0% found this document useful (0 votes)
48 views56 pages

Ch02 Network Administerations

The document provides an overview of network administration. It discusses the goals of network administration, which include maintaining a resilient high-quality network, planning network capacity improvements, leveraging tools for better control and security, and identifying and mitigating risks. It also covers TCP/IP networking basics, including the layers of the TCP/IP model, common protocols like IP, TCP, UDP, and the functions of routers. Additionally, it defines IP addressing schemes in IPv4 including address classes, subnet masking, and static versus dynamic addressing.

Uploaded by

adaneasefa969
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views56 pages

Ch02 Network Administerations

The document provides an overview of network administration. It discusses the goals of network administration, which include maintaining a resilient high-quality network, planning network capacity improvements, leveraging tools for better control and security, and identifying and mitigating risks. It also covers TCP/IP networking basics, including the layers of the TCP/IP model, common protocols like IP, TCP, UDP, and the functions of routers. Additionally, it defines IP addressing schemes in IPv4 including address classes, subnet masking, and static versus dynamic addressing.

Uploaded by

adaneasefa969
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

Network Administration

CHAPTER TWO

1
Outline

 Introduction to Network Administration

 Goal of network administration

 TCP/IP Networking Basics and IP address

 Switching and routing basics

 Introduction to the Server


 Server Types and Services

2
Introduction to Network Administration
 Network administration means the management of network
infrastructure devices (routers, switches, PCs in a network etc ).

 Network administration involves a wide array of operational tasks that


help a network to run smoothly and efficiently.

 Without network administration, it would be difficult for all but the


smallest networks to maintain network operations.
 Specifically, this would include the management and maintenance of
switches, routers, firewalls,VPN gateways, etc.

3
Introduction to Network Administration…
 As a network administrator, your tasks generally fall into the following areas:
 planning the network
 determine network requirement and needs (current number of host machines and in future,
local (onsite) and remote (off-site) number of users, types of application running, which server
specification, specify network hardware requirement etc. )
 Which topology to use
 Cabling (CAT 5, Optical fiber, wireless…. )
 Etc.…
 Designing and setting up the network
 installing the hardware that makes up the physical part of the network,
 and configuring the files or databases, hosts, routers, and network configuration servers.
 Maintaining the network
 Adding new host machines to the network
 Administering network security
 Administering network services, name services, and electronic mail
 Troubleshooting network problems
 Expanding the network
4
Goal of network administration
 Network administration aims to manage, monitor, maintain, secure, and service an
organization's network
 Generally, network administration goals include:
 maintain a resilient, high-quality network
 plan and improve network capacity to enable seamless network access and operations
 leverage networking tools for network systems administration and better network
administration control
 track and document relevant changes
 evaluate possible risks and plan effective mitigations
 prevent activities compromising or using the network as an attack vector
 identify and mitigate intrusions to avoid security breaches

5
Goal of network administration….
 Network administration compromises of 3 majors groups:
 Network provisioning

 Network operations

 Network maintenance

6
TCP/IP Networking Basics
 TCP/IP - Transmission Control
Protocol/Internet Protocol
 has 4 (or 5 depending on how you see
it) layers:
 Application, Transport, Internet
(Internetwork), Host-to-network (some
split it into Physical and Data Link)

77
The TCP/IP Protocol Suite
Application layer. Programs use application layer protocols to access network resources.

• Application layer protocols include: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer
Protocol (SMTP), Server Message Block (SMB), Domain Name System (DNS), Post Office Protocol 3 (POP3).

Transport layer. Transport layer protocols control data transfer reliability on the network. Transport layer protocols
include:
• Transmission Control Protocol (TCP) • User Datagram Protocol (UDP)

Internet layer. The Internet layer protocols control packet movement between networks. Internet layer protocols
include:
• Internet protocol(IP) (IPv4 and IPv6) • Internet Group Management Protocol (IGMP)
• Address Resolution Protocol (ARP) • Internet Control Message Protocol (ICMP)

Network interface layer. The network interface layer protocols define how datagrams from the Internet layer are
transmitted on the media.

8
Protocols in the TCP/IP Suite

9
Internet Protocol
 Provides network addressing
 Ensures data packets quickly reach the correct destination
 Versions
 Internet Protocol Version 4 (IPv4)
 Used on most networks
 Internet Protocol Version 6 (IPv6)
 Router
 Connects networks

10
A router forwarding packets to a designated network

11
Internet Protocol (cont’d.)

 IP addressing
 Dotted decimal notation
 32 bits long
 Four fields
 Example: 10000001.00000101.00001010.01100100 or 129.5.10.100
 Unicast
 One packet is sent from a server to each client on request
 Multicast
 Packet is sent to all clients as a group

12
Internet Protocol (cont’d.)

 Broadcast
 Sends communication to all points on network
 Subnet mask
 Used to show class of addressing and to divide network into subnets
 IP address considerations
 Network number 127.0.0.0 cannot be assigned to any network
 Private addresses reserved for Network Address Translation (NAT)
 Cannot assign highest network number to a host

13
Unicasting, broadcasting, and multicasting
14
Internet Protocol (cont’d.)
 Static addressing
 Assign permanent IP address
 Gives consistency for monitoring
 Can be laborious for large networks
 Dynamic addressing
 IP address assigned during logon
 Uses the Dynamic Host Configuration Protocol (DHCP)

15
Internet Protocol (cont’d.)
 Default gateway
 IP address of the router that has a connection to other networks
 Name resolution
 Domain Name System (DNS) translates domain and computer names to
IP addresses

16
IP addressing

 Internet Protocol Version 4 (IPv4)


 An IP address consists of four byte values separated by periods.
 For Example: 123.45.67.89
 This notation is also known as the dotted quad format.
 Each of the values must be in the range of 0 - 255 (8 bits).
 An IPv4 address is therefore 32 bits (4 bytes * 8 bits/byte).
 There are five classes of IP Addresses in IPv4:
 Class A, B, and C addresses are used for single host addressing.
 Class D addresses are used for multicast connections.
 Class E addresses are experimental.
17
Cont….

 Class A Networks
 The first byte is in the range of 1 - 127.
The first four bits of the address are Binary 0 X X X
There are 127 Class A networks.
The first byte of a class A address is the network number.
Private IP Range: 10.0.0.0 to 10.255.255.255
The remaining three bytes are the host address on that network.
110 .32.4.18
network host address
Each Class A network can address up to 16 million hosts.
18
Cont….
 Class B Networks
 The first byte in the range of 128 - 191.
The first four bits of the address are BINARY 1 0 X X
There are 16,384 Class B networks.
The first two bytes of a class B address are the network
number.
Private IP Range: 172.16.0.0 to 172.31.255.255
The remaining two bytes are the host address on that network.
129.74. 25.98
network host address
Each Class B network can address up to 65,000 hosts.

19
Cont….
 Class C Networks
 The first byte in the range of 192 - 223.
 The first four bits of the address are 1 1 0 X
 There are 2,097,152 Class C networks.
 The first three bytes of a class C address is the network number.
 Private IP Range: 192.168.0.0 to 192.168.255.255
 The remaining byte is the host address on that network.
210.43.2 .8
network host address
 Each Class C network can address up to 254 hosts.
 Most of the Class C networks are assigned and in use.
20
Cont….

 Internet Protocol (IPv4)


 Class D Networks - The first byte in the range of 224 - 239.
The first four bits of the address are 1 1 1 0
These addresses are used for “one to many”
communications (multicasting).
 Class E Networks - The first byte in the range of 240 - 254.
The first four bits of the address are 1 1 1 1
These addresses are reserved for experimental use by the
IANA.

21
Cont….
 The numbers 0, and 255 have special meaning in some fields of IP
addresses.
 A Zero host address refers to “this network”
 For example 129.74.0.0 refers to the Class B network 129.74.
 A host address of all ones is called the broadcast address.
 For
example 129.74.255.255 refers to all hosts on the
129.74 Class B network.
 The address 127.0.0.1 is the loopback address.
 This address is used for inter-process communications, and for
network testing.
 All of the 127 network is reserved (127.0.0.0 - 127.255.255.255).
22
Summary IPV4

23
Configuring and Troubleshooting IPv4
 You can configure IPv4 addresses manually or automatically.
 An IPv4 address is configured automatically when a server that runs Dynamic Host
Configuration Protocol – DHCP assigns and IPv4 address to the computers or
network devices.
 Static IP addresses are usually configured on servers, routers, switches or other
network devices that need to maintain persistent IP configuration that does not
change over time
 To configure a static IP address for a server in an IPv4 configuration, you will need to
determine the following settings:
 IPv4 address
 Subnet mask
 Default gateway
 DNS servers
24
Configuring and Troubleshooting IPv4 (cont’d.)
 Static configuration requires that you visit each computer and input the IPv4
configuration manually.
 This method of computer management is reasonable for servers, but it is very time
consuming for client computers. Manually entering a static configuration also
increases the risk of configuration mistakes.

25
IPv4 Troubleshooting Tools in widow server
 Windows Server 2012 includes a number of command-line tools that can help you
diagnose network problems.
 These tools were commonly used in earlier Windows Server editions.
 Ipconfig
 Ipconfig is a command-line tool that displays the current TCP/IP network
configuration.
 Additionally, you can use the ipconfig command to refresh DHCP and DNS
settings.

26
IPv4 Troubleshooting Tools (cont’d.)

27
IPv4 Troubleshooting Tools (cont’d.)
 Ping
 Ping is a command-line tool that verifies IP-level connectivity to another TCP/IP
computer.
 It sends ICMPecho request messages and displays the receipt of corresponding
echo reply messages.
 Ping is the primary TCP/IP command that you use to troubleshoot connectivity, but
firewalls might block the ICMP messages.
 Tracert
 Tracert is a command-line tool that identifies the path taken to a destination
computer by sending a series of ICMP echo requests.
 Tracert then displays the list of router interfaces between a source and a destination.
 This tool also determines which router has failed, and what the latency, or speed, is.
 These results might not be accurate if the router is busy, because the ICMP packets
are assigned a low priority by the router.

28
IPv4 Troubleshooting Tools (cont’d.)
 Pathping
 Pathping is a command-line tool that traces a route through the network in a manner similar to
Tracert.
 However, Pathping provides more detailed statistics on the individual steps, or hops, through
the network.
 Pathping can provide greater detail, because it sends 100 packets for each router, which enables it
to establish trends.
 Route
 Route is a command-line tool that allows you to view and modify the local routing table.
 You can use this to verify the default gateway, which is listed as the route 0.0.0.0.
 In Windows Server 2012, you can also use Windows PowerShell cmdlets to view and modify the
routing table.
 The cmdlets for viewing and modifying the local routing table include Get-NetRoute, New-
NetRoute, and Remove-NetRoute.

29
IPv4 Troubleshooting Tools (cont’d.)
 Telnet
 You can use the Telnet Client feature to verify whether a server port is listening.
 For example, the command telnet 10.10.0.10 25 attempts to open a connection with the
destination server, 10.10.0.10, on port 25.
 If the port is active and listening, it returns a message to the Telnet client.
 Netstat
 Netstat is a command-line tool that enables you to view network connections and statistics.
 For example, the command netstat –ab returns all listening ports and the executable that is
listening.

30
IPv4 Troubleshooting Tools (cont’d.)
 Resource Monitor
 Resource Monitor is a graphical tool that allows you to monitor system resource utilization.
 You can use Resource Monitor to view TCP and UDP ports that are in use.
 You can also verify which programs are using specific ports and the amount of data that
they are transferring on those ports.
 Network Diagnostics
 Use Windows Network Diagnostics to diagnose and correct networking problems.
 In the event of a Windows Server networking problem, the Diagnose Connection Problems
option helps you diagnose and repair the problem.
 Windows Network Diagnostics returns a possible description of the problem and a
potential remedy. However, the solution might require manual intervention from the user.

31
IPv4 Troubleshooting Tools (cont’d.)
 Event Viewer
 Event logs are files that record significant events on a computer, such as when a process
encounters an error.
 When these events occur, the Windows Server 2012 operating system records the event
in an appropriate event log.
 You can use Event Viewer to read the event log.
 IP conflicts, which might prevent services from starting, are listed in the System event log

32
The IPv4 Troubleshooting Process

33
Cont…
 Internet Protocol (IPv4 trivia)
 We are running out of addresses under the current (IPv4) addressing scheme.
 If every class A, Class B, and Class C network address was in use using classful
addresses, there would be ((127 * 16,000,000) + (16384 * 65,000) +
(2,097,152 * 254)) (or 3,629,636,608) hosts on the Internet. (3.6 gigahosts)
 The remainder of the addresses are the “zero”, and “broadcast hosts
(overhead).
 If subnetworking is in use, even more of the address space is lost to
“overhead”.
 Real Soon Now a new version of IP will be released. This version is known as
IPV6 (Internet Protocol version 6).
34
IPv6 Overview
 IPv4 is 32 bits long and offers around 4,294,967,296 (232) addresses. This
address space was considered more than enough that time.
 Internet Protocol version 6 (IPv6) is the latest revision of the Internet
Protocol (IP) and the first version of the protocol to be widely deployed.
 IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with
the long-anticipated problem of IPv4 address exhaustion.
 Some of the reasons are:
 Internet has grown exponentially and the address space allowed by IPv4 is
saturating.
 IPv4 on its own does not provide any security feature.
 IPv4 enabled clients can be configured manually or they need some address
configuration mechanism.
35
IPv6 Addressing
 An IPv6 address is made of 128 bits divided into eight, 16-bits blocks. Each
block is then converted into 4-digit Hexadecimal numbers separated by
colon(:) symbol.
 For example, given below is a 128 bit IPv6 address represented in binary
format and divided into eight 16-bits blocks:
 0010000000000001 0000000000000000 0011001000111000
1101111111100001 0000000001100011 0000000000000000
0000000000000000 1111111011111011
 Each block is then converted into Hexadecimal and separated by ‘:’ symbol:
 2001:0000:3238:DFE1:0063:0000:0000:FEFB
 Even after converting into Hexadecimal format, IPv6 address remains long.
 IPv6 provides some rules to shorten the address.
37
IPv6 Addressing …..
 The rules are as follows:
 2001:0000:3238:DFE1:0063:0000:0000:FEFB
 Rule.1: Discard leading Zero(es):
 In Block 5, 0063, the leading two 0s can be omitted, such as (5th block):
 2001:0000:3238:DFE1:63:0000:0000:FEFB
 Rule.2: If two of more blocks contain consecutive zeroes, omit them all
and replace with double colon sign ::, such as (6th and 7th block):
 2001:0000:3238:DFE1:63::FEFB
 Consecutive blocks of zeroes can be replaced only once by :: so if there
are still blocks of zeroes in the address, they can be shrunk down to a
single zero, such as (2nd block):
 2001:0:3238:DFE1:63::FEFB
38
Internet Protocol (cont’d.)
 Subnets and Supernets
 Subnets provide a way of chopping up large networks into smaller entities:
 Networks might be split up to segment traffic.
 Networks might be split up to facilitate better use of an assigned IP address space.
 A class A could be made to look like several class B/C networks.
 A class B could be made to look like several Class C networks.
 Even a Class C network can be sub-networked.
 When determining subnet addresses you should:
 Choose the number of subnet bits based on the number of subnet required
 User 2 n to determine the number of subnets available from n bits
 For five locations, the following three subnet bits are required:
 5 locations = 5 subnets required
 22 = 4 subnets (not enough)
 23 = 8 subnets
39
Internet Protocol (cont’d.)
 Subnets
 Network routers look at the destination IP address, and the netmask for the address to
make delivery (routing) decisions.
 Once the router determines the class of the destination address, it consults a table to find
the appropriate netmask.
 Class A netmask is 255.0.0.0
 Class B netmask is 255.255.0.0
 Class C netmask is 255.255.255.0

 For example, a packet bound from a random host on the Internet, to my office host
would generate the following operation:
 129.74.25.98 = 10000001 . 01001010 . 00011001 . 01100010
 255.255.0.0 = 11111111 . 11111111 . 00000000 . 00000000
10000001 . 01001010 . 00000000 . 00000000
== 129.74.0.0 or 129.74/16
40
Internet Protocol (cont’d.)
 The lab 129.74.46.0/24 network is subnetted into several smaller networks.
 By “stealing” bits from the host number, we can make the network number larger. This allows us to make a
class B or C network look like many smaller (classless) networks.
 These networks are denoted by the formula N.S.H (network.subnet.host)
 By using a 27 bit netmask we can divide a network up into several “2 3” host networks. 11111111 . 11111111 .
11111111 . 11100000
 27 bits of network address, 5 bits of host address.
NID Useful Range Broadcast Add
129.74.46.32 129.74.46.33-129.74.46.62 129.74.46.63
129.74.46.64 129.74.46.65-129.74.46.94 129.74.46.95
129.74.46.96 129.74.46.97-129.74.46. 129.74.46.127
… … …
129.74.46.224 129.74.46.225-129.74.46.254 129.74.46.255
 129.74.46.32/27 denotes a host on a classless network which employs a 27 bit netmask.
 This is referred to as Classless InterDomain Routing (CIDR)
41
Internet Protocol (cont’d.)
 Subnets and Supernets
 Supernets allow us to aggregate several smaller networks into one
larger routing entity:
 This is the opposite of subnetting.
Supernetting is employed to minimize routing table entries.
 Ifan ISP has a customer who needs addresses for 400 hosts, a single class C
address will not suffice.
 By combining two class C networks, the ISP can make a single routing entity:
 203.14.7.0 = 11001011 00001110 00000111 00000000
 203.14.6.0 = 11001011 00001110 00000110 00000000
 The first 23 bits are the same for both addresses so the ISP can advertise a single
external route:
 203.14.6/23
42
Internet Protocol (cont’d.)
 Classless Inter Domain Routing (CIDR)
 CIDR is the result of incorporating subnetting and supernetting into the classful IP
address structure.
 We are no longer limited to class A, B, and C addresses.
 By passing the netmask along with the address we can make arbitrarily large/small
networks, as we see fit, to simplify routing and network design.
 CIDR allows simplified routing tables.
 CIDR is the basis of IPv6.
 You may also hear the term Variable Length Subnet Mask (VLSM).
 This is the practice of using various length subnet masks within a single network
domain.

43
Physical Addresses and the Address Resolution Protocol
 Address Resolution Protocol (ARP)
 Acquire the physical addresses associated with a computer’s network interface card (NIC)
 Media access control (MAC) address
 Physical address of NIC
 TCP/IP relies on both IP addresses and MAC addresses
 LAB work:
 Objective: Practice all options of ARP command

44
Using ARP to query the MAC
address

45
Switching and Routing Basics
 Switches operate at the data link layer
(Layer 2) and are responsible for
forwarding data within a local network.
They use MAC addresses to make
forwarding decisions.
 Switches are commonly used in LANs
to provide high-speed data transfer for
devices like computers, printers, and
phones.
 VLANs, Access Control List, security
setting, QoS, etc. can be configured on
switch

46
Switching and Routing Basics
 Routers are used in WANs and the internet to
connect different networks and ensure data
reaches its intended destination.
 Routers operate at the network layer (Layer
3) and determine the path data takes in a
network. They use IP addresses and routing
tables to make routing decisions.
 Network Address translations(NAT), Routing,
IP address, security setting etc can be
configured on routers

47
2.4. Introduction to the Server
 Server is a physical computer that provide
services to all client computers connected to it,
allowing them (client computer) to access
available information or resources
 The essential point is that a server offers a
“service” to devices connected to it

 On a network, a server is known as a host


Generic Server Racks set

 The devices that are connecting to the server


are known as clients
51 Server 2U
How are Servers different?
 100s or 1000s of clients depend on server.
 Requires high reliability.
 Requires tighter security.
 Often expected to last longer.
 Investment amortized over many clients, longer lifetime.

52
Server Machines
 More internal space.
 More CPU/Memory.
 More / high-end CPUs.
 More / faster memory.
 High performance I/O.
 PCIe vs PCI
 SCSI/FC-AL vs. IDE
 Rack mounted.
 Redundancy
 RAID
 Hot-swappable hardware.
Rack Mounting
Efficient space utilization.
 Simple, rectangular shape measured in RUs.
 Repair and upgrade while mounted in rack.
 No side access required.
Requirements
 Cooling through back, not sides.
 Drives in front, cables in back.
 Remote management (serial console, hw sensors)

54
Server Memory
Servers need more memory than desktops.
 x86 supports up to 64GB with PAE.
 x86-64 supports 1 PB (1024 TB)
Servers need faster memory than desktops.
 Higher memory speeds.
 Multiple DIMMs accessed in parallel.
 Larger CPU caches.

55
Server CPUs
Enterprise Processors
 Intel Xeon (x86)
 AMD Opteron (x86)
 Itanium 2
 Sun UltraSPARC T1
 4, 6, or 8 cores.
 Each with 4 threads.
 IBM POWER 5 POWER 5 MCM with 4
 dual-core
dual-core HT CPUs + 4
 Each with 2 threads.
36MB L3 cache chips.

56
Xeon vs Pentium
Xeon improvements
 Faster L2 cache (Pentium-II/III)
 Multiprocessing support (or >2 MP support)
 Hyperthreading (before Pentium-4 could)
 x86-64 support (before Pentium-4 could)
 Larger L2 cache (Pentium-4)
 Faster FSB (Pentium-4)

57
System Buses
Servers need high I/O throughput.
 Fast peripherals: SCSI-3, Gigabit ethernet
 Often use multiple and/or faster buses.
PCI
 Desktop: 32-bit 33 MHz, 133 MB/s
 Server: 64-bit 66 MHz, 533 MB/s
PCI-X (backward compatible)
 v1.0: 64-bit 133 MHz, 1.06 GB/s
 v2.0: 64-bit 533 MHz, 4.3 GB/s
PCI Express (PCIe)
 Serial architecture, v2.0 up to 16 GB/s

58
Blade Server vs. Rack Server vs. Tower Server
 Rack servers are compact and designed for standardized rack
installation, making them space-efficient. They come in various
heights like 1U, 4U, 6U, or 10U, and they are commonly used in
data centers for efficient management.
 Tower servers, on the other hand, are bulkier desktop-style
computers with higher CPU power and memory. They're
suitable for multi-user tasks and services like DHCP or DNS,
but they occupy more space.
 Blade servers are smaller than rack servers and contain
modular components like CPU, memory, and network controls.
Some models have storage drives for network storage. These
are prevalent in data centers.
 rack and blade servers are popular in data centers for space
efficiency, while tower servers are typically used in smaller
enterprises or office settings where space is less constrained.

59
Types of Servers
 There are many different types of Servers that are used for a range of purposes, below are a few
common uses for servers:

 File Server:
Stores files that can be accessed and shared with many clients
 Web Server:
Holds and stores webpages for clients to access
 Database Server:
Similar to a file server, but stores and holds a database system, again for many clients to access
 Mail server
A mail server stores and delivers mail for clients through email service platforms.
 Game Server:
Holds a game/games for clients to access and share. Typically used for online gaming
 Print server
A print server connects remotely to local computers to print through a network.
60

You might also like