Basic IT Network-System
Basic IT Network-System
1) OSI Model
2) Transmission Media: Wired
3) Transmission Media: Wireless
4) LAN and WAN Overview
5) TCP/IP and Port numbers
AGENDA 2 (Lecture) 1Day
Transmission
Control Protocol
Internet Protocol
Logical Link Control
Media Access Control
Attenuation
Frequency
Structure and Component of Coaxial Cable
Coaxial Cable
Coaxial Structure
Example equipment relation with Coaxial cable
LAN-BNC Connector
N-Type TNC
Category of Coaxial
SMA MCX
Scenarios of Coaxial Cable
Terminating Resistor
Connector
Terminating Resistor
Connector
LAN: Bus Topology
WLAN, WiMax, Cellular
Ethernet/IEEE 802.3 Standard of Coaxial Cable
RG-58 RG-8
Parallel wires
Twisted Pair
Structure and Component of Twisted Pair
Twisted Pair = Separate insulate 4-pairs (8-wires)
= Twisted for reduce effect electromagnetic
UTP
(Unshielded Twisted Pair)
STP
(Shielded Twisted Pair)
UTP (Unshielded Twisted Pair)
CAT7
Scenarios of Twisted Pair
PNA-Bridge
Splitter
ISP
PSTN UTP UTP
Router
HUB/Switch
Billing Server
PBX
Power Line technology
Power line HomePlug standard, use existing power line
Use OFDM and FDM technique for extend bandwidth
Available Bandwidth
Multiple Carriers (Tones)
Amplitude
Frequency
Example equipment relation with Power line
USB
Ethernet
UTP
Power line-Bridge Billing Server
Structure and Component of Fiber Optic
Fiber Optic = Light Pulse, Impervious to EMI/RFI/Crosstalk
= Signal strength when long distance, Greater Bandwidth
= FO.x1pair to equal Copper x1,400pairs
MMF
MMF
SMF
Modular Plug for Fiber Optic
ST SC
FC
LC
MTRJ
Modular Jack for Fiber Optic
Hub/Switch Hub/Switch
Hub/Switch Patch panel
Patch panel Patch panel
Example category of Fiber Optic
Indoor area
Outdoor area
Scenarios of Fiber Optic
r e a N e tw o rk
i r e l e s s Lo c a lA
W
o r k
e tw
N
ork
WiFi or WLAN r ea
A
tw
a l
Ne
s on
er
rea
s P
dA
e l es
Wi r
an
db
roa
sB
es
rel
Wi
Bluetooth, IrDA, UWB, RFID
WiMAX, Cellular, Satellite
Comparison Wireless media technology
802.11 WLAN: OSI model
Application
Presentation
Session
Transport
Network
Logical Link Control (LLC)
Data Link Layer
Medium Access Control
(MAC)
802.11 Physical (PHY) Physical Layer
FHSS DSSS HR-DSSS IR OFDM PBCC CCK
Extremely Very Low Medium High Very Ultra Super Infrared Visible Ultra- X-Rays
Low Low High High High Light Violet
5 GHz
2.4-2.4835 GHz 325 MHz
902-928 MHz
83.5 MHz IEEE 802.11a/
26 MHz
IEEE 802.11b/g/ n draft
n draft U-NII Band
ISM Band 5 or 17 GHz
Older WLAN ETSI Hiperlan1,2
802.11 WLAN: Frequency Channel Plan @2.4GHz
802.11 WLAN: Frequency Channel Allocation @2.4GHz
1) non overlap run on 2.4GHz
2) Co-Ch. Interference
Available Bandwidth
Multiple Carriers (Tones)
DSSS
Amplitude
Frequency
OFDM
802.11 WLAN: Data Rate (Bandwidth)
GI (Grade Interval) = Period within OFDM symbol allow the next signal to transmitting across
the next symbol.
IEEE 802.11 WLAN: Standard Comparison
IEEE 802.11 WLAN: Topology
1) Ad-Hoc (Peer-to-Peer)
CSMA/CD
RTS (Request to Send) = All node must send request packet to all member
for send to destination.
CTS (Clear to Send) = All node must clear own packet to all member
for avoidance data
2) Roaming system
AP <---> Wireless Client
3) Automatic rate selection
< 30m.
< 100m.
Line of Sight
< 300m. @Antenna 2.12dBi
Omnidirectional
Point-to-Multipoint Directional
Point-to-Point
IEEE 802.11 WLAN: Solution design
CH.11 CH.6
CH.1
CH.6 CH.1
Wireless Roaming
CH.1 CH.1
Wireless Bridging (Point-to-Point)
CH.1 CH.1
CH.1
CH.1
CH.1
Wireless Point-to-Multipoint
CH.1
CH.1 CH.1
CH.1 CH.1
No or Not Connect
Name of Client
recemble AP?
Broadcast SSID Monitor cell site
Yes Hidden SSID Stop broadcast to security
END Careful Hack-Scan SSID
(Connecting Network)
MAC (Media Access Control) Filtering
The Media Access Control (MAC) address is a unique number assigned by the manufacturer to
any Ethernet networking device, Each AP has Access Control table on its can filter wireless client
START
No
Do you client wireless card
has burn into AP?
- E nable feature W E P at A P
- S elect num ber bit for secret key
- P ut P assphrase for plaintext
- S elect key for encryption
NOTE:
- Static IP, Scope of DHCP, Proxy, IP Filtering, Domain, IPS, IDS, NAC
- Existing/Old equipment, Backward compatible, Interoperation, Cost
Operation Type of WLAN
T-Connector
Terminating Resistor
Connector
Less cable to connect each PC (Loop) but high cost for FO.
Short distance and Difficult from cable when more PC
Unicast data (Frame only)
Basic LAN topology: Star
Unicast
Multicast
Broadcast
2) Media Access
DTE DTE
DCE DCE
WAN (Wide Area Network) Overview
LAN = Intranet
MAN = Extranet
WAN = Internet
Comparison LAN/MAN/WAN
Network Description Equipment
LAN Internal area & Private user Hub/Switch
Long distance for Internal area (<100m.)
Highest Bandwidth for Internal area
MAN Internetwork Link between Private-to-Private Hub/Switch
Extend distance for Internetwork Link (>1Km.) Router
Low Bandwidth for Internetwork Link Modem
WAN Internetwork Link between Private-to-Public Hub/Switch
Short distance for Internetwork Link (<10m.) Router
Lowest Bandwidth for Internetwork Link Modem
Transmission Facility of WAN
Circuit-Switched Packet-Switched
Dial up X.25
Leased Line Frame Relay
IxDSL ATM
Cable MPLS
Satellite
Metro LAN
Circuit-Switched
Fixed bandwidth, Permanent circuit, single-data, frame format
Packet-Switched (Frame)
Dynamic bandwidth, Virtual circuit, split data, frame format
Packet-Switched (Cell)
integrate data, Cells format
Transmission Technology
Transmission = node-to-node technology
Analog FDM (Frequency Division Multiplexing)
Digital TDM (Time Division Multiplexing) such as PDH, SONET/SDH
Lightwave WDM (Wave Division Multiplexing)
Transmission: Analog (FDM)
Send data with multiple frequency in same time
Transmission: Digital (TDM)
Send data with multiple time in same frequency
Transmission: LightWave (TDM)
Technology of WAN
Synchronous Leased Line or Dedicated circuit
Parameter:
username, password
encapsulation (PPP, HDLC)
authentication (PAP, CHAP)
Frame Relay
Parameter:
encapsulation Frame relay
bandwidth
LMI
DLCI
Leased Line: benefits
บริการสื่อสารระบบดิจิตอลความเร็วสูงตั้งแต 64 Kbps ถึง 2.048 Mbps ขึ้นไป
การเชื่อมตอการสงขอมูลระหวางสาขาแบบจุดตอจุด (Point to Point)
โดยเชื่อมโยงสัญญาณจากตนทางจุดหนึ่งไปยังปลายทางอีกจุดหนึ่ง
เหมาะสําหรับการสื่อสารขอมูลในปริมาณมาก และตอเนื่องตลอดเวลา
คาเชาสัญญาณสูง
ใช Layer2 Encapsulation = HDLC, PPP, SLIP
Down Up Down Up
Comparison xDSL technology
xDSL Downstream Upstream Distance Voice + Data
in same time
HDSL 2 Mbps Equal downstream < 3Km No
HDSL2 2 Mbps Equal downstream < 8Km No
(G.SHDSL)
SDSL 768 Kbps to 2 Mbps Equal downstream < 6Km No
IDSL 144 Kbps Equal downstream < 5Km Yes
(ISDN) (ISDN: BRI)
ADSL 128 Kbps to 8 Mbps 64 to 640 Kbps < 5Km Yes
G.lite 1.5 Mbps 640 Kbps < 5Km Yes
RADSL 128 Kbps to 8 Mbps 64 to 640 Kbps < 5Km Yes
VDSL 13 to 52 Mbps 1.5 to 6 Mbps < 1Km Yes
G.SHDSL (G Single-pair High-bit rate DSL)
Parameter:
username, password
isdn switch-type or isdn spid
encapsulation
authentication
dialer
routing
PRI (Primary Rate Interface)
Parameter:
username, password
isdn switch-type
controller (linecode, clock source, framing)
pri-group
dialer
routing
ADSL (Asymmetric DSL)
Application/Process
Transport/Host to Host
Network/Internetwork
Network Interface/Link
TCP/IP
TCP (Transmission Control Protocol)
Transport Layer, TCP Segment, Connection-Oriented by 3Ways handshake
Put SEQ (Sequence Number) and check ACK (Acknowledgement) for RX.
Retransmission by Error Recovery for Reliability
Check Window Size by Sliding Window
Control process, Manage buffer, Combine with IP to upper layer
IP (Internet Protocol)
Network Layer, Connectionless (Logical link) by Unreliable
Addressing for set up Logical address
Packaging for prepare IP header to mix TCP/UDP (datagram) by segment
Routing for search path to best effort
TCP/IP Layer suit
Application
Transport
Network
Link
Media
TCP (Transmission Control Protocol)
Manage-Control transfer data with reliable and guarantee
UDP (User Datagram Protocol)
Manage-Control transfer data without reliable and guarantee
IP (Internet Protocol)
Route with best effort for transfer data
ICMP (Internet Control Message Protocol)
Support IP and alert error message to IP
IGMP (Internet Group Management Protocol)
Send UDP datagram with multicast or broadcast to client
ARP (Address Reservation Protocol)
Convert IP Address MAC address
RARP (Reverse ARP)
Convert MAC Address IP Address
TCP Vs. UDP segment
3Ways Handshake
Windows Size
IP Datagram and Internet Address (IP Address)
IP Datagram
Multicast
Broadcast
ARP (Address Reservation Protocol)
and RARP (Reverse ARP)
ARP
RARP
Convert IP Address MAC address
1) Well-Know Ports
Below port number 1024, Using as standard port for application
2) Assign/Registered Ports
Above port number 1024, Using as special port such as Server, Trojan,
Vender-proprietary etc.
3) Reserved Ports
Rang port number 1-1023, Using for some OS such as Unix, Win NT
TCP/IP with Protocol Numbers
Protocol Name Assigned Number Description
IP 0 Internet Protocol
ICMP 1 Internet Control Message Protocol
TCP 6 Transmission Control Protocol
UDP 17 User Datagram Protocol
TCP/IP with Well-Know ports*
Service Name Port Number/Protocol Description
FTP-data 20/TCP File Transfer Protocol (data)
FTP 21/TCP File Transfer Protocol (control)
Telnet 23/TCP Remote tool
SMTP 25/TCP Simple Mail Transfer Protocol
(send Email)
Domain 53/UDP-TCP Domain Name Server
TFTP 69/UDP Trivial File Transfer
WWW-http 80/TCP World Wide Web HTTP
POP3 110/TCP Post Office Protocol-Version 3
(receive Email to client as retrieve)
* Postel, J. and Reynolds, J. RFC1700. “Assigned numbers.” October 1994.
Service Name Port Number/Protocol Description
NTP 123/UDP Network Time Protocol
IMAP4 143/TCP Internet Message Access Protocol
(receive mail to client as copy)
SNMP 161/UDP Simple Network Management Protocol
SNMP-Trap 162/UDP SNMP Trap (spy agent)
IPX 213/UDP IPX over IP
LDAP 389/TCP Lightweight Directory Access Protocol
(Database for AAA)
https 443/UDP-TCP World Wide Web HTTP Security
isakmp 500/UDP Internet Key Exchange
(Encription such as VPN)
Service Name Port Number/Protocol Description
Login 513/TCP Remote login
CMD 514/TCP Command Prompt Shell
Syslog 514/UDP Syslog
Ms-sql-s 1433/UDP-TCP Microsoft SQL Server
Ms-sql-m 1434/UDP-TCP Microsoft SQL Monitor
WINS 1512/UDP-TCP MS Windows Internet Name Service
L2TP 1701/UDP Layer Two Tunneling Protocol
PPTP 1723/TCP Point to Point Tunneling Protocol
Radius 1812/UDP RADIUS authentication protocol
Radacct 1813/UDP RADIUS accounting protocol
NFSD 2049/UDP NFS server (File server)
IP Address
and Subnet Planning
IP Address and Subnet
IP Address Host’s address for reference transfer between TX. and RX.
IPv.4 used 32bits (4nodes*8) in frame format for TCP/IP
Valid IP Address
Example Class B:
Subnet Mask 255.255.0.0 = 11111111.11111111.00000000.00000000
Wildcard Mask 0.0.255.255 = 00000000.00000000.11111111.11111111
Valid IP Address
With Subnet Address
Example Class C:
Host Address = 192.168.10.1 Subnet Mask = 255.255.255.192
Solve: Host Address = 11000000.10101000.00001010.00000001 AND-gate
Subnet Mask = 11111111.11111111.11111111.11000000
Public IP Address
Rang of IP Address Class of Network
1.0.0.0 to 126.0.0.0 A
128.1.0.0 to 191.254.0.0 B
192.0.1.0 to 223.255.254.0 C
Type of Firewall:
1) Packet Filtering Allow and Deny packet only!
Access List (ACL) Function of Router/Layer3
router(config)#access-list 11 deny 161.246.20.0 0.0.0.255
router(config)#access-list 11 permit any
router(config)#interface fastethernet1
router(config-if)#ip access-group 11 in
2) Stateful Inspection Tracking State table of data flow
format such as TCP, UDP, ICMP
Reassemble the data fragmentation
High speed firewall
3) Application Proxy Using Address Translation (NAT, PAT)
Working at Application Layer7
Target is Well know port/protocol
High Security
3 Zones
• Non-Trust = WAN/Internet
= Public user/Guest
• Trust = LAN and Private user
• DMZ = Public Server
Firewall: Characteristic
Software Firewall
Software + Server machine
Software + PC machine (Personal Firewall)
Major of Feature:
Mode of operation
Layer2 Transparent mode
Layer3 Route mode (NAT, PAT)
VPN
Site-to-Site
Remote to Site
Firewall: Access Rules
Private Addressing
- Personal IP address for using within LAN/Intranet only
- Cannot route via WAN/Internet
Public Addressing
- Public IP address (Real IP address) for using communicate between
WAN/Internet area
- Can route across Network Address
Type of NAT’s Operation:
1) Static NAT (Static assignment and basic NAT)
- Matching Private IP and Public IP as One-to-One address
- Separate service by fixed IP address
- Consumption for Public IP!!
2) Dynamic NAT (Dynamic assignment and basic NAT)
- Dynamic/Random for Private IP and Public IP as Many-to-Many address
- Protect from Outbound or Outside
- Limit concurrent session to Outbound or Outside
3) Overloading NAT (NAPT: Network Address Port Translation)
- Dynamic/Random or Fixed for Private IP and Public IP to communicate
- Using Know-port (TCP/UDP/ICMP) for application service (WEB/FTP)
- Save public IP, Reference at port service
- Overloading NAT know well as PAT or NAT/PAT
4) Overlapping NAT (Twice-NAT)
- Client & Server on difference location and using Private IP same broadcast ID
- Double NAT by 1st NAT from Private IP to Private IP then 2nd NAT from
Private IP to Public IP
Basic security: QoS (Quality of Service)
QoS = Service to Voice/Video/Data application
= Management Bandwidth/Delay & Jitter/Packet Loss
= SLA (Service Level Agreement) as Guarantee BW.
Levels of QoS:
Integrated Service Bandwidth in first (end-to-end guarantee)
such as Voice, Video, Data (all important)
Differentiated Service Priority (Delay & Jitter) in first (Ingress
guarantee) such as first-serve Voice
last-serve Internet
Best-Effort Service Packet Loss in first (No guarantee)
such as WWW, FTP, E-mail
QoS Characteristic: Bandwidth
QoS Tool Affectation
Compression Compress (TX) and Uncompress (RX) data
Header, Payload, Header and Payload
CAC Protect concurrent for Voice & Video call
(Call Admission Control)
Queuing Reserve minimum bandwidth by type of packet
PQ (Priority Queuing)
Link Fragmentation method:
LFI (Link Fragmentation and Interleave)
Traffic Shaping method:
FRTS (Frame Relay Traffic Shaping )
RED (Congest Avoidance) method:
WRED (Weighted Random Early Detection)
Basic security: IDS/IPS
IDS (Intrusion Detection System)
= Detect after income to LAN network, Passive system
= IDS cannot analysis encryption packet
VPN
Site to Site
Remote Access - Intranet VPN
- Access VPN - Extranet VPN
VPN: Advantage
Working via Internet to LAN-Office
Remote Admin to Public server
Using legacy system with plain text such as Bank, Hospital, Insurance etc.
Protect sniff within LAN-Office (encryption data)
Special for TCP/IP protocol between IP network (NetBios/IPX/SNA are limit)
VPN: Authentication
Password based Authentication
Certificate based Authentication
(Exchange certificate)
Authentication Method:
PAP = Password Authentication Protocol
CHAP = Challenge-handshake Authentication Protocol
EAP = Extensible Authentication Protocol
PEAP = Protected Extensible Authentication Protocol
Authorization Method:
1) User/ACL
2) Account Group/ACL
3) Account Group/Resource Group
4) Role-based
Accounting Method:
1) none
2) start-stop
3) stop-only
4) wait-start
Radius Server Return Messages
Access Reject
Access Challenge
Access Accept
Radius Server
Use port 1812 for authentication
Use port 1813 for accounting
file or database
EAP-MD5 LEAP EAP-TLS EAP-TTLS
Authentication: EAP-Methods
IEEE 802.1X port-based authentication system layering
Message Flows between Supplicant <--> Authentication
and Authentication <--> Authentication Server
Example RADIUS for WLAN
2
1
3 Authentication
Supplicant Authenticator
Server
5
6
NAC = Network Access Control or Network Admission Control
Detect :Detect & identificat new devices connect network
check AntiVirus, Spyware, Personal FW, Patch OS
put to Quarantine area (clean and last update all)
Authenticate :Authenticat of users and devices
Assess :Assess end systems compliance & vulnerable
Authorize :Authorize use network by authenticate & assess
to Production area (separate by policy)
Monitor :Monitor users & devices once connect network
Contain :Quarantine problem end systems & user
Remediate :Remediation problems with end system & user
Technique method for Authentication end system and/or users
1) 802.1X port based authentication (via RADIUS)
2) MAC based authentication (via RADIUS)
3) Web based authentication
4) Static port/MAC configuration
5) Dynamic port/MAC configuration (SNMP)
6) Kerberos snooping
Example NAC in Scenario: Wired LAN
VLAN=Quarantine
VLAN=Production
Example NAC in Scenario: Wireless LAN
VLAN=Quarantine
VLAN=Production
Example NAC in Scenario: Remote VPN client
Basic security: NMS (Network Management System)
NMS for Wired (Switch/Router), WLAN, FW, NAC-IPS, DHCP, Log, Storage…
1) Centralization management (console all devices)
2) Monitoring management (Status/Alive/Physical Layer)
3) Configuration management (Setup/Deploy/Backup/Restore)
4) Provisioning management (TFTP server by policy/configuration)
5) Fault management (Alert/Notification any Alarm)
6) Log management (Keep/Show detail of any events)
7) Utilization management (Summary traffic/performance/billing)
8) Reporter management (Summary graph/text in many time)
Vender Example:
HP-OpenView, Cisco-Works, 3COM-Transcend, Nortel-Optivity
Enterasys-NetSight, SUN-Net manager, H3C-iMC
Example NMS in Scenario: management for Switch-Router
Storage System Overview
Storage System
Storage System = Keep & Maintains Data
= Hardware for Backup & Redundant Data
= Software for Backup & Restore Data
HDD Technology
Parallel Serial
- PATA/IDE /ATA - SATA
- SCSI - SAS, FC
IDE (Integrated Drive Electronics)
ATA (Advanced Technology Attachment)
PATA (Parallel ATA)
Attached Cable
Parallel, Serial, USB, IEEE1394 (FireWire), eSATA, Fiber Optic
Bus Controller
ISA, PCI, RAID controller, Bus Host Adapter
NAS (Network Attach Storage)
LAN Cable
Twisted Pair, Fiber Optic
Bus Controller
LAN Card, NIC Card
SAN (Storage Attach Network)
Tape Backup
Disk-Based backup
-RAID
-Redundant & HotSwap
-Max. disk up to 504Drive (mix SATA/FC)
-Max. capacity up to 504TB
Software for Backup & Restore
Vender Example:
Symantec-Backup Exec, CA-ARCserve, IBM-Tivoli, EMC-AlphaStor
IEEE 1394
(FireWire/i-Link/Lynx)
eSATA
Interface Data Transfer
USB 1.1 12Mbps
USB 2.0 480Mbps
USB 3.0 4,800Mbps
IEEE 1394 a 98/196/393Mbps
IEEE 1394 b 786/1,573Mbps
eSATA 2,400Mbps
Operation System Overview
Operating System
OS : Manage resource for each application running on computer
Basic OS Features
- User interface
- Control devices
- Resource management
NOS : Manage communication to network and network resource
- Netware 6.5
Unix
- Sun Solaris
- IBM AIX
- HP-UX
Linux
Creator : Microsoft
Processor supported : Intel, AMD
Computer achitecture supported : x86,x86-64,IA-64
File system supported : NTFS,FAT
Kernel type : Hybrid
Package management : MSI, custom installers
Update management : Windows update
Native API : Win32, NT API
Resource access control : ACLs, Priveleges, RBAC
Integrated firewall : Windows Firewall,IP sec, TCP/IP Filtering
Encrypted file system : Yes
Versions : Windows NT, Windows 2000 Server, Windows 2003 Server, Windows 2008 Server
(Latest version)
Directory Service : Actives Directory Service
Multiprocessing : 8 CPU
Cluster Nodes : 16 Nodes
Maximum Memory : 64 GB
Max file system size : 2 TB
Sun Solaris
Technical Information
Creator : Sun
Processor supported : Sparc, Intel, AMD
Computer achitecture supported : x86,x86-64,Sparc
File system supported : NFS, ZFS
Kernel type : Monolithic with modules
Package management : SysV package (pkg)
Update management : Sun connection
Native API : SysV, POSIX, GTK
Resource access control : Unix, RBAC, ACLs, Privileges, Trusted Extension
Integrated firewall : IP filter, JASS
Encrypted file system : Yes
Versions : Solaris 8, Solaris 9, Solaris 10 (Latest version)
Directory Service : Sun Directory Service
Multiprocessing : 64 CPU
Cluster Nodes : 4 Nodes
Maximum Memory : 64 GB
Max file system size : 4 TB
Redhat Enterprise Linux
Technical Information
Creator : Linus Torvald, Redhat
Processor supported : Sparc, Intel, AMD, Alpha, PowerPC
Computer achitecture supported : x86,x86-64,Sparc,Alpha,PPC
File system supported : ext2, ext3, ReiserFS
Kernel type : Monolithic with modules
Package management : rpm
Update management : yum, apt-get
Native API : POSIX, LSB, GTK
Resource access control : Unix, ACLs, MAC
Integrated firewall : Net Filter, IPtables
Encrypted file system : Yes
Versions : Redhat Enterprise AS, Redhat Enterprise ES
Directory Service : Open LDAP
Multiprocessing : 8 CPU
Cluster Nodes : 16 Nodes
Maximum Memory : 4 GB
Max file system size : 4 TB
Server System in scenario
DNS
FTP WEB
NOS
E-Mail DHCP
Domain Name System(DNS)
Hierachichal naming for computers, services, or any resource participating in the Internet
DNS serves as the “phone book” for the Internet by translating human-friendly hostnames into
IP addresses.
Parts of Domain Name System
DNS Structure
Root Domain
Top-Level Domain
Second-Level Domain
Redundancy
Distribution
Load Balancing
Inverse
Zone
Forward Lookup zone
Reverse Lookup zone
A
PTR
CNAME
MX
Dynamic Host Configuration Protocol (DHCP)
Provide comprehensive TCP/IP configuration data, allow hosts to obtain TCP/IP data
from server and adds dynamic address assignment.
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK/DHCPNAK
Web Server
A computer program that is responsible for accepting HTTP requests from web clients,
which are known as web browsers, and serving them HTTP responses along with optional
data contents, which usually are web pages such as HTML documents and linked objects
(images, etc).
Common features
HTTP
Logging
Authentication
Contents compression
Virtual hosting
Bandwidth throtting
POST
PUT
DELETE
TRACE
OPTIONS
CONNECT
Web site
Vendor Product Percent
hosted
FTP server open dynamic port and sends IP address and port to connection to Clients,
in this mode clients use PASV command to FTP server.
Basic Networking Design
Hierarchical Design