athena slide mang_coban_acbn
DESCRIPTION
TRANSCRIPT
Basic Network Management
-Win 2K+App-Linux
-IBM Lotus Note
-CCNA,CCDA-CCNP,CCDP
-CCIE
SCNP,SCNAISA
Pix FirewallCheck-point
ATHENA
-IBM Lotus Note-MCP,MCSA,MCSELAN
Manage-ment
Content
• Chapter 1: Computer Hardware
– Computer Hardware Overview
– Leading Hardware Manufacturers
– Common Hardware Component (Capacity- Performance-Features– Prices)
• Chapter 2: Software and Operating System
– What is the software?
ATHENA
– What is the software?
– How is software categorized?
– What is an operating system ?
– What does an operating system do?
• Chapter 3: Network Computer
– What is a Network?
– Why we use a Network?
– Advantages of LAN
– Types of Network
Contain
• Chapter 4: LAN Terminology and Components– Transmission Media
– LAN Topologies
• Chapter 5: TCP/IP– Converting
– Decimal to binary ( binary to decimal)
– Decimal to hexadecimal (hexadecimal to decimal)
– Binary to hexadecimal (hexadecimal to binary)
– Understanding TCP/IP
ATHENA
– Understanding TCP/IP– IP address and Subnetting
– Protocol for TCP/IP
• Chapter 6: LAN ARCHITECTURE
• Chapter 7: Hands on LAB
• Chapter 8: LAN Networking devices– Network Adapter Card
– Repeater & Hub
– Bridge
– Switch
– Router
– Gateway
Contain
• Chapter 9: Wan Overview
–– WAN Transmission TechnologyWAN Transmission Technology
–– Leased LineLeased Line
–– ADSLADSL
–– PSTNPSTN
• Chapter 10: Setup a WAN
ATHENA
• Chapter 10: Setup a WAN
• Chapter 11 : Wireless LAN
• Chapter 12 : Firewall Concepts
• Chapter 13 : Virus ,Worm and Trojan
Contain
• Final Exam
• Hands on Lab Exam
ATHENA
Chapter 1: Computer Hardware
ATHENA
Objective
Lesson 1:
� Computer Hardware Overview
� Leading Hardware Manufacturers
� Common Hardware Component (Capacity-
ATHENA
� Common Hardware Component (Capacity-Performance- Features– Prices)
� Hardware Trends
� Review Questions
� Read more
Desktop Computer
ATHENA
Hardware component
ATHENA
AGP
� AGP 1x 266MB/s
� AGP 2x 533MB/s
� AGP4x 1.06GB/s
� AGP8x 2.13GB/s
ATHENA
PCI Express
� PCI Express x1 500MB/s
� PCI Express x4 2GB/s
� PCI Express x8 4GB/s
� PCI Express x16 8GB/s
ATHENA
USB - PCI
� USB 1.0 1.5Mb/s
� USB 1.1 12Mb/s
� USB 2.0 480Mb/s
� PCI 133MB/s
ATHENA
� PCI 133MB/s
� Wide PCI 266MB/s
� Fast Wire PCI 533MB/s
Mainboard with slot 1
ATHENA
Mainboard with socket
ATHENA
Mainboard with two slot 1
ATHENA
Mainboard Socket 370
ATHENA
Mainboard (Dual CPU)
ATHENA
Mainboard Socket 478
ATHENA
Mainboard Socket 775
ATHENA
CPU (Slot 1)
ATHENA
CPU (socket 370)
ATHENA
CPU (socket 478)
ATHENA
CPU (socket 775)
ATHENA
Hard disk IDE
ATHENA
Cable IDE
ATHENA
Cable IDE
ATHENA
Cable IDE
ATHENA
Hard disk SATA
ATHENA
Cable SATA
ATHENA
Cable SATA
ATHENA
Hard disk SCSI
ATHENA
Cable SCSI
ATHENA
Cable SCSI
ATHENA
Hard disk
ATHENA
Hard disk
ATHENA
SDRAM
ATHENA
DDRAM
ATHENA
DDRAM
ATHENA
PCI Card
ATHENA
Input and Output Devices
� Ports
• Physical connectors that allow a cable from a peripheral device to be attached
� Input devices
*Used to give instructions to the computer*
• Keyboard
ATHENA
• Keyboard
• Mouse
� Output devices
*Used to presents a result to the user*
• Monitor
• Printer
DIN and D-Shell Connectors
ATHENA
Video Ports
ATHENA
Parallel port
ATHENA
Serial Ports
ATHENA
USB Ports
ATHENA
ARCnet Ports
ATHENA
Sound Card Ports
ATHENA
Internal Modem Ports
ATHENA
Internal Modem Ports
ATHENA
Server
ATHENA
Server
ATHENA
Server
ATHENA
Famous Manufacturers
ATHENA
Biometric Technology
ATHENA
Summary
� Hardware components
� New technology Trends
ATHENA
Chapter 2: Software & Operating System
ATHENA
Objective
�What is the software?
� How is software categorized?
�What is an operating system ?
�What does an operating system do?
ATHENA
�What does an operating system do?
What’s the software ?
� Software is the instructions and associated data, stored in electronic format, that direct the computer to accomplish a task.
� A computer program is a set of detailed,
step-by-step instructions that tells a computer
ATHENA
step-by-step instructions that tells a computer
how to solve a problem or carry out a task.
How is software categorized?
� Software is categorized as either application
software or system software.
� Application software is designed to be used
for a purpose such as drawing designs,
ATHENA
for a purpose such as drawing designs,
creating documents, etc.
� System software is designed to help the
computer carry out the basic operating functions
Ex: Operating systems, utilities, and drivers
Operating System Overview: Whatis an operating system ?
� An operating system (OS) is the master
controller for all of the activities that take place
within a computer.
Ex: Microsoft Windows, Mac OS, Linux, UNIX
ATHENA
Ex: Microsoft Windows, Mac OS, Linux, UNIX
� The operating system also interacts with the next functional layer called application software.
How is software categorized?
ATHENA
What does an operating system do?
Example:
ATHENA
Personal ComputerOperating Systems
�Windows, Mac OS, Linux, Unix, and DOS
�What’s the best-selling operating system?
ATHENA
Personal ComputerOperating Systems
� Microsoft Windows is the most popular, and is
installed on over 80% of the world’s personal
computers
� UNIX was developed in 1969 at AT&T’s Bell Labs
ATHENA
Labs
� Linux was developed in 1991
� DOS (Disk Operating System) was developed by
Microsoft
Personal ComputerOperating Systems
� Different operating systems are needed
for different computing tasks:
• Single-user operating system
– Ex: MS-DOS, Windows 3.1, Windows 3.11
ATHENA
– Ex: MS-DOS, Windows 3.1, Windows 3.11
• Multi-user operating system
– Ex: Windows Server 2000/2003, Xp
• Network operating system
– Ex: Linux, Unix, Windows Server 2000/2003
• Multitasking operating system
– Ex: Windows Server 2000/2003, XP
Summary
� Software
� How is software categorized?
� operating system Overview
�What does an operating system do?
ATHENA
�What does an operating system do?
Chapter 3: Network Computer
ATHENA
Objective
�What is a Network?
�Why we use a Network?
�Advantages of LAN
ATHENA
�Advantages of LAN
�Types of Network
• A group of computers and other devices connected together is called a network
•Networking is the concept of
What is a Network?
ATHENA
•Networking is the concept of sharing resources and services
Example a Network
ATHENA
What is a Local Area Network?
• To avoid duplication of equipment and resources
• Be cost effective
• To communicate efficiently
Why we use a Network?
ATHENA
• To improve management
LAN Overview
�A Local Area Network (LAN) is a group of computers and network communication devices interconnected within a geographically limited area.
�LAN provide companies with time and
ATHENA
�LAN provide companies with time and money saving
�LAN is simple, inexpensive, support many type of protocols
Setup a Local Area Network
�Simple Connections• Installing an adapter card to connect computer on a LAN was a complicated process.
• The software accompanying a LAN adapter is
ATHENA
• The software accompanying a LAN adapter is automatically configured to allow the computer to begin communicating immediately
Setup a Local Area Network
�Simple Connections• This auto-recognition and auto-configuration
is called plug-and-play compatibility
• With plus-and-play, the software will ask some questions so that it can define the
ATHENA
some questions so that it can define the parameters required to get your PC communicating with other PCs on the network.
Setup a Local Area Network
ATHENA
LAN Supports Multiple Protocols
�Supports Multiple Protocols• A protocol is method or procedure used for the exchange of information between two communications devices
• Most important protocol
ATHENA
• Most important protocol
– Novell Netware
– AppleTalk
– TCP/IP
– OSI protocol
LAN Support New Applications
�Support New Applications
• We all use e-mail to communicate and LANs can make that process faster and easier.
ATHENA
• Many LAN support voice-mail, video conferencing, and distance learning
LAN Support New Applications
�Support New Applications
ATHENA
Network Models
Network categories–Server-Based network
ATHENA
–Server-Based network
–Peer-to-Peer network
Server-Based Network
ATHENA
Server-Based Network
�Two type
• Server
• Client
�A server-based network consist of a group
ATHENA
�A server-based network consist of a group of user-oriented PCs (call clients) that issue requests to a server
�Specialized Servers: File server, print Server, Database Servers, Web server, Mail server
Server-Based Network
ATHENA
Peer-to-Peer Network
�A peer-to-peer network consist of a group of PCs that operate as equal
�Each PC is called a peer and act as a client or server
ATHENA
client or server
�User of each computer determines what is shared
Peer -to-Peer Network
ATHENA
Peer-to-Peer Network
ATHENA
Peer-to-Peer Network
•Where Peer-to-Peer is appropriate?–Fewer than 10 users
–Security is no need
–User located in same general area
ATHENA
–Organization will have limited growth in the future
Combination Networks
� Include peer-to-peer and server based networking
� Server based operating system is responsible for sharing the major applications and data
ATHENA
applications and data
� Clients can run Win NT workstation, Win 95, Win 98, Win Me, Win XP... They can access resources on server and share their resources
Networks Classification
�LAN : Local Area Network
�WAN: Wide Area Network
�MAN: Metropolitan Area Network
ATHENA
�GAN : Global Area Network
Networks Classification (2)
�Local Area Network
ATHENA
Networks Classification (3)
�Wide Area Network
ATHENA
Networks Classification (4)
�Global Area Network
ATHENA
Summary
• Network overview
• Types of network
• LAN overview
ATHENA
• LAN overview
• Some advantages of LAN
Chapter 2: LAN COMPONENTS
ATHENA
Objective
� LAN Terminology
� LAN transmission media
� LAN technology and topology
� LAN networking devices
ATHENA
� LAN networking devices
LAN Terminology
ATHENA
LAN Terminology
�LAN Transmission Media
• What types of transmission should be used to connect LAN components?
�LAN Topology
ATHENA
�LAN Topology
• What will be the shape or topology, that defines the LAN?
Transmission Media
� Transmission media refers to the type of cable or wireless system that is used to connect network devices:
• Coaxial Cable
– Thinnet
ATHENA
– Thinnet
– Thicknet
• Twisted Pair
– Unshielded twisted-pair
– Shielded twisted-pair
• Fiber Optic Cable
Transmission Media
ATHENA
Coaxial Cable
�Coaxial cable consists of central copper wire surrounded by two layer of protective shielding
� Inexpensive, light, flexible and easy to
ATHENA
� Inexpensive, light, flexible and easy to work
�More resistance to Electromagnetic Interference (EMI) and attenuation
Coaxial Cable (2)
�Attenuation: loss of signal strength along wire
ATHENA
Coaxial Cable (3)
ATHENA
Types of Coaxial Cable
� The two basic classifications for coaxial cable are as follows:
• Thinnet
• Thicknet
ATHENA
• Thicknet
Thinnet
�Thinnet is a flexible cabling medium that is inexpensive and easy to install
�Thinnet is approximately 0.25
ATHENA
�Thinnet is approximately 0.25 inches (0.5cm)
�Thinnet can transmit a signal for 185 meters (610 feet)
Connection Hardware
� The most common is the British Naval Connector (BNC):
• BNC cable connector
• BNC T-connector
ATHENA
• BNC barrel connector
• BNC terminator
Connection Hardware (2)
�BNC cable connector
ATHENA
Connection Hardware (3)
�BNC T-connector: connects the network interface card in the PC to the network cable
ATHENA
Connection Hardware (4)
�BNC barrel connector: connects two thinnet cable segments into longer segment
ATHENA
Connection Hardware (5)
�BNC terminator: closes end cable to stop signal
ATHENAGrounded Terminator 50 OHM
Thicknet
� Thicknet coaxial cable is approximately 0.5 inches (1.3cm)
� Thicknet can transmit approximately 500 meters (1650 feet)
� Copper core thicker than Thinnet core
ATHENA
� Copper core thicker than Thinnet core
� Thicknet cable is sometime called “Standard Ethernet”
Thicknet (2)
ATHENA
Thicknet (3)
�Used as backbone to connect several Thinnet networks• Transceiver connects Thinnet to Thicknet cable contain:
– Vampire tap
ATHENA
– Vampire tap
– Thicknet connects to Attachment Unit Interface (AUI) port connector on Ethernet card
– AUI port also called Digital Intel Xerox (DIX) or DB-15 connector
Thicknet (4)
ATHENA
Twisted Pair
�Two-insulated strands of copper wire twisted around each other
�There are 2 categories of twisted pair:
• Shielded twisted pair (STP)
ATHENA
• Unshielded twisted pair (UTP)
Shielded twisted pair
� STP Cable
• Shielded Twisted Pair (STP) includes a layer of shielding that protects the wires from electromagnetic interference
• Uses a woven copper braid jacket
ATHENA
• Uses a woven copper braid jacket
• Uses a foil wrap between and around the wire pairs
• Less susceptible to interference
• Supports higher trans over longer distances
• STP cable costs more than thin coaxial or unshielded twisted-pair
Unshielded Twisted Pair
� Unshielded Twisted Pair (UTP)
�Max length segment: 100 meters (328 feet)
� Consists of two insulated copper wires
� Specified in 568 Commercial Building Wiring
ATHENA
� Specified in 568 Commercial Building Wiring Standard by Electronic Industries Association and the Telecommunications Industries Association (EIA/TIA)
Unshielded Twisted Pair (2)
ATHENA
CrosstalkRJ45
UTP
Unshielded Twisted Pair (3)
� UTP cable is available in the following categories:
• Category 1 : is designed for telephone system
• Category 2 : (4 tw) data rates up to 4 Mbps
• Category 3 : four twisted pairs, 3 point twist(30,48cm)
ATHENA
• Category 3 : four twisted pairs, 3 point twist(30,48cm) data rates up to 10Mbps
• Category 4 : consists of four twisted pairs, data rates up to 16Mbps
• Category 5 : consists of four twisted pairs, data rates up to 100Mbps
• Category 6 : consists of four twisted pairs, data rates up to 1000Mbps
Unshielded Twisted Pair (5)
� The most common connector used with UTP cable is RJ-45
• The RJ-45 resembles a phone plug RJ-11 except that the RJ-45 has 8 wires and 8 pins
ATHENA
Unshielded Twisted Pair (6)
ATHENA
Unshielded Twisted Pair (7)
ATHENA
Fiber-optic
� Fiber-optic cable are cost and installation difficulty
� Can carry signal for miles
� Typical speed: 100Mbps (support high data rate 200.000 Mbps)
ATHENA
data rate 200.000 Mbps)
� Construction
• Core : thin cylinder of glass
–can be plastic but signal does not travel as far
Fiber-optic (2)
• Cladding: concentric layer of glass which surrounds core
• Each glass strand passes signal in one direction
• Cable consists of strands in separate
ATHENA
• Cable consists of strands in separate jackets:
–one transmit
–one receive
• Kevlar fibers used for strengthen
Fiber-optic (3)
ATHENA
Fiber-optic (4)
ATHENA
LAN Topology
�Topology
• Arrangement or physical layout of computers
�Also known as :
ATHENA
�Also known as :
• Physical layout
• Design
• Diagram
• Map
LAN Topology (2)
�Two categories form:
• Physical topology
–Describes the actual layout of the network transmission media
ATHENA
transmission media
• Logical topology
–Describes the logical pathway a signal follows as it passes among the network nodes
LAN Bus Topology
ATHENA
LAN Bus Topology (2)
� Linear bus
� Simplest and most common
� Consists of a single cable called a trunk or backbone
ATHENA
� Communication on the bus
• Address data to a particular computer and put data on cable in form of signals
LAN Bus Topology (3)
�Sending the signal:• Electronic signals sent to all computers on network
• One computer at a time can send a signal
• Bus is the passive topology: Computers listen for data being sent. If one computer fails, it does not
ATHENA
data being sent. If one computer fails, it does not effect the rest of the network
• In active topology: Computers regenerate signal and pass it on network
LAN Bus Topology (4)
�Signal bounce:
• When signal gets to end of cable and bounces back
�Terminator:
ATHENA
• Stops signal from bouncing
LAN Bus Topology (5)
�Disrupting Network Connection:
• Segment breaks or disconnect to terminator, signal bounce occurs
• PC on the network can work but they could not communicate together
ATHENA
not communicate together
�LAN Expansion:
• Barrel connector can connect 2 cable segments
• Using repeater to connect 2 cable segments
LAN Bus Topology (6)
�Segment break
ATHENA
LAN Star Topology
Switch
ATHENA
Switch
LAN Star Topology (2)
� Computers connected to centralized unit called a hub
� Signal transmitted to hub to all computers on network
Offers centralized resources &
ATHENA
� Offers centralized resources & management
� Central point fails, entire network goes down
LAN Star Topology (3)
ATHENA
Ethernet Media Options
�Include:
10Base5 Thicknet 10 Mbit
10Base2 Thinnet 10 Mbit
10BaseT Cat 3 UTP 10 Mbit
ATHENA
10BaseT Cat 3 UTP 10 Mbit
10BaseFL Fiber Optic 10 Mbit
100BaseT4 Cat 3 UTP 100 Mbit
100BaseTX Cat5 UTP 100 Mbit
100BaseFL Fiber Optic 100 Mbit
Summary
�This topic examined :
• Provided to the basic terminology of LAN
• Display Transmission Media and Components of LAN
ATHENA
Components of LAN
• LAN Topology
Chapter 5: TCP/IP
ATHENA
Objective
�Converting • Decimal to binary ( binary to decimal)
• Decimal to hexadecimal (hexadecimal to decimal)
• Binary to hexadecimal (hexadecimal to binary)
ATHENA
�Understanding TCP/IP• IP address and Subnetting
�Protocol for TCP/IP
The Binary System
�Computing devices communicate with 1s and 0s
�A groups of 8 bits = 1 byte
� Binary numbers are based on the powers of 2
ATHENA
� Binary numbers are based on the powers of 2 because there are only 2 symbols: 0 and 1
� Binary can be converted to decimal in a similar way that decimal numbers are figured
The Binary System (2)
� Binary can be converted to decimal in a similar way that decimal numbers are figured
� Example:
1010 = (1x23)+(0x22)+(1x21)+(0x20)
ATHENA
= (1x8)+(0x4)+(1x2)+(0x1)
= 8 + 0 + 2 + 0
1010 = 10
The Decimal System
� Humans use the decimal number system base on the powers of 10
� 10 symbols are used: 0,1,2,3,4,5,6,7,8,9
� In a decimal number, each symbol represents 10 raised to a power according to its position
ATHENA
10 raised to a power according to its position that is then multiplied by that position
The Decimal System (2)
� Example:
261 = (2 x 102) + (6 x 101) + (1 x 100)
(2 x 100) + (6 x 10) + (1 x 1)
261 = 200 + 60 + 1
ATHENA
261 = 200 + 60 + 1
The Decimal System (3)
� Converting decimal to binary:
• Example: 49
– 49/2 = 24 with a remainder of 1
– 24/2 = 12 with a remainder of 0
– 12/2 = 6 with a remainder of 0
ATHENA
– 12/2 = 6 with a remainder of 0
– 6/2 = 3 with a remainder of 0
– 3/2 = 1 with a remainder of 1
– 1/2 = 0 with a remainder of 1
– 49 = 110001
The Hexadecimal System
� A hexadecimal system based on power of the number 16
� 16 symbols are used: 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
Example:
ATHENA
� Example:
7FA2 = (7x163) + (Fx162) + (Ax161) + (2x160)
7FA2 = 28672 + 3840 + 160 + 2
7FA2 = 32674
The Hexadecimal System (2)
� Converting decimal to hexadecimal:
• Example: 127
–127/16 = 7 with a remainder of 15 (F)
–127 = 7F
ATHENA
• Example: 254
–254/16 = 15(F) with a remainder of 14 (E)
–254 = FE
The Hexadecimal System (3)
� Converting hexadecimal to binary by divide binary to 4 bit groups:
Binary Hexa
0000 0
0001 1
ATHENA
0001 1
0010 2
0011 3
0100 4
The Hexadecimal System (4)
Binary Hexa
0101 5
0110 6
0111 7
1000 8
ATHENA
1000 8
1001 9
The Hexadecimal System (5)
Binary Hexa
1010 A
1011 B
1100 C
1101 D
ATHENA
1101 D
1110 E
1111 F
The Hexadecimal System (6)
� Example:
1101 1010 0100 0110 = DA46
C9F7 = 1100 1001 1111 0111
ATHENA
C9F7 = 1100 1001 1111 0111
IP Addresses
� An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network.
� An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits
ATHENA
� Range 0 to 255 (known as octets) separated by decimal points
� Example: 140.179.220.200
Introducing IP Addresses
ATHENA
� Unique addressing allows communication between end stations.
� Path choice is based on destination address.
� Location is represented by an address
IP Addressing
ATHENA
IP Addresses (2)
� Every IP address consists of two parts
• One identifying the Net ID (network identifier)
• One identifying the Host ID (host identifier)
ATHENA
Network ID and Host IDs
� A Network ID is assigned to an organization by a global authority
� Host IDs are assigned locally by a system administrator
Both the Network ID and the Host ID are used
ATHENA
� Both the Network ID and the Host ID are used for routing
IP Address Classes
00 NetID
10
HostID
NetID HostID
ClassClassAA
BB
ATHENA
110 NetID
1110 Multicast Address
HostID
BB
CC
DD8 bits 8 bits 8 bits8 bits
IP Address Classes
� Class A:
• 126 possible network ID
• 16.777.214 host IDs per network ID
• addresses begin with 0xxx, or 1 to 126 decimal
ATHENA
� Class B:
• 16384 possible network IDs
• 65.534 host IDs per network ID
• addresses begin with 10xx, or 128 to 191 decimal
IP Address Classes (2)
� Class C:
• 2 million possible network IDs
• about 254 host IDs per network ID
• addresses begin with 110x, or 192 to 223 decimal
ATHENA
Special Addresses
� Addresses beginning with 01111111, or 127 decimal, are reserved for loop-back and for internal testing on a local machine ( ping 127.0.0.1)
� LAN
ATHENA
� LAN
• 10.0.0.0 – 10.255.255.255,
• 172.16.0.0 – 172.32.255.255,
• 192.168.0.0 – 192.168.255.255,
� unused Internet address
Host and Network Addresses
� A single network interface is assigned a single IP address called the host address
� A host may have multiple interfaces, and therefore multiple host addresses
Hosts that share a network all have the same IP
ATHENA
� Hosts that share a network all have the same IP network address (the network ID)
Host and Network Addresses (2)
� In the example, 140.179.220.200 is a Class B address so by default the Network part of the address (also known as the Network Address) is defined by the first two octets (140.179.x.x) and the Host part is defined by the last 2 octets
ATHENA
and the Host part is defined by the last 2 octets (x.x.220.200)
IP Broadcast and Network Addresses
� An IP broadcast addresses ( that is send to all hosts on the network) has a host ID of all 1
� An IP address that has a host ID of all 0 is called a network address and refers to an entire network
ATHENA
entire network
Subnet Mask
� Default subnet masks:
• Class A : 255.0.0.0 (11111111.00000000.00000000.00000000)
• Class B : 255.255.0.0 (11111111.11111111.00000000.00000000)
ATHENA
(11111111.11111111.00000000.00000000)
• Class C : 255.255.255.0 (11111111.11111111.11111111.00000000)
Subnet Mask (2)
� Applying a subnet mask to an IP address to identify the NetID and HostID
• The network bits are presented by the 1s in the mask
• The host bits are presented by the 0s
Performing a bitwise logical AND operation
ATHENA
� Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address ( also call Network Number)
Subnet Mask (3)
� For example:
• 10001100.10110011.11110000.11001000 (140.179.240.200 Class B IP Address)
• 11111111.11111111.00000000.00000000 (255.255.000.000 Default Class B Subnet)
ATHENA
(255.255.000.000 Default Class B Subnet)
• --------------------------------------------------- mask
• 10001100.10110011.00000000.00000000 (140.179.000.000 Network Address)
Subnet Addresses
� An organization can subdivide it’s host address space into groups called subnets
� To create subnet address, administrator borrows some bits from host field
ATHENA
10 NetID SubnetID HostID
Subnet Mask
ATHENA
Subnet Mask Without Subnets
ATHENA
Subnets not in use—the default
Subnet Mask with Subnets
ATHENA
Network number extended by eight bits
Subnet Mask with Subnets
ATHENA
Network number extended by ten bits
An Example (3)
� Recall that the default Class C subnet mask is
� 255.255.255.0 (11111111.11111111.11111111.00000000 binary)
� Extending this by 4 bits yields a mask of
ATHENA
� 255.255.255.240 (11111111.11111111.11111111.11110000 binary)
Protocol
� Protocols are the rules and procedures for communicating
� Three points to think about protocols
• Many protocols, each has it sown advantages and restrictions
ATHENA
and restrictions
• Protocols work at various OSI layers, the layer in which it works describes its function
• Several may work together in a protocol stack or suite: Levels in protocol stack map or correspond to the layers of the OSI model
TCP/IP
� Transmission Control Protocol/ Internet Protocol
� Provides routable, enterprise networking protocol
Access to worldwide internet
ATHENA
� Access to worldwide internet
� Protocols written for TCP/IP:
• SMTP , FTP, SNMP
TCP/IP (2)
� The function of the TCP/IP protocol stack, or suite, is the transfer of information from one network device to another. In doing so, it closely maps the OSI reference model in the lower layers, and supports all standard
ATHENA
the lower layers, and supports all standard physical and data link protocols
TCP/IP (3)
� DNS (Domain Name System) is a system used in the Internet for translating names of domains and their publicly advertised network nodes into addresses
ATHENA
� POP3 (Post Office Protocol) is an Internet standard for storing e-mail on a mail server until you can access it and download it to your computer. It allows users to receive mail from their inboxes using various levels of security
TCP/IP (5)
� SMTP (Simple Mail Transport Protocol) governs the transmission of e-mail over computer networks. It does not provide support for transmission of data other than plain text
ATHENA
� SNMP (Simple Network Management Protocol) is a protocol that provides a means to monitor and control network devices, and to manage configurations, statistics collection, performance and security
TCP/IP (6)
� FTP (File Transfer Protocol) is a reliable connection-oriented service that uses TCP to transfer files between systems that support FTP
Ex: ftp://athenavn.com
ATHENA
� HTTP (Hypertext Transfer Protocol) is the Internet standard that supports the exchange of information on the World Wide Web, as well as on internal networks. It supports many different file types, including text, graphic, sound, and video
Ex: http://www.athenavn.com
TCP/IP (7)
� Telnet is a standard terminal emulation protocol used by clients for the purpose of making remote terminal connections to Telnet server services; enables users to remotely connect to routers to enter configuration
ATHENA
connect to routers to enter configuration commands
Ex :Run…cmd
telnet 192.168.1.1
TCP/IP (8)
� Ping (Packet Internet Groper) is a diagnostic utility used to determine whether a computer is properly connected to devices
EX: Run…cmd
ping 192.168.0.1 test server
ATHENA
ping 192.168.0.1 test server
� Traceroute is a program that is available on many systems, and is similar to PING, except that traceroute provides more information than PING
Summary
� This topic examined:
• Common Protocols
• TCP/IP
• IP address and Subnetting
ATHENA
Chapter 6: LAN ARCHITECTURE
Open System
ATHENA
Open System Interconnection
Objectives
� Identify the seven protocol layers of the Open System Interconnection (OSI) Reference Model
� Discuss the functional attributes of each layer of the Open Systems
ATHENA
layer of the Open Systems Interconnection Reference Model
� Understanding Putting Data on the Cable and Access Methods
Content
� Introduction
� Open Systems Interconnection (OSI) Reference Model
�How network sends data
� Access Method
ATHENA
� Access Method
� Summary
Introduction
� Sending Data
• Recognize data
• Divide data into manageable chunks
• Add information to each chunk
– Location of data
ATHENA
– Location of data
– Identify receiver
• Add timing and error checking
• Put data on the network and send it
� Protocols: procedures to send data
Introduction (2)
� To solve the problem of networks being incompatible and unable to communicate with each other, the International Organization for Standardization (ISO) released the Open Systems Interconnection (OSI) reference
ATHENA
Systems Interconnection (OSI) referencemodel in 1980
� First standard to describe architecture for dissimilar devices to communicate
� Best known and widely used
Open Systems Interconnection
� The OSI model organizes communication protocols into seven levels:
• The Physical Layer
• The Data Link Layer
• The Network Layer
ATHENA
• The Network Layer
• The Transport Layer
• The Session Layer
• The Presentation Layer
• The Application Layer
Open Systems Interconnection (2)
ATHENA
Packet Assembly & Disassembly Process
ATHENA
Layer 7: The Application Layer
� Topmost layer
�Window for application processes to access network services
� User-end interface that support transfer files, access database, e-mail …
ATHENA
files, access database, e-mail …
�Handles general network access, flow control, error recovery
Layer 6: The Presentation Layer
� Determines format to be used to exchange data
� Called the network translator
� Responsible for protocol conversion, translating data, encrypting data
ATHENA
translating data, encrypting data
�Manages data compression
� Redirector utility operates at this layer
Layer 5: The Session Layer
� Performs name recognition and allows two applications on different computers establish, manage and end a connection (session:full duplex, half duplex)
� Provides synchronization between user
ATHENA
� Provides synchronization between user tasks by placing checkpoints in the data stream
� Implements dialog control between communicating processes
Layer 4: The Transport Layer
� Ensures packets are delivered error free, in sequence, no losses or duplication
� Repackages messages, breaking up into smaller packets(segment)
Unpacks message at receiving end and
ATHENA
� Unpacks message at receiving end and sends acknowledgement
� Provides flow control, error handling, solves transmission problems
Layer 3: The Network Layer
� Addresses messages, translates logical addresses/names into physical addresses
� Organizes data into packets then forwards them to their destination
Determines the best route on the
ATHENA
� Determines the best route on the network based on network conditions, priority of service
�Manages traffic problems and controls congestion of data
Layer 2: The Data Link Layer
� Sends data frames from network layer to physical layer
� Data frame: organized logical structure in which data can be placed
ATHENA
which data can be placed
• Simple data frame: Destination ID, Sender ID, Control, Data, CRC (cyclical redundancy check)
� Provides error free transfer of frames from one computer to another through the physical layer
Layer 2: The Data Link Layer (2)
ATHENA
Layer 1: Physical Layer
� Responsible for the mechanical, electrical and procedural characteristics of the transmission (transmit the unstructured raw bit stream over a physical link)
� Establishes and maintains physical link between communication computers
ATHENA
between communication computers
� Defines how the cable is attached to the NIC
� Transmit bit (0,1) from one computer to another
Layer 1: Physical Layer (2)
ATHENA
How Networks Send Data
� Two reasons why large chunks of data tie up network
• Large chunk of data generate a problem traffic during transmission
• Timely interaction and communication impossible
ATHENA
• Timely interaction and communication impossible
How Networks Send Data (2)
�Large Streams of Data
ATHENA
How Networks Send Data (3)
�Why network divided data to packets?
• Packets : small chunks/frames of data
ATHENA
How Networks Send Data (4)
� Special control info sent with each packet
• Send the original, disassembled data in small chunks
• Reassemble the data in the proper order at destination
ATHENA
destination
• Check data for errors
How Networks Send Data (5)
� Packets may contain:
• Information such as messages
• Types of computer control data, commands, service requests
• Session control codes (error correction)
ATHENA
• Session control codes (error correction)
How Networks Send Data (6)
� Packet components:
• Source address
• Data intended for transmission
• Destination address
ATHENA
• Instructions that tell network how to pass data
• Info for receiving computer on how to reassemble packets
• Error checking info
How Networks Send Data (7)
� Components have three sections:
• Header
• Data
• Trailer
ATHENA
How Networks Send Data (8)
ATHENA
How Networks Send Data (9)
�Header
• Alert signal indicating packet is being sent
• Source address
• Destination address
ATHENA
• Clock info to synchronize transmission
How Networks Send Data (10)
� Data
• Actual data being sent
• Size 512 byte to 4K
� Trailer
ATHENA
• Contains error checking component (CRC)
• CRC is a mathematical calculation done on data
How Networks Send Data (11)
� Packet Creation
• Begins at Application layer
• As data descends through each layer, more info is added at each layer
ATHENA
How Networks Send Data (12)
Application
Presentation
Session
Application
Presentation
Session
En
cap
sula
te
En
cap
sula
te
ATHENA
Transport
Network
Data Link
Physical
Transport
Network
Data Link
Physical
En
cap
sula
te
De-
En
cap
sula
te
Access Methods
ATHENA
Access Methods (2)
� An access method is a set of rules defining how a computer puts data on and takes off a network cable
� Prevent simultaneous access to the cable
ATHENA
Contention
� Contention means that the computer are contending for use of the transmission medium (first come, first served)
� Specifications for contention-based access methods include procedure for
ATHENA
access methods include procedure for how to avoid collisions and what to do if collision occurs
� Contention-based access methods include:
• CSMA/CD
Contention (2)
�Collision occur
ATHENA
CSMA/CD
� CSMA/CD is stand for Carrier-Sense Multiple Access/Collision Detection
�Multiple access is when two devices begin to talk at the same time
Carrier sensing refers to the process of a
ATHENA
� Carrier sensing refers to the process of a device looking for a clear channel before sending a message
� IEEE 802.3
CSMA/CD (2)
� Checks the cable for network traffic
• Computer listens to the network
• If the network is not busy, that computer can send data
• If the network is busy, the computer refrains
ATHENA
• If the network is busy, the computer refrains from transmitting until the network quiets down
CSMA/CD (3)
ATHENA
CSMA/CD (4)
� Carrier detection mechanism:
• Computers continue to listen to the network as they transmit
• If a computer detects another signal that interferes with the signal it is sending, it
ATHENA
interferes with the signal it is sending, it stops transmitting
• Both computers then wait a random amount of time and attempt to retransmit
Summary
� This topic examined:
• OSI and seven layers
• How network sends data
• Access Methods
ATHENA
Chapter 7: Hands on LAB
Building a Local Area Network
ATHENA
Hands on LAB
� UTP-STP
ATHENA
Hands on LAB
UTP Implementation Straight-through
ATHENA
Hands on LAB
UTP Implementation Straight-through
568A 568A
ATHENA
Straight-through cable568A <----> 568A568B <----> 568B
Crossover cable568A <----> 568B568B <----> 568A
Hands on LAB
UTP Crossover used for :
� PC connect PC
�Hub connect Hub
� Switch connect Switch
Crossover
ATHENA
� Switch connect Switch
UTP Straight-through used for :
� PC connect Hub
� PC connect Switch
� PC connect Router (Ethernet port)
Crossover
Hands on LAB
� Step by step
ATHENA
Hands on LAB
� Step by step
ATHENA
Hands on LAB
� Step by step
ATHENA
Hands on LAB
� Step by step
ATHENA
Hands on LAB
� Step by step
ATHENA
Building a Local Area Network
Outlet:
ATHENA
Tool:
Microsoft Visio
•Objective
•What is Microsoft Visio?
•How to use Microsoft Visio?
ATHENA
•How to use Microsoft Visio?
Hands on Lab:Microsoft Visio
ATHENA
Hands on Lab:Microsoft Visio
ATHENA
Hands on Lab:Microsoft Visio
ATHENA
Question & Answer
Q&A
ATHENA
Q&A
Chapter 8: LAN Networking Devices
�Objective
• What is Network Interface Card?
• What is Repeater ?
• What is Hub ?
ATHENA
• What is Hub ?
• What is Switch?
• What is router?
Network Adapter Card
Role of Network Interface Card:
� A Network Adapter Card (also known as Network Interface Card) links a computer with the network cabling system
ATHENA
� Prepare data from computer to network
� Send data to other computers
� Control flow of data between computer and cabling system
Repeater
ATHENA
�Enables signal to travel farther (regenerates) and then re-transmitting it to other segments
�Repeaters operate at the OSI Physical Layer
Hub
� A hub is another Layer 1 device that is typically used as a central point for connecting segments in a LAN
ATHENA
Switch
�Work at Data Link layer of OSI
�More common way to connect networks together
ATHENA
How do Switch do?
ATHENA
• Initial MAC address table is empty.
Learning Addresses
ATHENA
• Station A sends a frame to station C.
• Switch caches the MAC address of station A to port E0 by learning the source address of data frames.
• The frame from station A to station C is flooded out to all ports except port E0 (unknown unicasts are flooded).
Learning Addresses
ATHENA
• Station D sends a frame to station C.
• Switch caches the MAC address of station D to port E3 by learning the source address of data frames.
• The frame from station D to station C is flooded out to all ports except port E3 (unknown unicasts are flooded).
Filtering Frames
ATHENA
• Station A sends a frame to station C.
• Destination is known; frame is not flooded.
Filtering Frames
ATHENA
Router
� Work at Network layer of OSI, which means they examine the logical network address (192.168.15.100)
ATHENA
What do Router do?
ATHENA
�To route, a router needs to do the following:
• Know the destination address
• Identify the sources it can learn from
• Discover possible routes
• Select the best route
• Maintain and verify routing information
What do Router do?
ATHENA
• Routers must learn destinations that are not directly connected.
Summary
� Network Adapter Card
� Hub
� Switch
� Router
ATHENA
� Router
Chapter 9: WAN Overview
�� ObjectiveObjective
• WAN Transmission Technology
• Leased Line
• ADSL (Asymmetrical Digital Subscriber Line)
ATHENA
• PSTN(Public-Switch Telephone Network)
• ISDN(Integrated Services Digital Network)
Introduction
� In order to take advantage of WAN services, local networks and individual users must select a method for gaining access
� Service providers offer a wide range of WAN access options
ATHENA
access options
� Each designed to meet a specific set of transmission needs in an efficient and cost-effective manner
WAN Overview
ATHENA
�WANs connect remote sites.
� Connection requirements vary depending on user requirements, cost, and availability.
WAN Technology
� Leased line
• 64k, 128k, 256k, 512k, 2M …v.v
� Frame Relay
• 64k, 128k, 256k, 512k, 2M …v.v
� ISDN (Integrated Services Digital Network)
ATHENA
� ISDN (Integrated Services Digital Network)
• Basic rate(BRI) 2B+1D 64+64+16=144kbps• Primary rate(PRI) 23B+1D (23X64)+64=1536kbps• ADSL (Asymmetrical Digital Subscriber Line)
• ADSL FPT - ADSL Viettel - ADSL VNN
� PSTN(Public-Switch Telephone Network)
• Vnn1269 - vnn1260
Leased Line
ATHENA
Leased Line
ATHENA
� Provider assigns connection parameters to subscriber.
ADSL “Consumer DSL”
�Designed to co-exist with POTS, unlike most other DSL types
�“Slow” upstream for low-data-rate requests�“Fast” downstream for bursts of rich graphics
ATHENA
�“Fast” downstream for bursts of rich graphics and multimedia content
ADSL and POTS
A Key Feature of ADSL Is Co-Existence with POTS
ATHENA
Customer PremiseCustomer Premise Central OfficeCentral Office
� Permits transmission of both signals on the same wire pair� Off-loads data circuit from the voice switch� “POTS Splitter” at the CO separates analog POTS from data� “Microfilters” at the customer premise prevent off-hook� interference between analog voice signal and ADSL signal
ADSL
ATHENA
ISDN
ATHENA
Summary
�Wide area network
� Leased line
� ADSL
� ISDN
ATHENA
� ISDN
� PSTN
Chapter 10: Setup a WAN
�Building a WAN with PSTN
• Thực hành xây dựng WAN bằng cách kết nối hai máy PC thông qua hệ thống PSTN.
ATHENA
hai máy PC thông qua hệ thống PSTN.
• Bật chức năng remote access trong windows.
• Tạo remote access server và remote access client
• Thực hiện cấu hình IP cho server và client
Establishing a Remote Access Connection
LAN Protocols
Remote Access
Protocols
Local Area
Network
ATHENA
InternetInternet
Remote Access Client
Remote Access
Server
Creating a Dial-up Connection
Network Connection TypeYou can choose the type of network connection...
Network Connection TypeYou can choose the type of network connection...
Network Connection Wizard
Dial-up to private network
ClientClient Remote
Access
Server
ATHENA
Dial-up to private network
Dial-up to the Internet
Connect using my phone line (modem or ISDN)
Connect to the Internet using my phone line (modem or ISDN)
ClientClient
ISP
Server
InternetInternet
Chapter 11: Wireless LAN
� Wireless Radio (Bluetooth)
ATHENA
Objective
�What is Wireless LAN?
�What is infrastructure Mode?
�What is ad-hoc mode?
� IEEE 802.11a,802.11b,802.11g
ATHENA
� IEEE 802.11a,802.11b,802.11g
WireLess LAN
�Wireless Lan connect the computers and network communication devices within geographically limited areas.
�WireLess Lan use frequency band 2,4Ghz
ATHENA
Wireless LAN
�WireLess Lan does not require:
• Lining-up
• Line of sight
ATHENA
Wireless LAN
�WireLess Lan has many advantages in connecting the devices together in your office.
• Fast deployment.
• Easy installation,easy and convenient to operate.
ATHENA
operate.
• Easy upgarde and maintenance.
• Network access everywhere,everytime.
Wireless LAN
� IEEE 802.11 : Defined network standards for physical components of wireless Lan
� IEEE 802.11 : built in 1997
ATHENA
Wireless LAN
� IEEE 802.11 has two modes:
• Infrastructure mode
• Ad-hoc mode
ATHENA
Wireless LAN
� Infrastructure mode:
• Wireless Lan use Access-point
• And computers with wireless Card are connected together through Access Point
ATHENA
connected together through Access Point
Wireless LAN
�Ad-hoc mode:
• Devices which can connect together directly
• Without Access point
ATHENA
Wireless LAN
IEEE 802.11b :
�Wireless LAN
– Speed: 1Mbps – 11Mbps
ATHENA
– Frequency Band : 2,4 Ghz ISM Band(Insdustrial Scientific Medical Band)
Wireless LAN
� IEEE 802.11b Plus (IEEE 802.11b +)
• Improved from IEEE 802.11 b
• Frequence band : 2,4Ghz DSSS
• Speed :22 Mbps
ATHENA
• Speed :22 Mbps
Wireless Lan
� IEEE 802.11 a:
• Wireless Lan.
–Speed : 6Mbps – 54 Mbps
–Frequence band : 5Ghz or more
ATHENA
–Frequence band : 5Ghz or more
Wireless LAN
� IEEE 802.11a is :
• Not compatible with 802.11b and 802.11b Plus
ATHENA
Wireless LAN
� IEEE 802.11g is :
-Wireless Lan
–Speed : 1Mbps – 54 Mbps
–Compatible with 802.11b and 802.11a
ATHENA
–Compatible with 802.11b and 802.11a
Wireless LAN
�Wireless :
• IEEE 802.11a,IEEE 802.11b, IEEE 802.11b plus, IEEE 802.11 g use Access method CSMA/CD(Carrier Sense Multiple Access/Collision Detection)
ATHENA
Access/Collision Detection)
Wireless LAN
�Components of Wireless
• Wireless Access Point
• Wireless LAN PCI Card
• Wireless LAN PCMCIA Card/Carbus
ATHENA
• Wireless LAN PCMCIA Card/Carbus
• Wireless Print Server
Wireless LAN
�Wireless Access Point
• Similar Hub/Switch in Wireline
• Connect clients use frequence band : 2,4Ghz-2,4835Ghz
• Distance from access point to wireless client:
ATHENA
• Distance from access point to wireless client: Depend on environment, devices, standard of network ( IEEE 802.11a, IEEE 802.11b ….)
Wireless LAN
�Wireless Access Point
ATHENA
Wireless Lan
�Wireless LAN PCI Card
• Net card for desktop computer
• PCI
• Operate on many channels
ATHENA
• Operate on many channels
Wireless LAN
�Wireless LAN PCI card
ATHENA
Wireless LAN
�Wireless LAN PCMCIA Card/CarBus
• Net card for Notebook/Laptop
• PCMCIA
ATHENA
• PCMCIA
Wireless LAN
�Wireless LAN PCMCIA card/Carbus
ATHENA
Wireless LAN
�Wireless Print Server
• Devices which share printer in wireless LAN
ATHENA
Wireless LAN
�Wireless Print Server
ATHENA
Wireless LAN
ATHENA
Wireless LAN
ATHENA
Wireless LAN
ATHENA
Wireless LAN
The roaming process is seamless and transparent to the user.
ATHENA
Wireless LAN
Access Point as Repeater
ATHENA
Summary
� Ad-hoc Mode
� Infrastructure Mode
� IEEE 802.11a,802.11b,802.11g
ATHENA
Chapter 12: Firewall Concepts
� A firewall is a mechanism for enforcing an access policy by controlling what traffic to allow on your network. Firewalls work by examining one or more properties of each network packet and deciding whether to allow the packet
ATHENA
and deciding whether to allow the packet through or take other appropriate action.
� Firewall have two type
• Hardware
– EX: watchguard, netsreen, juniper….
• Software
– EX: ISA(microsoft), checkpoint…..
Objective
�What is firewall?
� Functions of Firewall
�What is IDS ?
� Functions of IDS
ATHENA
� Functions of IDS
Function of Firewall
�Protecting data and network resources is critical to successful e-business.
�Firewalls are mandatory network security devices.�When connecting to the Internet, you need a firewall in every location with Internet access.
ATHENA
firewall in every location with Internet access.
Firewalls provide:� Access Control� Authentication � VPN � Network Segmentation� DoS protection and some
network layer attack detection
� Recording Syslog
Location of Firewall
Internet
Router
dm Firewall
outside
ATHENA
Switch
Syslog Server
Switch
RAS
dmz
Firewall
inside
CISCO PIX FIREWALL
1. Pix Firewall 501
2. Pix Firewall 506E
Some Firewall Types
ATHENA
3. Pix Firewall 515E
4. Pix Firewall 525
5. Pix Firewall 535
Intrusion Detection & Prevention System Overview
1. Function
2. Location of IDP
ATHENA
Function
Functions
� Intrusion Detection & Prevention (IDP) system is designed as dedicated devices for comprehensive intrusion detection, dropping and prevention:
ATHENA
and prevention:
• Detects and Prevents intrusions
• Prevents attacks before it is too late
• Multiple response mechanisms
• Allow the user to decide how to respond to individual attacks
Location of IDP
WebServer
User
Users
FinanceServers
MailServer
HR Servers
ATHENA
Firewall
Protected networkInternet
IDP VictimMail Server
Attacker
LAN Switch
SPAN
LAN
Firewall
Summary
� Firewall
� IDS/IDP
ATHENA
Chapter 13: Virus ,Worm and Trojan
�What is virus?
�What is worm?
�What is the Trojan Horse?
ATHENA
Chapter 13: Virus ,Worm and Trojan
�What is virus?
• Virus
– program that can infect other programs by modifying them to include a possibly evolved, copy of itself
�What is worm?
ATHENA
• Worm
– an independent program that replicates from machine to machine across network connections often clogging networks and information systems as it spread
Virus, Worm and Trojan
�What is the Trojan Horse?
• a program that is disguised as something else to allow for installation and execution of one of the Remote Control applications
ATHENA
•Trojan can do:
•Steal passwords
•Delete files
•Open backdoors
•Connect to external sites
The end
Final exam
ATHENA
Final examThe end