Computer Networks: Computer Network consists of two or more computers connected to each other so that they can exchange information. Broadly, Networks are divided into three categories: LAN, WAN & MAN. Local Area Network (LAN) is collection of computers and other connected devices that fit within the scope of a single physical network. LANs provide the building blocks for other big networks. A WAN can span across the world. Wide area networking combines multiple LANs that are geographically separate. This is accomplished by connecting the different LANs using services such as dedicated leased phone lines, dial-up phone lines, satellite links etc. MANs use WAN technologies to interconnect LANs within a specific geographical region, such as a city. Network Building Blocks: Client Computers: The computers used by END USERS to access the Network resources. These computers are loaded with “Client” operating systems such as Windows98, WindowsXP or Client installation of Linux etc. These are also called Workstations. Server Computers: These computers provide resources – shared storage, shared printers, Network services, E-Mail, Internet services , Data servers etc. These computers are hardware wise powerful. Network Operating systems are loaded on these computers such as Windows Server 2000, 2003, Linux server, Unix server etc. Peer to Peer Networking: All the computers in a network can share resources with each other. Any computer, for example can share a printer, Hard drive with other computers. All the computers are also used by individual users for day to day work. No computer is “special”. Peer-to-peer networks have no centralized control over shared resources. Each network user controls access to the resources that reside on his or her machine. As networks grow, the decentralized nature of this type of network makes locating resources increasingly difficult, as the number of peers to be checked goes up. Peer-to-peer networks are the easiest and cheapest kind of network to install. These are used for small Networks. Peer-to-peer networks have no centralized security or maintenance functions. Here are some benefits of peer-to-peer networks: They are easy to install and configure. Users are able to control their own shared resources. This type of network is inexpensive to purchase and operate. You don’t need any equipment or software other than an operating system. Users might have to remember as many passwords as there are shared resources. You must perform individual backups on each machine to Protect all shared data. Peer to peer networking features are built into Windows Operating Systems. No additional software is required to establish this type of networking. Dedicated Server or Client-Server networking: In this setup, Server computer is the server only. It provides shared resources & services. Data base Servers, Intranet Servers are usually dedicated servers. Server-based networks also provide centralized verification of user accounts and passwords. Also, only network administrators can modify the security information in the domain controller’s database. This approach provides centralized security. Network resources like files and printers are easier to find because they are generally located on specific servers, not on individual user machines across the network. Dedicated Server type network suffers from single point of failure on networks. Network Topology: This term refers to the way or shape in which computers are connected in a network. Star: All the nodes are connected to a centralized hub. Maintenance is easy, but signal gets divided. UTP cable length is 100meters. BUS: All the devices are connected to a common bus or Backbone. This type of set up is difficult for troubleshooting. MESH: Every device is connected to every other device. Connections are redundant. These types are reliable. RING: Devices are wired in a circle. This type uses “token ring” type of communication. “Collisions” of packets is avoided, but fault finding is difficult. Open System Interconnection (OSI) model : The OSI model breaks the various aspects of Networking functions into seven layers. It is a framework in which various real networking standards are expected to fit. Application Layer ( No.7) : This layer enables Applications to use the Network. It manages data flow control & handles errors. It is nearest to user interface. Presentation Layer (No.6) : Data is translated in this layer into a form suitable for Application layer. Data encryption, compression is also handled here. Session Layer (No. 5) : This layer facilitates the connecting Applications to establish a session. After a session between two devices is established, it is maintained till it is terminated by either device. Transmission modes such as half duplex, full duplex are decided in this layer. Transport Layer (No.4) : Handles transportation between devices. Manages packet handling, i.e. large messages are broken into packets for efficient handling & ensures error free delivery. Network protocols such as TCP &SPX work at this layer. Network Layer(No.3): Actual routing of the messages in the network is managed here. It manages translation of names into addresses, network traffic problems, routing etc. Network protocols such as IP & IPX work on this layer. Data Link Layer (No.2) : In this layer, data is sent from the network layer to physical layer. It handles physical communication between two systems in the form of packets or frames. MAC addresses exist at this layer. Data transmission from many nodes without collision is handled at this layer. Physical : ( Layer 1) : Transmits data over a physical medium. Defines physical aspects such as cards, cables etc. Data is sent as bits. The Ethernet Protocol : Ethernet protocol operates at the first two layers identified in the OSI model – the Physical layer & the data link layer. IEEE Standard 802.3 standard defines rules for configuring an Ethernet network as well as specifying how elements in an Ethernet network interact with one another. There are four major types of media in use today: Thickwire for 10BASE5 networks, thin coax for 10BASE2 networks, unshielded twisted pair (UTP) for 10BASE-T networks and fiber optic for 10BASE-FL or FiberOptic Inter-Repeater Link (FOIRL) networks. The most popular wiring schemes are 10BASE-T and 100BASE-TX, which use unshielded twisted pair (UTP) cable. 10 Base5: This means 10 Mb/s transmission rate, the baseband form of transmission, and the 500 meter maximum supported segment length. This is known as “thick” Ethernet, which uses a co-axial cable. 10 Base2: This uses a thinner co-axial cable, just like a TV cable. It uses the BUS topology. 10 BaseT: This is the most popular version of Ethernet. These networks use the Star topology. Maximum length is 100 meters. There are four pairs of twisted pairs of cables. 10 baseT uses only two of these pairs. 10 BaseFL: This was the first standard for Fiber Optic cable. FAST ETHERNET: This refers to Ethernet that runs at 100Mbps: 100BaseT4: Over the same UTP cable(10BaseT), 100Mbps is supported. All the foir pairs of bable are used. 100BaseTX: The most commonly used standard today for Office Networking at 100Mbps. AS Category 5 cable needs to be used for 100Mbps. Only two pairs of wires are used. 100BaseFX: This is the Fiber Optic version of 100Mbps Ethernet. Fiber Optic cable is commonly used as a Network Backbone. Cable: Twisted Pair Ethernet (10baseT), sometime also called "UTP" (Unshielded Twisted Pair) is based on using a cable similar to phone-wiring. The cable is connected via an RJ-45 connectors to the network card installed in the PC. The Eight-conductor cable contains 4 pairs of wires. Each pair consists of a colored wire and a white wire with a stripe of the same color. The pairs are twisted together. To maintain reliability on Ethernet, you should not untwist them. The pairs designated for 10BaseT Ethernet are Orange and Green. The other two pairs, Brown and Blue, can be used for a second Ethernet line or for phone connections. There are two basic cables connections. A straight through cable connection scheme, which is used to connect to a hub or switch, and a cross-over cable connection scheme for connecting two computers without using a HUB. The cable is connected to an RJ-45 connector. RJ-45 Plug : It is a big size telephone type connector. It is used on Ethernet twisted pair links. This includes the 10Base-T, 100Base-TX, 100Base-T4, 100Base-T2, and 1000Base-T physical layer types. An RJ-45 connector has 8-pins. A male RJ-45 is mounted on each end of the twisted pair cable. A female RJ-45 "jack" is integrated into the Ethernet hub or NIC. Cross Over Color Code Cable Straight Through Cable Color Code Pin 1 white green Pin 1 white orange Pin 2 green Pin 2 orange Pin 3 white orange Pin 3 white green Pin 4 blue Pin 4 blue Pin 5 white blue Pin 5 white blue Pin 6 orange Pin 6 green Pin 7 white brown Pin 7 white brown Pin 8 brown Pin 8 brown HUB : Hubs provide the signal amplification required to allow a segment to be extended a greater distance. A hub takes any incoming signal and repeats it out all ports. If the hub is attached to a backbone, then all computers at the end of the twisted pair segments can communicate with all the hosts on the backbone. Hubs generally have no intelligence regarding the destination of the data they propagate between the devices connected to it. Any data that is received at one port is transmitted to all devices attached to the hub, including other hubs, which could, in turn, then distribute the data to it's connected devices. So, only ONE network connection can be active at a time on the complete network. SWITCH: Switches perform a similar function to hubs, but they have slightly more intelligence and can accommodate devices with differing speeds. When data is sent through a Hub, it is sent to every device attached to the Hub. A Switch sends the data only to the destination device. A device connected to a switch gets the full bandwidth. In a Hub, this bandwidth is shared by the connected devices. Thus, a 10Mbps signal will be divided among say 10 computers in a Hub, but full 10Mbps will be delivered to the destination port in a switch. NETWORK INTERFACE CARD: Network interface cards or NICs connect a PC to a network. The NIC provides a physical connection between the networking cable and the computer's internal bus. PCI bus master slots are most commonly used for NICs. NICs are usually 32 bit and Plug & Play complaint. NICs are available to support almost all networking standards, including the latest Fast Ethernet environment. Fast Ethernet NICs are often 10/100 capable, and will automatically set to the appropriate speed. Full duplex networking is another option, where a dedicated connection to a switch allows a NIC to operate at twice the speed, i.e. a 100Mbps connection will operate at 200Mbps. Many NICs support WOL (Wake-On-LAN). This is an ACPI function allowing a powered OFF computer to be powered ON from a remote station. To use the WOL feature, the NIC must be WOL capable and the motherboard of the PC (for which the card is installed) must be of ACPI architecture. The NIC will determine whether a received Wake-up frame is addressed to the PC. If so, the NIC will send a signal to the motherboard to power ON the computer. TCP-IP TCP/IP is an industry-standard suite of protocols. It is designed for large WANs. TCP/IP was developed in 1969 by the U.S. Department of Defensethere was a project called Advanced Research Projects Agency Network (ARPANET). The purpose of TCP/IP was to provide high-speed communication network links. ARPANET has grown into a worldwide community of networks known as the Internet. TCP-IP protocol layers correspond to the layers of the OCI model. Application Layer Presentation Layer TCP IP Protocols : HTTP, FTP, Telnet, SMTP, DNS Session Layer Transport Layer Transport Layer : TCP & UDP Network Layer IP, ARP, ICMP, IGMP Data Link Layer Network Interface Layer : Ethernet, Token ring Physical Layer O S I Model T C P / I P Ethernet Addresses: Each Ethernet card (NIC) has a unique permanent 48 bit address called MAC ( Media Access Control ) Address. This is hard coded into the board. Each NIC in the world is unique in this respect. These are expressed as 12 Hex digits, for example: 0R45EBB67C11. Manufacturers of the NICs purchase blocks of these addresses. IP Addresses : Each node in a Network or specifically on the Internet must have a unique 32 address. IP addresses operate at the Network layer of the TCP/IP protocol. Theoretically, therefore, 4 billion unique host addresses can exist on the Internet. IP addresses are expressed as a dotted decimal or dotted quad notation. Each number is an Octet, i.e. consisting of 8 bits. For example: 192.168.8.30. This 32 bit, 4 octet pattern consists of two parts: Network ID & Host ID. 11000000 192. 10101000 168. 00000011 3. 00011000 ----- Binary format 24 ----- Dotted decimal format Network ID or address identifies the Network on which the host exists, specifically, it identifies the systems that are located on the same physical network. All systems on the same physical network must have the same network ID. The network ID must be unique to the internetwork. Host ID or Host Address identifies the specific host on that network such as a workstation, server, router, or other TCP/IP host. The address for each host must be unique to the network ID. The IP addresses are usually denoted in the form w.x.y.z IP Classes: To take care of the varying business needs, without wastage of IP addresses, IP address classes were introduced, namely, A, B, C, D, E. Classes A, B & C use different sizes for Network Ids & Host address part. Class D is for special type of “multicast” addresses. Class E is experimental. Following tables illustrates each of the A, B & C classes: Clas s A First octet value (w) 1–126 Network ID part w Host ID part Number of Networks possible x.y.z 126 Hosts per Network Application 16,777,214 For very large no. of hosts 128– 191 192– 223 B C w.x y.z 16,384 65,534 w.x.y z 2,097,15 2 254 Medium to large sized Networks Small Networks IP Ranges of Network & Host portions: Network IDs Host IDs Clas s First Last First Last A 1.0.0.0 126.0.0.0 w.0.0.1 w.255.255.254 B 128.0.0.0 191.255.0.0 w.x.0.1 w.x.255.254 C 192.0.0.0 223.255.255.0 w.x.y.1 w.x.y.254 Subnets: In a large Intranet, parts of the total Network are required to be isolated. More realistic number of Hosts per network than the ranges provided by the classes of Networks are required. Too many number of Hosts should not be placed in a single physical Network. When the Network is sub divided, there should be a way for a computer to know whether the target computer is on the same Network OR the call is to be routed. So, a setting is made in the TCP/IP configuration, called the Subnet Mask. This helps to distinguish whether a host is in the same Subnet. Subnet mask defines the bits of the TCP/IP Network part of addresses that should match, if the target computer is to be considered on the same subnet. Subnets divide a large network into multiple physical networks connected with routers. A subnet mask blocks out part of the IP address so that TCP/IP can distinguish the network ID from the host ID. When TCP/IP hosts try to communicate, the subnet mask determines whether the destination host is on a local or remote network. To communicate on a local network, computers must have the same subnet mask. Default Gateway: When we require to communicate with a Host on another Network, the call is to be “routed” to that Network by a device on this local network that stores network IDs of other networks. For this the “Default Gateway” setting is done on each host of the Local Network. TCP/IP sends packets for remote networks to the default gateway, which then forwards the packets to the destination Network or to other gateways until the packet is delivered to a gateway connected to the specified destination. Domain Name System ( DNS): It is a naming system used in TCP/IP networks to translate computer names to Internet Protocol (IP) addresses. By refering to computers by names, it is easy to locate computers & resources on the Network. DNS services are available on the Server systems such as Windows Server 2003. DOMAINS: Domain is a logical grouping of Network computers sharing a central directory database. The directory database contains security information of the domain such as user accounts. Computers called Domain Controllers maintain the Domains with the help of the Directory. All the security-related aspects of user and domain interactions, centralizing security and administration are managed by the Domain Controller. Only Windows Server Operating systems of Windows 2000 or Windows 2003 Servers offer the services of the Domain Controller included in the “Active Directory”. Domains maintain a central list of users & passwords. These are authenticated by the Domain controller each time a user tries to log in. Users with different levels of powers, User and machine groups, Centralized Security policies are some of the advanced services given by the Domain controllers. WORKGROUPS: A logical grouping of computers in a Network is called a Workgroup. A workgroup is said to exist in a Peer to Peer because all computers in the workgroup can share resources as equals (peers) without a dedicated server. Each computer in the workgroup handles the local security separately with a local security database. which is a list of user accounts and resource security information for the computer on which it resides. If a user wants to access each computer in the network, he must have a User account on it. Any changes to user accounts, such as changing a user's password must be made on each computer in the workgroup for that account. Workgroup is a convenient networking environment for a limited number of computers in close proximity. ACTIVE DIRECTORY Active Directory (AD) is the directory Service which provides a place to store information about network-based entities such as users, files, printers & applications. It provides a means to locate and manage resources. Active Directory provides a centralized and consistent way to manage, locate and describe information about network resources. AD replicates directory data across a network so that data remains available if one domain controller fails. The resources stored in the directory, such as user data, printers, servers, groups, computers, and security policies, are known as objects. Active Directory presents domain information in a hierarchical, object-based format and protects network data from unauthorized access Active Directory supports clients running Windows XP Professional, Windows 2000, Windows NT, and Windows 9x. To implement Active Directory, one or more DNS servers must be available to the Windows 2003 domain, and the DNS client service must be configured at each member computer. This is because Active Directory domains are named with DNS names. Active Directory simplifies administration by providing a single point of administration for all objects on the network. Windows & Networking: Windows Browser Service : Network Neighborhood OR My Network Places : It gives Browse Services containing Browse Lists and Browse Servers OR Peer to Peer Servers. Any one or more Computers is a Browse Master. It maintains a list of the Computers called Browse List – List of PCs in the Network – Having Win 98/ ME/ Win 2000/ XP. These act as Browse Servers. Network Browse List allows to see all the Servers on the Network and from there to see all the shares on the Servers. The Browse Masters don’t distinguish between the Net Servers & Client Operating Systems. When one Computer starts, it gives a message on the Network like – “I am On & who is the browse Masters”. Then a Browse Master responds that “Pl. refer to me for Name service.” In Win98—The peer to peer service is enabled by FILE & PRINTER SHARING. In NT4, Win2000 / XP it is the SERVER Service. Browse list will become unmanageable with thousands of computers. Therefore form Work Groups. One will get to see only the Servers on his Workgroup, at a time. Each Workgroup will have its own Browse Master that is assigned automatically. PCs not acting as Browse Servers will not appear in the Browse Lists. Three basic software components are required for Windows Networking: 1. A Driver for the Network Interface Card 2. A Network Protocol 3. Network Client Network Protocol software is included with Windows. TCP/IP is mostly used. Network Client is the software component that can locate the Network resources and connects to them. This Windows component is called “Client For Microsoft Networks”. -----------------------------------------------------------------------------------------------