Network Administration
CHAPTER TWO
1
Outline
Introduction to Network Administration
Goal of network administration
TCP/IP Networking Basics and IP address
Switching and routing basics
Introduction to the Server
Server Types and Services
2
Introduction to Network Administration
Network administration means the management of network
infrastructure devices (routers, switches, PCs in a network etc ).
Network administration involves a wide array of operational tasks that
help a network to run smoothly and efficiently.
Without network administration, it would be difficult for all but the
smallest networks to maintain network operations.
Specifically, this would include the management and maintenance of
switches, routers, firewalls,VPN gateways, etc.
3
Introduction to Network Administration…
As a network administrator, your tasks generally fall into the following areas:
planning the network
determine network requirement and needs (current number of host machines and in future,
local (onsite) and remote (off-site) number of users, types of application running, which server
specification, specify network hardware requirement etc. )
Which topology to use
Cabling (CAT 5, Optical fiber, wireless…. )
Etc.…
Designing and setting up the network
installing the hardware that makes up the physical part of the network,
and configuring the files or databases, hosts, routers, and network configuration servers.
Maintaining the network
Adding new host machines to the network
Administering network security
Administering network services, name services, and electronic mail
Troubleshooting network problems
Expanding the network
4
Goal of network administration
Network administration aims to manage, monitor, maintain, secure, and service an
organization's network
Generally, network administration goals include:
maintain a resilient, high-quality network
plan and improve network capacity to enable seamless network access and operations
leverage networking tools for network systems administration and better network
administration control
track and document relevant changes
evaluate possible risks and plan effective mitigations
prevent activities compromising or using the network as an attack vector
identify and mitigate intrusions to avoid security breaches
5
Goal of network administration….
Network administration compromises of 3 majors groups:
Network provisioning
Network operations
Network maintenance
6
TCP/IP Networking Basics
TCP/IP - Transmission Control
Protocol/Internet Protocol
has 4 (or 5 depending on how you see
it) layers:
Application, Transport, Internet
(Internetwork), Host-to-network (some
split it into Physical and Data Link)
77
The TCP/IP Protocol Suite
Application layer. Programs use application layer protocols to access network resources.
• Application layer protocols include: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer
Protocol (SMTP), Server Message Block (SMB), Domain Name System (DNS), Post Office Protocol 3 (POP3).
Transport layer. Transport layer protocols control data transfer reliability on the network. Transport layer protocols
include:
• Transmission Control Protocol (TCP) • User Datagram Protocol (UDP)
Internet layer. The Internet layer protocols control packet movement between networks. Internet layer protocols
include:
• Internet protocol(IP) (IPv4 and IPv6) • Internet Group Management Protocol (IGMP)
• Address Resolution Protocol (ARP) • Internet Control Message Protocol (ICMP)
Network interface layer. The network interface layer protocols define how datagrams from the Internet layer are
transmitted on the media.
8
Protocols in the TCP/IP Suite
9
Internet Protocol
Provides network addressing
Ensures data packets quickly reach the correct destination
Versions
Internet Protocol Version 4 (IPv4)
Used on most networks
Internet Protocol Version 6 (IPv6)
Router
Connects networks
10
A router forwarding packets to a designated network
11
Internet Protocol (cont’d.)
IP addressing
Dotted decimal notation
32 bits long
Four fields
Example: 10000001.00000101.00001010.01100100 or 129.5.10.100
Unicast
One packet is sent from a server to each client on request
Multicast
Packet is sent to all clients as a group
12
Internet Protocol (cont’d.)
Broadcast
Sends communication to all points on network
Subnet mask
Used to show class of addressing and to divide network into subnets
IP address considerations
Network number 127.0.0.0 cannot be assigned to any network
Private addresses reserved for Network Address Translation (NAT)
Cannot assign highest network number to a host
13
Unicasting, broadcasting, and multicasting
14
Internet Protocol (cont’d.)
Static addressing
Assign permanent IP address
Gives consistency for monitoring
Can be laborious for large networks
Dynamic addressing
IP address assigned during logon
Uses the Dynamic Host Configuration Protocol (DHCP)
15
Internet Protocol (cont’d.)
Default gateway
IP address of the router that has a connection to other networks
Name resolution
Domain Name System (DNS) translates domain and computer names to
IP addresses
16
IP addressing
Internet Protocol Version 4 (IPv4)
An IP address consists of four byte values separated by periods.
For Example: 123.45.67.89
This notation is also known as the dotted quad format.
Each of the values must be in the range of 0 - 255 (8 bits).
An IPv4 address is therefore 32 bits (4 bytes * 8 bits/byte).
There are five classes of IP Addresses in IPv4:
Class A, B, and C addresses are used for single host addressing.
Class D addresses are used for multicast connections.
Class E addresses are experimental.
17
Cont….
Class A Networks
The first byte is in the range of 1 - 127.
The first four bits of the address are Binary 0 X X X
There are 127 Class A networks.
The first byte of a class A address is the network number.
Private IP Range: 10.0.0.0 to 10.255.255.255
The remaining three bytes are the host address on that network.
110 .32.4.18
network host address
Each Class A network can address up to 16 million hosts.
18
Cont….
Class B Networks
The first byte in the range of 128 - 191.
The first four bits of the address are BINARY 1 0 X X
There are 16,384 Class B networks.
The first two bytes of a class B address are the network
number.
Private IP Range: 172.16.0.0 to 172.31.255.255
The remaining two bytes are the host address on that network.
129.74. 25.98
network host address
Each Class B network can address up to 65,000 hosts.
19
Cont….
Class C Networks
The first byte in the range of 192 - 223.
The first four bits of the address are 1 1 0 X
There are 2,097,152 Class C networks.
The first three bytes of a class C address is the network number.
Private IP Range: 192.168.0.0 to 192.168.255.255
The remaining byte is the host address on that network.
210.43.2 .8
network host address
Each Class C network can address up to 254 hosts.
Most of the Class C networks are assigned and in use.
20
Cont….
Internet Protocol (IPv4)
Class D Networks - The first byte in the range of 224 - 239.
The first four bits of the address are 1 1 1 0
These addresses are used for “one to many”
communications (multicasting).
Class E Networks - The first byte in the range of 240 - 254.
The first four bits of the address are 1 1 1 1
These addresses are reserved for experimental use by the
IANA.
21
Cont….
The numbers 0, and 255 have special meaning in some fields of IP
addresses.
A Zero host address refers to “this network”
For example 129.74.0.0 refers to the Class B network 129.74.
A host address of all ones is called the broadcast address.
For
example 129.74.255.255 refers to all hosts on the
129.74 Class B network.
The address 127.0.0.1 is the loopback address.
This address is used for inter-process communications, and for
network testing.
All of the 127 network is reserved (127.0.0.0 - 127.255.255.255).
22
Summary IPV4
23
Configuring and Troubleshooting IPv4
You can configure IPv4 addresses manually or automatically.
An IPv4 address is configured automatically when a server that runs Dynamic Host
Configuration Protocol – DHCP assigns and IPv4 address to the computers or
network devices.
Static IP addresses are usually configured on servers, routers, switches or other
network devices that need to maintain persistent IP configuration that does not
change over time
To configure a static IP address for a server in an IPv4 configuration, you will need to
determine the following settings:
IPv4 address
Subnet mask
Default gateway
DNS servers
24
Configuring and Troubleshooting IPv4 (cont’d.)
Static configuration requires that you visit each computer and input the IPv4
configuration manually.
This method of computer management is reasonable for servers, but it is very time
consuming for client computers. Manually entering a static configuration also
increases the risk of configuration mistakes.
25
IPv4 Troubleshooting Tools in widow server
Windows Server 2012 includes a number of command-line tools that can help you
diagnose network problems.
These tools were commonly used in earlier Windows Server editions.
Ipconfig
Ipconfig is a command-line tool that displays the current TCP/IP network
configuration.
Additionally, you can use the ipconfig command to refresh DHCP and DNS
settings.
26
IPv4 Troubleshooting Tools (cont’d.)
27
IPv4 Troubleshooting Tools (cont’d.)
Ping
Ping is a command-line tool that verifies IP-level connectivity to another TCP/IP
computer.
It sends ICMPecho request messages and displays the receipt of corresponding
echo reply messages.
Ping is the primary TCP/IP command that you use to troubleshoot connectivity, but
firewalls might block the ICMP messages.
Tracert
Tracert is a command-line tool that identifies the path taken to a destination
computer by sending a series of ICMP echo requests.
Tracert then displays the list of router interfaces between a source and a destination.
This tool also determines which router has failed, and what the latency, or speed, is.
These results might not be accurate if the router is busy, because the ICMP packets
are assigned a low priority by the router.
28
IPv4 Troubleshooting Tools (cont’d.)
Pathping
Pathping is a command-line tool that traces a route through the network in a manner similar to
Tracert.
However, Pathping provides more detailed statistics on the individual steps, or hops, through
the network.
Pathping can provide greater detail, because it sends 100 packets for each router, which enables it
to establish trends.
Route
Route is a command-line tool that allows you to view and modify the local routing table.
You can use this to verify the default gateway, which is listed as the route 0.0.0.0.
In Windows Server 2012, you can also use Windows PowerShell cmdlets to view and modify the
routing table.
The cmdlets for viewing and modifying the local routing table include Get-NetRoute, New-
NetRoute, and Remove-NetRoute.
29
IPv4 Troubleshooting Tools (cont’d.)
Telnet
You can use the Telnet Client feature to verify whether a server port is listening.
For example, the command telnet 10.10.0.10 25 attempts to open a connection with the
destination server, 10.10.0.10, on port 25.
If the port is active and listening, it returns a message to the Telnet client.
Netstat
Netstat is a command-line tool that enables you to view network connections and statistics.
For example, the command netstat –ab returns all listening ports and the executable that is
listening.
30
IPv4 Troubleshooting Tools (cont’d.)
Resource Monitor
Resource Monitor is a graphical tool that allows you to monitor system resource utilization.
You can use Resource Monitor to view TCP and UDP ports that are in use.
You can also verify which programs are using specific ports and the amount of data that
they are transferring on those ports.
Network Diagnostics
Use Windows Network Diagnostics to diagnose and correct networking problems.
In the event of a Windows Server networking problem, the Diagnose Connection Problems
option helps you diagnose and repair the problem.
Windows Network Diagnostics returns a possible description of the problem and a
potential remedy. However, the solution might require manual intervention from the user.
31
IPv4 Troubleshooting Tools (cont’d.)
Event Viewer
Event logs are files that record significant events on a computer, such as when a process
encounters an error.
When these events occur, the Windows Server 2012 operating system records the event
in an appropriate event log.
You can use Event Viewer to read the event log.
IP conflicts, which might prevent services from starting, are listed in the System event log
32
The IPv4 Troubleshooting Process
33
Cont…
Internet Protocol (IPv4 trivia)
We are running out of addresses under the current (IPv4) addressing scheme.
If every class A, Class B, and Class C network address was in use using classful
addresses, there would be ((127 * 16,000,000) + (16384 * 65,000) +
(2,097,152 * 254)) (or 3,629,636,608) hosts on the Internet. (3.6 gigahosts)
The remainder of the addresses are the “zero”, and “broadcast hosts
(overhead).
If subnetworking is in use, even more of the address space is lost to
“overhead”.
Real Soon Now a new version of IP will be released. This version is known as
IPV6 (Internet Protocol version 6).
34
IPv6 Overview
IPv4 is 32 bits long and offers around 4,294,967,296 (232) addresses. This
address space was considered more than enough that time.
Internet Protocol version 6 (IPv6) is the latest revision of the Internet
Protocol (IP) and the first version of the protocol to be widely deployed.
IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with
the long-anticipated problem of IPv4 address exhaustion.
Some of the reasons are:
Internet has grown exponentially and the address space allowed by IPv4 is
saturating.
IPv4 on its own does not provide any security feature.
IPv4 enabled clients can be configured manually or they need some address
configuration mechanism.
35
IPv6 Addressing
An IPv6 address is made of 128 bits divided into eight, 16-bits blocks. Each
block is then converted into 4-digit Hexadecimal numbers separated by
colon(:) symbol.
For example, given below is a 128 bit IPv6 address represented in binary
format and divided into eight 16-bits blocks:
0010000000000001 0000000000000000 0011001000111000
1101111111100001 0000000001100011 0000000000000000
0000000000000000 1111111011111011
Each block is then converted into Hexadecimal and separated by ‘:’ symbol:
2001:0000:3238:DFE1:0063:0000:0000:FEFB
Even after converting into Hexadecimal format, IPv6 address remains long.
IPv6 provides some rules to shorten the address.
37
IPv6 Addressing …..
The rules are as follows:
2001:0000:3238:DFE1:0063:0000:0000:FEFB
Rule.1: Discard leading Zero(es):
In Block 5, 0063, the leading two 0s can be omitted, such as (5th block):
2001:0000:3238:DFE1:63:0000:0000:FEFB
Rule.2: If two of more blocks contain consecutive zeroes, omit them all
and replace with double colon sign ::, such as (6th and 7th block):
2001:0000:3238:DFE1:63::FEFB
Consecutive blocks of zeroes can be replaced only once by :: so if there
are still blocks of zeroes in the address, they can be shrunk down to a
single zero, such as (2nd block):
2001:0:3238:DFE1:63::FEFB
38
Internet Protocol (cont’d.)
Subnets and Supernets
Subnets provide a way of chopping up large networks into smaller entities:
Networks might be split up to segment traffic.
Networks might be split up to facilitate better use of an assigned IP address space.
A class A could be made to look like several class B/C networks.
A class B could be made to look like several Class C networks.
Even a Class C network can be sub-networked.
When determining subnet addresses you should:
Choose the number of subnet bits based on the number of subnet required
User 2 n to determine the number of subnets available from n bits
For five locations, the following three subnet bits are required:
5 locations = 5 subnets required
22 = 4 subnets (not enough)
23 = 8 subnets
39
Internet Protocol (cont’d.)
Subnets
Network routers look at the destination IP address, and the netmask for the address to
make delivery (routing) decisions.
Once the router determines the class of the destination address, it consults a table to find
the appropriate netmask.
Class A netmask is 255.0.0.0
Class B netmask is 255.255.0.0
Class C netmask is 255.255.255.0
For example, a packet bound from a random host on the Internet, to my office host
would generate the following operation:
129.74.25.98 = 10000001 . 01001010 . 00011001 . 01100010
255.255.0.0 = 11111111 . 11111111 . 00000000 . 00000000
10000001 . 01001010 . 00000000 . 00000000
== 129.74.0.0 or 129.74/16
40
Internet Protocol (cont’d.)
The lab 129.74.46.0/24 network is subnetted into several smaller networks.
By “stealing” bits from the host number, we can make the network number larger. This allows us to make a
class B or C network look like many smaller (classless) networks.
These networks are denoted by the formula N.S.H (network.subnet.host)
By using a 27 bit netmask we can divide a network up into several “2 3” host networks. 11111111 . 11111111 .
11111111 . 11100000
27 bits of network address, 5 bits of host address.
NID Useful Range Broadcast Add
129.74.46.32 129.74.46.33-129.74.46.62 129.74.46.63
129.74.46.64 129.74.46.65-129.74.46.94 129.74.46.95
129.74.46.96 129.74.46.97-129.74.46. 129.74.46.127
… … …
129.74.46.224 129.74.46.225-129.74.46.254 129.74.46.255
129.74.46.32/27 denotes a host on a classless network which employs a 27 bit netmask.
This is referred to as Classless InterDomain Routing (CIDR)
41
Internet Protocol (cont’d.)
Subnets and Supernets
Supernets allow us to aggregate several smaller networks into one
larger routing entity:
This is the opposite of subnetting.
Supernetting is employed to minimize routing table entries.
Ifan ISP has a customer who needs addresses for 400 hosts, a single class C
address will not suffice.
By combining two class C networks, the ISP can make a single routing entity:
203.14.7.0 = 11001011 00001110 00000111 00000000
203.14.6.0 = 11001011 00001110 00000110 00000000
The first 23 bits are the same for both addresses so the ISP can advertise a single
external route:
203.14.6/23
42
Internet Protocol (cont’d.)
Classless Inter Domain Routing (CIDR)
CIDR is the result of incorporating subnetting and supernetting into the classful IP
address structure.
We are no longer limited to class A, B, and C addresses.
By passing the netmask along with the address we can make arbitrarily large/small
networks, as we see fit, to simplify routing and network design.
CIDR allows simplified routing tables.
CIDR is the basis of IPv6.
You may also hear the term Variable Length Subnet Mask (VLSM).
This is the practice of using various length subnet masks within a single network
domain.
43
Physical Addresses and the Address Resolution Protocol
Address Resolution Protocol (ARP)
Acquire the physical addresses associated with a computer’s network interface card (NIC)
Media access control (MAC) address
Physical address of NIC
TCP/IP relies on both IP addresses and MAC addresses
LAB work:
Objective: Practice all options of ARP command
44
Using ARP to query the MAC
address
45
Switching and Routing Basics
Switches operate at the data link layer
(Layer 2) and are responsible for
forwarding data within a local network.
They use MAC addresses to make
forwarding decisions.
Switches are commonly used in LANs
to provide high-speed data transfer for
devices like computers, printers, and
phones.
VLANs, Access Control List, security
setting, QoS, etc. can be configured on
switch
46
Switching and Routing Basics
Routers are used in WANs and the internet to
connect different networks and ensure data
reaches its intended destination.
Routers operate at the network layer (Layer
3) and determine the path data takes in a
network. They use IP addresses and routing
tables to make routing decisions.
Network Address translations(NAT), Routing,
IP address, security setting etc can be
configured on routers
47
2.4. Introduction to the Server
Server is a physical computer that provide
services to all client computers connected to it,
allowing them (client computer) to access
available information or resources
The essential point is that a server offers a
“service” to devices connected to it
On a network, a server is known as a host
Generic Server Racks set
The devices that are connecting to the server
are known as clients
51 Server 2U
How are Servers different?
100s or 1000s of clients depend on server.
Requires high reliability.
Requires tighter security.
Often expected to last longer.
Investment amortized over many clients, longer lifetime.
52
Server Machines
More internal space.
More CPU/Memory.
More / high-end CPUs.
More / faster memory.
High performance I/O.
PCIe vs PCI
SCSI/FC-AL vs. IDE
Rack mounted.
Redundancy
RAID
Hot-swappable hardware.
Rack Mounting
Efficient space utilization.
Simple, rectangular shape measured in RUs.
Repair and upgrade while mounted in rack.
No side access required.
Requirements
Cooling through back, not sides.
Drives in front, cables in back.
Remote management (serial console, hw sensors)
54
Server Memory
Servers need more memory than desktops.
x86 supports up to 64GB with PAE.
x86-64 supports 1 PB (1024 TB)
Servers need faster memory than desktops.
Higher memory speeds.
Multiple DIMMs accessed in parallel.
Larger CPU caches.
55
Server CPUs
Enterprise Processors
Intel Xeon (x86)
AMD Opteron (x86)
Itanium 2
Sun UltraSPARC T1
4, 6, or 8 cores.
Each with 4 threads.
IBM POWER 5 POWER 5 MCM with 4
dual-core
dual-core HT CPUs + 4
Each with 2 threads.
36MB L3 cache chips.
56
Xeon vs Pentium
Xeon improvements
Faster L2 cache (Pentium-II/III)
Multiprocessing support (or >2 MP support)
Hyperthreading (before Pentium-4 could)
x86-64 support (before Pentium-4 could)
Larger L2 cache (Pentium-4)
Faster FSB (Pentium-4)
57
System Buses
Servers need high I/O throughput.
Fast peripherals: SCSI-3, Gigabit ethernet
Often use multiple and/or faster buses.
PCI
Desktop: 32-bit 33 MHz, 133 MB/s
Server: 64-bit 66 MHz, 533 MB/s
PCI-X (backward compatible)
v1.0: 64-bit 133 MHz, 1.06 GB/s
v2.0: 64-bit 533 MHz, 4.3 GB/s
PCI Express (PCIe)
Serial architecture, v2.0 up to 16 GB/s
58
Blade Server vs. Rack Server vs. Tower Server
Rack servers are compact and designed for standardized rack
installation, making them space-efficient. They come in various
heights like 1U, 4U, 6U, or 10U, and they are commonly used in
data centers for efficient management.
Tower servers, on the other hand, are bulkier desktop-style
computers with higher CPU power and memory. They're
suitable for multi-user tasks and services like DHCP or DNS,
but they occupy more space.
Blade servers are smaller than rack servers and contain
modular components like CPU, memory, and network controls.
Some models have storage drives for network storage. These
are prevalent in data centers.
rack and blade servers are popular in data centers for space
efficiency, while tower servers are typically used in smaller
enterprises or office settings where space is less constrained.
59
Types of Servers
There are many different types of Servers that are used for a range of purposes, below are a few
common uses for servers:
File Server:
Stores files that can be accessed and shared with many clients
Web Server:
Holds and stores webpages for clients to access
Database Server:
Similar to a file server, but stores and holds a database system, again for many clients to access
Mail server
A mail server stores and delivers mail for clients through email service platforms.
Game Server:
Holds a game/games for clients to access and share. Typically used for online gaming
Print server
A print server connects remotely to local computers to print through a network.
60