cit notes

46
CIT Notes Prof. Rakhi Tripathi & Prof. Rajneesh Chauhan

Upload: saket-nandan

Post on 15-Dec-2015

215 views

Category:

Documents


0 download

DESCRIPTION

FR

TRANSCRIPT

Page 1: CIT Notes

CIT Notes

Prof. Rakhi Tripathi&

Prof. Rajneesh Chauhan

Page 2: CIT Notes

Three Faces of Networking

• Fundamental concepts of networking– How data moves from one computer to another over a network– Theories of how network operate

• Technologies in use today– How theories are implemented, specific products– How do they work, their use, applications

• Management of networking technologies– Security– Network Design– Managing the network

Copyright 2005 John Wiley & Sons, Inc 1 - 2

Page 3: CIT Notes

Network Types (based on Scale) • Local Area Networks (LANs) - room, building

– a group of PCs that share a circuit.

• Backbone Networks - less than few kms– a high speed backbone linking the LANs at various locations.

• Metropolitan Area Networks (MAN) - (< few 10 kms)– connects LANs and BNs at different locations – leased lines or other services used to transmit data.

• Wide Area Networks (WANs) - (> few 10 kms)– Same as MAN except wider scale

Copyright 2005 John Wiley & Sons, Inc 1 - 3

Page 4: CIT Notes

Intranet vs. Extranet

• Intranet– A LAN that uses the Internet technologies– Open only those inside the organization– Example: insurance related information provided to employees over

an intranet

• Extranet– A LAN that uses the Internet technologies– Open only those invited users outside the organization– Accessible through the Internet– Example: Suppliers and customers accessing inventory information in a

company over an extranet

Copyright 2005 John Wiley & Sons, Inc 1 - 4

Page 5: CIT Notes

7-Layer Model of OSI

• Application Layer– set of utilities used by application programs

• Presentation Layer– formats data for presentation to the user– provides data interfaces, data compression and translation between

different data formats

• Session Layer– initiates, maintains and terminates each logical session between

sender and receiver

Copyright 2005 John Wiley & Sons, Inc 1 - 5

Please Do Not Touch Steve’s Pet Alligator

Physical DataLink Network Transport Session Presentation Application

Page 6: CIT Notes

Integration of Voice, Video & Data• Also called “Convergence”

– Networks that were previously transmitted using separate networks will merge into a single, high speed, multimedia network in the near future

• First step (already underway)– Integration of voice and data

• Next Step – Video merging with voice and data – Will take longer partly due to the high data rates

required for video

Copyright 2005 John Wiley & Sons, Inc 1 - 6

Page 7: CIT Notes

World Wide Web

• Web began with two innovative ideas:– Hypertext

• A document containing links to other documents– Uniform Resource Locators (URLs)

• A formal way of identifying links to other documents

• Invention of WWW (1989)– By Tim Berners-Lee at CERN in Switzerland

• First graphical browser, Mosaic, (1993)– By Marc Andressen at NCSA in USA; later founded Netscape

Copyright 2010 John Wiley & Sons, Inc 2 - 7

CERN - Conseil Européen pour la Rechèrche Nucléaire (Berners-Lee, T. (2000) Weaving the Web. New York: HarperCollins. P. 4)

NCSA - National Center for Supercomputing Applications

Page 8: CIT Notes

How the Web Works

Copyright 2010 John Wiley & Sons, Inc 2 - 8

HTTP Response

HTTP Request

Client Computer

Server ComputerMain Web communications protocol: HTTP: Hypertext Transfer Protocol

Clicking on a hyperlink or typing a URL into a browser starts a request-response cycle

A request-response cycle: includes multiple steps since web pages often contain embedded files, such as graphics, each requiring a separate response.

Page 9: CIT Notes

HTML - Hypertext Markup Language

• A language used to create Web pages • Also developed at CERN (initially for text files)• Tags are embedded in HTML documents

– include information on how to format the file• XML - Extensible Markup Language

– A new markup language becoming popular

Copyright 2010 John Wiley & Sons, Inc 2 - 9

Page 10: CIT Notes

HTML vs. XML

• XML was designed to describe data and to focus on what data is. HTML was designed to display data and to focus on how data looks .

• HTML is about displaying information, while XML is about describing information.

Copyright 2010 John Wiley & Sons, Inc 2 - 10

Page 11: CIT Notes

Electronic Mail• Heavily used Internet application

– Much, much faster than snail mail (regular mail)

– Extremely inexpensive (compared to $3-$10 per paper mail cost)

• Includes preparation, paper, postage, etc, – Can substitute for other forms of communication, such as telephone calls

• Eliminates “telephone tag”– E-mail users can answer at his/her convenience, instead of time

of call

Copyright 2010 John Wiley & Sons, Inc 2 - 11

Page 12: CIT Notes

E-mail Standards• SMTP - Simple Mail Transfer Protocol

– Main e-mail standard for• Originating user agent and the mail transfer agent • Between mail transfer agents

– Originally written to handle only text files– Usually used in two-tier client-server architectures

• Post Office Protocol (POP) and Internet Mail Access Protocol (IMAP)– Main protocols used between the receiver user agent and mail

transfer agent– Main difference: with IMAP, messages can be left at the server

after downloading them to the client• Other competing standards

– Common Messaging Calls (CMC), X.400

Copyright 2010 John Wiley & Sons, Inc 2 - 12

Page 13: CIT Notes

Web-based e-mail

Copyright 2010 John Wiley & Sons, Inc 2 - 13

LAN

LAN

SMTP packet

SMTP packet

SMTP packet

Internet

Client computer with

Client computer with

Server computer with

Server computer with

Server computer with

Server computer with

Web server software

Web server software

email server software

e-mail server software

IMAP orPOP packet

IMAP packet

HTTP request

HTTP request

HTTP response

HTTP response

Web browser

Web browser

Page 14: CIT Notes

Sample SMTP Message

Copyright 2010 John Wiley & Sons, Inc 2 - 14

Note that this SMTP message has no attachments.

Page 15: CIT Notes

File Transfer Protocol (FTP)• Enables sending and receiving files over the Internet• Requires an application program on the client computer and

a FTP server program on a server • Commonly used today for uploading web pages• Many packages available using FTP

– WS-FTP (a graphical FTP software)• FTP sites

– Closed sites• Requires account name and password

– Anonymous sites• Account name: anonymous; password: email address

Copyright 2010 John Wiley & Sons, Inc 2 - 15

Page 16: CIT Notes

Instant Messaging (IM)

• A client-server program that allows real-time typed messages to be exchanged– Client needs an IM client software– Server needs an IM server package

• Some types allow voice and video packets to be sent– Like a telephone

• Examples include AOL and ICQ• Two step process:

– Telling IM server that you are online– Chatting

Copyright 2010 John Wiley & Sons, Inc 2 - 16

Page 17: CIT Notes

How Instant Messaging Works

Copyright 2010 John Wiley & Sons, Inc 2 - 17

LAN

LAN

LAN

IM packet

IM packet

IM packet

IM packet

Internet

Server computer with

IM client software

e-mail client software

Client computer with

Client computer with

with IM server software

Sender sends a request to the IM server telling it that sender is online. If a friend connects, the IM server sends a packet to sender’s IM client and vice versa.

If a chat session has more than two clients, multiple packets are sent by the IM server. IM servers can also relay information to other IM servers.

When the sender types in text, the IM client sends the text in a packet to the IM server which relays it to the receiver.

Page 18: CIT Notes

Voice over IP

• Phone service over the Internet

• Phone service via VoIP costs less than equivalent service from traditional sources due to using a single network to carry voice and data

Copyright 2010 John Wiley & Sons, Inc 2 - 18

Page 19: CIT Notes

Existing System

Copyright 2010 John Wiley & Sons, Inc

2 - 19

PBX

IIT, Delhi

PBX

MTNL

Other six organizations

: All the existing internal phones configured with their old PBX

Six organizations: IIT-Bombay, IIT- Madras, IIT-Kharagpur, IISc Bangalore, CDAC and ERNet

Page 20: CIT Notes

VoIP System

Copyright 2010 John Wiley & Sons, Inc 2 - 20

2 Mbps link

: IP soft/hard phones configured with VoIP server

PBX

VoIP Server

IIT,Delhi

PBX

VoIP Server

Other six organizations

Page 21: CIT Notes

Cost

• Startup cost: hardware, software, trainees and permanent employees

• Recurring cost: maintenance

Copyright 2010 John Wiley & Sons, Inc 2 - 21

Page 22: CIT Notes

User Benefits• Cost benefit

• Ease of placing an STD call

• QoS provided

• Transferring data + video conferencing

Page 23: CIT Notes

Requirements

Copyright 2010 John Wiley & Sons, Inc 2 - 23

Features Open Source Cisco CallManager

Price Free Rs. 5.4 lakh

Documentation Not yet complete Well maintained

Support No support Good Support

Reliability Good Excellent

Scalability Average Very Good

QoS Provided Good Good

Handling Calls 10,000 10,000+

Extended Mobility* Not Yet Yes

Compatibility With all protocols Only with standard

protocols

Interoperability Yes. With most of the

standard systems

Yes. With most of the

standard systems

Page 24: CIT Notes

Hard Vs. Soft Phones

Copyright 2010 John Wiley & Sons, Inc 2 - 24

Page 25: CIT Notes

Videoconferencing• Provides real time transmission of video and audio signals

between two or more locations– Allows people to meet at the same time in different locations– Saves money and time by not having to move people around – Typically involves matched special purpose rooms with cameras and

displays

• Desktop videoconferencing– Low cost application linking small video cameras and microphones

together over the Internet– No need for special rooms– Example: Net Meeting software on clients communicating through a

common videoconference server

Copyright 2010 John Wiley & Sons, Inc 2 - 25

Page 26: CIT Notes

Cisco Videoconferencing

Copyright 2010 John Wiley & Sons, Inc 2 - 26

Page 27: CIT Notes

Videoconferencing Standards

• Proprietary early systems • Common standards in use today

– H.320• Designed for room-to-room videoconferencing over high-speed

phone lines– H.323

• Family of standards designed for desktop videoconferencing and just simple audio conferencing over Internet

– MPEG-2• Designed for faster connections such as LAN or privately owned

WANs

Copyright 2010 John Wiley & Sons, Inc 2 - 27

Page 28: CIT Notes

Virtual LANs (VLANs)

• A new type of LAN-BN architecture– Made possible by high-speed intelligent switches– Computers assigned to LAN segments by software

• Often faster and provide more flexible network management– Much easier to assign computers to different segments

• More complex and so far usually used for larger networks• Basic VLAN designs:

– Single switch VLANs – Multi-switch VLANs

Copyright 2010 John Wiley & Sons, Inc 8 - 28

Page 29: CIT Notes

Virtual Private Networks• Provides equivalent of a private packet switched network over

public Internet– Use Permanent Virtual Circuits (tunnels) that run over the public

Internet, yet appear to the user as private networks – Encapsulate the packets sent over these tunnels using special

protocols that also encrypt the IP packets • Provides low cost and flexibility

– Uses Internet; Can be setup quickly• Disadvantages of VPNs:

– Unpredictability of Internet traffic – Lack of standards for Internet-based VPNs, so that not all vendor

equipment and services are compatible

Copyright 2010 John Wiley & Sons, Inc 9 - 29

Page 30: CIT Notes

VPN Architecture

Page 31: CIT Notes

Wireless LANs (WLANs)

• Use radio or infrared frequencies to transmit signals through the air (instead of cables)

• Basic Categories– Use of Radio frequencies (FOCUS of this chapter)

• 802.1x family of standards (aka, Wi-Fi)– Use of Infrared frequencies (Optical transmission)

• Wi-Fi grown in popularity – Eliminates cabling – Facilitates network access from a variety of locations– Facilitates for mobile workers (as in a hospital)– Used in 90 percent of companies

Copyright 2010 John Wiley & Sons, Inc 7 - 31

Page 32: CIT Notes

Principal WLANs Technologies

• WI-FI– IEEE 802.11b

• Standardization started after .11a, but finished before, more commonly used than .11a

– IEEE 802.11a• First attempt to standardization of WLANs; more complicated than

.11b– IEEE 802.11g

• WIMAX• Bluetooth

– Also an IEEE standard 802.15

Copyright 2010 John Wiley & Sons, Inc 7 - 32

Page 33: CIT Notes

Components of WLANs

• Network Interface Cards– Many laptops come with WLAN cards built in– Also available as USB cards– About 100-300 feet max transmission range

• Access Points (APs)– Used instead of hubs; act as a repeater

• Must hear all computers in WLAN

Copyright 2010 John Wiley & Sons, Inc 7 - 33

Page 34: CIT Notes

WIMAX

• Commercial name for family of IEEE 802.16 standards

• Two primary types: Fixed and mobile• Logical and physical topology same as 802.11

and shared Ethernet• Uses controlled access with a version of 802.11

point coordination function• Two types:

– 802.16d– 802.16e

Copyright 2010 John Wiley & Sons, Inc 7 - 34

Page 35: CIT Notes

Computer Security Incidents• Computer security increasingly important

– More sophisticated tools for breaking in– Viruses, worms, credit card theft, identity theft leave firms with

liabilities to customers• Incidents are escalating at increasing rate• Computer Emergency Response Team (CERT) was formed at

Carnegie Mellon University with US DoD support– responds and raises awareness of computer security issues,

www.cert.org• Worldwide annual information security losses may be $2

trillion

Copyright 2010 John Wiley & Sons, Inc 11 - 35

Page 36: CIT Notes

Computer Security Incidents• Computer security increasingly important

– More sophisticated tools for breaking in– Viruses, worms, credit card theft, identity theft leave firms with

liabilities to customers• Incidents are escalating at increasing rate• Computer Emergency Response Team (CERT) was formed at

Carnegie Mellon University with US DoD support– responds and raises awareness of computer security issues,

www.cert.org• Worldwide annual information security losses may be $2

trillion

Copyright 2010 John Wiley & Sons, Inc 11 - 36

Page 37: CIT Notes

Types of Security Threats• Business continuity planning related threats

– Disruptions• Loss or reduction in network service• Could be minor or temporary (a circuit failure)

– Destructions of data• Viruses destroying files, crash of hard disk

– Disasters (Natural or manmade disasters )• May destroy host computers or sections of network

• Intrusion– Hackers gaining access to data files and resources– Most unauthorized access incidents involve employees– Results: Industrial spying; fraud by changing data, etc.

Copyright 2010 John Wiley & Sons, Inc 11 - 37

Page 38: CIT Notes

Network Assets• Identify the assets on the network

– Organization’s data files most important– Mission-critical applications also very important

• Programs critical to survival of business– Hardware, software components

• Important, but easily replaceable• Evaluate assets based on their importance• Prioritizing assets is a business decision, not a technology

decision• Value of an asset is a function of:

– Its replacement cost– Personnel time to replace the asset– Lost revenue due to the absence of the asset

Copyright 2010 John Wiley & Sons, Inc 11 - 38

Page 39: CIT Notes

Types of Assets

Copyright 2010 John Wiley & Sons, Inc 11 - 39

Hardware • Servers, such as mail servers, web servers, DNS servers, DHCP servers, and LAN file servers

• Client computers• Devices such as hubs, switches, and routers

Circuits • Locally operated circuits such LANs and backbones• Contracted circuits such as MAN and WAN circuits• Internet access circuits

Network Software

• Server operating systems and system settings• Applications software such as mail server and web server software

Client Software

• Operating systems and system settings• Application software such as word processors

Organizational Data

• Databases with organizational records

Mission critical applications

• For example, for an Internet bank, the Web site is mission critical

Page 40: CIT Notes

Security Threats• Identify threats

– Any potentially adverse occurrence that can• Harm or interrupt the systems using the network, or • Cause a monetary loss to an organization

• Rank threats according to – Their probability of occurrence– Likely cost if the threat occurs

• Take the nature of business into account– Example: Internet banking vs. a restaurant

• Bank’s web site: has a higher probability of attack and much bigger loss if happens

• Restaurant web site: much less likely and small loss

Copyright 2010 John Wiley & Sons, Inc 11 - 40

Page 41: CIT Notes

Inadequacy of Traditional Design• Three forces make the traditional design approach less

appropriate for many of today’s networks:1. Rapidly changing technology of computers, networking devices and

the circuits• More powerful devices, much faster circuits

2. Rapidly growing network traffic• Difficulty of estimating demand and growth requires shorter

planning periods of 3 years or so3. Dramatic change in the balance of costs

• Before: Equipment was costly; now: staff• Design goal: Minimize the staff management time to operate

rather than the hardware costs, such as using standardized equipment

Copyright 2010 John Wiley & Sons, Inc 12 - 41

Page 42: CIT Notes

Building Block Network Design• Building block design is simpler than traditional• Key concept is to use a few standard components to reduce

long run costs by simplification• Start with a few standard components with ample capacity

without extensive traffic analysis– Use few types of devices, over and over, narrow product choice but

deep throughout organization– Simpler design process yields easily managed network

• Phases of design– Needs analysis, technology design, and cost assessment– Cycles through, refining the outcome of each phase

Copyright 2010 John Wiley & Sons, Inc 12 - 42

Page 43: CIT Notes

Phases of Building Block Design• Needs analysis

– Understand current and future needs• Classify users and applications as typical or high volume • Identify specific technology needs

• Technology design – Examine available, off-the-shelf technologies and assess which ones

meet the needs of user needs– In case of difficulty in determining traffic needs, provide more

capacity to keep ahead of growth• Cost assessment

– Consider the relative cost of technology

Copyright 2010 John Wiley & Sons, Inc 12 - 43

Page 44: CIT Notes

Building Block Network Design

Copyright 2010 John Wiley & Sons, Inc 12 - 44

Cycles through all three phases, refining the

outcome of each phase

Page 45: CIT Notes

Reaching a Final Network Design

Copyright 2010 John Wiley & Sons, Inc 12 - 45

Process of cycling through all three design phases is cyclical and repeated over time.

Page 46: CIT Notes

Needs Analysis• Goal is to understand why the network is being built and what

users and applications it will support– improve poor performance?– enable new applications?– upgrade, replace old equipment?– standardize equipment based on vendor or protocol?

• Goals differ depending on the network– LAN and BN typically are built with organizational ownership, best to

design in over-capacity– MAN/WAN rely more on leased equipment and circuits, best to design

at capacity, and then lease additional circuits as required

Copyright 2010 John Wiley & Sons, Inc 12 - 46