Computer Networking Definitions

Embed Size (px)

Citation preview

  • 8/13/2019 Computer Networking Definitions

    1/29

    Unicast: unicast packets are sent from host to host. The communication is from a single host to another

    single host. There Is one device transmitting a message destined for one receiver.

    Broadcast: Broadcast is when a single device is transmitting a message to all other devices in a given

    address range. This broadcast could reach all hosts on the subnet, all subnets, or all hosts on all subnets

    Broadcast packets have the host (and/or subnet) portion of the address set to all ones. By design, mostmodern routers will block IP broadcast traffic and restrict it to the local subnet.

    Multicast: Multicast is a special protocol for use with IP. Multicast enables a single device to

    communicate with a specific set of hosts, not defined by any standard IP address and mask combination.

    This allows for communication that resembles a conference call. Anyone from anywhere can join the

    conference, and everyone at the conference hears what the speaker has to say. The speakers message

    isnt broadcasted everywhere, but only to those in the conference hall itself. A special ser of addresses is

    used for multicast communication.

    Website:http://www.linfo.org/time-to-live.html

    Time-to-live Definition

    The time-to-live(TTL) is the number ofhopsthat apacketis permitted totravel before being discarded by a router.

    A packet is the fundamental unit of information transport in all modern

    computernetworks,and increasingly in other communications networks as

    well. A router is a network layerelectronic device and/or software that

    connects at least two networks, such as twoLANs(local area networks)

    orWANs(wide area networks), and forwards packets between them. A hop

    is the trip that a packet takes from one router to another as it traverses a

    network on the way to its destination.

    The TTL is set in an eightbinarydigit field in the packet header by the

    sendinghostand is used to prevent packets from endlessly circulating on the

    Internet or other network. When forwarding an IP packet, routers are

    required to decrease the TTL by at least one. If a packet's TTL field reached

    zero, the router detecting it discards the packet and sends anICMP(Internet

    http://www.linfo.org/time-to-live.htmlhttp://www.linfo.org/time-to-live.htmlhttp://www.linfo.org/time-to-live.htmlhttp://www.linfo.org/hop.htmlhttp://www.linfo.org/hop.htmlhttp://www.linfo.org/hop.htmlhttp://www.linfo.org/packet.htmlhttp://www.linfo.org/packet.htmlhttp://www.linfo.org/packet.htmlhttp://www.linfo.org/network.htmlhttp://www.linfo.org/network.htmlhttp://www.linfo.org/network.htmlhttp://www.linfo.org/lan.htmlhttp://www.linfo.org/lan.htmlhttp://www.linfo.org/wan.htmlhttp://www.linfo.org/wan.htmlhttp://www.linfo.org/wan.htmlhttp://www.linfo.org/binary.htmlhttp://www.linfo.org/binary.htmlhttp://www.linfo.org/binary.htmlhttp://www.linfo.org/host.htmlhttp://www.linfo.org/host.htmlhttp://www.linfo.org/host.htmlhttp://www.linfo.org/icmp.htmlhttp://www.linfo.org/icmp.htmlhttp://www.linfo.org/icmp.htmlhttp://www.linfo.org/icmp.htmlhttp://www.linfo.org/host.htmlhttp://www.linfo.org/binary.htmlhttp://www.linfo.org/wan.htmlhttp://www.linfo.org/lan.htmlhttp://www.linfo.org/network.htmlhttp://www.linfo.org/packet.htmlhttp://www.linfo.org/hop.htmlhttp://www.linfo.org/time-to-live.html
  • 8/13/2019 Computer Networking Definitions

    2/29

    control message protocol) message back to the originating host.

    Thepingand the tracerouteutilities both make use of the TTL. The latter

    intentionally sends packets with low TTL values so that they will be

    discarded by each successive router in the destination path. The time

    between sending a packet and receiving the ICMP message that it was

    discarded is used to calculate the travel time for each successive hop.

    A specific TTL number can indicate the maximum range for a packet. For

    example, zero restricts it to the same host, one to the same subnet, 32 to the

    same site, 64 to the same region and 128 to the same continent; 255 is

    unrestricted.

    Website:https://learningnetwork.cisco.com/thread/34420#178065

    Classful vs Classless network

    Classful is based on the default Class A, B or C networks.

    - Class A: 0 - 127 with a mask of 255.0.0.0 (/8)

    - Class B: 128 - 191 with a mask of 255.255.0.0 (/16)- Class C: 192 - 223 with a mask of 255.255.255.0 (/24)

    All devices in the same routing domain must use the same subnet mask. Since routers running a

    classful routing protocol do not include subnet mask information with routing updates, the routerassumes either its own subnet mask, or defaults to the classful subnet mask.

    Classless on the other hand, allows the use of variable length subnet masks, or VLSM, becausesubnet mask information is included with routing updates. You can have a mixture of different

    subnet masks in the same routing domain:

    - 10.1.0.0/19

    - 10.2.0.0/20- 172.16.8.0/21

    - 172.16.16.0/24

    Website: http://www.cs.rutgers.edu/~pxk/352/notes/autonomous_systems.html

    http://www.linfo.org/ping.htmlhttp://www.linfo.org/ping.htmlhttp://www.linfo.org/ping.htmlhttps://learningnetwork.cisco.com/thread/34420#178065https://learningnetwork.cisco.com/thread/34420#178065https://learningnetwork.cisco.com/thread/34420#178065https://learningnetwork.cisco.com/thread/34420#178065http://www.cs.rutgers.edu/~pxk/352/notes/autonomous_systems.htmlhttp://www.cs.rutgers.edu/~pxk/352/notes/autonomous_systems.htmlhttp://www.cs.rutgers.edu/~pxk/352/notes/autonomous_systems.htmlhttps://learningnetwork.cisco.com/thread/34420#178065https://learningnetwork.cisco.com/thread/34420#178065http://www.linfo.org/ping.html
  • 8/13/2019 Computer Networking Definitions

    3/29

    Autonomous SystemsAnAutonomous System(AS) is a collection of routers whose prefixes and routing policies are under common

    administrative control. This could be a network service provider, a large company, a university, a division of a

    company, or a group of companies. The AS represents a connected group of one or more blocks of IP addresses

    (called IP prefixes) that have been assigned to that organization and provides a single routing policy to systems

    outside the AS. Autonomous Systems create a two-level hierarchy for routing in the Internet. Routing between

    Autonomous Systems (inter-AS routing) is external to the AS allows one AS to send traffic to another AS. An IP prefix

    is a group of IP addresses expressed in CIDR form (i.e., address/bits, such as 128.6.0.0/16). Note that most

    organizations do not interconect via autonomous systems but simply connect via a single ISP.

    Routers within an AS use an Interior Gateway Protocol(IGP), which handles routing between nodes inside the AS.

    Common interior gateway protocols include RIP, OSPF, IS-IS, EIGRP, as well as some proprietary protocols such as

    IGRP. Routing within an Autonomous System (intra-AS routing) is internal to that AS and invisible to those outside it.

    The AS administrator decides what routing algorithm should run within it.

    To get traffic from a host in one AS to a host in another AS, the autonomous systems need to be connected. Most

    ASes do not share a direct link with each other, in which case data traffic may be routed through the networks of

    other ASes that agree to carry the traffic. An Exterior Gateway Protocol(EGP) is a routing protocol that handles

    routing between Autonomous Systems (inter-AS routing). BGP version 4, the Border Gateway Protocol, is the de

    facto standard EGP for inter-AS routing. At some point in the future, the Internet is expected to adopt IDRP, the OSI

    Inter-Domain Routing protocol.

    Inter-AS Routing

    Figure 1. Inter-AS routing

    A routing policy defines how routing information is exchanged between the ASes. For example, suppose two ASes,

    ASx and ASy, are connected to each other via a link between two gateway routers. Suppose that ASx knows how to

    reach some network, NET1, that is defined by an IP prefix. This network may be within ASx or may be external to it.

    Suppose that ASy knows how to reach some other network, NET2.

    For systems on NET1 to be able to send messages to systems on NET2, and vice versa, traffic will need to flow

    between ASx and ASy. This means that ASx needs to announce to ASy that it has a route to NET1 and ASy needsto announce to ASx that it has a route to NET2. The exterior gateway protocol is used to do this. ASx and ASy can

    then decide whether to accept this information or discard it (if, for example, they have better routes to those

    networks).

    Website: http://packetlife.net/blog/2008/jun/19/ospf-network-types/

    http://packetlife.net/blog/2008/jun/19/ospf-network-types/http://packetlife.net/blog/2008/jun/19/ospf-network-types/http://packetlife.net/blog/2008/jun/19/ospf-network-types/
  • 8/13/2019 Computer Networking Definitions

    4/29

    OSPF network typesBystretch| Thursday, June 19, 2008 at 3:38 a.m. UTC

    Having worked almost exclusively with Ethernet transport my whole career, it took me a while to really

    grasp the concept of non-broadcast networks. Dynamic routing protocols, particularly OSPF, demand

    familiarity with all sorts of layer two topologies, so I knew I had to better educate myself on the matter.

    Fortunately, working withDynamipsand virtual frame relay networks provided the experience I needed to

    feel comfortable implementing all the different OSPF network types.

    OSPF addresses three classes of network (as listed in section 1.2 ofRFC 2328): point-to-point,

    broadcast, and non-broadcast.

    Point-to-Point

    This is by far the simplest network type, and serves as a convenient anchor from which to advance the

    discussion. A point-to-point network is, as its name aptly describes, a link between exactly two points (or

    routers). A packet sent from on of the routers will always have exactly one recipient on the local link.

    Broadcast

    Obviously, point-to-point links don't scale well. A much more efficient manner of connecting a large

    number of devices is to implement a multiaccesssegment; that is, a segment which can be accessed by

    multiple end points. An Ethernet segment is an example of such a network.

    Ethernet networks support broadcasts; a single packet transmitted by a device can be multiplied by the

    medium (in this case an Ethernet switch) so that every other end point receives a copy. This isadvantageous not only in bandwidth savings, but also in facilitating automatic neighbor discovery.

    In the example pictured above, R1 can multicast (a broadcast intended only for certain recipients) an

    OSPF hello message to the link, knowing that all other OSPF routers connected to the link will receive it

    and reply with their own multicast message. Consequently, neighbors can quickly identify each other and

    form adjacencies without knowing addresses beforehand. Isn't that convenient?

    http://packetlife.net/blog/2008/jun/19/ospf-network-types/http://packetlife.net/users/stretch/http://packetlife.net/users/stretch/http://packetlife.net/users/stretch/http://www.ipflow.utc.fr/index.php/Cisco_7200_Simulatorhttp://www.ipflow.utc.fr/index.php/Cisco_7200_Simulatorhttp://www.ipflow.utc.fr/index.php/Cisco_7200_Simulatorhttp://www.faqs.org/rfcs/rfc2328.htmlhttp://www.faqs.org/rfcs/rfc2328.htmlhttp://www.faqs.org/rfcs/rfc2328.htmlhttp://www.faqs.org/rfcs/rfc2328.htmlhttp://www.ipflow.utc.fr/index.php/Cisco_7200_Simulatorhttp://packetlife.net/users/stretch/http://packetlife.net/blog/2008/jun/19/ospf-network-types/
  • 8/13/2019 Computer Networking Definitions

    5/29

    OSPF routers on a multiaccess segment will elect a designated router (DR) and backup designated

    router (BDR) with which all non-designated routers will form an adjacency. This is to ensure that the

    number of adjacencies maintained does not grow too large; a segment containing ten routers would

    require 45 adjacencies to form a mesh, but only 17 when a DR and BDR are in place.

    Non-Broadcast

    Unfortunately, not all multiaccess technologies support broadcast transmissions. Frame relay and ATM

    are probably the most common examples of non-broadcast transport, requiring individual permanent

    virtual circuits (PVCs) to be configured between end points.

    Notice in the frame relay topology pictured above, R1 must craft and transmit an individual packet for

    every destination he wants to reach. Aside from being horribly inefficient with regard to bandwidth, this

    limitation requires the router to know the addresses of his neighbors before he can communicate to them.

    OSPF can operate in one of two modes across a non-broadcast network: non-broadcast multi-access

    (NBMA) or point-to-multipoint. Each of these topologies tackles the absence of broadcast capability from

    a different direction.

    Non-Broadcast Mul t i -Access (NBMA)

    An NBMA segment emulates the function of a broadcast network. Every router on the segment must be

    configured with the IP address of each of its neighbors. OSPF hello packets are then individually

    transmitted as unicast packets to each adjacent neighbor.

    As in a true broadcast network, a DR and BDR are elected to limit the number of adjacencies formed.

    Point-to-Mult ipoint

    A point-to-multipoint configuration approaches the non-broadcast limitation in a different manner. Rather

    than trying to emulate broadcast capability, it seeks to organize the PVCs into a collection of point-to-

    point networks. Hello packets must still be replicated and transmitted individually to each neighbor, but

    the multipoint approach offers two distinct advantages: no DR/BDR is needed, and the emulated point-to-

    point links can occupy a common subnet.

    All routers attached to a non-broadcast network must be manually configured to recognize it as a point-to-

    multipoint segment:

  • 8/13/2019 Computer Networking Definitions

    6/29

    Router(config-if)# ip ospf network point-to-multipoint [non-broadcast]

    The non-broadcastparameter can be appended to the OSPF network type to force unicasting of

    packets rather than relying on multicast. This might be necessary when dynamic circuits are in use.

    Website: http://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-

    switch.htm

    Functions of a Network Switch

    Three basic functions of a switch are Learning, Forwarding and Preventing Layer 2 Loops.

    Learning

    Learning is the process of obtaining theMAC addressof connected devices. When a frame reaches into the

    port of a switch, the switch reads the MAC address of the source device from frame and compares it to itsMAC address table (also known as CAM (Content Addressable Memory) table). If the switch cannot find a

    corresponding entry inMAC addresstable, the switch will add the address to the table with the port numbervia theframearrived.

    If the MAC address is already available in the MAC address table, the switch compares the incoming portwith the port already available in the MAC table. If the port numbers are different, the switch updates theMAC address table new port number. This will normally happen when network administrators remove the

    cable from one port and attach it to another port.

    Whenever switch updates an entry in the MAC address table, the switch resets the timer for that entry.Timers are used in aging process of old entries. Aging helps to remove old entries and free memory of MAC

    address table to add new entries.

    Forwarding

    Forwarding is the process of passing network traffic a device connected to one port of a Network Switch to

    another device connected to another port on the switch. When a Layer 2 frame reaches a port on theNetwork Switch the switch reads the source MAC address of the frame as a part of learning function, and it

    also reads the destination MAC address also as a part of forwarding function. The destination MAC address isimportant to determine the port number which the destination device is connected.

    If the destination MAC address is found on the MAC address table, the switch forwards the frame via thecorresponding port of the MAC address.

    If the destination MAC address is not found on the MAC address table, the switch forwards the framethrough all its ports except the source port. This is known as flooding. Normally flooding happens when the

    network switch is starting up. Flooding prevents loss of traffic when the switch is learning. When thedestination device receives the frame and sends a reply frame to the source device, the switch reads the

    MAC address of the destination device and adds it to the MAC address table, which is the function of learningprocess.

    http://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-switch.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-switch.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-switch.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/network-access-layer.htmhttp://www.omnisecu.com/tcpip/network-access-layer.htmhttp://www.omnisecu.com/tcpip/network-access-layer.htmhttp://www.omnisecu.com/tcpip/network-access-layer.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-switch.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-switch.htm
  • 8/13/2019 Computer Networking Definitions

    7/29

    If the source MAC address is same as the destination MAC address, the switch will drop the frame. This isknown as filtering. This will normally happen if there is a hub connected to a port of the switch, and both the

    source device and destination device are connected to the hub.

    Preventing Layer 2 Switching Loops

    In practical Local Area Networking, redundant links are created to avoid complete network failure in anevent of failure in one link. Redundant links can causelayer 2 switching loopsandbroadcast storms.It is the

    function of a network switch to prevent layer 2 switching loops and broadcast storms.

    Website: http://www.dummies.com/how-to/content/spanning-tree-protocol-stp-and-portfast.html

    Spanning Tree Protocol (STP) and PortFastByEdward TetzfromCisco Networking All-in-One For Dummies

    The time Spanning Tree Protocol (STP) takes to transition ports over to the Forwarding state can cause

    problems. PortFastis a Cisco network function which can be configured to resolve this problem.

    This factor of time is not an issue for many people, but it can cause problems for some. For example, if you power up

    my computer in the morning, power goes to the network card immediately, and the port on the switch enters the

    Listening state.

    By the time the OS wants to start up the network card drivers and get an address from DHCP, the port on the switch

    is in Forwarding state, which works well most of the time.

    If, however, you had unplugged the NIC on the laptop to move it to another desk, Windows will tell you that it has a

    problem communicating on the network. Why? The NIC connected to the port changed the link state of the port to Up,

    Windows immediately tried to get a DHCP address, but the port is not yet in a Forwarding state.

    This is a common problem when using STP on your network. In a few more seconds, Windows will attempt to get an

    IP address again, and it will succeed.

    The other time you may see this issue is with Pre-Boot Execution (PXE) devices, such as Windows Deployment

    Services. The following figure shows a typical PXE implementation. Here is what happens with PXE:

    You apply power to your computer, which activates the NIC, but less than five seconds later, the computers POST

    finishes and the NIC attempts to get an IP address from DHCP so that it can load a boot image directly from the PXE

    server, which fails.

    The computer attempts to get an IP address from a DHCP server several times within approximately 10 seconds,

    after which it gives up and moves onto another boot device, such as the hard drive. The unfortunate part of this

    process is that because it fails to get an IP address or connect with the PXE server, you are not able to install your

    new operating system image on that computer.

    The problem with this scenario is that because STP makes the computer wait 45 seconds prior to forwarding traffic

    on the port, the PXE network boot has timed out.

    http://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-layer-2-switching-loop.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-layer-2-switching-loop.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-layer-2-switching-loop.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-broadcast-storm.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-broadcast-storm.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-broadcast-storm.htmhttp://www.dummies.com/how-to/content/spanning-tree-protocol-stp-and-portfast.htmlhttp://www.dummies.com/how-to/content/spanning-tree-protocol-stp-and-portfast.htmlhttp://www.dummies.com/search.html?query=Edward+Tetzhttp://www.dummies.com/search.html?query=Edward+Tetzhttp://www.dummies.com/search.html?query=Edward+Tetzhttp://www.dummies.com/store/product/Cisco-Networking-All-in-One-For-Dummies.productCd-0470945583.htmlhttp://www.dummies.com/store/product/Cisco-Networking-All-in-One-For-Dummies.productCd-0470945583.htmlhttp://www.dummies.com/store/product/Cisco-Networking-All-in-One-For-Dummies.productCd-0470945583.htmlhttp://www.dummies.com/store/product/Cisco-Networking-All-in-One-For-Dummies.productCd-0470945583.htmlhttp://www.dummies.com/search.html?query=Edward+Tetzhttp://www.dummies.com/how-to/content/spanning-tree-protocol-stp-and-portfast.htmlhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-broadcast-storm.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-layer-2-switching-loop.htm
  • 8/13/2019 Computer Networking Definitions

    8/29

    PortFast is the solution to this problem of delays when client computers are connecting to switches. PortFast is not

    enabled by default. With PortFast enabled on a port, you effectively take the port and tell spanning tree not to

    implement STP on that port.

    This solution is not a bad one if only one computer is plugged into the port so that people will not be creating

    accidental loops on the network, which can be frighteningly easy to do.

    Setting PortFast on all ports

    While there may be some ports you want to exclude from the PortFast configuration, if you want most ports to use

    PortFast you make that default setting. To set PortFast on all ports from Global Configuration mode, use the

    command spanning-tree portfast default:

    Switch2> enable

    Switch2# configure terminal

    Switch2(config)#spanning-tree portfast ?

    bpdufilter Enable portfast bdpu filter on this switch

    bpduguard Enable portfast bpdu guard on this switch

    default Enable portfast by default on all access ports

    Setting PortFast on specific ports

    You can also implement PortFast on specific ports, as illustrated here, where the following command enables

    PortFast for FastEthernet ports 1 through 10. Notice the big warning about the dangers of PortFast.

    Switch2#configure terminal

    Enter configuration commands, one per line. End with CNTL/Z.

    Switch2(config)#interface range

    Switch2(config)#interface range fastEthernet 0/1 -10

  • 8/13/2019 Computer Networking Definitions

    9/29

    Switch2(config-if-range)#spanning-tree portfast

    %Warning: portfast should only be enabled on ports connected to a single

    host. Connecting hubs, concentrators, switches, bridges, etc... to this

    interface when portfast is enabled, can cause temporary bridging loops.

    Use with CAUTION

    %Portfast will be configured in 10 interfaces due to the range command

    but will only have effect when the interfaces are in a non-trunking mode.

    Switch2(config-if-range)#end

    The BPDU Guard option removes the danger expressed in the warning. In this case, I incorrectly selected my ports,

    and ports 1 and 2 should have spanning tree enabled normally on them.

    BPDU Guard throws up warnings right away to prevent the loop that has been created from causing a problem on my

    network. When a PortFast port with BPDU Guard on it sees a BPDU frame, the action causes the switch to say, Hey,

    this port is configured incorrectly! and immediately the switch puts that port in an error state.

    Switch2#configure terminal

    Enter configuration commands, one per line. End with CNTL/Z.

    Switch2(config)#interface range fastEthernet 0/1 -10

    Switch2(config-if-range)#spanning-tree bpduguard enable

    Switch2(config-if-range)#

    3d14h: %SPANTREE-2-BLOCK_BPDUGUARD: Received BPDU on port FastEthernet0/2 with BPDU

    Guard enabled. Disabling port.

    3d14h: %PM-4-ERR_DISABLE: bpduguard error detected on Fa0/2, putting Fa0/2 in err-

    disable state

    3d14h: %SPANTREE-2-BLOCK_BPDUGUARD: Received BPDU on port FastEthernet0/1 with BPDU

    Guard enabled. Disabling port.

    3d14h: %PM-4-ERR_DISABLE: bpduguard error detected on Fa0/1, putting Fa0/1 in err-

    disable state

    3d14h: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/2, changed state

    to down

    3d14h: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state

    to down

    3d14h: %LINK-3-UPDOWN: Interface FastEthernet0/2, changed state to down

    3d14h: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to down

    Switch2(config-if-range)#end

    To correct the error state on the port, connect to that port in Interface Configuration mode and then shut down and re-

    enable those ports as shown here:

    Switch2#configure terminal

    Enter configuration commands, one per line. End with CNTL/Z.

    Switch2(config)#interface range

    Switch2(config)#interface range fastEthernet 0/1 -10

    Switch2(config-if-range)#shutdown

    Switch2(config-if-range)#no shutdown

  • 8/13/2019 Computer Networking Definitions

    10/29

    Website:http://www.webopedia.com/TERM/S/static_NAT.html

    Static NAT

    A type ofNATin which a privateIP addressis mapped to a public IP address, where the public address is alwaysthe same IP address (i.e., it has astaticaddress). This allows an internalhost,such as aWeb server,to have anunregistered (private) IP address and still be reachable over theInternet.

    Dynamic NATA type ofNATin which a privateIP addressis mapped to a public IP address drawing from a pool of registered

    (public) IP addresses. Typically, the NATrouterin anetworkwill keep a table of registered IP addresses, and when a

    private IP address requests access to theInternet,the router chooses an IP address from the table that is not at the

    time being used by another private IP address. Dynamic NAT helps to secure a network as it masks the internal

    configuration of a private network and makes it difficult for someone outside the network to moni tor individual usagepatterns. Another advantage of dynamic NAT is that it allows a private network to use private IP addresses that are

    invalid on the Internet but useful as internal addresses.

    Port address translation

    Short for port address translation, a type ofnetwork address translation.During PAT, each computer onLANistranslated to the sameIP address,but with a differentportnumber assignment.PAT is also referred to as overloading, port-level multiplexed NATor single address NAT.

    Website:

    http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094837.shtml

    Inside local addressThe IP address assigned to a host on the inside network. This is the addressconfigured as a parameter of the computer OS or received via dynamic address allocation protocols such asDHCP. The address is likely not a legitimate IP address assigned by the Network Information Center (NIC)or service provider.

    Inside global addressA legitimate IP address assigned by the NIC or service provider (ISP) thatrepresents one or more inside local IP addresses to the outside world.

    Outside local addressThe IP address of an outside host as it appears to the inside network. Notnecessarily a legitimate address, it is allocated from an address space routable on the inside.

    Outside global addressThe IP address assigned to a host on the outside network by the host owner.The address is allocated from a globally routable address or network space.

    Local addressA local address is any address that appears on the inside portion of the network.

    Global addressA global address is any address that appears on the outside portion of the network.

    http://www.webopedia.com/TERM/S/static_NAT.htmlhttp://www.webopedia.com/TERM/S/static_NAT.htmlhttp://www.webopedia.com/TERM/S/static_NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/S/static.htmlhttp://www.webopedia.com/TERM/S/static.htmlhttp://www.webopedia.com/TERM/S/static.htmlhttp://www.webopedia.com/TERM/H/host.htmlhttp://www.webopedia.com/TERM/H/host.htmlhttp://www.webopedia.com/TERM/H/host.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/P/port.htmlhttp://www.webopedia.com/TERM/P/port.htmlhttp://www.webopedia.com/TERM/P/port.htmlhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094837.shtmlhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094837.shtmlhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094837.shtmlhttp://www.webopedia.com/TERM/P/port.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/H/host.htmlhttp://www.webopedia.com/TERM/S/static.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/S/static_NAT.html
  • 8/13/2019 Computer Networking Definitions

    11/29

    The Outside Local and Outside Global entries will have the same IP address of the Outside host, which is

    171.16.68.1.

    Website: http://en.wikipedia.org/wiki/CSU/DSU

    CSU/DSUFrom Wikipedia, the free encyclopedia

    A CSU/DSU(Channel Service Unit/Data Service Unit) is a digital-interface device used to connect a Data

    Terminal Equipment device or DTE, such as a router, to a digital circuit, such as aT1line. The CSU/DSU

    implements two different functions. The CSU is responsible for the connection to the telecom network while the

    DSU is responsible for handling the interface with the DTE. A CSU/DSU is the equivalent of the modem for an

    entire

    Channel Service Unit/Data Service Unit

    A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external

    modem that converts digital data frames from the communications technology used on a local area network

    (LAN) into frames appropriate to a wide-area network (WAN) and vice versa. For example, if you have a Web

    http://en.wikipedia.org/wiki/CSU/DSUhttp://en.wikipedia.org/wiki/CSU/DSUhttp://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/CSU/DSU
  • 8/13/2019 Computer Networking Definitions

    12/29

    business from your own home and have leased a digital line (perhaps a T-1 or fractional T-1 line) to a phone

    company or a gateway at an Internet service provider, you have a CSU/DSU at your end and the phone

    company or gateway host has a CSU/DSU at its end.

    The Channel Service Unit (CSU) receives and transmits signals from and to the WAN line and provides a

    barrier for electrical interference from either side of the unit. The CSU can also echo loopback signals from the

    phone company for testing purposes. The Data Service Unit (DSU) manages line control, and converts input

    and output between RS-232C, RS-449, or V.35 frames from the LAN and the time-division multiplexed (TDM)

    DSX frames on the T-1 line.

    The DSU manages timing errors and signal regeneration. The DSU provides a modem-like interface between

    the computer as Data Terminal Equipment (DTE) and the CSU.

    A CSU/DSU operates at the physical layer (layer 1) of the OSI model. CSU/DSUs are also made as separate

    physical products; CSUs and DSUs. The DSU or both functions may be included as part of an interface cardinserted into a DTE. If the CSU/DSU is external, the DTE interface is usually compatible with the V.xx or RS-

    232C or similar serial interface.

    WIC (WAN Interface Card

    The WIC (WAN Interface Card) may contain an integrated CSU/DSU that can be inserted into a router slot. An

    example of a WIC is the 1-port 56/64-kbit/s DSU/CSU WIC (WIC-1DSU-56K4) from Cisco Systems.

  • 8/13/2019 Computer Networking Definitions

    13/29

  • 8/13/2019 Computer Networking Definitions

    14/29

    Website:https://learningnetwork.cisco.com/thread/40838

    DTE (Data Terminal Equipment) name indicates this is a piece of device that ends a communication line, whereas theDCE (Data COmmunication Equipment) provides a path for communication. in other words DTE is the device thatreceives clocking while DCE is the device that provides clocking.

    Let's say we have a computer on which wants to communicate with the Internet through a modem and a dial-upconnection. To get to the Internet you tell your modem to dial the number of your provider. After your modems hasdialed the number, the modem of the provider will answer your call and your will hear a lot of noise. Then it becomesquiet and you see your login prompt or your dialing program tells you the connection is established. Now you have aconnection with the server from your provider and you can wander the Internet.

    In this example you PC is a Data Terminal (DTE). The two modems (yours and that one of your provider) are DCEs,they make the communication between you and your provider possible. But now we have to look at the server of yourprovider. Is that a DTE or DCE?The answer is a DTE. It ends the communication line between you and the server.

    25 pin DTE devices transmit on pin 2 and receive on pin 3.

    25 pin DCE devices transmit on pin 3 and receive on pin 2.

    9 pin DTE devices transmit on pin 3 and receive on pin 2.

    9 pin DCE devices transmit on pin 2 and receive on pin 3.

    A CSU/DSU is a device used to connect a device or DTE, such as arouter,to adigital circuit,such as aT1line. TheCSU/DSU implements two different functions. The CSU is responsible for the connection to the telecom networkwhile the DSU is responsible for handling the interface with the DTE. A CSU/DSU is the equivalent of the modem

    https://learningnetwork.cisco.com/thread/40838https://learningnetwork.cisco.com/thread/40838https://learningnetwork.cisco.com/thread/40838http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Router_(computing)https://learningnetwork.cisco.com/thread/40838
  • 8/13/2019 Computer Networking Definitions

    15/29

    Refering to CCNA exploration v4 [Accessing the WAN] from Cisco Academy,

    Cisco mentions that a DCE device is commonly a modem or CSU/DSU. Then at Frame Relay

    section ,cisco mentions that the CO switch is a DCE device.

    Furthermore in my LAB I have a Router marked as DCE device !

    Who can explain this, svp ?

    I've attached some figures from Cisco material

    Finally I got it !!! I made it as a table.

    WAN connection DTE DCE DCE Location

    Leased Line CSU/DSU Customer

    PSTN (analog) Dial up modem Customer

    ISDN (digital) TA /NT1 Customer

    X.25 CSU/DSU Customer

    ATM ATM switch Service Provider

    Frame Relay Frame Relay modem Service Provider

    DSL DSL modem Customer

    Cable HFC Cable modem Customer

  • 8/13/2019 Computer Networking Definitions

    16/29

  • 8/13/2019 Computer Networking Definitions

    17/29

  • 8/13/2019 Computer Networking Definitions

    18/29

    Therefore ,we conclude that there are two different definitions of Local Loops1- between the Demarc and the CO switch OR2- between DTE (router) and DCE (switch)

    DCE devices might be: CS/DSUs, Modems, WAN switches, Access Servers or Routers

    Website:http://www.tldp.org/LDP/nag/node120.html

    CHAP versus PAP

    With PPP, each system may require its peer to authenticate itself using one of two

    authentication protocols. These are the Password Authentication Protocol (PAP), and

    the Challenge Handshake Authentication Protocol (CHAP). When a connection is

    established, each end can request the other to authenticate itself, regardless of whether

    it is the caller or the callee. Below I will loosely talk of `client' and `server' when I

    want to distinguish between the authenticating system and the authenticator. A PPP

    daemon can ask its peer for authentication by sending yet another LCP configuration

    request identifying the desired authentication protocol.

    PAP works basically the same way as the normal login procedure. The clientauthenticates itself by sending a user name and an (optionally encrypted) password to

    the server, which the server compares to its secrets database. This technique is

    vulnerable to eavesdroppers who may try to obtain the password by listening in on the

    serial line, and to repeated trial and error attacks.

    DCE

    http://www.tldp.org/LDP/nag/node120.htmlhttp://www.tldp.org/LDP/nag/node120.htmlhttp://www.tldp.org/LDP/nag/node120.htmlhttp://www.tldp.org/LDP/nag/node120.html
  • 8/13/2019 Computer Networking Definitions

    19/29

    CHAP does not have these deficiencies. With CHAP, the authenticator (i.e. the server)

    sends a randomly generated ``challenge'' string to the client, along with its hostname.

    The client uses the hostname to look up the appropriate secret, combines it with the

    challenge, and encrypts the string using a one-way hashing function. The result is

    returned to the server along with the client's hostname. The server now performs the

    same computation, and acknowledges the client if it arrives at the same result.

    Another feature of CHAP is that it doesn't only require the client to authenticate itself

    at startup time, but sends challenges at regular intervals to make sure the client hasn't

    been replaced by an intruder, for instance by just switching phone lines.

    PAP and CHAP:

    Website: http://www.modemhelp.net/faqs/auth.shtml

    What is PAP? What is CHAP? What is realm authentication?

    Once the username and password are checked and cleared, the modem card takes

    an IP from its available pool, packages it with other info like the modem card's IP (for

    the gateway) and the DNS servers, and sends it down the line to the user's computer

    to establish a PPP connection.

    The exchange of data in manual logins is plain text. For a faster, more secure

    authentication, most ISP's use Password Authentication Protocol (PAP) and

    Challenge Handshake Authentication Protocol (CHAP).

    PAP works as follows: 1. After the link is established, the client sends a password and

    username to the server bundled as one LCP packet. 2. The server (the modem card in

    the modem racks) recognizes the packet as a PAP authentication request, and sends

    the data to the RADIUS server (the database of usernames and passwords). 3.

    RADIUS either validates the request and sends back an acknowledgement to the

    modem card, terminates the connection, or offers the client another chance.

    Passwords are sent as plain text. The difference between PAP authentication and a

    manual or scripted login, is that PAP is not interactive. The username and password

    are entered in the client's dialing software and sent as one data package as soon as

    the modems have established a connection, rather than the server sending a login

    prompt and waiting for a response.

    CHAP is a more secure procedure for connecting to a system than PAP. Here's how

    http://www.modemhelp.net/faqs/auth.shtmlhttp://www.modemhelp.net/faqs/auth.shtmlhttp://www.modemhelp.net/faqs/auth.shtml
  • 8/13/2019 Computer Networking Definitions

    20/29

    CHAP works: 1. After the link is made, the server sends a challenge message to the

    client. The client responds with a value obtained by using a one-way hash function.

    2. The server checks the response by comparing it its own calculation of the

    expected hash value. 3. If the values match, the authentication is acknowledged;

    otherwise the connection is terminated. At any time, the server can request the

    connected party to send a new challenge message. Because CHAP identifiers are

    changed frequently and because authentication can be requested by the server at

    any time, CHAP provides more security than PAP.

    Some ISP's only recognize PAP authentication attempts. Actually, they recognize

    CHAP attempts, but choose to ignore them. The user chooses to attempt PAP or

    CHAP by selecting (or not selecting) "Require encrypted password." If this box is

    checked, they will not be able to authenticate on our servers.

    Realm authentication is just a PAP attempt with the email address for the user id:

    user@domain. It's the many ISP's can tell which RADIUS server to send it to when

    they use 3rd party networks (like UUNet, Genuity's Dial-linx service, PSInet and

    others). Without realm, the 3rd party network would use it's own RADIUS because it

    assume's that you are their customer not the ISP leasing access to that 3rd party

    network. In the past, this was a source of much hardship. With Realm, the 3rd party

    networks can send the auth info directly to the ISP's RADIUS, or to any auth serverthat any other ISP that uses that network

    Application Layer:

    Website: https://learningnetwork.cisco.com/thread/58757

    No application reside at application layer, whenever an application needs to interact with a person over a

    network/internet, it uses application layer for that reason. An example can also be given for the web pages which are

    stored on a computer can be viewed by IE without using internet so if the request is to go through a network or

    internet then Application layer protocols are used.

    The application layer is not the application itself that is doing the communication. Itis a service layer that

    provides these services.

    Website:http://www.9tut.com/osi-model-tutorial

    OSI Layer Model:

    https://learningnetwork.cisco.com/thread/58757https://learningnetwork.cisco.com/thread/58757http://www.9tut.com/osi-model-tutorialhttp://www.9tut.com/osi-model-tutorialhttp://www.9tut.com/osi-model-tutorialhttp://www.9tut.com/osi-model-tutorialhttps://learningnetwork.cisco.com/thread/58757
  • 8/13/2019 Computer Networking Definitions

    21/29

    Lets take an example in our real life to demonstrate the OSI model. Maybe you have ever sent a

    mail to your friend, right? To do it, you have to follow these steps:

    1. Write your letter2. Insert it into an envelope

    3. Write information about sender and receiver on that envelope

    4. Stamp it5. Go to the post office and drop it into a mail inbox

    From the example above, I want to imply we have to go through some steps in a specific order tocomplete a task. It is also applied for two PCs to communicate with each other. They have to use

    a predefined model, named OSI, to complete each step. There are 7 steps in this model as listed

    below:

    This is also the well-known table of the OSI model so you must take time to learn by heart. A

    popular way to remember this table is to create a fun sentence with the first letters of each layer.For example: All People Seem To Need Data Processing or a more funny sentence sorted from

    layer 1 to layer 7: PleaseDo Not Throw Sausage Pizza Away.

    There are two notices about this table:

    1. First, the table is arranged from top to bottom (numbering from 7 to 1). Each step is called a

    layer so we have 7 layers (maybe we usually call them layers to make them moretechnical ^^).

    When a device wants to send information to another one, its data must go from top to bottomlayer. But when a device receives this information, it must go from bottom to top todecapsulate it. In fact, the reverse action at the other end is very natural in our life. It is very

    similar when two people communicate via mail. First, the writer must write the letter, insert it

    into an envelope while the receiver must first open the envelope and then read the mail. Thepicture below shows the whole process of sending and receiving information.

  • 8/13/2019 Computer Networking Definitions

    22/29

    Note: The OSI model layers are often referred to by number than by name (for example, we refer

    saying layer 3 to network layer) so you should learn the number of each layer as well.2. When the information goes down through layers (from top to bottom), a header is added to it.

    This is called encapsulation because it is like wrapping an object in a capsule. Each header canbe understood only by the corresponding layer at the receiving side. Other layers only see that

    layers header as a part of data.

  • 8/13/2019 Computer Networking Definitions

    23/29

    At the receiving side, corresponding header is stripped off in the same layer it was attached.

    Understand each layer

    Layer 7Application layer

    This is the closest layer to the end user. It provides the interface between the applications we use

    and the underlying layers. But notice that the programs you are using (like a web browserIE,Firefox or Opera) do not belong to Application layer. Telnet, FTP, email client (SMTP),

    HyperText Transfer Protocol (HTTP) are examples of Application layer.

    Layer 6Presentation layer

    This layer ensures the presentation of data, that the communications passing through are in the

    appropriate form for the recipient. In general, it acts as a translator of the network. For example,you want to send an email and the Presentation will format your data into email format. Or you

    want to send photos to your friend, the Presentation layer will format your data into GIF, JPG or

    PNG format.

    Layer 5Session layer

    Layer 5 establishes, maintains and ends communication with the receiving device.

    Layer 4Transport layer

    This layer maintains flow control of data and provides for error checking and recovery of data

    between the devices. The most common example of Transport layer is Transmission ControlProtocol (TCP) and User Datagram Protocol (UDP).

  • 8/13/2019 Computer Networking Definitions

    24/29

    Layer 3Network layer

    This layer provides logical addresses which routers will use to determine the path to the

    destination. In most cases, the logic addresses here means the IP addresses (including source &destination IP addresses).

    Layer 2Data Link LayerThe Data Link layer formats the message into a data frame, and adds a header containing the

    hardware destination and source address to it. This header is responsible for finding the next

    destination device on a local network.

    Notice that layer 3 is responsible for finding the path to the last destination (network) but it

    doesnt care about who will be the next receiver. It isthe Layer 2 that helps data to reach the nextdestination.

    This layer is subdivide into 2 sub-layers: logical link control (LLC) and media access control

    (MAC).

    The LLC functions include:+ Managing frames to upper and lower layers

    + Error Control+ Flow control

    The MAC sublayer carries the physical address of each device on the network. This address is

    more commonly called a devices MAC address. MAC address is a 48 bits address which isburned into the NIC card on the device by its manufacturer.

    Layer 1Physical layer

    The Physical Layer defines the physical characteristics of the network such as connections,

    voltage levels and timing.

    To help you remember the functions of each layer more easily, I created a fun story in which

    Henry (English) wants to send a document to Charles (French) to demonstrate how the OSI

    model works.

  • 8/13/2019 Computer Networking Definitions

    25/29

  • 8/13/2019 Computer Networking Definitions

    26/29

    Lastly, I summarize all the important functions of each layer in the table below (please remember

    them, they are very important knowledge you need to know about OSI model):

    Layer Description Popular Protocols Protocol Data

    Unit

    Devices

    operate in

    this layer

    Application + User interface HTTP, FTP, TFTP,

    Telnet, SNMP,

    DNS

    Data

    Presentation + Data representation,

    encryption & decryption

    + Video (WMV,

    AVI)

    + Bitmap (JPG,

    BMP, PNG)+ Audio (WAV,

    MP3, WMA).

    Data

    Session + Set up, monitor &

    terminate the connection

    session

    + SQL, RPC,

    NETBIOS names

    Data

    Transport + Flow control (Buffering,

    Windowing, Congestion

    Avoidance) helps prevent

    the loss of segments on the

    network and the need for

    retransmission

    + TCP

    (Connection-

    Oriented, reliable)

    + UDP

    (Connectionless,

    unreliable)

    Segment

    Network + Path determination

    + Source & Destination

    logical addresses

    + IP

    + IPX

    + AppleTalk

    Packet/Datagram Router

    Data Link + Physical addresses

    Includes 2 layers:

    + Upper layer: LogicalLink Control (LLC)

    + Lower layer: Media

    Access Control (MAC)

    + LAN

    + WAN (HDLC,

    PPP, Frame

    Relay)

    Frame Switch,

    Bridge

  • 8/13/2019 Computer Networking Definitions

    27/29

    Physical Encodes and transmits

    data bits

    + Electric signals+ Radio signals

    + FDDI, Ethernet Bit (0, 1) Hub,

    Repeater

    Note: In fact, OSI is just is a theoretical model of networking. The practical model used inmodern networks is the TCP/IP model. You may think Hm, its just theoretic and has no use inreal life! I dont care! but believe me, you will use this model more often than the TCP/IP

    model so take time to grasp it, you will not regretI promise :)

    Website:http://help.slamdot.com/idx/0/057/What-are-the-types-of-DNS-records

    What are the types of DNS records?There are 5 types of DNS records:

    A, CNAME, NS, MX, and PTR

    A records

    Address (A) records direct a hostname to a numerical IP address. For example, if you want

    mycomputer.yourdomain.com to point to your home computer (which is, for example, 192.168.0.3),

    you would enter a record that looks like:

    mycomputer.yourdomain.com. A 192.168.0.3

    Important: You must put a period after the hostname. Do not put periods after IP addresses.

    CNAME records

    CNAME allows a machine to be known by one or more hostnames. There must always be an A

    record first, and this is known as the canonical or official name. For example:

    yourdomain.com. A 192.168.0.1

    Using CNAME, you can point other hostnames to the canonical (A record) address. For example:

    ftp.yourdoman.com. CNAME yourdomain.com.

    mail.yourdomain.com. CNAME yourdomain.com.

    http://help.slamdot.com/idx/0/057/What-are-the-types-of-DNS-recordshttp://help.slamdot.com/idx/0/057/What-are-the-types-of-DNS-recordshttp://help.slamdot.com/idx/0/057/What-are-the-types-of-DNS-recordshttp://help.slamdot.com/idx/0/057/What-are-the-types-of-DNS-records
  • 8/13/2019 Computer Networking Definitions

    28/29

    ssh.yourdomin.com. CNAME yourdomain.com.

    CNAME records make it possible to access your domain through ftp.yourdomain.com,

    mail.yourdomain.com, etc. Without a proper CNAME record, you will not be able to connect to your

    server using such addresses.

    Entering a CNAME record

    If you wanted home.yourdomain.com to point to yourdomain.com, we could enter the record in two

    ways:

    home CNAME yourdomain.com

    The first method allows you to simply enter the subdomain. Do not put a period after the subdomain

    name.

    - OR -

    home.yourdomain.com. CNAME yourdomain.com

    The second method requires you to enter the entire hostname, followed by a period.

    NAMESERVER (NS) records

    NS records specify the authoritative nameservers for the domain.

    Important: Changing NS records may cause your site to stop working. There is generally no need to

    change NS records.

    Entering an NS record

    The first step is to delete the old NS records from the table above.

    Then, enter two new nameservers records. Be sure that the nameserver hostname is followed by a

    period, as in this example:

    yourdomain.com NS ns1.slamdot.com.

    Be sure to put a period after the nameserver hostname in an NS record (ns1.slamdot.com. and notns1.slamdot.com ).

    MX records

    Free e-mail services such as everyone.net require that MX changes be made in order for their

    software to work. This change allows mail destined for your domain to be directed to their

  • 8/13/2019 Computer Networking Definitions

    29/29

    server. Please note that changing MX records will prevent your current POP3 accounts, forwarders,

    autoresponders, and mailing lists from functioning.

    First, delete the old MX record by clicking the Delete iconunder "Actions." There should now be no

    MX records listed.

    Next, click Create DNS Recordand enter a name for your MX record. Select MX for the type, and

    type in the hostname in the value field, followed by a period, given to you by the e-mail provider.

    Then select the priority level (usually 10) from the dropdown box. The priority level will also be given

    to you by the e-mail provider. Click Create Record.

    Note: Be sure to put a period at the end of the hostname.

    To restore the original MX settings, enter yourdomain.com. and priority 0 after deleting the other MX

    record.

    PTR records

    Pointer records (PTR) are used for reverse lookups. For example, to make 192.168.0.1 resolve to

    www.yourdomain.com, the record would look like:

    1.0.168.192.in-addr.arpa PTR www.yourdomain.com.

    Note: The IP address is reversed in the first field. Please use a period after your hostname (second

    field).

    Thein-addr-arpamethod is the most frequently used.

    Important: PTR records are effective only if your site has its own IP address.

    Important: PTR records are only effective if named.conf is manually edited and the proper zone

    information is added. This can only be done by a root user (the server Admin).