connection contexts.

Termdd.sys The RDP protocol, which listens for RDP client connections on a
TCP port.

Tdtcp.sys Packages the RDP protocol onto the underlying network protocol,
TCP/IP.
Wlnotify.dll Runs in the session’s WinLogon process to create processes in the
user session.

Win32k.sys Manages the Windows GUI environment by taking the mouse and
keyboard inputs and sending them to the appropriate application.

WinLogon.exe This system service handles user logons and logoffs and processes
the special Windows key combination Ctrl-Alt-Delete. WinLogon
is responsible for starting the Windows shell (which is usually
Windows Explorer).

As the Windows Server 2003 Terminal Server boots and loads the core


operating system, the Terminal Server service (termsrv.exe) is started and begins
waiting for session connections. Each connection is given a unique session identifier
or “SessionID” to represent an individual session to the Terminal Server, and each
process created within a session is “tagged” with the associated SessionID to
differentiate its namespace from any other session namespaces.
The console session (Terminal Server keyboard, mouse, and video) is always
81http://san24mca.blogspot.com/

the first to load, is treated as a special-case client connection, and is assigned


SessionID0. The console session starts as a normal Windows Server 2003 session,
with the configured Windows display, mouse, and keyboard drivers loaded.
After creating the console session, the Terminal Server service then calls the
Windows Session Manager (SMSS.EXE) to create two idle client sessions, which
then await client connections. To create the idle sessions, the Session Manager starts
the Client-Server Run-time Subsystem (CSRSS.EXE), and a new SessionID is
assigned to that process. The CSRSS process also invokes the WinLogon process
(WINLOGON.EXE) and the Windows Manager and GDI kernel module
(Win32k.sys) under the newly associated SessionID.
The Windows image loader recognizes this Win32k.sys as a SessionSpace
loadable image by a predefined bit set in the image header. It then relocates the code
SANDEEP, MITHILESH , SYEDUL , RABI KANT

portion of the image into physical memory with pointers from the virtual kernel
address space for that session if Win32k.sys has not already been loaded. By design, it
always attaches to a previously loaded image’s code (Win32k.sys) if one already
exists in memory (that is, from any active application or session). The data (or non-
shared) section of this image is then allocated to the new session from a newly created
Session Space pageable kernel memory section.
Unlike the console session, Terminal Server client sessions are configured to
load separate drivers for the display, keyboard, and mouse. The display driver is the
Remote Desktop Protocol (RDP) display device driver (rdpdd.dll), and the mouse and
keyboard drivers are replaced with the RDP driver Rdpwd.sys. These drivers allow
the RDP client session to be both available and interactive, remotely. Finally,
Terminal Server also invokes a connection listener thread for the RDP protocol
(Termdd.sys), which listens for RDP client connections on a TCP port.
At this point, the CSRSS process exists under its own SessionID namespace,
with its data instantiated per process as necessary. Any processes created from within
this SessionID will execute within the Session Space of the CSRSS process
automatically. This prevents processes with different SessionIDs from accessing
another session data.

2.3 Installation & Configuration Terminal Services


Use the following steps:

1. Choose the licensing mode.


2. Configure the Terminal Server role.
3. Create an administrator account.
4. Create a computer account and connect to the network.
5. Configure Terminal Server licensing.
6. Redirect My Documents folders.
7. Install client applications.

Step 1: Choose the Licensing Mode :


To use Terminal Server in your organization, you are required to have a Windows
Server 2003 license for every terminal server that you deploy in your organization as
well as Terminal Server Client Access Licenses (CALs) for devices that access the
82http://san24mca.blogspot.com/

terminal servers. For terminal servers that are running Windows Server 2003, there
are two types of Terminal Server CALs:

 Per Device
 Per User
Which CAL you choose depends on how you plan to use Terminal Server. By default,
Terminal Server is configured in Per Device mode, but it can be switched to Per User
mode using the Terminal Services Configuration tool (TSCC.msc). You can serve
both license types from the same license server.

A Terminal Server license server on your network manages the Terminal Services
CALs. A license server stores all Terminal Server CAL tokens that have been
SANDEEP, MITHILESH , SYEDUL , RABI KANT

installed for a terminal server and tracks the license tokens that have been issued to
clients.

Per Device Licensing Mode


A Per Device CAL provides each client computer the right to access a terminal server
that is running Windows Server 2003. The Per Device CAL is stored locally and
presented to the terminal server each time the client computer connects to the server.

Per Device licensing is a good choice for:

 Hosting a user’s primary desktop for devices the customer owns or


controls.
 Thin clients or computers that connect to a terminal server for a large
percentage of the working day.
This type of licensing is a poor choice if you do not control the device accessing the
server, for example, computers in an Internet café, or if you have a business partner
who connects to your terminal server from outside your network.

Per User Licensing Mode


In Per User licensing mode you must have one license for every user. With Per User
licensing, one user can access a terminal server from an unlimited number of devices
and only needs one CAL rather than a CAL for each device.

Per User licensing is a good choice in the following situations:

 Providing access for roaming users.


 Providing access for users who use more than one computer, for
example,
a portable and a desktop computer.
 Providing ease of management for organizations that track access
to the network by user, rather than by computer.
In general, if your organization has more computers than users, Per User
licensing might be a cost-effective way to deploy Terminal Server because you only
pay for the user to access Terminal Server, rather than paying for every device from
83http://san24mca.blogspot.com/

which the user accesses Terminal Server. Check the EULA for the applications that
you plan to host to determine if they support per user licensing.

Step 2: Configure the Terminal Server Role


On the server running Windows Server 2003 that you plan to use as an additional
server, configure the Terminal Server role.

To install Terminal Server


1.Log on to the additional server using the local administrator account.
2. Verify that the Windows Time service is configured and running, and that the time is
correct.
3. Click Start, click Manage Your Server, and then click Add or remove a role. The
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Configure Your Server Wizard starts.


4. Click OK on the Preliminary Steps page.
5. On the Server Role page, select the Terminal server check box, and then click Next.
6. Click Next on the Summary of Selections page to begin the configuration. Your
computer will restart as part of the configuration.

Step 3: Create an Administrator Account


Next, create a domain administrator account in order to manage your additional
server.
To create an administrator account for the additional server
1. Log on to the computer running Windows Server 2003 using the local
administrator account.
8. Click Start, and then click Server Management.
9. In the console tree, click Users.
10. In the details pane, click Add a User.
11. The Add User Wizard starts.
 On the Template Selection page, in the Templates dialog box, click
Administrator Template.
 On the Set Up Client Computer page, click Do not set up a
computer.
 On the Completing the Add User Wizard page, click Finish.

Step 4: Create a Computer Account and Connect to the Network


Next, create a domain administrator account in order to manage your additional
server.

To create an administrator account for the additional server


2. Log on to the computer running Windows Small Business Server 2003
using the local administrator account.
84http://san24mca.blogspot.com/

12. Click Start, and then click Server Management.


13. In the console tree, click Users.
14. In the details pane, click Add a User.
15. The Add User Wizard starts.
 On the Template Selection page, in the Templates dialog box, click
Administrator Template.
 On the Set Up Client Computer page, click Do not set up a
computer.
 On the Completing the Add User Wizard page, click Finish.

Step 5: Create a Computer Account and Connect to the Network


SANDEEP, MITHILESH , SYEDUL , RABI KANT

Next, create an account for your additional server on the Windows Small Business
Server network, and then join the server to the network.

To create a computer account


3. Log on to the computer running Windows Small Business Server 2003
using the built-in Administrator account.
16. Click Start, and then click Server Management.
17. In the console tree, click Server Computers.
18. In the details pane, click Set Up Server Computers. The Set Up Server
Wizard starts.
19. Follow the instructions in the wizard for creating a server computer.
To connect the terminal server to the network
4. On the new server, log on using the built-in Administrator account.
20. In Internet Explorer, go to http://ServerName/connectcomputer, and
then click Connect to the network now.
21. Follow the instructions in the wizard to connect this computer to the
network. Use the administrator user name and password that you created
when you ran the Add User Wizard.

Step 6: Configure Terminal Server Licensing


After you have joined the additional server to the network, configure the server with
Terminal Server licensing. For information about adding an additional server, click
Start, click Help and Support, and then search for "Terminal Server Licensing."

To configure Terminal Server Licensing


5. Click Start, click Control Panel, and then click Add or Remove
Programs.
22. Click Add/Remove Windows Components.
23. In the Components dialog box, click Terminal Server Licensing, and
then click Next.
24. On the Terminal Server Licensing Setup page, click Next to accept
85http://san24mca.blogspot.com/

the default on that page.

25. Provide the file system location where the license server database
should be installed on the Terminal Server license server, click Next,
and then click Finish. The default location for the license server
database is systemroot\System32\LServer.

Activating the License Server :


After a Terminal Server license server is activated, it becomes the repository for
Terminal Server client licenses. A Terminal Server license server can issue temporary
licenses for clients that allow use of terminal servers for up to 120 days from the date
of the first client logon. After this evaluation period ends, a terminal server can no
SANDEEP, MITHILESH , SYEDUL , RABI KANT

longer allow clients to connect unless it locates a Terminal Server license server to
issue client licenses. Licensing wizard properties, such as activation method and
company information, set during the activation process, can be changed later.

To activate the license server


6. Click Start, click Control Panel, click Administrative Tools, and then
click Terminal Server Licensing.
26. In the console tree, right-click the Terminal Server license server you
want to activate, and then click Activate Server to start the Terminal
Server License Server Activation Wizard.
27. In Activation method, select Automatic connection (recommended),
and then click Next. Follow the instructions in the wizard.
Adding Client Licenses to the License Server :
You must purchase a client access license for each client computer that connects to
the terminal server and install them on the license server for users to be able to use the
terminal server. For more information about Terminal Server licensing, click Start,
click Help and Support, and then search for "Terminal Server Licensing."

To install client license key packs


7. On the terminal server, click Start, click Control Panel, click
Administrative Tools, and then click Terminal Server Licensing.
28. Verify that the installation method for the Terminal Server license
server is set to Automatic by right-clicking the Terminal Server license
server for which you want to install key packs, and then clicking
Properties. On the Installation Method tab, change the installation
method if necessary.
29. In the console tree, right-click the Terminal Server license server for
which you want to install key packs, click Install Licenses to start the
Terminal Server CAL Installation Wizard, and then click Next.
The previous steps are not necessary if the Terminal Server CAL Installation
Wizard is already started.

30. In Program and Client License Information, provide the required


information for your licensing program to receive your key packs, and
then click Next.
86http://san24mca.blogspot.com/

The Microsoft Clearinghouse processes your request, and installs the


encrypted client license key pack on your Terminal Server license server.

31. Click Finish to complete the process.


The Terminal Server license server can now issue licenses to clients that
connect to a Terminal server.

Step 7: Redirect My Documents Folders


It is recommended that you redirect users’ My Documents folders to the server
running Windows Small Business Server 2003 and apply volume quotas to the
folders. By default, users’ My Documents folders are saved with the user profiles on
the terminal server. If you use My Documents Redirection and the backup feature of
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Small Business Server 2003, your users’ data will be backed up along with the rest of
the server. For information about redirecting users’ My Documents folders from the
terminal server to the Windows Small Business Server 2003, click Start, click Help
and Support, and then search for "Folder redirection."

To ensure that users’ My Documents folders synchronize with the server, tell the
users to log off from their terminal server sessions rather than simply close the
session.
Step 8: Install Client Applications
You can use the client applications on the computer running Windows Small
Business Server 2003 and install them on the terminal server. You can also install
other client applications on the terminal server. For more information about installing
and running applications with Terminal Server, click Start, click Help and Support,
and the search for "Terminal Server." For more information about installing Microsoft
Office 2003 in a Terminal Server environment, see the whitepaper "Deploying Office
2003 in a Windows Terminal Services Environment" at the Microsoft Web site
(http://go.microsoft.com/fwlink/?LinkId=24921).

Installing Outlook
You can install Microsoft® Office Outlook® 2003 on the terminal server from the
server running Small Business Server 2003.

To install Outlook

8. On the additional server, log on using the domain administrator account.


32. Click Start, click Run, and then type \\ServerName.
33. Double-click ClientApps, and then double-click outlook2003.
Double-click Setup.exe, and then follow the Setup instructions.
34. To close Outlook Setup after installation, click Next, and then click
87http://san24mca.blogspot.com/

Finish. Ensure that you close the wizard that launches along with Setup.
Installing Internet Explorer :
You do not need to install Internet Explorer on the terminal server; the correct version
of Internet Explorer is included with Windows Server 2003. The Favorites menu and
connection settings are configured by Client Setup. Some links on the Favorites menu
point to items that require the installation of Microsoft ActiveX® controls or
certificates. To prepare Internet Explorer for these links, use the following procedure.

Configuring Fax for Terminal Server Users :


You can configure the server running Windows Small Business Server 2003 as the
fax server for Terminal Server users by installing the Fax Service on the server
SANDEEP, MITHILESH , SYEDUL , RABI KANT

running Windows Small Business Server 2003. For more information about hosting
Fax Services on the additional server, click Start, click Help and Support, and then
search for "Using Fax."

To configure Fax Services for Terminal Server users, you need to configure the
terminal server and each client computer that will use the service. Use the following
procedure to configure the terminal server for using fax. When you are configuring
the client computers to use the Terminal Server, you will also need to configure the
client computers to use fax.

To configure the terminal server for fax :


9. From the terminal server, click Start, click Control Panel, and then
click Add or Remove Programs.
35. Click Add/Remove Windows Components.
36. Select the Fax Services check box, and then click Next.
37. Click Do not share this printer, and then click Next.
38. Click Finish.

Step 9: Configure Client Computers :


To configure the client computers to access the terminal server, you must install the
Remote Desktop Connection on each client computer. After you have installed the
Remote Desktop Connection, you can configure the client computers for Fax
Services.

To install Remote Desktop Connection on client computers :


10. From the client computer, click Start, click Run, and then type:
\\ServerName\clientapps

39. Click tsclient.


40. Double-click the Win32 folder, and then double-click Setup.exe.
41. Complete the Remote Desktop Connection - InstallSheild Wizard.
To configure client computers to use Fax Services :
11. From each client computer, click Start, click Programs, click
Accessories, click Communications, click Remote Desktop
88http://san24mca.blogspot.com/

Connection, and then log on to the terminal server using the Remote
Desktop Connection.
42. Click Start, click Printers and Faxes, and then double-click Add a
printer. The Add Printer wizard starts.
43. Click Next.
44. Click A network printer, or a printer attached to another computer,
and then click Next.
45. Click Find a printer in the directory, and then click Next .
46. In the Find Printers dialog box, click Find Now.
In the search results list, a printer named Fax should appear. Select the printer
named Fax, and then click OK.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

47. Click No when asked if you want to set this printer as the default
printer, and then click Finish.

2.4 How to connect client with Terminal server

Client
To connect to Terminal server remotely following step required.

Click Start, click All Programs, click Accessories, click Communication, and then
click Remote Desktop Connection.

Then a window will be appear like this

89http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Here a user can


specify his/her
requirement.

After Click on the Connect button the client will be connected to the terminal server
and a terminal server GUI interface will appear on the client computer .
2.5 Advantages
Advantage Description
Rapid, Terminal server is great for rapidly deploying Windows-based application
centralized to
deployment of computing devices across an enterprise- especially applications that are
applications frequently updated, infrequently used, or hard to manage.
When an application is managed on terminal Server, and not on each
device,
administrators can be certain that users are running the latest version of
the
application.
Low-bandwidth Terminal server considerably reduces the amount of network bandwidth
access to data required
to access data remotely. Using Terminal Server to run an application over
bandwidth-constrained connections, such as dial-up or shared WAN links,
is very
effective for remotely accessing and manipulating large amount s of data
because
only a screen view of the data is transmitted, rather than the data itself.
Windows Terminal Server helps users become more productive by enabling access
90http://san24mca.blogspot.com/

anywhere to
current applications on any device- including under-powered hardware
and
Non-Windows desktops. And because Terminal Server lets you use
Windows anywhere, you can take advantage of extra processing
capabilities from newer, lighter-weight devices such as the Pocket PC.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

3. WINDOWS SERVER UPDATE SERVICES


(WSUS)
WSUS provides a software update service for Microsoft Windows operating
systems and other Microsoft software. WSUS is a locally managed system that works
with the public Microsoft Update website to give system administrators more control.
By using Windows Server Update Services, administrators can manage the
distribution of Microsoft hotfixes and updates released through automatic updates to
computers in a corporate environment. A WSUS server can obtain updates either from
Microsoft Update or from another WSUS server, but at least one WSUS server in the
network must connect to Microsoft Update to get available updates. The administrator
can decide how many WSUS servers should connect directly to Microsoft Update,
based on network configuration, bandwidth, and security considerations. These
servers can then distribute updates to other downstream WSUS servers.

WSUS originated as Software Update Services (SUS), which delivered only


operating system hotfixes and patches. WSUS builds on SUS by expanding the range
of software it can update. The WSUS infrastructure allows automatic downloads of
hotfixes, updates, service packs, device drivers and feature packs to clients in an
organization from a central server(s), instead of using the public Microsoft Windows
Update website. This saves bandwidth, time and disk space, as the individual
computers in a network do not have to connect to an external server themselves, but
connect to a local central server. It also increases administrators' control and allows
clients to obtain updates in environments that do not have internet access.

3.1 Installation :
91http://san24mca.blogspot.com/

3.1.1 Software Requirements :

 Computer running Windows 2003/2000 Server with Microsoft Windows


Server Update Services (WSUS) installed.
 Microsoft .NET Framework version 2.0 installed on WSUS server.

3.1.2 Minimum Hardware Requirements :

 Both the system partition and the partition on which we install WSUS 3.0 SP2
must be formatted with the NTFS file system.
 Minimum 1 GB of free space on the system partition.
 Minimum 2 GB of free space on the volume on which database files will be
SANDEEP, MITHILESH , SYEDUL , RABI KANT

stored.
 Minimum 20 GB of free space is required on the volume on which content is
stored, 30 GB is recommended

3.1.3 Installation Steps:

1. Install software by extracting the files in the WSUSEasyReporter.zip file.


2. After extracting the files navigate to the folder where the files where extracted
and double-click on the setup.exe file.
3. Click ‘Next’ on the welcome screen.

4. Agree to the End User License Agreement and click ‘Next’.


92http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT

5. In the SQL setup dialog enter the SQL server instance for WSUS.
 If WSUS database was installed with the default WMSDE database then
enter LOCALHOST\WSUS in the SQL Instance textbox.
 If WSUS database was installed on a different SQL server then enter the
name of the SQL server in the SQL Instance textbox.
Enter the default Root web location for WSUS. Enter a website title and footer for the
WSUS Easy Reporter website. Click ‘Next’.

6. In the Select Installation Address dialog choose the site that WSUS is installed
in (Default is Default Web Site).
93http://san24mca.blogspot.com/

* A new website can be created beforehand and then chosen. The website will have to
have host headers set and our DNS server should have an alias (CNAME) created for
the site. Enter a virtual directory name. This is the name that we will connect to in the
address bar of our browser (i.e. http://LOCALHOST/WSUSReports). Click ‘Next’.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

7. Click ‘Next’ to start the installation.


8. After the setup is finished read the readme and click ‘Next’ then Close.

3.2 Configuring the network:


After we install Windows Server Update Services 3.0 Service Pack 2 (WSUS
3.0 SP2), the configuration wizard will launch automatically. We can also run the
wizard later through the Options page of the WSUS Administration Console. By
default, WSUS 3.0 SP2 is configured to use Microsoft Update as the location from
which to obtain updates. To obtain updates from Microsoft Update, the WSUS server
uses port 80 for HTTP protocol and port 443 for HTTPS protocol. This is not
configurable. If we have a proxy server on the network, we can configure WSUS 3.0
SP2 to use the proxy server. If there is a corporate firewall between WSUS and the
Internet, we might have to configure the firewall to ensure that WSUS can obtain
updates.

NOTE: Although Internet connectivity is required to download updates from


Microsoft Update, WSUS offers us the ability to import updates onto networks that
are not connected to the Internet.

3.3 To specify the way this server will obtain updates:


1. From the configuration wizard, after joining the Microsoft Improvement
Program, click Next to select the upstream server.
2. If we choose to synchronize from Microsoft Update, we are finished with the
Options page. Click Next, or select Specify Proxy Server from the navigation
94http://san24mca.blogspot.com/

pane.
3. If we choose to synchronize from another WSUS server, specify the server
name and the port on which this server will communicate with the upstream
server.
4. To use SSL, select the Use SSL when synchronizing update information check
box. In that case the servers will use port 443 for synchronization. (Make sure
that both this server and the upstream server support SSL.)
5. If this is a replica server, select the “This is a replica of the upstream server”
check box.
6. At this point, we are finished with upstream server configuration. Click Next,
or select Specify proxy server from the left navigation pane.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

3.4 Start WSUS:


To start the WSUS Administration Console, click Start, point to All Programs,
point to Administrative Tools, and then click Windows Server Update Services 3.0.

3.4.1 Configure updates and synchronization:

We can do these procedures by using either the WSUS Configuration Wizard


or the WSUS Administration Console.

 Save and download information about our upstream server and proxy server.
 Choose the language of the updates.
 Select the products for which we want to receive updates.
 Choose the classifications of updates.
 Specify the synchronization schedule for this server.

After we configure the network connection, we can download updates by


synchronizing the WSUS server. Synchronization begins when the WSUS server
contacts Microsoft Update. After the WSUS makes contact, WSUS determines
whether any new updates have been made available since the last time we
synchronized. When we synchronize the WSUS server for the first time, all the
updates are available and are ready for our approval for installation. The initial
synchronization may take a long time.

3.4.2 Configure client updates:

In Windows Server Update Services 3.0 (WSUS 3.0 SP2), the WSUS Setup
automatically configures IIS to distribute the latest version of Automatic Updates to
each client computer that contacts the WSUS server. The best way to configure
Automatic Updates depends on the network environment. In an environment that uses
Active Directory service, we can use an existing domain–based Group Policy object
(GPO) or create a new GPO. In an environment without Active Directory, use the
Local GPO. In this step, we will configure Automatic Updates and then point the
client computers to the WSUS server.
95http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT

4. BLADE SERVER
A blade server is a stripped down server computer with a modular design
optimized to minimize the use of physical space and energy Features and
specifications

4.1 NEED OF BLADE SERVER


Generally, all IT departments face a
typical challenge of increasing number of
servers when different applications
require separate infrastructure and
platforms. As a result a lot of space is
required to house these servers and that is
where the problem of real estate
management comes in as it leads to an
additional financial burden on the
company. This is because when you are
expanding physically, you not only need
the space but also need the standard
requirements of building a fresh server
room/datacenter which consists of power,
cooling, management , etc. You need a
96http://san24mca.blogspot.com/

more powerful technology which offers


the option of expansion, and is less power
hungry in the server space. Thus, broadly
speaking, consolidation around a lesser
number of servers is where blade servers
score.

4.2 FEATURES

The different blade manufacturers vary in specific configurations for their blade
servers and chassis, but the focus still remains to strip extraneous components from
the blades so the blades' components can focus on essential processing and services.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Each blade is a server by itself and generally dedicated to a single computing task
such as file sharing, SSL, data processing, Web page serving, cache management
,video/audio streaming, or firewall etc. Blade servers provide greater I/0 connectivity,
hot swap drives, and RAID-5 capabilities.

4.2.1 Virtualization

In a single blade chassis, you can have different operating systems, different memory
capacities, a mix and match of 32-bit or 64-bit CPUs, and so on. Once you have these,
you can always run virtualization software on top. Also, blades let you pair your
dynamic software with dynamic hardware, making deployment and management of
virtual servers much easier.

4.2.2 Hot Swapping


Hot swapping is the ability to add, remove and replace units at need without having to
power-off the chassis. Hot swapping can apply to PSUs, network, management and
storage units, and the blade servers themselves. Hot swapping, coupled with
redundancy, can give significant reliability benefits. It also aids maintenance, because
if a blade develops a problem it can be removed and repaired or replaced without
disruption of the other blades in the system.

4.2.3 Power:

The blade relies on the chassis to provide Power. In all chassis power switching
balances power load and requirements across the component blades' demands. The
technology ensures that power isn't wasted running underused blades, but in times of
high demand there is sufficient power available. Employing power supply unit
redundancy is necessary for critical servers.

4.2.4 Cooling

A full chassis may generate considerable heat from the activity of component blades,
so high demand blade servers require effective cooling from their chassis to operate
efficiently. The chassis' internal management systems may shut down the entire
system if the temperature rises above a certain point. It's critical, then, to follow the
directions of the blade server chassis' manufacturer when managing the server's
cooling. This might include air space around the chassis, the use of plugs for empty
97http://san24mca.blogspot.com/

bays, and environmental demands for air temperature and humidity.

4.2.5 Storage

There may be some limited storage on a blade server, and there may be additional
storage provided by a chassis. However, with the use of a SAN ,the chassis and blades
can be completely free of storage, removing the inherent heat, noise, and reliability
problems from the system completely. Everything from booting to data storage can be
done over the SAN, enabling the blade servers to be focused entirely on processing.
This configuration can increase reliability and reduce space requirements by
partitioning storage resources in one centralized location and computing resources in
another. This also eliminates storage Despite the advantages of storage outside the
blade chassis, many blades have the capacity to take one or two hard drives, usually
SATA.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

4.2.6 LED Indicators

Blade servers typically have a front panel containing a number of informational


LEDs, relating to power and system activity. There may additionally be indicators of
system failure, which may be general or specific to blade components. These optional
features will invariably come at a cost premium.

4.3 SPECIFICATION

Model: Blade Center HS20 Type 8832


Microprocessor Drivers Integrated functions:
Supports up to 2  Support for up to  Two Gigabit Ethernet
microprocessor 2 internal IDE 2.5 controllers
 Intel Xenon inch hard disk  ATI Rage XL video
Processor drive(HDD)
controller
 512 KB ECC  Support for up to
L2cache 2 up to 2 ultra  Light Path DiagnosticsTM
 533 MHz front 320 SCSI hot  Local service processor
–side bus(FBS) swap HDD  IDE HDD controller
available in an  RS-485 interface for
optional SCSI
communication with
storage expansion
unit Blade Center
management module
 USB buses for
communication with
keyboard , mouse ,
diskette drive and CD-
ROM
98http://san24mca.blogspot.com/

Environment
Memory Size Air temperature :
 Minimum :512  Height: 24.5 cm Blade server on :100 C to 350C
MB  Depth: 44.6 cm Altitude : 0 to 914 m
 Maximum : 4  Width: 2.9 cm Blade server off : -400 to 600C
GB Maximum weight: 5.4 kg Humidity
Blade sever on : 8% to 80%
Blade server off : 5% to 80%

NOTE: The OS in the blade server must provide USB support for the blade server to
recognize and use the keyboard ,mouse ,CD-ROM drive , and diskette drive. The
blade center unit uses USB
SANDEEP, MITHILESH , SYEDUL , RABI KANT

4.4 COMPONENTS OF BLADE SERVER


1. Chassis

2. Management server

3. SAN

4.4.1.Chassis: The chassis forms the housing for the blade servers, providing the necessary
services for the blades. Chassis vary in the number of blades they accept, usually from 6 to
16. It has two view front view and rear view and in between these two view there is a
mother board of blade server

PM PM SM MM FM

PM PM SM MM FM
BLOWER Rear view

BLADES
Mother board

Front view

PM stands for Power module , which manage the power control for blade server.

All the 4 power module work simultaneously and if one fails then other take care of
the power control.

SM stands for Switch module , which is connected with layer 3 switch . Both the
switch module work simultaneously and if one fail then other take care of them.

BLOWER is used to keep the temperature of blade server at required level .


99http://san24mca.blogspot.com/

MM stands for management module . It manage all the deices within a chassis . Here
one is primary and another is secondary .When primary works then secondary holds
the idle condition .This is called the heart of the System.

FM stands for fiber module .Which is connected with SAN. Both the fiber module
work simultaneously and if one fail then other take care of them

4.4.2 Management server

It use the IBM directory server software and installed in any of the Blade . The blade
which has that software will act as an administrator . It manage all the blades. It has
two hard disk and a processor of 3.0 MHz
SANDEEP, MITHILESH , SYEDUL , RABI KANT

4.4.3 Storage Area Network (SAN)

Storage Area Network (SAN) is a specialized ,high-speed network attaching servers


and storage devices and ,for this reason ,it is sometimes referred to as “the network
behind the servers .” A SAN allows “any-to –any” connection across the network
,using internetwork elements such as routers ,gateways ,hubs ,switches and directors .
A storage device is a machine that contains nothing but a disk or disks for storing
data. This storage area is shared by all blades. The disk of this storage use the RAID
technology to store the data. The details of RAID is given in article 4.5
Instead of these three
parts there is also a
keyboard ,monitor and a
mouse to monitor the
condition of all the blade
servers . Which are
attached though the KVM
switch.

A KVM ( Keyboard ,
Visual Display Unit,
Mouse) switch is a
hardware device that
allows a user to control
multiple computers from
a single keyboard, video
monitor and mouse.
Although multiple
computers are connected to the KVM, typically a smaller number of computers can be
controlled at any given time.
100http://san24mca.blogspot.com/

4.5 RAID
Redundant Array of Independent Disks (RAID) is the combining of several hard drive
into a single unit.  There are a number of RAID levels, among them the most popular
are RAID 0, RAID 1 and RAID 5, which require controllers to support them. Two
or more disk drive are combined and the result is fault tolerance and good
performance. These disks drives are usually used on servers .

Level Description Mini- Space Fault Image


mum Effici- Tolera-
no. of nce
ency
SANDEEP, MITHILESH , SYEDUL , RABI KANT

disks
In a RAID 0 system, data
are split up in blocks that
get written across all the
drives in the array. By
using multiple disks (at 2 n 0
RAI least 2) at the same time, (none
D 0 RAID 0 offers superior )
I/O performance. This
performance can be
enhanced further by using
multiple controllers,
ideally one controller per
disk
Data are stored twice by
writing them to both the
data disk (or set of data
disks) and a mirror disk 1
(or set of disks).If a disk 2 (size n-1
RAI fails, the controller uses of the disks
D1 either the data drive or small
the mirror drive for data -est
recovery and continues disk)
operation

RAID 5 is the most


common secure RAID
level. It is similar to
RAID-3 except that data
are transferred to disks by
independent read and 3 n-1 1 disk
write operations (not in
RAI parallel). The data chunks
D5 that are written are also
101http://san24mca.blogspot.com/

larger. Instead of a
dedicated parity disk,
parity information is
spread across all the
drives. You need at least
3 disks for a RAID 5
array

4.5.1 ADVANTAGES AND DISADVANTAGES OF RAID

Level Advantages Disadvantages


 RAID 0 offers great performance, both  RAID 0 is not
SANDEEP, MITHILESH , SYEDUL , RABI KANT

in read and write operations. There is fault-tolerant. If


RAID 0 no overhead caused by parity controls. one disk fails, all
 All storage capacity can be used, there data in the RAID
is no disk overhead. 0 array are lost. It
 The technology is easy to implement. should not be
used on mission-
critical systems.

 RAID 1 offers excellent read speed and  The main


a write-speed that is comparable to that disadvantage is
RAID 1 of a single disk. that the effective
 In case a disk fails, data do not have to storage capacity
be rebuild, they just have to be copied is only half of the
to the replacement disk. total disk capacity
 RAID 1 is a very simple technology. because all data
get written twice.
 Software RAID 1
solutions do not
always allow a
hot swap of a
failed disk
(meaning it
cannot be
replaced while the
server keeps
running). Ideally
a hardware
controller is used.

 Read data transactions are very fast  Disk failures have


while write data transaction are an effect on
RAID 5 somewhat slower (due to the parity that throughput,
has to be calculated). although this is
102http://san24mca.blogspot.com/

still acceptable.
 Like RAID 3, this
is complex
technology.

4.6 CONFIGURATION
The following configuration programs are provided with the blade server:

1.Configuration /Setup Utility program : This is part of the basic input /output
system(BIOS) code in blade server .
SANDEEP, MITHILESH , SYEDUL , RABI KANT

2.PXE boot agent utility program : The Preboot eXecution Environment(PXE) boot
agent utility program is part of the BIOS code in the blade server . Use it to select the
boot protocol and other boot options.

4 .6.1 Using the Configuration /Setup Utility program

 Turn on the blade server and watch the monitor screen .


 When the message Press F1 for Configuration/Setup appears ,press F1
 Follow the instructions that appears on the screen .
 Configuration /Setup Utility menu choices : The following choices are on
the Configuration /Setup Utility main menu.
 System Summary : Select this choice to display configuration , including the
type ,speed ,and cache sizes of the microprocessor and the amount of installed
memory.
 System Information : Select this choice to display information about your
blade server.
 Product Data : Select this choice to view the machine type and model of your
blade server ,the serial number , and the revision level or issue date of the
BIOS .
 Devices and I/O ports : Select this choice to set the system date and time , in
24-hour format (hour:minute:second).
 System Security : Select this choice to set a power- on password . If your set
a power- on password , you must type the power-on password to complete the
system startup .

NOTE : If you forget the power-on password , you can regain access to the blade
server through one of the following methods

 Remove the blade server battery and the reinstall it.


103http://san24mca.blogspot.com/

 Change the position of the power-on password override switch to bypass the
power-on password check the next time the blade server is turned on .

NOTE : Shut down the OS ,turn off the blade server , and remove the blade server
from the BladeCenter unit to access the switches.

 Start Options : Select this choice to view or change the start options . This
choice appears only on the full Configuration / Setup Utility main menu .
 Advance Setup : Select this choice to change setting for advanced hardware
features .
 System Partition Visibility : Select this choice to specify whether the System
Partition is to be visible or hidden .
 Memory Settings : Select this choice to manually enable a pair of memory
SANDEEP, MITHILESH , SYEDUL , RABI KANT

DIMMs.
 CPU options : Select this choice to enable or disable the microprocessor
cache .
 PCI Bus Control : Select this choice to view and set interrupts for PCI
devices and to configure the master-latency-timer value for the blade server.
 Integrated System Management Processor Settings : Select this choice to
enable or disable the Reboot on System NMI option on the menu . If you
enable this option , the blade server will automatically restart 60 seconds after
the services processor issues a Non-Maskable Interrupt (NMI) to the blade
server .
 Error Logs : Select this choice to view or clear the POST error log.
Select POST Error Log to view the three most recent error codes and messages .

 Save Settings : Select this choice to save the changes , made in the settings.
 Restore Settings : Select this choice to cancel the changes , made in the
setting and restore the previous settings.
 Load Default Settings : Select this choice to cancel the changes ,made in the
setting and restore the vendor’s settings.
 Exit Setup : Select this choice to exit from the Configuration /Setup Utility
program . If you have not saved the changes you have made in the settings,
you are whether you want to save the changes or exit without saving them.

4 .6.2 Using the PXE boot agent utility program

1.Turn on the server .

2.When the Broadcom NetXtreme Boot Agent vX.X.X prompt appears ,press
Ctrl+S.

NOTE:

 If the PXE setup prompt is not displayed ,use the Configuration /Setup Utility
104http://san24mca.blogspot.com/

program to set the enable Ethernet PXE/DHCP option .


 By default , you have 2 seconds after the prompt appears on the screen to
press Ctrl + S.

3. Use the arrow keys or press Enter to select a choice from the menu.

Press Esc to return to the previous menu.

Press the F4 key to exit

4. Follow the instructions on the screen to change the setting of the selected items ,
then press Enter .

4.7 Configuring The Gigabit Ethernet Controllers :


SANDEEP, MITHILESH , SYEDUL , RABI KANT

Two Ethernet controllers are integrated on the blade server system board which
enables simultaneously transmission and reception of data on the Ethernet Local Area
Network (LAN). However a device driver must install to enable the blade server OS
to address the Ethernet controllers . For device drivers and information about
configuring your Ethernet controllers use the Broadcom NetXtreme Gigabit Ethernet
Software .Ethernet controllers support failover, which provides automatic redundancy
for Ethernet controllers . Without failover only one Ethernet controller from each
server attached to each virtual LAN or subnet. With failover you can configure more
than one Ethernet controller from each server to attach to the same virtual LAN or
subnet . If you have configured the controllers for failover and the primary link fails ,
the secondary controller takes over . When the primary link is restored , the Ethernet
traffic switches back to the primary Ethernet controller

NOTE : To support failover on the


blade server Ethernet controllers , the
Ethernet switch modules in the
BladeCenter unit must have identical
configurations to each other.

4.8 BLADE SERVER


ADVANTAGES AND
DISADVANTAGES

4.8.1 ADVANTAGES

Take less space : Greater density and better use of the server form factor highly
reduces the total space requirements of the blade server deployment as compared to
tower or rack mounted servers.
105http://san24mca.blogspot.com/

Reduced Power Consumption and Improved Power Management : Power


supplied from the blade server chassis highly reduces the total power supply
requirement and also reduces the power required per server.

Lower Management Cost : server consolidation and resource centralization


simplifies server deployment, management and administration and improves
management, redundancy and control.

Single monitor : KVM switch helps to monitor all the server by only one system .

Simplified Cabling : Blade servers simplify cabling requirements and facilitate


highly reduced wiring. Most of the wiring related interconnects are inbuilt into the
chassis thereby greatly reducing the need for separate wiring.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Ease of upgrade - As new processor, communications, storage and interconnect


technology becomes available, it can be implemented in blades that install into
existing equipment, upgrading server operation at a minimum cost and with no
disruption of basic server functionality.

Easier Physical Deployment : Since the chassis is responsible for providing the once
redundant parts of a server, deployment of a blade server simply involves the
placement of the chassis and sliding in the blades. Redundant power modules and
consolidated communication bays simplify integration into data centers.

Flexibility- Blade systems also provide significant configuration flexibility, offering a


choice among myriad servers, I/O options and other internal components. The chassis
can accommodate a mix of x86 (Intel or AMD CPUs) and Unix RISC servers, storage
blades, workstations and PC blades, as well as multiple I/O connections per blade.

4.8.2 DISADVANTAGES

Expensive configuration

Although plugging in a new server blade into the blade server is easy once the system
is running, initial configuration can be labor-intensive and expensive in complex
application environments. This disadvantage comes with the fact that blade servers
are specialized computing equipment and their configuration and administration often
requires training provided by the vendor which may not be cheap unless you have a
special free-training deal with the vendor.

Expensive tool ( economies of scale)

If you do not fill the blade chassis with server blades, you are not fully utilizing it.
Blade chassis are often made to hold 14 or 16 server blades.

The general rule of thumb is that blade servers are not suitable and economical for
applications requiring less than 5-10 servers. Applications requiring less than 5-10
server blades (10-20 CPUs) are best devoted to standalone server systems.
106http://san24mca.blogspot.com/

Incompatible Chassis

Blade systems vary between manufacturers. Once you bought blade server from a
particular vendor, it is not always easy to switch to another vendor because of
servicing agreements and also because a competitor is unlikely going to have the
same expertise in your equipment as your vendor. You could theoretically use your
server blades in competitor's blade chassis, but practically blade chassis are not
standardized. It is unlikely that IBM would get together with Dell and HP to share
chassis. Chassis is what makes their products unique. Server blades are often designed
to only run in the company's own chassis.

Business case
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Blade servers are not the best solution for everything. If you have a very large
transaction processing application requiring high read/write ratios, then you may run
into bottle neck with your bus speeds, memory limitations, disk access, and network
I/O. Email and Web serving are situations where blade computing suits well.

Heating and cooling

One often forgotten disadvantage is HVAC. While individual stand-alone servers can
be distributed throughout the building and may not necessarily need special
accommodations for cooling, blade servers being very powerful these days produce
massive amounts of heat per square foot. If untreated, this could melt them down.
When purchasing blade servers, it is important to keep in mind that additional
resources will be needed also for HVAC.
5. DHCP SERVER

A DHCP
assigns IP addresses to client
computers. This is very often
used in enterprise networks to
reduce configuration efforts.
All IP addresses of all
computers are stored in a
database that resides on a
server machine.

DHCP supports four strategies for IP address allocation. These are independent
features. A particular server can offer any or none of them.

1. Manual. The unique client identifier-to-IP address binding has been made by
an administrator. Therefore the DHCP service should not reallocate IP
addresses of this type to other clients after the lease expires. This type of IP
address allocation is useful when the administrator wants a host to maintain
the same IP address but still wants to detect when an IP address is no longer
107http://san24mca.blogspot.com/

being used. An example is a host that provides a service located by the IP


address, like mail.
2. Permanent. The server's administrator creates a configuration for the server
that includes only IP addresses, and gives this configuration to clients. After
an IP address is associated with a MAC address, the association is permanent
unless the server's administrator intervenes. Allocating permanent IP addresses
has the drawback that such IP addresses cannot be reclaimed automatically.
3. Dynamic (through leases with limited duration). The server tracks leases and
gives IP addresses to DHCP clients automatically as they become available
when leases expire. No interaction is needed by the administrator. This is the
preferred IP address type for non-BOOTP clients.
4. BOOTP. Addresses that are reserved for use by BOOTP clients. This allows
an administrator to enter a pool of IP addresses intended only for BOOTP
clients.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
5.1 Installing DHCP Server is very easy in win server 2003

 First you need to go to Start–>All Programs–>Administrative Tools–>Manage


Your Server

108http://san24mca.blogspot.com/

 Here you need to select Add or remove a role


SANDEEP, MITHILESH , SYEDUL , RABI KANT
 Verify the following steps click on Next

109http://san24mca.blogspot.com/

 Select Server Role as DHCP Server option click on Next


SANDEEP, MITHILESH , SYEDUL , RABI KANT


Summary selection click on Next

SANDEEP, MITHILESH , SYEDUL , RABI KANT 110http://san24mca.blogspot.com/

Installing DHCP Server in progress


 Now this will prompt new scope welcome screen click next

111http://san24mca.blogspot.com/

 A scope is a collection of IP addresses for computers on a subnet that use


DHCP.Enter the name and description of your scope click next
SANDEEP, MITHILESH , SYEDUL , RABI KANT
 Now you need to define the range of addresses that the scope will distribute
across the network , the subnet mask for the IP address . Enter the appropriate
details and click next.

112http://san24mca.blogspot.com/

 Enter the IP address range that you want to exclude and click on next
SANDEEP, MITHILESH , SYEDUL , RABI KANT
 Select lease duration how long a client can use an IP address assigned to it
from this scope. It is recommended to add longer leases for a fixed network (in
the office for example) and shorter leases for remote connections or laptop
computers and click next

113http://san24mca.blogspot.com/

 You are given a choice of whether or not you wish to configure the DHCP
options for the scope now or later. You can select Yes, I want to radio button
and click next
SANDEEP, MITHILESH , SYEDUL , RABI KANT
 Enter the router, or gateway, IP address click next. The client computers will
then know which router to use and click next

114http://san24mca.blogspot.com/

 Enter the DNS and domain name settings can be entered. The DNS server IP
address will be distributed by the DHCP server and given to the client click
next
SANDEEP, MITHILESH , SYEDUL , RABI KANT
 If you have WINS setup then here is where to enter the IP Address of the
WINS server. You can just input the server name into the appropriate box and
press Resolve” to allow it to find the IP address itself click next

115http://san24mca.blogspot.com/

 Now you need to activate this scope now and click next
SANDEEP, MITHILESH , SYEDUL , RABI KANT
 DHCP Server new scope installation was finished and click finish

116http://san24mca.blogspot.com/

 Now your server is now a DHCP server message and click finish
SANDEEP, MITHILESH , SYEDUL , RABI KANT
5.2 Configuring DHCP

 Now you need to go to Start—>Administrative Tools—>DHCP

117http://san24mca.blogspot.com/

 Right Click on your server click on Authorize your DHCP Server


SANDEEP, MITHILESH , SYEDUL , RABI KANT

 Authorization completed now your DHCP server is up and running


DHCP servers permit you to reserve an IP address for a client. This means that
the specific network client will have the same IP for as long as you wanted it to. To
do this you will have to know the physical address (MAC) of each network card. Enter
118http://san24mca.blogspot.com/

the reservation name, desired IP address, MAC address and description – choose
whether you want to support DHCP or BOOTP and press add. The new reservation
will be added to the list.
SANDEEP, MITHILESH , SYEDUL , RABI KANT

So it is very easy to configure DHCP server in win server 2003 now you can
configure your windows client pc to check your DHCP server is working or not.

If you want to install and configure win server 2003 domain controller with DNS
setup check here .
5.3 Advantages and Disadvantages

Advantages :

DHCP servers offer a number of advantages over earlier methods of getting IP


addresses.

1. Automatic management of IP addresses, including the prevention of duplicate


IP address problems
2. Allows support for BOOTP clients, so you can easily transition your networks
from BOOTP to DHCP
3. Allows the administrator to set lease times, even on manually allocated IP
addresses.
4. Allows limiting which MAC addresses are served with dynamic IP addresses
5. Allows the administrator to configure additional DHCP option types, over and
above what is possible with BOOTP
6. Allows the definition of the pool or pools of IP addresses that can be allocated
dynamically. A user might have a server that forces the pool to be a whole
subnet or network. The server should not force such a pool to consist of
contiguous IP addresses.
7. Allows the association of two or more dynamic IP address pools on separate
IP networks (or subnets). This is the basic support for secondary networks. It
119http://san24mca.blogspot.com/

allows a router to act as a BOOTP relay for an interface which has more than
one IP network or subnet IP address.

Here are some features that are not part of the DHCP server itself, but related to the
way it is administered.

1. Central administration of multiple servers


2. The ability to make changes while the server is running and leases are being
tracked. For example, you can add or take away IP addresses from a pool, or
you can modify parameters.
3. The ability to make global modifications (those that apply to all entries) to
parameters, or to make modifications to groups of clients or pools
4. The maintenance of a lease audit trail, such as a log of the leases granted
SANDEEP, MITHILESH , SYEDUL , RABI KANT

Disadvantages:

1. Only some of the DHCP client implementations work properly with the DHCP
Server in windows server 2003.

2. The information in DHCP server is automatically delivered to all the DHCP clients
Thus , it become important to put correct information into DHCP server.

3. If there is a single DHCP server and it is not available, lease will not be requested or
renewed ,this way it will be single point of failure for the network.

4. In order to use DHCP on a multi segment network , DHCP server or relay agent
should be placed on each segment .you can also ensure that the router is forwarding
Bootstrap protocol Broadcasts.

You might also like