SMTP

SMTP manages the transfer of e-mail from one computer mail system to another.
It does not accept mail from local users nor does it distribute mail to the intended recipients. This task is handled by the local mail system.
SMTP only interacts with the local mail system and thus does not see the mail which is local to the system. It is only when mails are sent to or received from another machine does SMTP come into play. An I/O queue exists as the interface between the Local Mail System and the Client/Server ports. The client is concerned with sending mails to another system while the server is concerned with only receiving mails.
The local system thus maintains a mailbox for each user on the system.
The name of this mailbox is unique and consists of two ports:
The Local Port
This is just the name of the user and must be unique to the local host.
The Global Port
This part is the name of the host and must be unique to the internet.


MHS
This is used in Novell messaging products.
Similar to X.400 the MHS server acts as a gateway and translates the format of a message if required.

X.400 addresses

X.400 email addresses have many possible entries mostly optional.
The values generally used are:
Country
the country must be specified
ADMD
the identity of the X.400 service provider
PRMD
the top level of the organization using X.400
Organization and organization units can be used to subdivide the company into logical groupings. The user is identified using some combination of first name last name initials and nickname.

X.500 Directory Standard
X.500 is a standard that is applied to directory services rather than email systems.
An email system can implement X.500 within its recipient directory and can then integrate it with other X.500 compliant directories.
X.500 directories can be organized into a single global directory than can offer thousands of names for querying on the Internet.
X.500 allows data to be organized in a hierarchical system in which users can be located by organization department or name.
One of the most popular X.500 directory services is Novell NetWare Directory Services (NDS).

X.400 Protocol

X.400 was defined by the CCITT (a French acronym for International Telegraph and Telephone Consultative Committee).
This committee is now named ITU-T.
X.400 is the universal protocol for e-mail. It defines the envelope for e-mail messages so all messages match to a standard format.The CCITT recommendations X.400 through X.430 define an Application layer protocol and a minimal Presentation layer protocol.
CCITT X.400 uses the ISO Session Layer services and protocol documented in ISO documents
X.400 comprises three major components:
The User Agent (UA)
The User Agent has immediate interaction with the system.
The user agent allows the user to compose submit and receive mail messages.
The messages that the user receives are not just Inter Personal Messages (IPM) but the user can also receive receipt (and non-receipt) notifications and delivery reports.
The Message Transfer Agent (MTA)
The MTA acts as the message store and the forwarding agent and can also act as the gateway by translating messages into the correct format for the user.
Thus MTA is where the actual transmission of messages take place.
They also perform all the needed routing and delivery functions.
In order to avoid spurious non-delivery problems for the UA the UA had to be available from the MTA at all times.
This problem was solved with the introduction of Message Store (MS).
It is MS which is available to the MTA at all times and supplies a store and forward service to the UA.
This is particularly useful in the more distributed modern environment where the User Agent may be running on a users personal machine and hence might not be available for long periods of time.
The Message Transfer System (MTS)
This provides the messaging infrastructure through which users can communicate.
The MTS comprises a group of MTAs.
The Access Unit (AU)
For the Inter Personnel Messaging Users to communicate with users of pre-X.400 technologies such as telex teletex and even postal delivery services the AU's were introduced. An AU is a device that acts like an interface between MTS and pre-X.400 on the other side. It converts formats service elements and protocols and provides non-X.400 services bi-directional flow of messages.

Email Standards

Email standards ensure that different networks using different email messaging products can communicate with each other reliably and consistently.
The three most widely used email standards are:

X.400

Simple Mail Transfer Protocol (SMTP)

Message Handling Service (MHS)

E-mail

One of the most common network applications is electronic mail or e-mail.
E-mail is fundamentally different from paper-based communication.
Since the turnaround time is fast email is more conversational than traditional paper-based media.E-mail messaging systems use the 'store and forward' principle to send and receive messages. The server acts as a central repository for messages i.e. if a user who is not currently connected to the network receives a message it is stored at the server until the user connects and downloads the messages.
Components of an E-mail system The components of an e-mail system are as follows:
The User Agent/Email Client
This performs tasks such as composing mail maintaining address books notifying users when an email arrives and sorting mail after it arrives in the Inbox.
The Message Store/Post Office
This holds the mailbox for each user and ensures that incoming messages are passed to the correct recipient.
The Message Transfer Agent (MTA)
This is responsible for forwarding messages when they are destined for a recipient located on another Post office.
The Access Unit/Gateway
This is used to send messages mail systems that use software and standards different from the one you are using e.g. LAN based messaging systems that communicate with Internet mail servers.
gateway must be able to physically route messages to their intended destination message store and must also translate the message content and reply address to a format understood by the destination system.
There are various levels of sophistication in a messaging system.
Some provide advanced features such as delivery receipt and encryption of messages.
Some of the widely used LAN based messaging systems are:
Microsoft Exchange
Lotus CC Mail and Notes
GroupWise

Network Applications

Local Area Networks were initially designed to support only shared disk resources and peripherals.Even though software can make use of network services for file access and printing they were essentially built as 'stand-alone' applications.Since then many applications have evolved which are designed to enable users to work together using the advantages of the facilities offered by the network. Some of the network applications include e-mail scheduling groupware and shared applications

Creating and Managing Accounts

Every network operating systems have built-in applications which allow the administrator to manage user and group accounts.
For example Windows NT has User Manager for Domains while NetWare has NWADMIN / NETADMIN.
The user needs to have administrative privileges before it can manage accounts on the system.

Default User Accounts
Most of the network systems have default user accounts that are created at the time of installation of the operating system.
Along with the user account and administrative account in some cases the guest group is also installed to provide minimum access to the resources for occasional users.

Administrative / Supervisory Account

Administrative account which had access to all services and resources on a server is available by default on all server based network operating systems.

These accounts are normally used when any security or configuration related task has to be performed on the server.

Administrator can also create other users with rights which are similar to that of an administrator.

Note: It is recommended that limited number of administrator accounts should be made as they are potential security loopholes.

User Level Security , Server Based Security

User Level Security
It is normally used on server-based networks where the administrator shares resources like folders and printers and makes them available for network users.
The resources can be protected by using high security option where each user has to logon to the system and have the rights to use the resources.
This type of security is available in Windows NT, Netware and Unix based systems.

Server Based Security
The user needs to supply a username and password to log on to the network which is then compared with the servers security database to authenticate the user
The username and group membership of an authenticated user is stored in an access key generated by the server security service or S3.
All resources on server-based systems have an access list which contain entries for all users and groups.
These entries have permission to use the resource thus controlling the access to resources.
The access list also contains the level of access available for each entry.
Whenever a user attempts to access a resource S3 matches the users access key with the entries in the list to decide if the user has permission on a resource and up to what level.

C2 security
C2 grade has been made mandatory by the US Government for all network operating systems to ensure at least some amount of security in computers.
The C2 grade has been decided by the National Computer Security Center which also defines other security levels and features.
Microsoft Windows NT and Novell NetWare 4.x have got C2 grade certification from the US Government.

Network Operating System Security

Network operating system use one of the two security models:

Share level security

User level security

Share Level Security

It is often used on peer-to-peer networks where each user can decide which resources of the machine should be shared among other users on the network.

The shared resources can be protected from other users via passwords as a mean of authenticating the user requesting the resource.

For example A windows 9x machine can provide the following access privileges when sharing a folder:

Read-only access based on passwords or without a password.

Full access based on a password or without it.

Choice between both access levels depending upon the password entered by the user requesting the resource.

The owner can also secure resources like printers with the help of a password.

ATM, PPP

ATM:
ATM stands for Asynchronous Transfer Mode and is a high-speed, packet-switching technique that uses short fixed length packets called cells which are about 53 bits in length. ATM can transmit voice, video, and data over a variable-speed LAN and WAN connections at speeds ranging from 1.544Mbps to as high as 622Mbps. I recently read that the new standard may be 2Gbps. ATM's speed is derived from the use of short fixed length cells, which reduce delays, and the variance of delay for delay-sensitive services such as voice and video. ATM is capable of supporting a wide range of traffic types such as voice, video, image and data.

PPP:As an improvement to Serial Line Internet Protocol (SLIP), Point-to-Point Protocol (PPP) was mainly for the transfer of data over slower serial interfaces. It is better than SLIP because it provides multiprotocol support, error correction as well as password protection. It is a Data Link Layer protocol used to encapsulate higher protocols to pass over synchronous or asynchronous communication lines. PPP is capable of operating across any DTE/DCE device, most commonly modems, as long as they support duplex circuits. There are 3 components to PPP:
• HDLC(High-level Data Link Control) - Encapsulates the data during transmission and is a link layer protocol which is also the default Cisco encapsulation protocol for synchronous serial links. HDLC is supposed to be an open standard, but Cisco's version is proprietary, meaning it can only function with Cisco routers.
• LCP(Link Control Protocol) - Establishes, tests and configures the data link connection.
NCPs(Network Control Protocols) - Used to configure the different communication protocols, allowing them on the same line simultaneously. Microsoft uses 3 NCPs for the 3 protocols at the Network Layer (IP, IPX and NetBEUI)

PPP communication occurs in the following manner: PPP sends LCP frames to test and configure the data link. Next, authentication protocols are negotiated to determine what sort of validation is used for security. Below are 2 common authentication protocols:
• PAP is similar to a network login but passwords are sent as clear text. It is normally only used on FTP sites.
• CHAP uses encryption and is a more secure way of sending passwords.

Then NCP frames are used to setup the network layer protocols to be used. Finally, HDLC is used to encapsulate the data stream as it passes through the PPP connection.

Point-to-Point Tunneling Protocol(PPTP) provides for the secure transfer of data from a remote client to a private server by creating a multi-protocol Virtual Private Network(VPN) by encapsulating PPP packets into IP datagrams. There are 3 steps to setup a secure communication channel:
1. PPP connection and communication to the remote network are established.
2. PPTP creates a control connection between the client and remote PPTP server
3. PPTP creates the IP datagrams for PPP to send.
The packets are encrypted by PPP and sent through the tunnel to the PPTP server which decrypts the packets, disassembles the IP datagrams and routes them to the host. Setting Up PPTP requires a PPTP Client, PPTP Server and a Network Access Server(NAS).

ISDN

ISDN:
ISDN has the following characteristics:
• Works at the Physical, Data Link, and Network Layers.
• Often used in backup DDR Dial on Demand Routing.
• Makes use of existing telephone.
• Supports simultaneous data and voice.
• Max speed at 125 Kbps with PPP Multilink.
• Call setup and data transfer is faster than typical modems.
• BRI has 2 x 64 1Kbps B Channels for data and one 16 Kbps D Channel for control
• PRI has 23 x B Channels and one D Channel in the US, or 30 x B Channel and one D Channel in Europe.
• E protocol specifies ISDN on existing telephone network
• I protocol specifies Concepts, terminology, and Services
• Q protocol specifies switching and signaling
• ISDN Reference Points include R(between non ISDN equipment and TA), S(between user terminals and NT2), T(between NTI and NT2 devices) and U(between NTI devices and Line Termination Equipment in North America)
• router always connected by the U interface into NT1
• BRI interface is considered Terminal Equipment type 1 TE1
• TE1 is built into the ISDN standards
• Needs to have Terminal Adapter TA to use TE2

Frame Relay

Frame Relay:
Frame Relay has the following characteristics:
• successor to X.25
• has less overhead than X.25 because it relies on upper layer protocols to perform error checking.
• Speed in between the range of 56 Kbps to 2.078 Mbps.
• uses Data Link Connection Identifiers(DLCI) to identify virtual circuits, with DLCI number between 16 and 1007.
• uses Local Management Interfaces(LMI) to provide info on the DLCI values as well as the status of virtual circuits. Cisco routers support Cisco(Default), ANSI and Q933a.
• to set up frame relay, we need to set the encapsulation to frame-relay in either the Cisco(Default) mode or the IETF mode, although Cisco encapsulation is required to connect two Cisco devices.
• LMI type is configurable, but by default it is being auto-sensed.
• generally transfer data with permanent virtual circuits (PVCs), although we can use switched virtual circuits (SVCs) as well.
• SVC is for transferring data intermittently.
• PVC does not have overhead of establishing and terminating a circuit each time communication is needed.
• Committed Information Rate(CIR) is the guaranteed minimum transfer rate of a connection

Cisco has a web page that describes the configuration and troubleshooting of Frame relay at http://www.cisco.com/warp/public/125/13.html

WAN Protocols

WAN Protocols:
In general, there are three broad types of WAN access technology. With Leased Lines, we have point-to-point dedicated connection that uses pre-established WAN path provided by the ISP. With Circuit Switching such as ISDN, a dedicated circuit path exist only for the duration of the call. Compare to traditional phone service, ISDN is more reliable and is faster. With Packet Switching, all network devices share a single point-to-point link to transport packets across the carrier network - this is known as virtual circuits.

When we talk about Customer premises equipment(CPE), we are referring to devices physically located at the subscriber?s location. Demarcation is the place where the CPE ends and the local loop begins. A Central Office(CO) has switching facility that provides point of presence for its service. Data Terminal Equipment(DTE) are devices where the switching application resides, and Date Circuit-terminating Equipment(DCE) are devices that convert user data from the DTE into the appropriate WAN protocol. A router is a DTE, while a DSU/CSU device or modem are often being referred to as DCEs.

Bridging/Switching:

Bridging/Switching:
Bridge - A layer 2 device used to connect different networks types or networks of the same type. It maps the Ethernet addresses of the nodes residing on each segment and allows only the necessary traffic to pass through the bridge. Packet destined to the same segment is dropped. This "store-and-forward" mechanism inspects the whole Ethernet packet before making a decision. Unfortunately, it cannot filter out broadcast traffic. Also, it introduces a 20 to 30 percent latency when processing the frame. Only 2 networks can be linked with a bridge.
• Switch - Switches are layer 2 devices that can link up four, six, eight or even more networks. Switches are the only devices that allow for microsegmentation. Cut-through switches run faster because when a packet comes in, it forwards it right after looking at the destination address only. A store-and-forward switch inspects the entire packet before forwarding. Most switches cannot stop broadcast traffic. Switches are considered dedicated data link device because they are close to a 100 % of the bandwidth. While bridging does most of its work by hardware, switches use fabric/software to handle most of its work.

Store-and-forward
- The entire frame is received before any forwarding takes place. The destination and/or the source addresses are read and filters are applied before the frame is forwarded. Latency occurs while the frame is being received; the latency is greater with larger frames because the entire frame takes longer to read. Error detection is high because of the time available to the switch to check for errors while waiting for the entire frame to be received. This method discards frames smaller than 64 bytes (runts) and frames larger than 1518 bytes (giants).

Cut-Through - The switch reads the destination address before receiving the entire frame. The frame is then forwarded before the entire frame arrives. This mode decreases the latency of the transmission and has poor error detection. This method has two forms, Fast-forward and fragment-free.
Fast-forward switching - Fast-forward switching offers the lowest level of latency by immediately forwarding a packet after receiving the destination address. Because fast-forward switching does not check for errors, there may be times when frames are relayed with errors. Although this occurs infrequently and the destination network adapter discards the fault frame upon receipt. In networks with high collision rates, this can negatively affect available bandwidth.
Fragment Free Switching - Use the fragment-free option to reduce the number of collisions frames forwarded with errors. In fast-forward mode, latency is measured from the first bit received to the first bit transmitted, or first in, first out (FIFO). Fragment-free switching filters out collision fragments, which are the majority of packets errors, before forwarding begins. In a properly functioning network, collision fragments must be smaller then 64 bytes. Anything greater than 64 byes is a valid packet and is usually received without error. Fragment-free switching waits until the received packet has been determined not to be a collision fragment before forwarding the packet. In fragment-free, latency is measured as FIFO.
Spanning-Tree Protocol - Allows duplicate switched/bridged paths without incurring the latency effects of loops in the network.

The Spanning-Tree Algorithm, implemented by the Spanning-Tree Protocol, prevents loops by calculating stable spanning-tree network topology. When creating a fault-tolerant network, a loop-free path must exist between all nodes in the network The Spanning-Tree Algorithm is used to calculate a loop-free paths. Spanning-tree frames, called bridge protocol data units (BPDUs), are sent and received by all switches in the network at regular intervals and are used to determine the spanning-tree topology. A switch uses Spanning-Tree Protocol on all Ethernet-and Fast Ethernet-based VLANs. Spanning-tree protocol detects and breaks loops by placing some connections in standby mode, which are activated in the event of an active connection failure. A separate instance Spanning-Tree Protocol runs within each configured VLAN, ensuring topologies, mainly Ethernet topologies that conform to industry standards throughout the network. These modes are as follows:
• Blocking- NO frames forwarded, BPDUs heard.
• Listening ? No frames forwarded, listening for frames
• Learning- No frames forwarded, learning addresses.
• Forwarding- Frames forwarded, learning addresses.
• Disabled- No frames forwarded, no BPDUs heard.
The state for each VLAN is initially set by the configuration and later modified by the Spanning-Tree Protocol process. You can determine the status, cost and priority of ports and VLANs, by using the show spantree command. After the port-to-VLAN state is set, Spanning-Tree Protocol determines whether the port forwards or blocks frames.

ETHERNET

Fast Ethernet
For networks that need higher transmission speeds, there is the Fast Ethernet standard called IEEE 802.3u that raises the Ethernet speed limit to 100 Mbps! Of course, we need new cabling to support this high speed. In 10BaseT network we use Cat3 cable, but in 100BaseT network we need Cat 5 cables. The three types of Fast Ethernet standards are 100BASE-TX for use with level 5 UTP cable, 100BASE-FX for use with fiber-optic cable, and 100BASE-T4 which utilizes an extra two wires for use with level 3 UTP cable.

Gigabit Ethernet
Gigabit Ethernet is an emerging technology that will provide transmission speeds of 1000mbps. It is defined by the IEEE standard The 1000BASE-X (IEEE 802.3z). Just like all other 802.3 transmission types, it uses Ethernet frame format, full-duplex and media access control technology.

Token Ring

Token Ring is an older standard that isn't very widely used anymore as most have migrated to some form of Ethernet or other advanced technology. Ring topologies can have transmission rates of either 4 or 16mbps. Token passing is the access method used by token ring networks, whereby, a 3bit packet called a token is passed around the network. A computer that wishes to transmit must wait until it can take control of the token, allowing only one computer to transmit at a time. This method of communication aims to prevent collisions. Token Ring networks use multistation access units (MSAUs) instead of hubs on an Ethernet network. For extensive information on Token Ring, visit Cisco's website.

Diagnostic Tools

Diagnostic Tools• Network Monitor - Tracks usage of network resources(good for establishing a network baseline).
Performance Monitor - Tracks usage of various resources over time(good for establishing a general baseline).
Tone Generator - Used to test cabling. Identifies which cable or wire is being tested by generating different tones.
TDR (Time Domain Reflectometer): Sends a signal down a cable and measures the distance that the signal travelled before bouncing back(like sonar). Used to find opens and shorts in cables.
Oscilloscope - Tests cable by determining where there are shorts, crimps or attenuation.
Protocol Analyzers - This tool is used to monitor network traffic and display packet and protocol statistics and information.
Optical Testers - A tool used to monitor and troubleshoot the performance of a fiber optic network.
Crimping Tools - Crimping tools are used to connect cabling to their appropriate connectors. There are different crimping tools for different types of connections.
Punch Down Tool - A punch down tool is used to connect cabling such as telephone and ethernet to wall jacks.

Network Management

Network Management
This section discusses network management, storage and recovery concepts:
VLAN - A virtual LAN is a local area network with a definition that maps workstations on some other basis than geographic location (for example, by department, type of user, or primary application). The virtual LAN controller can change or add workstations and manage loadbalancing and bandwidth allocation more easily than with a physical picture of the LAN. Network management software keeps track of relating the virtual picture of the local area network with the actual physical picture.
Fault Tolerance - Fault-tolerance describes a computer system or component designed so that, in the event that a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination. This is an important component of disaster recovery which is being included more and more in operating system software. For example, Windows 2000 includes RAID and tape backup functions although additional hardware is required.
Network Attached Storage - Network Attached Storage, or NAS, is a data storage mechanism that uses special devices connected directly to the network media. These devices are assigned an IP address and can then be accessed by clients via a server that acts as a gateway to the data, or in some cases allows the device to be accessed directly by the clients without an intermediary. Some of the big advantages of NAS include the expandability; need more storage space, add another NAS device and expand the available storage. NAS also brings an extra level of fault tolerance to the network. In a direct attached storage environment, a server going down means that the data that that server holds is no longer available. With NAS, the data is still available on the network and accessible by clients. Fault tolerant measures such as RAID can be used to make sure that the NAS device does not become a point of failure.

Remote Access Protocols and Services

Remote Access Protocols and ServicesThis section describes some of the various protocols and services used for remote and secure connections.
RAS - RAS stands for "Remote Access Service", Microsoft's term for modem pools. This service provides dial-in access to networks and to the Internet.
PPP - Point-to-point Protocol (PPP) is a method for connecting a personal computer to the Internet using a standard phone line and a modem. The difference between PPP and other, older dial-up procedures is that a PPP setup will establish a direct Internet connection that allows the PC to use TCP/IP (Internet-based) applications.
PPTP - The Point to Point Tunneling Protocol (PPTP) provides for the secure transfer of data from a remote client to a private server by creating a multi-protocol Virtual Private Network(VPN) by encapsulating PPP packets into IP datagrams. Setting Up PPTP requires a PPTP Client, PPTP Server and a Network Access Server(NAS). PPTP does not support the Appletalk protocol.
IPsec - IPSec is a suite of Internet-standard protocols that allow secure, encrypted communications between two computers over an insecure network. IPSec provides end-to-end security, meaning that the IP packets are encrypted by the sending computer, are unreadable en route, and can be decrypted only by the recipient computer.
L2TP - L2TP creates a tunnel through a public network that is authenticated on both ends, uses header compression, and relies on IPSec for encryption of data passed through the tunnel. L2TP works like PPTP in that it creates a "tunnel", but uses IPSec encryption in order to support non-IP protocols and authentication.
SSL - SSL (Secure Sockets Layer) uses a technique called public-key cryptography to provide encrypted connections. This enables you to move information across the Internet with confidence that it will not be intercepted or modified in transit. This is heavily used in e-commerce and can be identified by a URL that begins with HTTPS.
Kerberos - This form of security has been evolving in the Unix world for a long time and is now becoming a standard. Kerberos provides mutual authentication between a client and a server or between servers before a network connection is opened between them. Rather than sharing a password, computers share a cryptographic key, and they use knowledge of this key to verify each other's identities. Kerberos security only works with computers running Kerberos security software.

CCNA NOTES

FDDI - Fiber Distributed Data Interface (FDDI) is an appealing choice for high-speed data networking. Essentially, it is a very high-speed token ring network connected by optical fibers. With a data transfer rate of 100Mbps, the ring can support up to 500 nodes with as much as 2 km of spacing between adjacent nodes.
ATM - ATM stands for Asynchronous Transfer Mode and is a high-speed, packet-switching technique that uses short fixed length packets called cells. ATM can transmit voice, video, and data over a variable-speed LAN and WAN connections at speeds ranging from 1.544Mbps to as high as 622Mbps. ATM is capable of supporting a wide range of traffic types such as voice, video, image and data.
Frame Relay - Frame relay is a secure, private network that utilizes a logical path or ?virtual circuit? to allocate bandwidth for high performance transmissions. Frame relay is the premier high-speed packet-switching protocol communicating data, imaging, and voice between multiple locations. Frame relay is available in a range of bandwidths from 56 Kbps to full T1 (1.54 Mbps).

TCP

TCP provides connection oriented delivery. TCP requires that a session be established before hosts can exchange data. TCP is a means for building a reliable communication stream on top of the unreliable packet INTERNET PROTOCOL(IP).

TCP is the protocol that support nearly all internet applications.
the sending machine expects an acknowledgment for each packet. If a period elapses without an acknowledgment, it assumes that the information did not arrive and automatically resends it. Incase the packet delivered is damaged a negative acknowledgment NACK is sent. After this packet is resent again.

the other functions are allocating sequence number to each packet transmitted and handling flow control to make sure that the sender does not flood the receiver with packets.

HUBS

A HUB is a small rectangular box includes a series of ports that each accept a network cable. hub joins multiple computers together to form a single network segment. on this segment, all computers can communicate directly with each other.
HUBS are also known as multiport repeaters or concentrators. they connect various segments and acts like a repeater.this enables every segment to receive signals from any other segment.

Loop Avoidance

Redundant links are used to help stop complete network failures if one link fails. Even though redundant links are extremely helpful, they cause more problems than they solve. Because frames can be broadcast down all redundant links simultaneously, network loops can occur, among other problems.
If no loop avoidance schemes are put in place, the switches will flood broadcasts endlessly throughout the internetwork.

A device can receive multiple copies of the same frame since the frame can arrive from different segments at the same time.

One of the biggest problems is multiple loops generating throughout an internetwork. This means that loops can occur within other loops. If a broadcast storm were to then occur, the network would not be able to perform packet switching.

When a frame arrives at a switch interface, the destination hardware address
is compared to the forward/filter MAC database. If the destination hardware
address is known and listed in the database, the frame is only sent out the
correct exit interface. The switch does not transmit the frame out any interface
except for the destination interface. This preserves bandwidth on the
other network segments and is called
frame filtering
.
If the destination hardware address is not listed in the MAC database,
then the frame is broadcasted out all active interfaces except the interface the
frame was received on. If a device answers the broadcast, the MAC database
is updated with the device location (interface).

Forward/Filter Decisions

When a frame arrives at a switch interface, the destination hardware address
is compared to the forward/filter MAC database. If the destination hardware address is known and listed in the database, the frame is only sent out the correct exit interface. The switch does not transmit the frame out any interface except for the destination interface. This preserves bandwidth on the
other network segments and is called frame filtering.

If the destination hardware address is not listed in the MAC database,then the frame is broadcasted out all active interfaces except the interface theframe was received on. If a device answers the broadcast, the MAC databas is updated with the device location (interface).

Address Learning

When a switch is powered on, the MAC filtering table is empty. When a
device transmits and an interface receives a frame, the switch places the
source address in the MAC filtering table, remembering what interface the
device is located on. The switch has no choice but to flood the network with
this frame because it has no idea where the destination device is located.
If a device answers and sends a frame back, then the switch will take the
source address from that frame and place the MAC address in the database,
associating this address with the interface that received the frame.

switch now has two MAC addresses in the filtering table, the devices can
make a point-to-point connection, and the frames will only be forwarded
between the two devices. This is what makes layer-2 switches better than
hubs. In a hub network, all frames are forwarded out all ports every time.

Bridging versus LAN Switching

Layer-2 switches are really just bridges with more ports. However, there are
some important differences you should be aware of:

Bridges are software based, while switches are hardware based
because they use an ASICs chip to help make filtering decisions.

Bridges can only have one spanning-tree instance per bridge, while
switches can have many. (We cover spanning tree later in this chapter.)

Bridges can only have up to 16 ports, whereas a switch can have
hundreds.

There are three distinct functions of layer-2 switching:
Address learning
Layer-2 switches and bridges remember the source
hardware address of each frame received on an interface and enter this
information into a MAC database.
Forward/filter decisions
When a frame is received on an interface, the
switch looks at the destination hardware address and finds the exit interface
in the MAC database.
Loop avoidance
If multiple connections between switches are created
for redundancy, network loops can occur. The Spanning-Tree Protocol
(STP) is used to stop network loops and allow redundancy.

Crimping Cables

Crimping Procedure
The correct type of cable must be selected and this must be Stranded UTP for a patch cable.
A suitable length of cable is cut.
At least 2 cm of the cable sheath has to be stripped to expose the inner pairs.
Then the pair of cables has to be untwisted.
The colored wires should be placed in the correct order using the wiring diagram according to the standard colour coding or EIA/TIA standards.
The inner wires should be cut such that they are exactly the same length and just long enough to reach the RJ45 connector with the bridge positioned over the cable sheath.
The connector has to be positioned with the spring lever at the bottom.
The wires are pushed into the connector such that the copper core should be visible from the end of the connector.
The wires have to be checked to see if they are in the correct order.
The RJ45 connector is pushed into the crimping tool and the handles are squeezed.
The cables are checked to see if they are pierced and the bridge is over the cable sheath.
The same procedure is repeated for the other end of the cable.
The cable is tested using a cable tester. This is useful in identifying any crossed wires or those which do not make contact.
Crimping Cables
Wiring for a UTP patch cable
The pairs of wires in UTP cable are colored so that you can identify the same wire at each end.
Furthermore they are usually color coded by pair so that the pairs can also be identified from end to end.
Typical CAT5 UTP cables contain 4 pairs made up of a solid colour and the same solid colour striped onto a white background.
The most common colour scheme is the one that corresponds to the Electronic Industry Association/Telecommunications Industry Association's Standard 568B.

White / Orange >> White / Orange
Orange >> Orange
White / Green >> White / Green
Blue >> Blue
White / Blue >> White / Blue
Green >> Green
White / Brown >> White / Brown
Brown >> Brown
Wiring for a cross-over cable
In order to make what is commonly referred to as a 'Crossover' cable one must change the pinout connections on ONE end of the cable.
If you do it on both ends of the cable you have crossed-over the crossover and now have a straight-through cable albeit a very non-standard one.
In this case two negatives do make a positive.

White / Orange >> White / Green
Orange >> Green
White / Green >> White / Orange
Blue >> Blue
White / Blue >> White / Blue
Green >> Orange
White / Brown >> White / Brown
Brown >> Brown

Structured Wiring Systems
Structured Wiring Systems
The computer network UTP is installed in the same manner as a telephone installation.
The main components are as follows:
A network card with a socket for an RJ45 (four pair) or RJ11 (two pair) connector.
A patch cable with the appropriate connector is used to link the network card into a wall jack.
This must be a stranded cable so that it is flexible.
Since the attenuation of stranded cable is higher than solid cable the length of this cable should not exceed 32 feet.
The cabling then passes into the wiring ducts at the back of the wall outlets and is routed to the main computer room.
Solid core cables are used as it is cheaper has lower attenuation and repeated flexibility is not required.
The cable is wired into the back of a patch panel in the computer room.
Lastly a patch cable connects the port on the front of the patch panel to free port on the hub.
Here again stranded cable should be used with a maximum length of 32 feet.

Wiring Techniques
The wall outlet and the patch panel have a punch down block for each port.
The following steps have to be completed to connect the wiring to a punch down block:
As little sheath as possible (about 3cm) is removed and the pairs are untwisted only for a maximum distance of half an inch.
Note: Excessive untwisting will allow excessive crosstalk between strands and may result in problems.
The pairs are laid over the appropriate location on the punch down block and a punch tool is used to simultaneously make connection and to cut the strand to length.
There are two formats in the punch down blocks - Krone and 110.
Appropriate punch tools are required for different formats.
The Electrical Industries Association introduced the EIA 568 specification in 1991.
This standard is called the 'Commercial Building Telecommunications Wiring Standard'.
This was the first non-proprietary networking scheme for network designers and has later been revised and updated culminating in the latest version of the TIA/EIA 568A.
Note:
The usage of special types of cables for specific situations may be required in case of local fires and safety regulations.
For example the use of plenum cable above the false ceilings in an office.
This cable is designed to be fire resistant and uses Teflon coatings so it produces a minimal amount of smoke.
PVC insulation should be avoided as this produces poisonous gas when burnt.

Introduction to Topologies

To make networks you can use either of the two connections:
Point-to-point connection
It is a one to one connection where only two devices share a connection.
As there can only be two devices which can share the connection so a level of bandwidth is assured to the user.

Multipoint connection
It is connection where three or more than three computers share the connection and is also called as multi-drop connection.
The bandwidth available for each user depends upon the number of computers on the network accessing the resources and changes drastically depending on the load.
Physical and Logical Topologies
The structure or the layout of the network is called as the topology of the network.
Network Topology is divided into two types:
Physical Topology
It explains the actual physical layout of the network.
Logical Topology
It explains the logical flow of the data through the network.

Star Topology
This is a network in which each PC is connected to a central device like hubs or switches via a point-to-point link.
When a PC sends any data on the network then the central device receives the signals and sends the signals to all the PC's on network which is connected to the central device.
For example star topology is very similar to an EPABX telephone system which is used by most of the corporate companies.
Star Topology

Advantages
It is a commonly used technology and has been previously used in telephone systems.
It is very easy to configure and reconfigure the network settings.
As all the data is sent to a central device it is very easy to manage and maintain the system while at the same time making it easy to locate any problem in the network.
Any problems in the media NIC or workstation are automatically detected and isolated.


Disadvantages
As the network is depended on a central device if the device fails the whole network fails.
You need to keep a spare hub because of this single point of failure (SPOF) of the central device.
It takes up a lot of time to install because you need to install and check each connection point.
Compared to other network topologies it requires more cables.
Star Topology

Backbones
You need backbones when you want to interlink more than one hub together using a single cable.
The backbone cable needs to be capable of higher data transfer speeds than the rest of the network so that the performance of the system is maintained and does not slow down.
For example for a network made up of UTP cables you can use fiber optic cable to maintain the bandwidth as fiber optic cable supports much better transfer speeds than UTP.
It is commonly used to interlink hub situated in different floors of a building or in completely different buildings.

Cascading hubs
It is one of the commonly used methods for using multiple hubs.
The multiple hubs can be linked together by:
Twisted-pair crossover cables - Crossover cables are typically used to connect hubs together but they can also be used for directly connecting two computers together without using a hub.
Some standalone switches have a button on the hub to effect the crossover at a particular point. This allows you to connect to another switch or a hub without using a crossover cable.

Bus Topology
It is a topology in which all nodes are attached directly to the main or backbone cable in a linear method.
The bus needs to be terminated at both ends of the cable so that the signal is reflected back when it has gone through all the devices connected on the network in one direction.
In this network the signal travels in both the direction of the cable.

Advantages
It follows the common standards and is easy to install.
Compared to other network topologies it requires the least amount of network cable.
It is the cheapest of all network topologies.
It is not dependent on any one device for its functioning and works well even if only two computers are running

Disadvantages
Compared to other topologies it is relatively hard to reconfigure.
The signal quality deteriorates with increasing number of PCs thus limiting the no of PCs which can be connected to the network using this topology.
There is also a minimum length limitation of the cable used to connect the PC's otherwise it might create a bottleneck on the network.
It is difficult to troubleshoot cable problem because it can be there anywhere on the segment of the cable.
Unlike star network topology all the other networks share the same problem of media fault as start network which provides terminated network between each device and the hub.

Ring Topology
In this topology the PCs are connected in a circle in a series of point-to-point links between each device.
You can attach the computer directly to the ring or through an intermediary device like Multi-Station Access Unit (MSAU).
In this network a signal generated by one computer is passed from one device to another in a single direction and the signal is regenerated each time at each device.
This topology has been commonly implemented as IBM's token ring and Fiber Distributed Data Interface (FDDI) or Copper Distributed Data Interface (CDDI).
Ring Topology

Advantages
It uses the least amount of cable for networking after Bus Topology.
It is relatively simple to install.
You can make a fault tolerance network by using two ring systems via dual counter rotating rings.
The dual counter rotating rings allow the PCs to avoid a break in the ring.

Disadvantages
Adding or removing a device can affect the network making it difficult to reconfigure the network.
All devices will be affected by media or device failure on the network.
It is difficult to troubleshoot any problems in this topology.
Other Topology

Hybrid-star bus and star ring
You can take the advantage of two different topologies by making a hybrid topology of two different topologies.
You can see the below images to understand how two different topologies can be combined together.
Star Bus
Star Ring

Other Topology

Hierarchical or tree - stars nested with other stars
It is common to use hierarchical topology when the star network grows beyond a certain limitation.
You can see the layout of the topology after it has been put in a hierarchical format.

Mesh
It is the most commonly used topology in Wide Area Networks (WANs) and is often seen in public networks like Internet.
According to mesh network theory every device needs to have a point-to-point connection with every other device on the network.
But in practice this network is used in a hybrid approach with only the most important devices interconnected in the mesh.
This is so because it is impractical to do so in normal condition.
These networks can be used for critical applications like important servers as other computers can take over through other routes using intermediary devices if one of the servers fail.

The SMTP Protocol

Email is one of the most popular uses of the Internet and is the main reason for manyto have adopted it.
Email allows you to send a message to anyone on your own network or anywhere else in the world using the Internet.
Email software also provides options whereby a reader could read print reply to and store email.
The Format of a Email Message
An email message consists of two parts:
The first part is known as the header which includes information:
From whom the mail has been sent
From: somebody@india.com
The person/people to whom it has been sent
To: anybody@america.com
A copy of the mail can be send to as many other people as you like at the same time as you send it to the main recipient.
Just enter the full email addresses in the cc box separated by commas or semicolons.
Cc: everybody@europe.com everybody@australia.com
If copies of the email need to be sent to multiple recipients but their email addresses must not be displayed then use Blind Carbon Copy (Bcc)
Bcc: hidden@someplace.com
The subject of the message
Subject: Project confirmation
Note: Some header information is mandatory (like the ones mentioned) whereas others are optional.
The second part is known as the body and contains plain ASCII text.
The body of the message follows the header and is usually separated by a blank line.
Email messages can only transmit plain text.
There are however encoding processes that extend the functionality of email by allowing the transfer of other data like images in the form of an attachment.
After typing your message click on Send.
Electronic Mail Addresses
An email address is always in the form of 'mailbox@Domain-name' where mailbox refers to a user or other recipients (such as distribution lists) and the domain name represents the domain of which the email server is a member.
Examples of an email address could be sudhir@jetking.com where 'sudhir' is the mailbox name and 'jetking.com' is the domain name.

SMTP Protocol
The SMTP protocol specifies how mail should be delivered from one system to another.
This protocol makes the connection from the sender's server to that of the recipient and then transfers the message.
SMTP is used:
To deliver messages from the email client to the SMTP server.
To transfer messages from one SMTP server to another.
The sending SMTP server discovers the IP address of the recipient SMTP server using the domain name part of the email address.
The SMTP server is registered on the DNS using a 'mail exchanger' (MX) record.
SMTP is not used for transferring messages from the recipient's SMTP server to its email client because it requires both source and destination to be online to make a connection.
An SMTP server retries regularly before it returns a Non-Delivery Report (NDR) to the sender.
Working of SMTP
This is based on the model of communication which is a result of a user mail request.
Because of this the sender-SMTP establishes a two-way transmission channel to a receiver-SMTP.
The receiver-SMTP may be either the ultimate destination or an intermediate.
The SMTP commands are generated by the sender-SMTP and sent to the receiver-SMTP.
SMTP replies are sent from the receiver-SMTP to the sender-SMTP in response to the commands.
After the transmission channel is established the SMTP-sender sends a MAIL command indicating the sender of the mail.
When the SMTP-receiver accepts the mail for that recipient it responds with an OK reply.
In case it does not accept the mail it responds with a reply rejecting that recipient.
Post Office Protocol (POP)
SMTP delivers mail only to hosts that are currently available.
POP is therefore designed to allow the recipients to download their mail to their email client at their own convenience.
One of the most widely used methods for retrieving electronic mail from a mailbox on computing devices is called the Post Office Protocol (POP).
POP has been adopted as a standard for email exchange by virtually all Internet service providers worldwide.
A POP client like Eudora or Outlook connects via TCP to your POP server.
The POP service is different from the SMTP service but runs on the same server.
The user is authenticated by way of a username and password and your mail is downloaded accordingly onto his PC.
Sending Email
The process of sending email can be described as follows:
The email client software on the sending computer sends the message to the email server
The email server notes the recipient's address e.g. carl@prestige.com.
It then contacts a DNS server to find the IP address of the domain name which is mentioned in the address i.e. prestige.com
It then uses SMTP to deliver the message to this email server.
The delivery requires several hops.
The World Wide Web: HTTP
The World Wide Web (WWW) is made up of a huge number of servers that can be accessed by entering the correct URL address.
Hypertext and HTTP (HyperText Transfer Protocol) form the basis of this Web.
This information can be accessed in any order and from anywhere using the hyperlinks provided.
These links are contained in the document and contain the URL of another location.
A link can also refer to another document or a location within a document.

Links are not necessarily confined to information on the same site.
For example:
http://www.jetkinginfotrain.com/
This site address takes you to Jetking Institute home page.
Links to other documents are present on this page.
The link Jetking "Kal Aaj aur Kal" requests the document found at http://www.jetkinginfotrain.com/kal_aaj_kal.htm.

They can also link to sites on other servers companies and even continents.

For example
In a search engine such as Google the documents that match your search criteria are displayed as links and may be on any server anywhere in the world.
The Structure of a URL
The Uniform Resource Locator or URL as it is commonly known is used as the addressing scheme of the Internet and other browser-based application.
The URL contains all the information that is required to locate any resource.
Each URL is unique and no two different Web pages or location can share the same URL.
The URL has a fixed structure and can comprise of up to six components.
Capitalisation is important in URLs especially since many Web servers regard upper and lower case alphabets as different.
This particularly holds true in the case of UNIX servers.

TCP/IP Services

Most TCP/IP services are client-server applications that use the TCP/IP protocol as their communication mechanism.
Client-server applications are those that are based on a central server that stores information and serves requests made by clients.
The TCP/IP services are based on the application layer protocols that provide information for delivery by TCP/IP.
Some of the TCP/IP services are:
SMTP - Simple Mail Transfer Protocol
HTTP - Hyper Text Transfer Protocol
FTP - File Transfer Protocol
NNTP - Network News Transfer Protocol
SNMP - Simple Network Management Protocol

OSI Model Configuration

Component Or Description Layer
Gateway Services All
Bit transmission and encoding 1
Cable 1
Connector and pinot details 1
Mechanical and electrical specifications for using the media. 1
Network interface hardware 1
Network medium 1
Physical network topologies 1
Transmitting and receiving signals from the network medium 1
Bridges 2
Converts incoming 1s and 0s from the physical layer to frames 2
Converts outgoing packets from the network layer to frames 2
Identifies network cards 2
Intelligent hubs (switches) 2
Logical topology 2
Brouters 2 and 3
Fragmenting packets 3
Layer 3 switches 3
Moving data from one network to another 3
Route selection and discovery 3
Routers 3
Uses the logical network address to identify the destination network 3
Acknowledgement messages and sequences numbers 4
Breaks messages from the session layer into packet format. 4
Ensuring reliable data delivery 4
Connecting security 5
Mode for the dialog 5

Client/Server Protocols

For communicating with the network servers each workstation requires network client software.
Microsoft calls this the 'redirector' while Novell calls it the 'requester.'
styThe software intercepts instructions that are designed for the network.
It then passes them onto the card driver and to the network cable itself.
This is done through transport protocol.
Lets take a look at some examples:
A person wants to send a print job somewhere on a network.
What the client software will do is it will intercept the printing order and identifies that the print job is not for the local printer.
It will then pass on the print job to the network printer and not the local printer.
It will pass on the message to the protocol and the card driver.
This will change it into a format that the network will understand.
Redirectors/Requesters also keep a track of drive designators.
Anything that involves C: is generally recognized as Local.
Whereas anything that involves G: is passed onto the network resource.
Using an NT network as an example the redirector will know that G: is really \\servername\sharename and will pass the instruction to the destination machine.

Server message Block (SMBs)
Microsoft Windows and the OS/2 are the two operating systems that use this protocol.
This protocol is used to request files from the servers and divert them to clients.
Lets take an example of a file request using the standard NT protocol:
The workstation application requests the use of a network file resource with an SMB message.
The request is then passed over to the redirector which then passes it down through the other layers of the OSI model onto the network.
When the request reaches the server the process is reversed.
SMBs allow a machine to share its files and printers to make them available for other machines to use.

NetWare Core Protocols (NCPs)
NCPs provide a similar function to SMBs in the NetWare environment.
They function at 4 layers of the OSI model application down to Transport.
NCPs provide a group of functions that manage the interchange between client and
server.
They are responsible for performing all file and print services between clients and servers.

Service Advertising Protocol (SAP)
The NetWare environment also uses the SAP protocol.
The most important function of this protocol is service advertisement
This is performed at the Application layer of the OSI model.
Service providers like file servers and print servers broadcast a SAP packet every 60 seconds to advertise their presence on the network.
When this packet is sent it informs the client that the service is still available.
Clients may also send a service query packet to request information.

Network Client software
All network operating systems may use different protocols to manage communications between the client and the server.
In order for this to work successfully the client software also has to be different.
Taking Windows 95 as example:
The operating system has both client software for Microsoft and Novell networks as well.
In order to communicate both the client for NetWare and client for Microsoft networks have to be installed.

Adding and Removing Protocols

Different operating system will provide a specific method for installing and configuring protocols.
More often than not this takes place as a part of the setup process for the operating system.
However one can also add more protocols once the system has been fully installed.
For example in Windows OS one can always add a network device from the Control Panel.

Loading Multiple Protocols
Most modern networking systems support the installation of multiple protocols to improve networking flexibility.
The clients are using the NetBEUI protocol to communicate with the NT server.
They are using the IPX/SPX protocol to communicate with the NetWare server.
The disadvantage to this approach is the additional overhead of multiple protocols that slow the machine down.
Bindings
Sometimes some machines can have multiple protocols.
They have to try each protocol in order until a connection is established.
The order in which different protocols are tried is known as binding order.
Selecting the order is operating system specific.
However it is better that the more frequently used protocols are placed first in the binding order.
This will give us better performance.
Binding is the process of linking software components together.
This is done to provide communication.
It is also possible to bind a component to one or more components above or below it.
The course of binding takes place at the interface between each protocol in a protocol stack.
It can be summarized as the connection of a protocol to the driver for the NIC.
Microsoft NDIS (Network Driver Interface Specification) and the Novell ODI (Open Driver Interface) are used by the NIC drivers to support multiple bindings.
For example 3 different protocols can be bound to the same NIC driver.
Now if the computer has 3 NICs then each can be bound to the same protocol.

Choosing a Protocol

You can choose a particular protocol depending on following reasons:
Size of a network.
Interoperability with other systems and the Internet.
The need to route.
The client and server operating systems in use.

Scenarios
From the following real scenarios choose the appropriate protocol:
You want to install a NT network for a company that has its offices in Mumbai Pune and Nasik. It wants to host a web server and allow Internet access to all staff.
You are adding some NT server to a largely NetWare environment.
You have to install a small LAN with 8 workstations running on Windows 95 and a single NT server.
Your current network is mainly Novell but:
You plan to install some NT servers to run Exchange and SQL server.
Your WAN links are not as fast as you would like them to be.
Amongst your priorities getting the most out of performance is the top most.
Your staff also needs to access the Internet.

Other Protocols

AppleTalk
AppleTalk was developed by Apple.
AppleTalk is Apple Computers' proprietary protocol stack designed to enable Apple Macintosh computers to share files and printers in a networked environment.
It is a routable protocol and is an integral part of the Mac operating system.
Appleshare is a suite of protocols or applications that provide AppleTalk's Application layer services.
The following protocols make up Appleshare:
Appleshare File Server
Macintosh's network operating system uses Appleshare File Server to provide access to remote files.
Appleshare File Server registers users and allows those users to log in and access resources.
Appleshare Print Server
The Appleshare Print Server provides printer sharing on the network.
AppleShare PC
The AppleShare PC allows DOS workstations to access Appleshare file services.
AppleShare also provides active service advertisement and collaborative service use.
8.3 Other Protocols
Data Link Control(DLC)
DLC is a protocol designed to support access to networked printers or print servers.
It is also designed to connect to IBM mainframe computers via emulation software.
DLC however does not provide any support for any higher-level protocols and does not support routing.
This is a service provided by the Data Link layer of function defined in the Open Systems Interconnection (OSI) model for network communication.
The Data Link layer of the OSI model provides reliable data transfer across one physical link (or telecommunications path) within the network.

Overview of Transport Protocols

How DHCP works
When you start TCP/IP operations you are actually broadcasting a request for address information.
The DHCP server receives the request assigns a new address for a specific time period (called a lease period) and sends it to you together with the other required configuration information
This information is acknowledged by you and used to set up its configuration.
During the lease period the DHCP server will not reallocate the address and attempts to return the same address every time you request an address.
You extend the lease by giving subsequent requests and may send a message to the server before the lease expires telling it that it no longer needs the address so it can be released and assigned to another client on the network.
Other settings such as default gateway DNS (Domain Name System) and WINS (Windows Internet Naming Service) servers may be passed to the workstation at the same time.
IPX/SPX (NWLink)
The creators of NetWare network operating system i.e. Novell developed this Protocol.
This protocol has been derived from the Xerox Network System (XNS) which was developed by Xerox in the late 1970's.
Microsoft also has a version of this protocol called NWLink.
The Microsoft version of this protocol is fully compatible with Novel IPX/SPX.
The NetWare Protocol Suite takes its name from the two main protocols at the Network and Transport layers of the OSI model:
IPX (Internetworking Packet eXchange)
SPX (Sequential Packet eXchange)
The NetWare Protocol suite provides file print message and application services.
This architecture is server-centric because workstations make requests for file services or other services from the server.
To the user at a workstation all resources appear to be local to that workstation.
For example saving a file to a file server on the network is simply a matter of saving it to a drive F (or another mapped drive).
IPX deals with addressing route selection and an end-to-end connectivity of computers.
IPX is not suitable for certain types of network communication (where reliability of data reaching the remote machine is important) because it does not maintain a connection state (i.e. it is connectionless).
In a connectionless packet delivery system packets are simply sent to the destination and there is no confirmation of the packet reaching the destination.
In a connection oriented packet delivery system the status of the packet is known and the packet delivery is confirmed.
Most of the communication on a network including workstation connections and printing use SPX.
SPX is a transport layer protocol which provides connection-oriented packet delivery and is used when IPX datagram packet delivery is not reliable enough such as for a print server.
This protocol is concerned with addressing of machines segment development (including division and combination) and connection services (packet sequencing error control and end-to-end flow control).
NetBEUI
Pronounced net-booey NetBEUI is short for NetBIOS Enhanced User Interface.
It is an enhanced version of the NetBIOS protocol used by network operating systems such as LAN Manager LAN Server Windows for Workgroups Windows 95 and Windows NT.
NetBEUI was originally designed by IBM for their LAN Manager server and later extended by Microsoft and Novell.
NetBEUI Developed in the year 1985 by IBM for its PC networks.
NetBEUI for many years was Microsoft's preferred protocol.
It used this protocol for its LAN Manager and its early NT products.
However later versions of NT Microsoft switched to its own implementations of TCP/IP.
At first NetBIOS and NetBEUI were considered to be one.
Later however NetBIOS was separated for use with other protocols e.g. TCP/IP and IPX/SPX.
NetBIOS API however became popular later on.
This was because of its ability to provide software programmers with an easy means of accessing and utilizing network resources.

Overview of Transport Protocols

Protocol is an agreed-upon format for transmitting data between two devices i.e. it is a course of action or regulations used by networked computers to communicate with each other.
The protocol determines the following:
The type of error checking to be used
Data compression method if any
How the sending device will indicate that it has finished sending a message
How the receiving device will indicate that it has received a message
A Protocol Stack collection of protocols and the order in which they work together.
In order for flawless communication to take place both the protocols must be common.
Different protocols have different ways to operate however all of them require that certain chain of actions take place when computers communicate.
In today's world there are numerous protocols used and each of these have their own advantages and disadvantages.
More often than not certain organizations or vendors create their own protocols so particular tasks can be accomplished.
Collection of protocols are called 'a protocol suite'.
It is fairly common that several protocols are designed to work together.
The most widely used protocol suites used are.
TCP/IP
Transmission Control Protocol/Internet Protocol.
IPX/SPX
Internetwork Packet Exchange/Sequenced Packet Exchange.
NetBEUI
NetBIOS (Network Basic Input Output System) Extended User Interface.
TCP/IP
TCP/IP is the actual communication standard used by the Internet.
It was developed by the U.S department of Defense in the 70's.
This network was developed by the military so it could serve as a contingent network incase a nuclear war broke out.
The network was however given to government agencies and universities for free.
Researchers and students at the respected universities incorporated the suite into the UNIX network operating systems on their computers.
They then developed higher-level protocols for FTP (File transfer protocol) SMTP (Simple Mail Transfer Protocol) and even browsing of documents in HTTP (Hyper Text Transfer Protocol).
These applications use the 'sockets' application-programming interface (API)
TCP/IP protocol suite is being used on LANs and WANs primarily because of its vigorous nature and the increasing need to use Internet technologies.
All network software vendors now include TCP/IP within their products.
Like Linux no one owns TCP/IP and anyone can contribute towards its development.
The two part of TCP/IP are:
IP
IP's responsibility is in moving data packet from node to node.
Each of the packets is forwarded on a four-byte destination address (the IP number).
TCP
TCP's responsibility is in verifying the correct delivery of data from client to server.
It is possible that data can be lost in the intermediate network.
So TCP adds support to detect errors or lost data.
In case the data is lost it triggers retransmission until the data is correctly and completely received

Configuring TCP/IP
All TCP/IP devices must be provided with the following information.
IP Address
IP addresses are used to identify each device from one and another
The format of an IP address is 4 decimal numbers separated by periods
Example of an IP address is 202.44.122.311
An IP address identifies both the network to which the device is attached and also its identity on the network
IP addresses are mandatory for all devices
Subnet Mask
The Subnet mask is used in accordance with the IP address
It is used to determine if another device is located on a local or remote network
A subnet mask is also mandatory for all devices
Default Gateway
The default gateway is the IP address of the router to which data packets designed for remote networks should be sent
The default gateway although not necessary would limit the device to communicate only within the local network
DNS (Domain Name System) Server
One or more IP addresses may be entered to identify DNS servers
These servers provide resolution of TCP/IP host names to their IP address
They are absolutely crucial for locating resources on the Internet
WINS (Windows Internet Naming Service) Server
Microsoft NT network requires WINS server addresses to be entered
This enables it to resolve server names to their IP addresses

DHCP (Dynamic Host Configuration protocol) server may be used to automatically allocate IP addresses and other settings.
This protocol allows network administrators to manage centrally and automate the assignment of IP (Internet Protocol) configurations on a computer network.
If you are using TCP/IP protocols each computer system should have a unique IP address in order to communicate with each other.
If there's no DHCP the IP address has to be entered manually.
DHCP allows a network administrator to supervise and distribute IP addresses from a central point.

Network Card Drivers

In order for a device that is connected to a computer to work a driver is needed for it to operate.
Software (driver) that's used to manage a network card is called MAC driver.
A driver is software used by a particular hardware to communicate with the operating system.
It can be bifurcated into Vendor and Operating system.
The Vendor
Hardware components that perform the same task may have completely different methods of functioning.
Therefore they have different driver software.
The Operating system
The operating system and driver must be able to communicate.
You can locate the drivers of hardware from various sources:
A large variety of operating systems bundle drivers along with it whilst others must be installed when the hardware is added.
Most Network Card manufactures ship a disk along with their card which contains the model- specific drivers for different operating systems.
Many a times these disks have applications which install the card driver itself.
Network operating systems supply drivers for most of the commonly used cards.
Now a days incase of an upgrade the drivers are available on the manufacturers website as well.
One should always make sure that they are using the latest version of the card.
This is because the newest versions have the least bugs and always optimizes performance and reduces problems.
Operating system writers provide a generic device driver interface that the NIC manufacturers can use when writing the specific NIC driver.
All Hardware devices need to use certain computer resources in order to function:
Memory Address
DMA channel
Input/Output port (I/O port)
Interrupt ReQuest channel (IRQ)
A part of the configuration of the NIC driver involves specifying which resources are configured on the hardware.
Each network operating system specifies their own methods for installing and configuring network card drivers.
More often than not this takes place as a part of the setup process for the operating system.
However it is also possible to add drivers even after the hardware has been installed.
This is done from the 'Add New Hardware' function in the Control Panel.
Updating Network card drivers
Almost all vendors will develop new drivers for their cards.
The reason vendor's do this is because there are some performance issues with the old card.
Another reason new drivers are developed is because some conflict between the old driver and the card.
One should regularly check the vendors website constantly for updated drivers.
Another way is to browse through CompurServe and MicroHouse Technical library to be aware when new drivers are available.
You can then download these drivers.
There is absolutely no difference in upgrading a driver and installing one.
NDIS and ODI
Monolithic drivers are those that could be bound to only one protocol stack.
To achieve greater flexibility driver interfaces were designed to allow multiple protocols to be bound to multiple NICs.
The two interface drivers developed were:
Open Driver Interface (ODI)
ODI was developed by a group of networking companies Novell being a more prominent one of them.
The card drivers used with ODI are frequently called MLID drivers.
Network Driver Interface Specifications (NDIS)
NDIS was developed my Microsoft Corporation.
Both of these specifications were incompatible with each other.
However with the development and acceptance of Windows 95 as a network client the problems have greatly been reduced.

Carrier sense multiple access with collision avoidance

In computer networking, Carrier Sense Multiple Access With Collision Avoidance (CSMA/CA) is a medium access control (MAC) protocol in which:
•a carrier sensing scheme is used,
•a data station that intends to transmit sends a jam signal
•after waiting a sufficient time for all stations to receive the jam signal, the data station transmits a frame
•while transmitting, if the data station detects a jam signal from another station, it stops transmitting for a random time and then tries again.
CSMA/CA is a modification of pure Carrier Sense Multiple Access (CSMA). Collision avoidance is used to improve the performance of CSMA by attempting to reserve the network for a single transmitter. This is the function of the "jamming signal" in CSMA/CA.
Token Passing is a technique in which only the system which has the token can communicate. The token is a sort of control mechanism which gives authority to the system to communicate or use the resources of that network. Once the communication is over, the token is passed to the next candidate in a sequential manner.

Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace and the ability to support virtually all popular network protocols, make Ethernet an ideal networking technology for most computer users today.

Carrier sense multiple access with collision detection

In computer networking, Carrier Sense Multiple Access With Collision Detection (CSMA/CD) is a network control protocol in which
a carrier sensing scheme is used and
a transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, and then waits for a random time interval (known as "backoff delay" and determined using the truncated binary exponential backoff algorithm) before trying to send that frame again.
Collision detection is used to improve CSMA performance by terminating transmission as soon as a collision is detected, and reducing the probability of a second collision on retry.

Overview of Transport Protocols

TCP/IP
TCP/IP is the actual communication standard used by the Internet.
It was developed by the U.S department of Defense in the 70's.
This network was developed by the military so it could serve as a contingent network incase a nuclear war broke out.
The network was however given to government agencies and universities for free.
Researchers and students at the respected universities incorporated the suite into the UNIX network operating systems on their computers.
They then developed higher-level protocols for FTP (File transfer protocol) SMTP (Simple Mail Transfer Protocol) and even browsing of documents in HTTP (Hyper Text Transfer Protocol).
These applications use the 'sockets' application-programming interface (API)
TCP/IP protocol suite is being used on LANs and WANs primarily because of its vigorous nature and the increasing need to use Internet technologies.
All network software vendors now include TCP/IP within their products.
Like Linux no one owns TCP/IP and anyone can contribute towards its development.

Advantages of Layer 3 Switches

It has a very simplified management configuration and installation procedure.
They are less expensive than routers.
More favoured than Routers
Unlike routers Layer 3 switches have optimized hardware to pass data as fast as Layer 2 switches.
Even then they make decisions on how to transmit traffic at Layer 3 just like a router.
A Layer 3 switch is usually faster than a router in a LAN environment because it is build on switching hardware.

Disadvantages of Layer 3 Switches

Manufacturers are marketing non-compatible proprietary devices.

Layer 3 Switches

The software-controlled routers are getting rejected while hardware implementations like routing switches are getting accepted.
The routing functionality is integrated into routing switches.
This provides routing capabilities at near switching speeds and should eliminate old technology router bottlenecks.
Layer 3 is the Network layer in the OSI model.
This layer controls the routing of messages across different networks as well as network flow and traffic management.
A standard switch normally operates from the Data Link Layer of the OSI model.
But the Layer 3 switch operates in the Network layer to perform high-speed routing functions.

Reasons why RIP is inefficient than OSPF

The routing table is broadcast instead of just the changes which can result in large and often multiple packets.
There is a maximum of 25 entries per RIP packet.
The routing tables are slow to stabilize when a change in the internetwork occurs.
Link state systems reach 'convergence' more quickly.
The routing table is broadcast at regular intervals.
It is broadcast at every 30 seconds.
This results in considerable network traffic.

Static and Dynamic Routers

Dynamic Routers
Dynamic routers are those routers which automatically find their own routes by communicating with each other.
These routers require minimal configuration.
This is because their routing tables are built and modified through these communications.
This approach is very flexible as it can quickly react to changes in the internetwork e.g. router failure or broken links.
Open Shortest Path First (OSPF)

Open Shortest Path First (OSPF) uses a 'link state' algorithm to calculate routes based on number of hops line speed traffic and cost.
TCP/IP supports OSPF.
Routers use an algorithm to send routing information to all nodes in an internetwork.
This algorithm is done by the shortest path to each node based on a topography of the Internet constructed by each node.
The routing table is also attached along with the routing information.
The advantage of this algorithm is that the updates are smaller and more frequent.
These algorithms end quickly thus preventing problems like routing loops and Count-to-Infinity thus making a stable network.
Count-to-Infinity is when routers continuously increment the jumps (hops) from one router to the next in a particular network.
The only disadvantage of this algorithm being that they require a lot of CPU time and power.
Netware Link State Protocol (NLSP)

Netware Link State Protocol (NLSP) is the equivalent of OSPF for the NetWare environment.
Routing Information Protocol (RIP)

Routing Information Protocol (RIP) uses distance vector algorithms to determine routes.
This protocol is defined by RFC 1058.
This protocol specifies how routers exchange routing table information.
Sometimes the entire table is also exchanged.
Since this is inefficient it is replaced by OSPF.

Choosing Paths

The Routing Table

The routing table contains the following information:
Addresses of all known networks.
Next router in the path to the network.
Interface of the router used to forward packets to the network.
Cost of using this path.
Incase of the existence of multiple paths to the same network the path with the lowest cost is used.
Static and Dynamic Routers

Administrators have to manually configure routes between each network when the routers do not communicate amongst themselves.
Such routers are called Static routers.
This type of configuration is however possible with only small types of routers.
It also does not provide flexibility of dynamic routing.
Its advantage is that complete control remains with the network administrator.

Network Addresses

Protocols that are routable differ from protocols that are non routable.
Routable protocols contain information in each packet relating to the network address of the source and destination nodes.
This kind of information allows a router to forward the packet to a particular network rather than a particular node.
Different protocols address networks using a variety of naming schemes.
However they rely on each network having a unique address.
Choosing Paths
A routing algorithm is used to build a routing table for forwarding packets.

They are of two types:
Non-adaptive

The choice of route has to be manually configured into router.

This is also known as 'static' routing.
Adaptive

Routing information is obtained from other routers.

Routing decisions are based on traffic levels connection speeds and number of hops or administrator-preset costs.

This is known as dynamic routing.

Features of Router

Multiple Active paths
Routers are able to keep track of multiple active paths.
They keep track of multiple active paths between any given source and destination network.
This makes it more rigid towards faults than a bridge.
This is because in a bridge multiple concurrent paths are not allowed.
Identify address
Routers work at the network layer and can access more information than a bridge.
Routers can identify source and destination network addresses within packets.
Traffic Management
Routers provide excellent traffic management using intelligent path selection.
Routers select the best route which is based on traffic loads line speeds number of hops or administrator pre set costs.
The various parameters used to determine routes for packets are known as metrics.
Sharing information
Routers can share status and routing information with other routers.
By doing this they can listen to the network and identify which connections are busy and which are not.
The routers then route network traffic avoiding slow or malfunctioning connections.
Filtering bad data
Routers do not forward any information that does not have a correct network address.
This is the reason they don't forward bad data.
Routers also filter broadcast traffic by not routing broadcast packets.
What this means is that network broadcasts do not propagate throughout the internetwork.
The broadcast storms are confined to a single subnet.
Performance
Routers perform complex tasks.
This means they are slower than bridges because they keep processing data intensively.
A router can be a dedicated box with a port to all networks.
On the other hand it can also be a NOS server with multiple interface cards.
Routers support multiple protocols however all protocols are not routable.
For example NetBEUI cannot be routed.

Routers

A router is similar to a bridge but can handle more complex types of communication between dissimilar networks.
Routers are usually employed by wide area networks which often connect networks using different communication protocols and dissimilar addressing schemes.
The routers work in the Network layer thus giving them the ability to understand the protocols being used to carry the data over the network.
Since routers can understand protocols they can use the rules to decide what to do with a specific data.
TCP/IP uses the term gateway to refer to routers.
When organizations use networks for different purposes routers are used in linking them.
A router can apply rules or filter data before accepting thus rejecting other data.
A router can be used to internetwork which can be alike or dislike.
An internetwork is composed of subnets or subnetworks which are identified by a unique network addresses.
It can route data serving one purpose over a certain set of network connections while routing other data over other connections.
The more detailed piece of data for forwards the longer that piece of data is delayed before being sent on to its destination.
The cost for acquiring highly configured routers needs faster and expensive hardware.

Features of Bridges

A network may have a number of bridges.

Generally speaking bridges cannot provide multiple paths to the same segment
This is because such an arrangement will result in data looping.
The main features of bridges are as follows.
Bridges work at the data link layer since they need to understand the MAC addresses within the frames and function in a similar manner to a switch.
Most bridges are often used to link different cable types.
Some bridges can only link segments of the same type e.g. Ethernet to Ethernet.
Fewer bridges can link network segments using different technologies.
For example linking of Ethernet and token ring.
Such bridges are known as Translation bridges or Heterogeneous bridges.

Bridge Operation

Building a Routing table
A bridge will build a routing table in memory.

When the bridge is initialized the routing table is empty.

However information is constantly being added as the bridge listens to connected segments.

The bridge can enter a particular hardware address against a port number in the routing table by examining the source hardware address on frames and noting the port that received the frame.

Entries are removed from the table after some time to ensure the information remains current.

Bridges

Bridges are devices that operate at Layer 2 of the OSI reference model.
That is why they are widely referred to as Data Link Layer devices.
They serve a simple purpose:
They analyze incoming frames make forwarding decisions based on information contained in the frames and forward the frames toward the destination.
Local and remote bridges connect LAN segments in specific areas.
A bridge consists of a computer unit two or more network interface cards connecting two types of networks.
For example one interface card might connect to an Ethernet system while the second connects to a token ring system.
These two systems speak entirely different data languages and require the bridge to translate the node address supplied by one network into an address that is recognized by the others.
The bridge uses special software that accepts data from the sending network and translates it to the language other network.
A bridge therefore extends the maximum distance of network just like a repeater.

However it can also be used to segment the network to reduce network congestion.
A vast congested network can be divided into separate segments using a bridge.
Each of these segments hence will experience far lower levels of traffic loads.
This is because the bridge passes the signal only from one segment to another if needed.
Traffic between devices on the same segment also called intrasegment traffic will not affect the other segments.
A bridge works efficiently if the traffic between devices on different segments is kept minimal.
There is a business principal called the 80:20 principal this should be followed here as well.
According to this rule a well-designed network should keep 80 % of the traffic on the same segment.
Whereas it will let the remaining 20% of traffic needing to pass to another segment.
They need to ensure clients and their associated servers are placed on the same segment whenever possible.