HNT Level 3 Coc Based Not
HNT Level 3 Coc Based Not
TCP/IP is not actually a single protocol, but a set of protocols that operate at different levels. The levels involved in TCP/IP do not exactly match those of the OSI reference model. Instead of
seven layers, TCP/IP specifies only four:
Network interface layer, Internet layer, Transport layer and Application layer
Each of these layers corresponds to one or more layers of the OSI reference model. The table
OSI Layer TCP/IP Protocols
below shows the correspondence between OSI layers and TCP/IP layers.
7=Application Telnet DHCP
OSI Layers TCP/IP Layers
6=Presentation FTP SNMP
Application
5=Session SMTP DNS
Presentation Application
4=Transport TCP UDP
Session
3=Network IP ARP RARP
Transport Transport
2=Datalink Hardware oriented
Network Internet
1=Physical Hardware oriented
Data-link
TCP/IP is an industry standard and is an open protocol. This means it is not controlled by a single company, and is less subject to compatibility issues.
OSI Layers
1) Physical
— Physical interface between devices
— Characteristics
• Mechanical - interface specs
• Electrical - voltage levels for bits, transmission rate
2) Data Link
— Basic services: error detection and control, flow control at the link level (point to point)
— Higher layers may assume error free transmission
— Later a sublayer is added to Data Link Layer
— MAC (Medium Access Control) sublayer
— to deal with broadcast networks
3) Network
— Transfer of information through communication network
— network related issues
— Network nodes (relays/routers) should perform switching and routing functions
— QoS (Quality of Service) and congestion control are also addressed in this layer
— Several other internetworking issues e.g. differences in addressing, max. Data length, etc.
— Higher layers do not need to know about underlying networking technology
— Not needed on direct links
4) Transport
— End to end exchange of data
— In sequence, no losses, no duplicates
— If needed, upper layer data are split into smaller units
• Transmission Control Protocol (TCP)
• connection oriented
• reliable delivery of data
• ordering of delivery
• User Datagram Protocol (UDP)
• connectionless service
Page 1 of 18
Summary
The 7 layers of OSI (the higher the level, the more complex the task)
Application: Relates to the services that support user applications (e.g. file transfer, databases, email)
Presentation: Acts as a translator for different types of system (e.g. IBM, Apple, Sun) – translates into commonly understood intermediate format
Session: Allows 2 computers on different computers to run a session (highly structure dialogue used for comms)
Transport: Ensures that packets are sent error-free, in sequence, without loss or duplication
Network: Responsible for adding addresses and determining the route to the destination computer
Data-link: Controls the electrical impulses that enter and leave the cable
Physical: Transmits the bit stream on the cable – totally hardware oriented
addresses.
RARP stands for the reverse address resolution protocol, and is responsible for translating from MAC addresses to IP addresses. Because of the service provided by ARP and RARP, all
protocols above them in the OSI model are able to use IP addresses only when referring to network devices.
ICMP
ICMP is the Internet Message Control Protocol. ICMP is used to transmit status and error messages between network stations. For example, whenever you type a URL into Internet Explorer
and you get the message “Page cannot be displayed”, it is an ICMP packet that is responsible.
DHCP
Page 2 of 18
Domain Name Service Protocol (DNS) is used to resolve Internet names to IP addresses.
Hypertext Transfer Protocol (HTTP) is used to transfer files that make up the Web pages of the World Wide Web.
SNMP (Simple Network Management Protocol) It was developed as a network management tool for networks running TCP/IP. Using SNMP, network administrators can administer servers
and other network devices from remote workstations.
SMTP is the standard protocol for transferring emails between hosts
SMTP is the protocol used to send email on the Internet. The user receiving the email will need to use another protocol to access the incoming mail from the mail server. Two
different protocols exist for this purpose: the Post Office Protocol (POP3) and the newer alternative, Internet Message Access Protocol (IMAP).
Receiving email can use either the Post Office Protocol (POP3) or the Internet Message Access Protocol (IMAP)
Electronic mail (email) is a way of sending messages consisting of text, video, audio or pictures to a user in a different part of the world
The World Wide Web (WWW) is a way of browsing multimedia Internet content. The WWW uses the Hypertext Transport Protocol (HTTP), which in turn uses the TCP protocol to
communicate
FTP
The file transport protocol (FTP) uses the TCP protocol as the underlying transport protocol. The purpose of FTP is to safely and efficiently transport files over computer networks.
Telnet
The TELNET protocol is used for providing remote terminal access over a network. For example, using TELNET a user can log in to another computer somewhere else on the network and
take part in an interactive session on that computer. TELNET also uses TCP as its underlying basis for communications.
Summary of Key Points
The TCP/IP protocol UDP (User Datagram Protocol) provides connectionless best effort delivery transmission.
The address resolution protocol (ARP) and the reverse address resolution protocol (RARP) are responsible for translating between the 48-bit hardware MAC address and IP
addresses.
ICMP (Internet Message Control Protocol) is used to transmit status and error messages.
Every computer on a network must have a unique address. If two computers have the same address an address conflict occurs.
There are two ways of assigning addresses to computers on a network: static and dynamic addressing.
In static IP addressing, IP addresses are assigned manually by the network administrator. In dynamic IP addressing they are leased automatically by the program running on the
network server.
The process of translating between computer names and IP addresses is called name resolution.
DHCP (Dynamic Host Configuration Protocol) is the protocol used in assigning dynamic IP addresses.
DNS (Domain Name Service) is the protocol used in translating between host names and IP addresses.
SNMP (Simple Network Management Protocol) can be used by network administrators to remotely administer network devices.
SMTP (Simple Mail Transfer Protocol) is used for transferring email messages.
Ping, tracert, ipconfig, route, nslookup and netstat are useful TCP/IP troubleshooting tools
TCP/IP Utilities
TCP/IP also provides a number of command-line utilities that can be useful when troubleshooting networks. You can use any of these utilities at the DOS command prompt in Windows.
No Utilities Function
1 Ping To test if your network connection is complete between two computers, you can use the Packet Internet Groper, better known as ping. The ping utility works by
sending a message to a remote computer. OR Indicates whether a remote host can be reached.
Page 3 of 18
3 Ipconfig This diagnostic command displays all current TCP/IP network-configuration values. This command is useful on systems running DHCP, allowing users to
determine which TCP/IP configuration values have been configured by DHCP.
4 ifcongif Provides information about the basic configuration of the interface. It is useful for detecting bad IP addresses, incorrect subnet masks, and Improper broadcast
addresses.
5 arp Provides information about Ethernet/IP address translation. It can be used to detect systems on the local network that are configured with the wrong IP address.
6 netstat Provides a variety of information. It is commonly used to display detailed statistics about each network interface, network sockets, and the network routing table.
7 Nslookup Provides information about the DNS name service. OR Nslookup is a utility that can be used to manually query the DNS database. It can be a useful troubleshooting
tool if the DNS server is not working correctly.
9 ripquery Provides information about the contents of the RIP update packet being sent or received by your system.
10 Route The route command can be used to display and modify the routing table of a computer.
11 traceroute Tells you which route packets take going from your system to a remote system. Information about each hop is printed.
12 etherfind Analyses the individual packets exchanged between hosts on the network. It is most useful for analyzing protocol problems.
13 Nbtstat: (NetBIOS over TCP/IP) is a tool for troubleshooting NetBIOS names over TCP/IP. This tool is helpful when TCP/IP is having problems resolving NetBIOS names
to IP addresses. Type nbtstat at the command prompt to see a list of command-line
options for this command.
14 PathPing: is a combination of the Ping and Tracert tools, and it contains options not found in Ping and Tracert. PathPing pings a host computer and traces the route to that host.
15 (NetDiag.exe) NetDiag is a diagnostic tool that can help you locate networking problems and connectivity problems. The NetDiag tool performs a series of steps to test the
Network Connectivity functionality of the network components. It can provide a lot of information, and it is rather easy to use.
Tester
16 NetCap: is a network monitor capture utility that captures data frames, or packets, entering and leaving a computer.
· A variety of operating systems can be supported on the client computers, but the server needs to run an
· Can be implemented on a wide range of operating systems
operating system that supports networking
· More time consuming to maintain the software being used (as computers must be managed · Less time consuming to maintain the software being used (as most of the maintenance is managed from
individually) the server)
· Very low levels of security supported or none at all. · High levels of security are supported,
Page 4 of 18
· Does not require a server · Requires a server running a server operating system
There are three ways for transmitting data from one point to another
1. Simplex: In simplex mode the communication can take place in one direction. The receiver receives the signal from the transmitting device. In this mode the flow of information
2. Half-duplex: In half-duplex mode the communication channel is used in both directions, but only in one direction at a time. Thus a half-duplex line can alternately send and
receive data.
3. Full-duplex: In full duplex the communication channel is used in both directions at the same time. Use of full-duplex line improves the efficiency as the line turn-around time
required in half-duplex arrangement is eliminated. Example of this mode of transmission is the telephone line.
The device, which converts digital signal into analog, and the reverse, is known as modem.
A network medium (transmission medium) is a material on which data is transferring from one device to another device. The network medium can be two types i.e.
This type of transmission medium uses wire or cable lines to connect the devices physically. Wired transmission medium includes the different cabling types that are used to connect the computers
physically.
Page 5 of 18
Twisted pair cable consists of strands of insulated copper wires that are twisted together in pair to form a cable.
Unshielded Twisted Pair cables have not any protective sheath that covers the wires.
Category 1- This refers to traditional telephone cable that can carry voice but not data transmissions.
Category 2- This category certifies UTP cable for data transmissions up to 4 mega bits per second (Mbps).
Category 3- This category certifies UTP cable for data transmissions up to 16 Mbps.
Category 4- This category certifies UTP cable for data transmissions up to 20 Mbps.
Category 5- This category certifies UTP cable for data transmissions up to 100 Mbps.
Category 5e (6)- Improved version of cat 5 category. The bandwidth is up to 250 Mbps.
One potential problem with all types of cablings is crosstalk. Crosstalk is defined as the situation in which, signals from one line interfering with signals from another line.
As it is with telephone cabling, a twisted-pair cable network requires connectors and other hardware to ensure proper installation.
Connection Hardware:
Twisted pair cabling uses RJ-45 telephone connecters to connect to a computer. These are similar to RJ-11 telephone connectors.
Although RJ-11 and RJ-45 connectors look similar, there are crucial differences between them.
The RJ-45 connector is slightly larger and will not fit in to the RJ-11 telephone jack. The RJ-45 connecter houses eight cable connections, while the RJ-11 houses only four.
UTP Advantages:
It is relatively inexpensive
Easy to install
It is a familiar technology
UTP Disadvantages:
UTP is potentially more sensitive to external electromagnetic interference (i.e. crosstalk) and attenuation (a decrease in the strength of a transmitted signal) than other media
Not suitable for transmitting data over long distances at high speeds
Shielded twisted pair (STP) is similar to UTP except it contains a copper braid jacket to ‘shield’ the wires from electrical interference. It can support transmissions over greater distances than UTP
STP provides better performance than UTP cables in environments with high noise levels - high levels of unwanted electrical signals.
2. Coaxial cable
In its simplest form, coaxial cable consists of a core of copper wire surrounded by insulator, a braided metal shielding, and outer cover.
The term shielding refers to the woven or stranded metal mesh that surrounds some types of cabling.
Page 6 of 18
Thinnet Cable:
Thinnet coaxial cable is a flexible coaxial cable about 0.64 centimeters thick.
Because this type of coaxial cable is flexible and easy to work with, it can be used in almost any type of network installation.
Thinnet coaxial cable can carry a signal for a distance of up to approximately 185 meters before the signal starts to suffer attenuation.
Thicknet Cable:
Thicknet cable is a relatively rigid coaxial cable about 1.27 centimeters in diameter.
Thicknet cable’s copper core is thicker than a thinnet cable copper core.
The thicker the copper core, the farther the cable can carry signals. This means that thicknet can carry signals farther than thinnet cable.
Thicknet cable can carry a signal for 500 meters
Therefore, because of thicknet's ability to support data transfer over longer distances, it is sometimes used as a backbone to connect several smaller thinnet-based networks.
Thick coaxial cable has an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial a great choice when running longer lengths in a liner
bus network.
Thinnet cables are flexible, easy to install and relatively inexpensive. However, a thicknet cable does not bend easily and is therefore, harder to install. In addition, thicknet cable is more expensive than
Both thinnet and thicknet cables use a connection component, known as a BNC connector, to make the connections between the cable and the computers.
The origin of the acronym "BNC" is unclear, and there have been many names ascribed to these letters, from "British Naval Connector" to "Bayonet Neill-Councelman." Because there is no
consensus on the proper name and because the technology industry universally refers to these simply as BNC-type connectors.
Due to its high metallic content, coax cable is usually more expensive than other cable types.
3. Fiber-optic Cable
Optical fiber of fiber optics cables are created by binding together hundreds to thousands of strands of smooth, very thin (as human hair) glass or plastic fiber.
Fiber-optic Cable contains glass fibers rather than copper wire. Signals are transmitted across these fibers in the form of light pulses rather than electrical pulses.
Fiber-optic cable consists of pure silicon glass cylinders or strands surrounded by cladding. Signals are transmitted as light pulses through the core of the optical fiber (i.e. through the strands).
Unlike copper cable, the signals on fiber-optic cable are not subject to the problems of attenuation, or crosstalk. This greatly increases the potential transmission distance. In addition fiber-optic cable is more
secure than copper wire.
Page 7 of 18
Transfer/Transmission Control ProtocolTCP / IP Backbone protocol. The most widely used protocol
NetBIOS extended user interface NetBEUI Microsoft protocol that doesn’t support routing to other network. Running only Windows-based clients.
File transfer Protocol FTP used to send and received file from a remote host
Simple mail Transfer protocol SMTP Used to send Email over a network
Hyper text transfer protocol HTTP Used for Internet to send document that encoded in HTML.
This protocol, the core of the World Wide Web, facilitates retrieval and transfer of hypertext (mixed media) documents.
Apple Talk Apple Talk Protocol suite to network Macintosh computer and a peer-to-peer network protocol
OSI Model OSI Layers A way of illustrating how information functions travels through network of its 7 layers.
Telnet Telnet A remote terminal emulation protocol that enables clients to log on to remote hosts on the network.
Serial Line Internet Protocol SLIP/ PPP SLIP and PPP encapsulate the IP packets so that they can be sent over a dial up phone connection to an access provider’s modem.
Domain Name System. DNS Provides meaningful names like achilles.mycorp.com for computers to replace numerical addresses like 123.45.67.89.
1) Repeater
o A Repeater is a physical layer device used to interconnect the media segments of an extended network.
o Repeaters receive signals form one network segment and amplify, retime, and retransmit those signals to another network segment.
2) Hub
A Hub is a physical layer device that connects multiple user stations, each via a dedicated cable.
Hubs do not have any processing Power; it is just a box where you plug cables, and works in half-duplex manner.
3) Bridges
o Bridges are data communication devices that operate at layer 2, (data-link layer).
o Bridges learn addresses by using source address to learn the location of computers.
Page 8 of 18
4) Switches
• They operate on frames; understand addresses and only forward when necessary.
• It looks at the MAC addresses of the devices connected to it to determine the correct port.
• By forwarding data only to the system to which the data is addressed, the switch decreases the amount of traffic on each network link dramatically.
5) Router
Router is a processor that connects two networks and whose primary function is to relay data form one network to the other on its route from the source to the destination
end system.
Router is an intermediate system used to connect two networks they may or may not be similar.
The basic requirement for a router is that it must have at least two network interfaces.
If they are LAN interfaces, the router can manage and route the information between two LAN segments.
More commonly, a router is used to provide connectivity across wide area networks
The router employs an internet protocol (IP) present in each router and each end systems of the network.
6) Brouter
• Brouters operate at the data-link and network layers of the OSI model.
• A brouter is a device that can route traffic that can be routed and bridge anything that cannot be routed.
• As bridges have been replaced by the more flexible routers, brouters have also fallen out of favor.
7) Gateway
• Unlike routers, a gateway converts the format of data sent between two networks.
• A router that can route data from an IPX network to an IP network is, technically, a gateway.
• But a gateway has to identify the protocols used in the networks, and recognize the data format, and convert the message format into suitable format to be accepted by
• They operate at the layers above the network layer of the OSI model.
Summary
A repeater is a device that boosts a network signal. It is commonly used in the bus topology to extend the usable length of the bus
Hubs are used to centralize data traffic and localize failures. If one cable breaks, it will not shut down the entire network
Active hubs also act as repeaters, amplifying the signal and passing it on to every port on the hub
Hybrid hubs allow connections between networks with different types of cabling
Page 9 of 18
A router is also similar to a bridge, except that it can link together networks that use different network technologies
Wireless networks use infrared, laser or radio waves to eliminate the need for physical cabling
Topologies
• It is the shape (or the physical connectivity) of the network or the layout of connected devices on a network.
• The topology as seen from the layout of the cable, or the route followed by the electrical signals.
• Logical topology - defines how the hosts access the media to send data.
• The connections between nodes as seen by data traveling from one node to another - reflects the network’s function, use, or implementation without regard to the
• Servers: computers used to store the shared information and have all the other computers reference that information over a network.
• Clients: computers on a network that use, but do not provide, network resources.
• Peers: computers on a network that both use and provide network resources.
Bus Use of cable is economical. Network can slow down in heavy traffic.
•
Media is inexpensive and easy to work with. Problems are difficult to isolate.
•
System is simple and reliable. Cable break can affect many users.
Bus is easy to extend.
Ring System provides equal access for all computers. Failure of one computer can affect the rest of the network.
•
Problems are hard to isolate.
•
Network reconfiguration disrupts operation.
Performance is even despite many users. •
Star Modifying system and adding new computers is easy. If the centralized point fails, the network fails.
Failure of one computer does not affect the rest of the network.
Mesh System provides increased redundancy and reliability as well as ease of troubleshooting. System is expensive to install because it uses a lot of cabling.
• Integrated services digital network (ISDN) was intended to be a world wide public telecommunication network to replace existing public telecommunication networks and
• ISDN has standardized user interfaces, implemented a set of digital switches and paths supporting a broad range of traffic types and providing a value added processing service
• ISDN is multiple networks, but integrated to provide user with single, uniform accessibility and world wide interconnection.
Glossary
Active Directory (DC - Domain Controller): Active Directory is a database that keeps track of all the user accounts and passwords in your organization. It allows you to store your user
accounts and passwords in one protected location, improving your organization's security.
Active Directory is subdivided into one or more domains. A domain is a security boundary. Each domain is hosted by a server computer called a domain controller (DC). A domain controller
Mail server: is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery. A computer
dedicated to running such applications is also called a mail server. Microsoft Exchange, qmail, Exim and sendmail are among the more common mail server programs.
Page 10 of 18
Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and
newsgroups. Internet websites now provide personal, educational, political and economic resources to every corner of the planet.
Intranet: An intranet is a private network utilizing Internet-type tools, but available only within that organization. For large organizations, an intranet provides an easy access mode to
corporate information for employees.
1000Base-T Also referred to as Gigabit Ethernet, an Ethernet standard capable of 1 gigabit per second (Gbps), or 1,000 Mbps,
Over twisted-pair wiring.
100Base-T Also called Fast Ethernet, an Ethernet standard that has a capacity of 100 Mbps over twisted-pair wiring.
10Base-T An Ethernet standard with a capacity of 10 Mbps over twisted-pair wiring.
Active Directory The directory service used by modern Windows domains. Active Directory holds all user and group accounts as well as information about network resources, policies, and
other objects.
Address Resolution Protocol (ARP) A protocol used by computers to resolve IP addresses to physical (or MAC) network addresses, so that traffic can be forwarded appropriately on a
network.
AppleTalk AppleTalk is a networking protocol developed by Apple Computer, Inc. for communication between Apple Macintosh computers.
Automatic Private IP Addressing (APIPA) A service that automatically assigns IP addresses to network clients when no DHCP server is available. APIPA is used by the client to assign an IP
address in the range of 169.254.0.1 to 169.254.255.254. This particular range of addresses was set aside for use by the Internet Assigned Numbers Authority (IANA) for use only on private,
internal networks.
cookie A small text file that Web servers place on a user’s computer to later identify the individual on subsequent Web site visits; often used to customize the browser’s return experience.
Although cookies facilitate personalized settings for each Web site, they are also a potential source of personal information theft, unsolicited e-mail (or spam), and undesired tracking of Internet
use. Internet Explorer 6 contains cookie management features that can help control cookie usage and protect privacy.
Digital Subscriber Line (DSL) A broadband Internet access method that runs over standard copper telephone wiring using different channels to transmit and receive data at much higher
speeds than a traditional analog dial-up modem.
ADSL which divides the phone line into three channels. One channel is used for voice, whereas the other two channels are used for data transmission and reception. Symmetric DSL (SDSL) is
a variant that provides equal upload and download speeds.
DNS server A DNS server resolves Domain Name System requests sent by remote clients. DNS servers maintain databases of local host-name-to-IP address mappings and can also
communicate with remote DNS servers to resolve remote addresses.
Internet Information Server (IIS) A full-featured software suite that enables the creation and hosting of Web, FTP, and SMTP
services. The version included in Windows XP Professional allows up to 10 concurrent connections and is designed for eveloping Web sites or hosting small intranet sites.
NetBIOS Extended User Interface (NetBEUI) A network protocol created by IBM and supported in Windows XP for routing network traffic. It has been largely supplanted in Windows XP
by TCP/IP.
NetBIOS The default application programming interface used for networking in earlier versions of Windows. Originally combined with NetBEUI (which is still supported), it can be paired
with other networking protocols such as IP and IPX. NetBIOS uses 15-character names to identify individual computers.
Telnet An insecure protocol designed to provide remote access to a computer by performing terminal emulation, thus allowing a
user to communicate with a computer as though he or she were typing directly at a local console. Telnet is a text-only protocol and is used primarily by UNIX-based systems. Telnet sends all
data, including user names and passwords, in clear text; its use should be avoided for security reasons.
Serial communications The transmission of information from computer to computer or from computer to peripheral device one bit at a time.
Serial communications can be synchronous and controlled by a clock.
Parallel communications The transmission of information from computer to computer or from computer to peripheral device, in which all the bits that make up the character are transmitted at
the same time over a multiline cable.
Parallel port An input/output (I/O) port that manages information eight bits at a time; often used to connect a parallel printer.
Serial port A computer input/output port that supports serial communications, in which information is processed one bit at a time.
RS-232-C is a common protocol used on serial ports when communicating with modems, printers, mice, and other peripherals.
Bandwidth In networking, the transmission capacity of a computer or a communications channel, stated in megabits per second (Mbps). For example, FDDI (Fiber Distributed Data Interface)
has a bandwidth of 100Mbps. To relate this to a real-world example, a complete page of text, in English, is approximately 16,000 bits.
Packet switching: In this mechanism a message is split up into packets of a fixed size. Besides the blocks of data to be sent, a packet has a header that contains destination and source
addresses, control information, message number, number of current and last packet, acknowledgement and error checking bytes.
These chunks are then routed through the network the best way possible to reach the destination.
Page 11 of 18
network.
Circuit switching involves three phases: circuit establishment, data transfer and circuit termination.
Packet-switched network A network that consists of a series of interconnected circuits that route individual packets of data over one of several routes, offering flexibility and high reliability.
A packet-switched network may also be called connectionless because it contains many different possible connections and routes that a packet might take to reach its destination. The term
often refers to networks using the international standard X.25.
Circuit switching: dedicated circuit per call: telephone net
Circuit switching is where communication uses a direct dedicated connection for the duration of the transmission
Communication using smaller packets of data is known as packet switching, whereas if a direct dedicated communication line is used for the duration of the transmission it is
known as circuit switching.
There are three different ways in which packets can be addressed:
The set of rules that governs how network traffic is controlled is called the access method
When using the CSMA/CD access method, a computer waits until the network is quiet and then transmits its data. If two computers transmit at the same time, the data will
collide and have to be re-sent. If two data packets collide, both will be destroyed
The ports of switches, bridges and routers are on separate collision domains, whereas those of hubs and repeaters are in the same collision domain.
When using the CSMA/CA access method, a computer transmits its intent to transmit before actually sending the data
A collision domain is a part of a LAN (or an entire LAN) where two computer transmitting at the same time will cause a collision. Because switches, bridges and routers do
not forward unnecessary packets the different ports of these devices operate in different collision domains. Repeaters and hubs broadcast all packets to all ports, so their ports
are in the same collision domain.
Server Types: There are different types of servers based on the need of the organization.
1. File Server: These are servers that provide centralized data storage that will be shared among the network.
2. Printer Server : Printer servers are servers that control one or more printers on the network
3. Database Server: These are servers that centrally store database and provide data to the client computer.
4. Web Server: Web servers are servers that store WebPages that will be viewed using web browsers in the network.
Web browser is a soft ware that runs on the user’s computer & allows them to view different websites. Examples of web browsers includes Internet Explorer, Mozila Fire fox,Opera etc.
5. Mail Servers: Mail servers are servers that are used to manage & control e-mail communications across the network.
IP Address
Page 12 of 18
The first byte of class C addresses is always between 192 and 223
The first byte of class D addresses is always between 224 and 239
The first byte of class E addresses is always between 240 and 255
Class D addresses are used for multicasting; there is only one block in this class.
Class E addresses are reserved for special purposes; most of the block is wasted.
Network Addresses: The network address (the first address in the block) is the one that is assigned to the organization.
The network address defines the network to the rest of the Internet. Unicast, Multicast, and Broadcast Addresses
The first phase of Ethernet standards had a transmission speed of 10Mbps. Three of the most common of these are known as 10Base2, 10Base5 and 10BaseT. The
following table summarises some of the features of each specification.
ETHERNET STANDARDS
UTP
Cable type Thinnet coaxial Thicknet coaxial
(Cat. 3 or higher)
GLOSSARY
Page 13 of 18
Access method A set of rules for sending packets of data onto a network.
Access permissions A security model in client-server networks in which a user enters a password to log in to the network. Network permissions are assigned on a user-by-user or
group-by-group basis.
AM Amplitude Modulation. A technique used to encode digital data as an analogue signal to be transmitted over a network, by modulating the amplitude of the
analogue signal.
ARP Address Resolution Protocol. Part of the TCP/IP protocol stack, it is responsible for translating from IP addresses to MAC addresses. Also see RARP.
Asynchronous communication A technique that splits up a bitstream into a number of characters (typically 5-8 bits) to be communicated over a network. A way of overcoming the
synchronisation problem in data communications.
Backbone A cable to which multiple computers or network nodes are attached in the bus topology (see also trunk, segment).
Bandwidth The range of frequencies that can be safely transmitted on an analogue communication channel without loss of signal.
Baseband A communication system in which a single carrier (e.g. cable) is used to transmits digital information, for example the Ethernet.
Bridge Device that connects two subnets that use the same communication protocol, passing only packets that are intended for the other subnet.
Broadband A high bandwidth communication system in which multiple signals are multiplexed onto the same channel, usually using analogue communication.
Collision Two or more computers transmitting at the same time within the same collision domain.
Collision domain A portion of a network where two or more computers transmitting at the same time will interfere with each other.
CSMA/CD Carrier Sense Multiple Access with Collision Detection. An access method used to share bandwidth among a maximum of 1024 stations. Two or more stations
transmitting at the same time will cause a collision, forcing random waiting periods before retransmission is attempted.
CSMA/CA Carrier Sense Multiple Access with Collision Avoidance. An access method in which computers broadcast their intent to transmit before it actually does so, thus
preventing collisions from occurring. Used by AppleTalk and wireless Ethernet specifications.
DHCP The Dynamic Host Configuration Protocol. A protocol used to allocate IP addresses dynamically.
DNS The Domain Name System. A protocol used to translate between domain names (e.g. www.yahoo.com) and IP addresses.
Fast Ethernet A set of Ethernet specifications that support up to 100Mbps transmission rates using category 5 twisted pair or fibre-optic cable.
Fibre-optic cable A cable consisting of a glass core surrounded by plastic that transmits using light pulses rather than electricity.
FTP File Transfer Protocol. A protocol designed to ensure reliable transfer of files between 2 computers.
HTTP Hypertext Transfer Protocol. The protocol used to exchange multimedia web content over the Internet.
Hub A multiport device that broadcasts packets received on one port to all other ports. All ports are in the same collision domain. Sometimes called a multiport
repeater or concentrator.
ICMP Internet Control Message Protocol. Used by higher-level TCP/IP protocols to send status reports about information being transmitted.
IMAP Internet Message Access Protocol. A protocol used to retrieve email from a mail server.
Internet A global network of networks used to exchange information using the TCP/IP protocol suite
IP Internet Protocol. The base (i.e. lowest level) protocol for the TCP/IP protocol suite.
IP address A 32-bit address used to identify computers on a network using the TCP/IP protocol suite. Often written as four numbers (0-255) separated by dots
(e.g. 192.168.0.1)
LAN Local Area Network. A collection of networked computers in a limited geographical area.
MAC address Media Access Control address. A 48-bit address unique to each network interface card or other network device.
MAN Metropolitan Area Network. A network connecting computers over a large geographical area, such as a city.
Manchester encoding Technique used to encode 0s and 1s as transitions, rather than constant voltage levels. A 0 is represented by a 0-to1 transition, and a 1 is represented by a 1-to-0
transition.
Multiplexing A technique that allows multiple signals to be transmitted over the same communications channel. See also FDM and TDM.
NetBEUI NetBIOS Extended User Interface. A protocol used to transport NetBIOS messages over a network.
NetBIOS Network Basic Input Output System. Low-level networking operations that enable networking operations such as file and printer sharing.
Open-source Software in which the source code is made freely available to everybody.
OSI Open System Interconnection. A standard classification of the logical levels at which network communication takes place.
Packet A small block of data together with control information (e.g. source address, destination address, parity bits, sequencing information). The basic building block
of network communications.
Packet switching Communication using packets of data, with no dedicated physical connection between the nodes.
POP3 Post Office Protocol. A protocol used to receive emails from a mail server.
Page 14 of 18
Protocol The rules for exchanging information between two objects (e.g. network devices, application programs).
RARP Reverse Address Resolution Protocol. Part of the TCP/IP protocol stack, it is responsible for translating from MAC addresses to IP addresses. Also see ARP.
Repeater A device used in a network to amplify the signal, extending the usable length of the segment
Ring A network topology in which the computers are connected together in a circular fashion, with each computer connected to exactly two others.
Router A multiport device that forwards packets between ports based on their IP address. Each port connects to a different LAN, and possibly even different LAN
technologies. Very commonly found in the infrastructure that forms the basis of the Internet.
Subnet mask Used in CIDR to specify how many bits of an IP address are assigned to the network ID and how many to the computer ID.
Switch A multiport device that forwards packets to a specific port based on their destination MAC address. Each port is in its own collision domain.
Synchronous communication A technique in which two channels are used to transmit a single signal. One carries the signal and the other carries timing information. A way of overcoming the
synchronisation problem.
TCP Transmission Control Protocol. Part of the TCP/IP protocol stack – a protocol that provides connection-oriented completely reliable delivery,
TCP/IP A standard suite of protocols acting at different levels that is used on the Internet.
TDM Time Division Multiplexing. A technique for multiplexing that allocates time-slots to a number of subchannels in turn, each of which can use the entire
bandwidth for a limited amount of time.
Transceiver A device that interfaces between two different network technologies (e.g. RJ45 and BNC).
UNIX An operating system that is very commonly used in computer networking because of its powerful security features.
VPN Virtual Private Network. A connection-oriented packet-switching system in which packets are encrypted and sent through logical tunnels.
WAN Wide Area Network. A collection of LANs connected via routers over a large geographical area.
Wireless network A network that uses radio waves, infrared light or lasers instead of wires. Currently slower and more expensive than conventional networks.
Workgroup The term used in Windows operating systems to refer to a peer-to-peer network.
Ethernet hub
Page 15 of 18
And when computer “A” responds, its response also goes out to every other port on the hub:
Every computer connected to the hub “sees” everything that every other computer on the hub sees. The computers themselves decide if they are the targeted recipient of the
message and when a message should be paid attention to or not.
The hub itself is blissfully ignorant of the data being transmitted. For years, simple hubs have been quick and easy ways to connect computers in small networks.
Switches
Page 16 of 18
Even accepting that first message, however, the switch has learned something – it knows on which connection the sender of the message is located. Thus, when machine “A”
responds to the message, the switches only need to send that message out to the one connection:
In addition to sending the response through to the originator, the switch has now learned something else – it now knows on which connection machine “A” is located.
That means that subsequent messages destined for machine “A” need only be sent to that one port:
Switches learn the location of the devices that they are connected to almost instantaneously. The net result is that most network traffic only goes where it needs to rather than to
every port. On busy networks, this can make the network significantly faster.
Routers
A router is the smartest and most complicated of the bunch. Routers come in all shapes and sizes – from the small, four-port broadband routers that are very popular right now
to the large industrial strength devices that drive the internet itself.
A simple way to think of a router is as a computer that can be programmed to understand, possibly manipulate, and route the data that it’s being asked to handle. Many routers
today are, in fact, little computers dedicated to the task of routing network traffic.
As far as simple traffic routing is concerned, a router operates exactly as a switch, learning the location of the computers on its connections and routing traffic only to those
computers.
Consumer grade routers perform at minimum two additional and important
DHCP – Dynamic Host Configuration Protocol – is the way dynamic IP addresses are assigned. A device asks for an IP address to be assigned to it from “upstream” and a
DHCP server responds with an IP address assignment. A router connected to your ISP-provided internet connection will typically ask your ISP’s server for an IP address; this
will be your IP address on the internet. Your local computers, on the other hand, will ask the router for an IP address and these addresses are local to your network.
NAT – Network Address Translation – is the way that the router translates the IP addresses of packets that cross the internet/local network boundary. When computer “A”
sends a packet out, the IP address that it’s “from” is that of computer “A” – 192.168.1.2 in the example above. When the router passes that on to the internet, it replaces the
local IP address with the internet IP address assigned by the ISP. It also keeps track, so that if a response comes back from somewhere on the internet, the router knows to do
the translation in reverse – replace the internet IP address with the local IP address for machine “A” and then send that response packet on to machine “A”.
A side effect of NAT is that machines on the internet cannot initiate communications to local machines – they can only respond to communications initiated by those local
machines.
The net effect is that the router then also acts as a firewall:
Page 17 of 18
Page 18 of 18