Sunteți pe pagina 1din 26

What is a Network ?

A network is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. The connectivity can be wired or wireless. Networks are built with a mix of computer hardware and computer software.

Network Classification

By Range:

Local Area Network ( LAN ) Metropolitan Area Network ( MAN ) Wide Area Network ( WAN ) Personal Area Network ( PAN )

By Functional Relationship:

Client-Server Peer to Peer


Bus Networks Star Networks Ring Networks

By Network Topology:

Routing

Routing (or routeing) is the process of selecting paths in a network along which to send network traffic. primarily with routing in electronic data networks using packet switching technology. Routing process usually directs forwarding of packets on the basis of routing tables which maintain a record of the routes to various network destinations.

Classification of Routing
Based on the route telling scheme to the router Static Routing
Routing tables are manually configured. The advantage of this routing type is maximum computing resources are saved but are conditioned.

Dynamic Routing
Routing tables are constructed automatically, based on information carried by routing protocols. Dynamic routing dominates the Internet because it allows the network to act nearly autonomous in avoiding network failures and blockages.

Dynamic Routing

Distance Vector

This approach assigns a number, the cost, to each of the links between each node in the network. Nodes will send information from point A to point B via the path that results in the lowest total cost.
Each node uses as its fundamental data a map of the network in the form of a graph. Each router then independently determines the least-cost path from itself to every other node using a standard shortest path algorithm such as Dijkstra's algorithm. The result is a tree which serves to construct the routing table, which specifies the best next hop to get from the current node to any other node.

Link State

Major Routing Protocols

Routing Information Protocol ( RIP ) Open Shortest Path First ( OSPF) External Interior Gateway Routing Protocol ( EIGRP )

RIP
Random Facts:Is a Dynamic Routing Protocol Uses Distance Vector Routing algorithm RIP updates are used as keep alives and are periodic Routing table is sent as updates Hello Timer is 30 seconds Dead(flush) Timer is 240 seconds i.e. 8 consecutive packets Updates are UDP based and uses destination port no. 520 Hop Count is used as the metric RIP v1 does not support subnetting RIP v2 supports subnetting

OSPF
Random Facts:Is a Link State Routing Protocol OSPF Hello Packets are used as keep alives Hello Timer is 10 seconds Dead Timers is 40 seconds i.e. 4 consecutive Hello Packets Information of networks is sent only during neighbourship establishment Metric = cost = 100/Bandwidth in Mbps Linked State Database(LSD) is formed from the Link State Updates(LSU), from which graph of whole network is created Auto-summarization is OFF by default

Access Lists

Is a group of permit/deny statements The list is scanned from top to bottom--in the exact order that it was entered for a pattern that matches the incoming packet Can use a mask, which is like a wild card, to determine how much of an IP source or destination address to apply to the pattern match To make a change, we have to re-enter the entire list Any packet not processed by the list is dropped by default. Is associated with an interface of the router, where we want to filter the traffic. Can be INBOUND i.e. applied for incoming traffic or OUTBOUND i.e. applied for outgoing traffic of an interface

Types of Access List

Standard
Operates on the Network Layer (Layer 3)of the OSI model Used to block/permit networks from reaching other networks based on the source ip addresses and mask Uses Access List range from 1 to 99

Extended
Operates on both Layer 3 and Layer 4 of OSI model Allow us to filter traffic not only by network address but also by the type of traffic that is being sent or received and also on the basis of source as well as destination ip addresses and mask Uses Access List Range from 100 to 199

Domain Name System( DNS)


Standard technology for managing the names of Web sites and other Internet domain DNS server is any computer registered to join the Domain Name System DNS server runs special-purpose networking software, features a public ip address, and contains a database of network names and addresses for other Internet hosts DNS servers are organized in a hierarchy At the top level of the hierarchy, so-called root servers store the complete database of Internet domain names and their corresponding IP addresses DNS networking is based on the client/serrver architecture

Case Study: College Network

Certain Facts:The concepts of networking used to demonstrate and configure the networks are as follows: Routing Protocols

Link State Routing Protocol ( OSPF ) Distance Vector Routing Protocol ( RIP ) Standard Extended

Access-Lists

Domain Name System

The elements of networks used in the configuration are as follows: Routers ( Cisco 2811) Switches ( Cisco 2960 24 TT ) Network Cables

Serial cables Straight Ethernet Cables Crossover Ethernet Cables

Servers

Constraints on the Network:

The DNS server is located in another Autonomous System. We have to make sure that all users in the college network get access to the DNS server. Perform sufficient configuration at appropriate places so that only the users in Department 1 get access to the College web server. Enable internet access for all the clients except PC5 and PC6 in Department 2

Explanation: College Network

The college network comprises an autonomous system which uses OSPF which is a Link State Routing Protocol. There are 2 routers used in the network. 10.0.0.0/8 network is used for connecting computers of department 1, thus using class A private addresses. 192.168.21.0/24 network is used for connecting computers of department 2, thus using class C private addresses. The College Server uses 22.0.0.0/8 network

OSPF Network Topology:-

Configuration of OSPF on Routers

To turn ON OSPF process globally on a router

Router# configure terminal Router(conf)# router OSPF <process id>

Select the interfaces(networks) which we want to advertise

Router 1(conf-router)# network 10.0.0.0 0.255.255.255 area 0


10.0.0.0 The network which we want to advertise and enable routing on. 0.255.255.255 Wild Card Mask, allowing certain ip addresses to be advertised. Area 0 The area ID, identifying all the machines in an area.

Routes at the College Router


The result of show ip route command on College Router is:R2#show ip route O 10.0.0.0/8 [110/65] via 20.0.0.1, 00:58:11, Serial0/1/1 C 20.0.0.0/8 is directly connected, Serial0/1/1 C 22.0.0.0/8 is directly connected, FastEthernet0/0 C 23.0.0.0/8 is directly connected, Serial0/1/0 O 30.0.0.0/8 [110/65] via 23.0.0.2, 00:58:11, Serial0/1/0 O E2 34.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0 O E2 35.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0 O E2 45.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0 O E2 56.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0 C 192.168.21.0/24 is directly connected, FastEthernet0/1 O*E2 0.0.0.0/0 [110/1] via 23.0.0.2, 00:58:11, Serial0/1/0

RIP Network Topology (used by the ISP)

Configuration of RIP on Routers

To turn ON RIP process globally on a router

Router4# configure terminal Router4(conf)# router RIP

Select the interfaces(networks) which we want to advertise

Router 4(conf-router)# network 34.0.0.0 Router 4(conf-router)# network 45.0.0.0

10.0.0.0 The network which we want to advertise and enable routing on.

Routes at the ISP Router


The result of show ip route command on an ISP Router is:R4#show ip route R 10.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0 R 20.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0 R 22.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0 R 23.0.0.0/8 [120/2] via 34.0.0.1, 00:00:24, Serial0/1/1 R 30.0.0.0/8 [120/2] via 34.0.0.1, 00:00:24, Serial0/1/1 C 34.0.0.0/8 is directly connected, Serial0/1/1 C 45.0.0.0/8 is directly connected, Serial0/0/0 R 56.0.0.0/8 [120/1] via 45.0.0.1, 00:00:00, Serial0/0/0 R 192.168.21.0/24 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0 R* 0.0.0.0/0 [120/1] via 45.0.0.1, 00:00:00, Serial0/0/0

The TCP/IP configuration of computers:-

Entries in the DNS Server:-

Entries of Access Lists:

Access List 100 used for applying the second constraint


R2#show ip access-lists 100 Extended IP access list 100 deny tcp host 192.168.21.50 host 60.0.0.60 deny tcp host 192.168.21.60 host 60.0.0.60 deny tcp host 192.168.21.60 host 70.0.0.70 deny tcp host 192.168.21.50 host 70.0.0.70 permit ip any any

Access List 101 used for applying the third constraint


R2#show ip access-lists 101 Extended IP access list 101 permit ip 10.0.0.0 0.255.255.255 host 22.0.0.2 deny ip any any

Different parts of an Access List


deny tcp host 192.168.21.50 host 60.0.0.60
Deny Specifies the permission whether to permit/deny the access Tcp This specifies the type of traffic we want to permit/deny The type of traffic we can control is:IP Represents all the traffic flowing on the internet. TCP Represents only the packets which use Transmission Control Protocol UDP - Represents only the packets which use the User Datagram Protocol ICMP - Represents only the packets which use Internet Control Message Protocol Host 192.168.21.50 This section specifies the source machine we want to control access to Host 60.0.0.60 - This section specifies the destination machine we want to control access to Instead, if we want to control the access to all the machines, we do it by writing any like:-

Permit ip any any

Thank You!!!

S-ar putea să vă placă și