Professional Documents
Culture Documents
Networking:-
Protocols:-
Protocols are the sets of rules that govern how the computer and other network devices
exchange information over a network.
1) Local Area Network (LAN):- LAN can be defined as a network that spans a
relatively small geographic area.
2) Wide Area Network (WAN):- WAN can be defined as a network that spans a
relatively large geographic area.
3) Metropolitan Area Network (MAN):- MAN can be defined as a network that
spans several LAN across a city wide area geographic area.
Network Architecture:-
1) Peer to Peer Network:- In Peer to Peer networking, all hosts can request and
provide data and services on the network.
Ex:- By connecting two Window XP workstations in order to share information
can be considered as Peer to Peer network.
Peer-to-Peer
1
Client/Server Architecture
2
Section 2:- OSI & TCP/IP reference model
1) Application Layer: -
• It provides the actual interface between the user applications and the network.
• Protocols:- FTP, SMTP, HTTP, Telnet, DNS, DHCP etc.
• Devices:- Gateway.
• PDU:- Data.
2) Presentation Layer:-
• It is responsible for the data translation and code formatting. It also provides the
encryption and compression of data.
• Protocols:- RTF,GIF,JPG,AVI etc.
• Devices:- Gateway.
• PDU:- Data.
3) Session Layer:-
3
4) Transport Layer:-
3) Network Layer:-
• It manages the logical addressing of the devices and also handles the routing.
• Protocols:- IP, IP/SPX, ICMP, ARP, RARP.
• Devices:- Router.
• PDU:- Packet.
• It is responsible for physical transmission of data and can also handles error
notification, network topology and flow control.
• Two sub layer:- LLC and MAC
1) Logical Link Control:- It serves as the intermediary between the physical
layer and upper layers.
2) Media Access Control:-
1) Physical Layer:-
TCP/IP Model:-
1) Application Layer:-
• It defines protocols for node to node application communication and also control
user interface specification.
4
• Protocols:- Telnet, FTP,TFTP,SMTP etc.
• DPU:- Data.
• It provides end to end data communication and ensuring the error free delivery of
data.
• It handles packet sequencing and maintains data integrity.
• Protocols:- TCP, UDP etc.
• PDU:- Datagram, Segment.
3) Internet Layer:-
4) Network Layer:-
• It defines the physical interconnection between hosts and monitors the data
exchange between the host and the network.
• Protocols:- Ethernet, Token Ring, FDDI etc.
• PDU:- Frame , Bits.
Protocol Description:-
1) FTP (File transfer protocol):- It is used to send and receive files on internet.
It uses port 20 and 21.
2) Telnet: - It is used to connect to a host and emulate a terminal that the remote
server can recognize. It uses port 23.
3) SMTP (Simple mail transfer protocol):- It is used to send email on the
network. It uses port 25.
4) DNS (Domain naming system):- It is used to resolve a fully-qualified domain
name to IP address. It uses port 53.
5) DHCP (Dynamic host configuration protocol):- It is used to automatically
provide IP address to client computers. It uses port 67&68.
6) HTTP (Hyper text transfer protocol):- It is used to send or receive web
pages on the web that are encoded in html. It uses port 80.
7) POP3 (Post office protocol):- It is used by the e-mail clients to retrieve mails
from the remote servers. It uses port
8) RPC (Remote procedure call):- It enables computers to share methods,
routine and common function on a network.
5
9) NFS (Network file system):- It allows two different types of file system to
interoperate.
10) IMAP (Internet message access protocol):- A protocol for e-mail messages
on the internet.
11) SNMP (Simple network management protocol):- it is used for monitoring
and manages network devices such as router, switch etc. It uses UDP port 161
&162.
• TCP is reliable and connection oriented protocol that ensures guarantee delivery
of data.
• TCP utilizes three way handshake method.
6
• Host A sends a synchronous message to Host B to establish a connection.
• Host B sends a acknowledgement message to Host A’s synchronous message
and sends it’s own synchronous message.
• Then Host A responds with a acknowledgement message to Host B’s
synchronous message.
TCP UDP
1) Connection oriented protocol. 1) Connectionless protocol.
2) Provides three way handshake. 2) No three way handshake.
3) Sends acknowledgements 3) Doesn’t send acknowledgment
4) Reliable but slow. 4) Unreliable but slow.
5) Segments and sequences data. 5) Doesn’t segments and sequence data.
6) Flow control. 6) No flow control.
7) Protocol ex- 7) DNS,DHCP,SNMP,TFTP,RIP,NFS
FTP,SSH,Telnet,SMTP,DNS,HTTP,POP3,
HTTPS/SSL.
7
Section 3:- Ethernet Standard and Cable
The Ethernet has become the standard technology used in LAN technology.
1) Ethernet:-
2) Fast Ethernet:-
3) Gigabit Ethernet:-
8
5) 1000BaseBX- 1000 mbps speed over single mode fiber cable.
Cable:-
Cable is the medium through which information usually moves from one network device
to another.
The following types of cable used in networks:-
1) Twisted Pair
2) Coaxial Cable
3) Optical Fiber Cable
• Twisted Pair cable usually contains 2 or 4 pair of wire twisted around each other
to reduce crosstalk.
• Crosstalk is a form of electromagnetic interference or noise that reduces the
strength and quality of a signal.
• Two varieties of Twisted Pair Cable
7) STP
8) UTP (Most popular)
(UTP)
9
(RJ-45 connector)
2) Coaxial Cable:-
Coaxial Cable
• The most common type of connector used with coaxial cable is the Bayone-Neill-
Concelman (BNC).
• Different types of adapters are available for BNC connectors, including a T-
connector, barrel connector and terminator.
BNC Connector
• The two types of coaxial cable is
10
1) Thinnet (10Base2)
2) Thicknet (10Base5)
1) Thinnet (10Base2):-
• Fiber optic cable consists of a center glass core surrounded by a several protective
materials. It transmits light rather than electrons.
• It supports transmission speed varies from 100 mbps to 1 gbps or 1000 mbps.
• Maximum length is 2 km.
• It is expensive and difficult to install.
• There are two types of fiber optic
1) Single Mode.
2) Multi Mode.
• Single mode can provide more distance than muli mode and more expensive.
11
Section 4:- Topology and Network Devices
Network Topology:-
The network topology is the physical interconnections of the networking devices. A LAN
is an example of the network topology that exhibits both the physical and logical
topology. Two types of Topology :- 1) Physical Topology.
2) Logical Topology.
1) Physical Topology:-
• The way that the workstations are connected to the network through the actual
cables that transmits data.
• A) Bus: - All devices are connected to a central cable with a terminator at each
end.
Bus Topology.
Advantage:-
• Easy to connect a computer or peripheral to a linear bus cable.
• Requires less cable length than a star topology.
12
Disadvantage:-
• Entire network shuts down if there is a break in the main cable.
• Terminators are required at both ends of the backbone cable.
• Difficult to identify the problem if the entire network shuts down.
• Not meant to be used as a stand-alone solution in a large building.
B) Ring: - All devices are connected to one another in a shape of a closed loop.
Ring Topology
Advantage:-
• Very orderly network where every device has access to the token and the
opportunity to transmit
• Performs better than a star topology under heavy network load
• Can create much larger network using Token Ring
• Does not require network server to manage the connectivity between the
computers
Disadvantage:-
• One malfunctioning workstation or bad port in the MAU can create
problems for the entire network.
• Moves, adds and changes of devices can affect the network.
• Network adapter cards and MAU's are much more expensive than
Ethernet cards and hubs.
• Much slower than an Ethernet network under normal load.
13
Star Topology.
Advantage:-
• Easy to install and wire.
• No disruptions to the network when connecting or removing devices.
• Easy to detect faults and to remove parts.
Disadvantage:-
• Requires more cable length than a linear topology.
• If the hub, switch, or concentrator fails, nodes attached are disabled.
• More expensive than linear bus topologies because of the cost of the hubs,
etc.
Tree Topology
Advantage:-
• Point-to-point wiring for individual segments.
• Supported by several hardware and software venders.
Disadvantage:-
• Overall length of each segment is limited by the type of cabling used.
14
• If the backbone line breaks, the entire segment goes down.
• More difficult to configure and wire than other topologies.
2) Logical Topology:-
• The way that the data passes through the network from one device to the next
without regard to the physical interconnection of the devices.
• The Ethernet protocol is a common logical bus topology protocol. LocalTalk is
a common logical bus or star topology protocol. IBM's Token Ring is a common
logical ring topology protocol.
Networking Devices:-
1) Multiplexer:-
• Multiplexer is a device that is used to combine the several signals into one signal.
2) NIC Cards:-
15
b) The DSU converts the data encoded in the digital circuit into synchronous
serial data for connection to a DTE device and provides timing to each end.
4) Repeaters:-
(Repeater)
5) Hub:-
16
free then it sends the data. If two devices transmit data at the same time, a
collision occurs and each computer stop data transmit for a specific amount of
time before retransmitting their respective packet.
• All ports on a hub belong to the same collision domain.
• Hubs belong to only one broadcast domain. It forward both broadcasts and
multicasts out every port, except for the port the broadcast or multicast originated
from.
• There are three different types of hubs:-
1) Passive
2) Active
3) Intelligent
• Passive hubs don’t amplify the electrical signal of incoming packets before
broadcasting them out to the network.
• Active hubs, on the other hand, do perform this amplification, as does a different
type of dedicated network device called a repeater.
• Intelligent hubs add some more features to that provided by the active hubs. It
helps in improving the performance of the network/LAN and managing the data
communication within the network.
(Hub)
6) Bridge:-
• Bridge is a device that connects two different LAN segments based on same
protocols.
• Bridge works at data link layer.
• It forward frames based on Mac address and reduces traffic between two
segments.
• Types of bridges:-
1) Transparent Bridge
2) Translation Bridge
3) Encapsulated Bridge
17
(Bridge)
• Transparent Bridge simply connects two LAN based on same protocols.
• Translation Bridge can forwards data between two dissimilar protocols, such as
Ethernet to FDDI or Ethernet to Token Ring.
7) Switch:-
• Layer-2 switch makes intelligent forwarding decision based on the MAC address.
• It sends packet only to the intended ports rather than all computers on the
network.
• Unlike hubs, switches can operate at full duplex.
• Each individual port on a switch belongs to its own collision domain. Thus
switches create more collision domains.
• Like hubs, switches belong to one broadcast domain.
• Layer-2 switches will forward a broadcast or multicast out every port, excluding
the port the broadcast or multicast originated from.
• Switches utilize the Spanning Tree Protocol to maintain a loop free environment.
• There are three things that switches do that hubs don’t:-
• Address Learning.
• Intelligent forwarding and filtering.
• Loop Avoidance.
• Switches support three methods of forwarding frames:-
• The Cut-Through (Real Time) method reads only the header of a frame to
determine its destination address. This method transfers frames at wire speed
and has less latency of any of the three methods. No error checking.
• The Fragment Free (Modified Cut-Through) method reads only the first 64
bytes of a frame, which is minimize size of an Ethernet packet. His is the default
mode for a catalyst 1900 family switch.
• The Store and Forward method reads the entire frame and performs a Cycle
Redundancy Check (CRC) to ensure complete reliability. And has the highest
latency of any the three methods due to error checking.
18
(Switch)
8) Router:-
(Router)
9) Gateway:-
10) Brouter:-
• Brouter is a device that combines both the features of bridge and router.
• Works at network and data link layers.
19
Section 5: Wide Area Network(WAN)
20
• It is owned by the customer and located on the customer premises.
2) Demarcation Point:-
• It is the point where service provider responsibility ends and the CPE begin.
3) Local Loop:-
• This is the physical line connection between the customer’s network and the
service provider’s nearest central office.
• This point connects the customer’s networks to the provider’s switching network.
5) Toll Network:-
• Point-to-Point technologies:-
• Circuit-switched technologies:-
It requires call set-up to occur before data can be transferred. The session
is usually torn down once the data transferred is complete.
Circuit-switched lines are generally low speed compared to point to point
lines.
Ex: - Asynchronous Dial-up & ISDN.
21
• Packet-switched technologies:-
WAN Encapsulation:-
22
• Multi-link
• Error Control.
The first line sets the hostname of the router. The second line sets the
username and password used for PPP authentication. The username must
be the hostname of the remote router, and the password must be the same
on both routers.
23
• Frame Reley:-
Frame Relay switches make decision based on the Data Link Connection
Identifiers (DLCIs), whereas Ethernet switches make decision based on
the MAC addresses.
Frame Relay encapsulation type:-
• Cisco – the default, and proprietary, Frame-Relay encapsulation
• IETF – the standardized Frame-Relay encapsulation.
Frame-Relay Local Management Interface (LMI) is the type of signaling
used between our router and our provider’s Frame-Relay switch. LMI
provides status updates of Virtual Circuits between the Frame switch and
the router.
There are three LMI-types:
• Cisco – default and proprietary (naturally)
24
• ANSI
• Q.933a
LMI type is auto-sensed on Cisco routers, but can be manually set if
desired.
Consider the above example. For a connection from Host A to Host B, the
NAT addresses are identified as follows:
• Inside Local Address- 10.1.1.10
• Inside Global Address- 55.1.1.1
• Outside Global Address- 99.1.1.2
• Outside Local Address- 99.1.1.2
25
Host A’s configured address is 10.1.1.10, and is identified as its Inside
Local Address. When Host A communicates with the Internet, it is
stamped with Router A’s public address, using PAT. Thus, Host A’s
Inside Global address will become 55.1.1.1.
When Host A communicates
with Host B, it will access Host B’s outside Global address of 99.1.1.2. In
this instance, the Outside Local address is also 99.1.1.2. Host A is never
aware of Host B’s configured address.
26
Next, a pool of global addresses must be specified. Inside hosts will
dynamically choose the next available address in this pool, when
communicating outside the local network:
The first command states that any inside host with a source that matches
access-list 10 can be translated to any address in the pool named
POOLNAME. The access-list specifies any host on the 172.16.1.0
network.
Recall that NAT Overload (or PAT) is necessary when the number of
internal clients exceeds the available global addresses. Each internal host
is translated to a unique port number off of a single global address.
Troubleshooting NAT
27
Router# show ip nat statistics
• Benefits:
28
Scalability.
• Types of VPN:-
1) Site-to-Site VPN- Organization use site-to-site VPNs to connect dispersed
location in the same way as a lease line or frame-relay connection is used.
2) Remote Access VPN- In a remote access VPN, each host typically has VPN
client software. Whenever the host tried to send any traffic, the VPN client s/w
encapsulation and encrypts that traffic before sending it over the internet to the
VPN gateway at the edge of the target network. On receipt, the VPN gateway
handles the data in same way as it would handle data from a site-to-site VPN.
29
• Characteristic of secure VPN:-
1) Data Confidentially- Protects data from spoofing.
2) Data Integrity- Guarantees that no tempering or altercation occurs.
3) Authentication- Ensures that only authorized senders and devices enter the
network.
30
• Encryption- Encryption codes data into different format using secret keys.
• VPN tunneling- It encapsulates an entire packet within another packet and sends
the new packet over a network.
Protocols:-
- Carrier Protocols: The protocols over which the information is
traveling (Fame-Relay, ATM, and MPLS).
- Encapsulating Protocols: The protocols that is wrapped around the
original data. (GRE, L2F, IPSec, L2TP, PPTP)
- Passenger Protocol: The protocol over which the original data was
being carried. (IPX, AppleTalk, IPv4, IPv6)
31
• Some common Encryption algorithms:-
1) Data Encryption Standard (DES)-
It was developed by the IBM.
DES uses a 56-bit key.
DES is a symmetric key cryptography.
• IPSec:-
32
Authentication Header (AH)-
• It provides both authentication and data integrity.
• It doesn’t provide confidentiality of data.
• It doesn’t encrypt data.
• AH uses hash algorithm to compute a hash value on both the payload
and header of a packet, ensuring integrity of the packet.
• AH won’t work through a NAT enable device.
IPSec configuration-
• When configure an IPSec gateway to provide security services, first
choose an IPSec protocol. ESP or ESP with AH or AH.
• If the IPSec is implemented with ESP, then choose the encryption
algorithm that is appropriate for the desired level od security:DES, AES
or 3DES.
• Then choose an Authentication algorithm to provide data integrity, MD5
or SHA.
• Establish the sharing of key information between peers. DH1 or DH2 or
DH5.
33
Section 6: Routing & Switching
Routing:-
Routing is the process of sending packets from one network to another network.
• When a router is turned on. The bootstrap is loaded from ROM. Then the
bootstrap runs the power on self test (POST).
• If the post completes successfully, the bootstraps attempts to load IOS from the
Flash memory.
• If the bootstrap doesn’t find the IOS in Flash, it loads the basic IOS from the
ROM into the RAM. If the bootstrap does find the IOS, it loads the IOS into
RAM.
• After that the IOS attempts to loads the startup-config file from the NVRAM.
• If the startup-config is not found in NVRAM, the IOS attempts to load a
configuration file from TFTP server. If no TFTP responds, the router enters initial
configuration mode.
• If the startup-config is found in NVRAM, it is loaded into RAM.
• Then the startup-config becomes the running-config in RAM.
Routing principles:-
• Every router makes its decision alone, based on the information it has its own
routing table.
• The fact that one router has certain information in its routing table doesn’t mean
that other router have the same information.
• Routing information about a path from one network to another doesn’t provide
routing information about the reverse or return path.
Path Determination:-
• The path determination function is the process of how the router determines
which path to use when forwarding a packet.
34
• To determine the best path, the router searches its routing table for a network
address that matches the packet’s destination IP address.
• The router encapsulates the IP packet into the Layer-2 data link
frame of the exit interface.
• The type of encapsulation is determined by the type of interface
1) Fast Ethernet- Ethernet frames.
2) Serial – PPP frame.
Switching Function:-
• The switching function is the process used by a router to accept a packet on one
interface and forward it out to another interface.
• When a router receives a packet, it does three works-
1) De encapsulates the layer-3 packet by removing the layer-2 frame header and
trailer.
2) Examines the destination IP address in the routing table.
3) Encapsulates layer-3 packet into a new layer-2 frame and forward it out.
• As a packet travels from the source device to the final destination device ,
the layer-3 IP address don’t change, however the layer-2 data link address change
at every hop.
35