Professional Documents
Culture Documents
Mac Address
The Media Access Control address (MAC) can be equated to the serial number of the NIC. Every IP packet is sent out of your NIC wrapped inside an Ethernet frame which uses MAC addresses to direct traffic on your locally attached network MAC addresses therefore only have significance on the locally attached network. As the packet hops across the Internet, its source/destination IP address stays the same, but the MAC addresses are reassigned by each router on the way using a process called ARP
Mac Address
MAC addresses are usually written in one of the following two formats: 00:13:21:0F:83:DF 00-13-21-0F-83-DF
Mac address is a 48 bit address Mac address are 12 digit Hexadecimal {09} {A- F} Address
3
MAC Address
The First Octet of the MAC Address is known as Group Unique 00 : 13 : 21 : 0F : 83 : DF The Second and Third Octet of the MAC Address is known as Organization Unique Identifier (OUI) 00 : 13 : 21 : 0F : 83 : DF
MAC Address
Any Mac address starts with 00 is known as Unicast address 00 : 13 : 21 : 0F : 83 : DF Any Mac address starts with 01 is known as Multicast 01 : 13 : 21 : 0F : 83 : DF Any Mac address starts with FF is known as Broadcast FF : 13 : 21 : 0F : 83 : DF
MAC Address
Unicast
Multicast
Broadcast
Topology
A topology is a description of any kind of locality
in terms of its layout. In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines The physical topology of a network describes the layout of the cables and workstations and the location of all network components Common Topology: Bus, Ring, Star and Mesh
10
Bus Topology
In a bus topology, all computers are attached to a single continuous cable that is terminated at both ends, which is the simplest way to create a physical network.
11
Star Topology
Unlike those in a bus topology, each computer in a star topology is connected to a central point by a separate cable. The central point is a device known as a hub Although this setup uses more cable than a bus, a star topology is much more fault tolerant than a bus topology. This means that if a failure occurs along one of the cables connecting to the hub, only that portion of the network is affected, not the entire network. It also means that you can add new stations just by running a single new cable
12
Ring Topology
In the ring topology, each computer is connected directly to two other computers in the network. Data moves down a one-way path from one computer to another The good news about laying out cable in a ring is that the cable design is simple. The bad news is that, as with bus topology, any break, such as adding or removing a computer, disrupts the entire network. Also, because you have to break the ring in order to add another station, it is very difficult to reconfigure without bringing down the whole network. For this reason, the physical ring topology is seldom used
13
Mesh Topology
In a mesh topology, a path exists from each station to every other station in the network. While not usually seen in LANs, a variation on this type of topologythe hybrid meshis used on the Internet and other WANs in a limited fashion. Hybrid mesh topology networks can have multiple connections between some locations, but this is done only for redundancy. Also, it is not a true mesh because there is not a connection between each and every node, just a few for backup purposes
14
Coaxial Cable
Coaxial cable consists of a central copper core surrounded by an insulator, a braided metal shielding, called braiding, and an outer cover, called the sheath or jacket EG : Cable TV network use the coaxial cable
15
16
Thicknet (10Base5)
Thicknet cabling, also called thick wire Ethernet, is a rigid coaxial cable approximately 1-cm thick used for the original Ethernet networks.Thicknet is also called yellow Ethernet or yellow garden hose. IEEE designates Thicknet as 10Base5 Ethernet.The 10 represents its throughput of 10 Mbps, the Base stands for baseband transmission, and the 5 represents the maximum segment length of a Thicknet cable, which is 500 m. You may find this on older networks.
17
Thinnet (10base2)
Thinnet, also known as thin Ethernet, was the most popular medium for Ethernet LANs in the 1980s. Thinnet is rarely used on modern networks, although you may encounter it on networks installed in the 1980s or on newer small office or home office LANs
IEEE has designated Thinnet as 10Base2 Ethernet, with the 10 representing its data transmission rate of 10 Mbps, the Base representing the fact that it uses baseband transmission, and the 2 representing its maximum segment length of 185 (or roughly 200) m.
18
21
22
UTP Types
23
Fiber Optic
A fiber-optic system is similar to the copper wire system that fiber-optics is replacing. The difference is that fiber-optics use light pulses to transmit information down fiber lines instead of using electronic pulses to transmit information down copper lines.
24
Fiber Optic
Bandwidth Up to 100s of Gbps Distance (100 +KM) Three Types Single Mode Multi Mode Plastic Optical Fiber Mode
25
26
28
other side, and pin 2 connects to pin 6 on the opposite end You can use a crossover cable for the following tasks: Connecting uplinks between switches Connecting hubs to switches Connecting a hub to another hub.
29
RJ-11 Defined for telephone connectors RJ-45 Defined for UTP connectors
30
31
32
Intranet
33
Internet
34
35
OSI
The OSI reference model illustrates the networking process as being divided into seven layers. This theoretical construct makes it easier to learn and understand the concepts involved. At the top of the model is the application that requires access to a resource on the network, and at the bottom is the network medium itself As data moves down through the layers of the model, the various protocols operating there prepare and package it for transmission over the network. Once the data arrives at its destination, it moves up through the layers on the receiving system, where the same protocols perform the same process in reverse
36
OSI
OSI developed by International Organization for Standardization (ISO) in 1974 It consists of Seven Layers Each layer has specific processing function
37
38
39
OSI
User
Application Layer provides the operating system with access to network services
Application layer provides an interface so that processes such as Excel or Word that are running on the local machine can get access to network services (E.G., retrieving a file from a network server) Handles network access, flow control and error recovery
40
OSI
Its a user specific layer Protocols used in Application layer : DNS, FTP, HTTP, SMTP, POP3, WWW Gateway works in Application layer
41
OSI
Presentation layer is responsible for presenting the data in a standard format Presentation Layer is responsible for data translation (formatting) Encryption techniques are implemented at the Presentation Layer The Presentation layer relieves the Application layer of concern regarding syntactical differences in a message's data representation within the end-user systems
42
OSI
Following tasks are performed in Presentation Layer:
Encoding Decoding Encryption Decryption Compression Decompression
43
OSI
Session Layer is responsible for establishing, maintaining and terminating session Responsible for name recognition (identification) so only the designated parties can participate in the session Manages who can transmit data at a certain time and for how long Provides synchronization services by planning check points in the data stream if session fails, only data after the most recent checkpoint need be transmitted
44
OSI
Protocols used in Session layer: NetBIOS, Names Pipes, Mail Slots and RPC (Remote Procedure Call)
45
OSI
Transport Layer is responsible for end-to-end connectivity. It is also known as the heart of OSI layers Provides error-checking to guarantee error-free data delivery, with on losses or duplications Provides acknowledgment of successful transmissions; requests retransmission if some packets dont arrive error-free The major function of the Transport Layer is Error Correction
46
OSI
Following tasks are performed at Transport Layer Identifying Service Multiplexing & De-multiplexing Segmentation Sequencing & Reassembling Flow control Protocol used in Transport Layer TCP, UDP, NetBEUI Brouter and Gateway works in Transport Layer
47
OSI
Network Layer
is responsible for providing best path for data to reach the destination Logical addressing is happening in this layer Network Layer translates logical network address and names to their physical address (e.g. computer name = MAC address) The Network layer performs network routing, flow control, segmentation/desegmentation, and error control functions.
48
OSI
Protocols used in Network Layer Routed Protocol IP, IPX and Apple Talk Routing Protocol RIP, IGRP, EIGRP and OSPF Router works in Network Layer
49
OSI
Data Link Layer handles data frames between the Network and Physical layers
Receiving end packages raw data from the Physical layer into data frames for delivery to the Network layer as packets Error detection is happening in this layer Data link Layer is divided in to two layers: LLC (Logical Link Control) MAC ( Media Access Control)
50
OSI
LLC Talks about WAN protocols e.g., PPP and Frame
Relay
MAC talks about 48 bit, 12 digit Hexadecimal physical address Protocols used in Data Layer : 802.3 (CSMA/CD) Ethernet & 802.5 Token Ring Switch, Bridge and Network Interface card works in Data Link Layer
51
OSI
In Physical Layer data will be converted into Binary (0s & 1&) It transmits raw bit stream over physical cable Data will be in the form of light if it is Fiber Optic Cable The Physical layer defines all the electrical and physical specifications for devices
52
OSI
Physical Layer defines techniques to transfer bit stream to cable
OSI
Gateway
OSI
55
OSI
56
IP Addressing
Internet Protocol Address is given to the computer as an identifier to a computer in a TCP/IP Network IP Address is also known as Logical Address IP Address works in Layer 3 (Network) Two versions of IP Addressing
IP Version 4 - 32 bit address (Currently we are using) IP Version 6 - 128 bit address
57
IP Addressing
IP Address is divided in to Network Portion and Host Portion Class A is written as Class B is written as Class C is written as N.H.H.H N.N.H.H N.N.N.H
58
IP Addressing
59
IP Address
IP Addressing
61
IP Addressing
The IP address 127.0.0.1 is used as the loop back address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing
62
IP Addressing
Loop Back address is also known as semi broad cast address Range of Loop back address : 127.0.0.1 to 127.255.255.254 Click Start Run Type cmd Ping 127.0.01
63
APIPA
APIPA is also known as Offline DHCP Address APIPA is also known as Auto Configuration IP Address APIPA is applicable only for Windows based OS APIPA will work only on Windows 98 and above APIPA will display with out the Default Gateway
65
Subnet Mask
Subnet Mask is to differentiate the Network ID and Host ID Two numbers reserved for Subnet Mask i.e. 0 & 255 0 Denotes Host and 255 Denotes Network
Class
Class A is written as Class B is written as Class C is written as
Subnet Mask
IP Address : 10.20.50.26 Subnet Mask : 255.0.0.0 For this IP Address : Network ID is : 10.0.0.0 First Valid IP Address : 10.0.0.1 Last Valid IP Address : 10.0.0.254 Broad Cast Address : 10.0.0.255
67
Subnet Mask
IP Address : 10.20.50.26 Subnet Mask : 255.255.0.0 For this IP Address : Network ID is : 10.20.0.0 First Valid IP Address : 10.20.0.1 Last Valid IP Address : 10.20.0.254 Broad Cast Address : 10.20.0.255
68
Subnet Mask
IP Address : 10.20.50.26 Subnet Mask : 255.255.255.0 For this IP Address : Network ID is : 10.20.50.0 First Valid IP Address : 10.20.50.1 Last Valid IP Address : 10.20.50.254 Broad Cast Address : 10.20.50.255
69
Subnet Mask
IP Address 172.26.28.36 Subnet Mask : 255.0.0.0 For this IP Address: Network ID is : 172.0.0.0 First Valid IP Address : 172.0.0.1 Last Valid IP Address : 172.0.0.254 Broad Cast Address : 172.0.0.255
70
Subnet Mask
IP Address 172.26.28.36 Subnet Mask : 255.255.0.0 For this IP Address: Network ID is : 172.26.0.0 First Valid IP Address : 172.26.0.1 Last Valid IP Address : 172.26.0.254 Broad Cast Address : 172.26.0.255
71
Subnet Mask
IP Address 172.26.28.36 Subnet Mask 255.255.255.0 For this IP Address: Network ID is : 172.26.28.0 First Valid IP Address : 172.26.28.1 Last Valid IP Address : 172.26.28.254 Broad Cast Address : 172.26.28.255
72
Subnet Mask
IP Address 192.168.0.152 Subnet Mask 255.0.0.0
For this IP Address: Network ID is : 192.0.0.0 First Valid IP Address : 192.0.0.1 Last Valid IP Address : 192.0.0.254 Broad Cast Address : 192.0.0.255
73
Subnet Mask
IP Address 192.168.0.152 Subnet Mask 255.255.0.0 For this IP Address: Network ID is : 192.168.0.0 First Valid IP Address : 192.168.0.1 Last Valid IP Address : 192.168.0.254 Broad Cast Address : 192.168.0.255
74
Subnet Mask
IP Address 192.168.0.152 Subnet Mask 255.255.255.0 For this IP Address: Network ID is : 192.168.0.0 First Valid IP Address : 192.168.0.1 Last Valid IP Address : 192.168.0.254 Broad Cast Address : 192.168.0.255
75
Broadcast Address
Messages that are intended for all computers on a network
are sent as broadcasts These messages always use the IP address 255.255.255.255 Any IP Address with last Octet as 255 is known as broadcast address for that particular network E.g.: 10.10.8.255 The IP address of 0.0.0.0 is used for the default network
76
77
78
79
80
81
Unknown Host
If the DNS resolution is not happening the computer will display as Unknown host Global DNS has to be assigned to fix this issue
82
83
84
85
Socket Error
86
Digital Signature
Digital signatures are especially important for electronic commerce and are a key component of most authentication schemes. To be effective, digital signatures must be unforgeable
87
Digital Signature
A digital certificate contains the digital signature of the certificate-issuing authority so that anyone can verify that the certificate is real
88
Physically install the network adapter, and then restart the PC.
89
90
SMC 1211 TX
91
92
93
94
95