Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

96
Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations CHAPTER 1 INTRODUCTION 1.1 History In the past, most ISP's were run by the phone company. Now, ISPs can In addition to Internet access via various technologies such as dial-up and DSL, they may provide a combination of services including Internet transit, domain name registration and hosting, web hosting, and collocation. In the fifties and early sixties, prior to the widespread inter-networking that led to the Internet, most communication networks were limited by their nature to only allow communications between the stations on the network. ISPs, so that users who traveled abroad could save on long-distance connect charges. Peering arrangements were established between ISPs who agreed to ISPs also formed alliances to network and share their customers with other carry each other's traffic. Prior to ISPs, access to the Internet required an account at a university or government agency and a working knowledge of UNIX. The Internet began accepting commercial traffic in

description

 

Transcript of Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Page 1: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

CHAPTER 1

INTRODUCTION

1.1 History

In the past, most ISP's were run by the phone company. Now, ISPs can In addition to

Internet access via various technologies such as dial-up and DSL, they may provide a

combination of services including Internet transit, domain name registration and hosting, web

hosting, and collocation. In the fifties and early sixties, prior to the widespread inter-

networking that led to the Internet, most communication networks were limited by their

nature to only allow communications between the stations on the network. ISPs, so that users

who traveled abroad could save on long-distance connect charges. Peering arrangements were

established between ISPs who agreed to ISPs also formed alliances to network and share their

customers with other carry each other's traffic.

Prior to ISPs, access to the Internet required an account at a university or government

agency and a working knowledge of UNIX. The Internet began accepting commercial traffic

in the early 1990s, but commercial users had to honor the peering protocol of swapping data

free of charge. The National Science Foundation commissioned four private companies in

1994 to build public Internet access points, and in 1995 the federal government closed its

own Internet backbone. The first dial-up ISP, world.std.com, were opened in 1989.

Page 2: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Fig 1.1: Number of Internet Hosts.

According to Boardwatch, the number of ISPs increased from about 1,400 in early 1996 to

3,000 at the bigimming of 1997. By mid – 1997 there were an estimated 4,000 ISPs in the

United State and Canada. Many of them were small operations that served consmures and

small business in local markets by leasing and reselling the Internet services of large

ISPs.Earthlink Network Icn. Emerged as one of the largest national ISPs serving consumers,

with 320,000 customers[1].

1.2 ISP Industry of Bangladesh

In 1998 the Internet Service Providers Association of Bangladesh was organized for

the general purpose of improving business conditions of Internet Service Providers operating

in Bangladesh by such activities as serving the common business interest of its Members by

promoting higher business standards In the early nineties, Bangladesh had access to email via

dialup to Bulletin Board Systems (BBS) of a few local providers. The combined Internet

users of all the email-only service providers were not more then 500.

In June 1996, the Government allowed VSAT's to be operated in the Private Sector,

albeit to be provided solely by the Government owned Telephone Operator, BTTB. Only a

handful of ISPs were connected within the first year. However, more liberal Government

policies were followed in the subsequent years which led to a rapid expansion of this

industry, eventually resulting in over 180 registered ISP's by 2005. ISPs are currently

Page 3: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

regulated by the Bangladesh Telecommunication Regulatory Commission (BTRC) through

the Bangladesh Telecommunications Act. The government has decided to provide internet

protocol (IP) telephony licenses to help reduce the costs of international calls substantially

and augment legal calls through internet. The Bangladesh Telecommunication Regulatory

Commission will provide the IP telephony licenses only to the internet service providers

(ISPs) as part of its drive to legalise voice over internet protocol (VoIP) across the country

[1].

1.3 ISP

In this chapter, the topic about Local Area Network, Wide Area Network, Topology,

Internetworking, DSL and Media have been discussed. The brief description of the above

mentioned points have been given below.

1.3.1 Local Area Network

A local area network (LAN) is usually privately owned and links the device in a

single office, building, or campus. Depending on the needs of an organization and the type of

technology used, a LAN can be as simple as two PCs and a printer in the someone’s home

office; or it can extended throughout a company and include audio and video peripherals.

Currently, LAN size is limited in few kilometers. LANs are designed to allow resources to be

shared between personal computers or workstation. The resources to be shared can include

hardware, software and data [2].

1.3.2 Wide Area Network

A wide area network (WAN) provides long-distance transmission of data, voice

image over video information over large geographic areas that may comprise a country,

continent, or over the whole world. In contest to LANs WANs may utilize public, leased or

Page 4: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

private communication equipment, usually in combinations, and can therefore span an

unlimited number of miles.

1.3.3 Topology

Topology is the geometric arrangement of devices on the network. There are two

kinds of topology physical and logical [3].

1.3.4 Internetworking

An internetwork is a collection of individual networks, connected by intermediate

networking devices, that functions as a single large network. Internetworking refers to the

industry, products, and procedures that meet the challenge of creating and administering

internetworks [3].

1.3.5 DSL

Digital Subscriber Line (DSL) technology is a broadband technology that uses existing

twisted-pair telephone lines to transport high-bandwidth data to service subscribers. DSL

service is considered broadband, as opposed to the baseband service for typically LANs.

Broadband refers to a technique which uses multiple frequencies with in the same physical

medium to transmit data. The term xDSL covers a number of similar yet competing forms of

DSL technologies:

● Asymmetric DSL (ADSL)

● Symmetric DSL (SDSL)

● High Bit Rata DSL (HDSL)

● ISDN (like) DSL (IDSL)

● Consumer DSL (CDSL), also called DSL-lite or G.lite

DSL technology allows the service provider to offer high-speed network services to

customers, utilizing installed local loop copper lines. DSL technology allows the local loop

Page 5: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

line to be used for normal telephone voice connected and always on connection for instant

network connectivity [4].

1.3.6 Media

Twisted-pair wire, coaxial cables, or fiber optic cables can connect devices. Some

networks do without connecting media altogether, communicating instead via radio waves

[4].

1.4 Applications of ISP

In a word Internet service provider, a company that provides

1. Access to the Internet.

2. Services to individuals and companies on to the web.

3. It will offer web hosting (web pages stored on its web servers).

4. Access to news group, access to FTTP server and electronic mail.

5. It owns or hires a permanent TCP/IP connection and uses servers

permanently.

1.5 Aim of the Internship

The main objectives of this internship are as follows:

To establish and test dial-up connection.

To support client service e.g. troubleshooting, connectivity test etc.

To set up broadband connection.

To establish shared and dedicated Internet connection.

To set up intranet connection.

To configure web server using LINUX.

1.6 Organization of Report

In Chapter 2 all types of ISP Hardware have been described. After that different types

of networking media and topology have been depicted in Chapter 3. In Chapter 4 connection

Page 6: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

and establishment procedures of Local Area Network (LAN) have been elaborately

described. In the same chapter switch configuration has also been depicted. The Wide Area

Network (WAN) and Configuration of Router have been explained in Chapter 5. At last a

depiction has been made on Server Configuration using LINUX in Chapter 6.

CHAPTER 2

ISP HARDWARE

2.1 Introduction

An Internet service provider (abbr. ISP, also called Internet access provider or

IAP) is a business or organization that sells to consumer’s access to the Internet and related

services. This involves one or more servers using the FTP, SMTP, POP3 etc. protocol. ISPs

are also called IAPs (Internet Access Providers). But from a conceptual viewpoint, the roles

are different. The IAP, being a gate to the Internet, will route all traffic from the Internet

subscriber, while the ISP will only be aware of what happens on its servers.

The Internet uses can be an individual accessing the net from home, generally using

temporary TCP/IP connection (and thus dynamic IP address) via a modem, a terminal adaptor

(ISDN) or a permanent connection (thus static IP address) through xDSL, Cable TV, etc.

Connection via a mobile phone, whilst generally more expensive is also possible. An

organization, a public administration or a company, which uses Internet not only to provide

or to look for information but also to collect data for the purpose of its tasks activities

(administrative procedures, selling of goods or provision of services, publication directories,

small ads, sending out and questionnaires, etc) [5].

Page 7: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 2.1: ISP.

Page 8: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

2.2 ISP Hardware Elements

VSAT

Router

Switch

Hub

Bridge

Cable & Connector

Bandwidth Manager

Servers

SDSL/ADSL

Wireless

Access Server

UPS

2.2.1 VSAT

A Very Small Aperture Terminal VSAT is small-sized telecommunication earth

station that transmits and receives via satellite. The terminal size is usually 1.2 to 4.2 meter in

diameter. VSAT network may transmit and receive voice, data, fax, or video. There are three

major signal bands available for VSAT Technology. They are C-band, KU-band and the KA-

band. VSAT is a collection of outdoor and indoor equipments.

Outdoor:

Antenna

Feed horn

ODU

Low Noise Amplifier (LNA)

Low Noise Block Down converter (LNB)

Page 9: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Block Up Converter (BUC)

Indoor:

Satellite Modem

Port of ODU

VSAT is the only technology for in depended Internet connection in Bangladesh. All the ISPs

of Bangladesh running their service via VSAT [3].

Figure 2.2: a.

VSAT Antenna b. VSAT Modem

2.2.2 Router

It is a device that determines the next network and forward packets to the destinations.

The router connects at least two networks and determines which way to send each data packet

based on routing table. Router are responsible for routing data packet from source to

destination within the LAN, and providing connectivity to WAN. A router reads the Layer3

network address information in every packet that it receives and determines. If it is to be

forwarded, the router looks in it routing table to find the best route between a sender and a

receiver. Router creates or maintains a table of the available routers and uses this information

to determine the route for data packet [3].

Figure2.3: Router.

2.2.3 Switch

Page 10: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

It is a network device that filters, forwards and floods frames based on the MAC

destination address of each frame. A switch operates at the data-link layer of the OSI model.

A switch has many ports with many network segments connect to them. A switch chooses the

ports which the destination device or workstation is connected [3].

Figure 2.4: Switch.

2.2.4 Bridge

A bridge is a device that connects and passes frames between two network segments.

It operates both physical and data-link layer. As a physical layer device, it regenerates the

signal it receivers. As a data-link layer device, the bridge can check the physical (MAC)

address contained in the frame [3].

Figure 2.5: Bridge.

2.2.5 Hub

Hubs are actually multiport repeaters. IT is normally use to create connections

between stations in physical star topology. Hubs can also be used to create multiple levels of

hierarchy. Hubs concentrate connections [3].

Page 11: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 2.6: Hub.

2.2.6 Cable and Connector

A company can use Cat3, 4, 5 or six all its extended standard cable. Now days Cat 5

cables are most popular. Cat5E also work fine. It is best for any ISP company if they use Cat6

cable for their ISP LAN. The RJ45 end an 8 position that looks like a large phone plug. There

is a couple of variations available. The primary variation that needs to pay attention that

whether the connector is intended braided or soil wire. For braided/stranded wires, the

connector has contacts that actually pierce the wire. For soil wires, the connector has fingers,

which pierce the insulation and make contact with the wire by grasping it from both sides.

The connector is a weak point in an Ethernet connection, choosing the wrong one will often

cause grief leter [3].

Figure 2.7: Cable and Connector.

2.2.7 Bandwidth Manager

Proper bandwidth management is mandatory is mandatory requirement for an ISP.

Every ISP Company should have a proper planning and management for this purpose.

Hardware bandwidth Manager is a special device, which will be used for traffic /bandwidth

control only. Some bandwidth manager provides firewall facilities. There are many

bandwidth controllers in the market. ET (Emerging Technology) is the most use hardware

bandwidth controller in Bangladeshi ISP. It has software as well as hardware solution [6].

Page 12: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

2.2.8 Wireless

Wireless has a very large variety of product range. Bangladeshi ISPs are using more

than six types of Wireless Equipments. Any company can select Point-to-Point or Point-to-

Multipoint wireless product. Be clear with they need and then take decision. For example if

they need Point-to-Point product they concentrate about frequency, data transfer rate, power

supply, outdoor safety and area/distance [6].

2.2.9 xDSL

Bangladeshi ISP uses two technology of xDSL group; ADSL and SDSA Some ISP

started to using VDSL (Very high-rate Digital Subscriber Line).

ADSL: Most Bangladeshi ISP uses “zyxel” ADSL concentrator and CPE for providing

Internet access. Connector is ISP End Equipment and CPE is client end equipment. Zyxel has

two types of CPE, ADSL router and ADSL modem. Prices are almost same of those

equipments.

SDSL: Most Bangladeshi ISP use DASAN, Zyxel SDSL Point-to-Point equipment. If

any company wishes to use SDSL concentrator, they can choose DASAN [4].

2.2.10 Servers

Server selection is most important for each server service. Every company needs to

concentrate about following meters before choosing server.

Hard Disk: Nowadays all IBE hard disk are speedy enough to handle complex

storage requirement. If any company want to more optimum performance they san choose

SCASII hard disk.

Processor: Most server service demand mid range processor. It today depends on

traffic and usages.

RAM: Day-by-day applications are being large which requires big RAM run. So the

amount of RAM heavily affects system performance [6].

Page 13: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

2.2.11 Access Server

Access server is required for dial-up service. There are two major differences between

access servers.

Internal Modem pool: If any company does not wish to face hassle of external

modems, you may choose a complete access server (with internal modem pool). These kinds

of access server are always a bit costly. It is think about manageably, there is no other

alternative than this type. In a large environment more than 100 phones, this type will be best

choice 3Con & US Robotics access server are commonly use in Bangladesh.

Figure 2.8: 3Com Total Control.

External Modem: It is a bit cost effective access method for small scale for small

scale ISP. Most hazardous part this type is modem management. Cisco 2500 and 2600

provides this facility with an extra module. Lucent Technologies Postmaster is the most

popular product in Bangladesh [6].

Figure 2.9: Lucent Postmaster.

2.2.12 UPS

Choosing a good UPS (Uninterruptible Power Supply) very important. The UPS

should be specifically designed for power sensitive equipment and application. A normal Off-

Line UPS can work well for clone server.

Page 14: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 2.10: UPS.

BTTB recently started E1 facility in Bangladesh. So every company needs to consider

future planning. If any company wishes to use E1 for dialup, purchase E1 (European Telecom

Standard) supported postmaster or access server (recent postmasters and Cisco access servers

support this facility) [3].

CHAPTER 3

NETWORKIG MEDIA AND TOPOLOGY

3.1 Introduction

In networking media include twisted-pair cable, coaxial cable, and optical fiber cable

that provide a conduct from one device to another, a signal traveling along any of these media

is directed and contain by the physical limits of the medium. Twisted-pair cable coaxial cable

use metallic (copper) conductors that accept and transport signals in the form of electric

current. Optical fiber is a glass cable that accepts and transports signals in the form of light.

On the other hand wireless media transports electromagnetic wave without using a physical

conductor. Network topology defines the structure of the network. One part of the topology

definition is the physical topology, which is the actual layout of the wire or media. The other

part is the logical topology, which defines how the hosts access the media to send data.

3.2 Twisted-Pair Cable

A twisted-pair consists of two conductors, each with its own plastic insulation,

twisted together. One of the wires is used to carry signals to the receiver, and other is used to

a grounded interface. The receiver uses at the difference betweens two levels. In additional to

Page 15: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

the signal send by the sender on the one of the wires, interference and cross talk may affect

both wires and create unwanted signals. The receiver at the end operates only difference

between these unwanted signals. There are two types of twisted pair cable, unshielded

twisted-pair (UTP) cable and shielded twisted-pair (STP) cable.

3.2.1 Unshielded Twisted-Pair (UTP) Cable

The most common twisted pair used in communication is called unshielded twisted-

pair able. UTP is a four-pair wire medium used in a variety of networks. Each of the eight

copper wires in the UTP cable is covered by insulating material. In addition, each pair of

wires is twisted around each other.

Figure 3.1: UTP cable.

UTP cable has many advantages. It is easy to install and is less expensive than other

types of networking media. In fact, UTP costs less per meter than any other type of LAN

cabling. However, the real advantage is the size.

There are some disadvantages of twisted-pair cabling. UTP cable is more prone to

electrical noise and interference than other types of networking media, and the distance

between signal boosts is shorter for UTP than it is for coaxial and fiber optic cables. Twisted

pair cabling was once considered slower at transmitting data than other types of cable. This is

no longer true. In fact, today, twisted pair is considered the fastest copper-based media [7].

Page 16: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

3.2.2 Shielded Twisted-Pair (STP) Cable

STP cable has a metal foil or braided-mesh covering that encases each pair of

insulated conductors. It is usually 150-ohm cable. Although metal casing improves the

quality of cable by preventing the penetration of noise or crosstalk. The metallic shielding

materials in STP need to be grounded at both ends.

Figure 3.2: STP cable.

STP cable shares many of the advantages and disadvantages of UTP cable. STP

provides more protection from all types of external interference. However, STP is more

expensive and difficult to install than UTP [7].

3.3 Coaxial Cable

Coaxial cable carries signals of higher frequency ranges than twisted-pair cable, in

part because the two media are constructed quite differently. Instead of having two wires,

coax has central core conductor of solid or stranded wire (copper) enclosed in an insulating

sheath. This second layer or shield also reduces the amount of outside electromagnetic

interference. Covering this shield is the cable jacket.

Figure 3.3: Coaxial cable.

Page 17: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

For LANs, coaxial cable offers several advantages. It can be run longer distances than

shielded twisted pair, STP, unshielded twisted pair, UTP, and screened twisted pair, STP,

cable without the need for repeaters. Coaxial cable is less expensive than fiber-optic cable. It

has been used for many years for many types of data communication such as cable television.

The speed and throughput of coaxial cable is upto10-100 Mbps, and maximum cable length is

500m [7].

3.4 Optical Fiber

It is made of glass or plastic and transmits signals in form of light. Light travels in a

straight line as long as it is moving through a single uniform substance. If the ray of light

travels along one substance to another the ray changes its direction.

Figure 3.4: Optical fiber cable.

The core of the optical fiber has to have a large index of reflection than material that

surrounds it. The material that surrounds the core of the fiber is called the cladding. The core

of the fiber is large enough so that there are many paths that light can take through the fiber,

the fiber is called "multimode" fiber. Single-mode fiber has a much smaller core that only

allows light rays to travel along one mode inside the fiber. Single mode optical fiber has

small core, less dispersion and suited for long distance (up to 3km). Multimode optical fiber

has large core than single mode cable, allow greater dispersion and therefore loss of sign,

Page 18: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

used for long distance application but shorter than single mode (up to 2km) and uses LEDs

for lighting source [7].

3.5 Wireless

A wireless network may consist of as few as two devices. - The

nodes could simply be desktop workstations or notebook computers.

Equipped with wireless NICs, an ‘ad hoc’ network could be established

which compares to a peer-to-peer wired network. Both devices act as

servers and clients in this environment. Although it does provide

connectivity, security is at a minimum along with throughput. Another

problem with this type is connectivity. Many times NICs from different

manufacturers are not compatible. Three types of wireless transmission

are radio wave, microwave and infrared.

3.6 Physical Topology

The term physical topology refers to the way in which a network

is laid out physically. Two or more device connect to a link; two or more

link from a topology.

Page 19: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 3.5: Physical topology.

Bus Topology: In a bus topology one long cable act as a backbone to link all the devices in

the network. All the hosts are connected directly to this backbone.

Ring Topology: In a ring topology, each device has a dedicated point-to-point connection

only with the two devices on either side of it. A signal passed along the ring in one direction

from device to device, until it reached it destination.

Star Topology: In a star topology, each device has dedicated point-to-point link only to a

central controller. The devices are not directly linked one another.

Extended Star Topology: An extended star topology links individual stars together by

connecting the hubs or switches.

Hierarchical Topology: A hierarchical topology is similar to an extended star. However,

instead of linking the hubs or switches together, the system is linked to a computer that

controls the traffic on the topology.

Mesh Topology: In a mash topology, every device has a dedicated point-to-point link to

every other device. As seen in the graphic, each host has its own connections to all other

hosts. Although the Internet has multiple paths to any one location, it does not adopt the full

mesh topology [2].

3.7 Logical Topology

Page 20: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

The logical topology of a network determines how the hosts communicate across the

medium. The two most common types of logical topologies are broadcast and token passing.

CHAPTER 4

LOCAL AREA NETWORK ESTABLISHMENT

4.1 Introduction

LAN design has evolved. Network designers until very recently used hubs and

bridges to build networks. Now switches and routers are the key components in LAN design,

and the capabilities and performance of these devices continue to improve. Even though each

LAN is unique, there are many design aspects that are common to all LANs. For example,

most LANs follow the same standards and use the same components. This module presents

information on elements of Ethernet LANs and common LAN devices [7].

4.2 LAN Technologies

There are three types of common LAN Technologies:

Ethernet – uses a logical bus topology to control information flow on a liner bus and

a physical star or extended star topology for the cables.

Token Ring – uses a logical ring topology to control information flow and a physical

star topology.

FDDI – uses a logical ring topology to control information flow and physical dual-

ring topology [7].

Page 21: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 4.1: Common LAN Technologies.

4.3 Ethernet LAN Developments

The earliest LAN technologies used either thick Ethernet or thin

Ethernet infrastructures. It is important to understand the limitations of

these infrastructures. In order to understand the advancements in LAN

switching. The addition of hubs or concentrators into the network offered

an improvement on thick and thin Ethernet technology. A hub is a Layer 1

device and is sometimes referred to as an Ethernet concentrator or a

multiport repeater. Hubs allow better access to the network for more

users. Hubs regenerate data signals which allow networks to be extended

to greater distances.

Ethernet is fundamentally a shared technology where all users on a

given LAN segment compete for the same available bandwidth. This

situation is analogous to a number of cars that try to access a one-lane

road at the same time. Since the road has only one lane, only one car can

access it at a time. As hubs were added to the network, more users

competed for the same bandwidth.

Figure 4.2: Develop LAN Topology.

Page 22: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Collisions are a by-product of Ethernet networks. If two or more

devices try to transmit at the same time, a collision occurs. This situation

is analogous to two cars that try to merge into a single lane and cause a

collision. Traffic is backed up until the collision can be cleared. Excessive

collisions in a network result in slow network response times. This

indicates that the network is too congested or has too many users who

need to access the network at the same time.

Layer 2 devices are more intelligent than Layer 1 devices. Layer 2

devices make forwarding decisionsbased on Media Access Control (MAC)

addresses contained within the headers of transmitted data frames. A

bridge is a Layer 2 device used to divide, or segment, a network. Bridges

collect and selectively pass data frames between two network segments.

In order to do this, bridges learn the MAC address of devices on each

connected segment..

Bridges do not restrict broadcast traffic. However, they do provide

greater traffic control within a network. A switch is also a Layer 2 device

and may be referred to as a multi-port bridge. Switches make forwarding

decisions based on MAC addresses contained within transmitted data

frames. Switches learn the MAC addresses of devices connected to each

port and this information is entered into a switching table. Switches create

a virtual circuit between two connected devices that want to

communicate. When the virtual circuit is created, a dedicated

communication path is established between the two devices [4].

4.4 Ethernet In The Campus

Ethernet is the most widely used LAN technology. Ethernet was first implemented by

Page 23: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

the Digital, Intel, and Xerox group (DIX). DIX created and implemented the first Ethernet

LAN specification, which was used as the basis for the Institute of Electrical and Electronics

Engineers (IEEE) 802.3 specification. A network may require an upgrade to one of the faster

Ethernet topologies.

The new generation of multimedia, imaging, and database products can easily

overwhelm a network that operates at traditional Ethernet speeds of 10 and 100 Mbps.

Network administrators may choose to provide Gigabit Ethernet from the backbone to the

end user. Installation costs for new cables and adapters can make this prohibitive.

There are several ways that Ethernet technologies can be used in a campus network:

1. An Ethernet speed of 10 Mbps can be used at the user level to provide good

performance.

2. Clients or servers that require more bandwidth can use 100-Mbps Ethernet.

Fast Ethernet is used as the link between user and network devices. It can support the

combination of all traffic from each Ethernet segment. Fast Ethernet can be used to connect

enterprise servers. This will enhance client-server performance across the campus network

and help prevent bottlenecks. Fast Ethernet or Gigabit Ethernet should be implemented

between backbone devices, based on affordability [4].

4.5 Host Connectivity

The function of a NIC is to connect a host device to the network medium. A NIC is a

printed circuit board that fits into the expansion slot on the motherboard or peripheral device

of a computer. The NIC is also referred to as a network adapter. On laptop or notebook

computers a NIC is the size of a credit card. NICs are considered Layer 2 devices because

each NIC carries a unique code called a MAC address. This address is used to control data

communication for the host on the network. More will be learned about the MAC address

later. NICs control host access to the medium [4].

Page 24: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

4.5.1 Peer-to-Peer Connection

When LAN and WAN technologies are used, many computers are interconnected to

provide services to their users. To accomplish this, networked computers take on different

roles or functions in relation to each other. Some types of applications require computers to

function as equal partners.

Figure 4.3: Peer to Peer Environment.

Other types of applications distribute their work so that one computer functions to serve a

number of others in an unequal relationship. Two computers generally use request and

response protocols to communicate with each other. One computer issues a request for a

service, and a second computer receives and responds to that request. The requestor acts like

a client and the responder acts like a server.

In a peer-to-peer network, networked computers act as equal partners, or peers. As

peers, each computer can take on the client function or the server function. Computer A may

request for a file from Computer B, which then sends the file to Computer A. Computer A

acts like the client and Computer B acts like the server. At a later time, Computers A and B

can reverse roles.

In a peer-to-peer network, individual users control their own resources. The users may

decide to share certain files with other users. The users may also require passwords before

they allow others to access their resources. Since individual users make these decisions, there

is no central point of control or administration in the network. In addition, individual users

must back up their own systems to be able to recover from data loss in case of failures. When

a computer acts as a server, the user of that machine may experience reduced performance as

Page 25: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

the machine serves the requests made by other systems.

Peer-to-peer networks are relatively easy to install and operate. No additional

equipment is necessary beyond a suitable operating system installed on each computer. Since

users control their own resources, no dedicated administrators are needed. As networks grow,

peer-to-peer relationships become increasingly difficult to coordinate. A peer-to-peer network

works well with ten or fewer computers [4].

4.5.2 Client/Server Connection

In a client/server arrangement, network services are

located on a dedicated computer called a server. The server

responds to the requests of clients. The server is a central

computer that is continuously available to respond to requests

from clients for file, print, application, and other services.

Most network operating systems adopt the form of a

client/server relationship. Typically, desktop computers function as clients and one or more

computers with additional processing power, memory, and specialized software function as

servers.

Figure 4.4: Client to Server Connection.

Servers are designed to handle requests from many clients simultaneously. Before a

client can access the server resources, the client must be identified and be authorized to use

the resource. Each client is assigned an account name and password that is verified by an

Page 26: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

authentication service. The authentication service guards access to the network. With the

centralization of user accounts, security, and access control, server-based networks simplify

the administration of large networks.

The concentration of network resources such as files, printers, and applications on

servers also makes it easier to back-up and maintain the data. Resources can be located on

specialized, dedicated servers for easier access. Most client/server systems also include ways

to enhance the network with new services that extend the usefulness of the network.

The centralized functions in a client/server network has substantial advantages and

some disadvantages. Although a centralized server enhances security, ease of access, and

control, it introduces a single point of failure into the network. Without an operational server,

the network cannot function at all. Servers require a trained, expert staff member to

administer and maintain. Server systems also require additional hardware and specialized

software that add to the cost [4].

4.6 Connection Media

The connector on a NIC may not match the media to which it needs to connect. The

AUI connector allows different media to connect when used with the appropriate transceiver.

A transceiver is an adapter that converts one type of connection to another. A transceiver will

usually convert an AUI to an RJ-45, a coax, or a fiber optic connector. On 10BASE5

Ethernet, or Thicknet, a short cable is used to connect the AUI with a transceiver on the main

cable [4].

4.7 UTP Implementation

EIA/TIA specifies an RJ-45 connector for UTP cable. The letters RJ stand for

registered jack and the number 45 refers to a specific wiring sequence. The RJ-45 transparent

end connector shows eight colored wires. Four of the wires, T1 through T4, carry the voltage

and are called tip. The other four wires, R1 through R4, are grounded and are called ring. Tip

Page 27: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

and ring are terms that originated in the early days of the telephone. Today, these terms refer

to the positive and the negative wire in a pair. The wires in the first pair in a cable or a

connector are designated as T1 and R1. The second pair is T2 and R2, the third is T3 and R3,

and the fourth is T4 and R4.

The RJ-45 connector is the male component, which is crimped on the end of the

cable. When a male connector is viewed from the front, the pin locations are numbered from

8 on the left to 1 on the right. as seen in Figure 4.5.

The jack is the female component in a network device, wall outlet, or patch panel as

seen in Figure 3.3. Figure 4.6 shows the punch-down connections at the back of the jack

where the Ethernet UTP cable connects.

Figure 4.5: Internal View of RJ-

45.

For electricity to run between the connector and the

jack, the order of the wires must follow T568A or

T568B color code found in the EIA/TIA-568-B.1 standard. To determine the EIA/TIA

category of cable that should be used to connect a device, refer to the documentation for that

device or look for a label on the device near the jack. If there are no labels or documentation

available, Category 5E or greater can be used as higher categories in place of lower ones.

Then it is determine whether to use a straight-through cable or a crossover cable.

Figure 4.6: Wire Combination of UTP.

Page 28: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

If the two RJ-45 connectors of a cable are held side by side in the same orientation,

the colored wires will be seen in each. If the order of the colored wires is the same at each

end, then the cable is a straight-through.

In a crossover cable, the RJ-45 connectors on both ends show that some of the wires

are connected to different pins on each side of the cable. Figure4.5 shows that pins 1 and 2 on

one connector connect to pins 3 and 6 on the other [4].

Figure 4.7: Wire Connection of RJ-45.

Straight-through cables are used for the following connections:

Switch to router

Switch to PC or server

Hub to PC or server

Crossover cables are used for the following connections:

Switch to switch

Switch to hub

Hub to hub

Router to router

PC to PC

Router to PC

4.8 Cabling Hubs

Hubs are actually multiport repeaters. The difference between hubs and repeaters is

Page 29: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

usually the number of ports that each device provides. A typical repeater usually has two

ports. A hub generally has from 4 to 24 ports. Hubs are most commonly used in Ethernet

10BASE-T or 100BASE-T networks.

The use of a hub changes the network from a linear bus with each device plugged directly

into the wire to a star topology. Data that arrives over the cables to a hub port is electrically

repeated on all the other ports connected to the network segment.

Figure 4.8: Hub Connection.

A passive hub serves as a physical connection point only. It does not manipulate or

view the traffic that crosses it. It does not boost or clean the signal. A passive hub is used

only to share the physical media. A passive hub does not need electrical power. An active hub

must be plugged into an electrical outlet because it needs power to amplify a signal before it

is sent to the other ports. Intelligent hubs are sometimes called smart hubs. They function like

active hubs with microprocessor chips and diagnostic capabilities. Intelligent hubs are more

expensive than active hubs. They are also more useful in troubleshooting situations. Devices

attached to a hub receive all traffic that travels through the hub. If many devices are attached

to the hub, collisions are more likely to occur. A collision occurs when two or more

workstations send data over the network wire at the same time. All data are corrupted when

this occurs. All devices that are connected to the same network segment are members of the

same collision domain. Sometimes hubs are called concentrators since they are central

connection points for Ethernet LANs [4].

4.9 Cabling Bridges

Page 30: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

In many times it is necessary to break up a large LAN into smaller and more easily

managed segments.  This decreases the amount of traffic on a single LAN and can extend the

geographical area past what a single LAN can support. The devices that are used to connect

network segments together include bridges, switches, routers, and gateways. Switches and

bridges operate at the data link layer of the OSI model. The function of the bridge is to make

intelligent decisions about whether or not to pass signals on to the next segment of a network.

Figure 4.9: Bridge

Connection.

When a bridge receives a frame on the network, the destination MAC address is looked up in

the bridge table to determine whether to filter, flood, or copy the frame onto another segment

[4].

4.10 Cabling Switches

A switch is sometimes described as a multiport bridge. A typical bridge may have

only two ports that link two network segments. A switch can have multiple ports based on the

number of network segments that need to be linked. Like bridges, switches learn information

about the data packets that are received from computers on the network. Switches use this

information to build tables to determine the destination of data that is sent between computers

on the network

Although there are some similarities between the two, a switch is a more sophisticated

device than a bridge. A bridge determines whether the frame should be forwarded to the other

Page 31: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

network segment based on the destination MAC address. A switch has many ports with many

network segments connected to them. A switch chooses the port to which the destination

device or workstation is connected. Ethernet switches are popular connectivity solutions

because they improve network speed, bandwidth, and performance.

Figure 4.10: Switch Connection.

Switching is a technology that alleviates congestion in Ethernet LANs. Switches

reduce traffic and increase bandwidth. Switches can easily replace hubs because switches

work with the cable infrastructures that are already in place. This improves performance with

minimal changes to a network. All switching equipments perform two basic operations. The

first operation is called switching data frames. This is the process by which a frame is

received on an input medium and then transmitted to an output medium. The second is the

maintenance of switching operations where switches build and maintain switching tables and

search for loops.

Switches operate at much higher speeds than bridges and can support new

functionality, such as virtual LANs. An Ethernet switch has many benefits. One benefit is

that it allows many users to communicate at the same time through the use of virtual circuits

and dedicated network segments in a virtually collision-free environment. This maximizes

the bandwidth available on the shared medium. Another benefit is that a switched LAN

environment is very cost effective since the hardware and cables in place can be reused [4].

Page 32: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

4.11 Configuring The Switch

4.11.1 Verifying The Catalyst Switch Default Configuration

When powered up for the first time, a switch has default data in the running

configuration file. The default hostname is Switch. No passwords are set on the console or

virtual terminal (vty) lines. A switch may be given an IP address for management purposes.

This is configured on the virtual interface, VLAN 1. By default, the switch has no IP address.

The switch ports or interfaces are set to auto mode , and all switch ports are in VLAN

1. VLAN 1 is knownas the default management VLAN.

The flash directory by default, has a file that contains the IOS image, a file called env_vars,

and a subdirectory called html. After the switch is configured, the flash directory will contain

a file called config.textas well as a VLAN database. As seen in Figure , the flash directory

does not contain a config.text file or a VLAN database file called vlan.dat. The IOS version

and the configuration register settings can be verified with the show version command.

For small networks, the default configuration may be sufficient. The benefits of better

performance with microsegmentation are obtained immediately [4].

Page 33: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 4.11: Default Running Configuration and Default Interface.

Page 34: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 4.12: Default VLAN

4.11.2 Configuring the Catalyst Switch

A switch may be preconfigured and only passwords may need to be

entered for the User EXEC or Privileged EXEC modes. Switch configuration

mode is entered from Privileged EXEC mode. In the CLI, the default

Privileged EXEC mode prompt is Switch#. In User EXEC mode the prompt

is

Switch>.

The following steps will ensure that a new configuration will

completely overwrite the current

configuration:

Page 35: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

To remove the current VLAN information, delete the VLAN database file

called vlan.dat from the flash directory

Erase the back up configuration file called startup-config

Restart the switch with the reload command

Security, documentation, and management are important for every

network device. A switch should be given a hostname, and passwords

should be set on the console and vty lines.

To allow the switch to be accessible by Telnet and other TCP/IP

applications, IP addresses and a default gateway should be set. By

default, VLAN 1 is the management VLAN. In a switch-based network, all

network devices should be in the management VLAN. This allows a single

management workstation to access, configure, and manage all the

network devices.

The Fast Ethernet switch ports default to auto-speed and auto-

duplex. This allows the interfaces to negotiate these settings. Network

administrators can manually configure the interface speed and duplex

values if necessary.

Some network devices can provide a web-based interface for

configuration and management purposes. Once a switch is configured

with an IP address and gateway, it can be accessed in this way. A web

browser can access this service using the IP address and port 80, the

default port for http. The HTTP service can be turned on or off, and the

port address for the service can be chosen.

Page 36: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Any additional software such as an applet can be downloaded to the

browser from the switch. Also, the switch can be managed by a browser

based graphical user interface (GUI) [4].

Figure 4.13: Switch Hostname, Password, IP Address and Default gateway.

CHAPTER 5

WIDE AREA NETWORK ESTABLISHMENT

5.1 Introduction

A WAN is a data communications network that operates beyond the geographic scope

of a LAN. One primary difference between a WAN and a LAN is that a company or

organization must subscribe to an outside WAN service provider in order to use WAN carrier

network services. A WAN uses data links provided by carrier services to access the Internet

and connect the locations of an organization to each other, to locations of other organizations,

Page 37: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

to external services, and to remote users. WANs generally carry a variety of traffic types,

such as voice, data, and video. Telephone and data services are the most commonly used

WAN services.

5.2 WAN Technologies

Devices on the subscriber premises are called customer premises equipment (CPE).

The subscriber owns the CPE or leases the CPE from the service provider. A copper or fiber

cable connects the CPE to the service provider’s nearest exchange or central office (CO).

This cabling is often called the local loop, or "last-mile". A dialed call is connected locally to

other local loops, or non-locally through a trunk to a primary center. It then goes to a

sectional center and on to a regional or international carrier center as the call travels to its

destination.

In order for the local loop to carry data, a device such as a modem is needed to

prepare the data for transmission. Devices that put data on the local loop are called data

circuit-terminating equipment, or data communications equipment (DCE). The customer

devices that pass the data to the DCE are called data terminal equipment (DTE). The DCE

primarily provides an interface for the DTE into the communication link on the WAN cloud.

The DTE/DCE interface uses various physical layer protocols, such as High-Speed Serial

Interface (HSSI) and V.35. These protocols establish the codes and electrical parameters the

devices use to communicate with each other [4].

Figure 5.1: WAN Technology.

Page 38: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

5.3 WAN Devices

WANs are groups of LANs connected together with communications links from a

service provider. Because the communications links cannot plug directly into the LAN, it is

necessary to identify the various pieces of interfacing equipment.

LAN-based computers with data to transmit send data to a router that contains both

LAN and WAN interfaces. The router will use the Layer 3 address information to deliver the

data on the appropriate WAN interface. Routers are active and intelligent network devices

and therefore can participate in network management. Routers manage networks by providing

dynamic control over resources and supporting the tasks and goals for networks. Some of

these goals are connectivity, reliable performance, management control, and flexibility.

Figure 5.2: WAN Devices.

The communications link needs signals in an appropriate format. For digital lines, a

channel service unit (CSU) and a data service unit (DSU) are required. The two are often

combined into a single piece of equipment, called the CSU/DSU. The CSU/DSU may also be

built into the interface card in the router. A modem is needed if the local loop is analog rather

than digital. Modems transmit data over voice-grade telephone lines by modulating and

demodulating the signal. The digital signals are superimposed on an analog voice signal that

is modulated for transmission [4].

5.4 Router

Routers are responsible for routing data packets from source to destination within the

LAN, and for providing connectivity to the WAN. Within a LAN environment the router

contains broadcasts, provides local address resolution services, such as ARP and RARP, and

Page 39: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

may segment the network using a subnetwork structure. In order to provide these services the

router must be connected to the LAN and WAN [4].

5.4.1 Router User Interface Modes

The Cisco IOS software separates the EXEC sessions into two access levels. These levels

are user EXEC mode and privileged EXEC mode. The privileged EXEC mode is also known

as enable mode. The following are the features of the user EXEC mode and privileged EXEC

mode:

The user EXEC mode allows only a limited number of basic monitoring commands.

This is often referred to as a view only mode. The user EXEC level does not allow

any commands that might change the configuration of the router. The user EXEC

mode can be identified by the > prompt.

The privileged EXEC mode provides access to all router commands. This mode can

be configured to require a password. For added protection, it can also be configured to

require a user ID. This allows only authorized users to access the router. Configuration and

management commands require that the network administrator be at the privileged EXEC

level. Global configuration mode and all other more specific configuration modes can only be

reached from the privileged EXEC mode. The privileged EXEC mode can be identified by

the # prompt.

To access the privileged EXEC level from the user EXEC level, enter the enable

command at the > prompt [4].

Page 40: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 5.3: Router Enable Mode.

5.4.2 Configure a Cisco Router

Global configuration mode commands are used in a router to apply configuration

statements that affect the system as a whole. The following command moves the router into

global configuration mode and allows entry of commands from the terminal:

Router#configure terminal

Router(config)#

The prompt will change to indicate that the router is in global configuration mode [4].

5.4.3 Configuring a Router Name

A router should be given a unique name as one of the first configuration tasks. This

task is accomplished in global configuration mode with the following command:

Router(config)#hostname daffodil

Tokyo(config)#

Figure 5.4: Configure Host Name.

When the Enter key is pressed, the prompt will change from the default host name,

which is Router, to the newly configured host name, which is Daffodil.

Page 41: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

5.4.4 Configuring Router Passwords

Passwords restrict access to routers. Passwords should always be configured for

virtual terminal (vty) lines and the console line. Passwords are also used to control access to

privileged EXEC mode so that only authorized users may make changes to the configuration

file.

The following commands are used to set an optional but recommended password on the console line:

Router(config)#line console 0

Router(config-line)#login

Router(config-line)#password <password >

Figure 5.5: Configure Password.

A password must be set on one or more of the vty lines for users to gain remote access

to a router through Telnet. Most Cisco routers support five vty lines numbered 0 through 4.

The following commands are used to set a password on vty lines:

Router(config)#line vty 0 4

Router(config-line)#login

Page 42: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Router(config-line)#password <password >

The enable password and enable secret commands are used to restrict access to the privileged

EXEC mode. The enable password is only used if the enable secret has not been set. The

enable secret command should be used because the enable secret command is encrypted. The

enable password command is not encrypted. The following commands are used to set the

passwords:

Router(config)#enable password <password >

Router(config)#enable secret <password >

Sometimes it is undesirable for passwords to be shown in clear text in the output from the

show running-config or show startup-config commands. This command is used to encrypt

passwords in configuration output:

Router(config)#service password-encryption

The service password-encryption command applies a weak encryption to all unencrypted

passwords. The enable secret <password > command uses a strong MD5 algorithm for

encryption [5].

5.4.5 Configuring a Serial Interface

To configure a serial interface these steps are global configuration mode is entered,

interface mode is entered, the interface address and subnet mask are specified, clock rate is

set if a DCE cable is connected. This step is skipped if a DTE cable is connected and the

interface is turned on.

Each connected serial interface must have an IP address and subnet mask to route packets.

Configure the IP address with the following commands:

Page 43: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

IP Router(config)#interface serial 0/0

Router(config-if)#ip address <ip address > <netmask >

In the lab environment, the clockrate setting that will be used is 56000. The commands that

are used to set a clock rate and enable a serial interface are as follows:

Router(config)#interface serial 0/0

Router(config-if)#clock rate 56000

Router(config-if)#no shutdown

5.5 WAN Standards

WANs use the OSI reference model, but focus mainly on Layer 1 and Layer 2. WAN

standards typically describe both physical layer delivery methods and data link layer

requirements, including physical addressing, flow control, and encapsulation. WAN

standards are defined and managed by a number of recognized authorities. The physical layer

protocols describe how to provide electrical, mechanical, operational, and functional

connections to the services provided by a communications service provider. Some of the

common physical layer standards are listed in Figure.

The data link layer protocols define how data is encapsulated for transmission remote

sites, and the mechanisms for transferring the resulting frames. A variety of different

technologies are used, such as ISDN, Frame Relay or Asynchronous Transfer Mode (ATM).

These protocols use the same basic framing mechanism, high-level data link control (HDLC),

an ISO standard, or one of its sub-sets or variants [4].

Table 5.1: WAN Standards and WAN Physical Layer Standards

Page 44: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 5.6: WAN Data Link Layer. 5.6 WAN Link Options

Circuit switching establishes a dedicated physical connection for voice or data

between a sender and receiver. Before communication can start, it is necessary to establish

the connection by setting the switches. This is done by the telephone system, using the dialed

number. ISDN is used on digital lines as well as on voice-grade lines.

To avoid the delays associated with setting up a connection, telephone service

providers also offer permanent circuits. These dedicated or leased lines offer higher

bandwidth than is available with a switched circuit. Examples of circuit-switched connections

include:

Plain Old Telephone System (POTS)

Page 45: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

ISDN Basic Rate Interface (BRI)

ISDN Primary Rate Interface (PRI) [4].

Figure 5.7: WAN Link Option.

5.7 ISDN

The internal connections, or trunks, of the PSTN have changed from carrying analog

frequency-division multiplexed signals, to time-division multiplexed (TDM) digital signals.

An obvious next step is to enable the local loop to carry digital signals that result in higher

capacity switched connections. Integrated Services Digital Network (ISDN) turns the local

loop into a TDM digital connection. The connection uses 64 kbps bearer channels (B) for

carrying voice or data and a signaling, delta channel (D) for call set-up and other purposes.

Basic Rate Interface (BRI) ISDN is intended for the home and small enterprise and

provides two 64 kbps B channels and a 16 kbps D channel. For larger installations, Primary

Rate Interface (PRI) ISDN is available. The BRI D channels underutilized, as it has only two

B channels to control. Some providers allow the D channel to carry data at low bit rates such

as X.25 connections at 9.6 kbps.

Page 46: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 5.8: BRI and PRI.

Another common application of ISDN is to provide additional capacity as needed on a

leased line connection. The leased line is sized to carry average traffic loads while ISDN is

added during peak demand periods. ISDN is also used as a backup in the case of a failure of

the leased line. ISDN tariffs are based on a per-B channel basis and are similar to those of

analog voice connections. With PRI ISDN, multiple B channels can be connected between

two end points. This allows for video conferencing and high bandwidth data connections with

no latency or jitter. Multiple connections can become very expensive over long distances [4].

Figure 5.9: WAN with ISDN.

5.8 Leased Line

When permanent dedicated connections are required, leased lines are used with

capacities ranging up to 2.5 Gbps. A point-to-point link provides a pre-established WAN

communications path from the customer premises through the provider network to a remote

destination. Point-to-point lines are usually leased from a carrier and are called leased lines.

Leased lines are available in different capacities. These dedicated circuits are generally priced

based on bandwidth required and distance between the two connected points. Point-to-point

links are generally more expensive than shared services such as Frame Relay [4].

Page 47: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 5.10: WAN with a Leased Line.

5.9 X.25

In response to the expense of leased lines, telecommunications providers introduced

packet-switched networks using shared lines to reduce costs. The first of these packet-

switched networks was standardized as the X.25 group of protocols. X.25 provides a low bit

rate shared variable capacity that may be either switched or permanent. X.25 is a network-

layer protocol and subscribers are provided with a network address. Virtual circuits can be

established through the network with call request packets to the target address. The resulting

SVC is identified by a channel number. Data packets labeled with the channel number are

delivered to the corresponding address. Multiple channels can be active on a single

connection. Subscribers connect to the X.25 network with either leased lines or dialup

connections. X.25 networks can also have pre-established channels between subscribers that

provide a PVC. X.25 can be very cost effective because tariffs are based on the amount of

data delivered rather than connection time or distance. X.25 technology is no longer widely

available as a WAN technology in the US. Frame Relay has replaced X.25 at many service

provider locations [4].

Page 48: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 5.11: WAN with X.25.

5.10 Frame Relay

With increasing demand for higher bandwidth and lower latency packet switching,

communications providers introduced Frame Relay. Although the network layout appears

similar to that for X.25, available data rates are commonly up to 4 Mbps, with some providers

offering even higher rates. Frame Relay differs from X.25 in several aspects. Most

importantly, it is a much simpler protocol that works at the data link layer rather than the

network layer.

Most Frame Relay connections are PVCs rather than SVCs. The connection to the

network edge is often a leased line but dialup connections are available from some providers

using ISDN lines. The ISDN D channel is used to set up an SVC on one or more B channels.

Frame Relay tariffs are based on the capacity of the connecting port at the network edge.

Additional factors are the agreed capacity and committed information rate (CIR) of the

various PVCs through the port. Frame Relay provides permanent shared medium bandwidth

connectivity that carries both voice and data traffic. Frame Relay is ideal for connecting

enterprise LANs. The router on the LAN needs only a single interface, even when multiple

VCs are used. The short-leased line to the Frame Relay network edge allows cost-effective

connections between widely scattered LANs [4].

Page 49: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 5.12 Frame Relay.

5.11 DSL

Digital Subscriber Line (DSL) technology is a broadband technology that uses

existing twisted-pair telephone lines to transport high-bandwidth data to service subscribers.

DSL service is considered broadband, as opposed to the baseband service for typical LANs.

Broadband refers to a technique which uses multiple frequencies within the same physical

medium to transmit data. The term xDSL covers a number of similar yet competing forms of

DSL technologies:

1. Asymmetric DSL (ADSL)

2. Symmetric DSL (SDSL)

3. High Bit Rate DSL (HDSL)

4. ISDN (like) DSL (IDSL)

5. Consumer DSL (CDSL)

The two basic types of DSL technologies are asymmetric (ADSL) and symmetric (SDSL).

All forms of DSL service are categorized as ADSL or SDSL and there are several varieties of

each type.

Table 5.2: Download and Upload of DSL

Page 50: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

The different varieties of DSL provide different bandwidths, with capabilities

exceeding those of a T1 or E1 leased line. The transfer rates are dependent on the actual

length of the local loop and the type and condition of its cabling. For satisfactory service, the

loop must be less than 5.5 kilometers (3.5 miles). Generally, a subscriber cannot choose to

connect to the enterprise network directly, but must first connect to an Internet service

provider (ISP). From here, an IP connection is made through the Internet to the enterprise.

Thus, security risks are incurred. To address security concerns, DSL services provide

capabilities for using Virtual Private Network (VPN) connections located at the corporate site

[4].

Figure 5.13: DSL Technology

5.12 Cable Modem

Coaxial cable is widely used in urban areas to distribute television signals. Network

access is available from some cable television networks. This allows for greater bandwidth

than the conventional telephone local loop. Enhanced cable modems enable two-way, high-

speed data transmissions using the same coaxial lines that transmit cable television. Some

cable service providers are promising data speeds up to 6.5 times that of T1 leased lines. This

speed makes cable an attractive medium for transferring large amounts of digital information

quickly, including video clips, audio files, and large amounts of data. Information that would

take two minutes to download using ISDN BRI can be downloaded in two seconds through a

cable modem connection.

Page 51: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 5.14: Cable Modem.

5.13 WAN Design

5.13.1 WAN Communication

WANS are considered to be a set of data links connecting routers on LANs. User end

stations and servers on LANs exchange data. Routers pass data between networks across the

data links. Because of cost and legal reasons, a communications provider or a common carrier

normally owns the data links that make up a WAN. The links are made available to

subscribers for a fee and are used to interconnect LANs or connect to remote networks. WAN

data transfer speed (bandwidth) is considerably slower than the 100 Mbps that is common on

a LAN. The charges for link provision are the major cost element of a WAN and the design

must aim to provide maximum bandwidth at acceptable cost. Pressure to provide more

service access at higher speeds and management pressure to contain cost, determining the

optimal WAN configuration is not an easy task [4].

Page 52: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

Figure 5.15: Modern WAN.

5.13.2 Steps in WAN Design

Designing a WAN can be a challenging task, but approaching the design in a

systematic manner can lead to superior performance at a reduced cost. Many WANs have

evolved over time, therefore many of the guidelines discussed here may not have been

considered. Every time a modification to an existing WAN is considered, the steps in this

module should be followed. WAN modifications may arise from changes such as an

expansion in the enterprise the WAN serves, or accommodation of new work practices and

business methods. Enterprises install WAN connectivity because there is a need to move data

in a timely manner between external branches. In designing the WAN, it is necessary to know

what data traffic must be carried, its origin, and its destination. WANs carry a variety of

traffic types with varying requirements for bandwidth, latency, and jitter.

Table 5.3: Comparing WAN Traffic Types

For each pair of end points and for each traffic type, information is needed on the

various traffic characteristics. Determining this may involve extensive studies of and

Page 53: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

consultation with the network users. The design often involves upgrading, extending, or

modifying an existing WAN. Much of the data needed can come from existing network

management statistics. Knowing the various end points allows the selection of a topology or

layout for the WAN. [4].

Table 5.4: WAN Technology

CHAPTER 6

SERVER CONFIGURATION

6.1 Introduction

Here various types of servers configuration and what theirs functions are discussed.

They are DNS server, Web server, Mail server, Proxy server, FTP server and DHCP server.

6.2 DNS Server

The Domain name System (DNS) is a distributed Internet directory service. DNS is

used mostly to translate between domain names and IP addresses, it also control Internet

email delivery. Most Internet services rely on DNS to work, and if DNS fails, most of the

service fails, and the total operation stalls.

DNS converts machine manes into IP addresses that all machines on the net have. It

translates from name to the address and address to name, and some other things.

Page 54: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

A mapping is simply an association between two things, in this case a machine name,

like ftp.linux.org and the machine’s IP address (or address) 199.249.150.4. DNS also contain

the other way from the IP number to the machine name; this is called a “reverse mapping”.

A DNS server is also known as nameserver (NS). These servers come in three

varieties;

Master (also called primary)

Slave (also called secondary)

Caching [6]

6.2.1 Configuration of Caching only DNS

Caching DNS server stores most frequently information to reduce lookup overload of

subsequent queries. Setting up a caching DNS server is fairly straightforward and works

weather or not the ISP providers are static or dynamic Internet IP address. It works only to

translate IP address and name from other name server. All DNS server runs with checking

only name server facilities by default [6].

6.2.2 Configuration of Master DNS (Primary)

If any company wishes to run e-mail and website for registered domain then it needs

to an automotive name server. If they are running a broadband ISP, they are not running their

own e-mail and web, they just need authoritative name server. A caching nameserver is used

only as reference and regular nameservers are used as the authoritative source of

information. Edit “/etc/named.conf” files as follws

#/etc/named.conf

// generated by named-bootconf.pl

options {

directory "/var/named";

Page 55: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

* If there is a firewall between you and nameservers you want

* to talk to, you might need to uncomment the query-source

zone "." IN {

type hint;

file "named.ca";

};

zone "localhost" IN {

type master;

file "localhost.zone";

allow-update { none; };

};

zone "0.0.127.in-addr.arpa" IN {

type master;

file "named.local";

};

zone "sufi.com.bd" IN {

type master;

file "sufi.com.bd.zone";

allow-update { 203.91.147.4; };

};

zone "147.91.203.in-addr.arpa" IN {

Page 56: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

type master;

file "sufi.com.bd.rev";

allow-update { 203.91.147.4; };

}; [6].

6.2.3 Configuration of Slave DNS (Secondary)

Secondary DNS server backups a copy of primary name servers zone files. It can

resolve all queries like primary name server. It always transfer newly configured /edited zone

files of primary.

Install all required packages required for DNS. It needs to configure/etc/named.com file.

#etc/named.conf

// generated by named-bootconf.pl

options {

directory "/var/named";

query-source address * port 53;

};

zone "." IN {

type hint;

file "named.ca";

};

zone "sufi.com.bd" IN {

type slave;

file "sufi.com.bd.zone";

masters { 203.91.147.3 ; };

allow-update { 203.91.147.3; };

Page 57: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

};

zone "0.0.127.in-addr.arpa" IN {

type slave;

masters { 203.91.147.3 ; };

file "named.local";

allow-update { 203.91.147.3; };

};

zone "147.91.203.in-addr.arpa" IN {

type slave;

masters { 203.91.147.3 ; };

file "sufi.com.bd.rev";

allow-update { 203.91.147.3; };

};

Now restart the name service to reload the configuration

[root@nsl src] # killall named

[root@nsl src] # service name start [6].

6.3 Web Server

A web server satisfies web browsers query by sending web page. Web servers also

support some server side modules, which is required forward advanced operation.

Apache is the most popular web server on the Internet. The Apache HTTP Server

project is an effort to develop and maintain an open source HTTP server for modern

operating systems including UNIX and Windows NT [8].

6.3.1 Configuration of Web Server

Page 58: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

The main configuration file used by apache is “/etc/http/conf/ httpd.conf”. Some other

configuration file is ““/etc/httpd/conf.d/*”” [6].

6.3.2 Configuration of Virtual Host

Virtual host means hosting many wavesites in a single server.There are two type of

virtual hosting available, “Name Based” and “IP based”. Name based virtual hosting is the

most popular hosting because it reduce IP wastes. Virtual hosting works in a very sequential

procedure.As explained on the apache website: “When a request arrives, the server will first

check if it is using an IP address. That matches the NameVirtualHost. If it is, then it will look

at each <VirtualHost> section with a matching IP address and try to find one where

ServerName matches the requested hostname. If it finds one, then it uses the configuration for

that server. If no matching virtual host is found, then the first listed virtual host that matches

the IP address will be used” [6].

NameVirtualHost:

This directive specifics the web srver’s IP and port for Virtual web hosting. This is

usually web servers IP address. Port number is optional is sometime. NameVirtualhost

202.161.151.3: 80

<VietualHost>:

This section in the file tells Apache where it should look for web pages, used

on each we site. It contains log location also. It must be satisfied that the IP

address for which each <VirtualHost> section applied. The format of virtual hosting:

<VirtualHost 202.161.151.3>

Directives for site #1

</VirtualHost>

Examples of virtual hosting is given below:

#Virtual Host for Default Web

Page 59: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

<VirtualHost 203.91.147.3>

ServerAdmin [email protected]

DocumentRoot "/var/www/html

ServerName www.sufi.com.bd

ErrorLog logs/www.sufi.com.bd_log

TransferLog logs/www.sufi.com.bd.access

</VirtualHost>

#Virtual for Mail

<VirtualHost 203.91.147.3>

ServerAdmin [email protected]

DocumentRoot "/var/www/html/mail”

ServerName mail.sufi.com.bd

ErrorLog logs/mail.sufi.com.bd_log

TransferLog logs/mail.sufi.com.bd.access

</VirtualHost> [6].

6.4 Mail Server

Electronics e-mail is the most continent method in today’s communication. It is one of

the most important public service for an ISP. Every service provider need to provide facility

for sending and receiving mail for each other. Sendmail is an incredibly powerful mail

program. Sendmail is responsible for sending mail to a remote user’s mailbox and receiving

mail from them. Mail server mainly uses POP and SMTP service [8].

Configuration Sendmail by.mc Approach

/etc/mail/sendmail.cf is the main configuration file of sendmail daemon. There are

some other supported configurations files exist in the same directory. The files are

Page 60: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

combination of three types of architecture. The main configuration and few files are macro

files(m4). The “m4” command is generating macros according to “sendmail.me” files.

[root@mxlusr] # m4 /etc/mail/sendmail.mc >/etc/mail/sendmail.cf

[root@mxlusr] # service sendmail restart

When find the server being used to really mail for SPAM email sights. Configuring the

/etc/mail/access file will not stop SPAM is coming, only spam flowing through it [9].

Localhos.localdomain RELAY

localhost RELAY

127.0.0.1 RELAY

203.91.147.55 RELAY

202.161.151 RELAY

info.com.bd RELAY

6.5 Proxy Server

Proxy Server satisfies web browser’s query by sending requests web page. Proxy does

not main operations. First option is to reduce internet bandwidth charge. And the second

options is to limit web access to authorized user/pc. Proxy servers can dramatically improve

performance for groups of users. This is because it saves the results of all requests for a

certain amount of time. A case is considered where both user X and user Y can access the

World Wide Web through a proxy server. First user X requests a certain Web page, which is

called Page 1. Sometime later, user Y requests the same page. Instead of forwarding the

request to the Web server where Page 1 resides, which can be a time-consuming operation,

the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy

server is often on the same network as the user, this is a much faster operation. Real proxy

servers support hundreds or thousands of users. Proxy servers can also be used to filter

Page 61: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

requests. For example, a company may use a proxy server to prevent its employees from

accessing a specific set of Web sites.

Squid is a high performance proxy-caching server for web clients, supporting, FTP

data, gopher and HTTP data objects. Squid handle all requests in a single, non-blocking ,

I/O-driven process[6].

Configuring Squid

Configure it to run each time when systems boots

[root@proxy tmp] # rmp -Uvh squid-2.5.STABLE1-2.i368.rmp

[root@squid] # chkconfig squid on

The main configuration file is “ squid.conf”. This file is heavenly commented.

# TAG: http_port

# Usage: port

# hostname:port

# 1.2.3.4:port

# The socket addresses where Squid will listen for HTTP client

# requests. You may specify multiple socket addresses.

# There are three forms: port alone, hostname with port, and

# IP address with port. If you specify a hostname or IP

# address, then Squid binds the socket to that specific

# address. This replaces the old 'tcp_incoming_address'

# option. Most likely, you do not need to bind to a specific

# address, so you can use the port number alone.

# number listed here. That option will NOT override an IP

# address, however.

# You may specify multiple socket addresses on multiple lines.

Page 62: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

# If you run Squid on a dual-homed machine with an internal

# and an external interface then we recommend you to specify the

# internal address:port in http_port. This way Squid will only be

# visible on the internal address.

#Default:

http_port 8080 [6]

6.6 FTP Server

Nowadays it is essential to keep some important files like CV, Adders book, personal

profile in some place that would be available for everywhere in the world. It is possible

through the Internet. If any person transfers to large number/size of files over Internet, he

needs FTP. FTP is the most convenient for transferring private/public files. Private files can

be shared by username and password authentication. All ftp servers by default support this

method.

If any one wishes to share public files, he needs to autonomous FTP server. Sites that

need to exchange files with numerous unknown remote users use autonomous FTP.

Configuring vsftpd

Vfsed onlyreadsthe contentsof its /etc/vsftpd.comf or /etc/vsftpd/vsftpd.conf

configuration file when it starts. By default,VSFTP run as an anonymous FTP server. Any

remote user to log into his default FTP directory using a username of “ananoymous” and a

password that’s same as their email address .The configuration file’s anonymous_enable

instruction can be command out by using a “#” to disable this feature. By default, VSFTP

only allows anonymous FTP downloads to remote users, not uploads from them. Also by

default, VSFTP doesn’t allow remote users to create directories on the FTP server and it logs

FTP access to the /var/log/vsftpd.log log file.

Page 63: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

The configuration file is fairly straight forward. Remove/add the “# at the beginning

of the line to “activate/deactivate” the feather of each line[2].

## Example config file /etc/vsftpd.conf

#

# The default compiled in settings are very paranoid. This sample file

# loosens things up a bit, to make the ftp daemon more usable.

#

# Allow anonymous FTP?

# anonymous_enable=YES

#

# Uncomment this to allow local users to log in.

local_enable=YES

# Activate directory messages - messages given to remote users when they

# go into a certain directory.

dirmessage_enable=YES

#

# Activate logging of uploads/downloads.

xferlog_enable=YES

#

# Make sure PORT transfer connections originate from port 20 (ftp-data).

connect_from_port_20=YES

#

# You may override where the log file goes if you like. The default is shown

# below.

xferlog_file=/var/log/vsftpd.log [2].

6.7 DHCP Server

Page 64: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing

configuration information to the host on a TCP/IP network. DHCP consists of two

components: a protocol for delivering host-specific configuration parameters and a

mechanism for allocation of network address.

If any company has 100 computers and they need to assign regular all IP and other

parameters manually, it will become nightmare. They can solve it easily with DHCP Server.

DHCP can assign those 100 computers automatically. Nowadays DHCP server supports

many security features, which allows administrator to assign specific IP address specific host

[6].

Installing and configuring DHCPD

DHCP server and client are included into RedHat CD ROM .Install the .rmp.

Configure to run at boot time.

[root @dhcp usr] # rmp-Uvh dhcp-3.0pll-20.i386.rmp

[root @dhcp usr] # checkconfig dhcpd on

When DHCP starts, it reads the file the file/etc/dhcp/.conf. This file contains

configuration of DHCP server. Normally there is find a simple coppy of dhcpd.conf in the

“/user/share/doc/dhcp- <version-number>/” directory. Coppy it into /etc fplder as dhcpd.conf.

[root @dhcp usr] # cp /usr/share/doc/dhcp-

version/dhcpd.conf.sample /etc/dhcpd.conf

Here is a quick explation of the “dhcp.conf” file: Most importantly, there must be a

“subnet” section for each interface of the server.

subnet 192.168.1.0 netmask 255.255.255.0 {

  # The range of IP addresses the server will issue to clients

range 192.168.1.201 192.168.1.220;  # Set time in seconds that a client may keep the IP address

Page 65: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

default-lease-time 86400; max-lease-time 86400;  # Set the NTP server to be used by clients

Now restart “dhcpd” daemon to take effect. To restart DHCPD every time change to

the conf file.

[root@ dhcp usr] # /etc/init.d/dhcpd restart

Finally, always remember to set the PC to get its IP address via DHCP.

”/var/log/message” can be seen to find error and exception occurrencnce with DHCP [6].

CHAPTER 7

CONCLUSION

In this internship, a network of an ISP(Internet Service Provider) has been set up. An ISP

gives us Internet facilities, which help us to communicate with other network in the world.

In our country ICT sector growing vast for this, needs of an ISP is more essential to

improve this sector. At present Information Technology (IT) is a subject of widespread

interest in Bangladesh. A tremendous activity is going on in every sector including e-

commerce, e-governance, computer networking, Internet, web browsing, web applications,

multimedia product development etc. In this sense the project on ISP has been undertaken. In

this project switch and routers have also been configured. And different kinds of application

servers have also been configured under LINUX environment. It also has been shown that

how can an ISP give the client facilities and distribute services.

By doing this internship lot of experiences has been gathered. There many technical

problems have been faced and the corresponding solutions of these problems have been made

which extensively improve the knowledge and skill during this project. Finally it has been

learned by deploying the networking capabilities using LINUX how a corporate network can

be implemented which provides the best security and service.

Page 66: Monitoring And Maintenance Of Internet Services With Hardware And Software Configurations

REFERENCES

[1] http://en.wikipedia.org/wiki/History_of_the_Internet

[2] Behrouz A. Frouzan “Data Communication and Networking”,Third Edition, Tata

McGrawPublishing Company Limited (2004).

[3] CGS communication.

H # 43, R # 4A, Dhanmondi R/A, Dhaka-1209.

[4] www.cisco.netacat.net

[5] Abu Jafar Md. Masud Karim, “Internet and Intranet Connections in ISP”, B.Sc. Thesis,

Department of Electronics and Telecommunication Engineering, Daffodil International

University, June 2007.

[6] “Sufi Faruq Ibon Abubakar, “ISP Setup Manual”(First Edution), Sufi & Associates

Interworking Series, June 2005.

[7] Cisco “CCNA Cource Material” (Student Version 3.1)

[8] RedHat 7.3 Documentation provided by RedHat Inc.

[9] Top-Down Network Design, Priscilla Oppenheiment,Techmedia.

[10] http://linux.about.com