Documente Academic
Documente Profesional
Documente Cultură
NETWORKING BASICS
Three main networking technologies are used to connect computers and networks together:
LAN
Used to network computers located in a limited geographical area such as a room, floor, or building Has three main attributes
EXAMPLE OF A LAN
WAN
Spans a large geographic area Defined as an internetwork (private or public) that connects many LANs Uses routers and usually point-to-point links Examples of WANs
NETWORKING BASICS
EXAMPLE OF A WAN
Benefits of VPNs
Importance of Bandwidth
14
Facilitate communication between two networked devices Perform data encapsulation Provide a common language to communicating devices Provide either connectionless or connectionoriented services
15
Connectionless protocols
Do not require a connection Have very little overhead Are fast and unreliable Require a connection
Connection-oriented protocols
16
17
18
ROUTING
19
SUMMARY
LANs, WANs, and MANs allow groups of computers to share information. Signaling protocols are used to transmit data as 1s and 0s.
20
Chapter 2
NETWORK CABLING
21
TOPOLOGIES
Bus Star
Ring
Mesh Wireless
22
BUS TOPOLOGY
23
24
STAR TOPOLOGY
The star topology can use coaxial, twisted pair, or fiber optic cable. A central device (hub) connects hubs and nodes to the network.
Each node connects to its own dedicated port on the hub. Hubs broadcast transmitted signals to all connected devices. You can connect multiple hubs to form a hierarchical star topology.
25
26
27
RING TOPOLOGY
The ring topology can use twisted pair or fiber optic cabling.
The ring topology uses the baseband signaling method. Frames are transmitted around the ring from node to hub to node. Media Access Control (MAC) is used for token passing.
28
A RING NETWORK
29
MESH TOPOLOGY
Typically uses fiber optic cabling for redundant wide area network (WAN) links Provides multiple paths to destinations for fault tolerance
30
LAN MESH
31
ENTERPRISE MESH
32
WIRELESS TOPOLOGY
Ad hoc Infrastructure
33
AD HOC WLAN
34
INFRASTRUCTURE WLAN
35
36
COAXIAL CABLE
37
38
39
40
UTP CONNECTORS
41
Frequency
Up to 0 MHz Up to 1 MHz
Primary Application
Voice networks Voice and low-speed data networks less than 4 Mbps
3
4 5
Up to 16 MHz
Up to 20 MHz Up to 100 MHz
5e 6
42
43
44
either
the cable are connected to the receive contact at the other end
45
46
CROSSOVER WIRING
47
SUMMARY
The three basic LAN topologies are bus, star, and ring. WLANs are becoming more popular. Mesh networks are not typically used in LANs. The primary cable types used in LANs are coaxial, twisted pair, and fiber optic.
48
Network Devices
NIC
Ethernet network interface card (NIC), which inserts into the system bus of a computer and makes the connection between running software processes on the computer and physical media.
Repeater
A repeater
HUB
HUB
is a device used to connect all of the computers on a
star network.
From the outside, a hub looks like nothing more than
destination address that causes it to be read and processed by every computer that receives it computer on the network
Signals degrade with transmission distance. Each Ethernet type has a maximum segment length.
Bandwidth is shared
Extends cable distances Repeats or amplifies signal
Collisions
Bridges
Operate at Layer 2 of the OSI model Forward, filter, or flood frames Few ports Slow
Layer 2 devices
A layer 2 device is a device that understand MAC, for example: NIC (Network Interface Card) Bridge : - address learning - forwarding decisions are based on software - bridge is used for LAN segmentation - max. 16 port. Switch: - a multi-port bridge up to 567 port - forwarding decisions are based on hardware ASIC (faster than bridge)
LANs Today
MAC Addresses
Decimal-to-Binary-Conversion
Examples
205
10
to binary
to binary
1100110 1 0000101
0 226 199 8C E0 134
11100010 to decimal
11000111 to decimal
10001100 to hexadecimal
224 to hexadecimal
0x86
to decimal
Router
functions of a router
- connect between networks - Select best path - Divide broadcast domain
- Packet forwarding
receive a broadcast message transmitted by any one of the computers in the group.
network) that is constructed so that when two computers transmit packets at the same time, a collision occurs, causing both packets to be lost. All hosts that are affected by a collision belong to the same collision domain.
Collision domain
one Equal number of ports Equal number of ports
Broadcast Domain
one one Equal number of ports
EIA/TIA T568A
EIA/TIA T568B
Crossover
Crossover
Straight-through
Straight-through
Straight-through
Multi-Layer Switch
83
Chapter 4
84
divides the data-link and physical layers of the Open Systems Interconnection (OSI) model into four sublayers:
Two IEEE data-link sublayers:
The upper sublayer is the 802.2 or Logical Link Control (LLC)
Operates independently from the Media Access Control (MAC)
sublayer
802.11
85
86
87
88
15-pin connectors, 50-ohm terminators, and external transceivers Maximum distance per segment: 500 meters
Maximum distance per network: 2500 meters
Uses the 5-4-3 rule
89
transceivers
90
5-4-3 RULE
91
(1000Base-X)
92
10Base2
Physical and data-link layer standards and limitations
93
cabling Two-pair UTP with RJ-45 connectors: One pair for transmit, the other one for receive
Supports half-duplex and full-duplex modes Maximum distance per segment: 100 meters
includes connections from workstation to hub and also connections between hubs) Uses the 5-4-3 rule
94
95
Supports half-duplex mode or full-duplex mode Maximum distance per segment (half or full): 100
meters
96
97
meters Maximum length of a multimode full-duplex segment: 2 kilometers Maximum length of a singlemode half-duplex segment: 2 kilometers Maximum length of a singlemode full-duplex segment: 10+ kilometers
98
99
meters
meters
100
101
VERSION II FRAME
102
103
104
105
Media Access Control: Is the mechanism that enables multiple computers to use the same network medium without conflicting
106
Multiple access
Collision detection
107
If the channel is busy, the device must wait. If the channel is idle, the device can transmit a frame.
108
CSMA All devices on the network contend for access to the channel.
When two or more devices transmit at the same time,
Collision Detection
send out a jamming signal and then back off for a random interval before trying again.
109
COLLISIONS
Collision
Contention
traffic increases.
110
TOKEN RING
Token-passing channel access method (Next Slide) Uses Multistation Access Units (MAUs) to connect nodes to the
network
You can connect MAUs together, using RI (Ring In) and RO (Out)
111
TOKEN Passing
Token Passing
network.
data.
112
113
(ANSI)
Has a 100-Mbps transmission rate over fiber optic cabling Uses the token passing channel access method Supports early token release Uses single attachment station (SAS) or dual attachment
114
Supports both:
Singlemode cable (600 Km segments) Multimode cable (100 Km segments &
500 Workstations) This is the industry standard for fiber optic LANs.
115
117
118
FDDI FRAMES
119
WIRELESS LANS
Wireless LANs
LANs (WLANs).
Support ad hoc or infrastructure topologies Use three different signaling methods: Direct Sequence Spread
Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS), and infrared (CSMA/CA) channel access method
120
AD HOC WLAN
121
INFRASTRUCTURE WIRELESS
122
SUMMARY
DIX and IEEE 802.3 define physical and data-link
layer standards and functions for Ethernet networks using CSMA/CD over coaxial, twisted-pair, or fiber optic cabling. layer standards and functions for a token passing ring topology.
standards for a token-passing, fiber optic ring topology.
IBM and IEEE 802.5 define physical and data-link FDDI defines the physical and data-link layer
123
Chapter 5
124
(TCP/IP) suite
Microsofts suite
NetBIOS Extended User Interface (NetBEUI)
125
126
IP FUNCTIONS
Encapsulation IP forms a datagram by adding an IP header to information
addresses.
them.
Routing
The selection of the most efficient path.
127
DATAGRAM ENCAPSULATION
128
packets.
129
destination.
Fragmentation
130
132
134
IP
ICMP Gateway-to-Gateway Protocol (GGP) TCP (most expected) Exterior Gateway Protocol (EGP) UDP (most expected)
136
IP ADDRESSING
IP addresses are
Logical network layer addresses used to identify
Public or private
137
138
139
140
141
142
143
144
145
146
IP SUBNETTING
Each address class can be divided further to create
subnets.
bits.
identify hosts.
147
150
151
PRIVATE IP ADDRESSES
152
4 (IPv4) addresses
bits
153
Interface ID
154
156
159
IPX ADDRESSING
IPX logical network layer addresses consist of three
parts:
Network
The network portion is four bytes long and is assigned
Node
The node portion is the hardware address of the
Socket
The socket is a two-byte value specifying the
application process.
160
IPX ADDRESSING
161
IPX/SPX suite:
destination unreachable).
IPX RIP uses two metrics for best path selection: hops
162
164
168
NETBEUI
The NetBEUI protocol was developed by IBM and
NetBEUI is a nonroutable protocol used for NetBEUI does not contain network layer addressing. The NetBEUI frame format includes two
components:
Type II header with control fields A transport layer NetBIOS programming interface
171
SUMMARY
Network layer protocols like IP, IPX, and DDP
There are three classes of IP addresses: Class A, Subnet masks are used to further subdivide Class A,
protocol that does not provide logical network layer addressing and is therefore not routable.
172
Chapter 6
173
Connectionless
User Datagram Protocol (UDP)
174
UDP
175
and acknowledgments
176
178
179
Exchange initial sequence numbers (ISNs) Exchange maximum segment sizes (MSSs) Exchange port numbers
180
182
187
characteristics:
Uses IP ID 17
application
188
190
IP address. (ex: 192.168.2.10:21) this socket addresses port 21 on the system with address 192.168.2.10
191
65,534
192
UDP ports
Trivial File Transfer Protocol (TFTP) 69 Domain Name System (DNS) 53 Bootstrap Protocol/Dynamic Host Configuration
Protocol (BOOTP/DHCP) 67
193
SOCKETS
194
NCP
195
SPX Characteristics
SPX is the acronym for Sequenced Packet Exchange. SPX is a connection-oriented protocol.
datagrams.
196
NCP Characteristics
NCP is the acronym for NetWare Core Protocol. NCP is used for NetWare file sharing traffic. It is much more frequently used than SPX. Messages are carried in IPX datagrams. NCP requires an acknowledgment for each
transmitted message.
200
SUMMARY
Connection-oriented transport layer protocols like
acknowledgments, flow control, error correction and detection, session establishment, and teardown.
201
Chapter 7
TCP/IP
Chapter 7: TCP/IP
202
TCP/IP History
Developed in the 1970s Created for use on the ARPANET Used by UNIX Predates the PC, the Open Systems
Chapter 7: TCP/IP
203
TCP/IP Standards
Developed using a collaborative process Published as Requests for Comments (RFCs) by
Chapter 7: TCP/IP
204
protocols simultaneously
Chapter 7: TCP/IP
205
Peer-to-Peer Communication
Chapter 7: TCP/IP
207
Chapter 7: TCP/IP
208
Routing Information Protocol (RIP) version 1 and 2 Open Shortest Path First (OSPF)
Chapter 7: TCP/IP
209
transport layer.
TCP UDP
Chapter 7: TCP/IP
210
File Transfer Protocol/Trivial File Transfer Protocol (FTP/TFTP) Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) Telnet Simple Network Management Protocol (SNMP)
Chapter 7: TCP/IP
211
ARP
The Address Resolution Protocol (ARP) resolves
Chapter 7: TCP/IP
217
Chapter 7: TCP/IP
222
IP ROUTING BASICS
Routers are network layer(Layer 3) devices that
Connect similar or dissimilar data-link layer architectures to
form an internetwork.
network layer address. The best path selection is determined by the least cost metric. Routes to remote destinations are learned in two ways:
Statically
Dynamically
Chapter 7: TCP/IP
223
Chapter 7: TCP/IP
224
STATIC ROUTES
Static routes are manually configured by an
administrator. network.
static route must be added and the old one must be removed.
Chapter 7: TCP/IP
225
DYNAMIC ROUTES
Dynamic routes are automatically learned and
route tables and advertise route information. very quickly to changes in the network.
Chapter 7: TCP/IP
226
infrastructure changes
Chapter 7: TCP/IP
227
Chapter 7: TCP/IP
228
Chapter 7: TCP/IP
229
Chapter 7: TCP/IP
230
Chapter 7: TCP/IP
231
Routecon.nlm or Inetcfg.nlm.
Chapter 7: TCP/IP
232
ROUTE.EXE SYNTAX
To add a static route, use the following command
line syntax:
mask] [local interface address] IF [local interface number] METRIC [metric value for route]
For example:
ROUTE ADD 192.168.3.0 MASK 255.255.255.0
192.168.2.2 IF 1 METRIC 1
Chapter 7: TCP/IP
233
Chapter 7: TCP/IP
237
Chapter 7: TCP/IP
241
2328.
multicast advertisements.
Chapter 7: TCP/IP
242
Chapter 7: TCP/IP
243
Chapter 7: TCP/IP
244
Identifies computers using names composed of 3 or more words, separated by periods. Common Top Level Domains .edu .gov .mil .com .net .org
Chapter 7: TCP/IP
245
Chapter 7: TCP/IP
246
Chapter 7: TCP/IP
247
DHCP
addresses
Runs on top of UDP or TCP Uses well-known server port 67 and client port 68
Chapter 7: TCP/IP
248
(for data)
Chapter 7: TCP/IP
249
Chapter 7: TCP/IP
250
Chapter 7: TCP/IP
251
Chapter 7: TCP/IP
252
for information and set network traps. Use to gather information about the network
Chapter 7: TCP/IP
253
Chapter 7: TCP/IP
254
Default Gateway
DNS Server Address Windows Internet Name Service (WINS) Server
Chapter 7: TCP/IP
255
interface adapter, it automatically installs the network interface device driver and the following TCP/IP modules:
Client for Microsoft Networks File and Print Sharing for Microsoft Networks Internet Protocol (TCP/IP)
Chapter 7: TCP/IP
257
Chapter 7: TCP/IP
258
Chapter 7: TCP/IP
259
Chapter 7: TCP/IP
260
Chapter 7: TCP/IP
261
Chapter 7: TCP/IP
262
Chapter 7: TCP/IP
263
SUMMARY
The TCP/IP protocol stack consists of four layers: link,
internet, transport, and application. ARP resolves logical network layer addresses to MAC addresses. ICMP is a messaging protocol used to report IP errors and query hosts for information. Routers connect networks. They use static or dynamic routing protocols to learn and advertise routes. Application layer protocols provide services to IP clients, such as file transfer and e-mail capability. IP hosts must be configured with an IP Address, Subnet Mask, Default Gateway, DNS Server Address, WINS Server Address, and other parameters to communicate on a network.