Professional Documents
Culture Documents
DHCP
Dynamic Host Configuration Protocol (DHCP) is a TCP/IP standard that reduces the complexity and administrative overhead
of managing network client IP address configurations by automating the assignment of IP addresses.
DNS
Domain Name System (DNS), in computer communications, is a method of translating Internet addresses so that computers
connected in the Internet can find each other. A DNS server translates a numerical address assigned to a computer (such as
207.46.228.91) into a sequence of words, and vice versa.
Network
Techniques, physical connections, and computer programs used to link two or more computers. Network users are able to
share files, printers, and other resources; send electronic messages; and run programs on other computers.
NOS
A network operating system (NOS) is an operating system that includes software to communicate with other computers by
means of a network. This allows such resources as files, application programs, and printers to be shared between computers.
Protocol
A set of established standards for data transfer that enables computers to communicate with each other
RAS
Remote Access Service (RAS) is a technology that permits remote users to log on to and use a corporate network.
VoIP
Voice over IP (VoIP) is a technology that enables voice communications (telephony) over the Internet.
WINS
Windows Internet Name Service (WINS) is the name resolution system used for Microsoft Windows NT® Server 4.0 and
earlier Microsoft operating systems.
Network Plan
Networking computers first and tracking the connections later can quickly become confusing and unmanageable as you try to
find which computer communicates with and shares resources with which other computers. Before you even connect your
first computers together, you should have a plan.
A networking plan could tell you that as specific types of sensitive data (like medical, personal, or payroll information) are
gathered or grouped, they should be stored higher in the hierarchical structure (ranked from most sensitive to least sensitive),
and this can save you time in the end. That plan should specify that the access requirements are stricter for sensitive data and
reduce the number of people able to use specific types of information.
The distribution side of the networking plan should spell out that the more an individual has access to the data in storage, the
less they should be able to share groups of information entrusted to them. For example, you may not mind sharing your first
name, but you would probably object to an instructor openly distributing all information in your school records to anyone
requesting it.
The network plan should also capture the hierarchy of information-that is how information may be organized in the order of
importanceyuyuuj
Network Components
A typical network consists of hardware: including cabling, routers, switches, hubs, physical servers, and other components,
and the software or firmware that controls the manner in which the hard components are utilized: the server, the client, the
operating systems and other applications.
A network consists of the infrastructure components through which computer systems and shared peripherals communicate
with each other. It is the most basic level of an IT infrastructure. Without network facilities, there is no infrastructure, just a
collection of individual computers.
Each of these components requires routine monitoring or maintenance to achieve negotiated operating levels. Components
are occasionally subject to fault or error, and they may be eventually replaced or upgraded to meet business demand. To
understand the processes required to operate the network, it is appropriate to briefly review the network components
themselves.
Hardware Components
The hardware layer of a network may be extensive, typically including the following components:
•
Cabling
•
Network adapters/network interface cards (NICs)
•
Hubs
•
Switches
•
Routers
•
Content switching
•
Wireless access points
•
Firewalls
These components may be supplied through a variety of vendors. In fact, depending on the degree of standardization to
which an IT organization subscribes, individual component categories—routers, for example—may be obtained from
multiple vendors. The product documentation accompanying these components generally describes their installation and
configuration in detail.
Network Processes
IT specialists recognize that their typical network-related workload is divided into three major categories.
Changing the network
Maintaining the network
Supporting the network
Maintaining a Network:
Network administrators must also maintain the infrastructure by monitoring its health and performing routine maintenance.
Operating the network infrastructure is largely a matter of monitoring its performance, evaluating that against expected
norms, and generating work items to troubleshoot if performance drops off.
Most hardware components within a network should operate without hands-on maintenance or intervention within the
manufacturer’s specifications for mean time between failure and other performance criteria.
The server-based components of the network do require periodic attention, however. These components require regular
backups, where applicable, and evaluations of storage or capacity requirements.
Supporting a Network:
Network support operations involve the troubleshooting of outages or other performance issues, which sometimes leads to
necessary changes in the infrastructure.
Network support is closely aligned with activities in Incident Management and Problem Management. Through the incident
resolution process, IT networking specialists correct network errors, develop workarounds, and prevent or mitigate
impending network issues.
The following section describes the network-specific processes for troubleshooting:
Network Troubleshooting
No matter how well a system has been designed or operated, there will always be issues that occur that will affect the
network; from hardware failures to user errors. Since many applications and services depend on network availability, the
pressure on the network administrators when a network component fails is significant. For this reason, it is crucial that
network troubleshooting techniques and tools be familiar to all those who provide support.
Network troubleshooting is performed by a special team of experts called a resolver group.
Troubleshooting Methodology
Network Manager
The network manager is responsible for providing network communications services for IT applications and services. Since
networking is critical to so many types of applications, network managers are usually under significant pressure to maintain
and improve the data communications infrastructure. As a result, the network manager must participate in IT design changes,
monitor the existing infrastructure, and repair the infrastructure when it fails.
Often the network manager will be assisted by junior network technicians and network support technicians in the
performance of his or her duties.
The main responsibilities for a Network Manager include:
Managing the data communications needs of the company.
Manages the physical network infrastructure, including wired and wireless local area network (LAN).
Manages infrastructure servers: Active Directory, WINS, DNS, DHCP, Proxy, RAS, and Internet Security and
Acceleration (ISA) Server.
Manages the acquisition of new network hardware as required.
Participates in network planning, design, development, deployment, and modification.
Network Technician
The network technician works closely with the network manager. In fact, the network technician performs the routine
monitoring of the network on behalf of the network manager. The network technician is the person who actually performs site
installations as directed by the network manager.
The main responsibilities for a Network Technician include:
Monitors and controls service levels of network suppliers.
Ensures detection of alerts from the network infrastructure.
Provides physical connections to the corporate LAN as required.
Ensures that data communications packets are routed efficiently.
Provides regular feedback on network performance, both in general and against specific service levels.
Monitors bandwidth use, analyzes traffic patterns and volumes, and determines impact/implications of issues.
Ensures security standards are upheld.
Outsourcing Manager
The outsourcing manager works with the network manager and the security manager to identify and mitigate potential
security risks associated with suppliers and vendors.
The main responsibilities for a Outsourcing Manager include:
Evaluates partner offerings for applicability to need.
Negotiates and manages costs associated with partnerships.
Determines which partners will be the primary source of service and which will be the secondary or backup partners.
Manages IT procurement and purchasing functions.
Monitors the performance of provider services.
Works with the partner to optimize performance.
Assesses and minimizes any security risks that a supplier poses.
Audits a supplier for security compliance.
Creates contingency plans in the event that one or more partners fail to meet their contractual obligations.
Each TCP/IP host is identified by a logical IP address. The IP address identifies a system’s location on the network in the
same way a street address identifies a house on a city block. Just as a street address must identify a unique residence, an IP
address must be globally unique and have a uniform format.
Each IP address includes a network ID and a host ID.
The network ID (also known as a network address) identifies the systems that are located on the same physical network
bounded by IP routers. All systems on the same physical network must have the same network ID. The network ID must
be unique to the internetwork.
The host ID (also known as a host address) identifies a workstation, server, router, or other TCP/IP host within a
network. The address for each host must be unique to the network ID.
Note: The use of the term network ID refers to any IP network ID, whether it is class-based, a subnet, or a supernet.
An IPv4 address is 32 bits long. The 32 bits of the IP address are divided into four 8-bit fields called octets. Each octet is
converted to a decimal number in the range 0-255 and separated by a period (a dot). This format is called dotted decimal
notation. The following table provides an example of an IP address in binary and dotted decimal formats.
Table 1: Example of an IP address in binary and dotted decimal format
Binary Format Dotted Decimal Notation
11000000 10101000 00000011 192.168.3.24
00011000
The notation w.x.y.z is used when referring to a generalized IP address and shown in figure below.
Address Classes
The Internet community originally defined five address classes to accommodate networks of varying sizes. Microsoft TCP/IP
supports class A, B, and C addresses assigned to hosts. The class of address defines which bits are used for the network ID
and which bits are used for the host ID. It also defines the possible number of networks and the number of hosts per network.
Class A
Class A addresses are assigned to networks with a very large number of hosts. The high-order bit in a class A address is
always set to zero. The next seven bits (completing the first octet) complete the network ID. The remaining 24 bits (the last
three octets) represent the host ID. This allows for 126 networks and 16,777,214 hosts per network. The figure below
Class B
Class B addresses are assigned to medium-sized to large-sized networks. The two high-order bits in a class B address are
always set to binary 1 0. The next 14 bits (completing the first two octets) complete the network ID. The remaining 16 bits
(last two octets) represent the host ID. This allows for 16,384 networks and 65,534 hosts per network. Figure 5 illustrates the
Class C
Class C addresses are used for small networks. The three high-order bits in a class C address are always set to binary 1 1 0.
The next 21 bits (completing the first three octets) complete the network ID. The remaining 8 bits (last octet) represent the
host ID. This allows for 2,097,152 networks and 254 hosts per network. Figure 6 illustrates the structure of class C
addresses.
Class D
Class D addresses are reserved for IP multicast addresses. The four high-order bits in a class D address are always set to
binary 1 1 1 0. The remaining bits are for the address that interested hosts will recognize. Microsoft supports class D
addresses for applications to multicast data to multicast-capable hosts on an internetwork.
Class E
Class E addresses are experimental addresses reserved for future use. The high-order bits in a class E address are set to 1 1 1
1.
Table 2 is a summary of address classes A, B, and C that can be used for host IP addresses.
Table 2 IP address class summary
The class A address 127.x.y.z is reserved for loopback testing and interprocess communication on the local computer.
Network ID Guidelines:
The network ID identifies the TCP/IP hosts that are located on the same physical network. All hosts on the same physical
network must be assigned the same network ID to communicate with each other.
Host ID Guidelines
The host ID identifies a TCP/IP host within a network. The combination of IP network ID and IP host ID is an IP address.
Follow these guidelines when assigning a host ID:
The host ID must be unique to the network ID.
All bits within the host ID cannot be set to 1, because this host ID is reserved as a broadcast address to send a packet to
all hosts on a network.
All bits in the host ID cannot be set to 0, because this host ID is reserved to denote the IP network ID.
Table 4 lists the valid ranges of host IDs based on the IP address classes.
Table 4 Class ranges of host IDs
Address Class First Host ID Last Host ID
Class A w.0.0.1 w.255.255.254
Class B w.x.0.1 w.x.255.254
Class C w.x.y.1 w.x.y.254
Network 139.12.0.0 is subnetted by utilizing the first 8 host bits (the third octet) for the new subnetted network ID. When
139.12.0.0 is subnetted, as shown in figure below, separate networks with their own subnetted network IDs (139.12.1.0,
139.12.2.0, 139.12.3.0) are created. The router is aware of the separate subnetted network IDs and will route IP packets to the
appropriate subnet.
Note that the rest of the IP internetwork still regards all the nodes on the three subnets as being on network 139.12.0.0. The
other routers in the IP internetwork are unaware of the subnetting being done on network 139.12.0.0, and therefore require no
reconfiguration.
Subnet Masks
With the advent of subnetting, one can no longer rely on the definition of the IP address classes to determine the network ID
in the IP address. A new value is needed to define which part of the IP address is the network ID and which part is the host
ID, regardless of whether class-based or subnetted network IDs are being used.
RFC 950 defines the use of a subnet mask (also referred to as an address mask) as a 32-bit value which is used to distinguish
the network ID from the host ID in an arbitrary IP address. The bits of the subnet mask are defined as:
All bits that correspond to the network ID are set to 1.
All bits that correspond to the host ID are set to 0.
Each host on a TCP/IP network requires a subnet mask even on a single-segment network. Either a default subnet mask,
which is used when using class-based network IDs, or a custom subnet mask, which is used when subnetting or supernetting,
is configured on each TCP/IP node.
Dotted Decimal Representation of Subnet Masks:
Subnet masks are frequently expressed in dotted decimal notation. Once the bits are set for the network ID and host ID
portion, the resulting 32-bit number is converted to dotted decimal notation. Note that even though expressed in dotted
decimal notation, a subnet mask is not an IP address.
A default subnet mask is based on the IP address classes and is used on TCP/IP networks that are not divided into subnets.
Table 5 lists the default subnet masks using the dotted decimal notation for the subnet mask.
Table 5 Default subnet masks in dotted decimal notation
Address Bits for Subnet Mask Subnet
Class Mask
Class A 11111111 00000000 00000000 255.0.0.0
00000000
Class B 11111111 11111111 00000000 255.255.0.
00000000 0
Class C 11111111 11111111 11111111 255.255.25
00000000 5.0
Custom subnet masks are those that differ from the above default subnet masks when doing subnetting or supernetting. For
example, 138.96.58.0 is an 8-bit subnetted class B network ID. Eight bits of the class-based host ID are being used to express
subnetted network IDs. The subnet mask uses a total of 24 bits (255.255.255.0) to define the subnetted network ID. The
subnetted network ID and its corresponding subnet mask is then expressed in dotted decimal notation as:
138.96.58.0, 255.255.255.0
Network Prefix Length Representation of Subnet Masks:
Since the network ID bits must be always chosen in a contiguous fashion from the high order bits, a shorthand way of
expressing a subnet mask is to denote the number of bits that define the network ID as a network prefix using the network
For example, the class B network ID 138.96.0.0 with the subnet mask of 255.255.0.0 would be expressed in network prefix
notation as 138.96.0.0/16.
As an example of a custom subnet mask, 138.96.58.0 is an 8-bit subnetted class B network ID. The subnet mask uses a total
of 24 bits to define the subnetted network ID. The subnetted network ID and its corresponding subnet mask is then expressed
in network prefix notation as:
138.96.58.0/24
Note Since all hosts on the same network must be using the same network ID, the ID must be defined by the same subnet
mask. For example, 138.23.0.0/16 is not the same network ID as 138.23.0.0/24. The network ID 138.23.0.0/16 implies a
range of valid host IP addresses from 138.23.0.1 to 138.23.255.254. The network ID 138.23.0.0/24 implies a range of valid
host IP addresses from 138.23.0.1 to 138.23.0.254. Clearly, these network IDs do not represent the same range of IP
addresses.
subnetting, we obtain 256 subnetted network IDs with 254 hosts per subnetted network ID.
Figure: Subnetting a class B network ID
In practice, network administrators define a maximum number of nodes they want on a single network. Recall that all nodes
on a single network share all the same broadcast traffic; i.e. they reside in the same broadcast domain. Therefore, growth in
the amount of subnets is favored over growth in the amount of hosts per subnet.
Follow these guidelines to determine the number of host bits to use for subnetting.
1. Determine how many subnets you need now and will need in the future. Each physical network is a subnet. WAN
connections may also count as subnets depending on whether your routers support unnumbered connections.
2. Use additional bits for the subnet mask if:
– You will never require as many hosts per subnet as allowed by the remaining bits.
– The number of subnets will increase in the future, requiring additional host bits.
To determine the desired subnetting scheme, you will start with an existing network ID to be subnetted. The network ID to be
subnetted can be a class-based network ID, a subnetted network ID, or a supernet. The existing network ID will contain a
series of network ID bits which are fixed, and a series of host ID bits which are variable. Based on your requirements for the
number of subnets and the number of hosts per subnet, you will choose a specific number of host bits to be used for the
subnetting.
Tables 7 and 8, 9 shows the subnetting of a class A, B and C network ID respectively. Based on a required number of subnets,
and a maximum number of hosts per subnet, a subnetting scheme can be chosen.
Table 7 Subnetting a Class A Network ID
Required number Number Subnet Mask Number of hosts
of subnets of host per subnet
Decimal Procedure
1. Based on n, the number of host bits chosen for subnetting, create a 3-column table with 2 n entries. Alternately, add two
columns to the previous table used for enumerating the subnetted network IDs. The first column is the subnet number
(starting with 1), the second column is the decimal representation of the first and last IP address for the subnetted network
ID, and the third column is the dotted decimal representation of the first and last IP address of the subnetted network ID.
2. Compute the increment value J based on h, the number of host bits remaining.
J = 2h - 2
3. For each decimal representation, the first IP address is N + 1 where N is the decimal representation of the subnetted
network ID. The last IP address is N + J.
4. Convert the decimal representation of the first and last IP addresses to dotted decimal notation (W.X.Y.Z) through the
following formula (where s is the decimal representation of the first or last IP address):
W = INT(s/16777216)
X = INT((s mod(16777216))/65536)
Y = INT((s mod(65536))/256)
Z = s mod(256)
INT( ) denotes integer division, mod( ) denotes the modulus, the remainder upon division.
5. Repeat steps 3 and 4 until the table is complete.
As an example, the range of IP addresses for the 3 bit subnetting of 192.168.0.0 is shown in Table 13. The increment J is 213 -
2 = 8190.
Table 13 Decimal enumeration of IP addresses
Subne Decimal Range of IP Addresses
In the latter perspective, IP network IDs lose their class-based heritage and become separate IP address spaces, subsets of the
original IP address space defined by the 32-bit IP address. Each IP network ID (class-based, subnetted, CIDR block), is an
address space in which certain bits are fixed (the network ID bits) and certain bits are variable (the host bits). The host bits
are assignable as host IDs or, using subnetting techniques, can be used in whatever manner best suits the needs of the
organization.
Public Addresses:
Public addresses are assigned by InterNIC and consist of class-based network IDs or blocks of CIDR-based addresses (called
CIDR blocks) that are guaranteed to be globally unique to the Internet.
When the public addresses are assigned, routes are programmed into the routers of the Internet so that traffic to the assigned
public addresses can reach their locations. Traffic to destination public addresses are reachable on the Internet.
For example, when an organization is assigned a CIDR block in the form of a network ID and subnet mask, that {network ID,
subnet mask} pair also exists as a route in the routers of the Internet. IP packets destined to an address within the CIDR block
are routed to the proper destination.
Illegal Addresses:
Private intranets that ha
+9ve no intent on connecting to the Internet can choose any addresses they want, even public addresses that have been
assigned by the InterNIC. If an organization later decides to connect to the Internet, its current address scheme may include
addresses already assigned by the InterNIC to other organizations. These addresses would be duplicate or conflicting
addresses and are known as illegal addresses. Connectivity from illegal addresses to Internet locations is not possible.
For example, a private organization chooses to use 207.46.130.0/24 as its intranet address space. The public address space
207.46.130.0/24 has been assigned to the Microsoft corporation and routes exist on the Internet routers to route all packets
destined to IP addresses on 207.46.130.0/24 to Microsoft routers. As long as the private organization does not connect to the
Internet, there is no problem, since the two address spaces are on separate IP internetworks. If the private organization then
connected directly to the Internet and continued to use 207.46.130.0/24 as its address space, then any Internet response traffic
to locations on the 207.46.130.0/24 network would be routed to Microsoft routers, not to the routers of the private
organization.
Private Addresses:
Each IP node requires an IP address that is globally unique to the IP internetwork. In the case of the Internet, each IP node on
a network connected to the Internet requires an IP address that is globally unique to the Internet. As the Internet grew,
IPV4-32 bits
IPV6-128 bits