Chapter 6 Network infrastructure involves the network’s physical configuration, logical operation, structure, procedures, data format, protocols and other components. The most common forms of network architectures are Local Area Network (LAN) and Wide Area Network (WAN) LAN’s are typically smaller in terms of size and geographic coverage and consist of two or more connected devices. Prepared by Saher Hasan Mohammed 2 WAN’s tend to larger, covering more geographic area and consist of two or more systems in geographically separated areas connected by any of a variety of methods such as leased lines, radio waves, satellite relay, microwaves or even dial-up connection. Prepared by Saher Hasan Mohammed 3 Campus Area Network (CAN): a network connecting any number of buildings in an office or university complex. Metropolitan Area Network (MAN): a network designed for a specific geographic locality such as a town or a city. Storage Area Network (SAN): a high speed network connecting a variety of storage devices such as a tape, RAID, optical drives, file servers and others. Prepared by Saher Hasan Mohammed 4 Virtual Local Area Network (VLAN): a logical network allowing systems on different physical network to interact as if they were connected to the same physical network. Client-Sever: A network where powerful, dedicated systems called servers provide resources to individuals workstations or clients. Peer-to-Peer: a network where every system is treated as an equal, such as a home network. Prepared by Saher Hasan Mohammed 5 Internet: a “global network” connecting thousands of millions of systems and users. Intranet: a “private’ network only accessible to authorized users. Many large corporations host an intranet to facilitate information sharing within their organization. Extranet: a “private” network established by connecting two or more intranets. This network is accessible only to the authorized users from the participating intranet’s. Prepared by Saher Hasan Mohammed 6 Network Topology: refers to the way the network is physically and logically arranged. Star Topology: all the network components are connected to a central point. Bus Topology: all the network components are connected to same cable, called the “bus” or the “backbone”. Ring Topology: all the network components are connected to each other in a closed loop with each device directly connected to two other devices. Prepared by Saher Hasan Mohammed 7 Client PC Active Node Client PC Client Scanner Client Client Laptop Client Printer Hub Client Server Prepared by Saher Hasan Mohammed Client Client 8 Client Client Client Server Client Prepared by Saher Hasan Mohammed 9 Client Client Client Server Client Client Prepared by Saher Hasan Mohammed 10 Client Client Client Client Server Client Client Client Client Server Client Client BUS Prepared by Saher Hasan Mohammed 11 A protocol is an agreed upon format for exchanging or transmitting data between systems. A protocol defines a number of agreed upon parameters, such as data compression methods, the type of error checking to use, and mechanism for systems to signal when they have finished either receiving or transmitting data. Prepared by Saher Hasan Mohammed 12 Ethernet: the most widely used LAN protocol. TCP/IP: the collection of communications protocols used to connect hosts to the internet. TCP/IP is the most widely used network protocol and is a combination of the TCP and IP. Internet Protocol: the protocol for managing and transmitting data between packet-switched networks. AppleTalk: the communication protocol developed by Apple to connect Macintosh computers and printers. Prepared by Saher Hasan Mohammed 13 The main purpose of communication networks is to facilitate the sharing of information. Every network has some limitations on the amount of data that can be transmitted. Larger chucks of data is broken down into smaller, more manageable sized chunks called packets. Breaking down a large chunk of data into smaller size chunks has advantages, the network bandwidth is better utilized. In case of any transmission error, we do not have to retransmit one large large chuck data. Prepared by Saher Hasan Mohammed 14 Protocol version number: what kind of packet it is. Packet header length: how large the header of the packet is. TOC: how to process the packet, i.e., minimize delay, maximize throughput, maximize reliability, and minimize cost. Identification: an unique identifier so this packet can be distinguished from other packets. Total length: how large the entire packet is. Flag: Whether or not this packet is part of a longer data stream and should be handled relative to other packets. Prepared by Saher Hasan Mohammed 15 Fragment offset: a description of where this packet fits into data stream as compared to other packets. Checksum: checksum code to minimize the potential for data corruption during transmission. Source IP: where the packet is from. Destination IP: where the packet is going. Data Payload: the data this packet carries. Options: governs security and handling restrictions, whether or not to record the route this packet has taken. Prepared by Saher Hasan Mohammed 16 4-bit version 4-bit header length 8-bit type of service (TOS) 16 –bit identification 8-bit time to live (TTL) 16-bit total length (in bytes) 3-bit flag 8-bit protocol 13-bit fragment 16-bit header checksum 32-bit source IP address 32 –bit destination bit IP address Optional (If used) Data Payload Prepared by Saher Hasan Mohammed 17 UDP is a “connectionless” protocol. No connection is established between the sender and the receiver. There is no way for the sender to know if the packet was successfully transmitted to the receiver, and in the order sent. Since no connection is established, UDP is considered to be an unreliable protocol. UDP is used when the loss of data is tolerated. Advantage of UDP: most of the bandwidth is used for the transfer of data, there is no overhead. Prepared by Saher Hasan Mohammed 18 TCP is a “connection-oriented” protocol. Sender and the receiver establishes a connection via “three was handshake” before transmitting the data. TCP is a reliable protocol, the packets are processed in the order sent. Each packet has a sequence number. Prepared by Saher Hasan Mohammed 19 The ultimate purpose of any communication network is to deliver packets across the networks. Packets can be delivered locally, if the destination address belongs to a local network. Packets can be delivered remotely, if the destination address is belongs to a different network. Alternatively, the packets can be delivered remotely, then locally. There are two types of packet delivery mechanisms. ◦ Local Packet Delivery ◦ Remote Packet Delivery Prepared by Saher Hasan Mohammed 20 If the source and the destination are on the same LAN, or a local network, local packet delivery is used. Delivery is accomplished by using the MAC address. Media Access Control (MAC) address is a system’s hardware address. Every system has a unique MAC address. A MAC address is expressed as six pairs of hexadecimal digits such as 00:07:e9:7c:c8:aa. Storing the MAC address of each system on the local LAN is impossible and time consuming. To find the destination MAC address, the sending system must use Address Resolution Protocol (ARP). Prepared by Saher Hasan Mohammed 21 The sending system knows the destination IP address, however, it does not know the destination MAC address. To know the destination MAC address, the sending system send a broadcast query to all the systems on the LAN asking “who is 10.1.1.140?” Only the system with the 10.1.1.140 IP address will respond to the broadcast query by sending the MAC address. Prepared by Saher Hasan Mohammed 22 Remote packet delivery is accomplished via IP address. For humans, IP address are very difficult to remember. Domain Name System (DNS) protocol was developed to translate a name into IP address. Routers are used to interconnect different networks. The sending system send the packet to the router, the router will check its routing table to see where to resent the packet. This process is called routing. This process is repeated until the packet reaches the destination router. The destination router fill finally determine the MAC address, and forward the packet to the destination. Prepared by Saher Hasan Mohammed 23 IPv4 IP address has a network part and a host part. The network part is called the subnet. The process of dividing the 32 bit space into networks is called subnetting. Subnet mask is used to tell exactly how much of the space is network portion and how much is the host portion. Prepared by Saher Hasan Mohammed 24 IP address 10.10.10.101 Subnet mask: 255.255.255.0 Convert the decimal format to binary format. ◦ Subnet mask: 11111111.11111111.11111111.00000000 ◦ IP address: 00001010. 00001010. 00001010. 01100101 Perform a bitwise AND operation to get the subnet address. ◦ Subnet Address: 00001010. 00001010. 00001010. 00000000 ◦ Subnet Address in decimal format: 10.10.10.0 Prepared by Saher Hasan Mohammed 25 Class A address: ◦ Supports 16 million host address on each of 27 network. ◦ Subnets: 10.10.10.0 to 126.255.255.255. Class B address: ◦ Supports 65,000 hosts on each of 16,000 networks. ◦ Subnets: 128.0.0.0 to 192.255.255.255. Class C address: ◦ Supports 254 hosts on each of 2,000,000 networks. ◦ Subnets: 192.0.0.0 to 223.255.255.255. Prepared by Saher Hasan Mohammed 26 NAT translate the private (non-routable) IP address into public (routable) IP address. Most organization use private IP address for internal usage, and use a NAT device to translate many internal IP address into small number of public IP address. Private IP Address Range Class A 10.0.0.0 – 10.255.255.255 Class B 172.16.0.0 – 172.31.255.255 Class C 192.168.0.0 – 192.168.255.255 Prepared by Saher Hasan Mohammed 27 Outbound Source: 10.10.10.121 Destination: 207.25.71.23 Source: 63.69.110.110 Destination: 207.25.71.23 Firewall Performing NAT Internal Network Source : 207.25.71.23 Destination: 10.10.10.121 Inbound Prepared by Saher Hasan Mohammed www.hotmail.com 207.25.71.23 Source : 207.25.71.23 Destination: 63.69.110.110 28