410 likes | 578 Views
COMP3122 Network Management. Richard Henson April 2012. Week 9 – Connectivity and IP addressing Issues. Learning Objectives: Explain the meaning of class A, B, C, IPv4 addresses Apply principles of IPv4 addressing and subnet masks to the matter of optimising packet size in a LAN
E N D
COMP3122 Network Management Richard Henson April 2012
Week 9 – Connectivity and IP addressing Issues • Learning Objectives: • Explain the meaning of class A, B, C, IPv4 addresses • Apply principles of IPv4 addressing and subnet masks to the matter of optimising packet size in a LAN • Explain the advantages of terminal emulation and other ways of doing the processing elsewhere…
What is connectivity? • The sum total of how well hardware & software integrate to provide smooth passage of data between programs on different machines • includes mobile platforms • Now taken completely for granted; not always the case • HUGE thank you to OSI (open Systems Interconnect)
Evolution of “connectivity” • Proprietary Systems & “lock in” • poor connectivity not necessarily considered to be a problem by companies such as IBM and ICL… • “locked” customers into their products • not popular with customers • wanted to be able to buy freely • also a barrier to communication: • between companies • sometimes different parts of the same company! • using incompatible systems!
Principles of Connectivity - 1 • For a client to connect to another computer… • the two devices need a common protocol covering all 7 OSI layers • For a network, client needs to be able to run the default protocol for that network • Example: • For a Windows Server machine to connect to a Netware server it needs to run IPX/SPX • can easily be added to the client machine’s protocol stack • connection to Netware servers then possible via hub/router and the Novell login
Principles of Connectivity - 2 • Client machines on one network should also be able to connect to resources on another network: • follow principle 1 • install additional software on each client machine that will allow connection to resources using names from the other network’s resource database • Example: use a Netware printer from an XP client • set up NWLink • set up client service for Netware (CSNW)
Principles of Connectivity - 3 • Client machines on one network should be able to connect to shared folders on servers on another network: • follow principle 1 • install software on the local server that will connect to the relevant remote server(s) • clients connect to the remote share via the local server
Principles of Connectivity - 4 • Example: use a Netware shared directory from an XP client • install NWLInk on Windows XP clients and server • install Gateway Services for Netware (GSNW) on the relevant Windows 2003 Server • the Netware share becomes available as a Windows 2003 Server share • local clients can link to the share use the “map“ command
Further (Deeper) aspects of IP addressing • An IP address is made up of four fields • Each field is represented by a single byte • Divided into two sections: • host address (first field/s) • network address (remaining field/s
IPv4 Address Classes • IPv4 = 4 sets of numbers • Depending on the dividing position between “host” and “network”, IP addresses are categorised as different types (classes) w x y z
IPv4 Address Classes • Several address classes: • Class A (w then x.y.z) • For networks with many hosts • High order bit in first field set to 0 • Class B (w.x then y.z) • For medium sized networks • High order bits in fields 1 and 2 set to 1-0 • Class C (w.x.y then z) • For small LANs • High order bits in fields 1,2,3,4 set to 1-1-0-1
Subnet Masks • Purpose is to inform the hosts which bits in the full 32-bit IP address correspond to the network address and which bits correspond to the host address • Value depends on whether it is a class A, class B, or class C network: • Class C: 255.255.255.0 • Class B: 255.255.0.0 • Class A: 255.0.0.0
Subnet Mask interaction with IPv4 addresses • A binary “mask” works by using logical AND with itself and a data value to set that value to zero (i.e. it is “masked”) • If one or more of the IPv4 numbers can be “masked”, it/they need not be included in packet headers (zero value assumed)
Subnet Masks and Network Packet Optimisation • Value of subnet mark therefore relates directly to efficiency of management of network traffic • determines packet header size • should be a small as possible • Various formulae available for calculating subnet mask e.g. logical AND
Logical AND in Practice • The result of the AND operation is 1 only when both bits being ANDed are 1 • otherwise, the result is 0 • IPv4 performs a logical AND comparison with the 32-bit IPv4 address and the 32-bit subnet mask • known as a bit-wise logical AND • result of is the subnet prefix
Example (1) • To determine the subnet prefix of the IPv4 address configuration 131.107.189.41 with a subnet mask of 255.255.240.0… • turn both numbers into their binary equivalents, and line them up • perform the AND operation on each bit • write down the result
Example (2) • IPv4 Address: • 10000011 01101011 10111101 00101001 • Subnet Mask: • 11111111 11111111 11110000 00000000 • Subnet Prefix: • 10000011 01101011 10110000 00000000
Subnet Masking a small (class C) network witthout doing the Maths… • Only a single subnet is involved: • e.g. 193.134.23.1 to 193.134.23.254 • (0 and 255 normally not used on last number) • up to 254 devices can be supported • Subnet mask will mask the first three numbers… • hence 255.255.255.0
Subnetting a Class B network • Two IPv4 numbers involved after masking • e.g. 129.123.1.1 to 129.123.254.254 • Supports up to 255 x 254 devices (about 64K) • Optimium subnet mask depends on whether devices nearer to 254 or 64K • e.g. 5000 user network: 255.255.128.0 • 500 user network: 255.255.254.0
Subnetting a Class A network • Three IPv4 numbers involved after masking • e.g. 75.0.0.0 to 75.255.255.254 • Supports network size up to 255 x 255 x 254 (about 16 million) • rarely used in practice as a single network • 255.128.0.0 would mask optimally a 10000 user network
Reserved IP addresses • 127.0.0.1 to 127.255.255.255.255 • used for loopback testing • Private addresses for Internal networks: • Class A 10.0.0.0 to 10.255.255.255 • Class B 172.16.0.0 to 172.31.255.255 • Class C 192.168.0.0 to 192.168.255.255
Terminal Emulation • All about making a PC or other device behave as if it was a dumb terminal (!) (thin client becomes 2D?) • achieved through software running on client that effectively bypasses the CPU for many processes and sends them to the server • Historically, terminal emulation has produced a text-based screen display • low usage of bandwidth • Windows-based terminal emulation products available for some time • but.. higher usage of bandwidth to support GUI
Why Use Terminal Emulation? • Advantages: • lower TCO • makes use of old PCs (even old Pentium I, II) • saves money having to upgrade existing machines • screen response very fast • enhanced security (no use of local memory or h/d) • remote server access for administrators • remote client support • Disadvantages • extra CPU and memory demands on the server • still use some bandwidth • clients running applications locally would use zero bandwidth
Terminal Emulation Options • Citrix Metaframe • very popular before Windows released Terminal Server • still an important player… • Windows Terminal Server • why bother with something else if the product is already supplied… and works?
Windows Servers & Terminal Server (1) • Like Citrix, allows multiuser access to a Server at low bandwidth (e.g. using a standard telephone link) • Windows-based applications can run on the server and utilise just a user interface at the client end • low bandwidth because just keystrokes, mouse clicks and mouse movements are communicated • Standard interface: users may have different hardware, but the screen display will be the same, no matter what the platform
Windows Servers & Terminal Server (2) • Terminal Server • Manages resources at the server end for each client session • Gives each user their unique desktop • Receives and processes all keystrokes and mouse actions • Directs all display output to the appropriate client • Terminal Client: • Just displays the desktop and GUI
Windows Servers & Terminal Server (3) • A Terminal Services client “session” • opens on the client as a window within the existing local desktop • remote desktop runs within that window • only uses CPU power to connect with the server and display the user interface • strictly speaking a “thin” client, but uses very few local CPU cycles beyond those needed to run the operating system
Windows Servers & Terminal Server (4) • Communications Protocol • RDP (Remote Desktop Protocol) • optimised to display graphical elements to the clients • application layer • runs on top of TCP/IP • like Microsoft NetMeeting, based on ITU T120 standard • http://www.imtc.org
Low Hardware & OS Requirements of Terminal Services… • Windows 2000/XP: • 32Mb RAM, Pentium processor • Windows 98: • 16Mb RAM, 486 • Windows 95 (or even 3.1!!) • 16Mb RAM, 386 • Windows CE • depends on the vendor • If non-windows platform • use Citrix metaframe
Client-end Terminal Services Software • Versions: • 16-bit for Windows-based computers running very old Windows for Workgroups with the 32-bit TCP/IP stack • 32-bit Windows-based computers • 64-bit with recent Windows (e.g. w2k3 r2)… • Client support for: • Windows CE Handheld PC • Windows-based terminals
Applications and Terminal Services • 32-bit applications run more efficiently • using legacy 16-bit apps: • reduced number of users can be connected • increased memory overhead • 64-bit systems even more efficient..
Terminal Services (Windows 2003 Enhancements) • More users supported per high-end server • Windows Management Instrumentation (WMI) provider enhances remote management capabilities • "Terminal Services Client“ -> Remote Desktop Connection • RDP 5.1 client features a much improved user interface • Remote desktop users can: • save connection settings • easily switch between windowed and full screen mode • dynamically alter their remote experience to match the available bandwidth
Terminal Services & Windows 2003 - continued • Many local resources now available within the remote session, including: • client file system, smart cards, audio (output), serial ports, printers (including network), and the clipboard • Allows users to easily take advantage of the capabilities of their client device from within the remote session • e.g. files can be opened, saved and printed to the users local PC, regardless of whether the application is running locally or remotely • improved software restriction policies, roaming profile enhancements, and new application compatibility modes. • colour depth can be selected from 256 colors (8-bit) to True Color (24-bit), and resolution can be set from 640 x 480 up to 1600 x 120
Terminal Servers • Preferably member servers, not domain controllers • need plenty of RAM (4-10 Mb required for each user) • recommended installed on an NTFS partition (multisession security for each users “live” data) & use fast, reliable hard disks (pref SCSI, SCSI-2 and RAID) • need a high performance network adapter card
Unix Terminal Emulation • Microsoft favours FAT client • Unix favours Thin client or terminal emulation • Packages like UWIN: • runs via a PC • emulates terminal services • give features of a traditional Unix operating system on a Windows platform desktop
Virtualisation (Windows 2008 Server, Citrix, VMware, etc.) • The use of software to allow a piece of hardware to run multiple operating system images at the same time • Possible to run Windows OS under Mac OS • run multiple versions of Windows OS on the same PC • Slightly different from terminal services but getting popular… • Enables the creation of a “virtual” (rather than actual) version of any software environment on the desktop, e.g. Operating Systems, a server, a storage device or networks, an application
“The Cloud” • Outsourcing on a grand scale… • With connectivity via world wide web • “Back to the Future” • Quote from IBM in 1950s: • “I think there is a world market for about five computers.” attributed to J. Watson • “The cloud” will behave like just one massive mainframe computer providing all user services • no FAT clients needed… just enough processing at the client end to run a browser • could be a very small device • could use wireless protocols to connect…
Web Services and The Cloud • Companies like Amazon, Google (apps), and salesforce.com have created web services (XML/http) and made them available to a wider public for storing their data • this approach benefits companies most that are experience relatively quick growth • instead of getting new storage resources every year, organisations can quickly and easily purchase more "cloud space"
Cloud Services, the future, and Security • Cloud computing can offer applications as-a-service as well… • a future is predicted where everything is outsourced and no kind of local CPU is even needed • employees will simply have a monitor, keyboard, and mouse that will allow them to connect to the cloud for all of their resources (!) • but will this be secure? And what comeback will organisations have if something goes wrong?
What (physically) is The Cloud • Lots of servers connected together in clusters to provide different services via the www • Attractive and powerful, but… • disadvantages of outsourcing in terms of control • and with the extra challenge that the user doesn’t know where there data physically is at a particular time… SCARY? • Server location also a matter of some concern for legal reasons…