Pages

Saturday, 28 September 2013

What is IP address and their Types



What is IP address?

The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.

When you send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets. Each of these packets contains both the sender's Internet address and the receiver's address. Any packet is sent first to a gateway computer that understands a small part of the Internet. The gateway computer reads the destination address and forwards the packet to an adjacent gateway that in turn reads the destination address and so forth across the Internet until one gateway recognizes the packet as belonging to a computer within its immediate neighborhood or domain. That gateway then forwards the packet directly to the computer whose address is specified.

Because a message is divided into a number of packets, each packet can, if necessary, be sent by a different route across the Internet. Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. It's up to another protocol, the Transmission Control Protocol (TCP) to put them back in the right order.

Question for IP Address

Question for IP Address


1.  What is IP address?


IP address is short for Internet Protocol Address. An IP Address is a unique number that devices use in order to identify and communicate with each other on a computer network.  If two computers have the same IP addresses, it will cause conflict and cause problem.

IP Addresses are written as a sequence of four numbers separated by ".", like this: 208.123.246.35.

2.  What is Public IP address? What is Private IP address?
Public IP addresses are IP addresses used on Internet. They are internet route-able and are visible to the public. Most people who use Cable/DSL service at home/office obtain one dynamic Public IP address from ISP (Internet Service Provider).

Computers on a Local Area Network use Private IP addresses. 192.168.x.x is an example of a Private IP address.

3.  What is the purpose of a broadband router?
The purpose of a broadband router is to share an internet connection among several computers.  The broadband router will get one public IP from your ISP and assign dynamic private IP address to each of your computer.  All of your computers will have unique private IP address but will use the same public IP address to browse Internet.  The router provides a basic Firewall which can deny access to your local computers from Internet.

What is CLIENT-SERVER ?

What is CLIENT-SERVER ?


The term client-server refers to a popular model for computer networking that utilizes client and server devices each designed for specific purposes. The client-server model can be used on the Internet as well as local area networks (LANs). Examples of client-server systems on the Internet include Web browsers and Web servers, FTP clients and servers, and the DNS.
Client and Server Devices
Client/server networking grew in popularity many years ago as personal computers (PCs) became the common alternative to older mainframe computers. Client devices are typically PCs with network software applications installed that request and receive information over the network. Mobile devices as well as desktop computers can both function as clients.

A server device typically stores files and databases including more complex applications like Web sites. Server devices often feature higher-powered central processors, more memory, and larger disk drives than clients.
Client-Server Applications
The client-server model distinguishes between applications as well as devices. Network clients make requests to a server by sending messages, and servers respond to their clients by acting on each request and returning results. One server generally supports numerous clients, and multiple servers can be networked together in a pool to handle the increased processing load as the number of clients grows.

What is Network Security?

         

WHAT IS NETWORK SECURITY?



The networks are computer networks, both public and private, that are used every day to conduct transactions and communications among businesses, government agencies and individuals. The networks are comprised of "nodes", which are "client" terminals (individual user PCs) and one or more "servers" and/or "host" computers. They are linked by communication systems, some of which might be private, such as within a company, and others which might be open to public access. The obvious example of a network system that is open to public access is the Internet, but many private networks also utilize publicly-accessible communications. Today, most companies' host computers can be accessed by their employees whether in their offices over a private communications network, or from their homes or hotel rooms while on the road through normal telephone lines.

Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them.

Thursday, 21 February 2013

Glossary of Networking


·     Glossary



·        10Base2 - Ethernet specification for thin coaxial cable, transmits signals at 10 Mbps (megabits per second) with a distance limit of 185 meters per segment.
·        10Base5 - Ethernet specification for thick coaxial cable, transmits signals at 10 Mbps (megabits per second) with a distance limit of 500 meters per segment.
·        10BaseF - Ethernet specification for fiber optic cable, transmits signals at 10 Mbps (megabits per second) with a distance limit of 2000 meters per segment.
·        10BaseT - Ethernet specification for unshielded twisted pair cable (category 3, 4, or 5), transmits signals at 10 Mbps (megabits per second) with a distance limit of 100 meters per segment.
·        100BaseT - Ethernet specification for unshielded twisted pair cabling that is used to transmit data at 100 Mbps (megabits per second) with a distance limit of 100 meters per segment.
·        1000BaseTX -Ethernet specification for unshielded twisted pair cabling that is used to transmit data at 1 Gbps (gigabits per second) with a distance limitation of 220 meters per segment.
·        Asynchronous Transfer Mode (ATM) - A network protocol that transmits data at a speed of 155 Mbps and higher. It is most often used to interconnect two or more local area networks.

Fundamental of CSMA/CD

Fundamental of CSMA/CD


·     Collisions:
·        Ethernet is a shared media, so there are rules for sending packets of data to avoid conflicts and protect data integrity. Nodes determine when the network is available for sending packets. It is possible that two nodes at different locations attempt to send data at the same time. When both PCs are transferring a packet to the network at the same time, a collision will result.

Minimizing collisions is a crucial element in the design and operation of networks. Increased collisions are often the result of too many users on the network, which results in a lot of contention for network bandwidth. This can slow the performance of the network from the user's point of view. Segmenting the network, where a network is divided into different pieces joined together logically with a bridge or switch, is one way of reducing an overcrowded network.

Wednesday, 20 February 2013

What is a Topology?


What is a Topology?


The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter.
Main Types of Physical Topologies
The following sections discuss the physical topologies used in networks and other related topics.


A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1). All nodes (file server, workstations, and peripherals) are connected to the linear cable.
Fig. 1. Linear Bus topology

What is a Network Operating System?



What is a Network Operating System?



Unlike operating systems, such as Windows, that are designed for single users to control one computer, network operating systems (NOS) coordinate the activities of multiple computers across a network. The network operating system acts as a director to keep the network running smoothly.
The two major types of network operating systems are:
  • Peer-to-Peer
  • Client/Server
Nearly all modern networks are a combination of both. The networking design can be considered independent of the servers and workstations that will share it.
Peer-to-Peer
Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers. However, they do not have a file server or a centralized management source (See fig. 1). In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources available on the network. Peer-to-peer networks are designed primarily for small to medium local area networks. Nearly all modern desktop operating systems, such as Macintosh OSX, Linux, and Windows, can function as peer-to-peer network operating systems.

What is a Protocol?





What is a Protocol?

A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world. The OSI (Open Systems Interconnection) Reference Model defines seven layers of networking protocols. The complexity of these layers is beyond the scope of this tutorial; however, they can be simplified into four layers to help identify some of the protocols with which you should be familiar (see fig 1).

Networking Hardware


 What is Networking Hardware?



Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network.                                                                                                                                                    
·                                                                                                                                                        Hubs
·                                                                                                                                                        Bridges
·                                                                                                                                                        Firewalls
·                                                                                                                                                        Routers
·                                                                                                                                                        FileServers
·                                                                                                                                                        Repeaters
This needs to be a sprite
This section provides information on the following components:

4.Cabeling


4. What is Network Cabling?



            Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network.

The following sections discuss the types of cables used in networks and other related topics.


4.1 Unshielded Twisted Pair (UTP) Cable

4.2 Shielded Twisted Pair (STP) Cable

4.3 Coaxial Cable
4.4 Fiber Optic Cable
4.5 Cable Installation Guides
4.6 Wireless LANs


4.1 Unshielded Twisted Pair (UTP) Cable

           Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks.
What is Cabeling?
Unshielded twisted pair

           The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has established standards of UTP and rated six categories of wire (additional categories are emerging).

Categories of Unshielded Twisted Pair
Category
Speed
Use
1
1 Mbps
Voice Only (Telephone Wire)
2
4 Mbps
LocalTalk & Telephone (Rarely used)
3
16 Mbps
10BaseT Ethernet
4
20 Mbps
Token Ring (Rarely used)
5
100 Mbps (2 pair)
100BaseT Ethernet
1000 Mbps (4 pair)
Gigabit Ethernet
5e
1,000 Mbps
Gigabit Ethernet
6
10,000 Mbps
Gigabit Ethernet

Unshielded Twisted Pair Connector
         The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying that the connector follows a standard borrowed from the telephone industry. This standard designates which wire goes with each pin inside the connector.
RJ-45 connector
RJ-45 connector

4.2 Shielded Twisted Pair (STP) Cable

            Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical frequency interference (it should not be too close to electric motors, fluorescent lights, etc.). If you must place cable in environments with lots of potential interference, or if you must place cable in extremely sensitive environments that may be susceptible to the electrical current in the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the maximum distance of the cables.

Shielded twisted pair
Shielded twisted pair

Shielded twisted pair cable is available in three different configurations:
1.     Each pair of wires is individually shielded with foil.
2.     There is a foil or braid shield inside the jacket covering all wires (as a group).
3.     There is a shield around each individual pair, as well as around the entire group of wires (referred to as double shield twisted pair).


4.3 Coaxial Cable


       Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield. The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.

Coaxial cable
Coaxial cable

      Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin coaxial.
           Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable has been popular in school networks, especially linear bus networks.
       Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial a great choice when running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is difficult to install.

Coaxial Cable Connectors

          The most common type of connector used with coaxial cables is the Bayone-Neill-Concelman (BNC) connector. Different types of adapters are available for BNC connectors, including a T-connector, barrel connector, and terminator. Connectors on the cable are the weakest points in any network. To help avoid problems with your network, always use the BNC connectors that crimp, rather screw, onto the cable.

BNC connector
BNC connector

4.4 Fiber Optic Cable

      Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials. It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting.
     Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals.
      The center core of fiber cables is made from glass or plastic fibers. A plastic coating then cushions the fiber center, and kevlar fibers help to strengthen the cables and prevent breakage. The outer insulating jacket made of teflon or PVC.

Fiber optic cable
Fiber optic cable

      There are two common types of fiber cables -- single mode and multimode. Multimode cable has a larger diameter; however, both cables provide high bandwidth at high speeds. Single mode can provide more distance, but it is more expensive.

Specification
Cable Type
10BaseT
Unshielded Twisted Pair
10Base2
Thin Coaxial
10Base5
Thick Coaxial
100BaseT
Unshielded Twisted Pair
100BaseFX
Fiber Optic
100BaseBX
Single mode Fiber
100BaseSX
Multimode Fiber
1000BaseT
Unshielded Twisted Pair
1000BaseFX
Fiber Optic
1000BaseBX
Single mode Fiber
1000BaseSX
Multimode Fiber


4.5 Installing Cable - Some Guidelines



  1. When running cable, it is best to follow a few simple rules:
  2. Always use more cable than you need. Leave plenty of slack.
  3. Test every part of a network as you install it. Even if it is brand new, it may have problems that will be difficult to isolate later.
  4. Stay at least 3 feet away from fluorescent light boxes and other sources of electrical interference.
  5. If it is necessary to run cable across the floor, cover the cable with cable protectors.
  6. Label both ends of each cable.
  7. Use cable ties (not tape) to keep cables in the same location together.