Professional Documents
Culture Documents
487
Whether you work in a wired network office or a wireless one, one thing is common for both
environments: It takes both network software and hardware (cables, routers, etc.) to transfer
data from your computer to another—or from a computer thousands of miles away to yours.
And in the end, to get the data you want right to YOU, it comes down to addresses.
So not surprisingly, along with an IP address (which is networks software), there's also a
hardware address. Typically it is tied to a key connection device in your computer called the
network interface card, or NIC. The NIC is essentially a computer circuit card that makes it
possible for your computer to connect to a network.
An NIC turns data into an electrical signal that can be transmitted over the network.
Every NIC has a hardware address that's known as a MAC, for Media Access Control.
Where IP addresses are associated with TCP/IP (networking software), MAC addresses are
linked to the hardware of network adapters.
Once again, that's hardware and software working together, IP addresses and MAC
addresses working together.
For this reason, the MAC address is sometimes referred to as a networking hardware
address, the burned-in address (BIA), or the physical address. Here's an example of a MAC
address for an Ethernet NIC: 00:0a:95:9d:68:16.
As you've probably noticed, the MAC address itself doesn't look anything like an IP address
(see yours here). The MAC address is a string of usually six sets of two-digits or characters,
separated by colons.
Some well-known manufacturers of network adapters or NICs are Dell, Belkin, Nortel and
Cisco. These manufacturers all place a special number sequence (called
the Organizationally Unique Identifier or OUI) in the MAC address that identifies them as
the manufacturer. The OUI is typically right at the front of the address.
For example, consider a network adapter with the MAC address "00-14-22-01-23-45." The
OUI for the manufacture of this router is the first three octets—"00-14-22." Here are the OUI
for other some well-known manufacturers.
Dell: 00-14-22
Nortel: 00-04-DC
Cisco: 00-40-96
Belkin: 00-30-BD
It's common for the larger manufacturers of networking equipment to have more than one
set of OUIs.
MAC addresses are useful for network diagnosis because they never change, as opposed
to a dynamic IP address, which can change from time to time. For a network administrator,
that makes a MAC address a more reliable way to identify senders and receivers of data on
the network.
Subnetwork
From Wikipedia, the free encyclopedia
"Subnet" redirects here. For subnets in the mathematics of topology, see subnet (mathematics).
The result of the bitwise AND operation of IP address and the subnet mask is the network prefix
192.168.5.0. The host part, which is 130, is derived by the bitwise AND operation of the address and
the one's complement of the subnet mask.
Subnetting
Subnetting is the process of designating some high-order bits from the host part and grouping them
with the network mask to form the subnet mask. This divides a network into smaller subnets. The
following diagram modifies the example by moving 2 bits from the host part to the subnet mask to
form four smaller subnets one quarter the previous size:
The RFC 950 specification recommended reserving the subnet values consisting of all zeros (see
above) and all ones (broadcast), reducing the number of available subnets by two. However, due to
the inefficiencies introduced by this convention it was abandoned for use on the public Internet, and
is only relevant when dealing with legacy equipment that does not implement CIDR. The only reason
not to use the all-zeroes subnet is that it is ambiguous when the prefix length is not available. RFC
950 itself did not make the use of the zero subnet illegal; it was however considered best practice by
engineers.
CIDR-compliant routing protocols transmit both length and suffix. RFC 1878 provides a subnetting
table with examples.
The remaining bits after the subnet bits are used for addressing hosts within the subnet. In the
above example the subnet mask consists of 26 bits, leaving 6 bits for the host identifier. This allows
for 62 host combinations (26−2).
The all-zeros value and all-ones values are reserved for the network address and broadcast
address respectively. In systems that can handle CIDR a count of two is therefore subtracted from
the host availability, rather than the subnet availability, making all 2n subnets available and removing
a need to subtract two subnets.
For example, under CIDR /28 all 16 subnets are usable. Each broadcast, i.e. .15, .31, …, .255
comes off the client count, not the network, thus making the last subnet also usable.
In general the number of available hosts on a subnet is 2h−2, where h is the number of bits used for
the host portion of the address. The number of available subnets is 2n, where n is the number of bits
used for the network portion of the address. This is the RFC 1878 standard used by the IETF, the
IEEE and COMPTIA.
RFC 3021 specifies an exception to this rule for 31-bit subnet masks, which means the host identifier
is only one bit long for two permissible addresses. In such networks, usually point-to-point links, only
two hosts (the end points) may be connected and a specification of network and broadcast
addresses is not necessary.
A /24 network may be divided into the following subnets by increasing the subnet mask successively
by one bit. This affects the total number of hosts that can be addressed in the /24 network (last
column).
Network Switch
A network switch (also called switching hub, bridging hub, officially MAC bridge[1]) is a computer
networking device that connects devices together on a computer network by using packet
switching to receive, process, and forward data to the destination device. Unlike less
advanced network hubs, a network switch forwards data only to the devices that need to receive it,
rather than broadcasting the same data out of each of its ports.[2]
A network switch is a multiport network bridge that uses hardware addresses to process and forward
data at the data link layer (layer 2) of the OSI model. Some switches can also process data at
the network layer (layer 3) by additionally incorporating routing functionality that most commonly
uses IP addresses to perform packet forwarding; such switches are commonly known as layer-3
switches or multilayer switches.[3]
Switches for Ethernet are the most common form and the first Ethernet switch was introduced
by Kalpana in 1990.[4] Switches also exist for other types of networks including Fibre
Channel, Asynchronous Transfer Mode, and InfiniBand.
Overview
Cisco small business SG300-28 28-port Gigabit Ethernet rackmount switch and its internals
A switch is a device in a computer network that electrically and logically connects together other
devices. Multiple data cables are plugged into a switch to enable communication between different
networked devices. Switches manage the flow of data across a network by transmitting a
received network packet only to the one or more devices for which the packet is intended. Each
networked device connected to a switch can be identified by its network address, allowing the switch
to regulate the flow of traffic. This maximizes the security and efficiency of the network.
When a repeater hub is replaced with an Ethernet switch, the single large collision domain used by
the hub is split up into smaller ones, reducing or eliminating the possibility and scope
of collisions and, as a result, increasing the potential throughput. Because broadcasts are still being
forwarded to all connected devices, the newly formed network segment continues to be a broadcast
domain.
A switch is more intelligent than a repeater hub, which simply retransmits packets out of every port
of the hub except the port on which the packet was received, unable to distinguish different
recipients, and achieving an overall lower network efficiency.
Network design
An Ethernet switch operates at the data link layer (layer 2) of the OSI model to create a
separate collision domain for each switch port. Each device connected to a switch port can transfer
data to any of the other ones at a time, and the transmissions will not interfere – with the limitation
that, in half duplex mode, each switch port can only either receive from or transmit to its connected
device at a certain time. In full duplex mode, each switch port can simultaneously
transmit and receive, assuming the connected device also supports full duplex mode.[5]
In the case of using a repeater hub, only a single transmission could take place at a time for all ports
combined, so they would all share the bandwidth and run in half duplex. Necessary arbitration would
also result in collisions, requiring retransmissions.
Applications
The network switch plays an integral role in most modern Ethernet local area networks (LANs). Mid-
to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO)
applications typically use a single switch, or an all-purpose converged device such as a residential
gateway to access small office/home broadbandservices such as DSL or cable Internet. In most of
these cases, the end-user device contains a router and components that interface to the particular
physical broadband technology. User devices may also include a telephone interface for Voice over
IP (VoIP) protocol.
Microsegmentation
Segmentation involves the use of a bridge or a switch (or a router) to split a larger collision domain
into smaller ones in order to reduce collision probability, and to improve overall network throughput.
In the extreme case (i.e. microsegmentation), each device is located on a dedicated switch port. In
contrast to an Ethernet hub, there is a separate collision domain on each of the switch ports. This
allows computers to have dedicated bandwidth on point-to-point connections to the network and also
to run in full-duplex without collisions. Full-duplex mode has only one transmitter and one receiver
per "collision domain", making collisions impossible.
VLAN
A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer
network at the data link layer (OSI layer 2).[1][2] LAN is the abbreviation for local area network and in
this context virtual refers to a physical object recreated and altered by additional logic. VLANs work
through tags within network packets and tag handling in networking systems - recreating the
appearance and functionality of network traffic that is physically on a single network but acts as if it is
split between separate networks. In this way, VLANs can keep networks separate despite being
connected to the same network, and without requiring multiple sets of cabling and networking
devices to be deployed.
VLANs allow network administrators to group hosts together even if the hosts are not on the same
network switch. This can greatly simplify network design and deployment, because VLAN
membership can be configured through software. Without VLANs, grouping hosts according to their
resource needs necessitates the labor of relocating nodes or rewiring data links. It also has benefits
in allowing networks and devices that must be kept separate to share the same physical cabling
without interacting, for reasons of simplicity, security, traffic management, or economy. For example,
a VLAN could be used to separate traffic within a business due to users, and due to network
administrators, or between types of traffic, so that users or low priority traffic cannot directly affect
the rest of the network's functioning. Many Internet hosting services use VLANs to separate their
customers' private zones from each other, allowing each customer's servers to be grouped together
in a single network segment while being located anywhere in their datacenter. Some precautions are
needed to prevent traffic "escaping" from a given VLAN, an exploit known as VLAN hopping.
To subdivide a network into virtual LANs, one configures network equipment. Simpler equipment can
partition only per physical port (if at all), in which case each VLAN is connected with a
dedicated network cable. More sophisticated devices can mark frames through VLAN tagging, so
that a single interconnect (trunk) may be used to transport data for multiple VLANs. Since VLANs
share bandwidth, a VLAN trunk can use link aggregation, quality-of-service prioritization, or both to
route data efficiently.
VLANs can be used to partition a local network into several distinctive segments,[3] for example:
Production
Voice over IP
Network management
Storage area network (SAN)
Guest Internet access network
Demilitarized zone (DMZ)
Client separation (ISP, in a large facility, or in a datacenter)
Telnet
Shërbimi i internetit Telenet është paramenduar për përdorimin e një llogaritësi nga largësia me
ndihmën e komandave të gjuhëve ose sistemeve operuese. Teleneti është si paraardhës i
shërbimit Teleworking. Me këtë shërbim përdoruesit e kompjuterit personal mund të futen (Login)
në llogaritësin e lidhur në internet (llogaritësin Host). Hyrja është e lejuar vetëm për emrat e
regjistruar të përdoruesve që posedojnë fjalët kalimtare të regjistruar. Pas futjes në llogaritësin ata
me anë të komandave Shell mund të japin komanda për sistemet operative, të startojnë programe e
gjera të tilla.
Përdoruesit e kompjuterëve personal nuk kanë të bëjnë direkt me qendrën e llogaritësve shërbyes
(Server) në internet, nuk bien në kontakt me Telenet. Mirëpo ka edhe sisteme operuese për
kompjuterët personal si MS Windows ose Macintosh që kanë të integruar programet Telenet-
Clients. Këto programe bëjnë të mundshme punën nga kompjuteri personal në llogaritësin Host. Për
të punuar me llogaritësit Host duhet pasur njohuri mbi urdhëresat e sistemit operues të llogaritësit
përkatës.
SSH (Secure Shell) është një variant i Telenet-it, dallimi qëndron në faktin se me SSH të gjitha
regjistrat e të dhënave kodohen. Kjo është me rëndësi sepse që nga momenti i futjes ne llogaritës,
kodohen emri i përdoruesit si dhe fjala kalimtare e tij. Sidomos kur kemi të bëjmë me ndryshimin e
fjalës kalimtare ose të emrit të përdoruesit, gjë që në praktik ndodhë shpesh. Edhe këto të dhëna
qarkullojnë në tërë rrjetin dhe me pak njohuri mund të kapen në ndonjë stacion dhe të shikohen, po
kur ato janë të koduara humbin interesin për spiunët. Disa klient të Telenet-it modern, në ndërkohë
ofrojnë edhe protokollin SSH.
elnet për ndryshe nga programuesit shihet si një protokoll rrjeti qe perdoret ne Internet. Dokumentat
pershkrues IETF STD 8 (RFC 854 dhe RFC 855) thone:
Objektivi i protokollit TELNET eshte te ofroje nje mbeshtetje pergjithesisht te mjaftuesme per
komunikim, dydrejtimesh dhe te orientuar ne byte ( tetë Bit).
Zakonishtë përdoret per ti ofruar perdoruesit nje sesion login nga distanza te tipit komande
rrjeshti midis host ne internet.
Gjithashtu, telnet është edhe emri i nje programmi qe nje perdorues mund te perdori per te
nisur nje sesion telnet me nje host ne largësi; programi telnet implementon pjesën klient te
protokollit. Klientët telnet janë te diponueshëm ne shumicën e sisteme Unix prej shumë vitesh
dhe për cdo llojë kompjuteri.
Domain Name System
Domain Name System - DNS/ sqt. Servisi i Emrave Domene (SED)" është sistemi i kodimit të
emrave të faqeve të internetit.
Lloj sistemi në teknologjinë e kompjuterëve. Me ndihmën e tij lexuesi informohet për zanafillën e
shtetit ose organizatës në të cilin është publikuar ajo fletë.
Pasi për kompjuterët më mirë janë të dhënat të shkruara në numra dhe për njerëzit më mirë në
shkronja, është futur edhe ky sistem.
Sistemi në fjalë është i ngjashëm me sistemin e Adresave IP. Ky sistem ka emrat e adresave që në
këtë teknologji thirret Emri i domenit (Domain Name). Këta emra i takojnë një niveli më të lartë të
quajtur Niveli i sipërm i domeneve (Top-Level-Dmain). Pjesët e emrave janë të ndara sikurse tek
adresat IP, me një pikë si p.sh yahoo.com, sq.wikipedia.org
Top-Level-Domain janë disa shkurtesa dhe zakonisht shkruhen në fund të emrit të domenit.
shkurtesat janë tipike për shtetet përkatëse ose për organizatat.