How to Network Brochure - Leonardo 2010

74
 1 

Transcript of How to Network Brochure - Leonardo 2010

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 1/74

 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 2/74

 

SUMMARY:

CHAPTER I: Basics of networking, advantages, usabilities<<<<<<<<..3 CHAPTER II: The history of the Internet and the DNS<<<<<<<<<..12 

CHAPTER III: Connectors, switches and routers<<<<<<<<<<<...25 

CHAPTER IV: Network topologies<<<<<<<<<<<<<<<<<...33

CHAPTER V: Building a simple network with several computers on Windows

Operating System. Connecting a Linux based computer to a Local Area

Network<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<43 

APPENDIX I: Technical terms and explanations<<<<<<<<<<<<..57

APPENDIX II: The OSI Model<<<<<<<<<<<<<<<<<<<<.66APPENDIX III: Bibliography<<<<<<<<<<<<<<<<<<<<<70 

APPENDIX IV: Editorial Staff<<<<<<<<<<<<<<<<<<<<..72 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 3/74

 

CHAPTER I: Basics of networking,

advantages, usabilities 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 4/74

 

1.1 Definition 

When thinking of a network the main word is ‚interconnected‛. That refersto the fact that a series of systems - meaning computers and other devices - are

able to communicate among themselves

and share resources using communication

paths or channels.

This concept was initially conceived

  by the Advanced Research Projects

Agency that started funding the design ofthe first computer network in the world

for the United States Department of

Defense. The event happened in the beginning of the 1960s which led to the

development of network, starting in 1969.

1.2. Connections between computers. Peer to Peer Vs. Client-Server networks

Peer to Peer and Client-Server are the two basic concepts of networking,each describing a particular architecture. Because network access is not only

needed, but required, a Network Operating System, or NOS is installed onto

each PC in order to control the flow of information between users.

Peer to Peer 

A peer to peer network allows 2 or more PCs

to share tasks or work loads between peers. Peersare equally privileged and due to that, individual

resources such as disk drives, CD-ROM drives

and even printers, turn into shared devices that

can be accessed from every PC, without the need

for central coordination by servers or stable hosts.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 5/74

 

That means that all computers in the network can communicate directly to each

other and share all the resources. Peer-to-peer networks are appropriate only for

very small businesses or for home use because of the fact that they can only

support about 10 clients properly before getting overloaded. The systems used in

this type of network usually go up to Windows 2000 Professional.

For example, a Linux system would be unnecessary because there isn’t a

master computer.

Therefore, each client functions both as a client and as a server

simultaneously. Most NOSs allow each peer-to-peer user to determine which

resources will be available for use by other users. That means that if one user's

disk has been configured so that it is "shared", it will usually appear as a new

drive to the other users. Since users are allowed to control access to the resources

on their own computers, security becomes very risky in a peer-to-peerenvironment. There’s no central security or any way to control who shares what.

Users are free to create any network share points on their computers. The only

security on a peer-to-peer network is at the share level. When users create

network shares, they may implement no security, which means that anyone can

have full access to the share, or they may set a password on the share.

Depending on which networking platform you use, a user may be able to set

password to a share for read-only access and another password for full control

over the share.

Advantages:

  There are more resources available to serve each user than in a Client

Server network;

  There is no need for a network administrator;

  Network is fast/inexpensive to setup & maintain;

  Each PC can make backup copies of its data to other PCs for security;  Easiest type of network to build, peer-to-peer is perfect for both home and

office use.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 6/74

 

Drawbacks:

  The network isn’t as secure as it seems to be; 

  The system is not centralised, making administration difficult;

  Viruses can easily infiltrate into the system;

  Backup has to be performed on each computer separately.

Client-server 

The Client Server type of network divides

and distributes the tasks between servers,

which provide resources or services, and

clients, the service requesters. A servermachine is a host that is running one or more

server applications which share their

resources with clients. A client does not share

any of its resources, but requests the server's content or a service function.

Often clients and servers communicate over a computer network on separate

hardware, but both client and server may reside in the same system. A server

machine is a host that is running one or more server programs which share theirresources with clients

The server component provides a function or service to one or many clients,

which initiate requests for such services.

Comparison to peer-to-peer architecture

In peer-to-peer architectures, each host or instance of an application can

simultaneously act both as a client and a server, and each has equal

responsibilities and status. Both client-server and peer-to-peer architectures are

widely used today.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 7/74

 

Advantages

 Compared to peer to peer, client-server has a central server;

 In most of the cases, a client-server architecture enables the roles and

responsibilities of a computing system to be distributed among severalindependent computers that are known to each other only through a network;

 It functions with multiple different clients of different capabilities.

Disadvantages

 As the number of simultaneous client requests to a given server increases,

the server can become overloaded; 

 Can have a single point of failure; Generally more expensive and difficult to set up initially.

Point-to-point  

The Point-to-Point Protocol, or PPP, is a data link protocol commonly used

in establishing a direct connection between two networking nodes.

PPP is used over many types of physical networks including serial cable,

phone line, trunk line, mobile phones, specialized radio links, and fiber optic

links such as SONET.

Point-to-point and Client-Server are similar networks, but Client-Server is

 better because the connection is faster and easier to establish between hosts.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 8/74

 

1.3. Classification of the Networks

a)  Depending on their scales , usage and purpose , networks can be classified:

PAN (Personal Area N etwork) is used for communication between a computer and

different devices in a restricted area, that can be wired or wireless, such as

printers, scanners, fax machines, PDAs, telephones or video game consoles. The

reach of PAN typically extends to 10 meters.

LAN (Local  Area N etwork) connects computers and devices that are placed in

certain buildings such as home, schools, computer laboratories, office buildings.

Each computer or device on the network is a node. The connections can be alsowired or wireless with a bandwidth of 100 Mbps.

HAN ( H ome Area N etwork) is a residential

LAN used for communication among a

small number of personal computers and

accessories, such as printers and mobile

computing devices. It can also be referred

as OAN (O ffice Area N etwork).

CAN (Campus Area N etwork) consists of a

connection between different Local Area

Networks (LANs) within a restricted

geographical area, like academic departments, military bases or industrial

compounds.

WAN (W ide  Area N etwork) shares information on a larger scale using acommunication channel that combines many types of media, such as telephone

lines, cables, and air waves. Cities, countries and intercontinental distances limit

the area expansion of this kind of network.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 9/74

 

GAN (Global  Area N etwork) is a network used for supporting mobile

communications across an arbitrary number of wireless LANs, satellite coverage

areas. It involves a succession of terrestrial

wireless local area networks (WLAN).

EPN (Enterprise Private N etwork)

interconnects divers company sites, such as

production sites, head offices, remote offices

or shops for the purpose of sharing

computer resources.

VPN (V irtual Private N etwork) is a computer

network in which some of the links betweennodes are carried by open connections or

virtual circuits in some larger network, like

the Internet, instead of by physical wires.

 b) Depending on the connection method , the network can be classified:

A. Wired: Computers are interconnected with cables.

B. Wireless:

You can connect 2 or more devices without any cables in numerous ways:

a) via Infrared: which can transmit signals between devices within small

distances not more than 10 meters peer to peer or (face to face)

without any body in the line of transmitting.

b) Via Bluetooth: is an open wireless technology standard for

exchanging data over short distances creating personal area

networks (PANs) with high levels of security.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 10/74

 

10

c) Wi-Fi: A Wi-Fi enabled device such as a personal

computer, video game console, mobile phone, MP3

player or personal digital assistant can connect to the

Internet when within range of a wireless network

connected to the Internet.

1.6. Advantages

 File sharing - files and data can be directly shared using a network, with

no need for CDs/DVDs or USB flash drives. The distance is not an obstacle, as the

information from one PC to another can be easily sent.

 Software costs - the prices of lots of software are lower if bought for theentire network comparing to purchasing them individually. Upgrades are also

easier because changes only have to be done once on the file server instead of on

individual workstations.

 Security - certain folders can be protected by a password to limit the access

to authorized users. Important files on a network can be designed as ‚copy

inhibit‛ in order to avoid illegal copy of applications or other media resources. 

 Resource Sharing - all the computers on a network can share the same

resources, such as printers, fax machines, scanners or modems.

 Communication - using the electronic mail, those on the network can

communicate with each other even outside of the internet.

 Speed - file transfer speed between those on the network is much higher.

 Flexible access - files from computers can be accessed by users throughout

the network. A user can change computers in order to finish his work. Multiple

users can collaborate on the same project through the network.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 11/74

 

11

 Workgroup Computing - workgroup software like Microsoft BackOffice

enables many users to contribute to a document concurrently. This allows for

interactive teamwork.

1.7. Usabilities 

Networks have various usabilities in different domains.

1.Education Units  , characterized by academic networks (Campus Area

Network) . In the case of a university campus-based campus, the network links a

variety of campus buildings including; academic departments, the university

library and student residence halls. CAN networks have been created to facilitate

student access to the Internet and university resources. Same usability exists inthe pre-university education.

2.In the private domain (home), in which a network is used for

communication between digital devices typically deployed in the home, usually

a small number of personal computers and accessories, such as printers and

mobile computing devices. An important function is the sharing of Internet

access, often a broadband service through a CATV provider.

3.In the enterprise domain  , in which a network built by an enterpriseinterconnects various company sites, e.g., production websites, head offices,

remote offices, shops, in order to share computer resources.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 12/74

 

12

CHAPTER II: The history of the Internet

and the DNS 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 13/74

 

13

What does the Internet mean?

The Internet is a global system of interconnected computer networks that

use the standard Internet Protocol Suite (TCP/IP) to serve billions of users

worldwide. It is a network of networks that consists of millions of private, public,

academic, business, and government networks of local to global scope that are

linked by a broad array of electronic and optical networking technologies. The

Internet carries a vast array of information resources and services, most notably

the inter-linked hypertext documents of the World Wide Web (WWW) and the

infrastructure to support electronic mail.

When, how, why did the Internet appear?

The start of internet development was the actual competition between two

greatest powers of the XX century, U.S.A and U.R.S.S. In 1957, U.R.S.S launches

the first artificial earth satellite into the outer space named Sputnik. This fact

created a big concern on the U.S.A and that's why the president of U.S.A

founded a special agency subordinated to the Pentagon (www.darpa.mil) . This

agency of the department of defence was conducted by science men and has the

mission of keeping the technological superiority of the U.S.A army by

sponsoring the most revolutionary scientific discoveries and by the investment ofunlimited founds for the creation of a bound between the scientific research and

the military technological implementation of it.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 14/74

 

14

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 15/74

 

15

What is DARPA?

The Defense Advanced Research Projects A gency (DARPA) is an agency of the

United States Department of Defense responsible for the development of new

technology for use by the military. DARPA has been responsible for funding the

development of many technologies which have had a major effect on the world,

including computer networking, as well as NLS, which was both the first

hypertext system, and an important precursor to the contemporary ubiquitous

graphical user interface. Its original name was simply  Advanced Research Projects

 A gency (ARPA), but it was renamed DARPA (for Defense) during March 1972,

then renamed ARPA again during February 1993, and then renamed DARPA

again during March 1996.

DARPA was established during 1958 (as ARPA) in response to the Sovietlaunching of Sputnik during 1957, with the mission of keeping U.S. military

technology more sophisticated than that of the nation's potential enemies. From

DARPA's own introduction. DARPA’s original mission, established in 1958, was

to prevent technological surprise like the launch of Sputnik, which signaled that

the Soviets had beaten the U.S. into space. The mission statement has evolved

over time. Today, DARPA’s mission is still to prevent technological surprise to

the US, but also to create technological surprise for its enemies.

How did the ARPANET network function?

After much work, the first two nodes of what would become the

ARPANET were interconnected between Kleinrock's Network Measurement

Center at the UCLA's School of Engineering and Applied Science and Douglas

Engelbart's NLS system at SRI International (SRI) in Menlo Park, California, on

29 October 1969. The third site on the ARPANET was the Culler-Fried Interactive

Mathematics centre at the University of California at Santa Barbara, and thefourth was the University of Utah Graphics Department. In an early sign of

future growth, there were already fifteen sites connected to the young

ARPANET by the end of 1971. All of these were coded in a protocol which could

regulate the transmission of data. In it’s final form this was TCP/IP

(Transmission Control Protocol / Internet Protocol) created by Vint Cerf and

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 16/74

 

16

Robert Kahn in 1970 which still is the Internet basis. ARPANET, set out to create

a separate commercial version after establishing "value added carriers" was

legalized in the U.S. The network they established was called Telnet and began

operation in 1975, installing free public dial-up access in cities throughout the

U.S. Telnet was the first packet-switching network open to the general public.

How was the information transmitted between the computers?

Researcher Lawrence Roberts supports a solution for interconnection by packe

switching in the so-called ‘‘client-server‛ model. Thus, the information was splitte

into small pieces named packets in order to be transmitted. Every packet contained

information about the receiver, so that he could be correctly introduced in th

network . The whole information is reassembled, at the destination.

The evolution of the Internet:

The first form of Internet which was developed years ago was way differentfrom the internet we are using today. Internet has taken many forms during its

evolution. Many new innovations have been introduced into the Internet since

then – And hence today we are experiencing the Internet which is more

sophisticated and brims with higher speed, greater reliability, and larger

 bandwidth.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 17/74

 

17

By the 1990s, the internet was being used by academic and research institutes

only. A new technology named World Wide Web was invented by CERN

physicist Tim Berners – Lee. The WWW brought a whole new revolution in the

Internet and the Internet became extremely popular among non-academic users

as well. Much of this progress was fuelled by Internet Service Providers (ISPs)

which enabled the users to get connected to internet from their homes.

Here’s a brief description of birth evolution of the Internet: 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 18/74

 

18

Prevalence of the Internet world is huge: on June 30, 2009 had access to the

Internet about 1.67 billion inhabitants of the Earth.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 19/74

 

19

THE HISTORY OF THE DNS

What were the origins of the DNS?

The Domain Name System was originally invented to support the growth of

email communications on the ARPANET, and now supports the Internet on a

global scale. Alphabetic host names were introduced on the ARPANET shortly

after its creation, and greatly increased usability since alphabetic names are

much easier to remember than semantically meaningless numeric addresses.

Host names were also useful for development of network-aware computer

programs, since they could reference a constant host name without concern

about changes to the physical address due to network alterations. Of course, the

infrastructure of the underlying network was still based on numeric addresses,so each site maintained a "HOSTS.TXT" file that provided a mapping between

host names and network addresses in a set of simple text records that could be

easily read by a person or program.

Was the system efficient enough?

It wasn't long before people realized that keeping multiple copies of the hosts

file was inefficient and error-prone. Starting with a formal proposal forcentralization in Host Names On-line, RFC 606, in December, 1973, proceeding

through agreement in Host Names On-Line, RFC 608, and further discussions

and comments on On-Line Host Name Service, RFC 623, it was settled by March,

1974 with On Line Hostnames Service, RFC 625, that the Stanford Research

Institute Network Information Center (NIC) would serve as the official source of

the master hosts file. This centralized system worked well for about a decade,

approximately 1973 to 1983. However, by the early 1980's the disadvantages of

centralized management of a large amount of dynamic data were becomingapparent. The hosts file was becoming larger, the rate of change was growing as

the network expanded, more hosts were downloading the entire file nightly, and

there were always errors that were then propagated network-wide. Change was

required, but a spark was needed. A group of ARPANET researchers, principles,

and related parties held a meeting in January, 1982, to discuss a solution for

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 20/74

 

20

email relaying. As described on the email addresses page, email was often

originally sent from site to site to its destination along a path of systems, and

might need to go through a half a dozen or more links that would connect at

certain times of the day. For example, the following actual communication path

shows individual systems separated by "!",with the destination user named "grg"

tagged on at the end.

utzoo!decvax!harpo!eagle!mhtsa!ihnss!ihuxp!grg.

What is 'BIND'?

The application that runs almost every DNS server on the Internet is called

BIND, for Berkeley Internet Name Domain, first developed as a graduate student

project at the University of California at Berkeley, and maintained throughversion 4.8.3 by the university's Computer Systems Research Group

(CSRG).Versions 4.9 and 4.9.1 of BIND were released by then the number two

computer company, Digital Equipment Corporation. The lead developer was

Paul Vixie. After Vixie left to establish Vixie Enterprises, he sponsored the

development of BIND Version 4.9.2, and became the application's principal

architect. Versions 4.9.3 on have been developed and maintained by the Internet

Systems Consortium. A major architectural update called Version 8 was co-

developed by Bob Halley and Paul Vixie and released in May 1997. Anothermajor architectural rewrite called Version 9 with enhanced security support was

developed and released in the year 2000.

Did you know that… 

In 1971 the first e-mail was sent between two computers. Tomlinson was the

one who created a program called SNDMSG who sent a simple email to a

computer near the ARPAnet network. He was the one who put the @ in your e-mail. The first e-mail address in the world was "Tomlinson @ bbn-tenexa. Tenexa

was the name of operating system you use, and BBN were the initials of an

employee's Tomlinson.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 21/74

 

21

THE HISTORY OF WEB BROWSERS

What is a Web Browser?

A web browser is a software application whose aim is to download and

present the www (World Wide Web) resources. The information on www are

identified using URI (Uniform Resource Identifier). The best known browsers

nowadays are Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari

and Opera for Windows and Apple Safari, Mozilla Firefox and Opera for Mac.

How did the first Web Browser appear?

The history of web browsers started around the 80s when a variety of

technologies led to the first World Wide Web browser appearance. This browser

was rolling on the NEXTSTEP platform and was renamed Nexus to avoid the

confusion with World Wide Web. After that, ViolaWWW appeared. This was themost popular browser until 1993. It was the first browser to support embedded

scriptable objects, stylesheets, and tables. Both projects were influenced a lot by

the technological progress during the 80s when the appearance and development

of the Internet took place.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 22/74

 

22

How did the browsers evolve?

Mosaic followed ViolaWWW. This browser was considered the first browser

with a graphical interface. It went through the FTP, Usenet and Gopher

protocols. The easily understood interface, the portability and the ease of

installation led to the raise of the number of clients. It was also the first browser

to show the pictures inside the page and not in other windows.

The most popular browsers within the MAC users remain Apple Safari in the

first place, followed by Firefox, Camino and Flock. Apart from that, one of the

most popular browsers within the Unix users remains Lynx, the oldest browser

until now. Google tried to create problems in this domain by launching Google

Chrome by the end of 2008, a browser which attracted almost 4% of the webusers, because of its ease and speed.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 23/74

 

23

What is WEB 2.0?

The term web 2.0 is commonly associated with web applications that facilitate

interactive information sharing, interoperability, user-centered design, and

collaboration on the World Wide Web. A web 2.0 site gives its users the free

choice to interact or collaborate with each other in a social media dialogue as

creators of user-generated content in a virtual community, in contrast to websites

where users are limited to the passive viewing of content that was created for

them. Examples of Web 2.0 include social-networking sites, blogs, wikis, video-

sharing sites, hosted services, web applications, mashups and folksonomies.

The term is closely associated with Tim O'Reilly because of the O'Reilly Media

Web 2.0 conference in 2004. Although the term suggests a new version of the

World Wide Web, it does not refer to an update to any technical specifications, but rather to cumulative changes in the ways software developers and end-users

use the Web. Whether Web 2.0 is qualitatively different from prior web

technologies has been challenged by World Wide Web inventor Tim Berners-Lee,

who called the term a "piece of jargon", precisely because he intended the Web in

his vision as "a collaborative medium, a place where we [could] all meet and

read and write". He called it the 'Read/Write Web'.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 24/74

 

24

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 25/74

 

25

CHAPTER III: Connectors, switches and

routers 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 26/74

 

26

I. Cables and connectors

A cable is represented by two or more wires running side by side and

 bonded, twisted or braided together to form a single assembly.

There are many categories of cables you can use, according to the

transmission speed, the distances and the security you need to implement:

  Coaxial cable

  Twisted pair cable

  Optical fiber

1.  a. Coaxial cable

Coaxial cable, or coax, is an

electrical cable with an inner

conductor surrounded by aflexible, tubular insulating layer,

surrounded by a tubular

conducting shield.

Like any electrical power cord, coaxial cable conducts electric current

 between locations. Like these other cables, it has two conductors, the central wire

and the tubular shield. At any moment the current is traveling outward from the

source in one of the conductors, and returning in the other.

Short coaxial cables are commonly used to connect home video equipment,in ham radio setups, and in measurement electronics. They used to be common

for implementing computer

networks, in particular Ethernet, but

twisted pair cables have replaced

them in most applications except in

the growing consumer cable modem

market for broadband Internet

access.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 27/74

 

27

1.  b. Coaxial connectors

Coaxial connectors are designed to maintain a coaxial

form across the connection and have the same well-defined

impedance as the attached cable.

2. Twisted cablesTwisted pair cabling is a type of wiring

in which two conductors (forward and

return conductors of a single circuit) are

twisted together for the purpose of

canceling out electromagnetic interference.

Twisted pair cabling comes in two

varieties: shielded and unshielded.

2. A. a. Unshielded twisted pair cable

Unshielded twisted pair (UTP) is the most popular and is generally the best

option for school networks.

The quality of UTP may vary from telephone-grade wire to extremely high-

speed cable. The cable has four pairs of wires inside the jacket. Each pair is

twisted with a different number of twists per inch to help eliminate interference

from adjacent pairs and other electrical devices. The tighter the twisting, the

higher the supported transmission rate.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 28/74

 

28

Cat1* Analog voice (POTS), ISDN (one Pair) – 1Mhz up to 1Mbits/s;

Cat2* Mainly used in Token Ring networks

Cat 3 Bandwidth 16Mhz. Data carrying up to 10 Mbits/s

Cat 4 Used in 16Mbit/s Token Ring. Not used much.

Cat 5 A twisted pair high signal integrity cable. ‛Mostly unshielded‛ 

Cat 6 Standard provides performance up to 500Mhz and 10Gbit/s.

Cat 7 Features more specifications for crosstalk and system noise then

previous categories. Shielding was added for individual wire

pairs and the cable as a whole. Frequency up to 1000Mhz.

10Gbit/s at 100 meters. 40Gbit/s possible at 50 meters. 100Gbit/s

at 15 meters.

*All categories are backwards compatible.

2.  A. b Unshielded twisted pair connector

The standard connector for unshielded twisted

pair cabling is an RJ-45 connector. This is a plastic

connector that looks like a large telephone-style

connector.

2.  B. Shielded twisted pair cable

Although UTP cable is the least expensive cable, it may be susceptible to

radio and electrical frequency interference (it should not be too close to electric

motors, fluorescent lights, etc.). If you must place cable in environments with lotsof potential interference, or if you must place cable in extremely sensitive

environments that may be susceptible to the electrical current in the UTP,

shielded twisted pair may be the solution. Shielded cables can also help to extend

the maximum distance of the cables.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 29/74

 

29

Shielded twisted pair cable is

available in three different

configurations:

  Each pair of wires is individually

shielded with foil.

  There is a foil or braid shield inside

the jacket covering all wires (as a

group).

  There is a shield around each

individual pair, as well as around

the entire group of wires (referred

to as double shield twisted pair).

3.  Fiber optic cable

Fiber optic cabling consists of a center glass core surrounded by several layers

of protective materials (See fig. 5). It transmits light eliminating the problem of

electrical interference. This makes it ideal for certain environments that contain a

large amount of electrical interference. It has also made it the standard for

connecting networks in between.Fiber optic cable has the ability to transmit signals over much longer distances

than coaxial and twisted pair. It also has the capability to carry information at

much higher speeds. This capacity broadens communication possibilities to

include services such as video conferencing and interactive services.

There are two common types of fiber cables: single mode and multimode.

Multimode cable has a larger diameter; however, both cables provide large

  bandwidth at high speeds. Single mode can transmit signals over a greater

distance, but it is more expensive.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 30/74

 

30

Installing Cables:

  It is always recommended to use more cables than you need. You should

leave plenty of slack.

  Every time you install a new part of the network, you should test it first.

There are problems that may occur even if that certain part is brand new.  You should stay at least 1 meter away from sources of electrical

interference and fluorescent light boxes.

  If the cable runs across the floor, cover it with cable protectors.

  Label both ends of each cable.

  In order to keep cables in the same location together, use cable ties.

II.Routers

A router represents the electronic device which is used for interconnectingand interchanging packets of data between two or more computer networks.

Routers are located at gateways, the places where two or more networks connect.

Routers connect two or more logical subnets, each having a different network

address.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 31/74

 

31

Routers come in all sizes and shapes and are used for companies, houses,

 businesses, ISPs themselves and many other things. The router is the only device

that enables you to see every message sent between the network. For the router

to decide where the package of data should go, it needs a configuration table,

which is a collection of information:

  specifications on which connections lead to particular groups of addresses;

  priorities for connections;

  rules for handling both routine and special cases of traffic. The computer

you'd like to receive the message has to be connected to a router to be able

to communicate between the network.

There are different types of routers such as

wired and wireless. A wired router can onlytransmit data if you have an Ethernet cables. The

advantage of using a wired connection instead of

a wireless one is the fact that the security is

higher, as well as the transfer rates. The wireless

router has to be provided with a cable, from

where the information comes and after that it is

transmitted out by radio waves.

III.Switches

A network switch or switching hub is a computer networking device that

connects network segments. The term commonly refers to a network bridge that

processes and routes data at the data link layer (layer 2) of the OSI model.

Switches that additionally process data at the network layer (layer 3 and above)are often referred to as Layer 3 switches or multilayer switches.

In some service provider and other environments where there is a need for a

great deal of analysis of network performance and security, switches may be

connected between WAN (Wide Area Network) routers as places for analytic

modules. Some vendors provide firewall, network intrusion detection, and

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 32/74

 

32

performance analysis modules that can plug into switch ports and help to secure

your network.

Switches are similar to network hubs and are usually included as part of a

router. However, switches prevent data packets from colliding with one another

in the network, unlike the hubs do.

The above switch can establish a connection between 24computers. A standard switch can have maximum 48 ports

and is used in big enterprises.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 33/74

 

33

CHAPTER IV: NETWORK TOPOLOGIES 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 34/74

 

34

Network topology is defined as the interconnection of the various elements

(links, nodes, etc.) of a computer network.

There are two main categories of topologies:

  Physical- the design of a network including the devices, location and cable

installation;

  Logical - how data is actually transferred in a network as opposed to its

physical design.

BUS TOPOLOGY

A bus topology is a network architecture in which a set of clients are

connected via a shared communications line. A bus is usually referred as the

cable that connects end to end and this is used to transmit the signals.

Advantages

  If one computer fails, the others are still not affected and they continue to

work;

  It‘s easy to implement, to extend and to install;   Well-suited for temporary or small networks: not requiring high speeds

(quick setup);

  Cheaper than other topologies. Effective cost: only a single cable is used;

  Easy identification of cable faults.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 35/74

 

35

Disadvantages

  If there is a problem with the cable, the entire network breaks down;

  Performance degrades as additional computers are added or on heavy

traffic (shared bandwidth);

  Proper termination is required (loop must be in closed path);

  Significant Capacitive Load (each bus transaction must be able to stretch to

most distant link).

  It works better with limited number of nodes.

  Passivity – the computers on the bus are not responsible for moving the

signal along, they simply listen for a signal;

  When a device sends it’s packet out over the bus, every other network card

on the bus sees and reads that packet;

  Only one packet can remain on the bus during one clock pulse;  When two cards send packets at the same time, it results a collision, and

the cards themselves arbitrate to decide which one will resend its packet

first.

STAR TOPOLOGY 

A star network consists of one central switch, hub or computer, which acts

as a conduit to transmit messages. Thus, the switch, the leaf nodes, and the

transmission lines between them, form a graph with the topology of a star.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 36/74

 

36

Advantages:

  Higher performance: star topology prevents the passing of data packets

through an excessive number of nodes. At most, 3 devices and 2 links areinvolved in any communication between any two devices. Although this

topology places a huge overhead on the central switch, with adequate

capacity, the switch can handle very high utilization by one device without

affecting others;

  Isolation of devices: Each device is inherently isolated by the link that

connects it to the switch. This makes the isolation of individual devices

straightforward and amounts to disconnecting each device from the others.

This isolation also prevents any non-centralized failure from affecting thenetwork;

  Benefits from centralization: As the central switch is the bottleneck,

increasing it’s capacity, or connecting additional devices to it, you can

increase the size of the network very easily. Centralization also allows the

inspection of traffic through the network. This facilitates analysis of the

traffic and detection of suspicious behaviour;

  Simplicity: This topology is easy to understand, establish, and navigate.

It’s simplicity obviates the need for complex routing or message passingprotocols. Also, as noted earlier, the isolation and centralization it allows

simplify fault detection, as each link or device can be probed individually;

  Easy to install, to wire, to detect faults and to remove parts;

  No disruptions to the network when connecting or removing devices.

Disadvantages:

  The high dependence of the system on the functioning of the centralswitch. While the failure of an individual link only results in the isolation

of a single node, the failure of the central hub switch the network

inoperable, immediately isolating all nodes;

  The performance and scalability of the network also depend on the

capabilities of the switch;

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 37/74

 

37

  Network size is limited by the number of connections that can be made to

the hub, and performance for the entire network is capped by it’s

throughput;

  Wiring up of the system can be very complex and high costing.

RING TOPOLOGY

A ring network is a network topology in which each node connects to

exactly two other nodes, forming a single continuous pathway for signals

through each node, a ring. Data travels from node to node, with each node along

the way handling every packet

Advantages:

  Every device has access to the token and the opportunity to transmit data

packets;

  Performs better than a star topology under heavy network load;

  Can create a much larger network using Token Ring;

  Does not require a network server to manage the connectivity between the

computers.

Disadvantages:

  One malfunctioning workstation or bad port in the MAU can create

problems for the entire network;

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 38/74

 

38

  Moves, adds and changes of devices can affect the network;

  Network adapter cards and MAU's are much more expensive than

Ethernet cards and switches;

  Much slower than an Ethernet network under normal load.

HYBRID TOPOLOGY

Hybrid networks use a combination of any two or more topologies in such

a way that the resulting network does not exhibit one of the standard topologies

(bus, star, ring, etc.). A hybrid topology is always produced when two different

 basic network topologies are connected.

Advantages:

  It can be designed in many ways for various purposes.

Disadvantages:

  It is costly.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 39/74

 

39

TREE TOPOLOGY

In tree network, the nodes are connected to each other to form a tree structure.

Typically to form a tree network, multiple star and bus topologies are combined

together. On tree topology the switches of each star topology are connected tothe central switch that controls the entire network. However, some nodes can be

directly connected to the central switch.

Advantages: 

The tree topology has the same advantages as star topology but it has some

additional advantages. These are.

  Point-to-point wiring for individual segments;

  Supported by several hardware and software companies;

  It allows more devices to be connected to the central switch.

Disadvantages: 

The tree topology also has the same disadvantages as star topology but it hassome additional disadvantages such as:

  It is more expansive because more hubs are required to install the network;

  Overall length of each segment is limited by the type of cabling used;

  If the backbone line breaks, the entire segment goes down;

  More difficult to configure and wire than other topologies.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 40/74

 

40

STAR-RING TOPOLOGY 

In the star-ring physical topology, individual devices are connected to a

central switch, just as they are in a star or distributed star network. However,

within each switch the physical connections form a ring. Where multipleswitches are used, the ring in each switch is opened, leaving two ends. Each open

end is connected to an open end of some other switch (each to a different switch),

so that the entire network cable forms one physical ring.

In the star-ring physical topology, the hubs are "intelligent." Currently, the

star topology and its derivatives are preferred by most network designers and

installers. 

Advantages:

  If the physical ring is somehow broken, each switch is able to close the

physical circuit at any point in it’s internal ring, so that the ring is restored.

  These topologies make it simple to add network devices anywhere on the

network;

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 41/74

 

41

  New computers can be easily added;

  Cable layouts are easy to modify (you can simply install one new cable

 between the central connection point). 

Disadvantages :

  Are susceptible to bottlenecking and single-point failure , however it could

 be remedied by providing a redundant backup of the switch node;

  Expanding the system can be costly;

  Uses a large amount of cable;

  Network reconfiguration disrupts operation.

MESH TOPOLOGY

The mesh topology incorporates a unique network design in which each

computer on the network connects to every other, creating a point-to-point

connection between every device on the network.

Advantages:

  Eliminates traffic problems in links sharing;

 

Point-to-point link make fault identification and fault isolation easy.;  Provides redundant paths between devices;

  The network can be expanded without disruption to current users;

  It has multiple links, so if one route is blocked then other routes can be

used for data communication;

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 42/74

 

42

  Each connection can have it’s own data load, so the traffic problem is

eliminated;

  It ensures the data privacy and security, because every message travels

along a dedicated link;

  Troubleshooting of this topology is easy as compared to others;

  Its performance is not affected with heavy load of data transmission.

Disadvantages:

  Requires more cable than the other LAN topologies, for the wiring

connection, and it can be difficult to manage;

  Complicated implementation, installation and reconnection;

  It is generally too costly and complex for practical networks.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 43/74

 

43

CHAPTER V: Building a simple network

with several computers on Windows

Operating System. Connecting a Linux

 based computer to a Local Area Network 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 44/74

 

44

Building a network using computers with Windows operating system

installed on them is quite simple due to the user-friendly interface you benefit

from. You don’t need to have any advanced knowledge in networking either.

You only have to know a few basic rules. It doesn’t even matter what network

topology you want to use, because the software configuration is the same.

First of all  , all the computers in the network have to be in the same

workgroup. You will learn how to set the workgroup name on a specific

computer with Windows XP installed. It is almost the same story if you use

Windows Vista or Windows 7. Please follow the steps below:

1.  Click the Start button and enter the Control Panel:

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 45/74

 

45

2.  If you have never accessed Control Panel, you should click on ‚Switch to

Classic View‛ option: 

3.  Double click on the ‚System‛ icon: 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 46/74

 

46

4.  Click on the ‚Computer Name‛ tab: 

5.  Click on the ‚Change‛ button. A window like the one below will pop-up:

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 47/74

 

47

You can change the workgroup name by editing the workgroup field.

When you are done, click on the ‚OK‛ button. You will be asked to restart your

system in order for the changes to take effect.

The next step is to set the computer IP addresses. Probably you’re now

wondering what the IP addresses are. Well, there are unique numbers to identify

computers within a network. Imagine them as being telephone numbers of

computers. There are 2 types of IP addresses: public and private. Public IP

addresses are those assigned to the computers when connected to the Internet.

Private IP addresses are those in a home network, that are never used on the

Internet.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 48/74

 

48

Therefore, the computers in your network must have private IP addresses

from the following ranges:

  10.0.0.0 – 10.255.255.255

  172.16.0.0 – 172.31.255.255

  192.168.0.0 – 192.168.255.255

It is recommended to use the third range.

You can set the IP address of a specific computer in the network by

following the steps below:

1.  Click the Start button and enter the Control Panel:

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 49/74

 

49

2. Click on the ‚Network Connections‛ icon: 

3.  Right click on the network connection you want to configure, and then

choose ‚Properties‛: 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 50/74

 

50

4.  A window like below will pop up:

5.  Now check the ‚Use the following IP addresses‛ radio box. The ‚Use the

following DNS server addresses‛ radio box will be checked automatically: 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 51/74

 

51

Now you have to decide what you are building the network for. You can

  build the network just for sharing files/and or printers between several

computers, but if you want to establish an Internet connection on all of them, you

have to set the Default gateway and the Preferred DNS server.

The gateway is the computer that shares the Internet connection with the

other computers in the same subnet. Almost always, the DNS server is the same

computer.

In conclusion, you have to complete the ‚Default gateway‛ field and the

‚Preferred DNS server‛ field with the IP address of that computer. You will

learn how to share the Internet connection on the gateway later.

Also, the ‚subnet mask‛ field will be completed automatically when you

click on it.

An example of IP configuration is shown below:

After configuring the IP addresses, click on the ‚OK‛ button. 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 52/74

 

52

To share files in the network you’ve just created, follow the steps below:

1.  After clicking on ‚My Computer‛, right click on the folder or partition that

you want to share, then choose ‚Properties‛: 

2.  A window like below should pop-up. Click on the ‚Sharing‛ tab, and then

click on ‚If you understand the risks, but you still want to share the root of

drive, click here‛: 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 53/74

 

53

3.  Check the ‚Share this folder on the network‛ option. If you are on a

network where you trust all the persons having access to it (ex. at home)

and you want to allow the network user to change your files (edit them,

move them, delete them,...), then check the ‚Allow network user to change

my files‛ option:

Your shared folder / drive should now be accessible through ‚My network

places‛ on all computers within your network:

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 54/74

 

54

To share the Internet Connection in the network you have created, you

have to follow the steps below on the computer acting as a gateway:

1.  After entering the control panel, click on the ‚Network Connections‛ icon: 

2.  Right click on the connection that you want to share, and then on

‚Properties‛: 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 55/74

 

55

3.  A window like below should pop-up. Click on the ‚Advanced‛ tab: 

4.  Check the ‚Allow other network users to connect through this computer’s

Internet connection‛. If you want to allow other users in the network to

enable/disable the connection check the ‚Allow other network users to

control or disable the shared Internet connection‛ checkbox. 

Remember that only on the other computers, you will have to input the IP of

the computer that shares the Internet connection into the ‚Default gateway‛ and

the ‚Preferred DNS server‛ fields on the General tab of Local Area Connection

Properties.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 56/74

 

56

Now you will learn how to connect a computer with GNU/Linux installed

to a TCP/IP network.

After installing GNU/Linux on a computer and assigning it the IP address,

you will need to give it a secondary IP address which should share the same

subnet with the main router if your network is part of a bigger LAN.

1.  Go to ‚Applications‛ menu 

2.  Click ‚Accessories‛ 

3.  Click ‚Terminal‛ 

4.  Type "ifconfig eth0:0 (IP)", where ‚(IP)‛ is the IP address which you

assigned to the computer.

To set the gateway type: "route add default gw (IP of gateway)"

You need to mask the PCs behind your gateway in order to gain access to the

Internet. Turn on NAT (Network Address Translation) and masquerading on bytyping: "iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE"

*Tip: If your subnet's gateway has Linux OS installed you need to type the

following commands every time you turn it on in order to connect to the

internet:

1. "ech0 1 >/proc/sys/net/ipv4/ip_forward" - turns it into a router for the other PCs in

your subnet

2. "ifconfig eth0:0 (IP)"3. "route add default gw (IP of the central gateway)"

**You can check your configuration with the command ‚ifconfig‛. 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 57/74

 

57

APPENDIX I: TECHNICAL TERMS AND

EXPLANATIONS 

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 58/74

 

58

COAXIAL CABLE

Coaxial cable is the kind of copper cable

used by cable TV companies between the

community antenna and user homes and

  businesses. Coaxial cable is sometimes used by

telephone companies from their central office to

the telephone poles near users. It is also widely

installed for use in business and corporation Ethernet and other types of local

area network. Coaxial cable is called "coaxial" because it includes one physical

channel that carries the signal surrounded by another concentric physical

channel, both running along the same axis. The outer channel serves as a ground.

Many of these cables or pairs of coaxial tubes can be placed in a single outersheathing and, with repeaters, can carry information for a great distance.

TWISTED PAIR CABLE

Twisted pair is the type of cable that consists of two independently wires

(the forward and return conductors of a single circuit) twisted around one

another.

CONVERTERA converter is a device that helps us to interconnect different types of

cables by converting data from one cable to another.

HUB

In general, a hub is the central part of a wheel where the spokes come

together. In data communications, a hub is the central connection for all the

computers in a network, usually Ethernet-based. So this hardware device is a

place of convergence and when a piece of information arrives at one of itsports, it is copied and sent to the other ports, so that all the segments of the Local

Area Network can see it.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 59/74

 

59

SWITCH

Nowadays, the hubs are no longer used. We use

switches instead. The advantage of using a

switch over a hub is that most of the network

traffic only goes where it needs to rather than to

every port. This makes the network significantly

faster. 

NIC 

A network interface card (NIC) is a

computer circuit board or card that is

installed in a computer so that it can beconnected to a network. Personal

computers and workstations on a local

area network (LAN) typically contain a

network interface card specifically

designed for the LAN transmission technology, such as Ethernet or Token Ring.

Network interface cards provide a dedicated, full-time connection to a network.

Most home and portable computers connect to the Internet through as-needed

dial-up connection. The modem provides the connection interface to the Internetservice provider. 

NETWORK PANEL

It is a panel of network ports contained together, usually within a

telecommunication node that connects incoming and outgoing lines of a Local

Area Network.

PATCH PANELIn a LAN, the patch panel connects the network's computers to each other

and to the outside lines that enable the LAN to connect to the Internet (with

patch cords). The patch panel allows circuits to be arranged and rearranged by

plugging and unplugging the patch cords. Patch panels also allow technicians to

quickly change the path of signals, without switching equipment. Patch panels

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 60/74

 

60

was first used by early telephone exchanges but nowadays they are used to

connect different devices, such as microphones, electric or electronic instruments,

effects etc.

TCP 

The Transmission Control Protocol (TCP) is one of the core protocols of the

Internet Protocol Suite. TCP is one of the two original components of the suite,

complementing the Internet Protocol (IP) and therefore the entire suite is

commonly referred to as TCP/IP.

A TCP connection provides the service of exchanging data directly between

two hosts reliably This means that a connection must be established and

announced - both sides must

acknowledge the state of the connection. If data packets are lost they are

retransmitted.TCP guarantees delivery of data and also guarantees that packets will be

delivered in the same order in which they were sent. Major Internet applications

rely on TCP: Mail, WWW, File Transfer.

The advantages: reliable connection, the applications using TCP don't

care about the state of the connection (not necessarily);

The disadvantage: protocol overhead.

IP ADDRESSAn Internet Protocol address (IP address) is a numerical label that is

assigned to devices participating in a computer network that uses the Internet

Protocol for communication between its nodes. The format of an IP address is a

32-bit numeric address written as four numbers separated by periods. Each

number can be zero to 255. For example, 89.38.207.120 could be an IP address.

The four numbers in an IP address are used in different ways to identify a

particular network and a host on that network.

Static and Dynamic IP

Network infrastructure devices such as servers, routers and firewalls are

typically assigned permanent "static" IP addresses. The client machines can also

  be assigned static IPs by a network administrator, but most often are

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 61/74

 

61

automatically assigned temporary "dynamic" IP addresses via software that uses

the "Dynamic Host Configuration Protocol" (DHCP). The dynamic IP address

changes each time the user reconnects to the network.

Private IP AddressThese addresses are characterized as private because they are not assigned

to any computer over the Internet, and IP packets addressed by them cannot be

transmitted onto the public Internet. Also, they are set manually and they are

used in private networks (home, office, residential networks and so on).

Subnet

A subnet (short for "subnetwork") is an identifiably separate part of an

organization's network. Typically, a subnet may represent all the machines atone geographic location, in one building, or on the same local area network

(LAN). Having an organization's network divided into subnets allows it to be

connected to the Internet with a single shared network address.

NAT

N etwork  Address T ranslation is standard that allows an organization to

present itself to the Internet with far fewer IP addresses than there are nodes on

its internal network. The NAT technology, which is implemented in a router,firewall or PC, converts private IP addresses (such as in the 192.168.0.0 range) of

the machine on the internal private network to one or more public IP addresses

for the Internet. It changes the packet headers to the new address and keeps

track of them via internal tables that it builds.

UDP

U ser Datagram Protocol is a simple transport layer protocol for client/server

network applications based on Internet Protocol (IP). With UDP, computerapplications can send messages (in this case referred as datagrams) to the other

hosts on an Internet Protocol (IP) network without requiring prior

communications to set up special transmission channels or data paths.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 62/74

 

62

PROTOCOL

In computing and telecommunications, a protocol or communications

protocol is a formal description of message formats and the rules for exchanging

those messages. At the lowest level, a protocol defines the behaviour of a

hardware connection. Network engineers have written rules for communication

that must be strictly followed for successful communication between any 2 parts

involved.

Example: The protocols in human communication are separate rules about

appearance, speaking, listening and understanding. All these rules, also called

protocols of conversation, represent different layers of communication. They

work together to help people successfully communicate. The need for protocols

also applies to network devices.

OSI MODEL

The Open Systems Interconnection model (OSI model) is a product of the

Open Systems Interconnection effort at the International Organization for

Standardization. It is a way of sub-dividing a communications system into

smaller parts called layers. A layer is a collection of conceptually similar

functions that provide services to the layer above it and receives services from

the layer below it.

FRAME

In computer networking and telecommunication, a frame is a data packet

that includes frame synchronization. This is a sequence of bits or symbols

making it possible for the receiver to detect the beginning and end of the packet

in the stream of symbols or bits. If a receiver is connected to the system in the

middle of a frame transmission, it ignores the data until it detects a new frame

synchronization sequence.

ETHERNET

Ethernet is a family of frame-based computer networking technologies for

local area networks (LANs). It defines a number of wiring and signalling

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 63/74

 

63

standards for the Physical Layer of the OSI networking model as well as a

common addressing format. It is the most widespread wired LAN technology.

PORT

There are two types of computer ports: hardware ports and software ports.

A software port (usually just called a 'port') is a virtual/logical data

connection that can be used by programs to exchange data directly, instead of

going through a file or other temporary storage location.

A hardware port serves as an interface between the computer and other

computers or peripheral devices. Physically, a port is a specialized outlet on a

piece of equipment to which a plug or cable connects.

ServicesNetwork services are the foundation of a networked computing

environment. Generally network services are installed on one or more servers to

provide shared resources to client computers.  Common network services

include: 

• HTTP(S) – Websites and applications

• SMTP – eMail communication

• FTP – File Transfer Protocol

• DNS – Domain Name System• SSH – Secure Shell Access

• POP3(S) – Mailretrival protocol

• IMAP(S) – Mailbox protocol

HTTP

 H  yperText T ransfer Protocol , the standard way of transferring information

across the World Wide Web. HTTP defines how messages are formatted and

transmitted, and what actions Web servers and browsers should take inresponse to various commands. For example, when you enter a URL in your

 browser, this actually sends an HTTP command to the Web server directing it to

fetch and transmit the requested Web page. HTTP is called a stateless protocol

  because each command is executed independently, without any knowledge of

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 64/74

 

64

the commands that came before it. This is the main reason that it is difficult to

implement Web sites that react intelligently to user input.

SMTP 

Simple  M ail T ransfer Protocol, a protocol for sending e-mail messages

 between servers. Most e-mail systems that send mail over the Internet use SMTP

to send messages from one server to another; the messages can then be retrieved

with an e-mail client using either POP or IMAP.

In addition, SMTP is generally used to send messages from a mail client to a

mail server. This is why you need to specify both the POP or IMAP server and

the SMTP server when you configure your e-mail application.

FTP F ile T ransfer Protocol is a standard network protocol used to copy a file

from one host to another over a TCP/IP-based network, such as the Internet.

DNS

The Domain N ame S ystem makes it possible to assign domain names to

groups of Internet users in a meaningful way, independent of each user's

physical location. Because of this, World Wide Web (WWW) hyperlinks and

Internet contact information can remain consistent and constant even if thecurrent Internet routing arrangements change or the participant uses a mobile

device. This is useful because Internet domain names are easier to remember

than IP addresses.

SSH

Secure Shell is a network protocol that allows data to be exchanged using a

secure channel between two networked devices. It is used primarily on Linux

and Unix based systems to access shell accounts. SSH was designed as areplacement for Telnet and other insecure remote shells, which send

information, notably passwords, in plaintext, rendering them susceptible to

packet analysis.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 65/74

 

65

Routing

Routing represents, the process of moving a packet of data from source to

destination. Routing is usually performed by a dedicated device called a router.

Routing is a key feature of the Internet because it enables messages to pass from

one computer to another and eventually reach the target machine. Each

intermediary computer performs routing by passing along the message to the

next computer. Part of this process involves analyzing a routing table to

determine the best path.

ARPShort for  Address Resolution Protocol, a network layer protocol used to

convert an IP address into a physical address (called a DLC address), such as an

Ethernet address.

The term address resolution refers to the process of finding an address of a

computer in a network. The address is "resolved" using a protocol in which a

piece of information is sent by a client process executing on the local computer

to a server process executing on a remote computer. The information received by

the server allows the server to uniquely identify the network system for whichthe address was required and therefore to provide the required address. The

address resolution procedure is completed when the client receives a response

from the server containing the required address.

MAU

 M edium  Attachment U nit  , also known as "transceiver" converts signals on an

Ethernet cable to and from Attachment Unit Interface (AUI) signals.

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 66/74

 

66

APPENDIX II: THE OSI MODEL

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 67/74

 

67

The OSI (O pen S ystems I nterconnection) reference model represents an

hierarchical communications structure used to constitute a network and to

allow communication between computers no matter what structural features

there are. As applications, OSI model divides network communication problem

of a hierarchical architecture composed of seven layers. Each layer has well

defined functions and communicates only with adjacent layers, allowing linking

different types of software and hardware.

Each level has well established positions and allows communication from

the top to bottom, in order to create well-established hierarchy.

Layer Role Protocols

7. Application - Serves as the window for users

and application

- Processes to access the network

service

Application / “End-user

visible” 

HTTP, SMTP, FTP

6.

Presentation

- Formats the data to be presented by

the application Layer.

- It can be viewed as the ‚translator‚

for the network.

Session

SSL, TLS

5. Session - Allows session establishment

 between processes Sockets / Streams

 , Session establishment

- Running in different stations.

Transport 

NetBIOS, L2TP, SIP

Allows session

establishment between

processes Sockets /

Streams , Session

establishment,

4.Transport - Ensures that data is delivered

error-free, in sequence and with no

losses or duplications

TCP/UDP

Message

acknowledgment

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 68/74

 

68

3. Network -Controls the operations of the

subnet, deciding which physical

path the data takes.

Network 

IP, ICMP, IPSEC ,

Routing, Subnet traffic

control, logical-physical

address mapping

(Routers, L3-Switches )

2. Data link -Provides error-free transfer of data

frames from one node to another

over the physical layer.

Physical Protocol 

Ethernet, Token ring,

PPP, ARP ,

Ethernet frame

„envelopes‚ contains

MAC address

1. Physical -Concerned with the transmission

and reception

of the unstructured raw bit stream

over the physical medium

Transmission Medium 

100baseT, Fiber (Optical)

[a HUB is working only

on L1] , data encoding,

physical medium

attachment, physical

mediumTransmission: Bits &

Volts

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 69/74

 

69

This diagram presents how the OSI model works

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 70/74

 

70

APPENDIX III: BIBLIOGRAPHY

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 71/74

 

71

  http://www.bukisa.com/articles/114814_network-topology-advantages-

and-disadvantages-of-star-and-mesh-topology

  http://wiki.answers.com/Q/What_are_the_advantages_of_mesh_topology_

over_other_types_of_network_topology  http://www.free-computer-tips.info/networking-tips/mesh-topology-tree-

topology-and-hybrid-topology.html

  http://www.wikipedia.org

  Bradley Mitchell "Network Topologies" [1], About.com Guide, retrieved

May 24 2010

  http://www.ehow.com

  http://www.youtube.com  http://fcit.usf.edu/network/chap4/chap4.html

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 72/74

 

72

APPENDIX IV: EDITORIAL STAFF

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 73/74

 

73

COORDINATING TEACHER: Slobodan Aleksic

CHIEF EDITOR: Hodorog Andrei

EDITORIAL STAFF:Agavriloaei Matei-Andrei

Anghel TheodorAnton Mădălina Ioana

Bernevic Elsa-Maria

Bezrucav Ştefan Octavian 

Borş Radu 

Buhuş Corina-Mădălina 

Chelsău Andreas-Mihael-Rareş 

Chiţimuş Diana-Maria

Cojocaru Andreea-Roxana

Constantinescu AdelaDimitriu Ana-Maria-Andreea

Eşanu Tudor 

Fâcă Ionuţ-Codrin

Filip Smaranda-Nicoleta

Flueraru Bogdan-Mihai

Foszto Monica

Fotache Mădălina-Ioana

Garas Radu

Humelnicu Roxana

Istrate Alexandra-BrendaIvan Monica

Merticariu Bogdan-Cristian

Mitu Ina-Maria

Munteanu Bogdan

Nechita Daniela-Elena

Petruşcă Monica 

Pîrţac Adriana 

Sava Lucian-Cristian

Siminiuc Iuliana-AntoanelaSiriteanu R. Lucian

Szabo P.T. Lavinia-Sabrina

Ştefan M.O. Ioana-Alexandra

Toma Florina

Veringă Gh. Iuliana-Andreea

8/8/2019 How to Network Brochure - Leonardo 2010

http://slidepdf.com/reader/full/how-to-network-brochure-leonardo-2010 74/74