Industrial Training Report For ISP
Industrial Training Report For ISP
Industrial Training Report For ISP
Earthlink IT Communication Ltd is a trusted name for Internet Service, e-commerce Service,
IT Infrastructure Development and Industry Standard Software. From the beginning Earthlink
IT Communication Ltd envisaged ‘Total Excellence” as its principle for guiding light, around
which revolves its entire spectrum of activities. With the unique vision, Earthlink IT
Communication Ltd is the forerunner in the value centric service Market place and an architect
of high value end-to-end ICT solutions and software.
Earthlink IT Communication Ltd is providing internet service for all customers in home and
office science its beginning. Beside this we are serving our corporate clients with our
experienced expertise from building up their network to modify, upgrade and secure their
network.
Tel: 88-031-2852185
88-031-2852186
Fax: +88-031-2850470
Email:
[email protected]
1
ISP (Internet service provider)
An ISP is an organization that provides internet access for individuals, small business, and mid
size organization that do not want to create an internet site and become involved in providing
internet services for their employees. An ISP can provide these services. An ISP can be granted.
The customers are connected via a dial-up modem, DSL, or cable modem to the ISP. However,
each customer still needs an IP address to continue to internet connection.
ISP lease a fixed amount of bandwidth or they create a line, which is available to the clients.
They divided the line as the basis of the needed. The corporate or small business or home user
are the main clients of the ISPs. The main factor of the ISPs is the ensure the maximize the cost
and give the clients the best service.
2
Definition of network
The diagram shows elements of a typical network, including devices, media, and services, tied
together by rules, that work together to send messages. We use the word messages as a term that
encompasses web pages, e-mail, instant messages, telephone calls, and other forms of
communication enabled by the Internet. In this course, we will learn about a variety of messages,
devices, media, and services that allow the communication of those messages. We will also learn
about the rules, or protocols, that tie these network elements together.
Networking is a very graphically oriented subject, and icons are commonly used to represent
networking devices. On the left side of the diagram are shown some common devices which
often originate messages that comprise our communication. These include various types of
computers (a PC and laptop icon are shown), servers, and IP phones. On local area networks
these devices are typically connected by LAN media (wired or wireless).
The right side of the figure shows some of the most common intermediate devices, used to direct
and manage messages across the network, as well as other common networking symbols.
Generic symbols are shown for:
Switch - the most common device for interconnecting local area networks
3
Wireless Router - a specific type of router often found in home networks
Serial Link - one form of WAN interconnection, represented by the lightning bolt-shaped line
Protocols are the rules that the networked devices use to communicate with each other. The
industry standard in networking today is a set of protocols called TCP/IP (Transmission Control
Protocol/Internet Protocol). TCP/IP is used in home and business networks, as well as being the
primary protocol of the Internet. It is TCP/IP protocols that specify the formatting, addressing
and routing mechanisms that ensure our messages are delivered to the correct recipient.
OSCAR
IP telephony SIP
The Messages
In the first step of its journey from the computer to its destination, our instant message gets
converted into a format that can be transmitted on the network. All types of messages must be
converted to bits, binary coded digital signals, before being sent to their destinations. This is true
no matter what the original message format was: text, video, voice, or computer data. Once our
instant message is converted to bits, it is ready to be sent onto the network for delivery.
The Devices
To begin to understand the robustness and complexity of the interconnected networks that make
up the Internet, it is necessary to start with the basics. Take the example of sending the text
message using an instant messaging program on a computer. When we think of using network
services, we usually think of using a computer to access them. But, a computer is only one type
of device that can send and receive messages over a network. Many other types of devices can
4
also be connected to the network to participate in network services. Among these devices are
telephones, cameras, music systems, printers and game consoles.
The Medium
To send our instant message to its destination, the computer must be connected to a wired or
wireless local network. Local networks can be installed in homes or businesses, where they
enable computers and other devices to share information with each other and to use a common
connection to the Internet.
Wireless networks allow the use of networked devices anywhere in an office or home, even
outdoors. Outside the office or home, wireless networking is available in public hotspots, such as
coffee shops, businesses, hotel rooms, and airports.
The Services
Network services are computer programs that support the human network. Distributed on devices
throughout the network, these services facilitate online communication tools such as e-mail,
bulletin/discussion boards, chat rooms, and instant messaging. In the case of instant messaging,
for example, an instant messaging service, provided by devices in the cloud, must be accessible
to both the sender and recipient.
The Rules
Important aspects of networks that are neither devices nor media are rules, or protocols. These
rules are the standards and protocols that specify how the messages are sent, how they are
directed through the network, and how they are interpreted at the destination devices. For
example, in the case of Jabber instant messaging, the XMPP, TCP, and IP protocols are all
important sets of rules that enable our communication to occur.
Networks must support a wide range of applications and services, as well as operate over many
different types of physical infrastructures. The term network architecture, in this context, refers
to both the technologies that support the infrastructure and the programmed services and
protocols that move the messages across that infrastructure. As the Internet, and networks in
general, evolve, we are discovering that there are four basic characteristics that the underlying
architectures need to address in order to meet user expectations: fault tolerance, scalability,
quality of service, and security.
Fault Tolerance
5
The expectation that the Internet is always available to the millions of users who rely on it
requires a network architecture that is designed and built to be fault tolerant. A fault tolerant
network is one that limits the impact of a hardware or software failure and can recover quickly
when such a failure occurs. These networks depend on redundant links, or paths, between the
source and destination of a message. If one link or path fails, processes ensure that messages can
be instantly routed over a different link transparent to the users on either end. Both the physical
infrastructures and the logical processes that direct the messages through the network are
designed to accommodate this redundancy. This is a basic premise of the architecture of current
networks.
Scalability
A scalable network can expand quickly to support new users and applications without impacting
the performance of the service being delivered to existing users. Thousands of new users and
service providers connect to the Internet each week. The ability of the network to support these
new interconnections depends on a hierarchical layered design for the underlying physical
infrastructure and logical architecture.
The Internet is currently providing an acceptable level of fault tolerance and scalability for its
users. But new applications available to users over internetworks create higher expectations for
the quality of the delivered services. Voice and live video transmissions require a level of
consistent quality and uninterrupted delivery that was not necessary for traditional computer
applications. Quality of these services is measured against the quality of experiencing the same
audio or video presentation in person.
Security
The security and privacy expectations that result from the use of internetworks to exchange
confidential and business critical information exceed what the current architecture can deliver.
Rapid expansion in communication areas that were not served by traditional data networks is
increasing the need to embed security into the network architecture. As a result, much effort is
being devoted to this area of research and development. In the meantime, many tools and
procedures are being implemented to combat inherent security flaws in the network architecture.
The Open Systems Interconnection (OSI) reference model is a layered, abstract representation
created as a guideline for network protocol design. The OSI model divides the networking
process into seven logical layers, each of which has unique functionality and to which are
assigned specific services and protocols.
6
In this model, information is passed from one layer to the next, starting at the Application layer
on the transmitting host, proceeding down the hierarchy to the Physical layer, then passing over
the communications channel to the destination host, where the information proceeds back up the
hierarchy, ending at the Application layer. The figure depicts the steps in this process.
Although the TCP/IP protocol suite was developed prior to the definition of the OSI model, the
functionality of the TCP/IP application layer protocols fit roughly into the framework of the top
three layers of the OSI model: Application, Presentation and Session layers.
Most TCP/IP application layer protocols were developed before the emergence of personal
computers, graphical user interfaces and multimedia objects. As a result, these protocols
implement very little of the functionality that is specified in the OSI model Presentation and
Session layers.
Application layer
The application layer enables the user, whether human or software, to access the network. It
provides user interface and support for services such as electronics mail, remote file access and
transfer, access to the World Wide Web, and so on.
Presentation layer
External Data Representation (XDR) sits at the presentation level. It converts local
representation of data to its canonical form and vice versa. The canonical uses a standard byte
ordering and structure packing convention, independent of the host.
Session layer
The session protocol defines the format of the data sent over the connections. The NFS uses the
Remote Procedure Call (RPC) for its session protocol. RPC may be built on either TCP or UDP.
Login sessions uses TCP whereas NFS and broadcast use UDP.
Network layer
NFS uses Internetwork Protocol (IP) as its network layer interface. IP is responsible for routing,
directing datagrams from one network to another. The network layer may have to break large
datagrams, larger than MTU, into smaller packets and host receiving the packet will have to
reassemble the fragmented datagram. The Internetwork Protocol identifies each host with a 32-
bit IP address. IP addresses are written as four dot-separated decimal numbers between 0 and
255, e.g., 129.79.16.40.
Transport layer
7
Transport layer subdivides user-buffer into network-buffer sized datagrams and enforces desired
transmission control. Two transport protocols, Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP), sits at the transport layer. Reliability and speed are the primary
difference between these two protocols. TCP establishes connections between two hosts on the
network through 'sockets' which are determined by the IP address and port number. TCP keeps
track of the packet delivery order and the packets that must be resent. Maintaining this
information for each connection makes TCP a stateful protocol. UDP on the other hand provides
a low overhead transmission service, but with less error checking. NFS is built on top of UDP
because of its speed and statelessness. Statelessness simplifies the crash recovery.
Data Link layer defines the format of data on the network. A network data frame, aka packet,
includes checksum, source and destination address, and data. The largest packet that can be sent
through a data link layer defines the Maximum Transmission Unit (MTU). The data link layer
handles the physical and logical connections to the packet's destination, using a network
interface. A host connected to an Ethernet would have an Ethernet interface to handle
connections to the outside world, and a loopback interface to send packets to itself.
Ethernet addresses a host using a unique, 48-bit address called its Ethernet address or Media
Access Control (MAC) address. MAC addresses are usually represented as six colon-separated
pairs of hex digits, e.g., 8:0:20:11:ac:85. This number is unique and is associated with a
particular Ethernet device. Hosts with multiple network interfaces should use the same MAC
address on each. The data link layer's protocol-specific header specifies the MAC address of the
packet's source and destination. When a packet is sent to all hosts (broadcast), a special MAC
address (ff:ff:ff:ff:ff:ff) is used.
Physical layer
Physical layer defines the cable or physical medium itself, e.g., thinnet, thicknet, unshielded
twisted pairs (UTP). All media are functionally equivalent. The main difference is in
convenience and cost of installation and maintenance. Converters from one media to another
operate at this level.
Although the OSI model is widely used and often cited as the standard, TCP/IP protocol has
been used by most Unix workstation vendors. TCP/IP is designed around a simple four-layer
scheme. It does omit some features found under the OSI model. Also it combines the features of
some adjacent OSI layers and splits other layers apart. The four network layers defined by
TCP/IP model are as follows.
Layer 1 - Link
8
This layer defines the network hardware and device drivers.
Layer 2 - Network
This layer is used for basic communication, addressing and routing. TCP/IP uses IP and
ICMP protocols at the network layer.
Layer 3 - Transport
Handles communication among programs on a network. TCP and UDP falls within this
layer.
Layer 4 - Application
End-user applications reside at this layer. Commonly used applications include NFS,
DNS, arp, rlogin, talk, ftp, ntp and traceroute.
Firewall
We have a need for extra security, the Infinitum Managed Firewall service is just what you need.
It will protect your corporate systems and servers from intruders and can also provide extra
protection in the form of encryption for corporate data that traverses the Internet. The Infinitum
Managed Firewall service will further enable our ISP to prevent improper usage of the Internet
by our employees Firewall Configuration.
In a typical firewall configuration, a firewall is placed between the Internet and the organization's
servers or office computers. The firewall will block all unauthorized inbound and/or outbound
traffic.
9
IPv4 Addresses
Each device on a network must be uniquely defined. At the Network layer, the packets of the
communication need to be identified with the source and destination addresses of the two end
systems. With IPv4, this means that each packet has a 32-bit source address and a 32-bit
destination address in the Layer 3 header.
These addresses are used in the data network as binary patterns. Inside the devices, digital logic
is applied for their interpretation. For us in the human network, a string of 32 bits is difficult to
interpret and even more difficult to remember. Therefore, we represent IPv4 addresses using
dotted decimal format.
Within the address range of each IPv4 network, we have three types of addresses:
Broadcast address - A special address used to send data to all hosts in the network
10
Host addresses - The addresses assigned to the end devices in the network
Network Address
The network address is a standard way to refer to a network. For example, we could refer to the
network shown in the figure as "the 10.0.0.0 network." This is a much more convenient and
descriptive way to refer to the network than using a term like "the first network." All hosts in the
10.0.0.0 network will have the same network bits.
Within the IPv4 address range of a network, the lowest address is reserved for the network
address. This address has a 0 for each host bit in the host portion of the address.
Broadcast Address
The IPv4 broadcast address is a special address for each network that allows communication to
all the hosts in that network. To send data to all hosts in a network, a host can send a single
packet that is addressed to the broadcast address of the network.
The broadcast address uses the highest address in the network range. This is the address in which
the bits in the host portion are all 1s. For the network 10.0.0.0 with 24 network bits, the
broadcast address would be 10.0.0.255. This address is also referred to as the directed broadcast.
Host Addresses
As described previously, every end device requires a unique address to deliver a packet to that
host. In IPv4 addresses, we assign the values between the network address and the broadcast
address to the devices in that network.
As you have already learned, hosts are associated with an IPv4 network by a common network
portion of the address. Within a network, there are different types of hosts.
Intermediary devices
Each of these different device types should be allocated to a logical block of addresses within the
address range of the network.
11
An important part of planning an IPv4 addressing scheme is deciding when private addresses are
to be used and where they are to be applied.
Different types of connection: There are different types of connection in this institution, these
are a. fiber optic connection and b. drop wire connection
Pres cord
Fiber
PC Converter Box
PC Modem
12
Addresses for User Devices
In most data networks, the largest population of hosts includes the end devices such as PCs, IP
phones, printers, and PDAs. Because this population represents the largest number of devices
within a network, the largest number of addresses should be allocated to these hosts.
With a static assignment, the network administrator must manually configure the network
information for a host, as shown in the figure. At a minimum, this includes entering the host IP
address, subnet mask, and default gateway.
Static addresses have some advantages over dynamic addresses. For instance, they are useful for
printers, servers, and other networking devices that need to be accessible to clients on the
network. If hosts normally access a server at a particular IP address, it would cause problems if
that address changed. Additionally, static assignment of addressing information can provide
increased control of network resources. However, it can be time-consuming to enter the
information on each host.
When using static IP addressing, it is necessary to maintain an accurate list of the IP address
assigned to each device. These are permanent addresses and are not normally reused.
13
Because of the challenges associated with static address management, end user devices often
have addresses dynamically assigned, using Dynamic Host Configuration Protocol (DHCP), as
shown in the figure.
DHCP enables the automatic assignment of addressing information such as IP address, subnet
mask, default gateway, and other configuration information. The configuration of the DHCP
server requires that a block of addresses, called an address pool, be defined to be assigned to the
DHCP clients on a network. Addresses assigned to this pool should be planned so that they
exclude any addresses used for the other types of devices.
14
DHCP is generally the preferred method of assigning IP addresses to hosts on large networks
because it reduces the burden on network support staff and virtually eliminates entry errors.
Another benefit of DHCP is that an address is not permanently assigned to a host but is only
"leased" for a period of time. If the host is powered down or taken off the network, the address is
returned to the pool for reuse. This feature is especially helpful for mobile users that come and
go on a network.
The Physical layer is concerned with network media and signaling. This layer produces the
representation and groupings of bits as voltages, radio frequencies, or light pulses. Various
standards organizations have contributed to the definition of the physical, electrical, and
mechanical properties of the media available for different data communications. These
specifications guarantee that cables and connectors will function as anticipated with different
Data Link layer implementations.
15
Unshielded twisted pair cable
Most of the billions of conductor feet (millions of kilometres) of twisted pairs in the world are
outdoors, owned by telephone companies, used for voice service, and only handled or even seen
by telephone workers. The majority of data or Internet connections use those wires.
UTP cables are not shielded. This lack of shielding results in a high degree of flexibility as well
as rugged durability. UTP cables are found in many ethernet networks.
Wiring schemes
As mentioned previously, this article is related to UTP cables, with RJ45 connectors. Before
explaining the various sniffer types, it is fundamental to understand the standard wiring schemes.
Figure 2 shows the pinouts of a RJ45 connector.
16
Figure 2: EIA/TIA 568A and 568B norms
Figure 3 describes the wiring schemes of straight through and crossover cables. Straight through
cables can be used to connect a host or a router to a switch or hub. Crossover cables may be used
to connect the following: host to host, hub to hub, switch to switch, switch to hub, router to
router. The models of sniffing cables in this paper are based on straight through cables, but the
crossover cables can be also used if the sniffer's transmit signal is modified in the same manner.
There are eight wires grouped into four coloured pairs. The pairs are twisted to reduce the effects
of noise and interference. Each pair has a different twist ratio that can affect the signalling at
higher speeds, so it becomes important to follow the colour codes. Note that pairs 1 (blue) and 4
(brown) are not used in 10Base-T or 100Base-TX Ethernet. All eight wires are used for
1000Base-T Ethernet. [1]
17
Coding
Ethernet LANs use digital signals to share data among network devices. 10Base-T uses
Manchester encoding to transmit the signal: transition occurs in the middle of each bit period.
Two levels represent one bit. A low to high transition in the middle of the bit represents a `1'. A
high to low transition in the middle of the bit represents a `0'. There is no DC component. It uses
positive/negative voltages.
100-BaseTX uses 4B/5B encoding, where each 4-bit nibbles is being transferred encoded as 5-bit
symbols. The signalling model is a three level multi-level technique called MLT-3.
10Base-T 100Base-TX
UTP cabling, terminated with RJ-45 connectors, is a common copper-based medium for
interconnecting network devices, such as computers, with intermediate devices, such as routers
and network switches.
Different situations may require UTP cables to be wired according to different wiring
conventions. This means that the individual wires in the cable have to be connected in different
orders to different sets of pins in the RJ-45 connectors. The following are main cable types that
are obtained by using specific wiring conventions:
Ethernet Straight-through
Ethernet Crossover
Rollover
18
The figure shows the typical application of these cables as well as a comparison of these three
cable types.
Using a crossover or straight-through cable incorrectly between devices may not damage the
devices, but connectivity and communication between the devices will not take place. This is a
common error in the lab and checking that the device connections are correct should be the first
troubleshooting action if connectivity is not achieved.
Fiber Media
Fiber-optic cabling uses either glass or plastic fibers to guide light impulses from source to
destination. The bits are encoded on the fiber as light impulses. Optical fiber cabling is capable
of very large raw data bandwidth rates. Most current transmission standards have yet to approach
the potential bandwidth of this media.
Given that the fibers used in fiber-optic media are not electrical conductors, the media is immune
to electromagnetic interference and will not conduct unwanted electrical currents due to
grounding issues. Because optical fibers are thin and have relatively low signal loss, they can be
19
operated at much greater lengths than copper media, without the need for signal regeneration.
Some optical fiber Physical layer specifications allow lengths that can reach multiple kilometers.
More expensive (usually) than copper media over the same distance (but for a higher capacity)
Different skills and equipment required to terminate and splice the cable infrastructure
At present, in most enterprise environments, optical fiber is primarily used as backbone cabling
for high-traffic point-to-point connections between data distribution facilities and for the
interconnection of buildings in multi-building campuses. Because optical fiber does not conducts
electricity and has low signal loss, it is well suited for these uses.
Fiber optic cables can be broadly classified into two types: single-mode and multimode.
20
The most common type of single-mode fiber has a core diameter of 8 to 10 µm and is designed
for use in the near infrared. The mode structure depends on the wavelength of the light used, so
that this fiber actually supports a small number of additional modes at visible wavelengths.
Multi-mode fiber, by comparison, is manufactured with core diameters as small as 50
micrometres and as large as hundreds of micrometres.
Fiber with large (greater than 10 µm) core diameter may be analyzed by geometric optics. Such
fiber is called multimode fiber, from the electromagnetic analysis (see below). In a step-index
multimode fiber, rays of light are guided along the fiber core by total internal reflection. Rays
that meet the core-cladding boundary at a high angle (measured relative to a line normal to the
boundary), greater than the critical angle for this boundary, are completely reflected. The critical
angle (minimum angle for total internal reflection) is determined by the difference in index of
refraction between the core and cladding materials. Rays that meet the boundary at a low angle
are refracted from the core into the cladding, and do not convey light and hence information
along the fiber. The critical angle determines the acceptance angle of the fiber, often reported as
a numerical aperture. A high numerical aperture allows light to propagate down the fiber in rays
both close to the axis and at various angles, allowing efficient coupling of light into the fiber.
However, this high numerical aperture increases the amount of dispersion as rays at different
angles have different path lengths and therefore take different times to traverse the fiber. A low
numerical aperture may therefore be desirable.
21
Media Connectors
Different Physical layer standards specify the use of different connectors. These standards
specify the mechanical dimensions of the connectors and the acceptable electrical properties of
each type for the different implementations in which they are employed.
Although some connectors may look the same, they may be wired differently according to the
Physical layer specification for which they were designed. The ISO 8877 specified RJ-45
connector is used for a range of Physical layer specifications, one of which is Ethernet. Another
specification, EIA-TIA 568, describes the wire color codes to pin assignments (pinouts) for
Ethernet straight-through and crossover cables.
Although many types of copper cables can be purchased pre-made, in some situations, especially
in LAN installations, the termination of copper media may be performed onsite. These
terminations include crimped connections to terminate Cat5 media with RJ-45 plugs to make
patch cables, and the use of punched down connections on 110 patch panels and RJ-45 jacks.
The figure shows some of the Ethernet wiring components.
22
Common Optical Fiber Connectors
Fiber-optic connectors come in a variety of types. The figure shows some of the most common:
Straight-Tip (ST) a very common bayonet style connector widely used with multimode fiber.
Subscriber Connector (SC) - A connector that uses a push-pull mechanism to ensure positive
insertion. This connector type is widely used with single-mode fiber.
Lucent Connector (LC) - A small connector becoming popular for use with single-mode fiber
and also supports multi-mode fiber.
Terminating and splicing fiber-optic cabling requires special training and equipment. Incorrect
termination of fiber optic media will result in diminished signaling distances or complete
transmission failure.
23
Misalignment - the fiber-optic media are not precisely aligned to one another when joined.
End gap - the media do not completely touch at the splice or connection.
End finish - the media ends are not well polished or dirt is present at the termination.
It is recommended that an Optical Time Domain Reflectometer (OTDR) be used to test each
fiber-optic cable segment. This device injects a test pulse of light into the cable and measures
back scatter and reflection of light detected as a function of time. The OTDR will calculate the
approximate distance at which these faults are detected along the length of the cable.
A field test can be performed by shining a bright flashlight into one end of the fiber while
observing the other end of the fiber. If light is visible, then the fiber is capable of passing light.
Although this does not ensure the performance of the fiber, it is a quick and inexpensive way to
find a broken fiber.
Cabling
1) Straight-through cable
2) Crossover cable
3) Rolled cable
Here the four wires used that only pin 1, 2, 3 and 6. We just connect 1 to 1, 2 to 2, 3 to 3 and 6 to
6.
24
• Switch to Switch
• Hub to Hub
• Hub to Switch
The same four wires used in this cable as in the straight-through cable, but we just connect
Rolled Cable:
Although rolled cable is not used to connect any Ethernet connections together, you can use a
rolled
25
Ethernet cable to connect a host to a router console serial communication port.
Hubs
A hub is one type of networking device that is installed at the Access Layer of an Ethernet
network. Hubs contain multiple ports that are used to connect hosts to the network. Hubs are
simple devices that do not have the necessary electronics to decode the messages sent between
hosts on the network. Hubs cannot determine which host should get any particular message. A
hub simply accepts electronic signals from one port and regenerates (or repeats) the same
message out all of the other ports.
All of the ports on the Ethernet hub connect to the same channel to send and receive messages.
Because all hosts must share the bandwidth available on that channel, a hub is referred to as a
shared-bandwidth device.
Only one message can be sent through an Ethernet hub at a time. It is possible for two or more
hosts connected to a hub to attempt to send a message at the same time. If this happens, the
electronic signals that make up the messages collide with each other at the hub.
Switches
An Ethernet switch is a device that is used at the Access Layer. Like a hub, a switch connects
multiple hosts to the network. Unlike a hub, a switch can forward a message to a specific host.
When a host sends a message to another host on the switch, the switch accepts and decodes the
frames to read the physical (MAC) address portion of the message.
A table on the switch, called a MAC address table, contains a list of all of the active ports and the
host MAC addresses that are attached to them. When a message is sent between hosts, the switch
checks to see if the destination MAC address is in the table. If it is, the switch builds a temporary
connection, called a circuit, between the source and destination ports. This new circuit provides a
dedicated channel over which the two hosts can communicate.
Router
At the center of the network is the router. Stated simply, a router connects one network to
another network. Therefore, the router is responsible for the delivery of packets across different
networks. The destination of the IP packet might be a web server in another country or an e-mail
server on the local area network. It is the responsibility of the routers to deliver those packets in a
timely manner. The effectiveness of internetwork communications depends, to a large degree, on
the ability of routers to forward packets in the most efficient way possible.
26
Each network that a router connects to typically requires a separate interface. These interfaces
are used to connect a combination of both Local Area Networks (LANs) and Wide Area
Networks (WANs). LANs are commonly Ethernet networks that contain devices such as PCs,
printers, and servers. WANs are used to connect networks over a large geographical area. For
example, a WAN connection is commonly used to connect a LAN to the Internet Service
Provider (ISP) network.
In addition to packet forwarding, a router provides other services as well. To meet the demands
on today's networks, routers are also used to:
• Ensure 24x7 (24 hours a day, 7 days a week) availability. To help guarantee network
reachability, routers use alternate paths in case the primary path fails.
• Provide integrated services of data, video, and voice over wired and wireless networks.
Routers use Quality of service (QoS) prioritization of IP packets to ensure that real-time
traffic, such as voice, video and critical data are not dropped or delayed.
• Mitigate the impact of worms, viruses, and other attacks on the network by permitting or
denying the forwarding of packets.
Web server
1. A computer program that is responsible for accepting HTTP requests from clients, which
are known as web browsers, and serving them HTTP responses along with optional data
contents, which usually are web pages such as HTML documents and linked objects
(images, etc.).
2. A computer that runs a computer program as described above.
Although web server programs differ in detail, they all share some basic common features.
1. HTTP: every web server program operates by accepting HTTP requests from the client,
and providing an HTTP response to the client. The HTTP response usually consists of an
HTML document, but can also be a raw file, an image, or some other type of document
(defined by MIME-types); if some error is found in client request or while trying to serve
the request, a web server has to send an error response which may include some custom
HTML or text messages to better explain the problem to end users.
2. Logging: usually web servers have also the capability of logging some detailed
information, about client requests and server responses, to log files; this allows the
webmaster to collect statistics by running log analyzers on log files.
27
1. Authentication, optional authorization request (request of user name and password)
before allowing access to some or all kind of resources.
2. Handling of static content (file content recorded in server's filesystem(s)) and dynamic
content by supporting one or more related interfaces (SSI, CGI, SCGI, FastCGI, JSP,
PHP, ASP, ASP .NET, Server API such as NSAPI, ISAPI, etc.).
3. HTTPS support (by SSL or TLS) to allow secure (encrypted) connections to the server
on the standard port 443 instead of usual port 80.
4. Content compression (i.e. by gzip encoding) to reduce the size of the responses (to
lower bandwidth usage, etc.).
5. Virtual hosting to serve many web sites using one IP address.
6. Large file support to be able to serve files whose size is greater than 2 GB on 32 bit OS.
7. Bandwidth throttling to limit the speed of responses in order to not saturate the network
and to be able to serve more clients.
Proxy server
In computers, a proxy server is a server which services of requests of its clients by forwarding
requests to other servers. A client connect to the proxy server, requesting some service, such as a
file, connection, web page, or other resource, available from a different a server. The proxy
server provides the resource by connecting to the specified server and requesting the service on
behalf of the client. A proxy server may optionally after the clients requests or the server’s
response, and sometime it may serve the request contacting the specified server. In this case, it
would cache the first request to the remote server, so it could save the information for later, and
make everything as fast as possible.
A proxy server that passes all request and replies unmodified is usually called a gateway or
sometimes tunneling proxy.
An ADSL modem
An ADSL modem is very high speed data connection that uses the same wires as a regular
telephone line. The ADSL divides up the available frequencies available on the phone line so
that5 the high speed channel rates from 1.5 mbps to 10 mbps, while the slow speed channel rates
range from 16 kbps to 1 mbps.
• Transmit channel front end-the function of this front end is to amplify and filter the
analog signals created by the digital to analog converter and deliver them to the phone
line at correct power levels.
28
• Receive channel front end-the function of this front end is to preamp, filter, and
digitize the analog signals from the phone line.
• Network interface-allows the modem to high speed devices like Ethernet router,
VoIp, and USB
• Power conversion-converts the input power from the ac adapter to run various
functional blocks.
• ADSL modem :
An asymmetric digital subscriber line transceiver, also known as an ADSL modem or DSL modem, is a
device used to connect a single computer to a DSL phone line, in order to use an ADSL service. Some
ADSL modems also manage the connection and sharing of the ADSL service with a group of machines:
in this case, the unit is termed a DSL router or residential gateway. A DSL modem acts as the ADSL
Terminal Unit or ATU-R, as the telephone companies call it. The acronym NTBBA (network termination
broad band adapter, network termination broad band access) is also common in various countries.
Because a DSL modem is a bridge, it has no interface and the IP address that is
An Ethernet ADSL Modem is ideal for a single PC/MAC user looking for a cost-effective way to connect
to ADSL Broadband. An Ethernet ADSL Modem is completely driver-free, so it works on any platform
and under any operating system! Since there are no drivers to load, setup is simple – just plug it into the
Ethernet port of your device/computer and configure the network settings through your web browser.
If you connect an Ethernet ADSL Modem to a Broadband router, you can share high-speed Internet
access with every-one on your network either wired or wireless.
29
• Application: Gigabit Ethernet, 155 Mbps ATM.
• All cables meet or exceed the requirement proposed by TIA /EIA 568 B .2, ISO/IEC
• Ultra smooth jacket makes this cable easy to pull in tight spaces.
• UL-Certified.
Concentrator:
• In telecommunication, the term concentrator has the following meanings:
• 1. in data transmission, a functional unit that permits a common path to handle more data
• Sources than there are channels currently available within the path. A concentrator usually
provides communication capability between many low-speed, usually asynchronous channels
and one or more high-speed, usually synchronous channels. Usually different speeds, codes,
and protocols can be accommodated on the low-speed side. The low-speed channels usually
operate in contention and require buffering.
• 2. A device that connects a number of circuits, which are not all used at once, to a smaller
group of circuits for economy. ISP usually use concentrators to enable modem dialing, this
kind of concentrator is sometimes called a modem concentrator or a remote access
concentrator.
30
31