Upload
chinnam-sivannarayana
View
221
Download
0
Embed Size (px)
Citation preview
8/13/2019 Computer Networking Definitions
1/29
Unicast: unicast packets are sent from host to host. The communication is from a single host to another
single host. There Is one device transmitting a message destined for one receiver.
Broadcast: Broadcast is when a single device is transmitting a message to all other devices in a given
address range. This broadcast could reach all hosts on the subnet, all subnets, or all hosts on all subnets
Broadcast packets have the host (and/or subnet) portion of the address set to all ones. By design, mostmodern routers will block IP broadcast traffic and restrict it to the local subnet.
Multicast: Multicast is a special protocol for use with IP. Multicast enables a single device to
communicate with a specific set of hosts, not defined by any standard IP address and mask combination.
This allows for communication that resembles a conference call. Anyone from anywhere can join the
conference, and everyone at the conference hears what the speaker has to say. The speakers message
isnt broadcasted everywhere, but only to those in the conference hall itself. A special ser of addresses is
used for multicast communication.
Website:http://www.linfo.org/time-to-live.html
Time-to-live Definition
The time-to-live(TTL) is the number ofhopsthat apacketis permitted totravel before being discarded by a router.
A packet is the fundamental unit of information transport in all modern
computernetworks,and increasingly in other communications networks as
well. A router is a network layerelectronic device and/or software that
connects at least two networks, such as twoLANs(local area networks)
orWANs(wide area networks), and forwards packets between them. A hop
is the trip that a packet takes from one router to another as it traverses a
network on the way to its destination.
The TTL is set in an eightbinarydigit field in the packet header by the
sendinghostand is used to prevent packets from endlessly circulating on the
Internet or other network. When forwarding an IP packet, routers are
required to decrease the TTL by at least one. If a packet's TTL field reached
zero, the router detecting it discards the packet and sends anICMP(Internet
http://www.linfo.org/time-to-live.htmlhttp://www.linfo.org/time-to-live.htmlhttp://www.linfo.org/time-to-live.htmlhttp://www.linfo.org/hop.htmlhttp://www.linfo.org/hop.htmlhttp://www.linfo.org/hop.htmlhttp://www.linfo.org/packet.htmlhttp://www.linfo.org/packet.htmlhttp://www.linfo.org/packet.htmlhttp://www.linfo.org/network.htmlhttp://www.linfo.org/network.htmlhttp://www.linfo.org/network.htmlhttp://www.linfo.org/lan.htmlhttp://www.linfo.org/lan.htmlhttp://www.linfo.org/wan.htmlhttp://www.linfo.org/wan.htmlhttp://www.linfo.org/wan.htmlhttp://www.linfo.org/binary.htmlhttp://www.linfo.org/binary.htmlhttp://www.linfo.org/binary.htmlhttp://www.linfo.org/host.htmlhttp://www.linfo.org/host.htmlhttp://www.linfo.org/host.htmlhttp://www.linfo.org/icmp.htmlhttp://www.linfo.org/icmp.htmlhttp://www.linfo.org/icmp.htmlhttp://www.linfo.org/icmp.htmlhttp://www.linfo.org/host.htmlhttp://www.linfo.org/binary.htmlhttp://www.linfo.org/wan.htmlhttp://www.linfo.org/lan.htmlhttp://www.linfo.org/network.htmlhttp://www.linfo.org/packet.htmlhttp://www.linfo.org/hop.htmlhttp://www.linfo.org/time-to-live.html8/13/2019 Computer Networking Definitions
2/29
control message protocol) message back to the originating host.
Thepingand the tracerouteutilities both make use of the TTL. The latter
intentionally sends packets with low TTL values so that they will be
discarded by each successive router in the destination path. The time
between sending a packet and receiving the ICMP message that it was
discarded is used to calculate the travel time for each successive hop.
A specific TTL number can indicate the maximum range for a packet. For
example, zero restricts it to the same host, one to the same subnet, 32 to the
same site, 64 to the same region and 128 to the same continent; 255 is
unrestricted.
Website:https://learningnetwork.cisco.com/thread/34420#178065
Classful vs Classless network
Classful is based on the default Class A, B or C networks.
- Class A: 0 - 127 with a mask of 255.0.0.0 (/8)
- Class B: 128 - 191 with a mask of 255.255.0.0 (/16)- Class C: 192 - 223 with a mask of 255.255.255.0 (/24)
All devices in the same routing domain must use the same subnet mask. Since routers running a
classful routing protocol do not include subnet mask information with routing updates, the routerassumes either its own subnet mask, or defaults to the classful subnet mask.
Classless on the other hand, allows the use of variable length subnet masks, or VLSM, becausesubnet mask information is included with routing updates. You can have a mixture of different
subnet masks in the same routing domain:
- 10.1.0.0/19
- 10.2.0.0/20- 172.16.8.0/21
- 172.16.16.0/24
Website: http://www.cs.rutgers.edu/~pxk/352/notes/autonomous_systems.html
http://www.linfo.org/ping.htmlhttp://www.linfo.org/ping.htmlhttp://www.linfo.org/ping.htmlhttps://learningnetwork.cisco.com/thread/34420#178065https://learningnetwork.cisco.com/thread/34420#178065https://learningnetwork.cisco.com/thread/34420#178065https://learningnetwork.cisco.com/thread/34420#178065http://www.cs.rutgers.edu/~pxk/352/notes/autonomous_systems.htmlhttp://www.cs.rutgers.edu/~pxk/352/notes/autonomous_systems.htmlhttp://www.cs.rutgers.edu/~pxk/352/notes/autonomous_systems.htmlhttps://learningnetwork.cisco.com/thread/34420#178065https://learningnetwork.cisco.com/thread/34420#178065http://www.linfo.org/ping.html8/13/2019 Computer Networking Definitions
3/29
Autonomous SystemsAnAutonomous System(AS) is a collection of routers whose prefixes and routing policies are under common
administrative control. This could be a network service provider, a large company, a university, a division of a
company, or a group of companies. The AS represents a connected group of one or more blocks of IP addresses
(called IP prefixes) that have been assigned to that organization and provides a single routing policy to systems
outside the AS. Autonomous Systems create a two-level hierarchy for routing in the Internet. Routing between
Autonomous Systems (inter-AS routing) is external to the AS allows one AS to send traffic to another AS. An IP prefix
is a group of IP addresses expressed in CIDR form (i.e., address/bits, such as 128.6.0.0/16). Note that most
organizations do not interconect via autonomous systems but simply connect via a single ISP.
Routers within an AS use an Interior Gateway Protocol(IGP), which handles routing between nodes inside the AS.
Common interior gateway protocols include RIP, OSPF, IS-IS, EIGRP, as well as some proprietary protocols such as
IGRP. Routing within an Autonomous System (intra-AS routing) is internal to that AS and invisible to those outside it.
The AS administrator decides what routing algorithm should run within it.
To get traffic from a host in one AS to a host in another AS, the autonomous systems need to be connected. Most
ASes do not share a direct link with each other, in which case data traffic may be routed through the networks of
other ASes that agree to carry the traffic. An Exterior Gateway Protocol(EGP) is a routing protocol that handles
routing between Autonomous Systems (inter-AS routing). BGP version 4, the Border Gateway Protocol, is the de
facto standard EGP for inter-AS routing. At some point in the future, the Internet is expected to adopt IDRP, the OSI
Inter-Domain Routing protocol.
Inter-AS Routing
Figure 1. Inter-AS routing
A routing policy defines how routing information is exchanged between the ASes. For example, suppose two ASes,
ASx and ASy, are connected to each other via a link between two gateway routers. Suppose that ASx knows how to
reach some network, NET1, that is defined by an IP prefix. This network may be within ASx or may be external to it.
Suppose that ASy knows how to reach some other network, NET2.
For systems on NET1 to be able to send messages to systems on NET2, and vice versa, traffic will need to flow
between ASx and ASy. This means that ASx needs to announce to ASy that it has a route to NET1 and ASy needsto announce to ASx that it has a route to NET2. The exterior gateway protocol is used to do this. ASx and ASy can
then decide whether to accept this information or discard it (if, for example, they have better routes to those
networks).
Website: http://packetlife.net/blog/2008/jun/19/ospf-network-types/
http://packetlife.net/blog/2008/jun/19/ospf-network-types/http://packetlife.net/blog/2008/jun/19/ospf-network-types/http://packetlife.net/blog/2008/jun/19/ospf-network-types/8/13/2019 Computer Networking Definitions
4/29
OSPF network typesBystretch| Thursday, June 19, 2008 at 3:38 a.m. UTC
Having worked almost exclusively with Ethernet transport my whole career, it took me a while to really
grasp the concept of non-broadcast networks. Dynamic routing protocols, particularly OSPF, demand
familiarity with all sorts of layer two topologies, so I knew I had to better educate myself on the matter.
Fortunately, working withDynamipsand virtual frame relay networks provided the experience I needed to
feel comfortable implementing all the different OSPF network types.
OSPF addresses three classes of network (as listed in section 1.2 ofRFC 2328): point-to-point,
broadcast, and non-broadcast.
Point-to-Point
This is by far the simplest network type, and serves as a convenient anchor from which to advance the
discussion. A point-to-point network is, as its name aptly describes, a link between exactly two points (or
routers). A packet sent from on of the routers will always have exactly one recipient on the local link.
Broadcast
Obviously, point-to-point links don't scale well. A much more efficient manner of connecting a large
number of devices is to implement a multiaccesssegment; that is, a segment which can be accessed by
multiple end points. An Ethernet segment is an example of such a network.
Ethernet networks support broadcasts; a single packet transmitted by a device can be multiplied by the
medium (in this case an Ethernet switch) so that every other end point receives a copy. This isadvantageous not only in bandwidth savings, but also in facilitating automatic neighbor discovery.
In the example pictured above, R1 can multicast (a broadcast intended only for certain recipients) an
OSPF hello message to the link, knowing that all other OSPF routers connected to the link will receive it
and reply with their own multicast message. Consequently, neighbors can quickly identify each other and
form adjacencies without knowing addresses beforehand. Isn't that convenient?
http://packetlife.net/blog/2008/jun/19/ospf-network-types/http://packetlife.net/users/stretch/http://packetlife.net/users/stretch/http://packetlife.net/users/stretch/http://www.ipflow.utc.fr/index.php/Cisco_7200_Simulatorhttp://www.ipflow.utc.fr/index.php/Cisco_7200_Simulatorhttp://www.ipflow.utc.fr/index.php/Cisco_7200_Simulatorhttp://www.faqs.org/rfcs/rfc2328.htmlhttp://www.faqs.org/rfcs/rfc2328.htmlhttp://www.faqs.org/rfcs/rfc2328.htmlhttp://www.faqs.org/rfcs/rfc2328.htmlhttp://www.ipflow.utc.fr/index.php/Cisco_7200_Simulatorhttp://packetlife.net/users/stretch/http://packetlife.net/blog/2008/jun/19/ospf-network-types/8/13/2019 Computer Networking Definitions
5/29
OSPF routers on a multiaccess segment will elect a designated router (DR) and backup designated
router (BDR) with which all non-designated routers will form an adjacency. This is to ensure that the
number of adjacencies maintained does not grow too large; a segment containing ten routers would
require 45 adjacencies to form a mesh, but only 17 when a DR and BDR are in place.
Non-Broadcast
Unfortunately, not all multiaccess technologies support broadcast transmissions. Frame relay and ATM
are probably the most common examples of non-broadcast transport, requiring individual permanent
virtual circuits (PVCs) to be configured between end points.
Notice in the frame relay topology pictured above, R1 must craft and transmit an individual packet for
every destination he wants to reach. Aside from being horribly inefficient with regard to bandwidth, this
limitation requires the router to know the addresses of his neighbors before he can communicate to them.
OSPF can operate in one of two modes across a non-broadcast network: non-broadcast multi-access
(NBMA) or point-to-multipoint. Each of these topologies tackles the absence of broadcast capability from
a different direction.
Non-Broadcast Mul t i -Access (NBMA)
An NBMA segment emulates the function of a broadcast network. Every router on the segment must be
configured with the IP address of each of its neighbors. OSPF hello packets are then individually
transmitted as unicast packets to each adjacent neighbor.
As in a true broadcast network, a DR and BDR are elected to limit the number of adjacencies formed.
Point-to-Mult ipoint
A point-to-multipoint configuration approaches the non-broadcast limitation in a different manner. Rather
than trying to emulate broadcast capability, it seeks to organize the PVCs into a collection of point-to-
point networks. Hello packets must still be replicated and transmitted individually to each neighbor, but
the multipoint approach offers two distinct advantages: no DR/BDR is needed, and the emulated point-to-
point links can occupy a common subnet.
All routers attached to a non-broadcast network must be manually configured to recognize it as a point-to-
multipoint segment:
8/13/2019 Computer Networking Definitions
6/29
Router(config-if)# ip ospf network point-to-multipoint [non-broadcast]
The non-broadcastparameter can be appended to the OSPF network type to force unicasting of
packets rather than relying on multicast. This might be necessary when dynamic circuits are in use.
Website: http://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-
switch.htm
Functions of a Network Switch
Three basic functions of a switch are Learning, Forwarding and Preventing Layer 2 Loops.
Learning
Learning is the process of obtaining theMAC addressof connected devices. When a frame reaches into the
port of a switch, the switch reads the MAC address of the source device from frame and compares it to itsMAC address table (also known as CAM (Content Addressable Memory) table). If the switch cannot find a
corresponding entry inMAC addresstable, the switch will add the address to the table with the port numbervia theframearrived.
If the MAC address is already available in the MAC address table, the switch compares the incoming portwith the port already available in the MAC table. If the port numbers are different, the switch updates theMAC address table new port number. This will normally happen when network administrators remove the
cable from one port and attach it to another port.
Whenever switch updates an entry in the MAC address table, the switch resets the timer for that entry.Timers are used in aging process of old entries. Aging helps to remove old entries and free memory of MAC
address table to add new entries.
Forwarding
Forwarding is the process of passing network traffic a device connected to one port of a Network Switch to
another device connected to another port on the switch. When a Layer 2 frame reaches a port on theNetwork Switch the switch reads the source MAC address of the frame as a part of learning function, and it
also reads the destination MAC address also as a part of forwarding function. The destination MAC address isimportant to determine the port number which the destination device is connected.
If the destination MAC address is found on the MAC address table, the switch forwards the frame via thecorresponding port of the MAC address.
If the destination MAC address is not found on the MAC address table, the switch forwards the framethrough all its ports except the source port. This is known as flooding. Normally flooding happens when the
network switch is starting up. Flooding prevents loss of traffic when the switch is learning. When thedestination device receives the frame and sends a reply frame to the source device, the switch reads the
MAC address of the destination device and adds it to the MAC address table, which is the function of learningprocess.
http://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-switch.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-switch.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-switch.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/network-access-layer.htmhttp://www.omnisecu.com/tcpip/network-access-layer.htmhttp://www.omnisecu.com/tcpip/network-access-layer.htmhttp://www.omnisecu.com/tcpip/network-access-layer.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/tcpip/media-access-control-mac-addresses.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-switch.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/functions-of-a-network-switch.htm8/13/2019 Computer Networking Definitions
7/29
If the source MAC address is same as the destination MAC address, the switch will drop the frame. This isknown as filtering. This will normally happen if there is a hub connected to a port of the switch, and both the
source device and destination device are connected to the hub.
Preventing Layer 2 Switching Loops
In practical Local Area Networking, redundant links are created to avoid complete network failure in anevent of failure in one link. Redundant links can causelayer 2 switching loopsandbroadcast storms.It is the
function of a network switch to prevent layer 2 switching loops and broadcast storms.
Website: http://www.dummies.com/how-to/content/spanning-tree-protocol-stp-and-portfast.html
Spanning Tree Protocol (STP) and PortFastByEdward TetzfromCisco Networking All-in-One For Dummies
The time Spanning Tree Protocol (STP) takes to transition ports over to the Forwarding state can cause
problems. PortFastis a Cisco network function which can be configured to resolve this problem.
This factor of time is not an issue for many people, but it can cause problems for some. For example, if you power up
my computer in the morning, power goes to the network card immediately, and the port on the switch enters the
Listening state.
By the time the OS wants to start up the network card drivers and get an address from DHCP, the port on the switch
is in Forwarding state, which works well most of the time.
If, however, you had unplugged the NIC on the laptop to move it to another desk, Windows will tell you that it has a
problem communicating on the network. Why? The NIC connected to the port changed the link state of the port to Up,
Windows immediately tried to get a DHCP address, but the port is not yet in a Forwarding state.
This is a common problem when using STP on your network. In a few more seconds, Windows will attempt to get an
IP address again, and it will succeed.
The other time you may see this issue is with Pre-Boot Execution (PXE) devices, such as Windows Deployment
Services. The following figure shows a typical PXE implementation. Here is what happens with PXE:
You apply power to your computer, which activates the NIC, but less than five seconds later, the computers POST
finishes and the NIC attempts to get an IP address from DHCP so that it can load a boot image directly from the PXE
server, which fails.
The computer attempts to get an IP address from a DHCP server several times within approximately 10 seconds,
after which it gives up and moves onto another boot device, such as the hard drive. The unfortunate part of this
process is that because it fails to get an IP address or connect with the PXE server, you are not able to install your
new operating system image on that computer.
The problem with this scenario is that because STP makes the computer wait 45 seconds prior to forwarding traffic
on the port, the PXE network boot has timed out.
http://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-layer-2-switching-loop.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-layer-2-switching-loop.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-layer-2-switching-loop.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-broadcast-storm.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-broadcast-storm.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-broadcast-storm.htmhttp://www.dummies.com/how-to/content/spanning-tree-protocol-stp-and-portfast.htmlhttp://www.dummies.com/how-to/content/spanning-tree-protocol-stp-and-portfast.htmlhttp://www.dummies.com/search.html?query=Edward+Tetzhttp://www.dummies.com/search.html?query=Edward+Tetzhttp://www.dummies.com/search.html?query=Edward+Tetzhttp://www.dummies.com/store/product/Cisco-Networking-All-in-One-For-Dummies.productCd-0470945583.htmlhttp://www.dummies.com/store/product/Cisco-Networking-All-in-One-For-Dummies.productCd-0470945583.htmlhttp://www.dummies.com/store/product/Cisco-Networking-All-in-One-For-Dummies.productCd-0470945583.htmlhttp://www.dummies.com/store/product/Cisco-Networking-All-in-One-For-Dummies.productCd-0470945583.htmlhttp://www.dummies.com/search.html?query=Edward+Tetzhttp://www.dummies.com/how-to/content/spanning-tree-protocol-stp-and-portfast.htmlhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-broadcast-storm.htmhttp://www.omnisecu.com/cisco-certified-network-associate-ccna/what-is-layer-2-switching-loop.htm8/13/2019 Computer Networking Definitions
8/29
PortFast is the solution to this problem of delays when client computers are connecting to switches. PortFast is not
enabled by default. With PortFast enabled on a port, you effectively take the port and tell spanning tree not to
implement STP on that port.
This solution is not a bad one if only one computer is plugged into the port so that people will not be creating
accidental loops on the network, which can be frighteningly easy to do.
Setting PortFast on all ports
While there may be some ports you want to exclude from the PortFast configuration, if you want most ports to use
PortFast you make that default setting. To set PortFast on all ports from Global Configuration mode, use the
command spanning-tree portfast default:
Switch2> enable
Switch2# configure terminal
Switch2(config)#spanning-tree portfast ?
bpdufilter Enable portfast bdpu filter on this switch
bpduguard Enable portfast bpdu guard on this switch
default Enable portfast by default on all access ports
Setting PortFast on specific ports
You can also implement PortFast on specific ports, as illustrated here, where the following command enables
PortFast for FastEthernet ports 1 through 10. Notice the big warning about the dangers of PortFast.
Switch2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch2(config)#interface range
Switch2(config)#interface range fastEthernet 0/1 -10
8/13/2019 Computer Networking Definitions
9/29
Switch2(config-if-range)#spanning-tree portfast
%Warning: portfast should only be enabled on ports connected to a single
host. Connecting hubs, concentrators, switches, bridges, etc... to this
interface when portfast is enabled, can cause temporary bridging loops.
Use with CAUTION
%Portfast will be configured in 10 interfaces due to the range command
but will only have effect when the interfaces are in a non-trunking mode.
Switch2(config-if-range)#end
The BPDU Guard option removes the danger expressed in the warning. In this case, I incorrectly selected my ports,
and ports 1 and 2 should have spanning tree enabled normally on them.
BPDU Guard throws up warnings right away to prevent the loop that has been created from causing a problem on my
network. When a PortFast port with BPDU Guard on it sees a BPDU frame, the action causes the switch to say, Hey,
this port is configured incorrectly! and immediately the switch puts that port in an error state.
Switch2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch2(config)#interface range fastEthernet 0/1 -10
Switch2(config-if-range)#spanning-tree bpduguard enable
Switch2(config-if-range)#
3d14h: %SPANTREE-2-BLOCK_BPDUGUARD: Received BPDU on port FastEthernet0/2 with BPDU
Guard enabled. Disabling port.
3d14h: %PM-4-ERR_DISABLE: bpduguard error detected on Fa0/2, putting Fa0/2 in err-
disable state
3d14h: %SPANTREE-2-BLOCK_BPDUGUARD: Received BPDU on port FastEthernet0/1 with BPDU
Guard enabled. Disabling port.
3d14h: %PM-4-ERR_DISABLE: bpduguard error detected on Fa0/1, putting Fa0/1 in err-
disable state
3d14h: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/2, changed state
to down
3d14h: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state
to down
3d14h: %LINK-3-UPDOWN: Interface FastEthernet0/2, changed state to down
3d14h: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to down
Switch2(config-if-range)#end
To correct the error state on the port, connect to that port in Interface Configuration mode and then shut down and re-
enable those ports as shown here:
Switch2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch2(config)#interface range
Switch2(config)#interface range fastEthernet 0/1 -10
Switch2(config-if-range)#shutdown
Switch2(config-if-range)#no shutdown
8/13/2019 Computer Networking Definitions
10/29
Website:http://www.webopedia.com/TERM/S/static_NAT.html
Static NAT
A type ofNATin which a privateIP addressis mapped to a public IP address, where the public address is alwaysthe same IP address (i.e., it has astaticaddress). This allows an internalhost,such as aWeb server,to have anunregistered (private) IP address and still be reachable over theInternet.
Dynamic NATA type ofNATin which a privateIP addressis mapped to a public IP address drawing from a pool of registered
(public) IP addresses. Typically, the NATrouterin anetworkwill keep a table of registered IP addresses, and when a
private IP address requests access to theInternet,the router chooses an IP address from the table that is not at the
time being used by another private IP address. Dynamic NAT helps to secure a network as it masks the internal
configuration of a private network and makes it difficult for someone outside the network to moni tor individual usagepatterns. Another advantage of dynamic NAT is that it allows a private network to use private IP addresses that are
invalid on the Internet but useful as internal addresses.
Port address translation
Short for port address translation, a type ofnetwork address translation.During PAT, each computer onLANistranslated to the sameIP address,but with a differentportnumber assignment.PAT is also referred to as overloading, port-level multiplexed NATor single address NAT.
Website:
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094837.shtml
Inside local addressThe IP address assigned to a host on the inside network. This is the addressconfigured as a parameter of the computer OS or received via dynamic address allocation protocols such asDHCP. The address is likely not a legitimate IP address assigned by the Network Information Center (NIC)or service provider.
Inside global addressA legitimate IP address assigned by the NIC or service provider (ISP) thatrepresents one or more inside local IP addresses to the outside world.
Outside local addressThe IP address of an outside host as it appears to the inside network. Notnecessarily a legitimate address, it is allocated from an address space routable on the inside.
Outside global addressThe IP address assigned to a host on the outside network by the host owner.The address is allocated from a globally routable address or network space.
Local addressA local address is any address that appears on the inside portion of the network.
Global addressA global address is any address that appears on the outside portion of the network.
http://www.webopedia.com/TERM/S/static_NAT.htmlhttp://www.webopedia.com/TERM/S/static_NAT.htmlhttp://www.webopedia.com/TERM/S/static_NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/S/static.htmlhttp://www.webopedia.com/TERM/S/static.htmlhttp://www.webopedia.com/TERM/S/static.htmlhttp://www.webopedia.com/TERM/H/host.htmlhttp://www.webopedia.com/TERM/H/host.htmlhttp://www.webopedia.com/TERM/H/host.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/P/port.htmlhttp://www.webopedia.com/TERM/P/port.htmlhttp://www.webopedia.com/TERM/P/port.htmlhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094837.shtmlhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094837.shtmlhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094837.shtmlhttp://www.webopedia.com/TERM/P/port.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/R/router.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/H/host.htmlhttp://www.webopedia.com/TERM/S/static.htmlhttp://www.webopedia.com/TERM/I/IP_address.htmlhttp://www.webopedia.com/TERM/N/NAT.htmlhttp://www.webopedia.com/TERM/S/static_NAT.html8/13/2019 Computer Networking Definitions
11/29
The Outside Local and Outside Global entries will have the same IP address of the Outside host, which is
171.16.68.1.
Website: http://en.wikipedia.org/wiki/CSU/DSU
CSU/DSUFrom Wikipedia, the free encyclopedia
A CSU/DSU(Channel Service Unit/Data Service Unit) is a digital-interface device used to connect a Data
Terminal Equipment device or DTE, such as a router, to a digital circuit, such as aT1line. The CSU/DSU
implements two different functions. The CSU is responsible for the connection to the telecom network while the
DSU is responsible for handling the interface with the DTE. A CSU/DSU is the equivalent of the modem for an
entire
Channel Service Unit/Data Service Unit
A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external
modem that converts digital data frames from the communications technology used on a local area network
(LAN) into frames appropriate to a wide-area network (WAN) and vice versa. For example, if you have a Web
http://en.wikipedia.org/wiki/CSU/DSUhttp://en.wikipedia.org/wiki/CSU/DSUhttp://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/CSU/DSU8/13/2019 Computer Networking Definitions
12/29
business from your own home and have leased a digital line (perhaps a T-1 or fractional T-1 line) to a phone
company or a gateway at an Internet service provider, you have a CSU/DSU at your end and the phone
company or gateway host has a CSU/DSU at its end.
The Channel Service Unit (CSU) receives and transmits signals from and to the WAN line and provides a
barrier for electrical interference from either side of the unit. The CSU can also echo loopback signals from the
phone company for testing purposes. The Data Service Unit (DSU) manages line control, and converts input
and output between RS-232C, RS-449, or V.35 frames from the LAN and the time-division multiplexed (TDM)
DSX frames on the T-1 line.
The DSU manages timing errors and signal regeneration. The DSU provides a modem-like interface between
the computer as Data Terminal Equipment (DTE) and the CSU.
A CSU/DSU operates at the physical layer (layer 1) of the OSI model. CSU/DSUs are also made as separate
physical products; CSUs and DSUs. The DSU or both functions may be included as part of an interface cardinserted into a DTE. If the CSU/DSU is external, the DTE interface is usually compatible with the V.xx or RS-
232C or similar serial interface.
WIC (WAN Interface Card
The WIC (WAN Interface Card) may contain an integrated CSU/DSU that can be inserted into a router slot. An
example of a WIC is the 1-port 56/64-kbit/s DSU/CSU WIC (WIC-1DSU-56K4) from Cisco Systems.
8/13/2019 Computer Networking Definitions
13/29
8/13/2019 Computer Networking Definitions
14/29
Website:https://learningnetwork.cisco.com/thread/40838
DTE (Data Terminal Equipment) name indicates this is a piece of device that ends a communication line, whereas theDCE (Data COmmunication Equipment) provides a path for communication. in other words DTE is the device thatreceives clocking while DCE is the device that provides clocking.
Let's say we have a computer on which wants to communicate with the Internet through a modem and a dial-upconnection. To get to the Internet you tell your modem to dial the number of your provider. After your modems hasdialed the number, the modem of the provider will answer your call and your will hear a lot of noise. Then it becomesquiet and you see your login prompt or your dialing program tells you the connection is established. Now you have aconnection with the server from your provider and you can wander the Internet.
In this example you PC is a Data Terminal (DTE). The two modems (yours and that one of your provider) are DCEs,they make the communication between you and your provider possible. But now we have to look at the server of yourprovider. Is that a DTE or DCE?The answer is a DTE. It ends the communication line between you and the server.
25 pin DTE devices transmit on pin 2 and receive on pin 3.
25 pin DCE devices transmit on pin 3 and receive on pin 2.
9 pin DTE devices transmit on pin 3 and receive on pin 2.
9 pin DCE devices transmit on pin 2 and receive on pin 3.
A CSU/DSU is a device used to connect a device or DTE, such as arouter,to adigital circuit,such as aT1line. TheCSU/DSU implements two different functions. The CSU is responsible for the connection to the telecom networkwhile the DSU is responsible for handling the interface with the DTE. A CSU/DSU is the equivalent of the modem
https://learningnetwork.cisco.com/thread/40838https://learningnetwork.cisco.com/thread/40838https://learningnetwork.cisco.com/thread/40838http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_Signal_1http://en.wikipedia.org/wiki/Digital_circuithttp://en.wikipedia.org/wiki/Router_(computing)https://learningnetwork.cisco.com/thread/408388/13/2019 Computer Networking Definitions
15/29
Refering to CCNA exploration v4 [Accessing the WAN] from Cisco Academy,
Cisco mentions that a DCE device is commonly a modem or CSU/DSU. Then at Frame Relay
section ,cisco mentions that the CO switch is a DCE device.
Furthermore in my LAB I have a Router marked as DCE device !
Who can explain this, svp ?
I've attached some figures from Cisco material
Finally I got it !!! I made it as a table.
WAN connection DTE DCE DCE Location
Leased Line CSU/DSU Customer
PSTN (analog) Dial up modem Customer
ISDN (digital) TA /NT1 Customer
X.25 CSU/DSU Customer
ATM ATM switch Service Provider
Frame Relay Frame Relay modem Service Provider
DSL DSL modem Customer
Cable HFC Cable modem Customer
8/13/2019 Computer Networking Definitions
16/29
8/13/2019 Computer Networking Definitions
17/29
8/13/2019 Computer Networking Definitions
18/29
Therefore ,we conclude that there are two different definitions of Local Loops1- between the Demarc and the CO switch OR2- between DTE (router) and DCE (switch)
DCE devices might be: CS/DSUs, Modems, WAN switches, Access Servers or Routers
Website:http://www.tldp.org/LDP/nag/node120.html
CHAP versus PAP
With PPP, each system may require its peer to authenticate itself using one of two
authentication protocols. These are the Password Authentication Protocol (PAP), and
the Challenge Handshake Authentication Protocol (CHAP). When a connection is
established, each end can request the other to authenticate itself, regardless of whether
it is the caller or the callee. Below I will loosely talk of `client' and `server' when I
want to distinguish between the authenticating system and the authenticator. A PPP
daemon can ask its peer for authentication by sending yet another LCP configuration
request identifying the desired authentication protocol.
PAP works basically the same way as the normal login procedure. The clientauthenticates itself by sending a user name and an (optionally encrypted) password to
the server, which the server compares to its secrets database. This technique is
vulnerable to eavesdroppers who may try to obtain the password by listening in on the
serial line, and to repeated trial and error attacks.
DCE
http://www.tldp.org/LDP/nag/node120.htmlhttp://www.tldp.org/LDP/nag/node120.htmlhttp://www.tldp.org/LDP/nag/node120.htmlhttp://www.tldp.org/LDP/nag/node120.html8/13/2019 Computer Networking Definitions
19/29
CHAP does not have these deficiencies. With CHAP, the authenticator (i.e. the server)
sends a randomly generated ``challenge'' string to the client, along with its hostname.
The client uses the hostname to look up the appropriate secret, combines it with the
challenge, and encrypts the string using a one-way hashing function. The result is
returned to the server along with the client's hostname. The server now performs the
same computation, and acknowledges the client if it arrives at the same result.
Another feature of CHAP is that it doesn't only require the client to authenticate itself
at startup time, but sends challenges at regular intervals to make sure the client hasn't
been replaced by an intruder, for instance by just switching phone lines.
PAP and CHAP:
Website: http://www.modemhelp.net/faqs/auth.shtml
What is PAP? What is CHAP? What is realm authentication?
Once the username and password are checked and cleared, the modem card takes
an IP from its available pool, packages it with other info like the modem card's IP (for
the gateway) and the DNS servers, and sends it down the line to the user's computer
to establish a PPP connection.
The exchange of data in manual logins is plain text. For a faster, more secure
authentication, most ISP's use Password Authentication Protocol (PAP) and
Challenge Handshake Authentication Protocol (CHAP).
PAP works as follows: 1. After the link is established, the client sends a password and
username to the server bundled as one LCP packet. 2. The server (the modem card in
the modem racks) recognizes the packet as a PAP authentication request, and sends
the data to the RADIUS server (the database of usernames and passwords). 3.
RADIUS either validates the request and sends back an acknowledgement to the
modem card, terminates the connection, or offers the client another chance.
Passwords are sent as plain text. The difference between PAP authentication and a
manual or scripted login, is that PAP is not interactive. The username and password
are entered in the client's dialing software and sent as one data package as soon as
the modems have established a connection, rather than the server sending a login
prompt and waiting for a response.
CHAP is a more secure procedure for connecting to a system than PAP. Here's how
http://www.modemhelp.net/faqs/auth.shtmlhttp://www.modemhelp.net/faqs/auth.shtmlhttp://www.modemhelp.net/faqs/auth.shtml8/13/2019 Computer Networking Definitions
20/29
CHAP works: 1. After the link is made, the server sends a challenge message to the
client. The client responds with a value obtained by using a one-way hash function.
2. The server checks the response by comparing it its own calculation of the
expected hash value. 3. If the values match, the authentication is acknowledged;
otherwise the connection is terminated. At any time, the server can request the
connected party to send a new challenge message. Because CHAP identifiers are
changed frequently and because authentication can be requested by the server at
any time, CHAP provides more security than PAP.
Some ISP's only recognize PAP authentication attempts. Actually, they recognize
CHAP attempts, but choose to ignore them. The user chooses to attempt PAP or
CHAP by selecting (or not selecting) "Require encrypted password." If this box is
checked, they will not be able to authenticate on our servers.
Realm authentication is just a PAP attempt with the email address for the user id:
user@domain. It's the many ISP's can tell which RADIUS server to send it to when
they use 3rd party networks (like UUNet, Genuity's Dial-linx service, PSInet and
others). Without realm, the 3rd party network would use it's own RADIUS because it
assume's that you are their customer not the ISP leasing access to that 3rd party
network. In the past, this was a source of much hardship. With Realm, the 3rd party
networks can send the auth info directly to the ISP's RADIUS, or to any auth serverthat any other ISP that uses that network
Application Layer:
Website: https://learningnetwork.cisco.com/thread/58757
No application reside at application layer, whenever an application needs to interact with a person over a
network/internet, it uses application layer for that reason. An example can also be given for the web pages which are
stored on a computer can be viewed by IE without using internet so if the request is to go through a network or
internet then Application layer protocols are used.
The application layer is not the application itself that is doing the communication. Itis a service layer that
provides these services.
Website:http://www.9tut.com/osi-model-tutorial
OSI Layer Model:
https://learningnetwork.cisco.com/thread/58757https://learningnetwork.cisco.com/thread/58757http://www.9tut.com/osi-model-tutorialhttp://www.9tut.com/osi-model-tutorialhttp://www.9tut.com/osi-model-tutorialhttp://www.9tut.com/osi-model-tutorialhttps://learningnetwork.cisco.com/thread/587578/13/2019 Computer Networking Definitions
21/29
Lets take an example in our real life to demonstrate the OSI model. Maybe you have ever sent a
mail to your friend, right? To do it, you have to follow these steps:
1. Write your letter2. Insert it into an envelope
3. Write information about sender and receiver on that envelope
4. Stamp it5. Go to the post office and drop it into a mail inbox
From the example above, I want to imply we have to go through some steps in a specific order tocomplete a task. It is also applied for two PCs to communicate with each other. They have to use
a predefined model, named OSI, to complete each step. There are 7 steps in this model as listed
below:
This is also the well-known table of the OSI model so you must take time to learn by heart. A
popular way to remember this table is to create a fun sentence with the first letters of each layer.For example: All People Seem To Need Data Processing or a more funny sentence sorted from
layer 1 to layer 7: PleaseDo Not Throw Sausage Pizza Away.
There are two notices about this table:
1. First, the table is arranged from top to bottom (numbering from 7 to 1). Each step is called a
layer so we have 7 layers (maybe we usually call them layers to make them moretechnical ^^).
When a device wants to send information to another one, its data must go from top to bottomlayer. But when a device receives this information, it must go from bottom to top todecapsulate it. In fact, the reverse action at the other end is very natural in our life. It is very
similar when two people communicate via mail. First, the writer must write the letter, insert it
into an envelope while the receiver must first open the envelope and then read the mail. Thepicture below shows the whole process of sending and receiving information.
8/13/2019 Computer Networking Definitions
22/29
Note: The OSI model layers are often referred to by number than by name (for example, we refer
saying layer 3 to network layer) so you should learn the number of each layer as well.2. When the information goes down through layers (from top to bottom), a header is added to it.
This is called encapsulation because it is like wrapping an object in a capsule. Each header canbe understood only by the corresponding layer at the receiving side. Other layers only see that
layers header as a part of data.
8/13/2019 Computer Networking Definitions
23/29
At the receiving side, corresponding header is stripped off in the same layer it was attached.
Understand each layer
Layer 7Application layer
This is the closest layer to the end user. It provides the interface between the applications we use
and the underlying layers. But notice that the programs you are using (like a web browserIE,Firefox or Opera) do not belong to Application layer. Telnet, FTP, email client (SMTP),
HyperText Transfer Protocol (HTTP) are examples of Application layer.
Layer 6Presentation layer
This layer ensures the presentation of data, that the communications passing through are in the
appropriate form for the recipient. In general, it acts as a translator of the network. For example,you want to send an email and the Presentation will format your data into email format. Or you
want to send photos to your friend, the Presentation layer will format your data into GIF, JPG or
PNG format.
Layer 5Session layer
Layer 5 establishes, maintains and ends communication with the receiving device.
Layer 4Transport layer
This layer maintains flow control of data and provides for error checking and recovery of data
between the devices. The most common example of Transport layer is Transmission ControlProtocol (TCP) and User Datagram Protocol (UDP).
8/13/2019 Computer Networking Definitions
24/29
Layer 3Network layer
This layer provides logical addresses which routers will use to determine the path to the
destination. In most cases, the logic addresses here means the IP addresses (including source &destination IP addresses).
Layer 2Data Link LayerThe Data Link layer formats the message into a data frame, and adds a header containing the
hardware destination and source address to it. This header is responsible for finding the next
destination device on a local network.
Notice that layer 3 is responsible for finding the path to the last destination (network) but it
doesnt care about who will be the next receiver. It isthe Layer 2 that helps data to reach the nextdestination.
This layer is subdivide into 2 sub-layers: logical link control (LLC) and media access control
(MAC).
The LLC functions include:+ Managing frames to upper and lower layers
+ Error Control+ Flow control
The MAC sublayer carries the physical address of each device on the network. This address is
more commonly called a devices MAC address. MAC address is a 48 bits address which isburned into the NIC card on the device by its manufacturer.
Layer 1Physical layer
The Physical Layer defines the physical characteristics of the network such as connections,
voltage levels and timing.
To help you remember the functions of each layer more easily, I created a fun story in which
Henry (English) wants to send a document to Charles (French) to demonstrate how the OSI
model works.
8/13/2019 Computer Networking Definitions
25/29
8/13/2019 Computer Networking Definitions
26/29
Lastly, I summarize all the important functions of each layer in the table below (please remember
them, they are very important knowledge you need to know about OSI model):
Layer Description Popular Protocols Protocol Data
Unit
Devices
operate in
this layer
Application + User interface HTTP, FTP, TFTP,
Telnet, SNMP,
DNS
Data
Presentation + Data representation,
encryption & decryption
+ Video (WMV,
AVI)
+ Bitmap (JPG,
BMP, PNG)+ Audio (WAV,
MP3, WMA).
Data
Session + Set up, monitor &
terminate the connection
session
+ SQL, RPC,
NETBIOS names
Data
Transport + Flow control (Buffering,
Windowing, Congestion
Avoidance) helps prevent
the loss of segments on the
network and the need for
retransmission
+ TCP
(Connection-
Oriented, reliable)
+ UDP
(Connectionless,
unreliable)
Segment
Network + Path determination
+ Source & Destination
logical addresses
+ IP
+ IPX
+ AppleTalk
Packet/Datagram Router
Data Link + Physical addresses
Includes 2 layers:
+ Upper layer: LogicalLink Control (LLC)
+ Lower layer: Media
Access Control (MAC)
+ LAN
+ WAN (HDLC,
PPP, Frame
Relay)
Frame Switch,
Bridge
8/13/2019 Computer Networking Definitions
27/29
Physical Encodes and transmits
data bits
+ Electric signals+ Radio signals
+ FDDI, Ethernet Bit (0, 1) Hub,
Repeater
Note: In fact, OSI is just is a theoretical model of networking. The practical model used inmodern networks is the TCP/IP model. You may think Hm, its just theoretic and has no use inreal life! I dont care! but believe me, you will use this model more often than the TCP/IP
model so take time to grasp it, you will not regretI promise :)
Website:http://help.slamdot.com/idx/0/057/What-are-the-types-of-DNS-records
What are the types of DNS records?There are 5 types of DNS records:
A, CNAME, NS, MX, and PTR
A records
Address (A) records direct a hostname to a numerical IP address. For example, if you want
mycomputer.yourdomain.com to point to your home computer (which is, for example, 192.168.0.3),
you would enter a record that looks like:
mycomputer.yourdomain.com. A 192.168.0.3
Important: You must put a period after the hostname. Do not put periods after IP addresses.
CNAME records
CNAME allows a machine to be known by one or more hostnames. There must always be an A
record first, and this is known as the canonical or official name. For example:
yourdomain.com. A 192.168.0.1
Using CNAME, you can point other hostnames to the canonical (A record) address. For example:
ftp.yourdoman.com. CNAME yourdomain.com.
mail.yourdomain.com. CNAME yourdomain.com.
http://help.slamdot.com/idx/0/057/What-are-the-types-of-DNS-recordshttp://help.slamdot.com/idx/0/057/What-are-the-types-of-DNS-recordshttp://help.slamdot.com/idx/0/057/What-are-the-types-of-DNS-recordshttp://help.slamdot.com/idx/0/057/What-are-the-types-of-DNS-records8/13/2019 Computer Networking Definitions
28/29
ssh.yourdomin.com. CNAME yourdomain.com.
CNAME records make it possible to access your domain through ftp.yourdomain.com,
mail.yourdomain.com, etc. Without a proper CNAME record, you will not be able to connect to your
server using such addresses.
Entering a CNAME record
If you wanted home.yourdomain.com to point to yourdomain.com, we could enter the record in two
ways:
home CNAME yourdomain.com
The first method allows you to simply enter the subdomain. Do not put a period after the subdomain
name.
- OR -
home.yourdomain.com. CNAME yourdomain.com
The second method requires you to enter the entire hostname, followed by a period.
NAMESERVER (NS) records
NS records specify the authoritative nameservers for the domain.
Important: Changing NS records may cause your site to stop working. There is generally no need to
change NS records.
Entering an NS record
The first step is to delete the old NS records from the table above.
Then, enter two new nameservers records. Be sure that the nameserver hostname is followed by a
period, as in this example:
yourdomain.com NS ns1.slamdot.com.
Be sure to put a period after the nameserver hostname in an NS record (ns1.slamdot.com. and notns1.slamdot.com ).
MX records
Free e-mail services such as everyone.net require that MX changes be made in order for their
software to work. This change allows mail destined for your domain to be directed to their
8/13/2019 Computer Networking Definitions
29/29
server. Please note that changing MX records will prevent your current POP3 accounts, forwarders,
autoresponders, and mailing lists from functioning.
First, delete the old MX record by clicking the Delete iconunder "Actions." There should now be no
MX records listed.
Next, click Create DNS Recordand enter a name for your MX record. Select MX for the type, and
type in the hostname in the value field, followed by a period, given to you by the e-mail provider.
Then select the priority level (usually 10) from the dropdown box. The priority level will also be given
to you by the e-mail provider. Click Create Record.
Note: Be sure to put a period at the end of the hostname.
To restore the original MX settings, enter yourdomain.com. and priority 0 after deleting the other MX
record.
PTR records
Pointer records (PTR) are used for reverse lookups. For example, to make 192.168.0.1 resolve to
www.yourdomain.com, the record would look like:
1.0.168.192.in-addr.arpa PTR www.yourdomain.com.
Note: The IP address is reversed in the first field. Please use a period after your hostname (second
field).
Thein-addr-arpamethod is the most frequently used.
Important: PTR records are effective only if your site has its own IP address.
Important: PTR records are only effective if named.conf is manually edited and the proper zone
information is added. This can only be done by a root user (the server Admin).