miércoles, 17 de febrero de 2010

Capitulo 3 Cisco

Among the protocols for successful human communication are:
Identification of sender and receiver
Agreed-upon medium or channel (face-to-face, telephone, letter, photograph)
Appropriate communication mode (spoken, written, illustrated, interactive or one-way)
Common language
Grammar and sentence structure
Speed and timing of delivery
Protocols define the details of how the message is transmitted, and delivered. This includes issues of:
Message format
Message size
Timing
Encapsulation
Encoding
Standard message pattern

Encoding between hosts must be in an appropriate form for the medium. Messages sent across the network are first converted into bits by the sending host. Each bit is encoded into a pattern of sounds, light waves, or electrical impulses depending on the network media over which the bits are transmitted. The destination host receives and decodes the signals in order to interpret the message.

a message that is sent over a computer network follows specific format rules for it to be delivered and processed. Just as a letter is encapsulated in an envelope for delivery, so computer messages are encapsulated. Each computer message is encapsulated in a specific format, called a frame, before it is sent over the network. A frame acts like an envelope; it provides the address of the intended destination and the address of the source host.

The format and contents of a frame are determined by the type of message being sent and the channel over which it is communicated. Messages that are not correctly formatted are not successfully delivered to or processed by the destination host.

when a long message is sent from one host to another over a network, it is necessary to break the message into smaller pieces. The rules that govern the size of the pieces, or frames, communicated across the network are very strict. They can also be different, depending on the channel used. Frames that are too long or too short are not delivered.

The size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirements. Each piece is encapsulated in a separate frame with the address information, and is sent over the network. At the receiving host, the messages are de-encapsulated and put back together to be processed and interpreted.

Likewise, it is necessary for computers to define an access method. Hosts on a network need an access method to know when to begin sending messages and how to respond when errors occur.

In network communication, a sending host can transmit messages at a faster rate than the destination host can receive and process. Source and destination hosts use flow control to negotiate correct timing for successful communication.

Hosts on the network also have rules that specify how long to wait for responses and what action to take if a response timeout occurs.

When a group of recipients need to receive the same message simultaneously, a one-to-many or one-to-all message pattern is necessary.

There are also times when the sender of a message needs to be sure that the message is delivered successfully to the destination. In these cases, it is necessary for the recipient to return an acknowledgement to the sender. If no acknowledgement is required, the message pattern is referred to as unacknowledged.

Hosts on a network use similar message patterns to communicate.

A one-to-one message pattern is referred to as a unicast, meaning that there is only a single destination for the message.

When a host needs to send messages using a one-to-many pattern, it is referred to as a multicast. Multicasting is the delivery of the same message to a group of host destinations simultaneously.

If all hosts on the network need to receive the message at the same time, a broadcast is used. Broadcasting represents a one-to-all message pattern. Additionally, hosts have requirements for acknowledged versus unacknowledged messages.

protocols are determined by the characteristics of the source, channel and destination. Based on the source, channel and destination, the protocols define the details for the issues of message format, message size, timing, encapsulation, encoding and standard message pattern.

Protocols are especially important on a local network. In a wired environment, a local network is defined as an area where all hosts must "speak the same language" or in computer terms "share a common protocol". The most common set of protocols used on local wired networks is Ethernet. The Ethernet protocol defines many aspects of communication over the local network, including: message format, message size, timing, encoding, and message patterns.

As networks became more widespread, standards were developed that defined rules by which network equipment from different vendors operated. Standards are beneficial to networking in many ways:
Facilitate design
Simplify product development
Promote competition
Provide consistent interconnections
Facilitate training
Provide more vendor choices for customers

There is no official local networking standard protocol, but over time, one technology, Ethernet, has become more common than the others. It has become a de facto standard.

The Institute of Electrical and Electronic Engineers, or IEEE (pronounced eye-triple-e), maintains the networking standards, including Ethernet and wireless standards. IEEE committees are responsible for approving and maintaining the standards for connections, media requirements and communications protocols. Each technology standard is assigned a number that refers to the committee that is responsible for approving and maintaining the standard. The committee responsible for the Ethernet standards is 802.3.

Since the creation of Ethernet in 1973, standards have evolved for specifying faster and more flexible versions of the technology. This ability for Ethernet to improve over time is one of the main reasons that it has become so popular. Each version of Ethernet has an associated standard. For example, 802.3 100BASE-T represents the 100 Megabit Ethernet using twisted pair cable standards. The standard notation translates as:
100 is the speed in Mbps
BASE stands for baseband transmission
T stands for the type of cable, in this case, twisted pair.

Early versions of Ethernet were relatively slow at 10 Mbps. The latest versions of Ethernet operate at 10 Gigabits per second and faster. Imagine how much faster these new versions are than the original Ethernet networks.

On Ethernet networks, a similar method exists for identifying source and destination hosts. Each host connected to an Ethernet network is assigned a physical address which serves to identify the host on the network.

Every Ethernet network interface has a physical address assigned to it when it is manufactured. This address is known as the Media Access Control (MAC) Address. The MAC address identifies each source and destination host on the network.

Ethernet networks are cable based, meaning that a copper or fiber optic cable connects hosts and networking devices. This is the channel used for communications between the hosts.

When a host on an Ethernet network communicates, it sends frames containing its own MAC address as the source and the MAC address of the intended recipient. Any hosts that receive the frame will decode the frame and read the destination MAC address. If the destination MAC address matches the address configured on the NIC, it will process the message and store it for the host application to use. If the destination MAC address does not match the host MAC address, the NIC will ignore the message.

The Ethernet protocol standards define many aspects of network communication including frame format, frame size, timing and encoding.

When messages are sent between hosts on an Ethernet network, the hosts format the messages into the frame layout that is specified by the standards. Frames are also referred to as Protocol Data Units (PDUs).

The format for Ethernet frames specifies the location of the destination and source MAC addresses, and additional information including:
Preamble for sequencing and timing
Start of frame delimiter
Length and type of frame
Frame check sequence to detect transmission errors

The size of Ethernet frames is limited to a maximum of 1518 bytes and a minimum size of 64 bytes from the Destination MAC Address field through the Frame Check Sequence. Frames that do not match these limits are not processed by the receiving hosts. In addition to the frame formats, sizes and timing, Ethernet standards define how the bits making up the frames are encoded onto the channel. Bits are transmitted as either electrical impulses over copper cable or as light impulses over fiber optic cable.

On an Ethernet network, the host MAC address is similar to a person's name. A MAC address indicates the individual identity of a specific host, but it does not indicate where on the network the host is located. If all hosts on the Internet (over 400 million of them) were each identified by only their unique MAC address, imagine how difficult it would be to locate a single one.

Additionally, Ethernet technology generates a large amount of broadcast traffic in order for hosts to communicate. Broadcasts are sent to all hosts within a single network. Broadcasts consume bandwidth and slow network performance. What would happen if the millions of hosts attached to the Internet were all in one Ethernet network and were using broadcasts?

For these two reasons, large Ethernet networks consisting of many hosts are not efficient. It is better to divide larger networks into smaller, more manageable pieces. One way to divide larger networks is to use a hierarchical design model.

In networking, hierarchical design is used to group devices into multiple networks that are organized in a layered approach. It consists of smaller, more manageable groups that allow local traffic to remain local. Only traffic that is destined for other networks is moved to a higher layer.

A hierarchical, layered design provides increased efficiency, optimization of function, and increased speed. It allows the network to scale as required because additional local networks can be added without impacting the performance of the existing ones.

The hierarchical design has three basic layers:
Access Layer - to provide connections to hosts in a local Ethernet network.
Distribution Layer - to interconnect the smaller local networks.
Core Layer - a high-speed connection between distribution layer devices.

With this new hierarchical design, there is a need for a logical addressing scheme that can identify the location of a host. This is the Internet Protocol (IP) addressing scheme.

On a host, the MAC address does not change; it is physically assigned to the host NIC and is known as the physical address. The physical address remains the same regardless of where the host is placed on the network.

The IP address is similar to the address of a person. It is known as a logical address because it is assigned logically based on where the host is located. The IP address, or network address, is assigned to each host by a network administrator based on the local network.

IP addresses contain two parts. One part identifies the local network. The network portion of the IP address will be the same for all hosts connected to the same local network. The second part of the IP address identifies the individual host. Within the same local network, the host portion of the IP address is unique to each host.

Both the physical MAC and logical IP addresses are required for a computer to communicate on a hierarchical network, just like both the name and address of a person are required to send a letter.

Access Layer

The Access Layer provides a connection point for end user devices to the network and allows multiple hosts to connect to other hosts through a network device, usually a hub or switch. Typically, all devices within a single Access Layer will have the same network portion of the IP address.

If a message is destined for a local host, based on the network portion of the IP address, the message remains local. If it is destined for a different network, it is passed up to the Distribution Layer. Hubs and switches provide the connection to the Distribution Layer devices, usually a router.

Distribution Layer

The Distribution Layer provides a connection point for separate networks and controls the flow of information between the networks. It typically contains more powerful switches than the Access Layer as well as routers for routing between networks. Distribution Layer devices control the type and amount of traffic that flows from the Access Layer to the Core Layer.

Core Layer

The Core Layer is a high-speed backbone layer with redundant (backup) connections. It is responsible for transporting large amounts of data between multiple end networks. Core Layer devices typically include very powerful, high-speed switches and routers. The main goal of the Core Layer is to transport data quickly.

The Access Layer is the most basic level of the network. It is the part of the network in which people gain access to other hosts and to shared files and printers. The Access Layer is composed of host devices, as well as the first line of networking devices to which they are attached.

Networking devices enable us to connect many hosts with each other and also provide those hosts access to services offered over the network. Unlike the simple network consisting of two hosts connected by a single cable, in the Access Layer, each host is connected to a networking device. This type of connectivity is shown in the graphic.

Within an Ethernet network, each host is able to connect directly to an Access Layer networking device using a point-to-point cable. These cables are manufactured to meet specific Ethernet standards. Each cable is plugged into a host NIC and then into a port on the networking device. There are several types of networking devices that can be used to connect hosts at the Access Layer, including Ethernet hubs and switches.

A hub is one type of networking device that is installed at the Access Layer of an Ethernet network. Hubs contain multiple ports that are used to connect hosts to the network. Hubs are simple devices that do not have the necessary electronics to decode the messages sent between hosts on the network. Hubs cannot determine which host should get any particular message. A hub simply accepts electronic signals from one port and regenerates (or repeats) the same message out all of the other ports.

Remember that the NIC on a host accepts messages only addressed to the correct MAC address. Hosts ignore messages that are not addressed to them. Only the host specified in the destination address of the message processes the message and responds to the sender.

All of the ports on the Ethernet hub connect to the same channel to send and receive messages. Because all hosts must share the bandwidth available on that channel, a hub is referred to as a shared-bandwidth device.

Only one message can be sent through an Ethernet hub at a time. It is possible for two or more hosts connected to a hub to attempt to send a message at the same time. If this happens, the electronic signals that make up the messages collide with each other at the hub.

A collision causes the messages to become garbled and unreadable by the hosts. A hub does not decode the messages; therefore it does not detect that the message is garbled and repeats it out all the ports. The area of the network where a host can receive a garbled message resulting from a collision is known as a collision domain.

Inside a collision domain, when a host receives a garbled message, it detects that a collision has occurred. Each sending host waits a short amount of time and then attempts to send, or retransmit, the message again. As the number of hosts connected to the hub increases, so does the chance of collisions. More collisions cause more retransmissions. Excessive retransmissions can clog up the network and slow down network traffic. For this reason, it is necessary to limit the size of a collision domain.

n Ethernet switch is a device that is used at the Access Layer. Like a hub, a switch connects multiple hosts to the network. Unlike a hub, a switch can forward a message to a specific host. When a host sends a message to another host on the switch, the switch accepts and decodes the frames to read the physical (MAC) address portion of the message.

A table on the switch, called a MAC address table, contains a list of all of the active ports and the host MAC addresses that are attached to them. When a message is sent between hosts, the switch checks to see if the destination MAC address is in the table. If it is, the switch builds a temporary connection, called a circuit, between the source and destination ports. This new circuit provides a dedicated channel over which the two hosts can communicate. Other hosts attached to the switch do not share bandwidth on this channel and do not receive messages that are not addressed to them. A new circuit is built for every new conversation between hosts. These separate circuits allow many conversations to take place at the same time, without collisions occurring.

What happens when the switch receives a frame addressed to a new host that is not yet in the MAC address table? If the destination MAC address is not in the table, the switch does not have the necessary information to create an individual circuit. When the switch cannot determine where the destination host is located, it uses a process called flooding to forward the message out to all attached hosts. Each host compares the destination MAC address in the message to its own MAC address, but only the host with the correct destination address processes the message and responds to the sender.

How does the MAC address of a new host get into the MAC address table? A switch builds the MAC address table by examining the source MAC address of each frame that is sent between hosts. When a new host sends a message or responds to a flooded message, the switch immediately learns its MAC address and the port to which it is connected. The table is dynamically updated each time a new source MAC address is read by the switch. In this way, a switch quickly learns the MAC addresses of all attached hosts.

Sometimes, it is necessary to connect another networking device, like a hub, to a switch port. This is done to increase the number of hosts that can be connected to the network. When a hub is connected to a switch port, the switch associates the MAC addresses of all hosts connected to that hub with the single port on the switch. Occasionally, one host on the attached hub sends a message to another host attached to the same hub. In this case, the switch receives the frame and checks the table to see where the destination host is located. If both the source and destination hosts are located on the same port, the switch discards the message.

When a hub is connected to a switch port, collisions can occur on the hub. The hub forwards to all ports the damaged messages resulting from a collision. The switch receives the garbled message, but, unlike a hub, a switch does not forward the damaged messages caused by collisions. As a result, every switch port creates a separate collision domain. This is a good thing. The fewer hosts contained in a collision domain, the less likely it is that a collision will occur.

When hosts are connected using either a hub or a switch, a single local network is created. Within the local network it is often necessary for one host to be able to send messages to all the other hosts at the same time. This can be done using a message known as a broadcast. Broadcasts are useful when a host needs to find information without knowing exactly what other host can supply it or when a host wants to provide information to all other hosts in the same network in a timely manner.

A message can only contain one destination MAC address. So, how is it possible for a host to contact every other host on the local network without sending out a separate message to each individual MAC?

To solve this problem, broadcast messages are sent to a unique MAC address that is recognized by all hosts. The broadcast MAC address is actually a 48-bit address made up of all ones. Because of their length, MAC addresses are usually represented in hexadecimal notation. The broadcast MAC address in hexadecimal notation is FFFF.FFFF.FFFF. Each F in the hexadecimal notation represents four ones in the binary address.

When a host receives a message addressed to the broadcast address, it accepts and processes the message as though the message was addressed directly to it. When a host sends a broadcast message, hubs and switches forward the message to every connected host within the same local network. For this reason, a local network is also referred to as a broadcast domain.

If too many hosts are connected to the same broadcast domain, broadcast traffic can become excessive. The number of hosts and the amount of network traffic that can be supported on the local network is limited by the capabilities of the hubs and switches used to connect them. As the network grows and more hosts are added, network traffic, including broadcast traffic, increases. It is often necessary to divide one local network, or broadcast domain, into multiple networks to improve performance.

On a local Ethernet network, a NIC only accepts a frame if the destination address is either the broadcast MAC address, or else corresponds to the MAC address of the NIC.

Most network applications, however, rely on the logical destination IP address to identify the location of the servers and clients.

What if a sending host only has the logical IP address of the destination host? How does the sending host determine what destination MAC address to place within the frame?

The sending host can use an IP protocol called address resolution protocol (ARP) to discover the MAC address of any host on the same local network.

ARP uses a three step process to discover and store the MAC address of a host on the local network when only the IP address of the host is known.

1. The sending host creates and sends a frame addressed to a broadcast MAC address. Contained in the frame is a message with the IP address of the intended destination host.

2. Each host on the network receives the broadcast frame and compares the IP address inside the message with its configured IP address. The host with the matching IP address sends its MAC address back to the original sending host.

3. The sending host receives the message and stores the MAC address and IP address information in a table called an ARP table.

Once the sending host has the MAC address of the destination host in its ARP table, it can send frames directly to the destination without doing an ARP request.

As networks grow, it is often necessary to divide one local network into multiple Access Layer networks. There are many ways to divide networks based on different criteria, including:
Physical location
Logical function
Security requirements
Application requirements

The Distribution Layer connects these independent local networks and controls the traffic flowing between them. It is responsible for ensuring that traffic between hosts on the local network stays local. Only traffic that is destined for other networks is passed on. The Distribution Layer can also filter incoming and outgoing traffic for security and traffic management.

Networking devices that make up the Distribution Layer are designed to interconnect networks, not individual hosts. Individual hosts are connected to the network via Access Layer devices, such as hubs and switches. The Access Layer devices are connected to each other via the Distribution Layer device, such as routers.

A router is a networking device that connects a local network to other local networks. At the Distribution Layer of the network, routers direct traffic and perform other functions critical to efficient network operation. Routers, like switches, are able to decode and read the messages that are sent to them. Unlike switches, which only decode (unencapsulate) the frame containing the MAC address information, routers decode the packet that is encapsulated within the frame.

The packet format contains the IP addresses of the destination and source hosts, as well as the message data being sent between them. The router reads the network portion of the destination IP address and uses it to find which one of the attached networks is the best way to forward the message to the destination.

Anytime the network portion of the IP addresses of the source and destination hosts do not match, a router must be used to forward the message. If a host located on network 1.1.1.0 needs to send a message to a host on network 5.5.5.0, the host will forward the message to the router. The router receives the message and unencapsulates it to read the destination IP address. It then determines where to forward the message. It re-encapsulates the packet back into a frame, and forwards the frame on to its destination.

How does the router determine what path to send the message to get to the destination network?

Each port, or interface, on a router connects to a different local network. Every router contains a table of all locally-connected networks and the interfaces that connect to them. These routing tables can also contain information about the routes, or paths, that the router uses to reach other remote networks that are not locally attached.

When a router receives a frame, it decodes the frame to get to the packet containing the destination IP address. It matches the address of the destination to all of the networks that are contained in the routing table. If the destination network address is in the table, the router encapsulates the packet in a new frame in order to send it out. It forwards the new frame out of the interface associated with the path, to the destination network. The process of forwarding the packets toward their destination network is called routing.

Router interfaces do not forward messages that are addressed to the local network broadcast IP address. As a result, local network broadcasts are not sent across routers to other local networks.

The method that a host uses to send messages to a destination on a remote network differs from the way a host sends messages on the same local network. When a host needs to send a message to another host located on the same network, it will forward the message directly. A host will use ARP to discover the MAC address of the destination host. It includes the destination IP address within the packet and encapsulates the packet into a frame containing the MAC address of the destination and forwards it out.

On the other hand, when a host needs to send a message to a remote network, it must use the router. The host includes the IP address of the destination host within the packet just like before. However, when it encapsulates the packet into a frame, it uses the MAC address of the router as the destination for the frame. In this way, the router will receive and accept the frame based on the MAC address.

How does the source host determine the MAC address of the router? A host is given the IP address of the router through the default gateway address configured in its TCP/IP settings. The default gateway address is the address of the router interface connected to the same local network as the source host. All hosts on the local network use the default gateway address to send messages to the router. Once the host knows the default gateway IP address, it can use ARP to determine the MAC address. The MAC address of the router is then placed in the frame, destined for another network.

It is important that the correct default gateway be configured on each host on the local network. If no default gateway is configured in the host TCP/IP settings, or if the wrong default gateway is specified, messages addressed to hosts on remote networks cannot be delivered.

The method that a host uses to send messages to a destination on a remote network differs from the way a host sends messages on the same local network. When a host needs to send a message to another host located on the same network, it will forward the message directly. A host will use ARP to discover the MAC address of the destination host. It includes the destination IP address within the packet and encapsulates the packet into a frame containing the MAC address of the destination and forwards it out.

On the other hand, when a host needs to send a message to a remote network, it must use the router. The host includes the IP address of the destination host within the packet just like before. However, when it encapsulates the packet into a frame, it uses the MAC address of the router as the destination for the frame. In this way, the router will receive and accept the frame based on the MAC address.

How does the source host determine the MAC address of the router? A host is given the IP address of the router through the default gateway address configured in its TCP/IP settings. The default gateway address is the address of the router interface connected to the same local network as the source host. All hosts on the local network use the default gateway address to send messages to the router. Once the host knows the default gateway IP address, it can use ARP to determine the MAC address. The MAC address of the router is then placed in the frame, destined for another network.

It is important that the correct default gateway be configured on each host on the local network. If no default gateway is configured in the host TCP/IP settings, or if the wrong default gateway is specified, messages addressed to hosts on remote networks cannot be delivered.

Routers move information between local and remote networks. To do this, routers must use both ARP and routing tables to store information. Routing tables are not concerned with the addresses of individual hosts. Routing tables contain the addresses of networks and the best path to reach those networks. Entries can be made to the routing table in two ways: dynamically updated by information received from other routers in the network, or manually entered by a network administrator. Routers use the routing tables to determine which interface to use to forward a message to its intended destination.

If the router cannot determine where to forward a message, it will drop it. Network administrators configure a routing table with a default route to keep a packet from being dropped because the path to the destination network is not in the routing table. A default route is the interface through which the router forwards a packet containing an unknown destination IP network address. This default route usually connects to another router that can forward the packet towards its final destination network.

A router forwards a frame to one of two places: a directly connected network containing the actual destination host, or to another router on the path to reach the destination host. When a router encapsulates the frame to forward it out of an Ethernet interface, it must include a destination MAC address.

This is the MAC address of the actual destination host, if the destination host is part of a network locally connected to the router. If the router must forward the packet to another router, it will use the MAC address of the connected router. Routers obtain these MAC addresses from ARP tables.

Each router interface is part of the local network to which it is attached and maintains its own ARP table for that network. The ARP tables contain the MAC addresses and IP addresses of all of the individual hosts on that network.

The term Local Area Network (LAN) refers to a local network, or a group of interconnected local networks that are under the same administrative control. In the early days of networking, LANs were defined as small networks that existed in a single physical location. While LANs can be a single local network installed in a home or small office, the definition of LAN has evolved to include interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings and locations.

The important thing to remember is that all of the local networks within a LAN are under one administrative control. Other common characteristics of LANs are that they typically use Ethernet or wireless protocols, and they support high data rates.

The term Intranet is often used to refer to a private LAN that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.

Within a LAN, it is possible to place all hosts on a single local network or divide them up between multiple networks connected by a Distribution Layer. The answer depends on desired results. Placing all hosts on a single local network allows them to be seen by all other hosts. This is because there is one broadcast domain and hosts use ARP to find each other.

In a simple network design it may be beneficial to keep all hosts within a single local network. However, as networks grow in size, increased traffic will decrease network performance and speed. In this case, it may be beneficial to move some hosts onto a remote network.

Placing additional hosts on a remote network will decrease the impact of traffic demands. However, hosts on one network will not be able to communicate with hosts on the other without the use of routing. Routers increase the complexity of the network configuration and can introduce latency, or time delay, on packets sent from one local network to the other.

Most local networks are based on Ethernet technology. This technology is both fast and efficient when used in a properly designed and constructed network. The key to installing a good network is planning before the network is actually built.

A network plan starts with the gathering of information about how the network will be used. This information includes:
The number and type of hosts to be connected to network
The applications to be used
Sharing and Internet connectivity requirements
Security and privacy considerations
Reliability and uptime expectations
Connectivity requirements including, wired and wireless

There are many considerations that must be taken into account when planning for a network installation. The logical and physical topology maps of the network need to be designed and documented before the networking equipment is purchased and the hosts are connected. Some things to consider include:

Physical environment where the network will be installed:
Temperature control: all devices have specific ranges of temperature and humidity requirements for proper operation
Availability and placement of power outlets

Physical configuration of the network:
Physical location of devices such as routers, switches, and hosts
How all devices are interconnected
Location and length of all cable runs
Hardware configuration of end devices such as hosts and servers

Logical configuration of the network:
Location and size of broadcast and collision domains
IP addressing scheme
Naming scheme
Sharing configuration
Permissions

Once the network requirements are documented, and the physical and logical topology maps created, the next step in the implementation process is to test the network design. One of the ways to test a network design is to create a working model, or prototype, of the network.

Prototyping is essential as networks grow in size and complexity. A prototype allows a network administrator to test whether or not the planned network will operate as expected, before money is spent on equipment and installation. Documentation should be maintained on all aspects of the prototyping process.

Various tools and techniques are available for network prototyping; this includes real equipment set up in a lab environment, modeling and simulation tools. Packet Tracer is one example of a simulation and modeling tool that can be used for prototyping.

Most home and small business networks do not require high-volume devices used in large business environments; smaller scale devices may well be suitable. However, the same functionality of routing and switching is required. This need has led to the development of products that have the functionality of multiple network devices, such as a router with switching functionality and a wireless access point. For the purpose of this course, multi-function devices will be referred to as integrated routers. Integrated routers can range from small devices designed for home office and small business applications to more powerful devices that can support enterprise branch offices.

An integrated router is like having several different devices connected together. For example, the connection between the switch and the router still occurs, but it occurs internally. When a broadcast is received on a switch port, the integrated router forwards the broadcast to all ports including the internal router connection. The router portion of the integrated router stops the broadcasts from going any further.

There are low-cost multi-function devices available for home and small business networks that offer integrated routing, switching, wireless and security capabilities. An example of this type of integrated router is a Linksys wireless router. They are simple in design and do not typically have separate components. In the event of a failure, it is not possible to replace any single failed component. As such, they create a single point of failure, and are not optimized for any one function.


Another example of an integrated router is the Cisco integrated services router or ISR. The Cisco ISR product family offers a wide range of products, including those designed for small office and home office environments as well as those designed for larger networks. Many of the ISRs offer modularity and have separate components for each function, such as a switch component and a router component. This enables individual components to be added, replaced and upgraded as necessary.

All devices connected to the switch ports should be in the same broadcast domain. This means that all devices must have an IP address from the same network. Any device that has a different network portion within the IP address will not be able to communicate.

Additionally, Microsoft Windows makes use of computer names to identify other devices on the network. It is important to use these names as well as all IP address information in the planning and documentation to assist in future troubleshooting.

To display the current IP configuration in Microsoft Windows, use the command ipconfig. More detailed information, including host name, is available with the ipconfig /all. Document all information from the connection and configuration process.

Once hosts are communicating across the network, it is important to document network performance. This is known as determining the baseline for the network, and is used as an indication of normal operations. When comparing future network performance with the baseline, it can indicate if possible issues exist.

One of the most common purposes of networking is to share resources such as files and printers. Windows XP enables remote users to access a local machine and its resources through Sharing. It is important to consider security issues, and to assign specific permissions to shared resources.

By default, Windows XP uses a process known as Simple File Sharing. With Simple File Sharing, specific users and groups cannot be prevented from accessing shared files.

Simple File Sharing can be disabled so that more specific security access levels can be assigned. When this is done, the following permissions are available to assign to resources:
Full Control
Modify
Read & Execute
List Folder Contents
Read
Write

When a user accesses a file on a remote device, Windows Explorer allows the user to map a drive to a remote folder or resource. This maps a specific drive letter, for example M:, to the remote resource. This enables the user to treat the resource as though it was locally connected.

jueves, 11 de febrero de 2010

MAS DE QUARKXPRESS

Layout Properties:

Layout Name: nombre del proyecto, se puede cambiar posteriormente
Layout Tipe: aquí se elige si se trabajara en la red, con proyectos para imprimir o con proyectos interactivos
Page: tamaño de la hoja
Margin Guides: tamaño de los márgenes
Column Guides: número de colúmnas y distancia entre ellas

Barra Inferior:

El Zoom (izquierda): indica el porcentaje de zoom

Número 1: Al hacer click puede seleccionarse un 1 o una A; al seleccionar la A, aparece una cadena rota en la esquina superior de la hoja. Esta es el master; el master es una plantilla, que nos ayuda a no trabajar de más, y que varias hojas puedan tener el mismo formato.

Las herramientas en el centro de la barra, cuyo icono son cuadros horizontales y verticales, sirven para dividir la ventana en dos; cada nueva ventana tendrá un icono con un tache en la esquina por si se desea cerrarla.

Barra de Herramientas (Window > Tools):

Cruzeta (Item Tool): sirve para mover o borrar los elementos

Cuadro de Texto: al hacer click se despliegan iconos con cadenas; esta herramienta sirve únicamente para la inserción de texto; NO de imágenes. Las cadenas sirven para ligar un cuadro de texto con el otro, así, cuando no cabe ya el texto en ese cuadro, se liga a otro y el texto sobrante se despliega en el nuevo cuadro de texto. Quark XPress no es un procesador de texto, y se requiere copiar los textos; es por ello que no puede saberse si un solo cuadro de texto alcanzara para todo lo que se requiera insertar: para esto ligar cuadros de texto.

Figuras: inserción de imágenes

Las siguientes herramientas son para insertar líneas, flechas, figuras, tablas...

El último elemento de la barra es el zoom. Al hacerle click se despliega una mano; con ella podemos mover elementos que estén dentro de los cuadros. Con el zoom normal lo que se mueve no son los elementos dentro del cuadro, sino el cuadro completo.

En la barra measurment se puede modificar las características del texto. Paea insertar un texto se dibuja un cuadro de texto y se importa (Import) un documento .doc

Para añadir imágenes se dibuja un cuadro de imagen y se importa (Import) la imagen deseada.
Para ajustar el tamaño de la imagen al del cuadro de imagen se puede reurrir a las herramientas: Style > Stretch Picture to Box / Scale picture to box (no se modifican las proporciones de la imagen orginial / center.

en el menú item > shape puede elegirse la forma del cuadro de imagen. Para crear una nueva forma, se selecciona la forma parecida a la paleta de pintor y, en la barra de herramientas (tools) se selecciona la primera opción (una plumilla) en el icono que se encuentra arriba de la tabla para agregar y quitar puntas, y la penúltima opción (flecha blanca) para modificar la forma.


Page Layout: (window > page layout)
este menú está dividido en dos, la parte superior muestra los masters y la inferior las hojas que tiene el proyecto.
El primer icono desde la izquierda, al ser arrastrado con el mouse hacia abajo, crea una nueva hoja; esta hoja no está incluida en ningún master: esto es útil para la portada, porque así el master no se modifica. Si se quiere crear una hoja que pertenezca a un master, se hace click en la hoja junto a "Master" y se arrastra hacia la sección de abajo.
El icono con hojas dobladas por la esquina, permite agregar hojas cuando está habilitada la opción "facing pages".
El tercer icono sirve para duplicar los masters; se selecciona el Master y se hace click en este icono.
El último icono sirve para crear las "secciones". Estas secciones ayudan a dividir el proyecto en partes: por ejemplo cuando en un libro el prólogo está numerado con el sistema romano, y las demás páginas on numeración arábiga.

Style Sheets

Este menú está también divido en dos partes. Sirve para guardar los estilos a utilizar en un proyecto: así sólo seleccionamos el estilo y no hay que repetirlo.

Para crear un nuevo estilo de párrafo se hace click en "new" (el primer icono) de la sección de arriba. Se abre una ventana nueva para seleccionar las características del estilo:
En "Keyboard Equivalent" se puede poner un atajo (F5, F15 etc... ) cada vez que se teclé este atajo el estilo de párrafo será seleccionado. En la pestaña Format, la opción "Drop Caps" sirve para poner la primera letra del párrafo en un tamaño más grande (como en los cuentos).
En la pestaña "Rules" se pueden seleccionar diseños de líneas para separar un párrafo de otro.
Estos estilos de párrafo sólo se guardan en el proyecto que se está modificando

Para crear un estilo de carácter se hace click en el primer icono de la izquierda en al sección de abajo (A). En esta ventana se seleccionan las características del estilo de carácter, así como su nombre y su atajo.
Hay ciertas fuentes que tienen una "O" al inicio. Este tipo de fuentes se pueden modificar ligeramente por medio de la opción "OpenType".

Window > Colors

En este panel de color aparecen solamente los colores básicos. Pero con el primer icono (+) puede crearse una combinación de colores nueva. Los profesionales utilizan los colores originales con porcentajes específicos. Sin embargo, puede utilizarse también la paleta.

Window > Shared Content

Sirve para guardar un cuadro de texto y poder después insertarlo sin necesidad de volver a escribirlo o copiarlo y pegarlo.

Window > Layers

Sirve par ver las capas dentro del proyecto

NOTA: Los márgenes del color azul alrededor de la hojas se quitan con F7 o en el menú View > Guides. Estas son sólo guías para conocer el área de impresión: NO se verán al imprimir el proyecto.

martes, 2 de febrero de 2010

CONFIGURAR UNA COMPUTADORA EN LA RED

Primero se requiere una trajeta NIC (Network Interface Card), ésta se encuentra integrada en el motherboard o es necesario comprar una para integrarsela.
Algunas veces también es necesario modificar opciones de la configuración del sistema operativo para poder sonectarse a una red. Cada computadora tiene una ip (internet Protocol Address) única para identificar cada computadora en la red. El IP se compone de 3 partes:
-IP address: identificar cada computadora en la red.
-Subnet mask: identifica la red a la que la computadora está conectada.
-Default gateway: indentifica el artefacto que usa la computadora para accesar a una red .

El IP de una computadora puede ser configurado de 2 maneras:

-Configuración Manual
Se escribe un valor con ayuda del teclado para asignar un ip "permanente" o estático a una computadora.

-Configuración Dinámica
La computadora adquiere una ip de una lista de ips que una computadora se dedica a crear, cuando la computadora se desconecta de la red, regresa el ip que había tomado para que otra computadora lo pueda utilizar.

CISCO CAPITULO 2

En este ejercicio se exponen la diferencias entre sistemas operativos con licencia pública o abierta y sistemas operativos comerciales, dependiendo las necesidades del usuario.


1.-Es Clean Install porque se quiere borrar todo lo que anteriormente se tenía en esa computadora.

2.-Es upgrade porque se quiere actualizar el sistema operativo vigente.

3.-Es dual boot porque se quiere probar un sistema operativo de licencia abierta sin borrar el actual.

4.-Es dual boot porque se quieres instalar un sistema operativo sin perder el que ya está instalado.

5.-Es virtualization porque se quiere probar 2 sistemas operativos en una aplicacion al mismo tiempo en una sola computadora.