basics of ccna
TRANSCRIPT
-
7/30/2019 Basics of Ccna
1/35
Guru Nanak Dev Engineering College, Ludhiana
MID TERM REPORT
COMPUTER NETWORKING AND WDRAMAT
RELIENCE COMMUNICATION
UNDER GUIDANCE OF
PARAMJEET BHULLAR, CIRCLE LEAD IT DEPT
CHANDIGARH
KULWINDER MAHAL, AOI IT DEPT LUDHIANA
SUBMITTED BY
JASMINE KAUR
Electronics and communication engg. (2009-2013)
Roll No. 93040
Uni Roll No. 90370412844
-
7/30/2019 Basics of Ccna
2/35
TABLE OF CONTENT
1. Company profilea. IT. infrastructure
2. Introduction to Networkinga. Definition
b. Requirement of Networking
3. Types of Network
a. LAN (Local Area Network)
b. WAN (Wide Area Network)
4. Network Models
a. OSI Model
5. Cables
a. Twisted Cable
b. Coaxial Cablec. Fibre Optic
6. Networking Devices
a. Router
b. Switch
c. Repeater d. Hub
e. Gateway
f. Bridge
7. IP Addressing
a. Introductionb. Private IP
c. Masking
d. Subnetting
8. Network topologies
9. WDRAM
a. Windows server update server
b. Domain
c. Remedy
d. Antivirus
e. Marimba
-
7/30/2019 Basics of Ccna
3/35
COMPANY PROFILE
DHIRUBHAIS DREAM
Late Dhirubhai Ambani built Reliance from scratch to be in the reckoning
for a place in the Global Fortune 500 list. This achievement is even more
significant due to the fact, that the entire growth was achieved in an organic
manner and in a span of just 25 years.
Dhirubhai was not just firmly rooted in traditional Indian values, but was
also a quintessentially modern man - the man of the new millennium. This
was clearly reflected in his passion for mega-sized projects, the most
advanced technology and the highest level of productivity
Dhirubhai Ambani, Founder Chairman of the Reliance Group, had an acute
sense that education alone empowers people. He was a great communicator.
He communicated to inspire, to guide, to educate and to motivate.
Dhirubhai Ambani was of the conviction that Communications would
energize enterprises, galvanizes governance, make livelihood an enjoyment,
learning an experience, and living an excitement.
Reliance Communications is a fascinating outcome of this powerful
conviction. It is a major initiative to translate his inspiring dream intoreality
VISION
Reliance Communication ltd. envisions a digital revolution that will sweep
the country and bring about a New Way of Life. A digital way of life for a
New India. With mobile devices, net ways and broadband systems linked topowerful digital networks, Reliance Communication will usher fundamental
changes in the social and economic landscape of India.
Reliance Communication will help men and women connect and
communicate with each other It will enable citizens to reach out to their
work place, home and interests, while on the move. It will enable people to
-
7/30/2019 Basics of Ccna
4/35
work, shop, educate and entertain themselves round the clock, both in the
virtual world and in the physical world.
IT INFRASTRUCTURE
Reliance Communication offices are spread across the country. There are
multiple offices in a city. IT being the important aspect of running the
business, a team has been dedicated for IT Infrastrucre. IT Infrastructure
team is responsible for setting up and further supporting IT Infrastructure at
various Infocomm Offices.
INTRODUCTION TO NETWORKING
Definition :-
A network is a system that transmits any combination of voice, video and/or
data between users. A network can be defined by its geographical
dimensions and by which the users PC access it.
A network consists of a:
The network operating system (Windows NT/2000TM/Xp) on the
users PC (client) and server. The cables connecting all network devices (users PC, server,
peripherals, etc.).
All supporting network components (hubs, routers and switches, etc.).
Computer Network means an interconnected collection of autonomous
computers.
Requirement of Networking
Resource sharing- To make all programs, equipment, and especially dataavailable to anyone on the network without regard to the physical location of
the resource and the user.
High reliability- As all files could be replicated on two or three machines, so
if one of them is unavailable (due to hardware failure), the other copies
could be used.
http://4.it/http://4.it/ -
7/30/2019 Basics of Ccna
5/35
Scalability- It is the ability to increase system performance gradually as the
workload grows just by adding more processors.
A computer network can provide a powerful communication medium along
widely separated employees.
The use of networks to enhance human-to-human communication will
probably prove more important than technical goals such as improved
reliability.
These are the requirement with respect to companies but computer
networking is required even in the normal day to day life as we have to
access the internet to get information about what all new happening in the
world, to have communication with people staying far away using the e mail
service.
TYPES OF NETWORKS
LAN (LOCAL AREA NETWORK)
These are privately owned networks within a single building or campus of
up to a few a kilometers in size.
LANs are distinguished from other networks by three characteristics:
1) Their size.
2) Their transmission technology.
3) Their topology.
LANs are restricted in size, which means that the worst-case transmission
time is bounded and known in advance.
LANs often use a transmission technology consisting of a single cable to
which all the machines are attached.
LANs run at speeds of 10 to 100 Mbps, have low delays, and make very few
errors.
-
7/30/2019 Basics of Ccna
6/35
LAN SETUP
IEEE has produced several standards for LANs. These standards
collectively known as IEEE 802 .
IEEE802.3 (Ethernet), IEEE802.4 (Token Bus), IEEE802.5 (Token Ring)
WAN (WIDE AREA NETWORK)
It is a Computer network that spans a relatively large geographical area,
often a country or continent. Typically a WAN consists of two or more
Local Area Network.
Computers connected to WAN are often connected through public networks
such as telephone systems. They can also be connected through leased lines
or satellites. The largest WAN in existence is Internet.
WANs run at speed of maximum 2 to 10 Mbps.
WAN SETUP
For most WANs, the long distance bandwidth is relatively slow: on the order
of kilobits per second (kbps) as opposed to megabits per second (Mbps) for
local-area networks (LANs). For example, an Ethernet LAN has a 10 Mbps
bandwidth; a WAN using part or all of a T1 carrier has a bandwidth of 1.544
Mbps .
Three types of approaches are used to connect WANs:
1) Circuit switching, which provides a fixed connection (at least for the
duration of a call or session), so that each packet takes the same path.
Examples of this approach include ISDN, Switched 56, and Switched T1.
-
7/30/2019 Basics of Ccna
7/35
2) Packet switching, which establishes connections during the transmission
process so that different packets from the same transmission may take
different routes and may arrive out of sequence at the destination. Examples
of this approach are X.25, frame relay, and ATM.
3) Leased lines, which can provide a dedicated connection for private use
NETWORK MODELS
Layering Concepts and Benefits
Many benefits can be gained from the process of breaking up the functions
or tasks of networking into smaller chunks, called layers, and defining
standard interfaces between these layers. The layers break a large, complex
set of concepts and protocols into smaller pieces, making it easier to talk
about, to implement with hardware and software, and to troubleshoot.
The following list summarizes the benefits of layered protocol
Specifications:
Humans can more easily discuss and learn about the many details of a
protocol specification.
Standardized interfaces among layers facilitate modular engineering.
A better environment for interoperability is created. One vendor can write
software that implements higher layersfor example, a Web browserand
another can write software that implements the lower layersfor example,
Microsofts built-in TCP/IP software in its operating systems.
Reduced complexity allows easier program changes and faster product
evolution.
One layer uses the services of the layer immediately below it. Therefore,
remembering what each layer does is easier. (For example, the network layer
-
7/30/2019 Basics of Ccna
8/35
needs to deliver data from end to end. To do this, it uses data links to
forward data to the next successive device along that end-to-end path.)
OSI NETWORK MODEL
The OSI model describes how information makes its way from application
programs through a network medium to another application program in other
computer. It divides one big problem in to seven smaller problems . Each
problem is addressed by one of the seven layers of the OSI model.
Functions of Network Layers in Brief:
APPLICATION LAYER
Used for applications specifically written to run over the network
Allows access to network services that support applications;
Directly represents the services that directly support user applications
Handles network access, flow control and error recovery
Example apps are file transfer, e-mail, Net BIOS-based applications
PRESENTATION LAYER
Translates from application to network format and vice-versa
All different formats from all sources are made into a common
uniform format that the rest of the OSI model can understand
Responsible for protocol conversion, character conversion, data
encryption / decryption, expanding graphics commands, data
compression
Sets standards for different systems to provide seamlesscommunication from multiple protocol stacks
Not always implemented in a network protocol
SESSION LAYER
Establishes, maintains and ends sessions across the network
-
7/30/2019 Basics of Ccna
9/35
Responsible for name recognition (identification) so only the
designated parties can participate in the session
Provides synchronization services by planning check points in the
data stream => if session fails, only data after the most recent
checkpoint need be transmitted
Manages who can transmit data at a certain time and for how long
Examples are interactive login and file transfer connections, the
session would connect and re-connect if there was an interruption;
recognize names in sessions and register names in history
TRANSPORT LAYER
Additional connection below the session layer Manages the flow control of data between parties across the network
Divides streams of data into chunks or packets; the transport layer of
the receiving computer reassembles the message from packets
"Train" is a good analogy => the data is divided into identical units
Provides error-checking to guarantee error-free data delivery, with on
losses or duplications
Provides acknowledgment of successful transmissions; requests
retransmission if some packets dont arrive error-free
Provides flow control and error-handling
NETWORK LAYER
Translates logical network address and names to their physical
address (e.g. computer name ==> MAC address)
Responsible for addressing and determining routes for sending
Managing network problems such as packet switching, data
congestion and routing
If router cant send data frame as large as the source computer sends,the network layer compensates by breaking the data into smaller units.
At the receiving end, the network layer reassembles the data
Think of this layer stamping the addresses on each train car
IP; ARP; RARP, ICMP; RIP; OSFP;
-
7/30/2019 Basics of Ccna
10/35
DATA LINK LAYER
Turns packets into raw bits 100101 and at the receiving end turns bits
into packets.
Handles data frames between the Network and Physical layers
The receiving end packages raw data from the Physical layer into data
frames for delivery to the Network layer
Responsible for error-free transfer of frames to other computer via the
Physical Layer
This layer defines the methods used to transmit and receive data on
the network. It consists of the wiring, the devices use to connect theNIC to the wiring, the signaling involved to transmit / receive data
and the ability to detect signaling errors on the network media
Logical Link Control
Error correction and flow control
Manages link control and defines SAPs
PHYSICAL LAYER
Transmits raw bit stream over physical cable
Defines cables, cards, and physical aspects
Defines NIC attachments to hardware, how cable is attached to NIC
Defines techniques to transfer bit stream to cable
IP ADDRESSING
Every machine on the internet has a unique identifying number, called an IP
Address. A typical; IP address looks like this:
-
7/30/2019 Basics of Ccna
11/35
216.27.61.45
IP ADDRESS is a 32-bit number, usually written in dotted decimal
form, that uniquely identifies an interface of some computer. This 32-
bit number is divided into 4 octets each separated by a decimal. Outso many values certain values are restricted for use as typical IP
address. For example, the IP address 0.0.0.0 is reserved for the
default network and the address 255.255.255.255is used for
broadcast.
Each IP address is split into 2 sections:
1. Network address
2. Host address
Individual IP address in same network all have a different value in the
host part of address, but they have identical value in network part,
just as in town there are different street address but same ZIP code.
There are five IP classes:
Class A This class is for very large networks, such as a major
international company. IP addresses with a first octet from 1 to 126
are part of this class. The other three octets are each used to identify
each host.Net Host or Node
54. 24.54.43
Loopback- The IP address 127.0.0.1 is used as the loopback address.
This means that it is used by the host computer to send a message
back to itself. It is commonly used for troubleshooting and network
testing.
Class B- Class B is used for medium-sized networks. A good
example is a large college campus. IP addresses with a first octet
from 128 to191 are part of this class. Class B addresses also include
-
7/30/2019 Basics of Ccna
12/35
the second octet as part of the Net identifier. The other two octets are
used to identify each host.
Net Host or Node
24.53.198
Class C- Class C addresses are commonly used for small to mid-size
business. IP addresses with a first octet from192 to 223 are part of
this class. Class C addresses also include the second and third octets
as part of Net identifier. The last octet is used to identify each host.
Net Host or Node
34.86
Class D- It is used for multicast. It has first bit value of 1, second bit
value of 1, third bit value of 1 and fourth bit value of 0. The other 28
bits are used to identify the group of computers the multicast
messages is intended for.
Net Host or Node
224 24.54.145
Class E- It is used for experimental purpose only.
Net Host or Node
240. 23.45.105
Private IP
It is not necessary that every time we make a network we are
connected to some ISP (Internet Service Provider). So in that case werequire some private IP also which can be used in indigenous
networks .In each class a range of IP addresses have been defined for
this purpose
CLASS A 10.0.0.1 to 10.255.255.244
CLASS B 172.16.0.1 to 172.34.255.254
-
7/30/2019 Basics of Ccna
13/35
CLASS C 192.168.0.0/16
MASKING
Computers use a mask to define size of network and host part of an
address. Mask is a 32-bit number written in dotted decimal form. Itprovides us the network address when we perform a Boolean AND of
mask with the IP address. It also define number of host bits in an
address.
SUBNETTING
Basically it is a process of subdividing networks into smaller subnets.
In case we have 2-3 small networks but we cant buy IP address for each and
every network. So here we use the basic concept of SUBNETTING i.e usingone public IP address we will give them IP address and make them
independent networks. For this we take some bits of host address and use
them for network address so we have different independent networks
Example
If subnet mask is 255.255.240.0
And an IP address for a computer is given as 142.16.52.4
142.16.0.0 is network address
0.0.48.0 is the subnet address
0.0.4.4 is the host address of the computer
10001110.00010000.00110100.00000100 is ANDed with
11111111.11111111.11110000.00000000
and output is 10001110.00010000.00110000.00000000
-
7/30/2019 Basics of Ccna
14/35
here first two octets represents Network address and third octet represents
subnet address.
It can be compared with a postal address as there is only one ZIP code
(Network address), different streets (Subnet address), and different house
number (Host address).
Some terminologies those are used with Networking models:
Collision Domain- It is the group of PCs in which collision will occur
when two PC will transmit data simultaneously.
Broadcast Domain- It is the group of PCs those will receive same
broadcast message.
CSMA/CD (Carrier Sense Multiple Access/ Collision Detection)- In this
protocol when a PC wants to transmit any packet it sense the carrier i.e the
path ,if no other PC is using the carrier then only it sends. If two PCs starts
sending data simultaneously collision will occur. Both PCs will wait for
some random time and then initiate the same process.
MAC (Media Access Control) . The IEEE 802.3 (Ethernet) and 802.5
(Token Ring) are the MAC sub layers of these two LAN data-link protocols.
Burned-in address: The 6-byte address assigned by the vendor making
the card. It is usually burned in to a ROM or EEPROM on the LAN card and
begins with a 3-byte organizationally unique identifier (OUI) assigned by
the IEEE.
Locally administered address: Through configuration, an address that is
used instead of the burned-in address.
Unicast address: Fancy term for a MAC that represents a single LAN
interface.
-
7/30/2019 Basics of Ccna
15/35
PASSIVE COMPONENTS
Passive components are those devices which are used to provide
connectivity between different networking devices.
It includes
Cables
Patch Panel
Patch Cord
I/O box
Racks
RJ-45 Connectors
CABLES
There are different Cabling options depending on the access method :
Twisted pair
This made it easy to access the back of the patch panel and other
networking components.The wires are twisted around each other
tominimize interference from other twisted pairs in the cable.
-
7/30/2019 Basics of Ccna
16/35
Twisted pair cables are available unshielded (UTP)
or shielded (STP). UTP is the most common type
and uses a RJ-45 Connector.
Typical lengths are up to 100m.
Twisted pair network uses a star topology.
Coaxial
Coaxial cable uses BNC connectors.
The maximum cable lengths are around 500m.
Coaxial networks use a single bus topology
-
7/30/2019 Basics of Ccna
17/35
Fiber Optic
UTP and Co-axial cables are not capable for driving the data signalsfor long distance i.e. UTP is capable of transmitting up to a distance
100 meters only By using the Fiber cables it is possible to send the
data about 10 kilometers. Fiber optic cable uses SC, ST, LC
connectors (most common in use is SC connector)
In fiber cables the data is converted to light signals and the signal is
made to propagate through the fiber cable. There are two types of
Fibre optic cable available.
1. Single mode: In this mode typical length is up to 12km and data
rate is 1000Mbps. The core diameter is about 9.25 nm cable is knownas 1000 base LX cable.
2. Multi mode: This mode is further categorised in two:
1. SX: Typical length is up to 500m and data rate is 1000Mbps.
2. FX: Typical length is up to 220m and data rate is 100Mbps.
-
7/30/2019 Basics of Ccna
18/35
PATCH PANEL
A patch panel provides a convenient place to terminate (connect) allof the cable coming from different locations into the wiring closet.
We connect the cables coming from various locations willing to
connect to switch through the patch panel.
NEED OF PATCH PANEL
We can label the patch panel so we know that which wire belongs to
which location. Without a patch panel, it is chaotic. If we want to
disconnect a station from the switch, it's a lot easier if there's a label.
Most cabling is wired "straight-through" from end to end. But
sometimes we need to cross-wire some of the pairs between switch
-
7/30/2019 Basics of Ccna
19/35
and station, like with a cable modem, or cross-wire to connect two
switches. With a patch panel, all of this cross-wiring is done in the
patch cable. If you have to make any changes, like moving a station
or switch, you just move the patch cable with it, instead of having to
reterminate the cable run.
RACK
We have to mount the patch panel somehow. The best way is to buy a
rack. Basically, a rack is a pair of vertical rails with holes drilled in
them so that we can mount patch panels, hubs, and other network
equipment. This made it easy to access the back of the patch panel
and other networking components.
Computer networking devices
Router
A router is a device that forwards data packets between computer networks,
creating an overlay internetwork. A router is connected to two or more datalines from different networks. When a data packet comes in one of the lines,
the router reads the address information in the packet to determine its
ultimate destination. Then, using information in its routing table orrouting
policy, it directs the packet to the next network on its journey. Routers
perform the "traffic directing" functions on the Internet. A data packet is
typically forwarded from one router to another through the networks that
constitute the internetwork until it gets to its destination nodeUnlike a
gateway, it cannot interface different protocols. Works on OSI layer 3.
Routers may provide connectivity within enterprises, between enterprisesand the Internet, and between internet service providers (ISPs) networks.
The largest routers (such as the CiscoCRS-1 orJuniperT1600) interconnect
the various ISPs, or may be used in large enterprise networks. Smaller
routers usually provide connectivity for typical home and office networks.
Other networking solutions may be provided by a backbone Wireless
http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internetworkhttp://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Cisco_Systemshttp://en.wikipedia.org/wiki/Cisco_CRS-1http://en.wikipedia.org/wiki/Juniper_Networkshttp://en.wikipedia.org/wiki/Juniper_T-Series#T1600http://en.wikipedia.org/wiki/Wireless_Distribution_Systemhttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internetworkhttp://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Cisco_Systemshttp://en.wikipedia.org/wiki/Cisco_CRS-1http://en.wikipedia.org/wiki/Juniper_Networkshttp://en.wikipedia.org/wiki/Juniper_T-Series#T1600http://en.wikipedia.org/wiki/Wireless_Distribution_System -
7/30/2019 Basics of Ccna
20/35
Distribution System (WDS), which avoids the costs of introducing
networking cables into buildings.
Switch
A switch is a telecommunication device which receives a message from
any device connected to it and then transmits the message only to the
device for which the message was meant. This makes the switch a moreintelligent device than a hub (which receives a message and then
transmits it to all the other devices on its network). The network switch
plays an integral part in most modern Ethernetlocal area networks
(LANs). Mid-to-large sized LANs contain a number of linked managed
switches. Small office/home office (SOHO) applications typically use a
single switch, or an all-purpose converged device such as a residential
gateway to access small office/homebroadband services such as DSL or
cable Internet. In most of these cases, the end-user device contains a
routerand components that interface to the particular physical broadband
technology. User devices may also include a telephone interface forVoIP. Works on OSI layer 2.
Bridge
It is a device that connects multiple network segments along the data link
layer. Network bridging describes the action taken by network equipment
to allow two or more communication networks, or two or more network
http://en.wikipedia.org/wiki/Wireless_Distribution_Systemhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switch#Configuration_optionshttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Cable_Internethttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_equipmenthttp://en.wikipedia.org/wiki/Communication_networkhttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/File:24-port_3Com_switch.JPGhttp://en.wikipedia.org/wiki/Wireless_Distribution_Systemhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switch#Configuration_optionshttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Cable_Internethttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_equipmenthttp://en.wikipedia.org/wiki/Communication_networkhttp://en.wikipedia.org/wiki/Network_segment -
7/30/2019 Basics of Ccna
21/35
segments,[1] to create an aggregate network. Bridging is distinct from
routing which allows the networks to communicate independently as
separate networks.[2] A network bridge is a network device that connects
more than one network segment.Works on OSI layer 2.
Hub
A network hub is an unsophisticated device in comparison with, for
example, a switch. A hub does not examine or manage any of the traffic
that comes through it: any packet entering any port is rebroadcast on all
other ports. Effectively, it is barely aware of frames or packets and
mostly operates on raw bits orsymbols. Consequently, due to the larger
collision domains, packet collisions are more frequent in networks
connected using hubs than in networks connected using more
sophisticated devices. Works on OSI layer 1.
Repeater
It is a device to amplify or regenerate digital signals received while
sending them from one part of a network into another. Works on OSI
layer 1.
Gateway
A gateway is a network point that acts as an entrance to anothernetwork.
On the Internet, a node or stopping point node or a host (end-point) node.
Both the computers of Internet users and the computers that servepages
to users are host nodes, while the nodes that connect the networks in
between are gateways. For example, the computers that control traffic
between company networks or the computers used by internet service
providers (ISPs) to connect users to the internet are gateway nodes.
In the network for an enterprise, acomputer serveracting as a gateway node
is often also acting as aproxy serverand a firewall server. A gateway is
often associated with both a router, which knows where to direct a given
packet of data that arrives at the gateway, and a switch, which furnishes the
actual path in and out of the gateway for a given packet.
http://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_bridge#cite_note-1http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Network_bridge#cite_note-2http://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Ethernet_switchhttp://en.wikipedia.org/wiki/Symbol_ratehttp://en.wikipedia.org/wiki/Collision_domainhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Repeaterhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Gateway_(telecommunications)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Computer_serverhttp://en.wikipedia.org/wiki/Computer_serverhttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_bridge#cite_note-1http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Network_bridge#cite_note-2http://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Ethernet_switchhttp://en.wikipedia.org/wiki/Symbol_ratehttp://en.wikipedia.org/wiki/Collision_domainhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Repeaterhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Gateway_(telecommunications)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Computer_serverhttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Firewall_(computing) -
7/30/2019 Basics of Ccna
22/35
Some hybrid network devices:
Multilayer switch: a switch which, in addition to switching on OSI
layer 2, provides functionality at higher protocol layers. Protocol converter: a hardware device that converts between two
different types oftransmissions, such as asynchronous and
synchronous transmissions.
Bridge router(brouter): a device that combines router and bridge
functionality and therefore works on OSI layers 2 and 3.
Hardware or software components that typically sit on the connection point
of different networks, e.g. between an internal network and an external
network:
Proxy server: computernetwork service which allows clients to make
indirect network connections to other network services
Firewall: a piece of hardware or software put on the network to
prevent some communications forbidden by the network policy
Network address translator(NAT): network service provide as
hardware or software that converts internal to external network
addresses and vice versa
Other hardware for establishing networks or dial-up connections:
Multiplexer: device that combines several electrical signals into a
single signal
Network interface controllera piece of computer hardware to allow
the attached computer to communicate by network
Wireless network interface controllera piece of computer hardware to
allow the attached computer to communicate by LAN
Modem: device that modulates an analog "carrier" signal (such as
sound), to encode digital information, and that also demodulates such
a carrier signal to decode the transmitted information, as a computercommunicating with another computer over the telephone network
ISDN terminal adapter(TA): a specialized gateway for ISDN
Line driver: a device to increase transmission distance by amplifying
the signal. Base-band networks only.
http://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Protocol_converterhttp://en.wikipedia.org/wiki/Transmission_(telecommunications)http://en.wikipedia.org/wiki/Bridge_routerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Network_servicehttp://en.wikipedia.org/wiki/Firewall_(networking)http://en.wikipedia.org/wiki/Network_address_translatorhttp://en.wikipedia.org/wiki/Multiplexerhttp://en.wikipedia.org/wiki/Network_interface_controllerhttp://en.wikipedia.org/wiki/Wireless_network_interface_controllerhttp://en.wikipedia.org/wiki/Modemhttp://en.wikipedia.org/wiki/ISDN_terminal_adapterhttp://en.wikipedia.org/wiki/Gateway_(telecommunications)http://en.wikipedia.org/wiki/Line_driverhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Protocol_converterhttp://en.wikipedia.org/wiki/Transmission_(telecommunications)http://en.wikipedia.org/wiki/Bridge_routerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Network_servicehttp://en.wikipedia.org/wiki/Firewall_(networking)http://en.wikipedia.org/wiki/Network_address_translatorhttp://en.wikipedia.org/wiki/Multiplexerhttp://en.wikipedia.org/wiki/Network_interface_controllerhttp://en.wikipedia.org/wiki/Wireless_network_interface_controllerhttp://en.wikipedia.org/wiki/Modemhttp://en.wikipedia.org/wiki/ISDN_terminal_adapterhttp://en.wikipedia.org/wiki/Gateway_(telecommunications)http://en.wikipedia.org/wiki/Line_driver -
7/30/2019 Basics of Ccna
23/35
Network topologies
Think of a topology as a network's virtual shape or structure. This shape
does not necessarily correspond to the actual physical layout of the devices
on the network. For example, the computers on a home LAN may bearranged in a circle in a family room, but it would be highly unlikely to find
a ring topology there.
Network topologies are categorized into the following basic types:
bus
ring
star
tree
mesh hybrid
Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a
common backbone to connect all devices. A single cable, the backbone
functions as a shared communication medium that devices attach or tap into
with an interface connector. A device wanting to communicate with anotherdevice on the network sends a broadcast message onto the wire that all other
devices see, but only the intended recipient actually accepts and processes
the message.
Ethernet bus topologies are relatively easy to install and don't require much
cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5
("ThickNet") both were popular Ethernet cabling options many years ago for
bus topologies. However, bus networks work best with a limited number of
devices. If more than a few dozen computers are added to a network bus,performance problems will likely result. In addition, if the backbone cable
fails, the entire network effectively becomes unusable. ]
http://compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htmhttp://compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htm -
7/30/2019 Basics of Ccna
24/35
Ring Topology
In a ring network, every device has exactly two neighbors for
communication purposes. All messages travel through a ring in the same
direction (either "clockwise" or "counterclockwise"). A failure in any cable
or device breaks the loop and can take down the entire network.
To implement a ring network, one typically uses FDDI,SONET, orToken
Ring technology. Ring topologies are found in some office buildings or
school campuses.
Star Topology
Many home networks use the star topology. A star network features a central
connection point called a "hub node" that may be a network hub, switch orrouter. Devices typically connect to the hub with Unshielded Twisted Pair
(UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable,
but a failure in any star network cable will only take down one computer's
network access and not the entire LAN. (If the hub fails, however, the entire
network also fails.)
Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its
simplest form, only hub devices connect directly to the tree bus, and each
hub functions as the root of a tree of devices. This bus/star hybrid approach
supports future expandability of the network much better than a bus (limited
in the number of devices due to the broadcast traffic it generates) or a star
(limited by the number of hub connection points) alone.
Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous
topologies, messages sent on a mesh network can take any of several
possible paths from source to destination. (Recall that even in a ring,
although two cable paths exist, messages can only travel in one direction.)
Some WANs, most notably the Internet, employ mesh routing.
http://compnetworking.about.com/cs/sonet/g/bldef_sonet.htmhttp://compnetworking.about.com/cs/sonet/g/bldef_sonet.htmhttp://compnetworking.about.com/od/networkprotocols/g/token-ring-networks.htmhttp://compnetworking.about.com/od/networkprotocols/g/token-ring-networks.htmhttp://compnetworking.about.com/cs/internetworking/g/bldef_hub.htmhttp://compnetworking.about.com/od/hardwarenetworkgear/g/bldef_switch.htmhttp://compnetworking.about.com/cs/routers/g/bldef_router.htmhttp://compnetworking.about.com/cs/lanvlanwan/g/bldef_wan.htmhttp://compnetworking.about.com/cs/sonet/g/bldef_sonet.htmhttp://compnetworking.about.com/od/networkprotocols/g/token-ring-networks.htmhttp://compnetworking.about.com/od/networkprotocols/g/token-ring-networks.htmhttp://compnetworking.about.com/cs/internetworking/g/bldef_hub.htmhttp://compnetworking.about.com/od/hardwarenetworkgear/g/bldef_switch.htmhttp://compnetworking.about.com/cs/routers/g/bldef_router.htmhttp://compnetworking.about.com/cs/lanvlanwan/g/bldef_wan.htm -
7/30/2019 Basics of Ccna
25/35
A mesh network in which every device connects to every other is called a
full mesh. As shown in the illustration below, partial mesh networks also
exist in which some devices connect only indirectly to others.
Hybrid
Hybrid networks use a combination of any two or more topologies in such a
way that the resulting network does not exhibit one of the standard
topologies (e.g., bus, star, ring, etc.). For example, a tree network connected
to a tree network is still a tree network topology. A hybrid topology is
always produced when two different basic network topologies are
connected. Two common examples for Hybrid network are:star ring
networkandstar bus network
A Star ring network consists of two or more star topologies connectedusing a multistation access unit (MAU) as a centralized hub.
A Star Bus network consists of two or more star topologies connected
using a bus trunk (the bus trunk serves as the network's backbone).
While grid and torus networks have found popularity in high-performance
computing applications, some systems have used genetic algorithms to
http://en.wikipedia.org/wiki/Media_Access_Unithttp://en.wikipedia.org/wiki/High-performance_computinghttp://en.wikipedia.org/wiki/High-performance_computinghttp://en.wikipedia.org/wiki/Genetic_algorithmhttp://en.wikipedia.org/wiki/Media_Access_Unithttp://en.wikipedia.org/wiki/High-performance_computinghttp://en.wikipedia.org/wiki/High-performance_computinghttp://en.wikipedia.org/wiki/Genetic_algorithm -
7/30/2019 Basics of Ccna
26/35
design custom networks that have the fewest possible hops in between
different nodes. Some of the resulting layouts are nearly incomprehensible,
although they function quite well.[citation needed]
A Snowflake topology is really a "Star of Stars" network, so it exhibits
characteristics of a hybrid network topology but is not composed of two
different basic network topologies being connected. Definition : Hybrid
topology is a combination of Bus,Star and ring topology.
IP ADDRESS
IP Address is a logical address of the computer. It use for identify of
computer this is unique same as telephone number. IP is a 32 bit address.Computer networking is depending on IP address.
IP Address is two types: --------
STATIC IP: - Provide by User this IP cannot change automatically.
DYNAMIC IP: - Provide by DHCP Server this is can be change
automatically
Difference between Static IP and Dynamic IP
STATIC IP DYNAMIC IP
Required more time to fill IP address Required less time to fill
IP List maintain by user IP List maintain by DHCP
Server
Human Error No chance
PC shuffle Problem No Problem
12.2 What is DHCP?
Automatically assigns IP addresses method centralized.
http://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_needed -
7/30/2019 Basics of Ccna
27/35
DHCP is a protocol that allocates IP addresses to computer on a network.
NETWORK CONNECTIVITY OF RCOM CIRCLE OFFICECHANDIGARH
In Chandigarh circle office, we have a LAN IP pool of10.132.16.1/24 and
WAN IP pool of 97.246.86.101.
We have 1 DHCP SERVER having an IP address of 10.132.16.20 and DNS
server having an IP address of 10.132.16.19.
We have 4 TOSHIBA printers on each floor of the office having IP
addresses
10.132.16.4, 10.132.16.7, 10.132.16.5 AND 10.132.16.8.
SWITCH STACK connects the whole network.
http://10.132.16.1/24http://10.132.16.1/24 -
7/30/2019 Basics of Ccna
28/35
WDRAM
RELIANCE I.T PROJECT
INFRASTRUCTURE MANAGED SERVICE GROUP(IMSG)
This project is started, so that there can be a proper utilization and
management of all the computers within the RELIANCE NETWORK.
There are 5 major components of the project
1. WINDOWS SERVER UPDATE SERVER
2. DOMAIN
3. REMEDY
4. ANTIVIRUS
5. MARIMBA
In this project there are 5 main servers, through which constant updates,
patches etc are being sent.
These servers are different from the normal servers, as they have to
communicate with multiple users at the same time.
THESE MAIN SERVERS ARE KEPT IN DAKC (DHIRU AMBANI
KNOWLEDGE CENTER) BOMBAY.
FOR THE CHANDIGARH CLUSTER, THE SUBSERVERS ARE KEPT
IN WAREHOUSE MOHALI.
Main servers first communicate with the sub servers, then those sub servers
sends all the updates to all those computers which are kept come in the
pendency list.
-
7/30/2019 Basics of Ccna
29/35
The PENDENCY list is being send by the IMSG team in Bombay, known as
the
'WDRAM REPORT'.
This report consists of all the pendencys, issues and problems related to the
WDRAM.
Report is being sent on the weekly basis.
Report is forwarded by the AREA OPERATION INCHARGE, of the
respective cluster, to all the Engineers.
Currently there are over 200 PC's in CMP OFFICE and these pcs have to be
constantly monitored so that they can all work properly.
The main purpose here is to maintain the proper working of the 5 major
components as mentioned above.
In this report there are issues like:
1 Is PC in DOMAIN?
2 Is antivirus installed?
3 Is antivirus infected?
4. Is marimba installed?
5 Has computer fetched 7 days report?(there is a weekly report which is
constantly sent from DAKC)
6. Are patches up-to-date?
7. Is there any Remedy mismatch?
There are many other issues under WDRAM which IT TEAM have to deal
with.
-
7/30/2019 Basics of Ccna
30/35
19.2 Five major components of the project
W(WINDOWS SERVER UPDATE SERVER):
For this server RELIANCE had a special tie up with MICROSOFT. This
server updates the client machine with security patches for software
application. Patches are used for software applications, so that they can work
properly.
WSUS Servers configuration is different from normal servers
configuration.
For updating wsus server we have to make a user login.
1 of the most important component used in the WSUS is MBSA(Microsoft
base line security Analyzer )
MBSA helps to scan a computer, by the help of MBSA a user can scan anyindividual PC or even multiple Pcs in any given range.
Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool that
helps small and medium businesses determine their security state in
accordance with Microsoft security recommendations and offers specific
remediation guidance. Improve your security management process by using
MBSA to detect common security misconfigurations and missing security
updates on your computer systems. Built on the Windows Update Agent and
Microsoft Update infrastructure, MBSA ensures consistency with otherMicrosoft management products including Microsoft Update (MU),
Windows Server Update Services (WSUS), Systems Management Server
(SMS), System Centre Configuration Manager (SCCM) 2007, and Small
Business Server (SBS). Used by many leading third party security vendors
and security auditors, MBSA on average scans over 3 million computers
-
7/30/2019 Basics of Ccna
31/35
each week. Join the thousands of users that depend on MBSA for analyzing
their security state.In RELIANCE COMMUNICATIONS version 2.1 is
used.
D (DOMAIN SERVER)
By Default every computer domain is work group. So every computer has
to be kept in the RELIANCE domain that is ricpj.ric.com.
When the new PC comes to the office, it cannot pick up the updates
automatically from the domain server .so for that the PC should be kept in
the Domain.
R (REMDY SERVER)
This server is responsible for the working of the REMEDY SOFTWARE.
Which consist of all the information about the user.
ADVANTAGES
o Calls are put through this software. Any User having IT related
problem would lock a call on toll free number or they can mail
to [email protected] .
o It is also used in call logging or call tracing for any I.T related
problem .each and every asset is mapped through this.
This software was made by BMC, exclusively for RELIANCE
COMMUNICATIONS. This software is used to map each and every asset of
the computer which has been deployed to the user.
http://ricpj.ric.com/mailto:[email protected]://ricpj.ric.com/mailto:[email protected] -
7/30/2019 Basics of Ccna
32/35
Whenever a user faces any problem in his\her computer OR even if there is
any issue related to WDRAM, he\she would send a mail to
[email protected], then a call would be locked and
would be assigned to a particular engineer. Each and every Engineer has his
account in the REMMEDY Software which he is able to keep a track of allthe calls which are being assigned to him.
Even if any of the external customers (customers to RELIANCE
COMMUNICATIONS e.g. SBI, PUNJAB NATIONAL BANK etc)
Once an Engineer logs into the REMEDY software, then he clicks onto the
Incident Management Console. The main work of the engineer is in the
Incident Management Console.
An engineer has to check his calls which are locked .all the calls are
categorized according there priority levels.
HIGHEST PRIORITY CALL:
Issues related to NETWORK, router call (external call), HSD Call (external
call).
MEDIUM PRIORITY CALL:
Most of the calls are categorised under medium priority call. Calls of
WDRAM are categorised under medium priority.
LOW PRIORITY CALL:
Calls related to hardware is categorised under low priority.
mailto:[email protected]:[email protected] -
7/30/2019 Basics of Ccna
33/35
After putting the call in progress , engineer then tries to resolve the issue
.time available to the engineer is 180 minutes. if by any chance engineer is
not able to resolve his call within the given time period, then his call would
be escalated.
A (ANTIVIRUS SERVER):
Symmetric(ANTIVIRUS used in RELIANCE NETWORK) sends all the
updates to the ANTIVIRUS server, and those updates are send all over the
network.
Earlier trend micro was used but it was not that much effective.
In antivirus we can face many issues like;
Is antivirus infected?
Is antivirus updated?
Is antivirus engine on?
Removal of Infection from a system
If a system, gets infected, we have to download a file called NSS file which
is updated daily. The complete procedure to download and install the NSS
file is below:-
Goto 10.8.51.60 which is a FTP server for all downloads.
Then click Download and then Symantec which shows the list of antivirus
tools.
Goto Symantec tool and then NSS file is visible. Download this file and
place it on C: drive.
Restart the sytem in Safe Mode and run this NSS file.
-
7/30/2019 Basics of Ccna
34/35
M (MARIMBA TOOL):
The Marimba Remedy Service Console (Windows) can be used as the
primary interface which is used for tracking, scanning and monitoring
hardware and software changes of a system. It is present in all the systemsand is a necessary tools for diagnosis
Marimba is a software developed by BMC Software Group. Marimba is
mandatory and is installed on the all servers, workstations and laptops
located all over India which are connected by ADAG Group Intranet
Network. Any computer or laptop must have Marimba installed before it can
be connected to the domain. Failure to do so results in a pendency which is
easily spotted at the Mumbai Circle office with the help of WDRAM
software. It is the IT engineers job to make sure all the PCs and laptopshave Marimba installed.
Marimba provides a continuous compliance over software, patches,
configuration settings, power settings, and security content through a
powerful policy-based management system that:
Discovers, manages, and documents configurations for client devices
like POS systems, handhelds, kiosks, and ATMs
Configures, updates, and patches client endpoints to ensure total
compliance and prevent security vulnerabilities
Installs, updates, and repairs application software and content to
ensure successful application releases
Tracks, harvests, and reuses software licenses to control costs and
ensure compliance with corporate license agreements
Manages advanced PC power settings to help establish and enforce
Green IT initiatives Supports popular client platforms, such as: Microsoft Windows
(including Windows 7), Windows Mobile, Red Hat and SUSE Linux
-
7/30/2019 Basics of Ccna
35/35
Marimba is now called BMC BladeLogic Client Automation which is a
newer version. But ADAG Group uses the older version which is still called
Marimba.
The Advantages of using Marimba are:-
Attain first-time success rates of up to 95% or more for configuration
changes even in highly distributed environments
Eliminate 90% of the manual steps required by other patch
management systems
Deploy software to hundreds of thousands of diverse endpoints with
minimal hardware infrastructure and bandwidth usage
Enforce policy-driven compliance, while also saving on license costsand minimizing security vulnerabilities
Reduce client power consumption by up to 70%
Reduce annual software spend and gain clear insight to overall
software usage