Networking
Networking
* Converged Network:
- Traditional telephone, radio, television and computer
data networks each have their own individual versions of
the four basic network elements.
- Technology advances are enabling us to consolidate
these disparate networks onto one platform, known as
converged network.
Living in a Network-centric world
* Fault Tolerance:
- Is the kind of mechanism that make sure the network
is still active in case there is a fault in one of the
devices in the network.
- Redundant connections allow for alternative paths.
* Scalability:
- Additional providers can be added relatively easily
with no disruption of current services.
Living in a Network-centric world
* Quality of services:
- Managed by the router, ensures that priorities are
matched with the type of communication and its
importance to the user/organization.
* Security:
- Involves a lot of devices and Technologies.
- Protects the confidentiality, integrity and availability
of data.
- Prevents unauthorizes access to the network.
Communicating over the
Network
* Communication methods have three things in
common:
Source (Sender) — channel (Medium ) — destination (Receiver)
* Switching Techniques:
- Switching in computer network help in deciding the
best route for data transmission if there are multiple
paths in a larges network.
- Examples: Circuit switching, Message switching, Packet
switching.
* Circuit Switching:
- A dedicated path is establishes between the sender
and receiver before data transfer.
- Example: Telephone network.
——>
- Disadvantages of Circuit Switching:
1. Significant delays.
2. Inefficient use of the channel.
3. A lost message needs to be transmitted entirely.
* Packet Switching:
- The internet is a packet switched network.
- In this type of technique, the message is broken into
individual chunks called packets.
- Each packet is sent individually.
- Each packet will have source and destination IP
address with Sequence number.
- Sequence numbers will help the receiver to:
1. Reorder the packets
2. Detect missing packets and send acknowledgments.
- Benefits:
1. Multiplexing. 2. Reliability.
3. Alternate paths can be used.
4. Only the missing parts of the message are
retransmitted, not the entire message.
- Disadvantages:
1. Complexity.
Communicating over the Network
* End Devices:
- An end device is any device that allows us to
interface with the network.
- Workstations, servers, laptops, and printers are some
examples.
- It can be either the source or the destination of a
message.
- A host can be a client, a server or both. Depends on
the software installs on the device
- Servers: software that enables them to provide
information and services to other hosts on the
networks.
- Client: software installed that enables them to
request and display the information obtained from the
server.
Communicating over the Network
* Intermediary Devices:
- Any device that provides connectivity to the network,
connectivity to other networks or links between network
segments.
- Routers, switches, and hubs are some examples.
- It manages data as it flows through the network
- Some of their functions:
1. Direct data along alternate pathways when there is
a link failure.
2. Permit or deny the flow of data based on security
settings.
3. Notify other devices of errors and communication
failures.
Communicating over the Network
* Media:
- The medium provides the channel over which the
messages travel from source to destination.
- Examples:
1. Copper: for short distances, cheap, uses electricity.
2. Fiber Optics: for long distances, expensive, uses light.
3. Wireless.
* Network Representations:
- Network interface card (NIC): provides the physical
connection to the network at the PC or other host
device.
- Physical Port: a connector or outlet on a networking
device where the media is connected to a hast or other
networking device.
- Interface: specialized ports an an inter-networking
device that connect to individual networks.
Communicating over the Network
* Protocols:
- Protocols are the rules that govern communications.
1. The structure of the message.
2. The method by which networking devices share
information.
3. How and when error and system messages are passed
between devices.
4. The setup and termination of data transfer sessions.
* The Applications:
- DNS (Domain Name System): translates domain names
to IP address.
- Telnet: access te servers and network devices.
- SMTP (Simple Mail Transfer Protocol): transfer of mail
messages and attachments.
- DHCP (Dynamic Host Configuration Protocol): assigns IP
addresses to the devices connected to the network.
- HTTP (Hypertext Transfer Protocol): transfer files that
make up web pages.
- FTP (File Transfer Protocol): interactive file transfer
between systems.
* Communication Models:
- Three methods:
1. client/server model.
2. Application Layer services and protocols.
3. Peer-to-peer (P2P) networking and applications.
* Port Numbers:
- The OSI Model Transport Layer uses an addressing
scheme called a port number.
- Port numbers identify applications.
- Server programs generally use predefined port
numbers that are commonly known by clients.
* Telnet:
- Allows a user to remotely access another device (Host,
router, switch).
- A connection using Telnet is called a Virtual Terminal
(VTY) session of connection.
- Supports user authentication but does not encrypt
data.
- SSH protocol offers a secure method for server
access.
OSI Transport Layer
* Purpose of the Transport Layer:
- The layer 4 data stream is a logical connection
between the endpoints of a network (Applications and
network access).
- It provides transport services from host to a
destination, this service is sometimes referred to as an
end-to-end service.
- Provides two protocols:
1. TCP (Transmission Control Protocol).
2. UDP (User Datagram Protocol).
* Segmentation of Data:
- A Transport layer breaks large data into smart pieces
called Segments.
- Multiplexing allows multiple concurrent applications to
run simultaneously.
- Segment/sequence numbers allow reassembly of the
data in the proper order.
- Then, the port number is used to pass the dats to the
correct application.
——>
OSI Transport Layer
——>
- Each segment is assigned a unique application
identifier (port number).
- Regulating the amount of data that can be transmitted
or received is Flow control.
- It is possible for a piece of data to become corrupted
or lost, the transport layer protocols can request a
retransmission.
- Transport layer establishes the connection before data
transfer, this is called connection oriented.
* Port Addressing:
- TCP header is 20 bytes and the UDP header is 8
bytes.
- Both TCP and UDP use port numbers to pass
information to the upper layers.
- These ports are actually termed sockets.
- A socket: the combination of the device's IP address
and the source destination port for the data, separated
by a color: 207.134.65.2:80.
- Port numbers usually distinguish the data by the type
of service.
OSI Transport Layer
* Broadcast Address:
- The destination address of a single packet used to
communicate to all hosts in a network (highest address).
- Cannot be assigned to a device.
- Each host bit in this address will be 1.
Example: 192.168.10.255
Binary: 11000000.10101000.00001010.11111111
* Host Address:
- The unique address assigned do each device on the
network.
- Assign any address between the network address
(192.168.10.0) and the broadcast address
(192.168.10.255)
Addresses: 192.168.10.1 to 192.169.10.254
* Calculating Addresses:
- To work with an IPv4 network:
- Find the network address for the host.
- Find the broadcast address for the network.
- Find the host addresses available in the network.
- Divide a larger network into smaller network.
* Basic Subnetting:
- Organizations use owned addresses (or public address)
to avaid waste of using private IP addresses.
- The large networks are broken down into smaller
networks that are more manageable segment.
- Each Segment becomes physically smaller and each
must have their own unique, logical, layer 3 network
address.
Addressing the Network (IPv4)
* IPv4 characteristics:
- Connectionless.
- Media independent.
- "Best effort" Delivery (Unreliable):
- Means simply that IP does not have the capability
to manage and recover from undelivered or corrupt
packets.
OSI Network Layer
* Address Types:
1. MAC Address:
- Physical address of the host.
- Burnt in to the Network Interface card (NIC).
- Layer 2 address.
2. Network Address:
- Logical address of the host.
- Assigned by network admin.
- Layer 3 address.
——>
OSI Network Layer
——>
* Gateway:
- Its the way out of the local network.
- A router makes a forwarding decision for each packet
that arrives at the gateway interface.
- The destination may be one or more hops away
- Usually is the first assignable IP address in the subnet,
and it is given to the router.
OSI Network Layer
* Static Routing:
- Manually configured.
- Must know network structure.
- Every router between each source and destination
must have routes.
- Changes to the topology require static route changes.
* Dynamic Routing:
- Routing information is exchanged among the routers
using a routing protocol.
- Route always up-to-date with little administration but
creates overhead.
* Routing Protocols:
- Routing Information Protocol (RIP).
- Enhances Interior Gateway Protocol (ElGRP).
- Open shortest Path First (OSPF).
Internet Protocol
Version 6 (IPv6)
* IPv6 Addressing:
x.x.x.x x:x:x:x:x:x:x:x
Format 4, 8 bits fields 8, 16 bits fields
separated by dots separated by colons
Groups of 4 Hex
Field decimal
Decimal format
representation digits, case sensitive
for A, B, 6, D, E and F
* IPv6 Representation:
- Prefix:
- IPv4 prefix (the network portion of the address) can
be dotted decimal or bit count:
198.10.0.0/16
- IPv6 prefix is always represented by bit count:
3ef8:ca62:12:cc::2/64
Internet Protocol Version 6 (IPv6)
* Unicast Addressing:
- A unicast address is an address that identifies a
single device.
- A global unicast address is a unicast address that is
globally unique.
——>
- The address more correctly identifies an interface on
a host than a host itself.
- A single interface can have multiple IPv6 addresses,
and can have an IPv4 addsess in addition.
- Making the subnet ID a part of the network portion
creates a clear separation oF functions.
- The netwark portion provides the location of a
device down to the specific data link.
- The host portion provides the identity of the device
on the data link.
5. Site:
- The end-customer of an ISP.
- Can be individuals or corporation requiring internet
access.
* Hub:
- Regenerates all signals over all ports except the
incoming port.
- All devices share bandwidth.
- Single collision domain.
- Less expensive than switches and less performance.
- Can extend the length of a cable run.
* Switch:
- Sends the frame to the correct destination port.
- Dedicated bandwidth on all ports.
- Segments a network into multiple collision domains.
- More expensive, enhanced reliability and
performance.
Planning and cabling Networks
* Cable length:
- Attenuation: The reduction of the strength of the
signal as it moves down a medium. The langer the
medium the more affect attenuation has on the signal
* Cost:
- Can vary from media type to media type.
- Match the performance needs of the users with the
cost of the equipment.
Planning and cabling Networks
* Ease of installation:
- Varies according to cable types and building
architecture (cat5 UTP, optical fiber).
* EMI /RFI:
- Electromagnetic interference (EMI) and Radio
Frequency interference (RFI) must be taken into
consideration when choosing a media type for a LAN.
- It can significantly impact data transfer, electrical
machines, lightning and power cables.
* Device Interface:
- Cisco devices (routers and switches) have several types
of interfaces associated with them,
ethernet, serial, console, auxiliary.
- To access a network device for configuration,
troubleshooting, this can be done by connecting the
console port between the PC and the network device.
* LAN Connections:
- Devices use one of two types of UTP interfaces:
1. Media-Dependent Interface (MDI):
Transmit: Pin 1 and 2
Receive: Pins 3 and 6
(computers, servers, routers)
2. Media-Dependent Interface crossover (MDIX):
- Switch the transmit and receive pairs internally.
- Allows use of a straight through cable.
- Hubs and switches.
- Many devices will now automatically detect the cable
type and with configure the interfaces accordingly.
Introduction to Routing
and Packet Forwarding
* Router as a computer:
- Router components:
1. CPU: executes OS instructions.
2. RAM: contains the running copy of configuration
file.
3. ROM (Read-only Memory): holds diagnostic
software.
4. Non-volatile RAM (NVRAM): stores startup
configuration.
5. Flash Memory: contains the operating system (OS).
6. Interfaces: such as ethernet/FastEthernet, serial
and management interfaces.
* Router Interfaces:
- It’s a physical connector that enables a router to send
or receive packets.
- Each interface connects to a separate network.
- Examples: ethernet, FastEthernet, serial, DSL, ISDN,
cable. ——>
Introduction to Routing and Packet Forwarding
——>
- Two major groups of router interfaces:
1. LAN interfaces:
- Used to connect router to LAN network.
- Has a layer 2 MAC address.
- Can be assigned a Layer 3 IP address.
- usually consist of an Rj-45 jack.
2. WAN Interfaces:
- Used to connect routers to external networks that
interconnect LANs.
- A layer 2 address may be used.
- Uses a layer 3 IP address.
* Static Route:
- Static routes are added by the administrator of the
network.
- The more routers are there, the more static routes
need to be created.
- When to use?
1. When a network only consist of a few routers.
2. Network is connected to internet only through one
ISP.
Introduction to Routing and Packet Forwarding
* Dynamic Route:
- Used to add remote networks to routing tables.
- Used to discover networks.
- Used to up date and maintain routing tables.
- Routers are able to discover new networks by sharing
routing table information.
ElGRP Summary
- EIGRP (Enhanced Interior Gateway Routing Protocol)
- Exclusive only on Cisco devices.
- Metric: Delay, bandwidth, reliability, and load using the
Distrusting Update Algarithm (DUAL).
- Weakness: Not an internet standard, all routers must
be from Cisco Systems.
* Verifying OSPF:
- Two routers may not form an OSPF, if:
1. The subnet masks does not match.
2. OSPF Hello or Dead timers do not match.
3. OSPF network types does nat match.
4. Missing or incorrect OSPF network command.