Xzno22222222222 PDF
Xzno22222222222 PDF
2019-2020
[Link]. Dr Mehdi Ebady Manaa
Network Operating
Systems
NOS
• Every network today has some form of
software to manage its resources. This
software runs on a special, high-powered
computer and is called a network
operating system (or NOS, for short).
The NOS is one of the most important
components of the network.
A networking operating system (NOS) is
the software that runs on a server and
enables the server to manage data, users,
groups, security, applications, and other
networking functions.
The most popular network operating
systems are
* Microsoft Windows Server 2003/ 2008,
* UNIX, Linux,
* Mac OS X, and
* Novell NetWare.
Network Operating Systems are based on a
client/server architecture in which a
server enables multiple clients to share
resources.
Network Operating Systems (NOS) are
embedded in a router or hardware firewall
that operates the functions in the network
layer (layer 3) of the OSI model.
• Examples:
• Cisco IOS (formerly "Cisco Internetwork
Operating System").
• MikroTik RouterOS™ (is a router
operating system and software which
turns a regular Intel PC or MikroTik
RouterBOARD™ hardware into a
dedicated router.)
Client/Server
Client/server network operating systems allow the
network to centralize functions and applications
in one or more dedicated servers. The server is
the center of the system, allowing access to
resources and instituting security. The network
operating system provides the mechanism to
integrate all the components on a network to
allow multiple users to simultaneously share the
same resources regardless of physical location.
NOS Characteristics
The function of an operating system (OS) is
to control the computer hardware, program
execution environment, and user interface.
The OS performs these functions for a
single user or a number of users who
share the machine serially rather than
concurrently. An administrator may set up
accounts for more than one user, but
users cannot log on to the system at the
same time.
In contrast, network operating systems
(NOSs) distribute their functions over a
number of networked computers. A NOS
depends on the native OS in each
individual computer. It then adds functions
that allow access to shared resources by a
number of users concurrently.
• NOS computers take on specialized roles
to accomplish concurrent access to shared
resources. Client systems contain
specialized software that allows them to
request shared resources that are
controlled by server systems responding
to a client request. Figure below illustrates
the concept of how data that is stored in
servers is made available to the requests
of clients.
Differences between PCs and a NOS
• PCs function as clients in a NOS environment.
By using the functions of the PC native operating
system, the user is able to access resources that
are local to the PC. These include applications,
files, and devices that are directly attached such
as printers. When a PC becomes a client in a
NOS environment, additional specialized
software enables the local user to access non-
local or remote resources as if these resources
were a part of the local system. The NOS
enhances the reach of the client PC by making
remote services available as extensions of the
local native operating system.
Although a number of users may have accounts on
a PC, only a single account is active on the
system at any given time. In contrast, a NOS
supports multiple user accounts at the same
time and enables concurrent access to shared
resources by multiple clients. Servers must
support multiple users and act as repositories of
resources that are shared by many clients.
Servers require specialized software and
additional hardware. Figure below illustrates this
concept further. The server must contain several
user accounts and be capable of allowing more
than one user access to network resources at a
time.
15 Information Networks - IT
University of Babylon
Multiuser, multitasking, and
multiprocessor systems
• In order to support multiple concurrent
users and to provide shared access to
network services, resources, and devices,
NOS servers must run operating systems
with characteristics that extend beyond
those of client PCs.
A NOS server is a multitasking system. Internally,
the OS must be capable of executing multiple
tasks or processes at the same time. Server
operating systems accomplish this with
scheduling software that is built into the
execution environment. The scheduling software
allocates internal processor time, memory, and
other elements of the system to different tasks in
a way that allows them to share the systems
resources. Each user on the multiuser system is
supported by a separate task or process
internally on the server. These internal tasks are
created dynamically as users connect to the
system and are deleted when users disconnect.
NOS Characteristics
1- Network Operating Systems (NOSs) distribute
their functions over a number of networked
computers.
2- It adds functions that allow access to shared
resources by a number of users concurrently.
3- Client systems contain specialized software that
allows them to request shared resources that
are controlled by server systems responding to a
client request.
4- The NOS enhances the reach of the
client PC by making remote services
available as extensions of the local
native operating system.
5- NOS supports multiple user accounts
at the same time and enables
concurrent access to shared resources
by multiple clients.
6- A NOS server is a multitasking system.
Internally, the OS must be capable of
executing multiple tasks or processes at
the same time.
7- Some systems are equipped with more
than one processor, called multiprocessing
systems. They are capable of executing
multiple tasks in parallel by assigning each
task to a different processor.
• 8- NOS servers are a computers with
additional memory to support multiple
tasks that are all active, or resident, in
memory at the same time.
• 9- Additional disk space is also
required on servers to hold shared files
and to function as an extension to the
internal memory on the system.
Another feature of systems capable of acting
as NOS servers is the processing power.
Ordinarily, computers have a single central
processing unit (CPU) that executes the
instructions which make up a given task or
process. In order to work efficiently and
deliver fast responses to client requests,
an OS that functions as a NOS server
requires a powerful CPU to execute its
tasks or programs.
Single processor systems with one CPU can
meet the needs of most NOS servers if
they have the necessary speed. To
achieve higher execution speeds, some
systems are equipped with more than one
processor. Such systems are called
multiprocessing systems. They are
capable of executing multiple tasks in
parallel by assigning each task to a
different processor.
Enterprise servers are also capable of running
concurrent copies of a particular command. This
allows them to execute multiple instances of the
same service or program call threads. A thread
is a computer programming term that describes
a program which can execute independently of
other parts. Operating systems that support
multithreading enable programmers to design
programs whose threaded parts can execute
concurrently.
Objectives
• MikroTik RouterOS and RouterBOARD;
• First time accessing the router;
Resources
• Documentation
[Link]
• About MikroTik
[Link]
• RouterOS features
[Link]
MikroTik RouterOS
• MikroTik Router OS is an operating system
which can be installed on a PC or
RouterBOARD hardware and will turn them into
a router with all the necessary features:
• Routing,
• Firewall,
• Bandwidth management,
• Wireless Access Point,
• Hotspot Gateway,
• VPN server and more.
RouterBOARD
RouterBOARD is the hardware platform
made by MikroTik.
First time accessing the router
• After you have installed the RouterOS software,
or turned on the Router for the first time, there
are various ways how to connect to it:
1- Accessing Command Line Interface (CLI) via
Telnet, ssh, serial cable or even keyboard and
monitor if router has VGA card.
2- Accessing Web based GUI (WebFig).
3- Using WinBox configuration utility.
First time accessing the router
• Every router is factory pre-configured with
IP address [Link]/24 on ether1
port.
• Default username is admin with empty
password.
Winbox and MAC-Winbox
• Winbox is configuration utility that can
connect to the router via MAC or IP
protocol. ( Winbox is a small utility that
allows administration of Mikrotik RouterOS
using a fast and simple GUI)
• Winbox program can be downloaded from
the Mikrotik site of RouterBOARD.
Starting the Winbox
• Winbox loader can also be downloaded directly
from the router.
• Open your browser and enter router's IP
address, RouterOS welcome page will be
displayed. Click on the link to download
[Link]
MTCNA Course
MikroTik Certified Network Associate
2014-2015
By [Link]. I.T Alaa A. Mahdi
Objectives
• Quickset
• Setup Internet connection via router;
- WAN DHCP-client (or Static IP)
- LAN IP address and default gateway
- Basic Firewall - NAT masquerade
- DNS
• Please see following articles to learn more
about web interface configuration:
• Initial Configuration with WebFig
[Link]
Configuration
Ethernet 1
Laptop IP addressing
Configuration
• Disable any other interfaces (wireless)
in your laptop,
• Set 192.168.X.1 as IP address,
• Set [Link] as Subnet Mask, and
• Set 192.168.X.254 as Default Gateway
allow-remote-requests
When the remote requests are enabled, the MikroTik router responds
to TCP and UDP DNS requests on port 53.
allow the router to be used as a DNS server
Notes
• If the property use-peer-dns under /ip
dhcp-client is set to yes then primary-
dns under /ip dns will change to a DNS
address given by DHCP Server.
Laptop - Internet
• Set your Laptop to use your router as
the DNS server
• Enter your router IP (192.168.x.254) as
the DNS server in laptop network settings
Laptop can access the router and the
router can access the internet,
one more step is required
Network Address Translation (NAT)
Make a Masquerade rule
Network Address Translation (NAT)
Network Address Translation (NAT) is a
router facility that replaces source and (or)
destination IP addresses of the IP packet
as it pass through the router.
It is most commonly used to enable multiple
host on a private network to access the
Internet using a single public IP address.
Network Address Translation
Network Address Translation
• Network Address Translation is an Internet
standard that allows hosts on local area
networks to use one set of IP addresses for
internal communications and another set of IP
addresses for external communications. A LAN
that uses NAT is referred as natted network.
For NAT to function, there should be a NAT
gateway in each natted network. The NAT
gateway (NAT router) performs IP address
rewriting on the way a packet travel from/to LAN.
There are two types of NAT:
• Source NAT or srcnat. This type of NAT
is performed on packets that are
originated from a natted network. A NAT
router replaces the private source address
of an IP packet with a new public IP
address as it travels through the router. A
reverse operation is applied to the reply
packets traveling in the other direction.
• Destination NAT or dstnat. This type of
NAT is performed on packets that are
destined to the natted network. It is most
comonly used to make hosts on a private
network to be acceesible from the Internet.
A NAT router performing dstnat replaces
the destination IP address of an IP packet
as it travel through the router towards a
private network.
• Hosts behind a NAT-enabled router do not
have true end-to-end connectivity.
Masquerading and Source NAT
/ip firewall src-nat
• Masquerading is a firewall function that can be
used to 'hide' private networks behind one
external IP address of the router.
• For example, masquerading is useful, if you
want to access the ISP's network and the
Internet appearing as all requests coming from
one single IP address given to you by the ISP.
The masquerading will change the source IP
address and port of the packets originated from
the private network to the external address of
the router, when the packet is routed through it.
Masquerading helps to ensure security since
each outgoing or incoming request must
go through a translation process that also
offers the opportunity to qualify or
authenticate the request or match it to a
previous request. Masquerading also
conserves the number of global IP
addresses required and it lets the whole
network use a single IP address in its
communication with the world.
• To use masquerading, a source NAT rule
with action=masquerade should be
added to the src-nat rule set:
action
masquerade - use masquerading for the
packet and substitute the source
address:port of the packet with the ones of
the router.
out-interface: Interface the packet is
leaving the router.
dst-address (IP/netmask | IP range;
)Matches packets which destination is
equal to specified IP or falls into specified
IP range.
src-address (Ip/Netmaks | Ip range;)Matches
packets which source is equal to specified IP or
falls into specified IP range.
University of Babylon, IT College
Information Network Dep., Third Class, Second Semester
MTCNA Course
MikroTik Certified Network Associate
2019-2020
ِAsst. Prof. Dr. Mehdi Ebady Manaa
Secure local network;
• point-to-point addresses;
• create PPPoE client on
• PPPoE service-name;
• create PPPoE server + LAB;
PPP settings;
• ppp secret + LAB;
• ppp profile + LAB;
• ppp status;
IP pool;
• create pool;
• manage ranges;
• assign to service;
Point-to-point protocol
• In networking, the Point-to-Point Protocol
(PPP) is a data link protocol commonly
used in establishing a direct connection
between two networking nodes. It can
provide connection authentication,
transmission encryption and compression.
• PPP is used over many types of physical
networks including serial cable, phone line,
cellular telephone, radio links, and fiber
optic links.
• PPP is also used over Internet access
connections (now marketed as
"broadband").
Most encapsulated forms of PPP is Point-to-
Point Protocol over Ethernet (PPPoE) which
used most commonly by Internet Service
Providers (ISPs) to establish an Internet
service connection with customers.
• RFC 2516 describes Point-to-Point Protocol
over Ethernet (PPPoE) as a method for
transmitting PPP over Ethernet
• The PPPoE (Point to Point Protocol over
Ethernet) protocol provides extensive user
management, network management and
accounting benefits to ISPs and network
administrators. Currently PPPoE is used
mainly by ISPs to control client connections
for Ethernet networks. PPPoE is an
extension of the standard Point to Point
Protocol (PPP). The difference between
them is expressed in transport method:
PPPoE employs Ethernet instead of serial
modem connection.
Transition Phases
Transition Phases
• Dead: In the dead phase the link is not being used.
There is no active carrier (at the physical layer) and the
line is quiet.
MTCNA Course
MikroTik Certified Network Associate
2019-2020
Asst. Prof. Dr. Mehdi Ebady Manaa
Bridge concepts
Creating bridges
Adding ports to bridges
Bridge concepts
Ethernet-like networks (Ethernet,
Ethernet over IP, IEEE802.11 in ap-
bridge or bridge mode, WDS, VLAN)
can be connected together using MAC
bridges. The bridge feature allows the
interconnection of hosts connected to
separate LANs as if they were attached
to a single LAN.
Bridge concepts
As bridges are transparent, they do not
appear in traceroute list, and no utility
can make a distinction between a host
working in one LAN and a host
working in another LAN if these
LANs are bridged.
Bridge concepts
Network loops may emerge
(intentionally or not) in complex
topologies. Without any special
treatment, loops would prevent
network from functioning normally, as
they would lead to avalanche-like
packet multiplication.
Bridge Interface Setup
To combine a number of networks into
one bridge, a bridge interface should
be created (later, all the desired
interfaces should be set up as its
ports). One MAC address will be
assigned to all the bridged interfaces
(the smallest MAC address will be
chosen automatically).
Bridge Interface Setup
To add and enable a bridge interface that
will forward all the protocols:
Bridge Interface Setup
Port Settings
Port submenu is used to enslave
interfaces in a particular bridge
interface.
Port Settings
Port Settings
University of Babylon, IT College
Information Network Dep., Third Class, Second Semester
MTCNA Course
MikroTik Certified Network Associate
2015-2016
By [Link]. I.T Alaa A. Mahdi
HotSpot
HotSpot is a way to authorize users to access some
network resources, but does not provide traffic
encryption.
To log in, users may use almost any web browser
(either HTTP or HTTPS protocol), so they are not
required to install additional software.
The gateway is accounting the uptime and amount of
traffic each client have used, and also can send
this information to a RADIUS server.
The HotSpot system may limit each particular user's
bitrate, total amount of traffic, uptime and some
other parameters
• The HotSpot system is targeted to provide
authentication within a local network (for
the local network users to access the
Internet). It is possible to allow users to
access some web pages without
authentication using Walled Garden feature.
• The MikroTik HotSpot Gateway provides
authentication for clients before access to
public networks .
HotSpot Gateway features:
• Different authentication methods of clients using local
client database on the router, or remote RADIUS
server;
• Users accounting in local database on the router, or on
remote RADIUS server;
• Walled-garden system, access to some web pages
without authorization;
• Login page modification, where you can put
information about the company;
• Automatic and transparent change any IP address of a
client to a valid address;
HotSpot Setup
• The simplest way to setup HotSpot server
on a router is by /ip hotspot setup
command. Router will ask to enter
parameters required to successfully set up
HotSpot. When finished, default
configuration will be added for HotSpot
server.
Interface name
• Interface name on which to run HotSpot.
• To run HotSpot on a bridge interface, make
sure public interfaces are not included to the
bridge ports.
local address of network
• local address of network (IP) which is
HotSpot gateway address
IP address to redirect SMTP (e-mails) to
your SMTP server
dns servers
• dns servers (IP) DNS server addresses used
for HotSpot clients, configuration taken
from /ip dns menu of the HotSpot gateway
name of local hotspot user
• name of local hotspot user (string; Default:
"admin") username of one automatically
created HotSpot user, added to /ip hotspot
user
HotSpot default setup creates
additional configuration:
1- DHCP-Server on HotSpot Interface.
2- Pool for HotSpot Clients.
3- Dynamic Firewall rules (Filter and NAT).
ip hotspot active
• HotSpot active menu shows all clients
authenticated in HotSpot.
Menu is informational, it is not possible to
change anything here.
ip hotspot host
• Host table lists all computers connected to
the HotSpot server. Host table is
informational and it is not possible to
change any value there.
Users
• This is the menu, where client's
user/password information is actually
added, additional configuration options for
HotSpot users are configured here as well .
User Profile
• User profile menu is used for common
HotSpot client settings. Profiles are like
User groups with the same set of settings,
rate-limit, filter chain name, etc.
rate-limit
Simple dynamic queue is created for user,
once it logs in to the HotSpot. Rate-
limitation is configured in the following
form
[rx-rate[/tx-rate] [rx-burst-rate[/tx-burst-
rate] [rx-burst-threshold[/tx-burst-
threshold] [rx-burst-time[/tx-burst-time]
[priority] [rx-rate-min[/tx-rate-min]]]].
512k/512k 1m/1m 256k/256k 28/28
For example, to set 1M download, 512k
upload for the client, rate-limit=512k/1M
shared-users (integer; Default: 1)Allowed
number of simultaneously logged in users
with the same HotSpot username.
IP Bindings
• IP-Binding HotSpot menu allows to:
• Setup static One-to-One NAT translations,
• Allows to bypass specific HotSpot clients
without any authentication, and also
• Allows to block specific hosts and subnets
from HotSpot network
• address (IP Range; Default: "")The
original IP address of the client
• mac-address (MAC; Default: "")MAC
address of the client
• server (string | all; Default: "all")Name of
the HotSpot server. all - will be applied to
all hotspot servers
• to-address (IP; Default: "")New IP address
of the client, translation occurs on the router
(client does not know anything about the
translation)type (blocked | bypassed |
regular; Default: "")
Type of the IP-binding action
• regular - performs One-to-One NAT
according to the rule, translates address to
to-address
• bypassed - performs the translation, but
excludes client from login to the HotSpot
• blocked - translation is not performed and
packets from host are dropped
Walled Garden
• You may wish not to require authorization for
some services (for example to let clients access
the web server of your company without
registration), or even to require authorization
only to a number of services (for example, for
users to be allowed to access an internal file
server or another restricted area). This can be
done by setting up Walled Garden system.
action
• Action to perform, when packet matches the
rule
• allow - allow access to the web-page
without authorization
• deny - the authorization is required to
access the web-page
• server (string; Default: )Name of the HotSpot
server, rule is applied to.
• src-address (IP)Source address of the user,
usually IP address of the HotSpot client
• method (string; Default: )HTTP method of the
request
• dst-host (string; Default: )Domain name of the
destination web-server
• dst-port (integer; Default: )TCP port number,
client sends request to
• path (string; Default: )The path of the request,
path comes after '''[Link]
IP Walled Garden
• Walled-garden menu for the IP requests
(Winbox, SSH, Telnet, etc.)
• action (allow | deny | reject; Default: allow)Action
to perform, when packet matches the rule
• allow - allow access to the web-page without
authorization
• deny - the authorization is required to access the
web-page
• reject - the authorization is required to access the
resource, ICMP reject message will be sent to
client, when packet will match the rule
MTCNA Course
MikroTik Certified Network Associate
2019-2020
Asst. Prof. Dr. Mehdi Ebady Manaa
Firewall
Objectives
• Firewall principles;
• structure;
• chains and actions + LAB;
• • Firewall Filter in action;
• filter actions;
• filter chains;
• protecting your router (input) + LAB;
• protection your customers (forward) + LAB;
• RouterOS connection tracking;
• impact on router;
• connection state + LAB;
Firewall principles
• Firewall is a system or device that allows
network traffic that is considered safe to
flow through it and prevent an insecure
network. Currently, the term firewall is a
common term that refers to the system that
regulates communication between two
different networks.
• The firewall implements packet filtering
and thereby provides security functions that
are used to manage data flow
• to the router,
• through the router, and
• from the router.
• Network firewalls keep outside threats away
from sensitive data available inside the
network. Whenever different networks are
joined together, there is always a threat that
someone from outside of your network will
break into your LAN. Firewalls are used as
a means of preventing or minimizing the
security risks inherent in connecting to
other networks. Properly configured
firewall plays a key role in efficient and
secure network infrastructure deployment.
Chains
• The firewall operates by means of firewall
rules. Each rule consists of two parts –
• The matcher which matches traffic flow
against given conditions and
• The action which defines what to do with
the matched packet.
• Firewall filtering rules are grouped together
in chains. It allows a packet to be matched
against one common criterion in one chain,
and then passed over for processing against
some other common criteria to another
chain.
Firewall Chains
• There are three defined chains:
• Input
• Forward
• Output
Router protection
• Lets say our private network is
[Link]/24 and public (WAN) interface
is ether1.
• We will set up firewall to allow connections
to router itself only from our local network
and drop the rest.
• Also we will allow ICMP protocol on any
interface so that anyone can ping your
router.
Router protection
Customer protection
• To protect the customer's network, we
should check all traffic which goes through
router and block unwanted. For icmp, tcp,
udp traffic we will create chains, where will
be droped all unwanted packets:
• /ip firewall filter add chain=forward protocol=tcp
connection-state=invalid \ action=drop
comment="drop invalid connections"
• add chain=forward connection-state=established
action=accept \ comment="allow already
established connections"
• add chain=forward connection-state=related
action=accept \ comment="allow related
connections"
Example: To deny acces to the router via
Telnet (protocol TCP, port 23)
MTCNA Course
MikroTik Certified Network Associate
2019-2020
Asst. Prof. Dr. Mehdi Ebady Manaa
• ARP
• Example:
Advantage
Proxy ARP can help machines on a subnet
reach remote subnets without the need to
configure routing or a default gateway.
• Host A ([Link]) on Subnet A wants to
send packets to Host D ([Link]) on
Subnet B. Host A has a /16 subnet mask
which means that Host A believes that it is
directly connected to all [Link]/16
network (the same LAN). Since the Host A
believes that is directly connected, it sends
an ARP request to the destination to clarify
MAC address of Host D. Host A broadcasts
an ARP request on Subnet A:
• Note: (in case when Host A finds that
destination IP address is not from the same
subnet it send packet to default gateway.)
• With this ARP request, Host A ([Link])
is asking Host D ([Link]) to send its
MAC address. The ARP request packet is
then encapsulated in an Ethernet frame with
the MAC address of Host A as the source
address and a broadcast
([Link]) as the destination
address. Layer 2 broadcast means that frame
will be sent to all hosts in the same layer 2
broadcast domain which includes the ether0
interface of the router, but does not reach
Host D, because router by default does not
forward layer 2 broadcast .
• Since the router knows that the target
address ([Link]) is on another subnet
but it can reach Host D, it replies with its
own MAC address to Host A .
• This is the Proxy ARP reply that the router
sends to Host A. Router sends back unicast
proxy ARP reply with its own MAC address
as the source address and the MAC address
of Host A as the destination address, by
saying" send these packets to me, and I'll
get it to where it needs to go ".
• When Host A receives ARP response it updates its
ARP table, as shown :
C:\Users\And>arp -a
Interface: [Link] --- 0x8
Internet Address Physical Address Type
[Link] 00-0c-42-52-2e-cf dynamic
[Link] 00-0c-42-52-2e-cf dynamic
[Link] 00-0c-42-52-2e-cf dynamic
• After MAC table update, Host A forwards
all the packets intended for Host D
([Link]) directly to router interface
ether0 ([Link]) and the router
forwards packets to Host D. The ARP cache
on the hosts in Subnet A is populated with
the MAC address of the router for all the
hosts on Subnet B. Hence, all packets
destined to Subnet B are sent to the router.
The router forwards those packets to the
hosts in Subnet B .
• Multiple IP addresses by host are mapped to
a single MAC address (the MAC address of
this router) when proxy ARP is used .
Network Devices
Routing
Addressing
Switching types
Introduction to Networks
At 1960s and 1970s using Mainframes
At 1981 inventing of PCs
Terminals
Mainframe
Computer
Terminals Disk Drives Computer Tape Drives
CPU
Data Network: network that allows
computers to exchange data.
Internetwork: collection of individual
networks connected by networking devices
and that function as a single large network.
D1 D1 D3
Same collision
domain Different
collision domain
Same broadcast
domain
Devices in the same C.D are also in the same B.D
Devices in the same B.C can contain different [Link]
Router
Work at layer 3 OSI Model.
Uses layer3 logical addresses to allow
devices on different LANs to communicate
with each other and with distant devices.
All devices connected to one router port are
in the same collision domain.
Devices connected to different ports are in
different collision domains. (Multi Collision
Domain)
All devices connected to a one router port are
in the same broadcast domain
Devices connected to different ports are in
different broadcast domain. (Multi Broadcast
Domain)
The significant difference between a router and
a switch is that a router does not forward
broadcasts, so it helps control the amount of
traffic on the network.
Application
FTP & TFTP
SMTP & POP3
HTTP
Telnet
DNS
SNMP
DHCP
Transport
TCP (reliable connection)
UDP (unreliable connection)
TCP
Reliable startup
Reliability
Connection- oriented
FTP, DNS
TCP segment fields
UDP
Best effort delivery
Connectionless communication
TFTP, DNS
Addresses
Physical addresses: MAC add., 48bit
Logical addresses: IP add.
SWITCHING TYPES
Layer 2 Switching
When Switch is
First powered Empty
Flooding: switch
floods frame for
Other ports on it
MAC table is filled and the Switch is
Learned
Filtering: switch
sent frames out of
only the ports they
need, so multiple
simultaneous
conversations can
occur
Layer 3 Switching
Perform all the same function as router,
but in physical implementation.