Networking & Troubleshooting Training Slides
Networking & Troubleshooting Training Slides
Networking & Troubleshooting Training Slides
Kelvin Goh
Module 1 – Networking Primer
• Networking Primer
– Overview of Networking
– Benefits of Networking
– Network Concepts
– OSI Model
– Network Protocol Suites
– Network Ports and Addressing
• Networking Components
– Repeaters, Hubs, Routers, Bridges, Switches and
Modems
– Network Operating Systems
– Client Software
– Network Application
• Module 1 Summary
Overview of Networking
• What Is a Network?
Description of what actually a network is
• Networking Is Faster
No more slow processing of data
• Centralized Management
Easy administration maintenance
Benefits of Networking
• Simplified Resource Sharing
– Resource sharing is easier over a network; whether the network
uses a peer or client/server configuration is immaterial.
– Shared Disk Space
• Networked computers can share their hard disk space with
each other.
– Shared Printers
• A third aspect of resource sharing is shared printers. It can
helps to reduce the capital expense.
Benefits of Networking
• Networking Is Faster
– Networking is faster than not networking.
– Just think about it:
• No more printing memos—use email!
• No more running from desk to desk to check everyone's
availability for a meeting—use the group calendar!
• No more wondering whose Rolodex has the name of the
person you need to call—you can get it from the contact
database.
• No more racing around from computer to computer to get the
file you need—just copy or open it from the network drive.
Benefits of Networking
• Centralized Management
– Centralized management saves time and money (two things
accountants appreciate) as well as the goodwill of the users and
the credibility of the administrator (two things the users and
administrators appreciate)
Network Concepts
• Network Topology
Network physical and logical layout
• Network Media
How computer connect to each other?
Network Concepts
• Network-specific hardware
– Network-specific hardware comes in two varieties.
Network Software
Network Hardware
Wizard Title
Wizard Text
Servers
` `
`
` ` ` `
– Star Topology `
`
HUB
`
` `
`
HUB
`
`
` `
`
` `
– Ring Topology
` `
`
`
` HUB `
` ` ` `
`
`
Star Ring
Star Bus
` `
`
`
` `
` `
` `
`
` HUB `
` `
`
– Ring Topology `
`
– Ring Topology `
`
` HUB `
` `
` HUB `
Star Bus ` `
HUB
o Linking several star hub together with bus trunks
` `
` `
`
` `
Star Ring
Network Concepts
• Network Topology `
Hybrid Mesh
Hybrid mesh: Contain some redundant links
True mesh: Has a link between each device in the network
Advantages of the Mesh `
o Fault tolerance ` `
Insulation
Inner conductor
Network Concepts
• Network Medium
- Copper unshielded twisted-pair
Consists of two insulated copper wires arranged in a regular spiral pattern
A number of pairs are bundled into a cable by wrapping them in a tough
protective sheath
The twisting decreases the crosstalk interference between adjacent pairs
in a cable
Network Concepts
• Network Medium
- Copper unshielded twisted-pair
Come in five categories:
o Category 1 is not rated for performance.
o Category 2 is used for telephone wiring and is rated to a maximum
data rate of 1 megabit per second.
o Category 3 is the lowest level that can be used for networking. It is
used for Ethernet 10BASE-T and has a maximum data rate of 16
megabits per second.
o Category 4 is used for Token-Ring and Ethernet 10BASE-T. Its
maximum data rate is 20 megabits per second.
o Category 5 is used for Ethernet 100BASE-T and has a maximum
data rate of 155 megabits per second.
Network Concepts
• Network Medium
- Optical fiber
Made using glasses and plastics
Using optical ray to transmit information
Consists of 3 concentric sections: Two innermost layer (core, cladding)
with two type of glass with different indexes of refraction
Optical fibers are grouped together into optical cables
Optical fiber can carry data at very high bit rates—in some cases, up to
622 megabits per second.
Jacket
Cladding
Core
Network Concepts
• Network Medium
- Wireless
- Transmission are achieved by means of an antenna
- Directional transmission: electromagnectic beam is focused,
thus antennas must be aligned carefully
- Omnidirectional transmission: transmitted signal spreads out
in all directions and can be received by many antennas
- Radio and Infrared are wireless medium
Open Systems Interconnect (OSI) Model
• Introducing the Open Systems Interconnect (OSI) Model
• The OSI Model Lower Layers Functions
– Physical Layer
– Data Link Layer
• The OSI Model Middle Layers Functions
– Network Layer
– Transport Layer
• The OSI Model Upper Layers Function
– Session Layer
– Presentation Layer
– Application Layer
– Upper Layer Devices
Open Systems Interconnect (OSI) Model
• Introducing the Open Systems Interconnect (OSI) Model
– Developed by the International Organization for Standardization
(ISO)
– To provide “common ground’ when describing any network
protocol
– Consists of 7 layers
– OSI Model is only a model, it is not a protocol
– It is a stalwart of networking theory
– Each layer performs a specific function
Open Systems Interconnect (OSI) Model
• Introducing the Open Systems Interconnect (OSI) Model
Information Flow
Network Medium
• Protocol
How network communicate?
• TCP/IP
The Internet Standard
• Netware IPX/SPX
Novel Netware Protocol
• AppleTalk
Apple Computer Macintosh Protocol
Major Network Protocol Suites
• Protocol
– A protocol is a system of common rules that helps define the
complex process of transferring data.
– A common language of computer communication
Major Network Protocol Suites
• Transmission Control Protocol/Internet Protocol (TCP/IP)
– Protocol that carries data traffic over the Internet
– Refers to a suite of data communication protocols
– It is an open standard – no single company own it
– Often referred to as the DoD protocol suite or the Internet
protocol suite
– TCP/IP Features
Logical addressing
Routing
Name service
Error control and flow control
Application support
Major Network Protocol Suites
• Transmission Control Protocol/Internet Protocol (TCP/IP)
– In contrast to OSI Model, TCP/IP uses only 4 layers
Application
Application/
Presentation FTP TELNET SMTP NFS
Process RIP
Session OSPF
Data Link
Network
Physical
OSI Model TCP/IP Model TCP/IP Protocol suite mapped to the OSI Model
Major Network Protocol Suites
• Transmission Control Protocol/Internet Protocol (TCP/IP)
– Application: Provides applications for network troubleshooting, file transfer,
remote control, and Internet activities. Also supports the network Application
Programming Interfaces (APIs) that enable programs written for a particular
operating environment to access the network.
– Host-to-Host/Transport: Provides flow control, error control, and
acknowledgment services for the internetwork.
– Internet: Provides logical, hardware-independent addressing so that data can
pass among subnets with different physical architectures. Provides routing and
support delivery across the internetwork. Relates physical addresses (used at
the Network Access layer) to logical addresses.
– Network: Provides an interface with the physical network. Formats the data for
the transmission medium and addresses data for the subnet based on physical
hardware addresses. Provides error control for data delivered on the physical
network.
Major Network Protocol Suites
• NetWare IPX/SPX
– Developed by Novell Corp
– It is not an open standard
– It is a server-centric architecture
– Netware protocols are modular, can use with other protocols,
such as TCP/IP and AppleTalk
Major Network Protocol Suites
• NetWare IPX/SPX
Application
Presentation SAP NCP NLSP RIP
Session
Transport SPX
IPX NLSP RIP
Network
LSL
Data Link MLID
Physical
OSI Model Netware protocol suite mapped to the OSI Model
Major Network Protocol Suites
• AppleTalk
– Developed by Apple Computer Corp
– Can coexist with multiple protocols on large, complex networks
Application AppleTalk
Presentation AFP
Network DDP
• Network Ports
Door and Windows of a network
• Network IP Addressing
Logical address for network
• Network Subnetting
How to group and maximize the use of IP
Network Ports & Addressing
• Network Ports
– Door for communication
– Each process that wants to communicate with another process
identifies itself to the protocol suite by one or more ports
– A port is a 16-bit number digit (65535 ports)
– Two types of ports:
Well-known: Well-known ports belong to standard servers, it ranges from 0
to 1023
Ephemeral: Any ports other than well-known ports is ephemeral port,
which is any ports greater than 1023. It ranges from 1024 to 65535.
Network Ports & Addressing
• Network IP Addressing
– An IP address is a 32-bit binary address, this 32-bit address is
subdivided into four 8-bit segments called octets.
– It is always refer as dotted decimal format
– A dotted decimal IP address: 209.121.131.14
– IP addresses fall into the following address classes:
Class A addresses— The first 8 bits of the IP address are used for the
network ID. The final 24 bits are used for the host ID.
Class B addresses— The first 16 bits of the IP address are used for the
network ID. The final 16 bits are used for the host ID.
Class C addresses— The first 24 bits of the IP address are used for the
network ID. The final 8 bits are used for the host ID.
Network Ports & Addressing
• Network IP Addressing
– Address ranges for Class A, B, and C networks
Address Class Binary Address Must First Term of Dotted Decimal Excluded Addresses
Begin with Address Must Be
127.0.0.0 to 127.255.255.255
• Client Software
Networking Client Software
• Network Application
Application software that get things done
Networking Components
• Repeaters
– Simple two-port signal amplifiers
– Used in bus topology to extend the distance
– Receive a digital signal, amplify it, and transmit it
– Why use repeater?
• Cheap, effective way of extending cable lengths
Q&A
Thank You
Module 2 – Networking (From Small to Big)
• Local Area Network (LAN)
• Module 2 Summary
Local Area Network (LAN)
• Definition
LAN: A Local Area Network, or LAN, is the least complex
organizational distinction of computer networks. A LAN is nothing
more than a group of computers linked through a network that are all
at a single site.
• The following characteristics differentiate one LAN from another:
– topology: The geometric arrangement of devices on the network. For
example, devices can be arranged in a ring or in a straight line
– protocols: The rules and encoding specifications for sending data. The
protocols also determine whether the network uses a peer-to-peer or
client/server architecture
– media: Devices can be connected by twisted-pair wire, coaxial cables, or fiber
optic cables. Some networks do without connecting media altogether,
communicating instead via radio waves
Local Area Network (LAN)
• Local Area Network Technology
– Ethernet
– Fast Ethernet
– Gigabit Ethernet
– Token Ring
– Fiber Distributed Data Interface (FDDI)
– Wireless LANs
Local Area Network (LAN)
• Local Area Network Technology
– Ethernet
Most widely used local area network (LAN) technology
Supports a data transmission rate of 10 Mb/s
Use coaxial cable, twisted pair wiring, or fiber optic cable
Support “Bus” and “Star”
Ethernet Media Access Control
o Half-Duplex Ethernet
o Full-Duplex Ethernet
Local Area Network (LAN)
• Local Area Network Technology
– Ethernet
Physical Layer Standard
o 10Base5
o 10Base2
o 10Base-T
o 100Base-T
o 100Base-TX
o 1000Base-T
Ethernet Cabling and Connectors
o Twisted Pair Cabling
o Coaxial Cabling
o Fiber Optic Cabling
o Ethernet Connectors
Local Area Network (LAN)
• Local Area Network Technology
– Fast Ethernet
New version of Ethernet
Supports a data transmission rate of 100 Mb/s
– Gigabit Ethernet
New version of Ethernet
Supports a data transmission rate of 1000 Mb/s (1 Gb/s)
Local Area Network (LAN)
• Local Area Network Technology
– Token Ring
• Second most widely used local area network (LAN)
technology after Ethernet
• Use ring topology with data being transmitted sequentially
from one ring station to the next
• The ring is initialized by circulating a token
• Defined by IBM in early 1980s
Local Area Network (LAN)
• Local Area Network Technology
– Token Ring
• Two types of token ring:
Classic Token Ring
o Half-duplex
o Use share bandwidth
o Referred as shared Token Ring or half-duplex Token Ring
Dedicated Token Ring
o Full-duplex
o no contention for a shared medium
Local Area Network (LAN)
• Local Area Network Technology
– Fiber Distributed Data Interface (FDDI)
• Specifies a 100-Mbps token-passing, dual-ring LAN using
fiber-optic cable
• Used as high-speed backbone technology
• Dual-ring architecture
• Uses optical fiber as the primary transmission medium, but
can also use copper
• FDDI over copper is referred to as Copper-Distributed Data
Interface (CDDI)
Local Area Network (LAN)
• Local Area Network Technology
– Fiber Distributed Data Interface (FDDI)
Local Area Network (LAN)
• Local Area Network Technology
– Wireless LANs
Wireless LAN
Extending Your LAN – Wide Area Networks (WAN)
• What is a WAN?
– A network that links together geographically dispersed computer
networks
– Basically two or more LANs tied together using high-speed phone
lines (such as T1 or 56K frame relay)
– A way to extend your network resources beyond the local area
Extending Your LAN – Wide Area Networks (WAN)
• WAN Hardware
– Bridges
A bridge is a network device that essentially does what its name describes: bridges two
LANs together
– Gateways: Protocol Translators
The term gateway can refer to a variety of different devices. At its most basic, a
gateway is a device that acts as a two-way path between networks. For example, in an
Internet connected network, a proxy server can be a gateway between the internal
network and the external Internet
Protocol translator—a device that can translate between two network protocols.
Typically, protocol translators translate NetWare IPX to TCP/IP so that users on
an IPX network can access the Internet or IP resources.
Extending Your LAN – Wide Area Networks (WAN)
• WAN Hardware
– Routers
A device that handles the traffic flow for data packets that are not addressed inside the
local network. In other words, a router is the long-distance post office sorting machine.
The process of sending a packet closer to its destination is called routing.
Extending Your LAN – Wide Area Networks (WAN)
• High-Speed Data Access
– Trunk Lines: T1 and T3
Trunk lines are the backbone of long-distance networks
Types of Trunks:
o T1: 1.544 megabits per second, often used to interconnect WAN
o T3: 44.736 megabits per second, often used by large corporate
Possible Uses for Trunks:
o Can carry up to 24 separate voice phone lines
o Can carry up to 1.544 megabits per second of data
o Can use 12 voice channels (half the available channels) and use the
remaining bandwidth (about 768 kilobits per second) to carry data
o Can use only a small percentage of the bandwidth for a fractional T1
o Can use a T1 line to carry ISDN Primary Rate Interface
Trunk lines are often called leased lines
Trunk Line Speeds: 128, 256, 384, 512, 768, 896, 1.024,
1.152, 1.280, 1.408 Mbps
Extending Your LAN – Wide Area Networks (WAN)
• High-Speed Data Access
- Digital Subscriber Lines (DSL)
As fast as a T1
Can carry lots of data at very high speeds
Can run over the same copper wire that your regular phone
lines
DSL is available in a variety of methods:
o For Internet access, Asymmetric Digital Subscriber Line (ASDL) is
usually requested
o More useful for WANs are High-speed Digital Subscriber Lines
(HDSL)
o Rate Adaptive DSL (RADSL) is a useful tool for WANs that are more
spread out
o The fastest member of the family is VDSL, (Very high bit-rate Digital
Subscriber Line)
Extending Your LAN – Wide Area Networks (WAN)
• High-Speed Data Access
- Integrated Services Digital Network (ISDN)
a set of international standards for access to advanced, all-
digital public telecommunications networks
provides all of its services over an entirely digital transmission
system
Components of ISDN
o ISDN CHANNELS
o ACCESS TYPES
o DEVICES
o INTERFACES
o PROTOCOLS
Extending Your LAN – Wide Area Networks (WAN)
• High-Speed Data Access
- Integrated Services Digital Network (ISDN)
Components of ISDN
o ISDN CHANNELS
▫ Bearer channels (B channels)
▫ Delta (or "Demand") channels (D channels)
▫ High-capacity channels (H channels)
o ACCESS TYPES
▫ BASIC RATE ACCESS (BRA)
▫ PRIMARY RATE ACCESS (PRA)
o DEVICES
▫ Terminal Equipment (TE)
▫ Terminal Adapter (TA)
▫ Network Termination 1 (NT1)
▫ Network Termination 2 (NT2)
▫ Exchange Termination (ET)
Extending Your LAN – Wide Area Networks (WAN)
• High-Speed Data Access
- Integrated Services Digital Network (ISDN)
Components of ISDN
o INTERFACES
o R Interface
o S Interface
o T Interface
o U Interface
o PROTOCOLS
o Link Access Protocol (LAPD, also known as Q.921)
o Q.931 protocol
Intranets, Extranets and Interconnecting Networks
• Intranet
– A company-specific, private network based on Internet
technology, and as such, it is a form of local area network
– Provide a cost-effective vehicle for communication
– Benefits of Intranets:
Reduced operating costs
Improved employee productivity
Streamlined processing flows
Improved internal and external communication
New and improved customer service
Cross-platform capability
Intranets, Extranets and Interconnecting Networks
• Intranet Components
– A computer network for resource sharing
– A network operating system that supports the TCP/IP protocol
– A server computer that can run Internet server software
– Server software that supports HyperText Transport Protocol
(HTTP) requests from browsers (clients)
– Desktop client computers equipped with network software
capable of sending and receiving TCP/IP packet data
– Browser software installed on each client computer
Intranets, Extranets and Interconnecting Networks
• Extranet
– Can be considered interorganizational internetworks
– Extranet Topology
Private Extranet
Hybrid Extranet
Extranet Service Provider
Public Extranet
Intranets, Extranets and Interconnecting Networks
• Extranet
– Extranet Topology
Private Extranet
o A private extranet and the Internet are functionally
identical
o Primary difference between a private extranet and Internet
is a matter of scale and exclusivity
Organization A Organization B
Intranet Intranet
Extranet
Organization C Organization D
Intranet Intranet
Extranet Intranet
Resource
Resource
It is a plethora of standards
with a laptop computer
Internet
`
Q&A
Thank You
Module 3 – Network Design
• Network Design
– The Criteria for Building Your Network
– Designing Your Network
– How to Select Hardware and Software for Your Network
• Module 3 Summary
Network Design
• Network Design
– The Criteria for Building Your Network
What "best practices" are
o Because networking technology changes so rapidly, focusing on immediate
product details to the detriment of the big picture draws attention away from
the core infrastructural issues that modern networks face. This is where best
practices provide their value to the networking process. Note the benefits of
best practices:
▫ Best practices offer a perspective that enables network planners to step
out of the upgrade cycle long enough to take a long hard look at their
current practices
▫ Best practices offer a way to assess policies and procedures, codify
those policies and procedures that work, and discard those that are
nonproductive or counterproductive
▫ Best practices must be tested to demonstrably produce good results
▫ Codifying and instituting best practices often results in cost savings
Network Design
• Network Design
– The Criteria for Building Your Network
The steps to successful implementations: plan, design,
implement, and tune
o Building a network is much the same as building a house. Change may be a
constant, but we can try to manage it with planning and adherence to some
very simple processes. The process is, simply stated, plan, design,
implement, and tune:
▫ Plan. Plan your network from a user perspective.
▫ Design. Design your network.
▫ Implement. Implementation is the process of physically realizing the
design.
▫ Tune. Tuning is the part of the process in which you try to rectify the
small flaws in your creation.
Network Design
• Network Design
– Designing Your Network
Step 1: Identify the Uses of Your Network
o Defining the Organizational Purpose
o Informational Interviews
o Quantifying the Network
Step 2: List Which Tasks Happen at Which Computers
o The Many-User Computer
o Simple Needs—Simple Computer
o Considerable On-Site Needs—Powerful Computer
o Low On-Site Needs—Considerable Network Needs
o Single-User Computers
o Average User—Average Power
o Power User—Powerful Computers
Network Design
• Network Design
– Designing Your Network
Step 3: Determine the Degree of Centralization
o Easier Access to Files
o Stronger Security
o Access Rules: A Simple Example
o Easier Backup
o Easier Configuration Management
Step 4: Making It Real—Drawing the Network
o Drawing the Logical Network Diagram
o Drawing the Physical Network Diagram
Step 5: Writing the Specification and Getting Others‘ Input
o Writing the Specification Document
o Meeting with Other Users
Network Design
• Network Design
– Designing Your Network
Step 6: Specifying Hardware
o Selecting Hardware
Step 7: Building the Network
Network Design
• Network Design
– How to Select Hardware and Software for Your Network
Selecting a Topology
Selecting the Network Type: Client/Server or Peer to
Peer
Selecting the Workstation Operating System and
Network Operating System
Selecting the Network Protocol
Setting up Small Office Networks
• Hardware
– 15 Desktop Computers
– 20 Notebooks
– 3 Routers
– 5 Switches
– 2 Access Point
– 5 Hubs
– 2 Modems
• Requirement:
– To setup a network with 3 Offices connect to each other
– Wireless access point at 1 office
– Dial-up access at two offices
Module 3 Summary
• Network Design
– The Criteria for Building Your Network
– Designing Your Network
– How to Select Hardware and Software for Your Network
Q&A
Thank You
Module 4 – Network Maintenance
• Network Troubleshooting
• Troubleshooting Steps
• Troubleshooter’s Resources
• Troubleshooting Tips
• Diagnosing Real-World Problems
• Module 4 Summary
Network Maintenance
• Network Troubleshooting
– Narrowing down the problem
Checking for simple stuff
o Correct login procedure and right
o Link lights
o Power switch
o Operator error
Is Hardware or Software causing the problem?
Is a particular workstation causing the problem, or is it the
server?
Which segment(s) of the network are affected?
Network Maintenance
• Troubleshooting Steps
– Step 1: Identify the Exact Issue
– Step 2: Re-create the Problem
– Step 3: Isolate the Cause
– Step 4: Formulate a Correction
– Step 5: Implement the Correction
– Step 6: Test the Solution
– Step 7: Document the Problem and the Solution
– Step 8: Give Feedback
Network Maintenance
• Troubleshooting Steps
– Step 1: Identify the Exact Issue
We asked certain question to identify the exact issue
o Which part of the Internet can’t be accessed?
o A particular Web site? A particular address? Any Web site?
o Which part of the network can’t be accessed?
o Is the Internet line down?
o Is the server down?
o Which server can’t be accessed?
Network Maintenance
• Troubleshooting Steps
– Step 2: Re-create the Problem
When something is not working, write down exactly what is it
Try to reproduce the problem occur by remember what you
have done
By reproducing the problem, you will know exactly what have
happen to you network
Eg, when you are trying to access the Intranet Web Server and
if the browser indicate an error message of “Cannot determine
DNS server”, you know that it is the problem of the DNS
Network Maintenance
• Troubleshooting Steps
– Step 3: Isolate the Cause
If you can reproduce the problem, next step is to attempt to
determine the cause
You may need to ask the following questions:
o Were you ever able to do this?
o If yes, when did you become unable to do it?
o Has anything changed since you were last able to do this?
o Are you doing anything differently from the way you
normally proceed?
o Were any error messages displayed?
o Are other people experiencing this problem?
Network Maintenance
• Troubleshooting Steps
– Step 4: Formulate a Correction
Formulate a solution
Come up with at least one possible solution
Someone else in the company may have the answer
Check Online resource and vendor documentation
Network Maintenance
• Troubleshooting Steps
– Step 5: Implement the Correction
In this step, implement the formulated correction
Based on the formulated correction, we will follow the proper
steps to solve the issue
At this point, we can assume that someone did something by
accident to cause this to happen or that it was the result of a
software installation
Network Maintenance
• Troubleshooting Steps
– Step 6: Test the Solution
Now you made the changes, test the solution to see if it solves
the problem
We will repeat the repeat the operation that previously did not
work
If the problem is not solved, go back to step 4, formulate a new
correction and also redo steps 5 and 6
It is important to make note of what worked and what didn’t so
that you don’t make the same mistakes twice
Network Maintenance
• Troubleshooting Steps
– Step 7: Document the Problem and the Solution
Network documentation is very important!
Can refer back when a similar problem arises in the future
Assemble your own database of information to troubleshoot
other problems
Be sure to include information such as following:
o A description of the conditions surrounding the problem
o The Network OS version, the software version, type of equipment
o Whether you were able to reproduce the problem
o The solution you tried
o The ultimate solution
Network Maintenance
• Troubleshooting Steps
– Step 8: Give Feedback
Most important steps in troubleshooting model
Give feedback to the person who need to know, or the person
experiencing the problem
Explain the problem and the solution
It is a benefit to show the user exactly what happened –
prevent from happen again
Use words and terms the person who experiencing the problem
understands
Network Maintenance
• Troubleshooter’s Resources
– Log Files
Operating Systems log files
Application log files
– Manufacturers’ Troubleshooting Resources
README files
Telephone support
Technical support CD-ROM
Technical support Web site
Network Maintenance
• Troubleshooter’s Resources
– Hardware Troubleshooting Tools
A crossover cable
A hardware loopback
A tone generator
A tone locator
– Software Troubleshooting Tools
Protocol analyzers
Performance-monitoring tools
Network Maintenance
• Troubleshooting Tips
– Don’t’ Overlook the Small Stuff
– Prioritize Your Problems
– Check the Software Configuration
– Don’t Overlook Physical conditions
– Don’t Overlook Cable Problems
– Check for Viruses
Network Maintenance
• Diagnosing Real-World Problems
– Ping Strangeness
– Duplicate IP Addresses
– Undeliverable Mail
– Connectivity Problems after a Server Upgrade
– Excessive Network Collisions
Network Maintenance
• Network Diagnose Tools
– Ping: To determine whether computer can reach the network
– IPconfig: Show TCP/IP configuration
– Hostname: Display computer name
– Tracert: Displays the name or IP address of each intermediate router or
other network gateway device the message passes through to reach its
destination.
– Arp: Maintains a list of computer names and their corresponding IP
addresses
– Route: Supports manipulation and viewing of a computer's routing table
– Getmac: To obtain the media access control (MAC) address for all network
adapters and network protocols installed on your computer
Network Maintenance
• Network Diagnose Tools
– Netstat: Displays TCP/IP protocol statistics and active connections to and
from your computer
– Nslookup: Displays information about Domain Name System (DNS) servers
– Pathping: Traces network routes. It combines features of Ping (Ping.exe)
and Trace Route (Tracert.exe)
Module 4 Summary
• Network Troubleshooting
• Troubleshooting Steps
• Troubleshooter’s Resources
• Troubleshooting Tips
• Diagnosing Real-World Problems
• Network Diagnose Tools
End of Module 4
Q&A
Thank You
Module 5 – Virtual Private Network
• Virtual Private Networking (VPN)
– Basics of VPN
– Usage of VPN
– VPN Product Options
– VPN Tunneling Protocols
– VPN Security
• Network Design Best Practice
• Module 5 Summary
Virtual Private Network
• Virtual Private Networking (VPN)
– Basics of VPN
An authenticated and encrypted communication channel
across some form of public network, such as Internet
A VPN is service independent
Pre-requisite to establish a VPN:
o Each site must se up a VPN-capable device on the network perimeter
o Each site must know the IP subnet addresses used by the other site
o Both sites must agree on a method of authentication and exchange
digital certificates if required
o Both sites must agree on a method of encryption and exchange
encryption keys as required
Virtual Private Network
• Virtual Private Networking (VPN)
– Basics of VPN
VPN Host
Internet
Client
Server
VPN VPN
Gateway Encrypted channel Gateway
Network
Network
Virtual Private Network
• Virtual Private Networking (VPN)
– Usage of VPN
Two specific application for which VPN is being used:
o Replacement for dial-in modem pools
Advantages
▫ Reduce support cost
▫ No more phone lines to maintain
▫ Not required to upgrade hardware
▫ Reduce infrastructure costs
Disadvantages
▫ Integrity of the remote workstation – whether it is secure
▫ Need to open another port through firewall, open more room for
attacker
Virtual Private Network
• Virtual Private Networking (VPN)
– Usage of VPN
Two specific application for which VPN is being used:
o Replacement for dedicated WAN links
Advantages
▫ Can be used to connect two sites which are separated by large
distance – use Internet to connect, save cost
▫ May even be advantageous when two sites are close to each
other - do not need dedicated line
Disadvantages
▫ Integrity of the remote workstation
▫ Need to open another port through firewall, open more room for
attacker
Virtual Private Network
• Virtual Private Networking (VPN)
– VPN Product Options
There are number of options available which fall into three
categories:
o Firewall-based VPN
▫ Most popular VPN solution
▫ Provides central point of management
o Router-based VPN
▫ Many routers use application-specific integrated circuit hardware
to prevent router overloading
▫ Poor at providing perimeter security
o Dedicated software or hardware
▫ Create additional point of administration and security management
Virtual Private Network
• Virtual Private Networking (VPN)
– VPN Tunneling Protocols
Protocols that can be used for VPNs:
o Point-to-Point Tunneling Protocol (PPTP)
▫ Designed for client/server connectivity
▫ Sets up a single point-to-point connection between two computers
▫ Works at the data link layer
▫ Transmits over only IP networks
o IPSec
▫ Hybrid of L2F and PPTP
▫ Sets up a single point-to-point connection between two computers
▫ Works at the data link layer
▫ Transmit over multiple types of networks, not just IP
▫ Combined with IPSec for security
Virtual Private Network
• Virtual Private Networking (VPN)
– VPN Tunneling Protocols
Protocols that can be used for VPNs:
o L2TP
▫ Handles multiple connections at the same time
▫ Provides secure authentication and encryption
▫ Supports only IP networks
▫ Focuses on LAN-to-LAN communication
▫ Works at the network layer, and provides security on top of IP
▫ Can work in tunnel mode or transport mode
Virtual Private Network
• Virtual Private Networking (VPN)
– VPN Security Issue
• VPN attract intruders because of their perceived inaccessibility
• Vulnerability increases as large volumes of encrypted data
begin flowing across the Internet
• Denial-Of-Service attack
Network Design Best Practice
• On converged voice-and-data networks, apply quality of service or another
prioritization scheme.
• To secure the company, place an impregnable wall at the LAN/WAN border to keep
outsiders out and insiders in.
• Redirect traffic from the Internet to local caching devices or to a content delivery
network
• Think of the network from user and content points of view, particularly because a
growing proportion of the user base will be mobile and working outside the range of
technology support.
• Use VPNs for smaller offices and individuals, and investigate VPNs as a strategic
direction throughout the company
• Change to a switched network. Give each user a dedicated pipe, and your worries
end
• Use multilayer switches to do everything — they can switch, route and balance loads
Module 5 Summary
• Virtual Private Networking (VPN)
– Basics of VPN
– Usage of VPN
– VPN Product Options
– VPN Tunneling Protocols
– VPN Security
• Network Design Best Practice
Q&A
Thank You
Kelvin Goh
kelvingoh@digitalalliance.net
+6012 3063710