INTRODUCTION TO COMPUTER NETWORKS

1 INTRODUCTION TO COMPUTER NETWORKSNavpreet Singh Compute...
Author: Emory Price
0 downloads 0 Views

1 INTRODUCTION TO COMPUTER NETWORKSNavpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : ,

2 Course Content Course Content Lecture 1: Overview of the Course and Network Fundamentals: 2 Hour Lecture 2: OSI Model& TCP/IP Model : 2 Hour Lecture 3: Physical Media (Copper, Fiber Optic and Wireless) : 2 Hour Lab 1: IIT Kanpur Datacenter Visit: 2 Hour Lecture 4: UTP & Fiber Cabling: 2 Hour Lecture 5: LAN Technologies (Ethernet, Fast Ethernet, Gigabit Ethernet, Wireless LAN) : 2 Hour Lab 2: Demo and Practice of UTP & Fiber Cabling: 2 Hour Lecture 6: LAN Technologies (contd.) : 2 Hour

3 Course Content Course Content Lecture 7: WAN Technologies (Dialup, Leased Line, ISDN, ADSL, Cable Modem, VSAT) : 2 Hour Lab 3: Demo and Practice of Ethernet & Wireless LAN Setup : 2 Hour Lecture 8: WAN Technologies (contd.) : 2 Hour Lecture 9: Internet Protocol (IP) and IP Addressing: 2 Hour Lab 4: Demo and Practice of Setting up Subnets and IP Address Assignment : 2 Hour Lecture 10: Routing, VLAN, TCP and UDP: 2 Hour Lecture 11: SNMP, Natting, Firewall and VPN: 2 Hour Lecture 12: Internet and Internet Applications (DNS, , Web..): 2 Hour

4 Course Content Lecture 13: Cisco Basics: 2 HourLecture 14: Cisco Switch and Router Configuration : 2 Hour Lab 5: Demo and Practice of Cisco Switch Configuration : 2 Hour Lab 6: Demo and Practice of Cisco Router Configuration : 2 Hour Lecture 15: DNS & Web Server Setup on Linux : 2 Hour Lab 7: Demo and Practice of DNS and Web Server Setup : 2 Hour Lecture 16: Enterprise Network Implementation: 2 Hour

5 Course Content Course Content Lecture 17: Mail Server, Proxy Server & Firewall Setup on Linux : 2 Hour Lab 8: Demo and Practice of Mail Server , Proxy Server and Firewall Setup : 2 Hour

6 References Andrew S. Tanenbaum, Computer Network, Prentice- HallBooks References Andrew S. Tanenbaum, Computer Network, Prentice- Hall Doughlas E. Comer, Computer Networks and Internet n.html

7 Grading Guidelines Two Exams: 40% each Lab Assignments: 20%Minimum 80% attendance and minimum 60% marks are necessary to clear the course.

8 INTRODUCTION TO COMPUTER NETWORKS

9 Introduction to Computer NetworksComputer network connects two or more autonomous computers. The computers can be geographically located anywhere.

10 Introduction to Computer NetworksLAN, MAN & WAN Network in small geographical Area (Room, Building or a Campus) is called LAN (Local Area Network) Network in a City is call MAN (Metropolitan Area Network) Network spread geographically (Country or across Globe) is called WAN (Wide Area Network)

11 Applications of NetworksIntroduction to Computer Networks Applications of Networks Resource Sharing Hardware (computing resources, disks, printers) Software (application software) Information Sharing Easy accessibility from anywhere (files, databases) Search Capability (WWW) Communication Message broadcast Remote computing Distributed processing (GRID Computing)

12 Introduction to Computer NetworksNetwork Topology The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions.

13 Introduction to Computer NetworksBus Topology Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable.

14 Introduction to Computer NetworksStar & Tree Topology The star topology is the most commonly used architecture in Ethernet LANs. When installed, the star topology resembles spokes in a bicycle wheel. Larger networks use the extended star topology also called tree topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host.

15 Introduction to Computer NetworksRing Topology A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame. The frame then continues around the ring until it finds the destination node, which takes the data out of the frame. Single ring – All the devices on the network share a single cable Dual ring – The dual ring topology allows data to be sent in both directions.

16 Introduction to Computer NetworksMesh Topology The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance. It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions. Implementing the mesh topology is expensive and difficult.

17 Network Components Physical Media Interconnecting Devices ComputersIntroduction to Computer Networks Network Components Physical Media Interconnecting Devices Computers Networking Software Applications

18 Introduction to Computer NetworksNetworking Media Networking media can be defined simply as the means by which signals (data) are sent from one computer to another (either by cable or wireless means).

19 Introduction to Computer NetworksNetworking Devices HUB, Switches, Routers, Wireless Access Points, Modems etc.

20 Computers: Clients and ServersIntroduction to Computer Networks Computers: Clients and Servers In a client/server network arrangement, network services are located in a dedicated computer whose only function is to respond to the requests of clients. The server contains the file, print, application, security, and other services in a central computer that is continuously available to respond to client requests.

21 Networking Protocol: TCP/IPIntroduction to Computer Networks Networking Protocol: TCP/IP

22 Applications E-mail Searchable Data (Web Sites) E-Commerce News GroupsIntroduction to Computer Networks Applications Searchable Data (Web Sites) E-Commerce News Groups Internet Telephony (VoIP) Video Conferencing Chat Groups Instant Messengers Internet Radio

23 OSI Model OSI MODEL

24 Communication ArchitectureOSI Model Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for data communication between devices. A communication architecture, therefore, defines a standard for the communicating hosts. A programmer formats data in a manner defined by the communication architecture and passes it on to the communication software. Separating communication functions adds flexibility, for example, we do not need to modify the entire host software to include more communication devices.

25 Layer Architecture Layer architecture simplifies the network design.OSI Model Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network management is easier due to the layered architecture. Network layers follow a set of rules, called protocol. The protocol defines the format of the data being exchanged, and the control and timing for the handshake between layers.

26 Open Systems Interconnection (OSI) ModelInternational standard organization (ISO) established a committee in 1977 to develop an architecture for computer communication. Open Systems Interconnection (OSI) reference model is the result of this effort. In 1984, the Open Systems Interconnection (OSI) reference model was approved as an international standard for communications architecture. Term “open” denotes the ability to connect any two systems which conform to the reference model and associated standards.

27 OSI Model OSI Reference Model The OSI model is now considered the primary Architectural model for inter-computer communications. The OSI model describes how information or data makes its way from application programmes (such as spreadsheets) through a network medium (such as wire) to another application programme located on another network. The OSI reference model divides the problem of moving information between computers over a network medium into SEVEN smaller and more manageable problems . This separation into smaller more manageable functions is known as layering.

28 OSI Reference Model: 7 LayersOSI Model OSI Reference Model: 7 Layers

29 OSI: A Layered Network ModelOSI Model OSI: A Layered Network Model The process of breaking up the functions or tasks of networking into layers reduces complexity. Each layer provides a service to the layer above it in the protocol specification. Each layer communicates with the same layer’s software or hardware on other computers. The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2, and 1) are concerned with the flow of data from end to end through the network. The upper four layers of the OSI model (application, presentation and session—Layers 7, 6 and 5) are orientated more toward services to the applications. Data is Encapsulated with the necessary protocol information as it moves down the layers before network transit.

30 OSI Model Physical Layer Provides physical interface for transmission of information. Defines rules by which bits are passed from one system to another on a physical communication medium. Covers all - mechanical, electrical, functional and procedural - aspects for physical communication. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications.

31 OSI Model Data Link Layer Data link layer attempts to provide reliable communication over the physical layer interface. Breaks the outgoing data into frames and reassemble the received frames. Create and detect frame boundaries. Handle errors by implementing an acknowledgement and retransmission scheme. Implement flow control. Supports points-to-point as well as broadcast communication. Supports simplex, half-duplex or full-duplex communication.

32 OSI Model Network Layer Implements routing of frames (packets) through the network. Defines the most optimum path the packet should take from the source to the destination Defines logical addressing so that any endpoint can be identified. Handles congestion in the network. Facilitates interconnection between heterogeneous networks (Internetworking). The network layer also defines how to fragment a packet into smaller packets to accommodate different media.

33 OSI Model Transport Layer Purpose of this layer is to provide a reliable mechanism for the exchange of data between two processes in different computers. Ensures that the data units are delivered error free. Ensures that data units are delivered in sequence. Ensures that there is no loss or duplication of data units. Provides connectionless or connection oriented service. Provides for the connection management. Multiplex multiple connection over a single channel.

34 OSI Model Session Layer Session layer provides mechanism for controlling the dialogue between the two end systems. It defines how to start, control and end conversations (called sessions) between applications. This layer requests for a logical connection to be established on an end-user’s request. Any necessary log-on or password validation is also handled by this layer. Session layer is also responsible for terminating the connection. This layer provides services like dialogue discipline which can be full duplex or half duplex. Session layer can also provide check-pointing mechanism such that if a failure of some sort occurs between checkpoints, all data can be retransmitted from the last checkpoint.

35 OSI Model Presentation Layer Presentation layer defines the format in which the data is to be exchanged between the two communicating entities. Also handles data compression and data encryption (cryptography).

36 OSI Model Application Layer Application layer interacts with application programs and is the highest level of OSI model. Application layer contains management functions to support distributed applications. Examples of application layer are applications such as file transfer, electronic mail, remote login etc.

37 OSI Model OSI in Action A message begins at the top application layer and moves down the OSI layers to the bottom physical layer. As the message descends, each successive OSI model layer adds a header to it. A header is layer-specific information that basically explains what functions the layer carried out. Conversely, at the receiving end, headers are striped from the message as it travels up the corresponding layers.

38 TCP/IP Model TCP/IP MODEL

39 TCP/IP Model OSI & TCP/IP Models

40 Transport Layer (TCP/UDP)TCP/IP Model TCP/IP Model Application Layer Application programs using the network Transport Layer (TCP/UDP) Management of end-to-end message transmission, error detection and error correction Network Layer (IP) Handling of datagrams : routing and congestion Data Link Layer Management of cost effective and reliable data delivery, access to physical networks Physical Layer Physical Media

41 Physical Media PHYSICAL MEDIA

42 Physical Media Physical Media

43 Physical Media Copper Coaxial Cable - Thick or ThinUnshielded Twisted Pair - CAT 3,4,5,5e&6 Optical Fiber Multimode Singlemode Wireless Short Range Medium Range (Line of Sight) Satellite

44 Copper Media: Coaxial CablePhysical Media Copper Media: Coaxial Cable Coaxial cable is a copper- cored cable surrounded by a heavy shielding and is used to connect computers in a network. Outer conductor shields the inner conductor from picking up stray signal from the air. High bandwidth but lossy channel. Repeater is used to regenerate the weakened signals. Category Impedance Use RG-59 75  Cable TV RG-58 50  Thin Ethernet RG-11 Thick Ethernet

45 Copper Media: Twisted PairPhysical Media Copper Media: Twisted Pair Twisted-pair is a type of cabling that is used for telephone communications and most modern Ethernet networks. A pair of wires forms a circuit that can transmit data. The pairs are twisted to provide protection against crosstalk, the noise generated by adjacent pairs. There are two basic types, shielded twisted-pair (STP) and unshielded twisted-pair (UTP).

46 Shielded Twisted Pair (STP)Physical Media Shielded Twisted Pair (STP)

47 Unshielded Twisted Pair (UTP)Physical Media Unshielded Twisted Pair (UTP)

48 Unshielded Twisted Pair (UTP)Physical Media Unshielded Twisted Pair (UTP) Consists of 4 pairs (8 wires) of insulated copper wires typically about 1 mm thick. The wires are twisted together in a helical form. Twisting reduces the interference between pairs of wires. High bandwidth and High attenuation channel. Flexible and cheap cable. Category rating based on number of twists per inch and the material used CAT 3, CAT 4, CAT 5, Enhanced CAT 5 and now CAT 6.

49 Physical Media Categories of UTP UTP comes in several categories that are based on the number of twists in the wires, the diameter of the wires and the material used in the wires. Category 3 is the wiring used primarily for telephone connections. Category 5e and Category 6 are currently the most common Ethernet cables used.

50 Categories of UTP: CAT 3 Bandwidth 16 Mhz 11.5 dB AttenuationPhysical Media Categories of UTP: CAT 3 Bandwidth 16 Mhz 11.5 dB Attenuation 100 ohms Impedance Used in voice applications and 10baseT (10Mbps) Ethernet

51 Categories of UTP: CAT 4 20 MHz Bandwidth 7.5 dB AttenuationPhysical Media Categories of UTP: CAT 4 20 MHz Bandwidth 7.5 dB Attenuation 100 ohms Impedance Used in 10baseT (10Mbps) Ethernet

52 Categories of UTP: CAT 5 100 MHz Bandwidth 24.0 dB AttenuationPhysical Media Categories of UTP: CAT 5 100 MHz Bandwidth 24.0 dB Attenuation 100 ohms Impedance Used for high-speed data transmission Used in 10BaseT (10 Mbps) Ethernet & Fast Ethernet (100 Mbps)

53 Categories of UTP: CAT 5ePhysical Media Categories of UTP: CAT 5e 150 MHz Bandwidth 24.0 dB Attenuation 100 ohms Impedance Transmits high-speed data Used in Fast Ethernet (100 Mbps), Gigabit Ethernet (1000 Mbps) & 155 Mbps ATM

54 Categories of UTP: CAT 6 250 MHz Bandwidth 19.8 dB AttenuationPhysical Media Categories of UTP: CAT 6 250 MHz Bandwidth 19.8 dB Attenuation 100 ohms Impedance Transmits high-speed data Used in Gigabit Ethernet (1000 Mbps) & 10 Gig Ethernet (10000 Mbps)

55 Physical Media Fiber Media Optical fibers use light to send information through the optical medium. It uses the principal of total internal reflection. Modulated light transmissions are used to transmit the signal.

56 Total Internal ReflectionPhysical Media Total Internal Reflection

57 Physical Media Fiber Media Light travels through the optical media by the way of total internal reflection. Modulation scheme used is intensity modulation. Two types of Fiber media : Multimode Singlemode Multimode Fiber can support less bandwidth than Singlemode Fiber. Singlemode Fiber has a very small core and carry only one beam of light. It can support Gbps data rates over > 100 Km without using repeaters.

58 Single and Multimode FiberPhysical Media Single and Multimode Fiber Single-mode fiber Carries light pulses along single path Uses Laser Light Source Multimode fiber Many pulses of light generated by LED travel at different angles

59 Physical Media Fiber Media The bandwidth of the fiber is limited due to the dispersion effect. Distance Bandwidth product of a fiber is almost a constant. Fiber optic cables consist of multiple fibers packed inside protective covering. 62.5/125 µm (850/1310 nm) multimode fiber 50/125 µm (850/1310 nm) multimode fiber 10 µm (1310 nm) single-mode fiber

60 Fiber-Optic Cable Contains one or several glass fibers at its corePhysical Media Fiber-Optic Cable Contains one or several glass fibers at its core Surrounding the fibers is a layer called cladding

61 Fiber Optic Cable FO Cable may have 1 to over 1000 fibersPhysical Media Fiber Optic Cable FO Cable may have 1 to over 1000 fibers

62 Physical Media Wireless Media Very useful in difficult terrain where cable laying is not possible. Provides mobility to communication nodes. Right of way and cable laying costs can be reduced. Susceptible to rain, atmospheric variations and Objects in transmission path.

63 Wireless Media Indoor : 10 – 50m : BlueTooth, WLANPhysical Media Wireless Media Indoor : 10 – 50m : BlueTooth, WLAN Short range Outdoor : 50 – 200m: WLAN Mid Range Outdoor : 200m – 5 Km : GSM, CDMA, WLAN Point-to-Point, Wi-Max Long Range Outdoor : 5 Km – 100 Km : Microwave Point-to-Point Long Distance Communication : Across Continents : Satellite Communication

64 Frequency Bands Physical Media Band Range Propagatio n Application VLF3–30 KHz Ground Long-range radio navigation LF 30–300 KHz Radio beacons and navigational locators MF 300 KHz–3 MHz Sky AM radio HF 3–30 MHz Citizens band (CB), ship/aircraft communication VHF 30–300 MHz Sky and line-of-sight VHF TV, FM radio UHF 300 MHz–3 GHz Line-of- sight UHF TV, cellular phones, paging, satellite SHF 3–30 GHz Satellite communication EHF 30–300 GHz

65 Wireless LAN Router Physical Media Internet Access Point Access PointPC Access Point Internet Router Switch PC Access Point

66 Terrestrial MicrowavePhysical Media Terrestrial Microwave Microwaves do not follow the curvature of earth Line-of-Sight transmission Height allows the signal to travel farther Two frequencies for two way communication Repeater is used to increase the distance Hop-by-Hop

67 Satellite CommunicationPhysical Media Satellite Communication

68 Cabling UTP AND FIBER CABLING

69 Structured Cabling InfrastructureMounted and permanent Allows patching Comfort that infrastructure is OK Components: Information Outlet with Face Plate Patch Panel UTP Cable Patch Cord

70 I/O & Faceplates Faceplate mounts on or in wall or in racewayCabling I/O & Faceplates Faceplate mounts on or in wall or in raceway Single or Dual Information Outlet (I/O) Provide network connectivity to the Hosts through a Patch Cord

71 Patch Panel Termination punchdown in back Patch cord plugin in frontCabling Patch Panel Termination punchdown in back Patch cord plugin in front

72 Patch Cord & UTP ConnectorsCabling Patch Cord & UTP Connectors

73 Color Codes Data Tx: 1 & 2 Data Rx: 3 & 6 Crossover 1  3 2  6Cabling Color Codes Data Tx: 1 & 2 Data Rx: 3 & 6 Crossover 1  3 2  6 PoE +VDC: 4 & 5 PoE -VDC: 7 & 8

74 Cutting, Striping & Crimping ToolsCabling Cutting, Striping & Crimping Tools Make your own patch cords Cuts and strips pairs RJ45 end crimped onto ends of wire

75 Cabling Punching Tool Terminates wires to back of patch panels and in Information Outlets

76 Cabling Making Cables

77 Wire Testing EquipmentCabling Wire Testing Equipment Test wire for correct termination of 8 wires Test for speed capabilities

78 Cabling Rules Try to avoid running cables parallel to power cables.Do not bend cables to less than four times the diameter of the cable. If you bundle a group of cables together with cable ties (zip ties), do not over-cinch them. You should be able to turn the tie with fingers. Keep cables away from devices which can introduce noise into them. Here's a short list: copy machines, electric heaters, speakers, printers, TV sets, fluorescent lights, copiers, welding machines, microwave ovens, telephones, fans, elevators, motors, electric ovens, dryers, washing machines, and shop equipment. Avoid stretching UTP cables (tension when pulling cables should not exceed 25 LBS). Do not run UTP cable outside of a building.  It presents a very dangerous lightning hazard! Do not use a stapler to secure UTP cables.  Use telephone wire/RJ6 coaxial wire hangers which are available at most hardware stores.

79 Fiber Optic Cabling InfrastructureComponents: Fiber Cable Fiber Pigtail Fiber Connectors LIU Coupler Fiber Patch Cord

80 Fiber Optic ConnectorsCabling Fiber Optic Connectors Terminates the fibers Connects to other fibers or transmission equipment

81 Fiber Patch Cords & PigtailsCabling Fiber Patch Cords & Pigtails Ends are typically either SC or ST Pigtails have connectors on only one side and Patch Cords have it on both sides. Pigtails are spliced to the fiber to terminate the fiber Patch Cord connects switches to the Fiber cable

82 Cabling LIU & Couplers

83 Fiber Optic Installation – Outside PlantCabling Fiber Optic Installation – Outside Plant

84 Fiber Optic Installation – Outside PlantCabling Fiber Optic Installation – Outside Plant Fiber is blown in HDPE Pipes, 1 m deep. The HDPE pipes is covered with sand and brick lining Fiber Roles are typically 2 Km. Fiber cables are spliced using Jointers Faults like fiber cut are located using OTDR (Optical Time Domain Reflectometer)

85 LAN Technologies LAN TECHNOLOGIES

86 Technology Options Ethernet Fast Ethernet Gigabit EthernetLAN Technologies Technology Options Ethernet Fast Ethernet Gigabit Ethernet 10 Gig Ethernet WLAN

87 Media Access Ethernet and Wi-Fi are both “multi-access” technologiesLAN Technologies Media Access Ethernet and Wi-Fi are both “multi-access” technologies Broadcast medium, shared by many hosts Simultaneous transmissions will result in collisions Media Access Control (MAC) protocol required Rules on how to share medium The Data Link Layer is divided into two Part MAC Media Access Control) Sublayer and LLC (Logic Link Control) Sublayer

88 LAN Technologies 802.3 Ethernet Carrier-sense multiple access with collision detection (CSMA/CD). CS = carrier sense MA = multiple access CD = collision detection Base Ethernet standard is 10 Mbps. 100Mbps, 1Gbps, 10Gbps standards came later

89 LAN Technologies Ethernet CSMA/CD CSMA/CD (carrier sense multiple access with collision detection) media access protocol is used. Data is transmitted in the form of packets. Sense channel prior to actual packet transmission. Transmit packet only if channel is sensed idle; else, defer the transmission until channel becomes idle. After packet transmission is started, the node monitors its own transmission to see if the packet has experienced a collision. If the packet is observed to be undergoing a collision, the transmission is aborted and the packet is retransmitted after a random interval of time using Binary Exponential Backoff algorithm.

90 LAN Technologies Ethernet Address End nodes are identified by their Ethernet Addresses (MAC Address or Hardware Address) which is a unique 6 Byte address. MAC Address is represented in Hexa Decimal format e.g 00:05:5D:FE:10:0A The first 3 bytes identify a vendor (also called prefix) and the last 3 bytes are unique for every host or device

91 Ethernet Frame StructureLAN Technologies Ethernet Frame Structure Preamble: 7 bytes with pattern followed by one byte with pattern Used to synchronize receiver, sender clock rates Addresses: 6 bytes, frame is received by all adapters on a LAN and dropped if address does not match Length: 2 bytes, length of Data field CRC: 4 bytes generated using CR-32, checked at receiver, if error is detected, the frame is simply dropped Data Payload: Maximum 1500 bytes, minimum 46 bytes If data is less than 46 bytes, pad with zeros to 46 bytes Length

92 Ethernet 10 Base 5 (Thicknet) (Bus Topology)LAN Technologies Ethernet 10 Base 5 (Thicknet) (Bus Topology) 10 Base 2 (Thinnet) (Bus Topology) 10 Base T (UTP) (Star/Tree Topology) 10 Base FL (Fiber) (Star/Tree Topology)

93 LAN Technologies Ethernet BUS Topology Repeater

94 Ethernet STAR TopologyLAN Technologies Ethernet STAR Topology Hub

95 Ethernet Physical Media :- Maximum Segment LengthLAN Technologies Ethernet Physical Media :- 10 Base Thick Co-axial Cable with Bus Topology 10 Base Thin Co-axial Cable with Bus Topology 10 BaseT UTP Cat 3/5 with Tree Topology 10 BaseFL Multimode/Singlemode Fiber with Tree Topology Maximum Segment Length 10 Base m with at most 4 repeaters (Use Bridge to extend the network) 10 Base m with at most 4 repeaters (Use Bridge to extend the network) 10 BaseT m with at most 4 hubs (Use Switch to extend the network)

96 Fast Ethernet 100 Mbps bandwidthLAN Technologies Fast Ethernet 100 Mbps bandwidth Uses same CSMA/CD media access protocol and packet format as in Ethernet. 100BaseTX (UTP) and 100BaseFX (Fiber) standards Physical media :- 100 BaseTX UTP Cat 5e 100 BaseFX - Multimode / Singlemode Fiber Full Duplex/Half Duplex operations.

97 LAN Technologies Fast Ethernet Provision for Auto-Negotiation of media speed: 10 Mbps or 100Mbps (popularly available for copper media only). Maximum Segment Length 100 Base TX m 100 Base FX Km (Multimode Fiber) 100 Base FX km (Singlemode Fiber)

98 Gigabit Ethernet 1 Gbps bandwidth.LAN Technologies Gigabit Ethernet 1 Gbps bandwidth. Uses same CSMA/CD media access protocol as in Ethernet and is backward compatible (10/100/100 modules are available). 1000BaseT (UTP), 1000BaseSX (Multimode Fiber) and 1000BaseLX (Multimode/Singlemode Fiber) standards. Maximum Segment Length 1000 Base T m (Cat 5e/6) 1000 Base SX m (Multimode Fiber) 1000 Base LX m (Multimode Fiber) 1000 Base LX Km (Singlemode Fiber) 1000 Base LH Km (Singlemode Fiber)

99 10 Gig Ethernet 10 Gbps bandwidth.LAN Technologies 10 Gig Ethernet 10 Gbps bandwidth. Uses same CSMA/CD media access protocol as in Ethernet. Propositioned for Metro-Ethernet Maximum Segment Length 1000 Base-T Not available 10GBase-LR Km (Singlemode Fiber) 10GBase-ER Km (Singlemode Fiber)

100 Network connectivity to the legacy wired LANLAN Technologies Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network The AP is connected to wired network and is equipped with antennae to provide wireless connectivity Desktop with PCI LAN card Network connectivity to the legacy wired LAN Access Point Laptop with PCMCIA LAN card

101 LAN Technologies Wireless LAN Range ( Distance between Access Point and WLAN client) depends on structural hindrances and RF gain of the antenna at the Access Point To service larger areas, multiple APs may be installed with a 20-30% overlap A client is always associated with one AP and when the client moves closer to another AP, it associates with the new AP (Hand-Off) Three flavors: 802.11b 802.11a 802.11g

102 Multiple Access with Collision Avoidance (MACA)LAN Technologies Multiple Access with Collision Avoidance (MACA) Before every data transmission Sender sends a Request to Send (RTS) frame containing the length of the transmission Receiver respond with a Clear to Send (CTS) frame Sender sends data Receiver sends an ACK; now another sender can send data When sender doesn’t get a CTS back, it assumes collision other node in sender’s range other node in receiver’s range sender receiver RTS CTS data ACK

103 LAN Technologies WLAN : b The most popular standard currently in deployment. Supports 1, 2, 5.5 and 11 Mbps data rates in the 2.4 GHz ISM (Industrial-Scientific-Medical) band

104 LAN Technologies WLAN : a Operates in the 5 GHz UNII (Unlicensed National Information Infrastructure) band Incompatible with devices operating in 2.4GHz Supports Data rates up to 54 Mbps.

105 LAN Technologies WLAN : g Supports data rates as high as 54 Mbps on the 2.4 GHz band Provides backward compatibility with b equipment

106 REPEATER, HUB, BRIDGE AND SWITCHRepeater, HUB, Bridge & Switch REPEATER, HUB, BRIDGE AND SWITCH

107 Repeater, Hub, Bridge & SwitchA repeater receives a signal, regenerates it, and passes it on. It can regenerate and retime network signals at the bit level to allow them to travel a longer distance on the media. It operates at Physical Layer of OSI The Four Repeater Rule for 10-Mbps Ethernet should be used as a standard when extending LAN segments. This rule states that no more than four repeaters can be used between hosts on a LAN. This rule is used to limit latency added to frame travel by each repeater.

108 Repeater, Hub, Bridge & SwitchHubs are used to connect multiple nodes to a single physical device, which connects to the network. Hubs are actually multiport repeaters. Using a hub changes the network topology from a linear bus, to a star. With hubs, data arriving over the cables to a hub port is electrically repeated on all the other ports connected to the same network segment, except for the port on which the data was sent.

109 Repeater, Hub, Bridge & SwitchBridges are used to logically separate network segments within the same network. They operate at the OSI data link layer (Layer 2) and are independent of higher- layer protocols. The function of the bridge is to make intelligent decisions about whether or not to pass signals on to the next segment of a network. When a bridge receives a frame on the network, the destination MAC address is looked up in the bridge table to determine whether to filter, flood, or copy the frame onto another segment Broadcast Packets are forwarded

110 Switch Switches are Multiport Bridges.Repeater, Hub, Bridge & Switch Switch Switches are Multiport Bridges. Switches provide a unique network segment on each port, thereby separating collision domains. Today, network designers are replacing hubs in their wiring closets with switches to increase their network performance and bandwidth while protecting their existing wiring investments. Like bridges, switches learn certain information about the data packets that are received from various computers on the network. Switches use this information to build forwarding tables to determine the destination of data being sent by one computer to another computer on the network.

111 Switches: Dedicated AccessRepeater, Hub, Bridge & Switch Switches: Dedicated Access Hosts have direct connection to switch Full Duplex: No collisions Switching: A-to-A’ and B-to- B’ simultaneously, no collisions Switches can be cascaded to expand the network A C’ B switch C B’ A’

112 WAN Technologies WAN TECHNOLOGIES

113 Technology Options Dial-up Leased Line ISDN X.25 Frame Relay ATM DSLWAN Technologies Technology Options Dial-up Leased Line ISDN X.25 Frame Relay ATM DSL Cable Modem Microwave Point-to-Point Link VSAT

114 Dial-up Uses POTS (Plain Old Telephone System)WAN Technologies Dial-up Uses POTS (Plain Old Telephone System) Provides a low cost need based access. Bandwidth 33.6 /56 Kbps. On the Customer End: Modem is connected to a Telephone Line On the Service Provider End: Remote Access Server (RAS) is connected to Telephone Lines (33.6 Kbps connectivity) or E1/R2 Line (56 Kbps connectivity) RAS provide dialin connectivity, authentication and metering. Achievable bandwidth depends on the line quality.

115 WAN Technologies Dial-up

116 WAN Technologies Dial-up RAS

117 Dial-up Analog line ? Access server WAN Technologies 33.6 Kbps 56 KbpsTelephone switch Telephone switch ? Modem Modem 56 Kbps Access server Telephone switch Modem E1

118 WAN Technologies Leased Line Used to provide point-to-point dedicated network connectivity. Analog leased line can provide maximum bandwidth of 9.6 Kbps. Digital leased lines can provide bandwidths : 64 Kbps, 2 Mbps (E1), 8 Mbps (E2), 34 Mbps (E3) ...

119 Leased Line Internet ConnectivityWAN Technologies Leased Line Internet Connectivity ISP Broadband Internet Connectivity ISP Router PSTN Interface Converter LL Modem G.703 LL Modem V.35 Router ISP PREMISES CUSTOMER PREMISES

120 WAN Technologies ISDN Another alternative to using analog telephones lines to establish a connection is ISDN. Speed is one advantage ISDN has over telephone line connections. ISDN network is a switched digital network consisting of ISDN Switches. Each node in the network is identified by hierarchical ISDN address which is of 15 digits. ISDN user accesses network through a set of standard interfaces provided by ISDN User Interfaces.

121 ISDN Two types of user access are definedWAN Technologies ISDN Two types of user access are defined Basic Access - Consists of two 64Kbps user channels (B channel) and one 16Kbps signally channel (D channel) providing service at 144 Kbps. Primary access - Consists of thirty 64Kbps user channels (B channels) and a 64 Kbps signally channel (D channel) providing service at 2.048Mbps (One 64 Kbps channel is used for Framing and Synchronization). B D Information 128 Kbps (Voice & Data) Signaling 16Kbps Basic B D Information 1920 Kbps Voice & Data Signaling 64 Kbps Primary

122 ISDN ISDN devices TE1 4W 2W NT1 S/T interface U interface TE2 TAWAN Technologies ISDN ISDN devices TE1 4W 2W NT1 S/T interface U interface TE2 TA Devices NT1 - Interface Converter TE1 - ISDN devices TE2 – Non ISDN Devices (need TA) TA - Terminal Adapter (ISDN Modem)

123 X.25 Packet switched Network consisting of X.25 switches.WAN Technologies X.25 Packet switched Network consisting of X.25 switches. X.25 is a connection oriented protocol (Virtual Circuits). End nodes are identified by an X .25 address. Typical bandwidth offered is 2.4/9.6 kbps. IP networks interface with X .25 through IP- X.25 routers.

124 WAN Technologies X.25 and Virtual Circuits

125 Frame Relay Designed to be more efficient than X.25WAN Technologies Frame Relay Designed to be more efficient than X.25 Developed before ATM Call control carried in separate logical connection No hop by hop error or flow control End to end flow and error control (if used) are done by higher layer Single user data frame sent from source to destination and ACK (from higher layer) sent back Two type of Virtual Circuits defined Permanent virtual circuits (PVCs) Switched virtual circuits (SVCs)

126 WAN Technologies ATM Small fixed size packets of 53 bytes, called cells, are used for transferring information. Each cell has 5 bytes of header and 48 bytes of payload for user information. Connection oriented protocol. A virtual Circuit is established between the communicating nodes before data transfer takes place. Can be seamlessly used in LANs and WANs. Almost unlimited scalability. Provides quality of service guaranties.

127 Digital Subscriber Line (DSL)WAN Technologies Digital Subscriber Line (DSL) Digital Subscriber Line (DSL) uses the Ordinary Telephone line and is an always-on technology. This means there is no need to dial up each time to connect to the Internet. Because DSL is highly dependent upon noise levels, a subscriber cannot be any more than 5.5 kilometers (2-3 miles) from the DSL Exchange Service can be symmetric, in which downstream and upstream speeds are identical, or asymmetric in which downstream speed is faster than upstream speed. DSL comes in several varieties: Asymmetric DSL (ADSL) High Data Rate DSL (HDSL) Symmetric DSL (SDSL) Very High Data Rate DSL (VDSL)

128 WAN Technologies ADSL

129 WAN Technologies Cable Modems The cable modem connects a computer to the cable company network through the same coaxial cabling that feeds cable TV (CATV) signals to a television set. Uses Cable Modem at Home End and CMTS (Cable Modem Termination System) at Head End. Characteristics: Shared bandwidth technology 10 Mbps to 30 Mbps downstream 128Kbps-3 Mbps upstream Maximum Distance from provider to customer site: 30 miles

130 WAN Technologies Cable Modems

131 Point-to-Point Microwave LinkWAN Technologies Point-to-Point Microwave Link MICROWAVE LINK Network RF Modem Router Router RF Modem ISP Network CUSTOMER PREMISES ISP PREMISES

132 Point-to-Point Microwave LinkWAN Technologies Point-to-Point Microwave Link Typically MHz Band or 5 GHz Radio Link band 2.4 GHz WiFi links are becoming popular Requires Line of Sight

133 WAN Technologies VSAT Very Small Aperture Terminal (VSAT) provide communication between two nodes through a powerful Earth station called a Hub. If two terminals want to communicate, they send their messages to the satellite, which sends it to the Hub and the Hub then broadcasts the message through the satellite. Typical Bandwidth offered is 9.6/19.2/32/64/128/256/512 Kbps. Operating modes are TDM/TDMA, SCPC PAMA & DAMA

134 VSAT Each satellite sends and receives over two bandsWAN Technologies VSAT Each satellite sends and receives over two bands Uplink: From the earth to the satellite Downlink: From the satellite to the earth Satellite frequency bands Band Downlink Uplink C GHz GHz Ku GHz GHz Ku-band based networks, are used primarily in Europe and North America and utilize the smaller sizes of VSAT antennas. C-band, used extensively in Asia, Africa and Latin America, require larger antenna.

135 Internet Protocol INTERNET PROTOCOL

136 Internet Protocol IP as a Routed Protocol IP is a connectionless, unreliable, best-effort delivery protocol. IP accepts whatever data is passed down to it from the upper layers and forwards the data in the form of IP Packets. All the nodes are identified using an IP address. Packets are delivered from the source to the destination using IP address

137 Internet Protocol Packet Propagation

138 Internet Protocol IP Address IP address is for the INTERFACE of a host. Multiple interfaces mean multiple IP addresses, i.e., routers. 32 bit IP address in dotted-decimal notation for ease of reading, i.e., Address , and carries special meaning. IP address is divided into a network number and a host number. Also bits in Network or Host Address cannot be all 0 or 1.

139 Internet Protocol IP Address

140 Internet Protocol IP Address

141 Internet Protocol IP Address Class A : Address begins with bit 0. It has 8 bit network number (range to ), 24 bit host number. Class B : Address begins with bits 10. It has 16 bit network number (range to ), 16 bit host number. Class C : Address begins with bits 110. It has 24 bit network number (range to ), 8 bit host number. Class D : Begins with 1110, multicast addresses ( to ) Class E : Begins with 11110, unused

142 Subnet Mask Consider IP address = 192.168.2.25Internet Protocol Subnet Mask Consider IP address = First few bits (left to right) identify network/subnet Remaining bits identify host/interface Number of subnet bits is called subnet mask, e.g. Subnet IP Address range is – or Mask = Subnet IP Address range is – or Mask =

143 IP Address, Subnet Mask and GatewayInternet Protocol IP Address, Subnet Mask and Gateway IP Address and Subnet Mask define the Subnet For Example IP address and Subnet Mask of means that the subnet address ranges from to Another notation is /28 The first Address is the Network Address and the last Address is the Broadcast Address. They are reserved and cannot be assigned to any node. The Gateway Address is the Address of the router where the packet should be sent in case the destination host does not belong to the same subnet

144 IP Configuration of an InterfaceInternet Protocol IP Configuration of an Interface Static DHCP

145 Internet Protocol ARP ARP (Address Resolution Protocol) is used in Ethernet Networks to find the MAC address of a node given its IP address. Source node (say ) sends broadcast message (ARP Request) on its subnet asking ``Who is ’’. All computers on subnet receive this request Destination responds (ARP Reply) since it has Provides its MAC address in response

146 Internet Protocol IPv6 Internet Protocol Version 4 is the most popular protocol in use today, although there are some questions about its capability to serve the Internet community much longer. IPv4 was finished in the 1970s and has started to show its age. The main issue surrounding IPv4 is addressing—or, the lack of addressing—because many experts believe that we are nearly out of the four billion addresses available in IPv4. Although this seems like a very large number of addresses, multiple large blocks are given to government agencies and large organizations. IPv6 could be the solution to many problems posed by IPv4

147 IPv6 IPv6 uses 128 bit address instead of 32 bit address.Internet Protocol IPv6 IPv6 uses 128 bit address instead of 32 bit address. The IPv6 addresses are being distributed and are supposed to be used based on geographical location.

148 Routing ROUTING

149 Routing Router A router is a device that determines the next network point to which a packet should be forwarded toward its destination Allow different networks to communicate with each other A router creates and maintain a table of the available routes and their conditions and uses this information to determine the best route for a given packet. A packet will travel through a number of network points with routers before arriving at its destination. There can be multiple routes defined. The route with a lower weight/metric will be tried first.

150 Routing Routing

151 Routing Protocols Static Routing Dynamic RoutingIGP (Interior Gateway Protocol): Route data within an Autonomous System RIP (Routing Information Protocol) RIP-2 (RIP Version 2) OSPF (Open Shortest Path First) IGRP (Interior Gateway Routing Protocol) EIGRP (Enhanced Interior Gateway Routing Protocol) IS-IS EGP (Exterior Gateway Protocol): Route data between Autonomous Systems BGP (Border Gateway Protocol)

152 Internetworking DevicesDescription Hub Hubs are used to connect multiple users to a single physical device, which connects to the network. Hubs and concentrators act as repeaters by regenerating the signal as it passes through them. Bridge Bridges are used to logically separate network segments within the same network. They operate at the OSI data link layer (Layer 2) and are independent of higher-layer protocols. Switch Switches are similar to bridges but usually have more ports. Switches provide a unique network segment on each port, thereby separating collision domains. Today, network designers are replacing hubs in their wiring closets with switches to increase their network performance and bandwidth while protecting their existing wiring investments. Router Routers separate broadcast domains and are used to connect different networks. Routers direct network traffic based on the destination network layer address (Layer 3) rather than the workstation data link layer or MAC address.

153 VLAN VLAN

154 VLAN VLANs VLANs (Virtual LAN) enable network managers to group users logically (based on functions, project teams or applications) rather than by physical location. Traffic can only be routed between VLANs. VLANs provide the segmentation traditionally provided by physical routers in LAN configuration.

155 VLANs and Inter VLAN Routing

156 Advantages of Using VLANsBroadcast Control— Just as switches physically isolate collision domains for attached hosts and only forward traffic out a particular port, VLANs provide logical bridging domains that confine broadcast and multicast traffic to the VLANs. Security— If you do not allow routing in a VLAN, no users outside of that VLAN can communicate with the users in the VLAN and vice versa. This extreme level of security can be highly desirable for certain projects and applications. Performance— You can assign users that require high- performance or isolated networking to separate VLANs.

157 TCP/UDP TCP/UDP

158 TCP/UDP Transport Layer ProtocolTCP is connection Oriented (uses checksum and acknowledgment) UDP is Connectionless Both use the concept of Connection Port Number (16 Bit Source Port Number and Destination Port Number) Standard Applications have standard Port Numbers ( 25, Telnet 23, FTP 20 & 21, SSH 22)

159 Natting NATTING

160 Private vs Public IP AddressesNatting Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage of public IPv4 address So Private IP addresses can be used within a private network Three address ranges are reserved for private usage /8 /16 to /16 /24 to /24 A private IP is mapped to a Public IP, when the machine has to access the Internet

161 NAT NAT (Network Address Translation) Maps Private IPs to Public IPsNatting NAT NAT (Network Address Translation) Maps Private IPs to Public IPs It is required because of shortage of IPv4 Address

162 NAT Static NAT : Maps unique Private IP to unique Public IPNatting NAT Static NAT : Maps unique Private IP to unique Public IP Dynamic NAT : Maps Multiple Private IP to a Pool of Public IPs (Port Address Translation : Maps a Public IP and Port Number to a service in Private IP)

163 SNMP SNMP

164 Simple Network Management ProtocolSNMP Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP: SNMP agents SNMP managers Management Information Bases (MIBs) SNMP protocol itself

165 SNMP SNMP SNMP is based on the manager/agent model consisting of a manager, an agent, a database of management information, called as MIB. The manager provides the interface between the human network manager and the management system. The agent provides the interface between the manager and the physical device(s) being managed.

166 SNMP SNMP SNMP uses five basic messages (GET, GET-NEXT, GET- RESPONSE, SET, and TRAP) to communicate between the manager and the agent. The GET and GET-NEXT messages allow the manager to request information for a specific variable. The agent, upon receiving a GET or GET-NEXT message, will issue a GET- RESPONSE message to the manager with either the information requested or an error indication as to why the request cannot be processed. A SET message allows the manager to request a change be made to the value of a specific variable in the case of an alarm remote that will operate a relay. The agent will then respond with a GET-RESPONSE message indicating the change has been made or an error indication as to why the change cannot be made. The TRAP message allows the agent to spontaneously inform the manager of an ‘important’ event.

167 VPN VPN

168 VPN VPN VPN is a private connection between two systems or networks over a shared or public network (typically Internet). VPN technology lets an organization securely extend its network services over the Internet to remote users, branch offices, and partner companies. In other words, VPN turns the Internet into a simulated private WAN. VPN is very appealing since the Internet has a global presence, and its use is now standard practice for most users and organizations.

169 VPN VPN

170 VPN How VPN Works To use the Internet as a private Wide Area Network, organizations may have to address two issues : First, networks often communicate using a variety of protocols, such as IPX and NetBEUI, but the Internet can only handle TCP/IP traffic. So VPN may need to provide a way to pass non-TCP/IP protocols from one network to another. Second data packets traveling the Internet are transported in clear text. Therefore, anyone who can see Internet traffic can also read the data contained in the packets. This is a problem if companies want to use the Internet to pass important, confidential business information.

171 VPN How VPN Works VPN overcome these obstacles by using a strategy called Tunneling. Instead of packets crossing the Internet out in the open, data packets are fist encrypted for security, and then encapsulated in an IP packet by the VPN and tunneled through the Internet. The VPN tunnel initiator on the source network communicates with a VPN tunnel terminator on the destination network. The two agree upon an encryption scheme, and the tunnel initiator encrypts the packet for security.

172 Advantages of Using VPNVPN technology provides many benefits. Perhaps the biggest selling point for VPN is cost savings. One can avoid having to purchase expensive leased lines to branch offices or partner companies. On another cost-related note, you can evade having to invest in additional WAN equipment and instead leverage your existing Internet installation. Another benefit of VPN is that it is an ideal way to handle mobile users.

173 ENTERPRISE NETWORK IMPLEMENTATION

174 Small Office Network Use Unmanaged 10/100 SwitchesEnterprise Network Small Office Network Use Unmanaged 10/100 Switches Use Enhanced Cat 5 Pathcords

175 Campus Network ArchitectureEnterprise Network Campus Network Architecture Server Farm Firewall Backbone Switch Internet Distribution Switch Access Switch

176 Campus Network ArchitectureEnterprise Network Campus Network Architecture Uses Three Tier Switching Architecture (Popularly known as Cisco’s Switching Architecture) Backbone Switch Layer 3/4 Chassis based switch Multiple 100Fx or 1000SX/LX or 10GLX/LH ports for connectivity to Distribution switches Multiple 10/100/1000 ports for connectivity to Servers Distribution Switch Layer 2/3 Managed Fixed configuration switch 1/2 100Fx or 1000Sx/Lx or 10GLX/LH ports for connectivity to the Backbone switch Multiple 10/100 or 10/100/1000 ports for connectivity to the Access switches Access Switch Layer2 Managed/Unmanaged Fixed configuration switch Multiple 10/100 or 10/100/1000 ports for desktop connectivity

177 Campus Network CablingEnterprise Network Campus Network Cabling Campus backbone cabling—This is typically single- or multimode cable that interconnects the central campus Backbone Switch with each of the building Distribution Switches. Typically Ring Architecture is used to connect the Backbone switch to the Distribution switch to provide redundant routes. Building backbone cabling—This is typically Category 5e or 6 UTP cable that interconnects the building distributor with each of the floor distributors in the building. Horizontal cabling—This is predominantly Category 5e or 6 UTP cabling.

178 Distribution Switch Backbone Switch Distribution Switch Distribution Switch

179 Distribution Switch Distribution Switch Backbone Switch Distribution Switch

180 Distribution Switch Distribution Switch Backbone Switch Distribution Switch

181 Enterprise Network Campus Network The residential connectivity can be provided on Ethernet/Dial-up/ADSL. The Internet connectivity can be provided on leased line.

182 Enterprise WAN ArchitectureEnterprise Network Enterprise WAN Architecture A typical scenario will have Corporate Headquarter connected to Remote Offices (Branch Offices, Retail Counters etc.) The Remote offices would be interconnected to the corporate office through A dedicated network implemented over Leased-Lines and/or IPLC (International Private Leased Circuit) (Microsoft, IBM, Cisco, Infosys etc.) A dedicated network implemented over VSAT (Banks’ ATM Network, Reserve Bank network, BSE Online Trading, NSE Online Trading etc.) VPNs on the Internet (Asian Paint Supplier Network, Bajaj Auto Retail Network etc.) A mix of above technologies The backup links may provided through Redundant route through an alternate leased line Dial backup on ISDN (The Head Office has a PRI connectivity and the Remote offices have BRI connectivity)

183 Enterprise WAN ArchitectureEnterprise Network Enterprise WAN Architecture The Disaster Recovery site would be connected through multiple links to the main site VoIP infrastructure may be available (A Call Manager will be placed at the Head Office and VoIP phones would be available in all the offices) The NOC (Network Operation Center) may be at the Head Quarter (Infosys) or at a remote site (Reliance, Microsoft) The NOC maintains, monitors and manages the network and application servers. The Data exchange between offices may be through the servers at NOC to ensure security

184 Enterprise WAN NetworkEnterprise Network Enterprise WAN Network

185 Enterprise WAN NetworkEnterprise Network Enterprise WAN Network

186 Enterprise WAN Enterprise Network Server Farm Service Provider NetworkCorporate Head Office Branch Office Service Provider Network Branch Office All the locations are connected through a Service Provider Network over MPLS Backbone Branch Office

187 Service Provider Networks: RelianceEnterprise Network Service Provider Networks: Reliance Reliance Data Centers, are connected to 132 countries across 4 continents spanning US, UK, Mid-east and Asia-Pac through Flag Telecom backbone (Reliance Infocomm 's group company) and other undersea cable systems like Se-Me-Wea-3 and i2i and are having public / private peering relationship with large Tier 1 ISPs and content providers at more than 15 Internet Exchange points across the globe. There also exists peering relationship with other popular domestic ISPs on STM-1 bandwidth levels. The data centers further are connected to Reliance's country wide optic fiber based IP network with terabytes of capacity having points of presence at more than 1100 cities. Customers' can access the Internet by connecting to any of these 1100 PoPs using multiple means like local dedicated leased lines, PSTN -ISDN dialup links OR simply by using Reliance's 3G CDMA mobile services. The Reliance Data Centers at various locations are also interconnected through redundant fiber ring with bandwidth capacity of STM-4 for data replication purposes for providing Disaster Recovery services.

188 Service Provider Networks: RelianceEnterprise Network Service Provider Networks: Reliance

189 Service Provider Networks: RelianceEnterprise Network Service Provider Networks: Reliance

190 Service Provider NetworksEnterprise Network Service Provider Networks ISP network ISP network Backbone networks Bandwidth-limited links ISP network Customers connect to an ISP ISPs connect to backbone Customer Networks

191 Service Provider Networks: FLAGEnterprise Network Service Provider Networks: FLAG

192 CONFIGURING CISCO SWITCH AND ROUTERCisco Devices CONFIGURING CISCO SWITCH AND ROUTER

193 Cisco Devices Cisco’s LAN Switches

194 Cisco Devices Cisco’s Routers

195 Hardware Components Depending on the model/series (at least)Cisco Devices Hardware Components Depending on the model/series (at least) Mother Board/Back Plane CPU (RISC - MIPS or Motorola) Memory Bus I/O interfaces/Modules

196 Memory Components Cisco DevicesFlash Memory – Holds the IOS; is not erased when the router is reloaded; is an EEPROM [Electrically Erasable Programmable Read-Only Memory] created by Intel, that can be erased and reprogrammed repeatedly through an application of higher than normal electric voltage NVRAM – Non-Volatile RAM - holds router configuration; is not erased when router is reloaded RAM – Holds packet buffers, ARP cache, routing table, software and data structure that allows the router to function; running- config is stored in RAM, as well as the decompressed IOS in later router models ROM – Starts and maintains the router

197 What is IOS? Internetwork Operating SystemCisco Devices What is IOS? Internetwork Operating System Operating System of all Cisco Devices A derivative of BSD UNIX Custom built by Cisco for each platform Pre-packaged and static. Complete IOS is upgraded. Features available in different versions (for a price!) GUI’s available, but 90%+ of users still prefer command- line configuration. IOS is designed to be hardware independent.

198 Configuring Cisco DevicesProvides Command Line Interface (CLI) and HTTP interface HTTP Interface may be an extention of CLI CLI can be accessed using Consol Port (through Hyper Terminal) or by Telnetting the device

199 Configuring Cisco DevicesTwo modes of Operation : Consol Mode : Only Status can be monitored Enable Mode : Configuration can be changed and seen Router> enable (disable) Router#

200 CLI Commands Exhaustive Command ListCisco Devices CLI Commands Exhaustive Command List Type help or ? to see list of commands Type command ? to see the possible command options Commands can be auto-completed using TAB Up-Arrow, Down-Arrow can be used to see command history Abbreviations of Commands can be used

201 Show Configuration sh run : To see running configurationCisco Devices Show Configuration sh run : To see running configuration sh conf : To see saved configuration

202 Cisco Devices Save Configuration wr mem

203 Cisco Devices Configuration Mode conf t

204 Disable or Delete the ConfigurationCisco Devices Disable or Delete the Configuration Use “no” before the configuration line

205 General Commands hostname ip default-gateway ip name-server ip routingCisco Devices General Commands hostname ip default-gateway ip name-server ip routing ip route ip multicast-routing banner

206 Interface Configuration CommandsCisco Devices Interface Configuration Commands Interfaces are named by type and position; e.g.: ethernet0, ethernet1/0,... Fastethernet0,fastethernet1/0,… gigabitethernet0,gigabitethernet1/0 serial0, serial1 ... serial3/1 Can be abbreviated: ethernet0 or eth0 or e0 serial0 or ser0 or s0 IP address and netmask configuration, status configuration etc. are done using interface commands: router#config terminal router(config)#interface e0 router(config-if)#ip address router(config-if)#exit router#

207 Interface Commands ip address < ip address > < netmask >Cisco Devices Interface Commands ip address < ip address > < netmask > ip address < ip address > < netmask > secondary duplex full/half/auto speed 10/100/1000/auto bandwidth < bandwidth in kbps > description < interface description > shutdown encapsultaion hdlc/ppp

208 Static Routing CommandsCisco Devices Static Routing Commands ip route ip route ip default-gateway < default gateway router address> ip default-gateway ip route

209 Backup & Restore ConfigurationCisco Devices Backup & Restore Configuration Copy (from cisco device to tftp server and vice- versa) copy startup-config tftp (it will ask the tftp server ip address and destination filename) copy tftp startup-config (it will ask the tftp server ip address and destination filename)

210 Cisco Devices Static NAT Commands ip nat inside (on the port where you have private IP) ip nat outside (on the port where you have public IP) ip nat inside source static (global command)

211 Cisco Devices NAT Pool Commands ip nat inside (on the port where you have private IP) ip nat outside (on the port where you have public IP) ip nat pool (global command) ip nat inside source list 1 pool overload (global command) access-list 1 permit (global command)

212 Cisco Devices Diagnostic Commands ping traceroute

213 General Monitoring and Administration CommandsCisco Devices General Monitoring and Administration Commands reload sh ver sh int

214 Cisco Devices Upgrading Cisco IOS Download and install TFTP server (http://www.download.com) Download Cisco IOS Software Image to be upgraded Copy this image in the outbound directory of TFTP server Establish a Console or Telnet session with the router Use sh flash command to check that you have enough space in flash to install the new image Backup the existing IOS image on the TFTP server using the command copy flash tftp (it will ask the tftp server ip address and source and destination filename) Copy the new IOS image from TFTP server to the flash using the command copy tftp flash (it will ask for the tftp server ip address and source and destination filename) Reboot the Router

215 INTERNET APPLICATIONS

216 Internet ApplicationsDomain Name Service Proxy Service Mail Service Web Service

217 DNS DNS

218 Internet Naming HierarchyDNS Internet Naming Hierarchy The silent dot at the end of all addresses .com .net .org .in .tcd .ac .co .iitk www www

219 DNS Operation DNS SetupA DNS server maintains the name to IP address mapping of the domain for which it is the name server. The DNS server for a domain is registered with the domain registrar and the entry is maintained by the Internet Root-Servers (13) or Country Level Root- Servers. Whenever a server is queried, if doesn’t have the answer, the root servers are contacted. The root servers refer to the DNS server for that domain (in case the domain is a top level domain) or the Country Root Server (in case the domain is country level domain).

220 Proxy Server PROXY SERVER

221 Internet Connections Customers connect to an ISPProxy Server Internet Connections ISP network ISP network Backbone networks Bandwidth-limited links ISP network Customers connect to an ISP ISPs connect to backbone Customer Networks

222 Internet Connections Cost of connections is based on bandwidthProxy Server Internet Connections Cost of connections is based on bandwidth Cost of connection is a major part of network cost Organisations only obtain as much bandwidth as they can afford Many organisations in Asia-Pacific only have 64kb/s – 2Mb/s connections (as compared to their counterpart in US and Europe who have bandwidths of 2.4 Gbps – Gbps)

223 Proxy Server What is a Web Proxy? A proxy is a host which relays web access requests from clients Used when clients do not access the web directly Used for security, logging, accounting and performance browser proxy web

224 What is Web Caching? Storing copies of recently accessed web pagesProxy Server What is Web Caching? Storing copies of recently accessed web pages Pages are delivered from the cache when requested again Browser caches Proxy caches

225 Why Cache? Shorter response time Reduced bandwidth requirementProxy Server Why Cache? Shorter response time Reduced bandwidth requirement Reduced load on servers Access control and logging

226 Popular Proxy Caches Apache proxy MS proxy server WinProxy SquidSquid is popular because it is powerful, configurable and free Many others

227 Web Server WEB SERVER

228 Web Server Web Server HTTP (Hyper Text Transfer Protocol) is used to transfer web pages from a Web Server to Web Client (Browser) Web Pages are arranged in a directory structure in the Web Server HTTP supports CGI (Common Gateway interface) HTTP supports Virtual Hosting (Hosting multiple sites on the same server) Popular Web Servers Apache Windows IIS IBM Websphere

229

230 Mail Architecture Internet Mail Client Mail Client Mail Server Mail Architecture Internet Mail Server Mail Server Mail Client Mail Client

231 Mail Architecture

232 Mail Architecture Simple Mail Transfer Protocol (SMTP) is used to transfer mail between Mail Servers over Internet Post Office Protocol (PoP) and Interactive Mail Access Protocol (IMAP) is used between Client and Mail Server to retrieve mails The mail server of a domain is identified by the MX record of that domain Popular Mail Servers Sendmail/Postfix Microsoft Exchange Server IBM Lotus

233 DNS Setup DNS CONFIGURATION

234 DNS Configuration DNS Setup named daemon is usedA DNS Server may be caching/master/slave server The named.ca file has information of all Root Servers. There is a Forward Zone file and a Reverse Zone file for every domain. Configuration file: /var/named/chroot/etc/named.conf Forward Zone File: /var/named/chroot/var/named/ Reverse Zone File: /var/named/chroot/var/named/

235 Sample Master named.confDNS Setup Sample Master named.conf zone "." { type hint; file "named.ca"; }; zone " in-addr.arpa" { type master; file "named.local"; allow-query {any;}; zone "iitk.ac.in" { file "hosts.db"; zone " IN-ADDR.ARPA" { file "hosts.rev "; zone "iitk.ernet.in" { type slave; file "hosts.iitk.ernet.in"; masters { ; };

236 Sample Forward Zone FileDNS Setup Sample Forward Zone File $TTL 86400 @ IN SOA ns1.iitk.ac.in. root.ns1.iitk.ac.in. ( ; Serial ; Refresh - 3 hours ; Retry - 1 hour ;Expire - 1 week 43200 ) ; Minimum TTL for negative answers - 12 hours IN NS ns1.iitk.ac.in. IN NS ns2.iitk.ac.in. IN MX mail0.iitk.ac.in. IN MX mail1.iitk.ac.in. IN MX mail2.iitk.ac.in. $ORIGIN iitk.ac.in. ns IN A mail0 IN A proxy IN CNAME mail0

237 Sample Reverse Zone FileDNS Setup Sample Reverse Zone File $TTL 86400 $ORIGIN in-addr.arpa. IN SOA ns1.iitk.ac.in. root.ns1.iitk.ac.in. ( ; Serial ; Refresh - 5 minutes ; Retry - 1 minute ; Expire - 1 weeks 43200 ) ; Minimum TTL for negative answers - 12 hours IN NS ns1.iitk.ac.in. IN NS ns2.iitk.ac.in. $ORIGIN in-addr.arpa. ; IN PTR ns1.iitk.ac.in. IN PTR mail0.iitk.ac.in.

238 Configuring Local ResolverDNS Setup Configuring Local Resolver /etc/resolv.conf server

239 Test DNS DNS Setup nslookup host digTest your DNS with the following DNS diagnostics web site: dnsstuff.com

240 Apache Setup APACHE SETUP

241 Web Server Web Server Setup Apache Web Server is usedDaemon is httpd (service httpd start/stop/restart)

242 Files used by Apache Web Server SetupConfiguration file: /etc/httpd/conf/httpd.conf Log files: /var/log/httpd/access_log and /var/log/httpd/error_log Modules /etc/httpd/modules Default Document Root /var/www/html Default CGI Root /var/www/cgi-bin

243 Apache Configuration DirectivesWeb Server Setup Apache Configuration Directives Server Name Min and Max Servers Document Root CGI Enable/Disable User Directory Directory Index Mime Types Modules Access Restrictions Secure Server Virtual Hosting

244 Basic Settings Web Server SetupChange the default value for ServerName in httpd.conf and put the website content in /var/www/html Additionally you can configure Name based Virtual Hosting (allow more than one websites to run on the same server)

245 Virtual Hosting Web Server Setup NameVirtualHost *:80ServerName server-name DocumentRoot path-to-virtual-document-root

246 Squid Setup SQUID SETUP

247 Obtaining Squid Source code (in C) from www.squid-cache.orgSquid Setup Obtaining Squid Source code (in C) from Binary executables Linux (comes with RedHat and others) FreeBSD Windows Pre-installed in Fedora/Enterprise Linux

248 Basic Settings Edit the /etc/squid/squid.conf file to configure squidSquid Setup Basic Settings Edit the /etc/squid/squid.conf file to configure squid Configuration options: Disk Cache size and location Authentication Allowed Hosts Any other access restrictions (sites, content, size, time of access etc.) using ACL service squid start/stop/restart

249 Squid Setup Disc Requirements Squid makes very heavy use of disc because of heavy read/write in cache Needs discs with low seek times SCSI is better Can spread cache over 2 or more discs Raid not recommended Cached data is not critical

250 Calculating Disc SpaceSquid Setup Calculating Disc Space Recommend keeping at least 2 days worth of objects 10 days may be better Example: 256Kbps link loaded 10 hrs/day ~= 1GB assume 50% cacheable - .5GB / day 2 days objects - 1GB 10 days objects - 5 GB

251 Squid.conf Basic ConfigurationSquid Setup Squid.conf Basic Configuration cache_dir ufs /var/spool/squid/cache auth_param basic program /usr/lib/squid/ncsa_auth /etc/shadow acl sidbiusers proxy_auth required http_access allow sidbiusers acl our_network src /24 http_access allow our_network (Note: use squid –z for the first time to create the cache directory and its subdirectories)

252 Sendmail Setup SENDMAIL SETUP

253 Sendmail ConfigurationMail Server Setup Sendmail Configuration Daemon: sendmail Configuration File: /etc/mail/sendmail.mc Edit the following lines LOCAL_DOMAIN(`localhost.localdomain')dnl (Replace localhost.localdomain by the domain name for which the mail server is being configured) DAEMON_OPTIONS(`Port=smtp,Addr= , Name=MTA')dnl (comment this line by adding dnl at the start of the line) dnl MASQUERADE_AS(`mydomain.com')dnl (remove dnl & replace mydomain.com by the domain name)

254 Sendmail ConfigurationSendmail Setup Sendmail Configuration Add the range of IP addresses of your network in access file (e.g Relay) Run “make –C /etc/mail” command to compile sendmail.mc and generate sendmail.cf file. Restart sendmail and watch for errors

255 Sendmail Setup PoP & IMAP Server PoP3 & IMAP Server can be started using dovecot server. (service dovecot start)

256

257 Firewall FIREWALL

258 Firewall Basic Setup Internet Application Web Server Firewall Database

259 Firewall Rules IP Address of Source (Allow from Trusted Sources)IP Address of Destination (Allow to trusted Destinations) Application Port Number (Allow Mail but restrict Telnet) Direction of Traffic (Allow outgoing traffic but restrict incoming traffic)

260 Firewall ImplementationHardware Firewall: Dedicated Hardware Box (Cisco PIX, Netscreen ) Software Firewall: Installable on a Server ( ) Host OSs (Windows XP/Linux) also provide software firewall features to protect the host These days Firewalls provide IDS/IPS (Intrusion Detection System/Intrusion Prevention System) services also.

261 LINUX Firewall Linux SecurityUse GUI (Applications ->System Settings-> Security Level) to activate the firewall Allow standard services and any specific port based application All other services and ports are blocked

262 Linux Security LINUX Firewall