Unit 1 What is a Network? 1.1 What is a Network? A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. 1.2 Characteristics of a Computer Network The primary purpose of a computer network is to share resources: You can play a CD music from one computer while sitting on another computer You may have a computer that doesn’t have a DVD or BluRay (BD) player. In this case, you can place a movie disc (DVD or BD) on the computer that has the player, and then view the movie on a computer that lacks the player You may have a computer with a CD/DVD/BD writer or a backup system but the other computer(s) doesn’t (don't) have it. In this case, you can burn discs or make backups on a computer that has one of these but using data from a computer that doesn’t have a disc writer or a backup system You can connect a printer (or a scanner, or a fax machine) to one computer and let other computers of the network print (or scan, or fax) to that printer (or scanner, or fax machine) You can place a disc with pictures on one computer and let other computers access those pictures You can create files and store them in one computer, then access those files from the other computer(s) connected to it Two very common types of networks include: Local Area Network (LAN) Wide Area Network (WAN) You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or a Wireless WAN (WWAN). 1|Page 1.3 Local Area Network A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building. Computers connected to a network are broadly categorized as servers or workstations. Servers are generally not used by humans directly, but rather run continuously to provide "services" to the other computers (and their human users) on the network. Services provided can include printing and faxing, software hosting, file storage and sharing, messaging, data storage and retrieval, complete access control (security) for the network's resources, and many others. Workstations are called such because they typically do have a human user which interacts with the network through them. Workstations were traditionally considered a desktop, consisting of a computer, keyboard, display, and mouse, or a laptop, with with integrated keyboard, display, and touchpad. With the advent of the tablet computer, and the touch screen devices such as iPad and iPhone, our definition of workstation is quickly evolving to include those devices, because of their ability to interact with the network and utilize network services. Servers tend to be more powerful than workstations, although configurations are guided by needs. For example, a group of servers might be located in a secure area, away from humans, and only accessed through the network. In such cases, it would be common for the servers to operate without a dedicated display or keyboard. However, the size and speed of the server's processor(s), hard drive, and main memory might add dramatically to the cost of the system. On the other hand, a workstation might not need as much storage or working memory, but might require an expensive display to accommodate the needs of its user. Every computer on a network should be appropriately configured for its use. On a single LAN, computers and servers may be connected by cables or wirelessly. Wireless access to a wired network is made possible by wireless access points (WAPs). These WAP devices provide a bridge between computers and networks. A typical WAP might have the theoretical capacity to connect hundreds or even thousands of wireless users to a network, although practical capacity might be far less. 2|Page Nearly always servers will be connected by cables to the network, because the cable connections remain the fastest. Workstations which are stationary (desktops) are also usually connected by a cable to the network, although the cost of wireless adapters has dropped to the point that, when installing workstations in an existing facility with inadequate wiring, it can be easier and less expensive to use wireless for a desktop. See the Topology, Cabling, and Hardware sections of this tutorial for more information on the configuration of a LAN. 1.4 Wide Area Network Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network. Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two users a half-world apart with workstations equipped with microphones and a webcams might teleconference in real time. A WAN is complicated. It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like the Internet. To users, however, a WAN will not appear to be much different than a LAN. 1.5 Advantages of Installing a School Network User access control. Modern networks almost always have one or more servers which allows centralized management for users and for network resources to which they have access. User credentials on a privately-owned and operated network may be as simple as a user name and password, but with ever-increasing attention to computing security issues, these servers are critical to ensuring that sensitive information is only available to authorized users. 3|Page Information storing and sharing. Computers allow users to create and manipulate information. Information takes on a life of its own on a network. The network provides both a place to store the information and mechanisms to share that information with other network users. Connections. Administrators, instructors, and even students and guests can be connected using the campus network. Services. The school can provide services, such as registration, school directories, course schedules, access to research, and email accounts, and many others. (Remember, network services are generally provided by servers). Internet. The school can provide network users with access to the internet, via an internet gateway. Computing resources. The school can provide access to special purpose computing devices which individual users would not normally own. For example, a school network might have high-speed high quality printers strategically located around a campus for instructor or student use. Flexible Access. School networks allow students to access their information from connected devices throughout the school. Students can begin an assignment in their classroom, save part of it on a public access area of the network, then go to the media center after school to finish their work. Students can also work cooperatively through the network. Workgroup Computing. Collaborative software allows many users to work on a document or project concurrently. For example, educators located at various schools within a county could simultaneously contribute their ideas about new curriculum standards to the same document, spreadsheets, or website. 1.6 Disadvantages of Installing a School Network Expensive to Install. Large campus networks can carry hefty price tags. Cabling, network cards, routers, bridges, firewalls, wireless access points, and software can get expensive, and the installation would certainly require the services of technicians. But, with the ease of setup of home networks, a simple network with internet access can be setup for a small campus in an afternoon. Requires Administrative Time. Proper maintenance of a network requires considerable time and expertise. Many schools have installed a network, only to find that they did not budget for the necessary administrative support. Servers Fail. Although a network server is no more susceptible to failure than any other computer, when the files server "goes down" the entire network may come to a halt. Good network design practices say that critical network services (provided by servers) should be redundant on the network whenever possible. Cables May Break. 4|Page The Topology chapter presents information about the various configurations of cables. Some of the configurations are designed to minimize the inconvenience of a broken cable; with other configurations, one broken cable can stop the entire network. Security and compliance. Network security is expensive. It is also very important. A school network would possibly be subject to more stringent security requirements than a similarly-sized corporate network, because of its likelihood of storing personal and confidential information of network users, the danger of which can be compounded if any network users are minors. A great deal of attention must be paid to network services to ensure all network content is appropriate for the network community it serves. 5|Page Unit 2 Protocol 2.1 What is a Protocol? A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world. The OSI (Open Systems Interconnection) Reference Model defines seven layers of networking protocols. The complexity of these layers is beyond the scope of this tutorial; however, they can be simplified into four layers to help identify some of the protocols with which you should be familiar (see fig 1). OSI Layer Name Common Protocols HTTP | FTP | SMTP | DNS | Telnet 7 Application 6 Presentation 5 Session 4 Transport TCP | SPX 3 Network IP | IPX 2 Data Link Ethernet 1 Physical Fig 1. OSI model related to common network protocols Figure 1 illustrates how some of the major protocols would correlate to the OSI model in order to communicate via the Internet. In this model, there are four layers, including: Ethernet (Physical/Data Link Layers) IP/IPX (Network Layer) TCP/SPX (Transport Layer) HTTP, FTP, Telnet, SMTP, and DNS(combined Session/Presentation/Application Layers) Assuming you want to send an e-mail message to someone in Italy, we will examine the layers "from the bottom up" -- beginning with Ethernet (physical/data link layers). 6|Page 2.2 Ethernet (Physical/Data Link Layers) The physical layer of the network focuses on hardware elements, such as cables, repeaters, and network interface cards. By far the most common protocol used at the physical layer is Ethernet. For example, an Ethernet network (such as 10BaseT or 100BaseTX) specifies the type of cables that can be used, the optimal topology (star vs. bus, etc.), the maximum length of cables, etc. (See the Cabling section for more information on Ethernet standards related to the physical layer). The data link layer of the network addresses the way that data packets are sent from one node to another. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network. Ethernet The original Ethernet standard was developed in 1983 and had a maximum speed of 10 Mbps (phenomenal at the time) over coaxial cable. The Ethernet protocol allows for bus, star, or tree topologies, depending on the type of cables used and other factors. This heavy coaxial cabling was expensive to purchase, install, and maintain, and very difficult to retrofit into existing facilities. The current standards are now built around the use of twisted pair wire. Common twisted pair standards are 10BaseT, 100BaseT, and 1000BaseT. The number (10, 100, 1000) ands for the speed of transmission (10/100/1000 megabits per second); the "Base" stands for "baseband" meaning it has full control of the wire on a single frequency; and the "T" stands for "twisted pair" cable. Fiber cable can also be used at this level in 10BaseFL. Fast Ethernet The Fast Ethernet protocol supports transmission up to 100 Mbps. Fast Ethernet requires the use of different, more expensive network concentrators/hubs and network interface cards. In addition, category 5 twisted pair or fiber optic cable is necessary. Fast Ethernet standards include: 100BaseT - 100 Mbps over 2-pair category 5 or better UTP cable. 100BaseFX - 100 Mbps over fiber cable. 100BaseSX -100 Mbps over multimode fiber cable. 100BaseBX - 100 Mbps over single mode fiber cable. 7|Page Gigabit Ethernet Gigabit Ethernet standard is a protocol that has a transmission speed of 1 Gbps (1000 Mbps). It can be used with both fiber optic cabling and copper. (see the Cabling section for more information). 1000BaseT - 1000 Mbps over 2-pair category 5 or better UTP cable. 1000BaseTX - 1000 Mbps over 2-pair category 6 or better UTP cable. 1000BaseFX - 1000 Mbps over fiber cable. 1000BaseSX -1000 Mbps over multimode fiber cable. 1000BaseBX - 1000 Mbps over single mode fiber cable. The Ethernet standards continue to evolve. with 10 Gigabit Ethernet (10,000 Mbps) and 100 Gigabit Ethernet (100,000 Mbps), Ethernet Protocol Summary Protocol Ethernet Cable Speed Twisted Pair, Coaxial, Fiber 10 Mbps Fast Ethernet Twisted Pair, Fiber Gigabit Ethernet Twisted Pair, Fiber 100 Mbps 1000 Mbps Older Network Protocols Several very popular network protocols, commonly used in the 90's and early 21st century have now largely fallen into disuse. While you may hear terms from time to time, such as "Localtalk" (Apple) or "Token Ring" (IBM), you will rarely find these systems still in operation. Although they played an important role in the evolution of networking, their performance and capacity limitations have relegated them to the past, in the wake of the standardization of Ethernet driven by the success of the Internet. 2.3 IP and IPX (Network Layer) The network layer is in charge of routing network messages (data) from one computer to another. The common protocols at this layer are IP (which is paired with TCP at the transport layer for Internet network) and IPX (which is paired with SPX at the transport layer for some older Macintosh, Linus, UNIX, Novell and Windows networks). Because of the growth in Internet-based networks, IP/TCP are becoming the leading protocols for most networks. Every network device (such as network interface cards and printers) have a physical address called a MAC (Media Access Control) address. When you purchase a network card, the MAC address is fixed and cannot be changed. Networks using the IP and IPX protocols assign logical addresses (which are made up of the MAC address and the network address) to the devices on the network, This can all become quite complex -- 8|Page suffice it to say that the network layer takes care of assigning the correct addresses (via IP or IPX) and then uses routers to send the data packets to other networks. 2.4 TCP and SPX (Transport Layer) The transport layer is concerned with efficient and reliable transportation of the data packets from one network to another. In most cases, a document, e-mail message or other piece of information is not sent as one unit. Instead, it is broken into small data packets, each with header information that identifies its correct sequence and document. When the data packets are sent over a network, they may or may not take the same route -it doesn't matter. At the receiving end, the data packets are re-assembled into the proper order. After all packets are received, a message goes back to the originating network. If a packet does not arrive, a message to "re-send" is sent back to the originating network. TCP, paired with IP, is by far the most popular protocol at the transport level. If the IPX protocol is used at the network layer (on networks such as Novell or Microsoft), then it is paired with SPX at the transport layer. 2.5 HTTP, FTP, SMTP and DNS (Session/Presentation/Application Layers) Several protocols overlap the session, presentation, and application layers of networks. There protocols listed below are a few of the more well-known: DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain Names) and vice-versa DHCP - Dynamic Host Configuration Protocol - can automatically assign Internet addresses to computers and users FTP - File Transfer Protocol - a protocol that is used to transfer and manipulate files on the Internet HTTP - HyperText Transfer Protocol - An Internet-based protocol for sending and receiving webpages IMAP - Internet Message Access Protocol - A protocol for e-mail messages on the Internet IRC - Internet Relay Chat - a protocol used for Internet chat and other communications POP3 - Post Office protocol Version 3 - a protocol used by e-mail clients to retrieve messages from remote servers SMTP - Simple Mail Transfer Protocol - A protocol for e-mail messages on the Internet 9|Page Unit 3 Hardware 3.1 What is Networking Hardware? Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network. CLICK on the terms below to learn more about those pieces of networking hardware. Workstations Hubs Bridges Firewalls Routers FileServers Repeaters This needs to be a sprite This section provides information on the following components: Network Servers Workstations Network Interface Cards Switches Repeaters Bridges Routers Firewalls 10 | P a g e 3.2 File/Network Servers One or more network servers is a part of nearly every local area network.These are very fast computers with a large amount of RAM and storage space, along with a one or more fast network interface card(s). The network operating system provides tools to share server resources and information with network users. A sophisticated permissions-handling system is included, so that access to sensitive information can be carefully tailored to the needs of the users. For small networks, a singe network server may provide access control, file sharing, printer sharing, email, database, and other services. The network server may be responding to requests from many network users simultaneously. For example, it may be asked to load a word processor program to one workstation, receive a database file from another workstation, and store an e-mail message during the same time period. This requires a computer that can store and quickly share large amounts of information. When configuring such a server, budget is usually the controlling factor. The following guidelines should be followed: Fastest processor(s) Large amount of RAM multiple large, fast hard drives Extra expansion slots Fast network interface card(s) Optionally (if no other such devices are available on the network): A RAID (Redundant Array of Inexpensive Disks) to preserve large amounts of data(even after a disk failure) A back-up unit (i.e. DAT tape drive, removable hard drives, or CD/DVD/BluRay burner) 3.3 Workstations Computers that humans use are broadly categorized as workstations. A typical workstation is a computer that is configured with a network interface card, networking software, and the appropriate cables. Workstations do not necessarily need large storage hard drives, because files can be saved on the file server. Almost any computer can serve as a network workstation. 3.4 Laptops/Mobile Devices Laptops and other mobile devices are becoming more and more common. These devices typically have modest internal storage, but enough power to serve as a workstation for users on the go. These machines nearly always have a wireless adapter to allow quick network connections without cumbersome cabling. In a school environment with good wireless coverage, a mobile device user can move about the campus freely, and remain continuously connected to the network. 3.5 Network Interface Cards 11 | P a g e The network interface card (NIC) provides the physical connection between the network and the computer workstation. Most NICs are internal, and they are included in the purchase of most computers. Network interface cards are a major factor in determining the speed and performance of a network. It is a good idea to use the fastest network card available for the type of workstation you are using. The most common network interface connections are Ethernet cards and wireless adapters. 3.6 Ethernet Cards Ethernet cards are usually included with a computer, although additional ethernet cards can be purchased and installed on most computers,. Ethernet cards can contain connections for either coaxial or twisted pair cables (or both) (See fig. 1). If it is designed for coaxial cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection. Some Ethernet cards also contain an AUI connector. This can be used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet card. When this method is used there is always an external transceiver attached to the workstation. Only the RJ-45 connector is found on most modern ethernet cards (See the Cabling section for more information on connectors.) Fig. 1. Ethernet card. From top to bottom: RJ-45, AUI, and BNC connectors 3.7 Wireless Adapters Wireless adapters are found in most portable devices, such as laptops, smart phones, and tablet devices. External wireless adapters can be purchased and installed on most computers having an open USB (Universal Serial Bus) port, or unused expansion slot. (See the Cabling section for more information on connectors.) 12 | P a g e 3.8 Switches An ethernet switch is a device that provides a central connection point for cables from workstations, servers, and peripherals. In a star topology, twisted-pair wire is run from each workstation to a central switch/hub. Most switches are active, that is they electrically amplify the signal as it moves from one device to another. The predecessor of the switch was the hub, which broadcasted all inbound packets out all ports of the device, creating huge amounts of unnecessary network traffic. Modern switches build a port map of all IP address which respond on each port, and only broadcasts on all ports when it doesn't have a packet's target IP address already in its port map. Switches are: Usually configured with 8, 12, or 24 RJ-45 ports Often used in a star or tree topology Available as "managed" or "unmanaged", with the later less expensive, but adequate for smaller networks direct replacements for hubs, immediately reducing network traffic in most networks Usually installed in a standardized metal rack that also may store network servers, bridges, or routers 3.9 Repeaters Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a concentrator. They are used when the total length of your network cable exceeds the standards set for the type of cable being used. A good example of the use of repeaters would be in a local area network using a star topology with unshielded twisted-pair cabling. The length limit for unshielded twisted-pair cable is 100 meters. The most common configuration is for each workstation to be connected by twisted-pair cable to a multi-port active concentrator. The concentrator amplifies all the signals that pass through it allowing for the total length of cable on the network to exceed the 100 meter limit. 3.10 Bridges A bridge is a device that allows you to segment a large network into two smaller, more efficient networks. If you are adding to an older wiring scheme and want the new network to be up-to-date, a bridge can connect the two. A bridge monitors the information traffic on both sides of the network so that it can pass packets of information to the correct location. Most bridges can "listen" to the network and automatically figure out the address of each computer on both sides of the bridge. The bridge can inspect each message and, if necessary, broadcast it on the other side of the network. The bridge manages the traffic to maintain optimum performance on both sides of the network. You might say that the bridge is like a traffic cop at a busy intersection during rush hour. It keeps information flowing on both sides of the network, but it does not allow 13 | P a g e unnecessary traffic through. Bridges can be used to connect different types of cabling, or physical topologies. They must, however, be used between networks with the same protocol. 3.11 Routers Routers are the traffic directors of the global internet. All routers maintain complex routing tables which allow them to determine appropriate paths for packets destined for any address. Routers communicate with each other, and forward network packets out of or into a network. Here's an example: You want to search for something on the internet using a search engine. You open a browser on your workstation. The browser opens to a blank page (not usually the default, but appropriate for this example). You type "http://www.google.com" into the URL (Universal Resource Locator) address line of the browser. The browser software packages up the URL you typed, and sends it with a request for an IP address to the DNS (Domain Name Server) that has been set in your network adapter's configuration. The domain server returns an IP, such as 74.125.67.103 (actual address returned by DNS for google.com on June 7th, 2011). The browser ships the request for that IP address off to the network card, which bundles the request into an ethernet packet, destined for 74.125.67.103. The network card sends the packet to the gateway of your network, which opens the header of the packet, and makes a determination that the packet is traveling out of your network, in search of 74.125.67.103. Your network's router has routing tables which it has been building from communicating with other routers, and potentially augmented with "static routes", which are specific paths added by your network's administrators to make the task of accessing certain networks easier, or faster, or in some cases, not possible. In this case, I find that my router knows about another router at my ISP(Internet Service Provider), which in turn has several more routers that are all on networks of which I am just a small node, much like finding an atom of a molecule of a piece of dust on a rock on a moon of a planet of a sun of a galaxy of the universe. In any case, the packet gets passed from router to router, each time moving out of the subnets of the packet sender, towards a router that will know where the desired server is. The packet finally reaches the router of the network at 74.125.67.103, which dutifully delivers the packet to the server at that IP address. The server carefully crafts a response, and sends a reply back, which follows the same process to get the response "Yes. Go ahead" back to the requester. Whew. And that's just the initial request. While bridges know the addresses of all computers on each side of the network, routers know the addresses other routers which in turn know about their own networks. Routers can even "listen" to entire networks to determine which sections are busiest -- they can then redirect data around those sections until traffic congestion clears. So, routers are network gateways. They move network packets from one network to another, and many can convert from one network protocol to another as necessary. Routers select the best path to route a message, based on the destination address of the packet. The router can direct traffic to prevent head-on collisions, and is smart enough to know when to direct traffic along back roads and shortcuts. 14 | P a g e If you have a school LAN that you want to connect to the Internet, you will need to purchase a router. In this case, the router serves as the forwarder between the information on your LAN and the Internet. It also determines the best route to send the data over the Internet. 3.12 Firewalls A firewall is a networking device that is installed at the entrance to a LAN when connecting a networks together, particularly when connecting a private network to a public network, such as the internet. The firewall uses rules to filter traffic into and out of the private network, to protect the private network users and data from malevolent hackers. Firewalls are either hardware or software, depending on their intended use. A firewall used to protect a network is a hardware device that should be installed in the network between the router and the network. Almost all hardware firewalls will have at least two ports, labeled "Trusted" and "Untrusted". These terms imply the true nature of the firewall's responsibility to the private network. The public network is connected to the untrusted network port, and the private network is connected to the trusted port. Firewall rules are usually simple, consisting of a verb, either allow or deny, the direction of the traffic, either inbound or outbound, and an address or other network traffic identifier. Firewall rules are cumulative, so general rules may be specified, and exceptions added as necessary. Some examples are: Allow outbound all (all private network users can do anything on the public network) Deny inbound all (default setting to prevent all traffic from the public or untrusted port, to the private port) Allow inbound port 80 (allow internet web traffic to come into network to find web servers) Allow inbound port 80 destined to 170.200.201.25 (allow inbound web traffic to a specific web server on your private network) Deny inbound from 201.202.1.1/24 (deny all inbound traffic from a specific IP address or range of addresses) Software firewalls are commonly included in modern workstation and server operating systems. They operate in a similar way as hardware firewalls, except that they filter traffic in and out of the machine itself. These software firewalls are typically unnoticed by machine users, and only need attention occasionslly when an internet-connected application don't work as expected. The software firewall should always be considered a "suspect" in such cases. The problem is easily resolved, by setting an exception rule in the firewall for the software that is attempting to communicate. 15 | P a g e Unit 4 Cabling 4.1 What is Network Cabling? Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network. The following sections discuss the types of cables used in networks and other related topics. Unshielded Twisted Pair (UTP) Cable Shielded Twisted Pair (STP) Cable Coaxial Cable Fiber Optic Cable Cable Installation Guides Wireless LANs Unshielded Twisted Pair (UTP) Cable 4.2 Twisted pair Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks (See fig. 1). Fig.1. Unshielded twisted pair 16 | P a g e The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has established standards of UTP and rated six categories of wire (additional categories are emerging). Categories of Unshielded Twisted Pair Category Speed Use 1 1 Mbps Voice Only (Telephone Wire) 2 4 Mbps LocalTalk & Telephone (Rarely used) 3 16 Mbps 10BaseT Ethernet 4 20 Mbps Token Ring (Rarely used) 100 Mbps (2 pair) 100BaseT Ethernet 5 1000 Mbps (4 pair) Gigabit Ethernet 5e 1,000 Mbps Gigabit Ethernet 6 10,000 Mbps Gigabit Ethernet Unshielded Twisted Pair Connector The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector (See fig. 2). A slot allows the RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying that the connector follows a standard borrowed from the telephone industry. This standard designates which wire goes with each pin inside the connector. Fig. 2. RJ-45 connector 17 | P a g e Shielded Twisted Pair (STP) Cable Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical frequency interference (it should not be too close to electric motors, fluorescent lights, etc.). If you must place cable in environments with lots of potential interference, or if you must place cable in extremely sensitive environments that may be susceptible to the electrical current in the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the maximum distance of the cables. Shielded twisted pair cable is available in three different configurations: 1. Each pair of wires is individually shielded with foil. 2. There is a foil or braid shield inside the jacket covering all wires (as a group). 3. There is a shield around each individual pair, as well as around the entire group of wires (referred to as double shield twisted pair). 4.3 Coaxial Cable Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield (See fig. 3). The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers. Fig. 3. Coaxial cable Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin coaxial. Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable has been popular in school networks, especially linear bus networks. Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial a great choice when running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is difficult to install. 18 | P a g e Coaxial Cable Connectors The most common type of connector used with coaxial cables is the Bayone-NeillConcelman (BNC) connector (See fig. 4). Different types of adapters are available for BNC connectors, including a T-connector, barrel connector, and terminator. Connectors on the cable are the weakest points in any network. To help avoid problems with your network, always use the BNC connectors that crimp, rather screw, onto the cable. Fig. 4. BNC connector 4.4 Fiber Optic Cable Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials (See fig. 5). It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting. Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals. The center core of fiber cables is made from glass or plastic fibers (see fig 5). A plastic coating then cushions the fiber center, and kevlar fibers help to strengthen the cables and prevent breakage. The outer insulating jacket made of teflon or PVC. Fig. 5. Fiber optic cable There are two common types of fiber cables -- single mode and multimode. Multimode cable has a larger diameter; however, both cables provide high bandwidth at high speeds. Single mode can provide more distance, but it is more expensive. 19 | P a g e Specification Cable Type 10BaseT Unshielded Twisted Pair 10Base2 Thin Coaxial 10Base5 Thick Coaxial 100BaseT Unshielded Twisted Pair 100BaseFX Fiber Optic 100BaseBX Single mode Fiber 100BaseSX Multimode Fiber 1000BaseT Unshielded Twisted Pair 1000BaseFX Fiber Optic 1000BaseBX Single mode Fiber 1000BaseSX Multimode Fiber 4.5 Installing Cable - Some Guidelines When running cable, it is best to follow a few simple rules: Always use more cable than you need. Leave plenty of slack. Test every part of a network as you install it. Even if it is brand new, it may have problems that will be difficult to isolate later. Stay at least 3 feet away from fluorescent light boxes and other sources of electrical interference. If it is necessary to run cable across the floor, cover the cable with cable protectors. Label both ends of each cable. Use cable ties (not tape) to keep cables in the same location together. 4.6 Wireless LANs More and more networks are operating without cables, in the wireless mode. Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate 20 | P a g e between the workstations, servers, or hubs. Each workstation and file server on a wireless network has some sort of transceiver/antenna to send and receive the data. Information is relayed between transceivers as if they were physically connected. For longer distance, wireless communications can also take place through cellular telephone technology, microwave transmission, or by satellite. Wireless networks are great for allowing laptop computers, portable devices, or remote computers to connect to the LAN. Wireless networks are also beneficial in older buildings where it may be difficult or impossible to install cables. The two most common types of infrared communications used in schools are line-of-sight and scattered broadcast. Line-of-sight communication means that there must be an unblocked direct line between the workstation and the transceiver. If a person walks within the line-of-sight while there is a transmission, the information would need to be sent again. This kind of obstruction can slow down the wireless network. Scattered infrared communication is a broadcast of infrared transmissions sent out in multiple directions that bounces off walls and ceilings until it eventually hits the receiver. Networking communications with laser are virtually the same as line-of-sight infrared networks. 4.6.1 Wireless standards and speeds The Wi-Fi Alliance is a global, non-profit organization that helps to ensure standards and interoperability for wireless networks, and wireless networks are often referred to as WiFi (Wireless Fidelity). The original Wi-Fi standard (IEEE 802.11) was adopted in 1997. Since then many variations have emerged (and will continue to emerge). Wi-Fi networks use the Ethernet protocol. Standard Max Speed Typical Range 802.11a 54 Mbps 150 feet 802.11b 11 Mbps 300 feet 802.11g 54 Mbps 300 feet 802.11n 100 Mbps 300+ feet 4.6.2 Wireless Security Wireless networks are much more susceptible to unauthorized use than cabled networks. Wireless network devices use radio waves to communicate with each other. The greatest vulnerability to the network is that rogue machines can "eves-drop" on the radio wave communications. Unencrypted information transmitted can be monitored by a third-party, which, with the right tools (free to download), could quickly gain access to your entire network, steal valuable passwords to local servers and online services, alter or destroy data, and/or access personal and confidential information stored in your network servers. To minimize the possibility of this, all modern access points and devices have configuration options to encrypt transmissions. These encryption methodologies are still 21 | P a g e evolving, as are the tools used by malicious hackers, so always use the strongest encryption available in your access point and connecting devices. A NOTE ON ENCRYPTION: As of this writing WEP (Wired Equivalent Privacy) encryption can be easily hacked with readily-available free tools which circulate the internet. WPA and WPA2 (WiFi Protected Access versions 1 and 2) are much better at protecting information, but using weak passwords or passphrases when enabling these encryptions may allow them to be easily hacked. If your network is running WEP, you must be very careful about your use of sensitive passwords or other data. Three basic techniques are used to protect networks from unauthorized wireless use. Use any and all of these techniques when setting up your wireless access points: Encryption. Enable the strongest encryption supported by the devices you will be connecting to the network. Use strong passwords (strong passwords are generally defined as passwords containing symbols, numbers, and mixed case letters, at least 14 characters long). Isolation. Use a wireless router that places all wireless connections on a subnet independent of the primary private network. This protects your private network data from pass-through internet traffic. Hidden SSID. Every access point has a Service Set IDentifier (SSID) that by default is broadcast to client devices so that the access point can be found. By disabling this feature, standard client connection software won't be able to "see" the access point. However, the eves-dropping programs discussed previously can easily find these access points, so this alone does little more than keep the access point name out of sight for casual wireless users. 4.6.3 Advantages of wireless networks: Mobility - With a laptop computer or mobile device, access can be available throughout a school, at the mall, on an airplane, etc. More and more businesses are also offering free WiFi access ("Hot spots"). Fast setup - If your computer has a wireless adapter, locating a wireless network can be as simple as clicking "Connect to a Network" -- in some cases, you will connect automatically to networks within range. Cost - Setting up a wireless network can be much more cost effective than buying and installing cables. Expandability - Adding new computers to a wireless network is as easy as turning the computer on (as long as you do not exceed the maximum number of devices). 22 | P a g e 4.6.4 Disadvantages of wireless networks: Security - Be careful. Be vigilant. Protect your sensitive data with backups, isolated private networks, strong encryption and passwords, and monitor network access traffic to and from your wireless network. Interference - Because wireless networks use radio signals and similar techniques for transmission, they are susceptible to interference from lights and electronic devices. Inconsistent connections - How many times have you hears "Wait a minute, I just lost my connection?" Because of the interference caused by electrical devices and/or items blocking the path of transmission, wireless connections are not nearly as stable as those through a dedicated cable. Speed - The transmission speed of wireless networks is improving; however, faster options (such as gigabit Ethernet) are available via cables. If you are only using wireless for internet access, the actual internet connection for your home or school is generally slower than the wireless network devices, so that connection is the bottleneck. If you are also moving large amounts of data around a private network, a cabled connection will enable that work to proceed much faster. 23 | P a g e Unit 5 Network Topology 5.1 What is a Topology? The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter. 5.2 Main Types of Physical Topologies The following sections discuss the physical topologies used in networks and other related topics. Linear Bus Star Tree (Expanded Star) Ring Mesh Considerations When Choosing a Topology Summary Chart 5.2.1 Linear Bus A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1). All nodes (file server, workstations, and peripherals) are connected to the linear cable. Fig. 1. Linear Bus topology 24 | P a g e Advantages of a Linear Bus Topology Easy to connect a computer or peripheral to a linear bus. Requires less cable length than a star topology. Disadvantages of a Linear Bus Topology Entire network shuts down if there is a break in the main cable. Terminators are required at both ends of the backbone cable. Difficult to identify the problem if the entire network shuts down. Not meant to be used as a stand-alone solution in a large building. 5.2.2 Star Topology A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator (See fig. 2). Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable. Fig. 2. Star topology Advantages of a Star Topology Easy to install and wire. No disruptions to the network when connecting or removing devices. Easy to detect faults and to remove parts. Disadvantages of a Star Topology Requires more cable length than a linear topology. 25 | P a g e If the hub, switch, or concentrator fails, nodes attached are disabled. More expensive than linear bus topologies because of the cost of the hubs, etc. 5.2.3 Tree or Expanded Star A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable (See fig. 3). Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs. Fig. 3. Tree topology Advantages of a Tree Topology Point-to-point wiring for individual segments. Supported by several hardware and software venders. Disadvantages of a Tree Topology Overall length of each segment is limited by the type of cabling used. If the backbone line breaks, the entire segment goes down. More difficult to configure and wire than other topologies. 26 | P a g e 5.2.4 Ring Topology The ring topology connects computers on a single circle of cable. Unlike the bus topology, there are no terminated ends. The signals travel around the loop in one direction and pass through each computer, which can act as a repeater to boost the signal and send it on to the next computer. Figure 1.22 shows a typical ring topology with one server and four workstations. The failure of one computer can have an impact on the entire network 5.2.5 Mesh Topology A mesh topology network offers superior redundancy and reliability. In a mesh topology, each computer is connected to every other computer by separate cabling. This configuration provides redundant paths throughout the network so that if one cable fails, another will take over the traffic. While ease of troubleshooting and increased reliability are definite pluses, these networks are expensive to install because they use a lot of cabling. Often, a mesh topology will be used in conjunction with other topologies to form a hybrid topology. 27 | P a g e 5.3 Rule A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3 rule. One aspect of the Ethernet protocol requires that a signal sent out on the network cable reach every part of the network within a specified length of time. Each concentrator or repeater that a signal goes through adds a small amount of time. This leads to the rule that between any two nodes on the network there can only be a maximum of 5 segments, connected through 4 repeaters/concentrators. In addition, only 3 of the segments may be populated (trunk) segments if they are made of coaxial cable. A populated segment is one that has one or more nodes attached to it . In Figure 4, the 5-4-3 rule is adhered to. The furthest two nodes on the network have 4 segments and 3 repeaters/concentrators between them. NOTE: This rule does not apply to other network protocols or Ethernet networks where all fiber optic cabling or a combination of a fiber backbone with UTP cabling is used. If there is a combination of fiber optic backbone and UTP cabling, the rule would translate to a 76-5 rule.The speed of networking switches is vastly improved over older technologies, and while every effort should be made to limit network segment traversal, efficient switching can allow much larger numbers of segments to be traversed with little or no impact to the network. 5.4 Considerations When Choosing a Topology Money. A linear bus network may be the least expensive way to install a network; you do not have to purchase concentrators. Length of cable needed. The linear bus network uses shorter lengths of cable. Future growth. With a star topology, expanding a network is easily done by adding another concentrator. Cable type. The most common cable in schools is unshielded twisted pair, which is most often used with star topologies. 5.5 Summary Chart Physical Topology Common Cable Common Protocol Linear Bus Twisted Pair Coaxial Fiber Ethernet Star Twisted Pair Fiber Ethernet Tree Twisted Pair Coaxial Fiber Ethernet 28 | P a g e Unit 6 Open Systems Interconnection (OSI) Reference Model This lesson describes the Open Systems Interconnection (OSI) reference model. The OSI reference model represents the seven layers of the process by which data is packaged and transmitted from a sending application through the physical wires to the receiving application. After this lesson, you will be able to: Describe the primary function of each layer of the OSI reference model. Identify the OSI layer at which a particular network activity takes place. Identify the OSI layer at which a particular network component functions. 6.1 Network Communications Network activity involves sending data from one computer to another. This complex process can be broken into discrete, sequential tasks. The sending computer must: 1. Recognize the data. 2. Divide the data into manageable chunks. 3. Add information to each chunk of data to determine the location of the data and to identify the receiver. 4. Add timing and error-checking information. 5. Put the data on the network and send it on its way. Network client software operates at many different levels within the sending and receiving computers. Each of these levels, or tasks, is governed by one or more protocols. These protocols, or rules of behavior, are standard specifications for formatting and moving the data. When the sending and receiving computers follow the same protocols, communication is assured. Because of this layered structure, this is often referred to as the protocol stack. With the rapid growth of networking hardware and software, a need arose for standard protocols that could allow hardware and software from different vendors to communicate. In response, two primary sets of standards were developed: the OSI reference model and a modification of that standard called Project 802 (covered in the next lesson). Acquiring a clear understanding of these models is an important first step in understanding the technical aspects of how a network functions. Throughout this lesson we refer to various protocols. The protocols and how they apply to these models are covered in detail in Chapter 6, "Defining Network Protocols." 29 | P a g e 6.2 The OSI Reference Model In 1978, the International Organization for Standardization (ISO) released a set of specifications that described network architecture for connecting dissimilar devices. The original document applied to systems that were open to each other because they could all use the same protocols and standards to exchange information. NOTE To set up a network competently, you need to be aware of the major standards organizations and how their work affects network communications. An overview of the most important standards bodies is presented in Appendix B, "Common Network Standards and Specifications." In 1984, the ISO released a revision of this model and called it the Open Systems Interconnection (OSI) reference model. The 1984 revision has become an international standard and serves as a guide for networking. The OSI reference model is the best-known and most widely used guide for visualizing networking environments. Manufacturers adhere to the OSI reference model when they design network products. It provides a description of how network hardware and software work together in a layered fashion to make communications possible. The model also helps to troubleshoot problems by providing a frame of reference that describes how components are supposed to function. Run the c05dem02 video located in the Demos folder on the CD accompanying this book to see an overview presentation of the OSI reference model. A Layered Architecture The OSI reference model architecture divides network communication into seven layers. Each layer covers different network activities, equipment, or protocols. Figure 5.1 represents the layered architecture of the OSI reference model. (Layering specifies different functions and services as data moves from one computer through the network cabling to another computer.) The OSI reference model defines how each layer communicates and works with the layers immediately above and below it. For example, the session layer communicates and works with the presentation and transport layers. 30 | P a g e Figure 5.1 The seven-layer OSI reference model Each layer provides some service or action that prepares the data for delivery over the network to another computer. The lowest layers—1 and 2—define the network's physical media and related tasks, such as putting data bits onto the network interface cards (NICs) and cable. The highest layers define how applications access communication services. The higher the layer, the more complex its task. The layers are separated from each other by boundaries called interfaces. All requests are passed from one layer, through the interface, to the next layer. Each layer builds upon the standards and activities of the layer below it. Relationships Among OSI Reference Model Layers Each layer provides services to the next-higher layer and shields the upper layer from the details of how the services below it are actually implemented. At the same time, each layer appears to be in direct communication with its associated layer on the other computer. This provides a logical, or virtual, communication between peer layers, as shown in Figure 5.2. In reality, actual communication between adjacent layers takes place on one computer only. At each layer, software implements network functions according to a set of protocols. Figure 5.2 Relationships among OSI layers Run the c05dem03 video located in the Demos folder on the CD accompanying this book to view a presentation of layer transmission on the OSI reference model. 31 | P a g e Before data is passed from one layer to another, it is broken down into packets, or units of information, which are transmitted as a whole from one device to another on a network. (Packets were introduced in Chapter 3, Lesson 2: How Networks Send Data.) The network passes a packet from one software layer to another in the same order as that of the layers. At each layer, the software adds additional formatting or addressing to the packet, which is needed for the packet to be successfully transmitted across the network. At the receiving end, the packet passes through the layers in reverse order. A software utility at each layer reads the information on the packet, strips it away, and passes the packet up to the next layer. When the packet is finally passed up to the application layer, the addressing information has been stripped away and the packet is in its original form, which is readable by the receiver. Run the c05dem04 and c05dem05 videos located in the Demos folder on the CD accompanying this book to view a presentation of layer transmission between computers using the OSI reference model. With the exception of the lowest layer in the OSI networking model, no layer can pass information directly to its counterpart on another computer. Instead, information on the sending computer must be passed down through each successive layer until it reaches the physical layer. The information then moves across the networking cable to the receiving computer and up that computer's networking layers until it arrives at the corresponding layer. For example, when the network layer sends information from computer A, the information moves down through the data-link and physical layers on the sending side, over the cable, and up the physical and data-link layers on the receiving side to its final destination at the network layer on computer B. In a client/server environment, an example of the kind of information sent from the network layer on computer A to the network layer on computer B would be a network address, with perhaps some error-checking information added to the packet. Interaction between adjacent layers occurs through an interface. The interface defines the services offered by the lower networking layer to the upper one and further defines how those services will be accessed. In addition, each layer on one computer appears to be communicating directly with the same layer on another computer. The following sections describe the purpose of each of the seven layers of the OSI reference model, and identify the services that each provides to adjacent layers. Beginning at the top of the stack (layer 7, the application layer), we work down to the bottom (layer 1, the physical layer). 6.2.1 Application Layer Layer 7, the topmost layer of the OSI reference model, is the application layer. This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail. In other words, it serves as a window through which 32 | P a g e application processes can access network services. A message to be sent across the network enters the OSI reference model at this point and exits the OSI reference model's application layer on the receiving computer. Application-layer protocols can be programs in themselves, such as File Transfer Protocol (FTP), or they can be used by other programs, such as Simple Mail Transfer Protocol (SMTP), used by most e-mail programs, to redirect data to the network. The lower layers support the tasks that are performed at the application layer. These tasks include general network access, flow control, and error recovery. 6.2.2 Presentation Layer Layer 6, the presentation layer, defines the format used to exchange data among networked computers. Think of it as the network's translator. When computers from dissimilar systems—such as IBM, Apple, and Sun—need to communicate, a certain amount of translation and byte reordering must be done. Within the sending computer, the presentation layer translates data from the format sent down from the application layer into a commonly recognized, intermediary format. At the receiving computer, this layer translates the intermediary format into a format that can be useful to that computer's application layer. The presentation layer is responsible for converting protocols, translating the data, encrypting the data, changing or converting the character set, and expanding graphics commands. The presentation layer also manages data compression to reduce the number of bits that need to be transmitted. The redirector, which redirects input/output (I/O) operations to resources on a server, operates at this layer. Redirectors are discussed in Chapter 8, "Designing and Installing a Network." 6.2.3 Session Layer Layer 5, the session layer, allows two applications on different computers to open, use, and close a connection called a session. (A session is a highly structured dialog between two workstations.) The session layer is responsible for managing this dialog. It performs name-recognition and other functions, such as security, that are needed to allow two applications to communicate over the network. The session layer synchronizes user tasks by placing checkpoints in the data stream. The checkpoints break the data into smaller groups for error detection. This way, if the network fails, only the data after the last checkpoint has to be retransmitted. This layer also implements dialog control between communicating processes, such as regulating which side transmits, when, and for how long. 6.2.4 Transport Layer Layer 4, the transport layer, provides an additional connection level beneath the session layer. The transport layer ensures that packets are delivered error free, in sequence, and without losses or duplications. At the sending computer, this layer repackages messages, dividing long messages into several packets and collecting small packets together in one package. This process ensures that packets are transmitted efficiently over the network. At the receiving computer, the transport layer opens the packets, reassembles the original 33 | P a g e messages, and, typically, sends an acknowledgment that the message was received. If a duplicate packet arrives, this layer will recognize the duplicate and discard it. The transport layer provides flow control and error handling, and participates in solving problems concerned with the transmission and reception of packets. Transmission Control Protocol (TCP) and Sequenced Packet Exchange (SPX) are examples of transport-layer protocols. 6.2.5 Network Layer Layer 3, the network layer, is responsible for addressing messages and translating logical addresses and names into physical addresses. This layer also determines the route from the source to the destination computer. It determines which path the data should take based on network conditions, priority of service, and other factors. It also manages traffic problems on the network, such as switching and routing of packets and controlling the congestion of data. If the network adapter on the router cannot transmit a data chunk as large as the source computer sends, the network layer on the router compensates by breaking the data into smaller units. At the destination end, the network layer reassembles the data. Internet Protocol (IP) and Internetwork Packet Exchange (IPX) are examples of network-layer protocols. 6.2.6 Data-Link Layer Layer 2, the data-link layer, sends data frames from the network layer to the physical layer. It controls the electrical impulses that enter and leave the network cable. On the receiving end, the data-link layer packages raw bits from the physical layer into data frames. (A data frame is an organized, logical structure in which data can be placed. Data frames are discussed in more detail in Chapter 3, Lesson 4: Token Ring.) The electrical representation of the data (bit patterns, encoding methods, and tokens) is known to this layer only. Figure 5.3 shows a simple data frame. In this example, the sender ID represents the address of the computer that is sending the information; the destination ID represents the address of the computer to which the information is being sent. The control information is used for frame type, routing, and segmentation information. The data is the information itself. The cyclical redundancy check (CRC) provides error correction and verification information to ensure that the data frame is received correctly. 34 | P a g e Figure 5.3 A simple data frame The data-link layer is responsible for providing error-free transfer of these frames from one computer to another through the physical layer. This allows the network layer to anticipate virtually error-free transmission over the network connection. Usually, when the data-link layer sends a frame, it waits for an acknowledgment from the recipient. The recipient data-link layer detects any problems with the frame that might have occurred during transmission. Frames that were damaged during transmission or were not acknowledged are then re-sent. 6.2.7 Physical Layer Layer 1, the bottom layer of the OSI reference model, is the physical layer. This layer transmits the unstructured, raw bit stream over a physical medium (such as the network cable). The physical layer is totally hardware-oriented and deals with all aspects of establishing and maintaining a physical link between communicating computers. The physical layer also carries the signals that transmit data generated by each of the higher layers. This layer defines how the cable is attached to the NIC. For example, it defines how many pins the connector has and the function of each. It also defines which transmission technique will be used to send data over the network cable. This layer provides data encoding and bit synchronization. The physical layer is responsible for transmitting bits (zeros and ones) from one computer to another, ensuring that when a transmitting host sends a 1 bit, it is received as a 1 bit, not a 0 bit. Because different types of media physically transmit bits (light or electrical signals) differently, the physical layer also defines the duration of each impulse and how each bit is translated into the appropriate electrical or optical impulse for the network cable. This layer is often referred to as the "hardware layer." Although the rest of the layers can be implemented as firmware (chip-level functions on the NIC), rather than actual software, the other layers are software in relation to this first layer. 35 | P a g e 6.3 Memorizing the OSI Reference Model Memorizing the layers of the OSI reference model and their order is very important, especially when preparing to take a computer networking exam. Table 5.1 provides two ways to help you recall the seven layers of the OSI reference model. Table 5.1 OSI Reference Model Layers OSI Layer Up the Stack Down the Stack Application All Away Presentation People Pizza Session Seem Sausage Transport To Throw Network Need Not Data Link Data Do Physical Processing Please 6.4 Data Packets and the OSI Reference Model In Chapter 3, Lesson 2: How Networks Send Data, we discussed the data packet in general terms. These data packets are assembled and disassembled according to the OSI reference model. The packet-creation process begins at the application layer of the OSI reference model, where the data is generated. Information to be sent across the network starts at the application layer and descends through all seven layers. At each layer, information relevant to that layer is added to the data. This information is for the use of the corresponding layer in the receiving computer. The data-link layer in the receiving computer, for instance, will read information added at the data-link layer in the sending computer. Figure 5.4 shows the assembly of a packet in the sending workstation and the disassembly of the packet in the receiving workstation. 36 | P a g e Figure 5.4 Packet assembly and disassembly process At the transport layer, the original block of data is broken into the actual packets. The protocol defines the structure of the packets used by the two computers. When the packet reaches the transport layer, sequence information is added that guides the receiving computer in reassembling the data from packets. When the packets finally pass through the physical layer on their way to the cable, they contain information from each of the other six layers. 6.5 Addressing Packets Most packets on the network are addressed to a specific computer and, as a result, get the attention of only one computer. Each NIC sees all packets sent on its cable segment, but it interrupts the computer only if the packet's address matches the card's individual address. Alternatively, a broadcast-type address can also be used. Packets sent with a broadcasttype address can receive the simultaneous attention of many computers on the network. In situations involving large networks that cover large regions (or even countries) and offer several possible communication routes, the network's connectivity and switching components use the packet's addressing information to determine the best route for addressing packets. 37 | P a g e 6.6 Directing Packets Network components use the addressing information in packets to direct the packets to their destinations or to keep them away from network locations where they do not belong. The following two functions play a key role in properly directing packets: Packet forwarding Computers send a packet on to the next appropriate network component based on the address in the packet's header. Packet filtering Computers use criteria, such as an address, to select specific packets. 6.7 Windows NT and the OSI Reference Model Network manufacturers use the OSI reference model when designing their products. When each follows the model, there is a greater likelihood that different systems can communicate. One shortcoming of the model stems from the fact that many manufacturers created their products before the model was accepted; these early products might not follow the model exactly. To demonstrate how the OSI reference model is adapted to a specific network operating system, we next examine Windows NT and how it fits the model. 6.7.1 OSI Layers and Windows NT To simplify the model, Windows NT compresses the seven layers into only three layers: file system drivers, transport protocols, and NIC drivers. Figure 5.5 shows how the groups relate to OSI. Figure 5.5 Windows NT and OSI Windows NT uses drivers to provide for communication between the operating system and the network. A driver is a device-specific control program that enables a computer to work with a particular device, such as a printer or a disk drive. Every time you install a new piece of hardware, such as a printer, sound card, or network card, you need to install the software drivers that operate the card. 38 | P a g e 6.7.2 File System Drivers File system drivers work in the application, presentation, and session layers of the OSI reference model. When these drivers detect that an application is requesting resources on a remote system, they redirect the request to the appropriate system. Examples of these drivers include the Windows NT file system (NTFS) and file allocation table (FAT) drivers, and the services applications installed on Windows NT Server and Windows NT Workstation. 6.7.3 Transport Protocols Transport protocols operate in the transport and network layers of the OSI model. They are responsible for adding software address information to the data and for ensuring the reliability of the transmission. The transport protocols are bound to or combined with the NIC to provide communication. During installation and configuration of Windows NT, you must always bind these protocols to a specific network card. 6.7.4 Network Interface Card (NIC) Drivers NIC drivers operate in the data-link and physical layers of the OSI reference model. They are responsible for adding the hardware address information to the data packet and for formatting the data for transmission through the NIC and cable. NIC drivers are protocolindependent, allowing systems based on Windows NT to transport data to a variety of network systems. Figure 5.6 shows how software and protocols relate to the OSI reference model and the Windows NT model. Figure 5.6 Software and protocols 6.7.5 Windows NT Interfaces Windows NT supports many different network redirectors, transport protocols, and NICs. With so many possible combinations, it was necessary to develop a method of handling the interactions between them. To resolve this problem, Microsoft developed common interfaces—boundary 39 | P a g e layers—to act as translators between each layer. Thus, as long as any network component was written to communicate with the boundary interfaces, it could be used with the model. Figure 5.7 shows the three boundary interfaces. Figure 5.7 Windows NT architecture with boundary interfaces 6.7.6 Application Programming Interfaces (APIs) The application programming interfaces (APIs) are system routines that give programmers access to the services provided by the operating system. Windows NT networking APIs lie between user applications and the file system drivers and redirectors. These APIs allow an application to control or be controlled by other applications. They are responsible for setting up a session between the sender and the receiver on the network. Windows NT supports a variety of APIs for networking. 6.7.7 Transport Driver Interfaces (TDIs) The transport driver interfaces (TDIs) work between the file system drives and the transport protocols. These will allow any protocol written to TDI to communicate with the file system drivers. 6.7.8 Network Driver Interface Specifications (NDISs) The Network Driver Interface Specifications (NDISs) work between the transport protocols and the NIC drivers. As long as a NIC driver is written to NDIS standards, it will communicate with the transport protocols. 40 | P a g e Exercise : Reviewing the OSI Reference Model Layers This two-part exercise will give you the opportunity to memorize and review the layers of the OSI reference model. The left column is a listing of a memorization tool: "All People Seem To Need Data Processing." Next to each word in that column, enter the appropriate name of the applicable OSI layer in the center column and a brief description of that layer's function in the right column. Memorization Tool OSI Layer Function All People Seem To Need Data Processing In the second part of Exercise 1 that follows, a device or standard is listed in the left column. In the space provided in the right column, write in the applicable OSI layer(s) for each device or standard. Device OSI layer Gateway NIC Hub Router 41 | P a g e IEEE 802.x Answers Lesson Summary The following points summarize the main elements of this lesson: The OSI reference model architecture divides network protocols into seven layers: the application, presentation, session, transport, network, data-link, and physical layers. Windows NT groups the OSI reference model into three layers: file system drivers, transport protocols, and NIC drivers. The Windows NT network model requires three interfaces to provide communication between groups: APIs, TDIs, and NDISs. 42 | P a g e Unit 7 Software 7.1 What is a Network Operating System? Unlike operating systems, such as Windows, that are designed for single users to control one computer, network operating systems (NOS) coordinate the activities of multiple computers across a network. The network operating system acts as a director to keep the network running smoothly. The two major types of network operating systems are: Peer-to-Peer Client/Server Nearly all modern networks are a combination of both. The networking design can be considered independent of the servers and workstations that will share it. 7.2 Peer-to-Peer Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers. However, they do not have a file server or a centralized management source (See fig. 1). In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources available on the network. Peer-to-peer networks are designed primarily for small to medium local area networks. Nearly all modern desktop operating systems, such as Macintosh OSX, Linux, and Windows, can function as peer-to-peer network operating systems. Fig. 1. Peer-to-peer network 43 | P a g e Advantages of a peer-to-peer network: Less initial expense - No need for a dedicated server. Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for peer-to-peer operations. Disadvantages of a peer-to-peer network: Decentralized - No central repository for files and applications. Security - Does not provide the security available on a client/server network. 7.3 Client/Server Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers (See fig. 2). The file servers become the heart of the system, providing access to resources and providing security. Individual workstations (clients) have access to the resources available on the file servers. The network operating system provides the mechanism to integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location. UNIX/Linux and the Microsoft family of Windows Servers are examples of client/server network operating systems. Fig. 2. Client/server network Advantages of a client/server network: Centralized - Resources and data security are controlled through the server. Scalability - Any or all elements can be replaced individually as needs increase. Flexibility - New technology can be easily integrated into system. Interoperability - All components (client/network/server) work together. Accessibility - Server can be accessed remotely and across multiple platforms. 44 | P a g e Disadvantages of a client/server network: Expense - Requires initial investment in dedicated server. Maintenance - Large networks will require a staff to ensure efficient operation. Dependence - When server goes down, operations will cease across the network. 7.4 Network Operating System Software The following links include some of the more popular peer-to-peer and client/server network operating systems. Macintosh OS X Microsoft Windows Server UNIX/Linux 45 | P a g e Unit 8 Network Addressing 8.2 IPV4 IP addresses are broken into 4 octets (IPv4) separated by dots called dotted decimal notation. An octet is a byte consisting of 8 bits. The IPv4 addresses are in the following form: 192.168.10.1 There are two parts of an IP address: l Network ID l Host ID The various classes of networks specify additional or fewer octets to designate the network ID versus the host ID. When a network is set up, a netmask is also specified. The netmask determines the class of the network as shown below, except for CIDR. When the netmask is setup, it specifies some number of most significant bits with a 1's value and the rest have values of 0. The most significant part of the netmask with bits set to 1's specifies the network address, and the lower part of the address will specify the host address. When setting addresses on a network, remember there can be no host address of 0 (no host address bits set), and there can be no host address with all bits set. 8.1.1 Class A-E networks The addressing scheme for class A through E networks is shown below. Note: We use the 'x' character here to denote don't care situations which includes all possible numbers at the location. It is many times used to denote networks. 46 | P a g e Network Type Address Range Normal Netmask CommentsNetwork Addressing RFCs 1518 and 1519 define a system called Classless Inter-Domain Routing (CIDR) which is used to allocate IP addresses more efficiently. This may be used with subnet masks to establish networks rather than the class system shown above. A class C subnet may be 8 bits but using CIDR, it may be 12 bits. There are some network addresses reserved for private use by the Internet Assigned Numbers Authority (IANA) which can be hidden behind a computer which uses IP masquerading to connect the private network to the internet. There are three sets of addresses reserved. These address are shown below: 10.x.x.x 172.16.x.x - 172.31.x.x 192.168.x.x Other reserved or commonly used addresses: 127.0.0.1 - The loopback interface address. All 127.x.x.x addresses are used by the loopback interface which copies data from the transmit buffer to the receive buffer of the NIC when used. 0.0.0.0- This is reserved for hosts that don't know their address and use BOOTP or DHCP protocols to determine their addresses. 255 - The value of 255 is never used as an address for any part of the IP address. It is reserved for broadcast addressing. Please remember, this is exclusive of CIDR. When using CIDR, all bits of the address can never be all ones. To further illustrate, a few examples of valid and invalid addresses are listed below: 1. Valid addresses: 10.1.0.1 through 10.1.0.254 10.0.0.1 through 10.0.0.254 10.0.1.1 through 10.0.1.254 2. Invalid addresses: m m 10.1.0.0 - Host IP can't be 0. 10.1.0.255 - Host IP can't be 255. 47 | P a g e 10.123.255.4 - No network or subnet can have a value of 255. 0.12.16.89 - No Class A network can have an address of 0. 255.9.56.45 - No network address can be 255. 10.34.255.1 - No network address can be 255. Network Addressing 8.1.2 Network/Netmask specification Sometimes you may see a network interface card (NIC) IP address specified in the following manner: 192.168.1.1/24 The first part indicates the IP address of the NIC which is "192.168.1.1" in this case. The second part "/24" indicates the netmask value meaning in this case that the first 24 bits of the netmask are set. This makes the netmask value 255.255.255.0. If the last part of the line above were "/16", the netmask would be 255.255.0.0. 8.1.3 Subnet masks Subnetting is the process of breaking down a main class A, B, or C network into subnets for routing purposes. A subnet mask is the same basic thing as a netmask with the only real difference being that you are breaking a larger organizational network into smaller parts, and each smaller section will use a different set of address numbers. This will allow network packets to be routed between subnetworks. When doing subnetting, the number of bits in the subnet mask determine the number of available subnets. Two to the power of the number of bits minus two is the number of available subnets. When setting up subnets the following must be determined: Number of segments Hosts per segment 8.1.4 Subnetting provides the following advantages: Network traffic isolation - There is less network traffic on each subnet. Simplified Administration - Networks may be managed independently. Improved security - Subnets can isolate internal networks so they are not visible from external networks. A 14 bit subnet mask on a class B network only allows 2 node addresses for WAN links. A routing algorithm like OSPF or EIGRP must be used for this approach. These protocols allow the variable length subnet masks (VLSM). RIP and IGRP don't support this. Subnet mask information must be transmitted on the update packets for dynamic routing protocols for this to work. The router subnet mask is different than the WAN interface subnet mask. One network ID is required by each of: Subnet Network Addressing WAN connection 48 | P a g e One host ID is required by each of: Each NIC on each host. Each router interface. Types of subnet masks: Default - Fits into a Class A, B, or C network category Custom - Used to break a default network such as a Class A, B, or C network into subnets. 8.2 IPv6 IPv6 is 128 bits. It has eight octet pairs, each with 16 bits and written in hexadecimal as follows: 2b63:1478:1ac5:37ef:4e8c:75df:14cd:93f2 Extension headers can be added to IPv6 for new features. 8.2.1 Supernetting Supernetting is used to help make up for some of the shortage if IP addresses for the internet. It uses Classless Inter-Domain Routing (CIDR). If a business needs a specific number of IP addresses such as 1500, rather than allocating a class B set of addresses with the subnet mask of 255.255.0.0, a subnet mask of 255.255.248.0 may be allocated. Therefore the equivalent of eight class C addresses have been allocated. With supernetting, the value of 2 is not subtracted from the possible number of subnets since the router knows that these are contiguous networks. 8 times 254 = 2032. 8.2.2 What section of this document to read next At this point the reader should have enough fundamental knowledge to grasp routing, so the reader may continue on or skip to the section entitled, "simple routing". The reader may at this time read all the sections in the "Functions" group of sections, then continue back at the section after this one where you left off. 49 | P a g e Unit 9 Setting Up A Local Area Network Linux is increasingly popular in the computer networking/telecommunications industry. Acquiring the Linux operating system is a relatively simple and inexpensive task since virtually all of the source code can be downloaded from several different FTP or HTTP sites on the Internet. In addition, the most recent version of Red Hat Linux can be purchased from computer retail stores for between $25 and $50, depending on whether you purchase the standard or full version. The retail brand is indeed a worthwhile investment (vs. the free FTP or HTTP versions) since valuable technical support is included directly from the Red Hat Linux engineers for at least a year. This can be very helpful if, for instance, you can not resolve an installation/configuration problem after consulting the Red Hat Linux manuals. This article describes how to put together a Local Area Network (LAN) consisting of two or more computers using the Red Hat Linux 6.2 operating system. A LAN is a communications network that interconnects a variety of devices and provides a means for exchanging information among those devices. The size and scope of a LAN is usually small, covering a single building or group of buildings. In a LAN, modems and phone lines are not required, and the computers should be close enough to run a network cable between them. For each computer that will participate in the LAN, you'll need a network interface card (NIC) to which the network cable will be attached. You will also need to assign a unique hostname and IP address to each computer in the LAN (described later in this article), but this requires a basic understanding of TCP/IP (Transmission Control Protocol/Internet Protocol). 9.1 Introduction to TCP/IP TCP/IP is the suite of protocols used by the Internet and most LANs throughout the world. In TCP/IP, every host (computer or other communications device) that is connected to the network has a unique IP address. An IP address is composed of four octets (numbers in the range of 0 to 255) separated by decimal points. The IP address is used to uniquely identify a host or computer on the LAN. For example, a computer with the hostname Morpheus could have an IP address of 192.168.7.127. You should avoid giving two or more computers the same IP address by using the range of IP addresses that are reserved for private, local area networks; this range of IP addresses usually begins with the octets 192.168. 9.2 LAN network address The first three octets of an IP address should be the same for all computers in the LAN. For example, if a total of 128 hosts exist in a single LAN, the IP addresses could be assigned starting with 192.168.1.x, where x represents a number in the range of 1 to 128. You could create consecutive LANs within the same company in a 50 | P a g e similar manner consisting of up to another 128 computers. Of course, you are not limited to 128 computers, as there are other ranges of IP addresses that allow you to build even larger networks. There are different classes of networks that determine the size and total possible unique IP addresses of any given LAN. For example, a class A LAN can have over 16 million unique IP addresses. A class B LAN can have over 65,000 unique IP addresses. The size of your LAN depends on which reserved address range you use and the subnet mask (explained later in the article) associated with that range (see Table 1.). Table 1. Address ranges and LAN sizes Address range Subnet mask Provides Addresses per LAN 10.0.0.0 - 10.255.255.255.255 255.0.0.0 1 class A LAN 16,777,216 172.16.0.0 - 172.31.255.255 16 class B LANs 65,536 255.255.0.0 192.168.0.0 - 192.168.255.255 25.255.255.0 256 class C LANs 256 9.3 Network and broadcast addresses Another important aspect of building a LAN is that the addresses at the two extreme ends of the address range are reserved for use as the LAN's network address and broadcast address. The network address is used by an application to represent the overall network. The broadcast address is used by an application to send the same message to all other hosts in the network simultaneously. For example, if you use addresses in the range of 192.168.1.0 to 192.168.1.128, the first address (192.168.1.0) is reserved as the network address, and the last address (192.168.1.128) is reserved as the broadcast address. Therefore, you only assign individual computers on the LAN IP addresses in the range of 192.168.1.1 to 192.168.1.127: Network address: 192.168.1.0 Individual hosts: 192.168.1.1 to 192.168.1.127 Broadcast address: 192.168.1.128 9.4 Subnet masks Each host in a LAN has a subnet mask. The subnet mask is an octet that uses the number 255 to represent the network address portion of the IP address and a zero to identify the host portion of the address. For example, the subnet mask 255.255.255.0 is used by each host to determine which LAN or class it belongs to. The zero at the end of the subnet mask represents a unique host within that network. 51 | P a g e 9.5 Domain name The domain name, or network name, is a unique name followed by a standard Internet suffixes such as .com, .org, .mil, .net, etc. You can pretty much name your LAN anything if it has a simple dial-up connection and your LAN is not a server providing some type of service to other hosts directly. In addition, our sample network is considered private since it uses IP addresses in the range of 192.168.1.x. Most importantly, the domain name of choice should not be accessible from the Internet if the above constraints are strictly enforced. Lastly, to obtain an "official" domain name you could register through InterNIC, Network Solutions or Register.com. See the Resources section later in this article for the Web sites with detailed instructions for obtaining official domain names. 9.6 Hostnames Another important step in setting up a LAN is assigning a unique hostname to each computer in the LAN. A hostname is simply a unique name that can be made up and is used to identify a unique computer in the LAN. Also, the name should not contain any blank spaces or punctuation. For example, the following are valid hostnames that could be assigned to each computer in a LAN consisting of 5 hosts: hostname 1 - Morpheus; hostname 2 - Trinity; hostname 3 - Tank; hostname 4 - Oracle; and hostname 5 - Dozer. Each of these hostnames conforms to the requirement that no blank spaces or punctuation marks are present. Use short hostnames to eliminate excessive typing, and choose a name that is easy to remember. Table 2 summarizes what we have covered so far in this article. Every host in the LAN will have the same network address, broadcast address, subnet mask, and domain name because those addresses identify the network in its entirety. Each computer in the LAN will have a hostname and IP address that uniquely identifies that particular host. The network address is 192.168.1.0, and the broadcast address is 192.168.1.128. Therefore, each host in the LAN must have an IP address between 192.168.1.1 to 192.168.127. Table 2. Sample IP addresses for a LAN with 127 or fewer interconnected computers IP address Example Same/unique Network address 192.168.1.0 Same for all hosts Domain name www.yourcompanyname.com Same for all hosts Broadcast address 192.168.1.128 Same for all hosts Subnet mask 255.255.255.0 Same for all hosts Hostname Any valid name Unique to each host Host addresses 192.168.1.x x must be unique to each host 52 | P a g e 9.7 Assigning IP addresses in a LAN There are two ways to assign IP addresses in a LAN. You can manually assign a static IP address to each computer in the LAN, or you can use a special type of server that automatically assigns a dynamic IP address to each computer as it logs into the network. 9.7.1 Static IP addressing Static IP addressing means manually assigning a unique IP address to each computer in the LAN. The first three octets must be the same for each host, and the last digit must be a unique number for each host. In addition, a unique hostname will need to be assigned to each computer. Each host in the LAN will have the same network address (192.168.1.0), broadcast address (192.168.1.128), subnet mask (255.255.255.0), and domain name (yourcompanyname.com). It's a good idea to start by visiting each computer in the LAN and jotting down the hostname and IP address for future reference. 9.7.2 Dynamic IP addressing Dynamic IP addressing is accomplished via a server or host called DHCP (Dynamic Host Configuration Program) that automatically assigns a unique IP address to each computer as it connects to the LAN. A similar service called BootP can also automatically assign unique IP addresses to each host in the network. The DHCP/ BootP service is a program or device that will act as a host with a unique IP address. An example of a DHCP device is a router that acts as an Ethernet hub (a communications device that allows multiple host to be connected via an Ethernet jack and a specific port) on one end and allows a connection to the Internet on the opposite end. Furthermore, the DHCP server will also assign the network and broadcast addresses. You will not be required to manually assign hostnames and domain names in a dynamic IP addressing scheme. 9.8 The LAN hardware Assigning hostname and IP addresses will be useless if there is no hardware available to connect all the computers together. There are several different types of hardware schemes such as Ethernet, Token Ring, FDDI, Token Bus, etc. Since Ethernet is the most widely used hardware scheme, we will focus our attention on it. Ethernet is available from several different computer vendors, and it is relatively inexpensive. Ethernet is a 10-Mbps baseband LAN specification developed by Xerox, Intel, and Digital Equipment. In order to build an Ethernet hub you need the following: an Ethernet Network Interface Card (NIC) for each computer, an Ethernet compatible hub with at least the same number of ports as there will be computers in the LAN, and Ethernet cables (or 10BaseT cables) to connect each computer's NIC to the Ethernet hub. Also make sure that the hardware of choice is compatible with the Red Hat Linux operating system. This hardware/software compatibility information is usually found in the Requirements section on the back of the box of each product. Alternatively, you could ask a computer sales person about hardware/software requirements. You can usually save money by purchasing LAN cards as a package vs. purchasing them individually. 53 | P a g e When choosing an Ethernet hub ensure that it contains at least as many ports as there are computers that will participate in the LAN. It is always best to choose a hub with additional ports to allow for expansion. If you plan to use all of the computers in the LAN to access the Internet via a local Internet Service Provider (ISP), the router/Ethernet combo is an ideal choice. The router/Ethernet unit is normally configured using any computer that is connected to the LAN. Assuming that all computers in the LAN will be running the Red Hat Linux operating system, a router will be required that can be configured using a Linux configuration program such as LinuxConf. Finally, choose network cables to allow for expansion. Typically, most Ethernet networks use 10BaseT cables with RJ45 jacks at each end. It's always a good idea to purchase cables that are 1 or 2 times longer than the required length in case the structure (topology) of the LAN changes in the future. 9.9 Installing the hardware Assuming that all LAN hardware is available, the next step is to install it. First turn off all the computers that will participate in the LAN. Next, open the case on each computer and install each NIC in the appropriate slot on the motherboard, being careful to follow the manufacturer's instructions. Find a convenient but safe location for the Ethernet hub, preferably a centralized location in the same building or room along with the computers. Next, run the cable from the NIC in each computer to the Ethernet hub ensuring all cables are out of the way of users who will need physical access to each computer in the LAN. Moreover, make sure you follow all instructions provided with the LAN hardware before starting up any of the computers that will participate in the LAN. If you are using a router to connect the LAN to the Internet or using a DHCP server, you will need to do some configuration as required by the user's manual. Lastly, assuming all computers are attached to the Ethernet hub via the NIC and a specific port on the hub, you can now begin the software configuration process using the Red Hat operating system. 9.10 Configuring the LAN How you configure the computers on the LAN will depend on whether the Red Hat OS was installed before or after the LAN hardware. If you installed the LAN hardware before installing Red Hat you will be prompted for network configuration during the Red Hat installation process. However, if you installed the Red Hat OS after the LAN hardware, a program called "Kudzu" will detect the newly installed Ethernet card and initiate the configuration process automatically. Follow these steps when configuring each Ethernet card using the "Kudzu" program: 1. During the bootup process look for a dialog box titled "Welcome to Kudzu." Press Enter to begin the configuration process. 54 | P a g e 2. Next, you should see another dialog box that displays the brand name for the installed Ethernet card. Press Enter again to continue. 3. After a brief delay you should see "Would You Like to Set up Networking". 4. Select the NO option using the Tab key and then press Enter. I will describe setting up networking using a utility called LinuxConf later in this article. At this point, the bootup process should continue normally and you will be required to log on to the computer as the root user. You should have been given the opportunity to create a root account during the initial installation of Red Hat. 9.11 Using LinuxConf to configure your Ethernet card You can use an application program called LinuxConf to configure or reconfigure the NIC of each computer in the LAN. You can launch the LinuxConf utility by typing linuxconf at the command prompt of any terminal window in the KDE or GNOME desktop environment. Another way to start the LinuxConf utility is to click the Main menu button, select System, then LinuxConf. When the LinuxConf application is displayed, follow the steps below to configure the Ethernet card: 1. From the LinuxConf tree structure, select Config, Networking, Client Tasks, Basic Host Information. 2. Type the fully qualified hostname that you assigned to this computer on the Host name tab. 3. Next, click the Adaptor 1 tab, which displays your Ethernet card settings. 4. Verify that the Enabled button is selected to ensure that the Ethernet card will be accessible. 5. Choose the Manual option if you will not be using a DHCP or BootP server on your LAN and continue to step 6. Otherwise, if you will be using a DHCP or BootP server, choose either DHCP or BootP accordingly and continue to step 12. 6. Enter this computer's hostname followed by a period and the domain name of the LAN for the Primary name + domain option. 7. Enter the computer's hostname in addition to any aliases separated by a blank space under the Aliases option. 8. Enter the IP address assigned to this computer next to IP Address (such as 192.168.1.1). 9. Type in 255.255.255.0 for the Netmask. 10. For net device, type eth0, which represents the first Ethernet card located inside the computer. 11. The driver or Kernel Module option for the Ethernet card should automatically be filled in upon exiting LinuxConf. 12. Click the Accept button to activate all changes. 13. Repeat steps 1-12 for each computer in the LAN, verifying that you've entered the correct hostname and the corresponding IP address. 9.12 Nameserver specification Another important step in setting up LAN is to configure the Nameserver specification, which is used by Linux to look up IP addresses when only the computer's hostname is given. There are two methods that are used by Red Hat Linux to resolve hostnames into IP addresses. One method is via Domain Name Services (DNS), and the other is by means of a local file at /etc/hosts. Locate the hosts file by typing cd /etc to change to the /etc directory. The /etc directory is where most system configuration files are found for each computer. Next, follow the steps below to resolve hostnames into IP address using the /etc/hosts file: 55 | P a g e 1. 2. 3. 4. In the left column of LinuxConf, open the Nameserver specification (DNS) category. Left-click the DNS Usage option. (The button should be pushed in.) Enter localdomain next to the Search Domain 1 category. If you know the primary and secondary IP addresses for the nameserver, which should be available for this Ethernet card, enter those in the IP of nameserver 1 and IP of nameserver 2 categories. Otherwise, you can leave those categories blank. 5. Left-click the Accept button to activate all changes. 9.13 Hostname search path The hostname search path is used by Red Hat Linux to search for IP addresses assigned to hostnames. To configure the hostname search path so that the local host (/etc/hosts) file is used to resolve local hostnames, and the ISP domain services to resolve Internet domain services, follow these steps: 1. 2. 3. 4. 5. In the left column of LinuxConf, open the Routing and Gateways category. Select the Host Name Search path option. In the right column of LinuxConf, select the Multiple IPs for One Host option. Select the hosts, dns option in the right portion of LinuxConf. Left-click the Accept button to activate all changes. 9.14 Setting up /etc/hosts The Red Hat Linux OS needs some way to find IP addresses within the LAN based on the each computer's hostname. I described earlier in the article that the Domain Name Service (DNS) is one method of resolving hostnames into IP addresses. In a DNS configuration the hostnames and IP addresses should already be listed in a pre-existing nameserver. Consult your local ISP to obtain those IP addresses. On the other hand, if there is a centralized nameserver, as with small LANs, a host file will need to be configured on each computer that was assigned a hostname, IP address, and any aliases. This configuration process involves editing a text file located at /etc/host. You will need to go to one of the computers in the LAN and follow the below steps in order to create and configure the /etc/hosts file: 1. In the left column of LinuxConf, open the Misc category. 2. Open the Information about hosts category. You should see an entry for this computer that includes the IP address, hostname, and any aliases. 3. Left-click the Add button once to add an entry for another host in the LAN. 4. Type the Primary + Domain Name for another host in the LAN in the dialog box that appears (such as trinity.yourcompanyname.com). 5. Type one or more aliases for this computer next to the Alias option (such as tank). 6. Enter the IP address for the hostname that you've assigned for this computer next to IP number. 7. Left-click the Accept button to activate all changes. 8. Repeat steps 1-7 for each computer in your LAN. After you have done steps 1-7 for all computers, the /etc/hosts tab of LinuxConf should list one entry for every computer in your LAN, in addition to the local host's loopback interface. The local host name should appear as localhost. Finally, you can save all changes and exit the LinuxConf application by following the steps below: 1. Left-click the Quit button in the /etc/host screen after all hostnames and IP addresses have been entered. 2. To exit the LinuxConf application, left-click the Quit button at the bottom-left corner. 56 | P a g e 3. Left-click the Activate the Changes button to activate all changes and exit LinuxConf. 9.15 Repeat for every host Now that you have configured one computer in you LAN, you will need to go back and repeat all the above steps for each computer starting with the section "Configuring the LAN". If you would prefer a less time-consuming procedure of configuring each computer, you can modify the /etc/hosts file on each computer manually using a copy method. You can copy the /etc/hosts file that you have just created to a floppy disk or CD-ROM (if you have a writeable CD-ROM drive) and copy that file to the /etc directory of each computer in your LAN. To copy the /etc/hosts file to a floppy disk, type the command cp /etc/hosts /mnt/floppy at the command prompt. Do this on the computer where you configured the initial /etc/hosts file using the LinuxConf utility. Next, take the floppy to each computer in the LAN and type the command cp /mnt/floppy hosts /etc/host in a terminal window. This will copy the hosts file to the /etc directory on each host. If you are using a CD-ROM, replace the /mnt/floppy/ in the above commands with //mnt/cdrom/ to copy files to and from a writeable CD-ROM. The /etc/hosts file, as you probably noticed, is just a text file with a list of hostnames and IP addresses separated into three columns. Lastly, make sure that the local computer and its associated IP address are listed twice and all the other computers in the LAN are listed only once. 9.16 Testing the LAN To test the completely configured LAN, make sure that the computers are able to communicate with each other after the bootup process. You can start by typing reboot at the command prompt at a command terminal on each computer. This allows you to monitor the testing information that scrolls down the screen as a standard procedure during the Linux boot process. Look for the following information: Setting hostname: <hostname you assigned to this computer> Bringing up Interface lo: <OK> or <FAILED> Bringing up interface eth0 <OK> or <FAILED> The Setting hostname field should display the hostname that you assigned for this computer. The lo and eth0 interfaces should display [OK] to indicate that both tests were successful. To determine whether each computer can communicate with every other computer in the LAN, use the ping command. Open any terminal window on the current host and type the command ping <IP address> or <hostname>, where <IP address> or <hostname> is the IP address and/or the hostname that you assigned to this computer. Note that you must type either the IP address or the hostname in order for the ping command to work properly. 57 | P a g e If you have configured the DNS nameserver specification properly, the ping <hostname> command should resolve the hostname into a corresponding IP address. Otherwise, you will need to use the IP address that you should currently already have listed for all computers in the LAN. The ping command will send messages across the LAN to the designated IP address or computer. You should see several messages or packets (consisting of bytes of information) if the computers are "talking" or communicating with each other. These packets look similar to the following: 64 bytes from 192.168.1.x : icmp_seq=0 ttl=255 time=0.8ms 64 bytes from 192.168.1.x : icmp_seq=0 ttl=255 time=0.8ms 64 bytes from 192.168.1.x : icmp_seq=0 ttl=255 time=0.8ms Note that the "192.168.1" represents the LAN that this particular host is a member of and the x indicates the specific host number that you are attempting to ping (e.g. such as Oracle) which jointly makes up the IP address. You can press the Ctrl+C to terminate the test and you should see the following basic information about the entire ping test: --hostname.yourcompanyname.com ping statistics --4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 0.3/0.4/0.8 ms Verify that the packet loss is 0%, which is an immediate indication that the test was successful. However, there is a problem if the ping command results in the following message: From hostname.comanyname.com (192.168.1.1): Destination Host Unreachable This is an immediate indication that the two computers are not communicating at all. If the computers are not communicating, see the next section, "Troubleshooting the LAN". Otherwise, when you can successfully ping all other computers in the LAN from one designated computer, the overall basic communications functionality is indeed a success. At this point, you can consider this LAN to be a fully functional network that you can install and on which you can configure various network services as desired. 9.17 Troubleshooting the LAN If you are unable to ping another computer in the LAN, here's how to get to the source of the problem. First of all, it's a good idea to shut down every computer in the LAN using the halt command. At the command prompt on each computer, type halt. The main reason for shutting down all computers is to monitor feedback from the boot process when each computer is started up again. Check all cable connections between every computer, making sure that all RJ45 jacks are connected properly. After verifying that all the cables are secured properly, start each computer one at a time and look for the following response during the boot process: Setting hostname: hostname.networkname [OK] 58 | P a g e You can turn on the interactive mode by typing I at the LILO boot prompt during the initial bootup process of Red Hat to get a closer view of the feedback. Ensure that the hostname and network name that was assigned to this computer is spelled correctly. If this is not the case, you will need to return to the Basic Host Information section of LinuxConf. In interactive mode you will be prompted to start several services. Respond to each question with Yes and pay close attention to results of various tests. If the Kudzu program detects an Ethernet card, then this an indication that the card was not properly configured the first time around. Proceed to let Kudzu configure the card. When you are prompted to configure the network, choose "Yes" and type the correct IP address and other related information for this particular computer. Another important response to examine carefully is the following: Bringing up interface eth0 [OK] This line indicates whether the Ethernet card is working properly. If this test fails you should check all network settings using LinuxConf to ensure that the card was configured properly. If the network settings are correct, there is probably a defect in the Ethernet card itself. In order to verify this, consult the manufacturer of the Ethernet card or a computer technician to determine whether or not the card is defective. Repeat the preceding troubleshooting procedures on each new Ethernet card installed. 9.18 Summary The process of setting up a LAN using Red Hat Linux is a relatively straightforward task -even for users with little or no LAN background -- when the preceding steps are carefully understood and performed. Moreover, there are vast resources available on the Web that describe in more detail the topics covered in this article. A good start would be to feed keywords (like LANs, configuring LANs, Linux network configuration, and TCP/IP) into your favorite Web search engine. You will be amazed at the wealth of information that is available on configuring LANs, building networks, Red Hat Linux network installation/configuration, the TCP/IP protocol suite, and on and on. Good luck! 59 | P a g e Unit 10 Configuring a Wireless LAN Connection 10.1 Configuring a Wireless LAN Connection The Cisco 1800 series integrated services fixed-configuration routers support a secure, affordable, and easy-to-use wireless LAN solution that combines mobility and flexibility with the enterprise-class features required by networking professionals. With a management system based on Cisco IOS software, the Cisco routers act as access points, and are Wi-Fi certified, IEEE 802.11a/b/g-compliant wireless LAN transceivers. You can configure and monitor the routers using the command-line interface (CLI), the browser-based management system, or Simple Network Management Protocol (SNMP). This chapter describes how to configure the router using the CLI. Use the interface dot11radio global configuration CLI command to place the device into radio configuration mode. See the Cisco Access Router Wireless Configuration Guide for more detailed information about configuring these Cisco routers in a wireless LAN application. Figure 9-1 shows a wireless network deployment. Figure 9-1 Sample Wireless LAN 60 | P a g e 1 Wireless LAN (with multiple networked devices) 2 Cisco 1800 series integrated services router connected to the Internet 3 VLAN 1 4 VLAN 2 In the configuration example that follows, a remote user is accessing the Cisco 1800 series integrated services router using a wireless connection. Each remote user has his own VLAN. Configuration Tasks Perform the following tasks to configure this network scenario: • Configure the Root Radio Station • Configure Bridging on VLANs • Configure Radio Station Subinterfaces An example showing the results of these configuration tasks is shown in the section "Configuration Example." Note The procedures in this chapter assume that you have already configured basic router features as well as PPPoE or PPPoA with NAT. If you have not performed these configurations tasks, see Chapter 1, "Basic Router Configuration," Chapter 3, "Configuring PPP over Ethernet with NAT," and Chapter 4, "Configuring PPP over ATM with NAT," as appropriate for your router. You may have also configured DHCP, VLANs, and secure tunnels. 61 | P a g e 10.2 Configure the Root Radio Station Perform these steps to create and configure the root radio station for your wireless LAN, beginning in global configuration mode: Command Step 1 Purpose interface name number Enters interface configuration mode for the specified wireless interface. Example: Router(config)# interface dot11radio 0 Router(config-if)# Step 2 broadcast-key [[vlan vlan-id] change secs] [membershiptermination] [capability-change] Example: Router(config-if)# broadcast-key vlan 1 change 45 Router(config-if)# Specifies the time interval (in seconds) between rotations of the broadcast encryption key used for clients. Note Client devices using static Wired Equivalent Privacy (WEP) cannot use the access point when you enable broadcast key rotation—only wireless client devices using 802.1x authentication (such as Light Extensible Authentication Protocol [LEAP], Extensible Authentication Protocol-Transport Layer Security [EAP-TLS], or Protected Extensible Authentication Protocol [PEAP]) can use the access point. Note This command is not supported on bridges. See the Cisco IOS Commands for Access Points and Bridges document for more details. Step 3 encryption method algorithm key Specifies the encryption method, algorithm, and key used to access the wireless interface. Example: Router(config-if)# encryption vlan 1 mode ciphers tkip Router(config-if)# The example uses the VLAN with optional encryption method of data ciphers. 62 | P a g e Step 4 ssid name Creates a Service Set ID (SSID), the public name of a wireless network. Example: Router(config-if)# ssid cisco Router(config-ifssid)# Step 5 vlan number Note All of the wireless devices on a WLAN must employ the same SSID to communicate with each other. Binds the SSID with a VLAN. Example: Router(config-ifssid)# vlan 1 Router(config-ifssid)# Step 6 authentication type Example: Step 7 Sets the permitted authentication methods for a user attempting access to the wireless LAN. Router(config-ifssid)# authentication open Router(config-ifssid)# authentication network-eap eap_methods Router(config-ifssid)# authentication key-management wpa More than one method can be specified, as shown in the example. exit Exits SSID configuration mode, and enters interface configuration mode for the wireless interface. Example: Router(config-ifssid)# exit Router(config-if)# Step 8 speed rate Example: (Optional) Specifies the required and allowed rates, in Mbps, for traffic over the wireless connection. Router(config-if)# basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 63 | P a g e 36.0 48.0 54.0 Router(config-if)# Step 9 rts [retries | threshold] (Optional) Specifies the Request to Send (RTS) threshold or the number of times to send a request before Example: determining the wireless LAN is Router(config-if)# unreachable. rts threshold 2312 Router(config-if)# Step 10 power [client | local] [cck [number | maximum] | ofdm [number | maximum]] Example: (Optional) Specifies the radio transmitter power level. See the Cisco Access Router Wireless Configuration Guide for available power level values. Router(config-if)# power local cck 50 Router(config-if)# power local ofdm 30 Router(config-if)# Step 11 channel [number | least-congested] Example: Router(config-if)# channel 2462 Router(config-if)# (Optional) Specifies the channel on which communication occurs. See the Cisco Access Router Wireless Configuration Guide for available channel numbers. Step 12 station-role [repeater | (Optional) Specifies the role of this root] wireless interface. Example: You must specify at least one root interface. Router(config-if)# station-role root Router(config-if)# Step 13 exit Example: Exits interface configuration mode, and enters global configuration mode. Router(config-if)# exit Router(config)# 64 | P a g e 10.3 Configure Bridging on VLANs Perform these steps to configure integrated routing and bridging on VLANs, beginning in global configuration mode: Command or Action Step 1 bridge [number | crb | irb |mac-address-table] Example: Purpose Specifies the type of bridging. The example specifies integrated routing and bridging. Router(config)# bridge irb Router(config)# Step 2 interface name number Example: Router(config)# interface vlan 1 Router(config)# Step 3 bridge-group number Enters interface configuration mode. We want to set up bridging on the VLANs, so the example enters the VLAN interface configuration mode. Assigns a bridge group to the interface. Example: Router(config)# bridge-group 1 Router(config)# Step 4 bridge-group parameter Sets other bridge parameters for the bridging interface. Example: Router(config)# bridge-group spanning-disabled Router(config)# Step 5 interface name number Enters configuration mode for the virtual bridge interface. Example: Router(config)# interface bvi 1 Router(config)# 65 | P a g e Step 6 ip address address mask Specifies the address for the virtual bridge interface. Example: Router(config)# ip address 10.0.1.1 255.255.255.0 Router(config)# Repeat Step 2 through Step 6 above for each VLAN that requires a wireless interface. 10.4 Configure Radio Station Subinterfaces Perform these steps to configure subinterfaces for each root station, beginning in global configuration mode: Command Step 1 interface type number Example: Purpose Enters subinterface configuration mode for the root station interface. Router(config)# interface dot11radio 0.1 Router(config-subif)# Step 2 description string Example: Provides a description of the subinterface for the administrative user. Router(config-subif)# description Cisco open Router(config-subif)# Step 3 encapsulation dot1q vlanID Enables IEEE 802.1q [native | second-dot1q] encapsulation on the specified subinterface. Example: Router(config-subif)# encapsulation dot1q 1 native Router(config-subif)# Step 4 no cdp enable Example: Disables the Cisco Discovery Protocol (CDP) on the wireless interface. 66 | P a g e Router(config-subif)# no cdp enable Router(config-subif)# Step 5 bridge-group number Assigns a bridge group to the subinterface. Example: Router(config-subif)# bridge-group 1 Router(config-subif)# Step 6 exit Example: Exits subinterface configuration mode, and enters global configuration mode. Router(config-subif)# exit Router(config)# Repeat these steps to configure more subinterfaces, as needed. 10.5 Configuration Example The following configuration example shows a portion of the configuration file for the wireless LAN scenario described in the preceding sections. ! bridge irb ! interface Dot11Radio0 no ip address ! broadcast-key vlan 1 change 45 ! ! encryption vlan 1 mode ciphers tkip ! ssid cisco vlan 1 authentication open authentication network-eap eap_methods authentication key-management wpa ! ssid ciscowep vlan 2 authentication open ! ssid ciscowpa vlan 3 authentication open ! speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0 67 | P a g e rts threshold 2312 power local cck 50 power local ofdm 30 channel 2462 station-role root ! interface Dot11Radio0.1 description Cisco Open encapsulation dot1Q 1 native no cdp enable bridge-group 1 bridge-group 1 subscriber-loop-control bridge-group 1 spanning-disabled bridge-group 1 block-unknown-source no bridge-group 1 source-learning no bridge-group 1 unicast-flooding ! interface Dot11Radio0.2 encapsulation dot1Q 2 bridge-group 2 bridge-group 2 subscriber-loop-control bridge-group 2 spanning-disabled bridge-group 2 block-unknown-source no bridge-group 2 source-learning no bridge-group 2 unicast-flooding ! interface Dot11Radio0.3 encapsulation dot1Q 3 bridge-group 3 bridge-group 3 subscriber-loop-control bridge-group 3 spanning-disabled bridge-group 3 block-unknown-source no bridge-group 3 source-learning no bridge-group 3 unicast-flooding ! interface Vlan1 no ip address bridge-group 1 bridge-group 1 spanning-disabled ! interface Vlan2 no ip address bridge-group 2 bridge-group 2 spanning-disabled ! interface Vlan3 no ip address bridge-group 3 bridge-group 3 spanning-disabled ! interface BVI1 ip address 10.0.1.1 255.255.255.0 ! interface BVI2 ip address 10.0.2.1 255.255.255.0 ! interface BVI3 ip address 10.0.3.1 255.255.255.0 ! 68 | P a g e Unit 11 Basic Router Configuration 11.1 Basic Router Configuration This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and commandline access. It also describes the default configuration on startup. Note that individual router models may not support every feature described throughout this guide. Features not supported by a particular router are indicated whenever possible. This chapter contains the following sections: • Interface Port Labels • Viewing the Default Configuration • Information Needed for Configuration • Configuring Basic Parameters • Configuring Static Routes • Configuring Dynamic Routes • Configuring Enhanced IGRP Each section includes a configuration example and verification steps, as available. For complete information on how to access global configuration mode, see the "Entering Global Configuration Mode" section in Appendix A, "Cisco IOS Basic Skills." For more information on the commands used in the following tables, see the Cisco IOS Release 12.3 documentation set. 11.2 Interface Port Labels Table 1 lists the interfaces supported for each router and their associated port labels on the equipment. Table 1 Supported Interfaces and Associated Port Labels by Cisco Router Router Interface Port Label 69 | P a g e Cisco 1801 Fast Ethernet LANs SWITCH and FE8-FE5 (top), FE x and FE4-FE1 (bottom) Fast Ethernet WANs FE0 ATM WAN ADSLoPOTS Wireless LAN LEFT, RIGHT/PRIMARY BRI ISDN S/T Cisco 1802 Fast Ethernet LANs SWITCH and FE8-FE5 (top), FE x and FE4-FE1 (bottom) Fast Ethernet WANs FE0 ATM WAN ADSLoISDN Wireless LAN LEFT, RIGHT/PRIMARY BRI ISDN S/T Cisco 1803 Fast Ethernet LANs SWITCH and FE8-FE5 (top), FE x and FE4-FE1 (bottom) Fast Ethernet WANs FE0 ATM WAN G.SHDSL Wireless LAN LEFT, RIGHT/PRIMARY BRI ISDN S/T Cisco 1811 Fast Ethernet LANs SWITCH and FE9-FE6 (top), FE x and FE5-FE2 (bottom) Fast Ethernet WANs FE0-FE1 Wireless LAN LEFT, RIGHT/PRIMARY USB 1-0 V.92 MODEM Cisco 1812 Fast Ethernet LANs SWITCH and FE9-FE6 (top), FE x and FE5-FE2 (bottom) Fast Ethernet WANs FE0-FE1 Wireless LAN LEFT, RIGHT/PRIMARY BRI ISDN S/T USB 1-0 70 | P a g e 11.3 Viewing the Default Configuration When you first boot up your Cisco router, some basic configuration has already been performed. All of the LAN and WAN interfaces have been created, console and VTY ports are configured, and the inside interface for Network Address Translation has been assigned. Use the show running-config command to view the initial configuration, as shown in Example 1. Note If you are unable to view the initial configuration and you get a No Password Set error message, you must reset the initial password. For details, see the "Recovering a Lost Password" section in Chapter 14, "Troubleshooting". Example 1 Cisco 1812 Default Configuration on Startup version 12.3 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Router ! boot-start-marker boot-end-marker ! mmi polling-interval 60 no mmi auto-configure no mmi pvc mmi snmp-timeout 180 no aaa new-model ip subnet-zero ! ip cef ! ip ips po max-events 100 no ftp-server write-enable ! interface BRI0 no ip address shutdown ! interface FastEthernet0 no ip address shutdown duplex auto speed auto ! interface FastEthernet1 no ip address shutdown 71 | P a g e duplex auto speed auto ! interface FastEthernet2 no ip address shutdown ! interface FastEthernet3 no ip address shutdown ! interface FastEthernet4 no ip address shutdown ! interface FastEthernet5 no ip address shutdown ! interface FastEthernet6 no ip address shutdown ! interface FastEthernet7 no ip address shutdown ! interface FastEthernet8 no ip address shutdown ! interface FastEthernet9 no ip address shutdown ! interface Vlan1 no ip address ! ip classless ! no ip http server no ip http secure-server ! control-plane ! line con 0 line aux 0 line vty 0 4 ! no scheduler allocate end 11.4 Information Needed for Configuration You need to gather some or all of the following information, depending on your planned network scenario, prior to configuring your network • If you are setting up an Internet connection, gather the following information: 72 | P a g e – Point-to-Point Protocol (PPP) client name that is assigned as your login name – PPP authentication type: Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) – PPP password to access your Internet service provider (ISP) account – DNS server IP address and default gateways • If you are setting up a connection to a corporate network, you and the network administrator must generate and share the following information for the WAN interfaces of the routers: – PPP authentication type: CHAP or PAP – PPP client name to access the router – PPP password to access the router • If you are setting up IP routing: – Generate the addressing scheme for your IP network. – Determine the IP routing parameter information, including IP address, and ATM permanent virtual circuits (PVCs). These PVC parameters are typically virtual path identifier (VPI), virtual circuit identifier (VCI), and traffic shaping parameters. – Determine the number of PVCs that your service provider has given you, along with their VPIs and VCIs. – For each PVC determine the type of AAL5 encapsulation supported. It can be one of the following: AAL5SNAP—This can be either routed RFC 1483 or bridged RFC 1483. For routed RFC 1483, the service provider must provide you with a static IP address. For bridged RFC 1483, you may use DHCP to obtain your IP address, or you may obtain a static IP address from your service provider. AAL5MUX PPP—With this type of encapsulation, you need to determine the PPP-related configuration items. • If you plan to connect over an ADSL or G.SHDSL line: – Order the appropriate line from your public telephone service provider. For ADSL lines—Ensure that the ADSL signaling type is DMT (also called ANSI T1.413) or DMT Issue 2. For G.SHDSL lines—Verify that the G.SHDSL line conforms to the ITU G.991.2 standard and supports Annex A (North America) or Annex B (Europe). 73 | P a g e Once you have collected the appropriate information, you can perform a full configuration on your router, beginning with the tasks in the "Configuring Basic Parameters" section. 11.5 Configuring Basic Parameters To configure the router, perform one or more of these tasks: • Configure Global Parameters • Configure Fast Ethernet LAN Interfaces • Configure WAN Interfaces • Configuring a Loopback Interface • Configuring Command-Line Access to the Router A configuration example is presented with each task to show the network configuration following completion of that task. Configure Global Parameters Perform these steps to configure selected global parameters for your router: Command Step 1 configure terminal Purpose Enters global configuration mode, when using the console port. Example: Router> enable If you are connecting to the router using a remote terminal, use the following: Router# configure terminal telnet router name or address Router(config)# Login: login id Password: ********* Router> enable Step 2 hostname name Specifies the name for the router. Example: Router(config)# hostname Router Router(config)# 74 | P a g e Step 3 enable secret password Example: Specifies an encrypted password to prevent unauthorized access to the router. Router(config)# enable secret cr1ny5ho Router(config)# Step 4 no ip domain-lookup Example: Disables the router from translating unfamiliar words (typos) into IP addresses. Router(config)# no ip domain-lookup Router(config)# For complete information on the global parameter commands, see the Cisco IOS Release 12.3 documentation set. Configure Fast Ethernet LAN Interfaces The Fast Ethernet LAN interfaces on your router are automatically configured as part of the default VLAN and as such, they are not configured with individual addresses. Access is afforded through the VLAN. You may assign the interfaces to other VLANs if desired. For more information about creating VLANs, see Chapter 5, "Configuring a LAN with DHCP and VLANs." Configure WAN Interfaces The Cisco 1811 and Cisco 1812 routers each have two Fast Ethernet interfaces for WAN connection. The Cisco 1801, Cisco 1802, and Cisco 1803 routers each have one ATM interface for WAN connection. Based on the router model you have, configure the WAN interface(s) using one of the following procedures: • Configure the Fast Ethernet WAN Interface • Configure the ATM WAN Interface 75 | P a g e 11.6 Configure the Fast Ethernet WAN Interface This procedure applies only to the Cisco 1811 and Cisco 1812 router models. Perform these steps to configure the Fast Ethernet interfaces, beginning in global configuration mode. Command Step 1 interface type number Example: Router(config)#interface fastethernet 0 Router(config-int)# Step 2 ip address ip-address mask Example: Purpose Enters the configuration mode for a Fast Ethernet WAN interface on the router. Note Fast Ethernet WAN ports are numbered 0-1 on the Cisco 1800 series routers. Sets the IP address and subnet mask for the specified Fast Ethernet interface. Router(config-int)# ip address 192.1.12.2 255.255.255.0 Router(config-int)# Step 3 no shutdown Example: Enables the Ethernet interface, changing its state from administratively down to administratively up. Router(config-int)# no shutdown Router(config-int)# Step 4 exit Example: Exits interface configuration mode and returns to global configuration mode. Router(config-int)# exit Router(config)# Repeat these steps for the other Fast Ethernet WAN interface if desired. 11.6.1 Configure the ATM WAN Interface This procedure applies only to the Cisco 1801, Cisco 1802, and Cisco 1803 models. Perform these steps to configure the ATM interface, beginning in global configuration mode: 76 | P a g e Command Step 1 For the Cisco 1803 only: controller dsl 0 mode atm exit Purpose For routers using the G.SHDSL signaling, perform these commands. Ignore this step for routers using ADSL signaling. Example: Router(config)# controller dsl 0 Router(configcontroller)# mode atm Router(configcontroller)# exit Router(config)# Step 2 interface type number Enters interface configuration mode. Example: Router(config)# interface atm0 Router(config-int)# Step 3 ip address ip-address mask Sets the IP address and subnet mask for the ATM interface. Example: Router(config-int)# ip address 200.200.100.1 255.255.255.0 Router(config-int)# Step 4 no shutdown Enables the ATM 0 interface. Example: Router(config-int)# no shutdown Router(config-int)# Step 5 exit Example: Exits interface configuration mode and returns to global configuration mode. Router(config-int)# 77 | P a g e exit Router(config)# 11.6.2 Configure the Wireless Interface The wireless interface enables connection to the router through a wireless LAN connection. For more information about configuring a wireless connection, see Chapter 9, "Configuring a Wireless LAN Connection" and the Cisco Access Router Wireless Configuration Guide. 1.6.3 Configuring a Loopback Interface The loopback interface acts as a placeholder for the static IP address and provides default routing information. For complete information on the loopback commands, see the Cisco IOS Release 12.3 documentation set. Perform these steps to configure a loopback interface: Command Step 1 interface type number Purpose Enters interface configuration mode. Example: Router(config)# interface Loopback 0 Router(config-int)# Step 2 ip address ip-address mask Sets the IP address and subnet mask for the loopback interface. Example: Router(config-int)# ip address 10.108.1.1 255.255.255.0 Router(config-int)# Step 3 exit Example: Exits configuration mode for the loopback interface and returns to global configuration mode. Router(config-int)# exit Router(config)# 78 | P a g e Configuration Example The loopback interface in this sample configuration is used to support Network Address Translation (NAT) on the virtual-template interface. This configuration example shows the loopback interface configured on the Fast Ethernet interface with an IP address of 200.200.100.1/24, which acts as a static IP address. The loopback interface points back to virtual-template1, which has a negotiated IP address. ! interface loopback 0 ip address 200.200.100.1 255.255.255.0 (static IP address) ip nat outside ! interface Virtual-Template1 ip unnumbered loopback0 no ip directed-broadcast ip nat outside Verifying Your Configuration To verify that you have properly configured the loopback interface, enter the show interface loopback command. You should see verification output similar to the following example. Router# show interface loopback 0 Loopback0 is up, line protocol is up Hardware is Loopback Internet address is 200.200.100.1/24 MTU 1514 bytes, BW 8000000 Kbit, DLY 5000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation LOOPBACK, loopback not set Last input never, output never, output hang never Last clearing of "show interface" counters never Queueing strategy: fifo Output queue 0/0, 0 drops; input queue 0/75, 0 drops 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 output buffer failures, 0 output buffers swapped out Another way to verify the loopback interface is to ping it: Router# ping 200.200.100.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 200.200.100.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms 79 | P a g e 11.6.4 Configuring Command-Line Access to the Router Perform these steps to configure parameters to control access to the router, beginning in global configuration mode: Command Step 1 line [aux | console | tty | vty] line-number Example: Purpose Enters line configuration mode, and specifies the type of line. This example specifies a console terminal for access. Router(config)# line console 0 Router(config)# Step 2 password password Specifies a unique password for the console terminal line. Example: Router(config)# password 5dr4Hepw3 Router(config)# Step 3 login Enables password checking at terminal session login. Example: Router(config)# login Router(config)# Step 4 exec-timeout minutes Sets the interval that the EXEC [seconds] command interpreter waits until user input is detected. The default is 10 minutes. Optionally, add seconds to the Example: interval value. Router(config)# exec-timeout 5 30 Router(config)# Step 5 line [aux | console | tty | vty] line-number This example shows a timeout of 5 minutes and 30 seconds. Entering a timeout of 0 0 specifies never to time out. Specifies a virtual terminal for remote console access. Example: Router(config)# line vty 0 4 Router(config)# 80 | P a g e Step 6 password password Specifies a unique password for the virtual terminal line. Example: Router(config)# password aldf2ad1 Router(config)# Step 7 login Enables password checking at the virtual terminal session login. Example: Router(config)# login Router(config)# Step 8 end Exits line configuration mode, and returns to privileged EXEC mode. Example: Router(config)# end Router# For complete information about the command line commands, see the Cisco IOS Release 12.3 documentation set. Configuration Example The following configuration shows the command-line access commands. You do not need to input the commands marked "default." These commands appear automatically in the configuration file generated when you use the show running-config command. ! line con 0 exec-timeout 10 0 password 4youreyesonly login transport input none (default) stopbits 1 (default) line vty 0 4 password secret login ! 81 | P a g e 11.7 Configuring Static Routes Static routes provide fixed routing paths through the network. They are manually configured on the router. If the network topology changes, the static route must be updated with a new route. Static routes are private routes, unless they are redistributed by a routing protocol. Configuring static routes on the Cisco 1800 series routers is optional. Perform these steps to configure static routes, beginning in global configuration mode: Command Step 1 ip route prefix mask {ipaddress | interface-type interface-number [ipaddress]} Example: Router(config)# ip route 192.168.1.0 255.255.0.0 10.10.10.2 Router(config)# Step 2 end Purpose Specifies the static route for the IP packets. For details about this command and additional parameters that can be set, see the Cisco IOS IP Command Reference, Volume 2 of 4: Routing Protocols. Exits router configuration mode, and enters privileged EXEC mode. Example: Router(config)# end Router# For complete information on the static routing commands, see the Cisco IOS Release 12.3 documentation set. For more general information on static routing, see Appendix B, "Concepts." Configuration Example In the following configuration example, the static route sends out all IP packets with a destination IP address of 192.168.1.0 and a subnet mask of 255.255.255.0 on the Fast Ethernet interface to another device with an IP address of 10.10.10.2. Specifically, the packets are sent to the configured PVC. You do not need to enter the commands marked "(default)." These commands appear automatically in the configuration file generated when you use the show running-config command. ! ip classless (default) ip route 192.168.1.0 255.255.255.0 10.10.10.2! 82 | P a g e Verifying Your Configuration To verify that you have properly configured static routing, enter the show ip route command and look for static routes signified by the "S." You should see verification output similar to the following example. Router# show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is not set 10.0.0.0/24 is subnetted, 1 subnets C 10.108.1.0 is directly connected, Loopback0 S* 0.0.0.0/0 is directly connected, FastEthernet0 11.8 Configuring Dynamic Routes In dynamic routing, the network protocol adjusts the path automatically, based on network traffic or topology. Changes in dynamic routes are shared with other routers in the network. The Cisco routers can use IP routing protocols, such as Routing Information Protocol (RIP) or Enhanced Interior Gateway Routing Protocol (EIGRP), to learn routes dynamically. You can configure either of these routing protocols on your router. 11.8.1 Configuring RIP Perform these steps to configure the RIP routing protocol on the router, beginning in global configuration mode: Command Step 1 router rip Task Enters router configuration mode, and enables RIP on the router. Example: Router> configure terminal Router(config)# router rip Router(configrouter)# 83 | P a g e Step 2 version {1 | 2} Specifies use of RIP version 1 or 2. Example: Router(configrouter)# version 2 Router(configrouter)# Step 3 network ip-address Example: Specifies a list of networks on which RIP is to be applied, using the address of the network of directly connected networks. Router(configrouter)# network 192.168.1.1 Router(configrouter)# network 10.10.7.1 Router(configrouter)# Step 4 no auto-summary Example: Router(configrouter)# no autosummary Router(configrouter)# Step 5 end Disables automatic summarization of subnet routes into network-level routes. This allows subprefix routing information to pass across classful network boundaries. Exits router configuration mode, and enters privileged EXEC mode. Example: Router(configrouter)# end Router# For complete information on the dynamic routing commands, see the Cisco IOS Release 12.3 documentation set. For more general information on RIP, see Appendix B, "Concepts." Configuration Example The following configuration example shows RIP version 2 enabled in IP network 10.0.0.0 and 192.168.1.0. Execute the show running-config command from privileged EXEC mode to see this configuration. 84 | P a g e ! router rip version 2 network 10.0.0.0 network 192.168.1.0 no auto-summary ! Verifying Your Configuration To verify that you have properly configured RIP, enter the show ip route command and look for RIP routes signified by "R." You should see a verification output like the example shown below. Router# show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is not set C R 10.0.0.0/24 is subnetted, 1 subnets 10.108.1.0 is directly connected, Loopback0 3.0.0.0/8 [120/1] via 2.2.2.1, 00:00:02, Ethernet0/0 11.9 Configuring Enhanced IGRP Perform these steps to configure Enhanced IGRP (EIGRP), beginning in global configuration mode: Command Step 1 router eigrp asnumber Example: Purpose Enters router configuration mode, and enables EIGRP on the router. The autonomous-system number identifies the route to other EIGRP routers and is used to tag the EIGRP information. Router(config)# router eigrp 109 Router(config)# Step 2 network ip-address Example: Specifies a list of networks on which EIGRP is to be applied, using the IP address of the network of directly connected networks. Router(config)# 85 | P a g e network 192.145.1.0 Router(config)# network 10.10.12.115 Router(config)# Step 3 end Exits router configuration mode, and enters privileged EXEC mode. Example: Router(configrouter)# end Router# For complete information on the IP EIGRP commands, see the Cisco IOS Release 12.3 documentation set. For more general information on EIGRP concepts, see Appendix B, "Concepts." Configuration Example The following configuration example shows the EIGRP routing protocol enabled in IP networks 192.145.1.0 and 10.10.12.115. The EIGRP autonomous system number is assigned as 109. Execute the show running-config command from privileged EXEC mode to see this configuration. ! router eigrp 109 network 192.145.1.0 network 10.10.12.115 ! Verifying Your Configuration To verify that you have properly configured IP EIGRP, enter the show ip route command, and look for EIGRP routes indicated by "D." You should see verification output similar to the following example. Router# show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is not set 86 | P a g e C D 10.0.0.0/24 is subnetted, 1 subnets 10.108.1.0 is directly connected, Loopback0 3.0.0.0/8 [90/409600] via 2.2.2.1, 00:00:02, Ethernet0/0 87 | P a g e