Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 30 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
30
Dung lượng
617,38 KB
Nội dung
Voice signals can be carried over TCP/IP networks in a variety of configurations. To converse, VoIP callers can use either a traditional telephone, which uses analog signals, a telephone spe- cially designed for TCP/IP transmission, or a computer equipped with a microphone, speaker, and VoIP client software. And on any VoIP network, a mix of these three types of clients is possible. If a VoIP caller uses a traditional telephone, signals issued by the telephone must be converted to dig- ital form before being transmitted on a TCP/IP-based network.This conversion can be accomplished in several ways. One way is by using an adapter card within a computer workstation. The traditional telephone line connects to an RJ-11 port on the adapter card. The adapter card, along with its device drivers and software on the computer, converts the voice signals to IP packets, and then issues the packets to the data network. A second way to achieve this conversion is by connecting the traditional telephone to a switch or router capable of accepting traditional voice signals, converting them into packets, then issuing the packets to a data network. One example of such a switch is a digital PBX or, more commonly, an IP-PBX.(PBX stands for private branch exchange, which is the term used to describe a telephone switch used to connect calls within a private organization.) In general, an IP-PBX is a private switch that accepts and interprets both analog and digital voice signals. Thus, it can connect with both traditional PSTN lines and data networks. An IP-PBX trans- mits and receives IP-based voice signals to and from other network connectivity devices, such as routers or gateways. In a third scenario, the traditional telephone connects to an analog PBX, which then connects to a voice-data gateway. In this case, the gateway connects the traditional telephone circuits with a TCP/IP network (such as the Internet or a private WAN). The gateway digitizes incom- ing analog voice signals, compresses the data, assembles the data into packets, and then issues the packets to the packet-switched network. This process relies on special VoIP compression and digitizing protocols. In addition, to translate between the PSTN and VoIP networks, gateways follow special VoIP signaling protocols. A discussion of these protocols is beyond the scope of this book. However, if you choose to specialize in VoIP networking, you need to under- stand such protocols thoroughly. When transferring calls from a packet-switched network to a circuit-switched network (for example, if you call your home telephone number from your office’s IP telephone), a gateway performs the same functions in the reverse order. Figure 11-16 depicts the different ways traditional telephones can be used to access a VoIP network. Rather than traditional telephones, most new VoIP installations use IP telephones (or IP phones), which transmit and receive only digital signals. When a caller uses an IP telephone, his voice is immediately digitized and issued from the telephone to the network in packet form. To communicate on the network, each IP telephone must have a unique IP address, just as any client connected to the network has a unique IP address. The IP telephone looks like a tradi- tional touch-tone phone, but connects to an RJ-45 wall jack, like a computer workstation.Then, its connection may pass through a connectivity device, such as a hub or switch, before reach- ing the IP-PBX. An IP-PBX may contain its own voice-data gateway, or it may connect to a 512 Chapter 11 IN-DEPTH TCP/IP NETWORKING separate voice-data gateway, which is then connected to the network backbone. Figure 11-17 illustrates different ways IP telephones can connect with a data network. IP telephones act much like traditional telephones. For example, they feature speed-dialing, call hold, transfer, and forwarding buttons, conference calling, voice mail access, speakers and microphones, and an LCD screen that displays caller ID and call hold information. They come in both mobile and wire-bound styles. More sophisticated IP telephones offer features not avail- able with traditional telephones. Because IP telephones are essentially network clients, like workstations, the number and types of customized features that can be programmed for use with these phones is limitless. Makers of IP telephones include Alcatel, Avaya, Cisco, Mitel, NEC, Nortel, and Siemens. In the United States, an IP telephone can cost between $150 and $750. Rather than using traditional telephones or IP telephones, a third option is to use a computer programmed to act like an IP telephone, otherwise known as a softphone. Softphones and IP tele- phones provide the same calling functions; they simply connect to the network and deliver services in different manners. Before it can be used as a softphone, a computer must meet minimum hard- ware requirements (which any new workstation purchased at an electronics store would likely meet), be installed with an IP telephony client, and communicate with a digital telephone switch. In addi- tion, softphone computers must have a sound card capable of full-duplex transmission, so that both Chapter 11 513 VOIP (VOICE OVER IP) FIGURE 11-16 Accessing a VoIP network from traditional telephones the caller and the called party can speak at the same time. Finally, a softphone also requires a micro- phone and speakers or a headset. Despite all the advantages to using VoIP, it is more difficult to transmit voice signals over a packet-switched network than data signals, which are designed for packet-switched transmis- sion. First, more so than data transmissions, voice conversations can easily be distorted by a connection’s quality of service. When you talk with your friend, you need to hear his syllables in the order in which he mouthed them, and preferably, without delay. Therefore, packets car- rying voice signals must be received in the same order in which they were issued and reassem- 514 Chapter 11 IN-DEPTH TCP/IP NETWORKING FIGURE 11-17 Accessing a VoIP network from IP phones bled quickly. (In contrast, data packets do not necessarily have to be received in the same order in which they were transmitted, because the destination node will sort the information when it arrives.) Also, voice transmissions are subject to distortion if the connection becomes too noisy. In general, to prevent delays, disorder, and distortion, a voice connection requires more dedicated bandwidth than a data connection. When VoIP is carried via the Internet, it is often called Internet telephony. But not all VoIP calls are carried over the Internet. In fact, VoIP over private lines is an effective and econom- ical method of completing calls between two locations within an organization. And because the line is private, its network congestion can be easily controlled, thus resulting in better sound quality than an Internet telephone call can provide. But given the Internet’s breadth and low cost, it is appealing to consider the Internet for carrying conversations that we currently trans- mit over the PSTN. Chapter Summary ◆ Subnetting separates one network or segment into multiple logically defined seg- ments, or subnets. A network administrator might subnet a network to achieve sim- pler troubleshooting, enhanced security, improved performance, and easier network management. ◆ A subnet mask provides clues about the location of network information in an IP address. Bits in a subnet mask that equal 1 indicate that corresponding bits in an IP address contain network information. Bits in a subnet mask that equal 0 indicate that corresponding bits in an IP address contain host information. ◆ To create subnets, some of an IP address’s bits that would, by default, represent host information are changed to represent network information instead. The change is indicated by a change in the subnet mask’s bits. ◆ If you use subnetting on your LAN, only your LAN’s devices need to interpret your devices’ subnetting information. External routers, such as those on the Internet, pay attention to only the network portion of your devices’ IP addresses—not their subnet masks—when transmitting data to them. ◆ A newer variation on traditional subnetting is provided by CIDR (Classless Inter- Domain Routing). CIDR offers additional ways of arranging network and host informa- tion in an IP address. In CIDR, conventional network class distinctions do not exist. ◆ CIDR allows the creation of supernets, or subnets established by using bits that nor- mally would be reserved for network class information. By moving the subnet boundary to the left, more bits are made available for host information, thus increas- ing the number of usable host addresses on a subnetted network. ◆ Gateways facilitate communication between different subnets. Because one device on the network cannot send data directly to a device on another subnet, a gateway (usually in the form of a router interface) must intercede and hand off the information. Chapter 11 515 CHAPTER SUMMARY ◆ Every device on a TCP/IP-based network has a default gateway, the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets. ◆ Internet gateways maintain default routes to known addresses to expedite data transfer. The gateways that make up the Internet backbone are called core gateways. ◆ NAT (Network Address Translation) allows a network administrator to “hide” IP addresses assigned to nodes on a private network. In NAT, gateways assign trans- missions valid Internet IP addresses when the transmission is sent to the Internet. ◆ ICS (Internet Connection Sharing) is a service, included with Windows 98, Me, 2000, and 32-bit versions of XP operating systems, that allows a network of com- puters to share a single Internet connection through an ICS host computer. ◆ Many private organizations use browser-based services for communication among autho- rized employees of the organization over an intranet. For communication with authorized personnel both from the organization and external to the organization, they may use an extranet. ◆ All Internet mail services rely on the same principles of mail delivery, storage, and pickup, though they may use different types of software to accomplish these functions. ◆ Mail client software can communicate with various types of mail server software, because the TCP/IP Application layer protocols used for this communication are standard. ◆ SMTP (Simple Mail Transfer Protocol) is responsible for moving messages from one e-mail server to another over TCP/IP-based networks. SMTP operates through port 25, with requests to receive mail and send mail going through that port on the SMTP server. SMTP is used in conjunction with either POP or IMAP. MIME operates over SMTP to enable mail messages to contain non-ASCII content, such as graphics, audio, video, and binary files. Most modern e-mail clients support MIME encoding. ◆ POP (Post Office Protocol) is a mail retrieval protocol. The most current and com- monly used version of POP is called POP3. Using POP3, messages are downloaded from the mail server to a client workstation each time the user retrieves messages. ◆ IMAP (Internet Message Access Protocol) is another mail retrieval protocol. Its most current version is IMAP4. IMAP4 differs from POP3 in that it allows users to store messages on the mail server, rather than always having to download them to the local machine. This is an advantage for users who do not always check mail from the same computer. ◆ The netstat utility displays TCP/IP statistics and the state of current TCP/IP com- ponents and connections. It also displays ports, which can signal whether services are using the correct ports. ◆ The nbtstat utility provides information about NetBIOS names and their addresses. If you know the NetBIOS name of a workstation, you can use nbtstat to determine the workstation’s IP address. 516 Chapter 11 IN-DEPTH TCP/IP NETWORKING ◆ The nslookup utility allows you to look up the DNS host name of a network node by specifying the node’s IP address, or vice versa. Nslookup is useful for trou- bleshooting host configuration and DNS resolution problems. ◆ The dig utility, like nslookup, queries the network’s DNS database to return infor- mation about a host given its IP address, or vice versa. In its simplest form, or when used with one of its many switches, dig provides more information than nslookup. ◆ The whois utility allows you to obtain DNS registration information for a second- level domain. ◆ The traceroute utility, known as tracert on Windows-based systems, uses ICMP to trace the path from one networked node to another, identifying all intermediate hops between the two nodes. This utility is useful for determining router or subnet connectivity problems. ◆ Typing ipconfig at the command prompt of a system running Windows NT, 2000, XP, or Server 2003 reveals the TCP/IP settings for that computer. ◆ You can view TCP/IP settings on a system that uses the Windows 9x or Me operat- ing system by typing winipcfg at the command prompt. ◆ Ifconfig is the utility that establishes and allows management of TCP/IP settings on a UNIX-type of system. ◆ VoIP (voice over IP) is the use of packet-switched TCP/IP-based networks to carry voice signals. An organization may use VoIP to save money on telephone calls, cen- tralize management of voice and data services, or take advantage of customizable call features. ◆ Many types of clients and network designs are available with VoIP networks. Clients can be traditional telephones, IP telephones, or softphones (a computer running telephony software and connected to a microphone and headphones). ◆ Analog VoIP clients may connect to traditional PBXs (private telephone switches), which then connect to a voice-data gateway that digitizes call information. Digital VoIP clients typically connect to a digital PBX or a router with VoIP capabilities. Key Terms ANDing—A logical process of combining bits. In ANDing, a bit with a value of 1 plus another bit with a value of 1 results in a 1. A bit with a value of 0 plus any other bit results in a 0. CIDR (Classless Inter-domain Routing)—An IP addressing and subnetting method in which network and host information is manipulated without adhering to the limitations imposed by traditional network class distinctions. CIDR is also known as classless routing or supernetting. Older routing protocols, such as RIP, are not capable of interpreting CIDR addressing schemes. Chapter 11 517 KEY TERMS CIDR block—In CIDR notation, the number of bits used for an extended network prefix. For example, the CIDR block for 199.34.89.0/22 is /22. CIDR notation—In CIDR, a method of denoting network IDs and their subnet boundaries. Slash notation takes the form of the network ID followed by a /, followed by the number of bits that are used for the extended network prefix. classful addressing—An IP addressing convention that adheres to network class distinctions, in which the first 8 bits of a Class A address, the first 16 bits of a Class B address, and the first 24 bits of a Class C address are used for network information. Classless Inter-domain Routing—See CIDR. classless routing—See CIDR. convergence—The use of packet-switched networks to carry data, plus video and voice sig- nals. core gateway—A gateway that operates on the Internet backbone. default gateway—The gateway that first interprets a device’s outbound requests, and then interprets its inbound requests to and from other subnets. In a Postal Service analogy, the default gateway is similar to a local post office. default router—See default gateway. dig (domain information groper)—A TCP/IP utility that queries the DNS database and provides information about a host given its IP address or vice versa. Dig is similar to the nslookup utility, but provides more information, even in its simplest form, than nslookup can. digital PBX—See IP-PBX. domain information groper—See dig. extended network prefix—The combination of an IP address’s network ID and subnet infor- mation. By interpreting the address’s extended network prefix, a device can determine the sub- net to which an address belongs. extranet—A network that uses browser-based services to exchange information within an orga- nization and with certain, authorized users outside of that organization. HTML (Hypertext Markup Language)—The language that defines formatting standards for Web documents. Hypertext Markup Language—See HTML. ICS (Internet Connection Sharing)—A service provided with Windows 98, Me, 2000 and 32-bit versions of XP operating systems that allows one computer, the ICS host, to share its Internet connection with other computers on the same network. 518 Chapter 11 IN-DEPTH TCP/IP NETWORKING ICS host—On a network using the Microsoft Internet Connection Sharing service, the com- puter whose Internet connection other computers share. The ICS host must contain two net- work interfaces: one that connects to the Internet and one that connects to the LAN. ifconfig—A utility that establishes and allows management of TCP/IP settings on UNIX- type of systems. IMAP (Internet Message Access Protocol)—A mail retrieval protocol that improves on the shortcomings of POP. The single biggest advantage IMAP4 has relative to POP is that it allows users to store messages on the mail server, rather than always having to download them to the local machine. The most current version of IMAP is version 4 (IMAP4). IMAP4 (Internet Message Protocol, version 4)—The most commonly used form of the Internet Message Access Protocol (IMAP). Internet Connection Sharing—See ICS. Internet Message Access Protocol—See IMAP. Internet Message Access Protocol, version 4—See IMAP4. Internet telephony—The provision of telephone service over the Internet. intranet—A network or part of a network that uses browser-based services to exchange infor- mation within an enterprise. Intranets may be contained within a LAN or may be accessible via a WAN or the Internet. IP-PBX—A private switch that accepts and interprets both analog and digital voice signals (although some IP-PBXs do not accept analog lines). It can connect with both traditional PSTN lines and data networks. An IP-PBX transmits and receives IP-based voice signals to and from other network connectivity devices, such as a router or gateway. IP phone—See IP telephone. IP telephone—A telephone used for VoIP on a TCP/IP-based network. IP telephones are designed to transmit and receive only digital signals. IP telephony—See Voice over IP. MIME (Multipurpose Internet Mail Extensions)—A standard for encoding and interpret- ing binary files, images, video, and non-ASCII character sets within an e-mail message. Multipurpose Internet Mail Extensions—See MIME. NAT (Network Address Translation)—A technique in which IP addresses used on a private network are assigned a public IP address by a gateway when accessing a public network. nbtstat—A TCP/IP troubleshooting utility that provides information about NetBIOS names and their addresses. If you know the NetBIOS name of a workstation, you can use nbtstat to determine its IP address. Chapter 11 519 KEY TERMS netstat—A TCP/IP troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports, which can signal whether services are using the cor- rect ports. Network Address Translation—See NAT. network number—See network ID. network prefix—See network ID. nslookup—A TCP/IP utility that allows you to look up the DNS host name of a network node by specifying its IP address, or vice versa. This ability is useful for verifying that a host is con- figured correctly and for troubleshooting DNS resolution problems. PBX (private branch exchange)—A telephone switch used to connect calls within a private organization. POP (Post Office Protocol)—An Application layer protocol used to retrieve messages from a mail server. When a client retrieves mail via POP, messages previously stored on the mail server are downloaded to the client’s workstation, and then deleted from the mail server. POP3 (Post Office Protocol, version 3)—The most commonly used form of the Post Office Protocol. Post Office Protocol—See POP. Post Office Protocol, version 3—See POP3. private branch exchange – See PBX. Simple Mail Transfer Protocol—See SMTP. slash notation—See CIDR notation. SMTP (Simple Mail Transfer Protocol)—The Application layer TCP/IP subprotocol respon- sible for moving messages from one e-mail server to another. softphone—A computer programmed to act like an IP telephone. Softphones present the caller with a graphical representation of a telephone dial pad and can connect to a network via a LAN, WAN, PPP dial-up connection, or leased line. supernet—A type of subnet that is created using bits that normally would be reserved for net- work class information—by moving the subnet boundary to the left. supernet mask—A 32-bit number that, when combined with a device’s IP address, indicates the kind of supernet to which the device belongs. supernetting—See CIDR. toll bypass—A cost-savings benefit that results from organizations completing long-distance telephone calls over their packet-switched networks, thus bypassing tolls charged by common carriers on comparable PSTN calls. 520 Chapter 11 IN-DEPTH TCP/IP NETWORKING traceroute (tracert)—A TCP/IP troubleshooting utility that uses ICMP to trace the path from one networked node to another, identifying all intermediate hops between the two nodes. Traceroute is useful for determining router or subnet connectivity problems. On Windows- based systems, the utility is known as tracert. Voice over IP (VoIP)—The provision of telephone service over a packet-switched network running the TCP/IP protocol suite. One form of VoIP (pronounced “voyp”) is Internet tele- phony, though VoIP is frequently used over private networks to circumvent long-distance toll charges. VoIP – See voice over IP. winipcfg—The TCP/IP configuration and management utility for use with Windows 9x and Me systems. Winipcfg differs from ipconfig in that it supplies a graphical user interface. whois—The utility that allows you to query ICANN’s DNS registration database and find the information as a domain. Review Questions 1. _________________________ separates a network into multiple logically defined segments. a. Classless routing b. Subnetting c. ANDing d. Classful addressing 2. A(n) _________________________ facilitates communication between different net- works or subnets. a. gateway b. switch c. IP telephone d. CIDR block 3. _________________________ is a simple subprotocol, incapable of doing anything more than transporting mail or holding it in a queue. a. NAT b. VoIP c. TCP/IP d. SMTP Chapter 11 521 REVIEW QUESTIONS [...]... one morning about a problem printing to the network printer in the Facilities Department You might have already determined that the problem is an addressing conflict with the printer and be in the last stages of resolving the problem Minutes later, when a 13th caller says, “I’m having problems printing,” you might immediately conclude that she is another Facilities staff member and that her inability... 12-1 Identifying the area affected by a problem TROUBLESHOOTING METHODOLOGY Chapter 12 NET+ 4.9 FIGURE 12-2 Identifying the chronological scope of a problem NOTE One fascinating example of troubleshooting that began with determining a problem’s chronological scope was experienced by a wireless networking engineer working on a small metropolitan area network His spread-spectrum RF network links, which... in CompTIA’s Network+ exam objectives Bear in mind that experience in your network environment may prompt you to follow the steps in a different order or to skip certain steps entirely For example, if you know that one segment of your network is poorly cabled, you may try replacing a section of cable in that area to solve a connectivity problem before attempting to verify the physical and logical integrity... contrast, swapping parts requires at least a few minutes of service disruption In the case of swapping a router, the downtime might last for several hours CAUTION Before swapping any network component, make sure that the replacement has exactly the same specifications as the original part By installing a component that doesn’t match the original device, you risk thwarting your troubleshooting efforts... mail In answering your questions, he might say, “The problem began about 10 minutes ago Both my neighbors are having problems with e-mail, too And as a matter of fact, a network technician was working on my machine this morning and installed a new graphics program.” As you listen to the user’s response, you may need to politely filter out information that is unlikely to be related to the problem In this... disastrous performance in an instant In this chapter, you learn how to diagnose and solve network problems in a logical, step-by-step fashion, using a variety of tools Troubleshooting Methodology NET+ 4.9 Successful troubleshooters proceed logically and methodically This section introduces a basic troubleshooting methodology, leading you through a series of general problem-solving steps These steps... user error Users become so accustomed to typing their passwords every morning and logging on to the network that, if something changes in the logon process, they don’t know what to do In fact, some users might never log out, so they don’t know how to log on properly Although these kinds of problems may seem simple to solve, unless a user receives training in the proper procedures and understands what... appeared For example, if a user complains that her network connection mysteriously drops when she’s in the middle of surfing the Web, try to replicate the problem at her workstation; also, find out what else was running on the user’s workstation or what kind of Web sites she was surfing CAUTION Use good judgment when attempting to reproduce problems In some cases, reproducing a problem could wreak havoc... to print results from the same printer addressing problem In fact, this user may be in the Administration Department, and her inability to print could represent a symptom of a larger network problem Take time to pay attention to the users, system and network behaviors, and any error messages Treat each symptom as unique (but potentially related to others) In this way, you avoid the risk of ignoring... might not work in the environment In the worst case, you may damage existing equipment by installing a component that isn’t rated for it 536 NET+ 4.8 4.9 Chapter 12 TROUBLESHOOTING NETWORK PROBLEMS The flowchart in Figure 12-3 illustrates how logically assessing Physical layer elements can help you solve a network problem The steps in this flowchart apply to a typical problem: a user’s inability to . network information in an IP address. Bits in a subnet mask that equal 1 indicate that corresponding bits in an IP address contain network information. Bits in a subnet mask that equal 0 indicate that. 1 results in a 1. A bit with a value of 0 plus any other bit results in a 0. CIDR (Classless Inter-domain Routing)—An IP addressing and subnetting method in which network and host information. by CIDR (Classless Inter- Domain Routing). CIDR offers additional ways of arranging network and host informa- tion in an IP address. In CIDR, conventional network class distinctions do not exist. ◆