Documente Academic
Documente Profesional
Documente Cultură
Network Fundamentals
Chapter 1 Networking Basics
Chapter Objective:
At the end of this chapter you are expected
to have an understanding on the following:
• basic networking concepts, network symbols
• OSI and TCP/IP model
• Network Design Concepts, Topologies, Physical connections, Network Types
• Port numbers
• IP Addressing, IP Address Classes, Private IPs, and Subnetting – how, why
and when
• End-to-end communications (UDP and TCP/IP)
Chapter 1 Networking Basics
What is a Network
• A network consists of two or more computers
that are linked in order to share resources,
exchange files, or allow electronic
communications. The computers on a network
may be linked through cables, telephone lines,
radio waves, satellites, or infrared light beams.
• The data is conveyed with the use of on-and-off
pulses of electricity.
Understanding the pieces of a network
The Basic Network
INTERNET
WAN
WAN interface
card
Network Application
• Home
• Office
• Internet – Web Browsing Intranet/Internet
• Database Application – Oracle/Mysql/Sql
• Instant Messenger
• Email / Online BBS
• Online Games
Common Data Network Symbols
Bridge Repeater
Firewall
Switch Gigabit Switch
Cross Over
Network Devices
• Network Interface Cards – Layer 2 device that connects computers to other network
equipment to the transmission medium
- connects Host to the network
- detects collision on the ethernet network/prevents collision on token
- passes frames to the upper/lower layer of the OSI
• Routers – A network layer device that connects two networks. Determines the best
path for data packets transmission end-to-end. Blocks layer 2 broadcast.
• Repeaters - A physical layer device that amplifies the signals it receives on one port
and resends or repeats them on another. Used to extend the maximum length of a
network segment.
• Hubs – A physical layer device that serves as a central connection point for
networked devices. A hub repeats the signal it receives on one port to all other ports.
Speed 10mbps to 100mpbs.
• Bridges – A data link layer device that logically separates a network into segments
but lets the two segments appear to be one network to higher layer protocols.
• Switches – A layer 2 device that is used to connect 1 or many segments of LANs
and to filter and forward packets among them. Often referred to as multi-port
bridges.
Network Media
• the actual path over which data/signal
travels as it moves from one component to
another.
Advantages
•Very orderly network where every device has access to the token and the opportunity to
transmit
•Performs better than a star topology under heavy network load
•Can create much larger network using Token Ring
•Does not require network server to manage the connectivity between the computers
Disadvantages
•One malfunctioning workstation or bad port in the MAU can create problems for the
entire network
•Moves, adds and changes of devices can affect the network
•Network adapter cards and MAU's are much more expensive than Ethernet cards and
hubs
•Much slower than an Ethernet network under normal load
Star Topology
A Star topology is a network topology where each machine is connected to a central hub,
The hub acts as a signal booster or repeater which in turn allows the signal to travel
greater distances. The star topology reduces the chance of network failure by connecting
all of the systems to a central node.
Advantages
Better Performance
Isolation of Devices
Benefits from Centralization
Simplicity
Disadvantage
Failure of central device brings the entire network down
Mesh Topology
Mesh topology is distinguished by having redundant links between devices.
Advantages
•Fault Tolerance
•Disadvantages
•Installation and configuration
•Maintenance of redundant links
Network Architecture
•Four basic that are needed to be addressed in order to meet user expectations:
•- Fault Tolerance - Scalability
•- Quality of Service (QOS) - Security
Port Numbers
• Controlled by Internet Assigned Numbers Authority (IANA)
• Allows and keeps track of different applications accessed at the same
time
SSH 22 TFPT 69
TELNET 23
SMTP 25
DNS SERVER 53
HTTP 80
HTTPS 443
POP3 110
The OSI Model (Open Systems Interconnection)
Purpose
• Help break down network functions
• Creates standard for equipment manufacturing
• Allows vendor to focus in specialized areas of networking
Layer Layer Name PDU Name Devices per layer What it do
OSI In Action
Subnet Mask 255.255.255.128
MAC: DD:EE:FF:GG:HH:II
HOST A
IP Address: 192.168.2.10
SENDS MAIL/FTP
Subnet Mask: 255.255.255.0
MAC: AA:BB:CC:DD:EE:FF WWW.CISCO.COM
Application Uses web browser, ie and typed in cisco.com, asks dns to resolve cisco.com ip, get website Application
request
Session
Transport Transport TCP UDP
IP HEADER
IP Address (IPv4) Basics
• Unique numerical address used on a device participating in a
computer network
• Consists of two parts, the network and the host (unique)
• The subnet mask dictates which portions of the IP address
identifies the network and host.
• 32 bits, 4 Octet, each octet from 0-255
192.168.1.0 network
IP Address : 192. 168. 1.20 < identified by
Subnet Mask : 255.255.255.0 subnet mask as host
Gateway : 192.168.1.1
Public Addresses
Usable on the Internet
Private Address
created to conserve IPv4 addresses
Usable on internal networks (non-routable) – requires NAT to connect to the
3 Classes of Private Address internet
8 bit block / Class A: 10.0.0.0 – 10.255.255.255
20 bit block / Class B: 172.16.0.0 – 172.31.255.255
16 bit block / Class C: 192.168.0.0 – 192.168.255.255
Reserved IP Addresses
Address Reserved for Specific Purposes
Directed Broadcast Address – An IP Address that has all 1s on the host portion
ex. 172.16.255.255/255.255.0.0
192.168.1.0 192.4.0.0
10.2.0.0 172.0.0.0
Looks at the first Octet to see Looks at the first Octet to see
which Class it belongs which Class it belongs
Class A = 2, 3 and 4 Octet are host Class A = 2, 3 and 4 Octet are host
Looks at the subnet mask Octet
to see which is the network and
Classless Address which is the host portion
Last octed = host
10.2.0.0 172.0.0.0
255.255.128.0 255.255.255.0
4th octet + last 7 bits is the 4th octet is the host portion
host portion
Media Access Control (MAC) address
•The ethernet address, or MAC address is a Layer 2 address, typically
burned into adapter.
•Format : 00-0d-65-ac-50-7f
•48 bits
Router drops /
blocks the
Host B Replies with its MAC
broadcast
Address, transmission
begins
HOST B - 192.168.1.3
255.255.255.0
Default gateway: 192.168.1.1
MAC:bb:cc:dd:ee:ff:gg
Remote Communication
Host A compares his IP Host A forwards the data to his
address and subnet mask with default-gateway with the ff:
IP and subnet mask of Host B fields
HOST A - 192.168.1.2
255.255.255.0 192.168.1.2 255.255.255.0 SMAC: aa:bb:cc:dd:ee:ff
Default gateway: 192.168.1.1 203.215.91.3 255.255.255.252 SIP: 192.168.1.2
gg:hh:ii:jj:kk:ll:mm:nn
MAC:aa:bb:cc:dd:ee:ff Not same not same DMAC:
203.215.91.3
192.168.1.1 Ee:ff:gg:hh:ii:jj:kk:ll
SIP:192.168.1.1 203.215.91.2
cc:dd:ee:ff:gg:hh:ii:jj
SMAC: cc:dd:ee:ff:gg:hh:ii:jj SIP:192.168.1.1
10.10.1.1
DIP:203.215.91.3 R3 SMAC:ee:ff:gg:hh:ii:jj:kk:ll
SIP:192.168.1.1 DMAC:dd:ee:ff:gg:hh:ii:jj:kk DIP:203.215.91.3
SMAC: aa:bb:cc:dd:ee:ff
R1 10.10.1.5 DMAC:ff:gg:hh:ii:jj:kk:ll:mm
DIP:203.215.91.3
DMAC:cc:dd:ee:ff:gg:hh:ii:jj
SIP:192.168.1.1
R2
SMAC:ff:gg:hh:ii:jj:kk:ll:mm
SIP:192.168.1.1 DIP:203.215.91.3
SMAC: dd:ee:ff:gg:hh:ii:jj:kk DMAC:gg:hh:ii:jj:kk:ll:mm:nn
10.10.1.2
DIP:203.215.91.3
dd:ee:ff:gg:hh:ii:jj:kk DMAC:ee:ff:gg:hh:ii:jj:kk:ll
R4
ff:gg:hh:ii:jj:kk:ll:mm
203.215.91.2
TCP/UDP Communications
Layers: Transport, Network, Datalink, Physical
UDP
• Connectionless
• Best Effort Delivery (no error detection)
• Unreliable
• No windowing
• Trades reliability for speed
TCP
• Builds Connection
• Uses Sequence Number (error detection)
• Reliable (uses ack) (used for error recovery)
• Uses Windowing
My window size is 3
PACKET 1
PACKET 2
ACK2 packets
received. Change
PACKET 3 PACKET 3 DROPPED window size 2
PACKET 3
PACKET 4
Exponent 7 6 5 4 3 2 1 0
Place Value 128 64 32 16 8 4 2 1
192 1 1 0 0 0 0 0 0
168 1 0 1 0 1 0 0 0
1 0 0 0 0 0 0 0 1
224 1 1 1 0 0 0 0 0
*Routers perform logical AND with the IP and Network Mask to determine which
network the IP belongs
Ex. IP address 192.168.1.3 255.255.255.240 Ex. IP address 192.168.1.60 255.255.255.240
255.255.255.11110000 255.255.255.11110000
00000000 00110000
Step 2) Reserve required bits in subnet mask and find incremental value
- The binary value of 50 clients tells us that we need at least 6 client bits to satisfy
this requirement.
original subnet mask is 255.255.255.0 (Class C subnet) , convert to binary
255.255.255.0 = 11111111.11111111.11111111.00000000
Place the 6 “host” bits starting from right, the rest of the octet is 1.
- Start with your given network address and add your increment to the subnetted
octet:
209.50.1.0
209.50.1.64
209.50.1.128
209.50.1.192
- You can now fill in your end ranges, which is the last possible IP address before
you start the next range
209.50.1.0 – 209.50.1.63
209.50.1.64 – 209.50.1.127
209.50.1.128 – 209.50.1.191
209.50.1.192 – 209.50.1.255
Remember that the first and last address of the range are network and broadcast
Given an IP address & Subnet Mask, find original network range
192.168.1.58
255.255.255.240
Identify the original range of addresses (the subnet) that this IP address belongs to
break the subnet mask back into binary and find the increment that was used
255.255.255.240 = 11111111.11111111.11111111.111(1)0000
- Use this increment to find the network ranges until you pass the given IP address:
192.168.1.0
192.168.1.16
192.168.1.32
192.168.1.48
192.168.1.64 (passed given IP address 192.168.1.58)
- Now, fill in the end ranges to find the answer to the scenario:
192.168.1.0 – 192.168.1.15
192.168.1.16 – 192.168.1.31
192.168.1.32 – 192.168.1.47
192.168.1.48 – 192.168.1.63 (IP address 192.168.1.58 belongs to this range)
Variable Length Subnet Mask
VLSM provides the ability to subnet an already subnetted network address
Saves unused IP address, most efficient addressing
30 hosts
60 hosts 10 hosts
192.168.1.0/24
1 Convert required no. of hosts to binary. Get the range by adding increment
60=00111100 = 6 bits 192.168.1.0 add increment (64)
Reserve host bits
192.168.1.1-62- range
11 000000 increment is 64 (last 1) (/26)
192.168.1.63 - broadcast
2 Convert required no. of hosts to binary. 192.168.1.64
30=000 11110 = 5 bits 192.168.1.64 add next req. increment
Reserve host bits 192.168.1.65-94 (32host)
11100000 increment is 32 (last 1) (/27) 192.168.1.95
192.168.1.96
3 Convert required no. of hosts to binary.
192.168.1.96 add next req. increment
10=0000 1010 = 4 bits
192.168.1.97-104 (10host)
Reserve host bits
192.168.1.105
11110000 increment is 16 (last 1) (/28)
192.168.1.106
4 Convert required no. of hosts to binary. Get the range by adding increment
2=00000010 = 2 bits 192.168.1.106 add increment (4)
Reserve host bits
192.168.1.107-108- range
11111100 increment is 4 (last 1) (/30)
192.168.1.109 - broadcast
30 hosts 192.168.1.110
192.168.1.0/27
192.168.1.110 add next req. increment
192.168.1.111-112 (4)
192.168.1.110/30 192.168.1.114/30
192.168.1.113 - broadcast
192.168.1.114
192.168.1.118/30
60 hosts 10 hosts
192.168.1.0/26 192.168.1.0/28
VLSM address
Chapter 2 Local Area Network
LAN Method of Communications / Types of Ethernet Traffic
Broadcast – one host sends data to all, data is received by all hosts connected
except from the one it came from.
Multicast group
member
Commonly used types of UTP cabling are as
follows:
• Category 1 —Used for telephone communications. Not suitable for
transmitting data.
• Category 2 —Capable of transmitting data at speeds up to 4
megabits per second (Mbps).
• Category 3 —Used in 10BASE-T networks. Can transmit data at
speeds up to 10 Mbps.
• Category 4 —Used in Token Ring networks. Can transmit data at
speeds up to 16 Mbps.
• Category 5 —Can transmit data at speeds up to 100 Mbps.
• Category 5e —Used in networks running at speeds up to 1000
Mbps (1 gigabit per second [Gbps]).
• Category 6 —Typically, Category 6 cable consists of four pairs of
24 American Wire Gauge (AWG) copper wires. Category 6 cable is
currently the fastest standard for UTP.
UTP Cabling Standards
• Straight Thru = T568A + T568A / T568A+T568B – used on
connect different devices
• Cross Over = T568A + T568B – used to connect same devices (eg.
Router to router
Cabling
• Patch Panels
• Wall Jack
• Crimping Tools
What is CSMA/CD
Carrier Sense Multiple Access/ Collision Detection
rules/standard on how Ethernet devices transmit information to the
Ethernet network
• Carrier – Network Signal
• Sense – The ability of host to detect if there is a transmission
• Multiple Access – all devices have equal access
• Collision – happens when two devices sends at once
• Detection – how hosts handle collisions when collisions occur
• Back off algorithm – random timer before hosts can resend data
after collision detection
problems with CSMA/CD
LAN Design Challenges
Data Collision, bandwidth
Collision Domain
• several users would all share the same port on a network device
and would compete for resources (bandwidth) and only one host
can transmit at a time. Ex. ARP
• how many devices can send or receive data at the same time
• if two hosts sends data at the same time, a collision occurs
Broadcast domain – span of the network where hosts can be reached
via broadcast.
Hub = 1 collision domain
All hosts are listening to the wire to see if it
is free.
Increases the bandwidth available to each user: Bandwidth is a shared entity, but each segment and
its users have full use of the bandwidth available. For example, if there are 100 users on a 100 Mbps
segment, each user has an average of 1 Mbps of available bandwidth. If this same segment were
further segmented into 10 segments with 10 users on each segment, however, then every user would
have an average of 10 Mbps of available bandwidth.
·
Fewer collisions: In general, traffic tends to stay within a segment, and less traffic is routed beyond
the segment to contend for access to the backbone.
·
Reduces Ethernet distance limitations: There are inherent distance limitations on an Ethernet
network. When a network is segmented with a router (and only a router; not a bridge,
and not a switch), the beginning point from which the maximum distance for the cabling is
determined is re−established.
Segmenting Methods
using bridge using switch using routers
Network Segmenting
breaking up of collision domain to reduce congestion
Segment A Segment B
BRIDGE (created 2 collision domains)
Learns mac address connected on
Segment A and B
Multicast group
member
COLLISION DOMAIN
COLLISION DOMAIN
BROADCAST DOMAIN
Maintains CAM (Content Accessible
Memory) Table
Which stores MAC Address
- makes the switch intelligent
• A switch uses MAC Address to forward frames, when it is first
powered on, the MAC address (CAM table) is empty and learns the
MAC address via the attached devices ARP (address resolution
protocol) requests.
• (CAM Table Empty) Host A sends a frame to Host C., when switch
receives it, it floods the frame to all other port (destination unknown),
the MAC address of Host A is learned and added to the table and
associates it with the port it was received.
• Host C takes the ownership and replies with its IP address. Switch
adds Host C MAC address and the port to the CAM table.
• Host A now sends frame to specific port instead of flooding the
frame.
CAM Table
bb:cc:dd:ee:ff:gg
Switch Frame Transmission Mode
• Cut-Through – The switch checks the destination address and immediately
begins forwarding the frame. Decreases latency but can also transmit frames
containing errors.
• Store and forward – the switch waits to receive the entire frame before
forwarding. Reads the entire frame and performs Cyclic Redundancy Check
(CRC), if bad, the frame is discarded. Increased latency.
• Fragment-free – the switch reads the first 64kb before forwarding the frame
(the minimum number of bytes needed to detect and filter out collision
frames).
Static Allocation
192.168.1.1
192.168.100
192.168.101
192.168.1.101/dynamic
192.168.102
192.168.1.102/dynamic
DHCP Server
Chapter 3 Cisco IOS
Objectives:
At the end of the training, you are expected to
have good understanding on the following:
•Cisco IOS and its use and features
•Cisco Boot process
•Accessing Cisco Routers/Switch/IOS
•Cisco IOS Function Level
•Cisco Enhance Editing Commands
Cisco IOS
internetwork operating system
• Provides the following features:
• Carries network protocols and functions
• Connectivity
• Security
• Scalability
• Reliability
The Cisco IOS software image name represents the hardware, feature set, format,
and other information about the image file
Full IOS
• The order in which the router looks for system bootstrap information
depends on the boot field setting in the configuration register.
• The configuration register is a 16-bit register in NVRAM.
• The lowest four bits of the configuration register form the boot field.
• To ensure that the upper 12 bits are not changed, first retrieve the
current values of the configuration register using the show version
command.
• Then use the config-register command, changing only the value
of the last hexadecimal digit.
Showing the configuration register
show version
• Gateway-Router>show version
• Cisco Internetwork Operating System Software
• IOS (tm) C2600 Software (C2600-DO3S-M), Version 12.0(5)T1, RELEASE SOFTWARE (fc1)
• Copyright (c) 1986-1999 by cisco Systems, Inc.
• Compiled Tue 17-Aug-99 13:18 by cmong
• Image text-base: 0x80008088, data-base: 0x80CB67B0
• Gateway-Router>
External/Remote Cisco Device Configuration
•Console terminal
•Remote Terminal (aux port)
•Telnet
•TFTP
•Ciscoworks
•SSH
Only a console or remote terminal connection can initially
configure a cisco device
Configuring/connecting to console
Switch#conf t
Switch(config)#banner motd # <indicates next chars are the banners <start banner text
here> # <indicates end of banner text
(create access list no. 10 permitting telnet access to VTY lines from network 192.168.10.0/24)
Switch(config)#access-list 10 permit 192.168.10.0 0.0.0.255
Switch(config)#line vty 0 15
Switch(config-if)access-class 10 in <applies access-list to telnet ports
Telnet = used to connect to remote hosts/cisco devices, requires ip address, username &
password
VLAN1 = 10 hosts
Subnet – 192.168.20.0/24
VLAN1 = 10 hosts
Subnet – 192.168.20.0/24
VLAN1 = 10 hosts
Subnet – 192.168.20.0/24
Port Forwarding 192.168.1.2
Mail/Web Server
203.215.91.3
192.168.1.1
192.168.1.3
FTP/DHCP
192.168.1.5
DNS/AD
192.168.1.4
NAT/PAT – DHCP Database
Server Technologies and Advertising Them.
DHCP History
BootP
RARP
DHCP
Web Server
Dominant Application
Apache
MS IIS
Mail Server
POP3
SMTP
FTP
Microsoft FTP server – built in
Filezilla