summer youth program: computer/network architecture and security

Post on 21-Dec-2015

218 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Summer Youth Program: Summer Youth Program: Computer/Network Computer/Network Architecture and SecurityArchitecture and Security

Introduction to NetworkingIntroduction to Networking

Objectives:Understand the physical connection that has to take place for a computer to connect to the Internet.Recognize the components that comprise the computer.Install and troubleshoot network interface cards and/or modems.Use basic testing procedures to test the Internet connection.Demonstrate a basic understanding of the use of web browsers and plug-ins.

Internet Connection RequirementsInternet Connection RequirementsInternet is the largest data network on earth

Consists of many large and small networks that are interconnected Individual computers are the sources and destinations of information through the Internet

Connection to the Internet can be broken down into three parts:

Physical connection

Logical connection

Applications

Computer BasicsComputer BasicsElectronic Components

Transistor, Integrated circuit (IC), Resistor, Capacitor, Connector, and Light emitting diode (LED)

PC SubsystemsPrinted circuit board, CD-ROM drive, Central processing unit (CPU), Floppy drive, Hard drive, Microprocessor, Motherboard, Bus, Random-access memory (RAM), Read-only memory (ROM), System unit, Expansion slot, Power supply,

Backplane componentsNetwork interface card (NIC), Video card, Audio card, Parallel port, Serial port, Mouse port, Power cord

Network Interface CardNetwork Interface Card

A NIC, or LAN adapter, provides network communication capabilities to and from a PCThese considerations are importantin the selection of a NIC:

Protocols – Ethernet, Token Ring, or FDDI Types of media – Twisted-pair, coaxial, wireless, or fiber-optic Type of system bus – PCI or ISA

NIC’s & ModemsNIC’s & ModemsA modem, or modulator-demodulator,has two main functions:

provides the computer with connectivity toa telephone lineconverts data from a digital signal to an analogsignal that is compatible with a standard phone line

A NIC provides a network interface for each hostSituations that require NIC installation include the following:

Installation of a NIC on a PC that does not already have one Replacement of a malfunctioning or damaged NIC Upgrade from a 10-Mbps NIC to a 10/100/1000-Mbps NIC Change to a different type of NIC, such as wireless Installation of a secondary, or backup, NIC for network security reasons

Internet Connections for ConsumersInternet Connections for Consumers

Requires use of a Modem

Dial-up – slow

Always on High Speed Connections

DSL – Verizon

Cable – Comcast, Charter, Road-Runner

TCP/IPTCP/IP

TCP/IP

The operating system tools must be used to configure TCP/IP on a workstation

Testing Connectivity with PingTesting Connectivity with PingPing is a basic program that verifies a particular IP address exists and can accept requests.Ping stands for Packet Internet or Inter-Network Groper.How can ping be used?

ping 127.0.0.1 - loopback test. It verifies the operation of the TCP/IP stack and NIC transmit/receive function.ping host computer IP address - verifies the TCP/IP address configuration for the local host and connectivity to the host.ping default-gateway IP address - verifies whether the router that connects the local network to other networks can be reached.ping remote destination IP address - verifies connectivity to a remote host.

Information & TestingInformation & Testing

NIC MAC Address Verificationhttp://standards.ieee.org/regauth/oui/index.shtml

Traceroute Site:http://www.traceroute.orghttp://www.traceroute.org

Web Browsers and Plug-insWeb Browsers and Plug-insA Web browser is software that interprets HTML, which is one of the languages used to code Web page content.

Two of the most popular Web browsers are Internet Explorer (IE), Netscape Communicator, and FireFox

Plug-ins are applications that work with the browser to launch the programsrequired to view special files:

Flash – Plays multimedia files created by Macromedia Flash

Quicktime – Plays video files created by Apple

Real Player – Plays audio files

IE vs. FireFoxIE vs. FireFoxFireFox and all other Mozilla-based products are FireFox and all other Mozilla-based products are generally more secure than IEgenerally more secure than IE

Reasons:Reasons: It is not integrated with Windows, which helps It is not integrated with Windows, which helps prevent viruses and hackers from causing prevent viruses and hackers from causing damage if they somehow manage to compromise damage if they somehow manage to compromise FireFox.FireFox.There is no support for VBScript and ActiveX, two There is no support for VBScript and ActiveX, two technologies which are the reasons for many IE technologies which are the reasons for many IE security holes.security holes.No spyware/adware software can automatically No spyware/adware software can automatically install in FireFox just by visiting a web site.install in FireFox just by visiting a web site.FireFox doesn't use Microsoft's Java VM, which FireFox doesn't use Microsoft's Java VM, which has a history of more flaws than other Java VMs.has a history of more flaws than other Java VMs.You have complete control over cookies.You have complete control over cookies.

Data Networks CreationData Networks CreationData networks developed as a result of businesses and Data networks developed as a result of businesses and governments agencies needing to exchange electronic governments agencies needing to exchange electronic information across long distances.information across long distances.

Businesses needed solution to:Businesses needed solution to:

How to avoid duplication of equipment and How to avoid duplication of equipment and resourcesresources

How to communicate efficientlyHow to communicate efficiently

How to set up and manage a networkHow to set up and manage a network

The Creation of StandardsThe Creation of Standards One solution to incompatibility was to One solution to incompatibility was to

create standards within Local Area create standards within Local Area Neworks (LANs)Neworks (LANs)

LANs limitations prompted (Metropolitan LANs limitations prompted (Metropolitan Area Networks) MANs and (Wide Area Area Networks) MANs and (Wide Area Networks) WANsNetworks) WANs

Data Networks with Respect to Data Networks with Respect to DistancesDistances

Networking DevicesNetworking Devices

Networking Devices:Networking Devices:Repeaters and HubsRepeaters and Hubs

Repeaters

Hubs

Networking Devices:Networking Devices:NICs and BridgesNICs and Bridges

Bridges

NICS

Networking Devices: Networking Devices: SwitchesSwitches

                  

Switches

Networking Devices - RoutersNetworking Devices - Routers

Routers

Network TopologyNetwork Topology

Network Topology:Network Topology:Bus & Star TopologyBus & Star Topology

BUS TOPOLOGY

STAR TOPOLOGY

Network Topology: Network Topology: Ring TopologyRing Topology

RING TOPOLOGY

Network Topology Cont:Network Topology Cont:Partial & Full MeshPartial & Full Mesh

Partial Mesh Full Mesh

MS VISIO MS VISIO Creating Network DiagramsCreating Network Diagrams

MS Visio MS Visio Network ExampleNetwork Example

MaxProLABORATORIES, INC. S ilico n G ra p h ics

C om put er S y s t em s

XL SERIES

POWE

R

1 2 3

5 64

987

#0*

ABC DEF

GHI JKL MNO

PRS TUV WXY

1 2 3

4 5 6

A4 LTR

TONE

ALARM

OPER SYMBOLSSTOP

START/COPY

CODED DIAL

REDIAL/PAUSE RECEIVE MODE RESOLUTION

FUNCTION CARTRIDGE RESUME

PRINTERRESET

< >

Designed by:

Microsof tWindows NTWindows 95

ÒÒ

ÒÒ P R O C S S OE R

Ò

MMXä

Ò

Back Space

NumLock

CapsLock

ScrollLock

Enter

Shift

CtrlAltCtrl A lt

Shift

CapsLock

Tab

Esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 PrintScroll

SysRq

ScrollLock Pause

Break

NumLock

Enter

+

_*

Designed by:

Microsof tWindows NTWindows 95

ÒÒ

ÒÒ P R O C S S OE R

Ò

MMXä

Ò

Back Space

NumLock

CapsLock

ScrollLock

Enter

Shift

CtrlAltCtrl A lt

Shift

CapsLock

Tab

Esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 PrintScroll

SysRq

ScrollLock Pause

Break

NumLock

Enter

+

_*

3645 Main StreetHigh Capacity Bandwidth Manager

NEWBRIDGE

ON

OFF

ON

OFF

PS110A

PS110A

Critical Alarm

Major Alarm

Minor Alarm

FILE SERVER

OMNI SWITCH

EMAIL SERVER

AUTHENTICATION SERVER

PRINTER

AV-CLIENT TELNET CLIENT

Michigan Tech University’sCNSA Progam

CONFIDENTIAL CONFIDENTIALNetwork Diagam

GCH_v.1.47/5/05

MS VisioMS VisioNetwork Example #2Network Example #2

IP Cloud

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

SY ST EM S, IN C .ä

Glass-hopper

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

BLACK BOXÒÒ

MONITOR T YPE

VGA Splitter 2-Channel

POWER

ÒÒ

N C X 3E6 Next Generation Networks

System Status

TELECOM

Ethernet Status

Circuit Status

N C X 3E6 Next Generation Networks

System Status

TELECOM

Ethernet Status

Circuit Status

N C X 3E6 Next Generation Networks

System Status

TELECOM

Ethernet Status

Circuit Status

N C X 3E6 Next Generation Networks

System Status

TELECOM

Ethernet Status

Circuit Status

LINE OUT

SYNC

LINE IN

SYNCSTATUS

Technologies Group, Inc.

ISDN Basic Rate InterfaceProtocol Analyzer

Model ISDN 1000PA

LINE OUT

SYNC

LINE IN

SYNCSTATUS

Technologies Group, Inc.

ISDN Basic Rate InterfaceProtocol Analyzer

Model ISDN 1000PA

Glass-hopper

hopperUTP-

SuperStack IISwitch 93 00

SUPERSTACK

3Com

C onsole10 00Base -SX

10 00Base -SX

10 00Base -SX

3C9 30 11

SuperStack IISwitch 93 00

SUPERSTACK

3Com

C onsole10 00Base -SX

10 00Base -SX

10 00Base -SX

3C9 30 11

SuperStack IISwitch 93 00

SUPERSTACK

3Com

C onsole10 00Base -SX

10 00Base -SX

10 00Base -SX

3C9 30 11

SuperStack IISwitch 93 00

SUPERSTACK

3Com

C onsole10 00Base -SX

10 00Base -SX

10 00Base -SX

3C9 30 11

Ethernet Switch

Ethernet Switch Ethernet Switch

Ethernet Switch

Fiber Splitter

Fiber Splitter

Fiber SplitterFiber Splitter

Fiber Splitter

Fiber Splitter

Fiber Splitter

ATM Switch ATM Switch

ATM Switch

ATM Switch

LAN Analyzer LAN Analyzer

Michigan Tech University’sCNSA Progam

Network DiagamCONFIDENTIAL CONFIDENTIAL

GCH_v.2.77/5/05

MS VisioMS VisioWAN Architecture ExampleWAN Architecture Example

PORT 3 PORT 4

PORT 2PORT 1

SYN

ALM

PORT 1 PORT 2 PORT 3 PORT 4

MODULE EXPANSION SLOT

Model Serial No. MAC Address10/100 ETH CONSOLE

SYN

ALM

SYN

ALM

SYN

ALM

SYN

ALM

Gateway

Ò

SETUP

OPERATE

1 2ABC

3DEF

4GHI

5JKL

6MNO

7PRS

8TUV

9WXY

* 0OPER

#

EN

TE

R

Ò

CONSOLE ETHERNET ISDN U TEL1 TEL2POWER

PORT 3 PORT 4

PORT 2PORT 1

SYN

ALM

PORT 1 PORT 2 PORT 3 PORT 4

MODULE EXPANSION SLOT

Model Serial No. MAC Address10/100 ETH CONSOLE

SYN

ALM

SYN

ALM

SYN

ALM

SYN

ALM

Gateway

CONSOLE ETHERNET ISDN U TEL1 TEL2POWER

Ò

SETUP

OPERATE

1 2ABC

3DEF

4GHI

5JKL

6MNO

7PRS

8TUV

9WXY

* 0OPER

#

EN

TE

R

Ò

CONSOLE ETHERNET ISDN U TEL1 TEL2POWER

PORT 3 PORT 4

PORT 2PORT 1

SYN

ALM

PORT 1 PORT 2 PORT 3 PORT 4

MODULE EXPANSION SLOT

Model Serial No. MAC Address10/100 ETH CONSOLE

SYN

ALM

SYN

ALM

SYN

ALM

SYN

ALM

Ò

SETUP

OPERATE

1 2ABC

3DEF

4GHI

5JKL

6MNO

7PRS

8TUV

9WXY

* 0OPER

#

EN

TE

R

Ò

PSTN

Data Network

PSTN

1 2ABC

JKLGHI

4 5TUVPRS

7 8

0OPER

3DEF

MNO

6WXY

#

9

1 2 3

4 5 6

7 8 9

* 0 #

ABC DEF

GHI JKL MNO

PQRS TUV WXYZ

Hold Cancel Forward Redial

Super Key Message

1 2ABC

JKLGHI

4 5TUVPRS

7 8

0OPER

3DEF

M NO

6W XY

#

9

PSTN (Auto-switch)Japan to New York

VoIP (On net call)Japan to New York

PSTN (Hop-off call)Japan to United States,Domestic long distance call

Japan New York

California

Router Router

PBX PBX

WAN DIAGRAMCONFIDENTIAL CONFIDENTIAL

Legend

GCH_v.1.27/2/05

MS VisioMS VisioSwitch Architecture ExampleSwitch Architecture Example

S il iconG raph ics

O R I G I N 2000

S il iconG raph ics

O R I G I N 2000

N Y X 2O

S il iconG raph ics

S il iconG raph ics

ALARM

CONSOLE

1518 IAD

1 2 3 4 5 6 7 8 9 10 11 12

OutputGood

OutputGood

OutputGood

OutputGood

OutputGood

OutputGood

CHASSIS STATUS

TEMPERATURE FAN POWER SUPPORT SYSTEM

1 2 3 4 5 6

LMPTEST

S1

S2

S3

L1

L2

N

B41

B

S1

S2

L1

L2

H

BCP

8

S1

S2

L1

L2

H

BCP

8

ALARM

CONSOLE

1518 IAD

4200

4200 4200

N Y X 2O

S il iconG raph ics

S il iconG raph ics

N Y X 2O

S il iconG raph ics

S il iconG raph ics

S il iconG raph ics

O R I G I N 2000

S il iconG raph ics

O R I G I N 2000

S il iconG raph ics

O R I G I N 2000

S il iconG raph ics

O R I G I N 2000

Private Intranet

PBXPBX

OMNI SWITCH

PublicT1/E1 TDM

or ATM Network

OmniAccess OmniAccess

Ethernet Network Ethernet Network

PBX

BRANCH OFFICE BRANCH OFFICE

CENTRAL OFFICE

CONFIDENTIAL CONFIDENTIALSWITCHED ETHERNET NETWORK

Public Internet

MS VisioMS VisioClient Architecture ExampleClient Architecture Example

ATM

R7

R8

ISDN

R5

R2

S0/0

S0/1

S0/0

S0/2

R6

R9

controller T1 0

controller T1 0

R4

S0

S0/0

S1/1

S0/0

R1

Sw2Sw1

VLAN_B

VLAN_A

VLAN_D

BB1

Frame Relay

VLAN_E

VLAN_C

ATM 138.10.78.0/24

RIP v2

OSPF

EIGRP

EBGP

10/100 Ethernet

ISDN Connection

ATM Connection

Frame Relay Connection

Legend

BB3

Fiber Optic

CONFIDENTIAL CONFIDENTIALSyrex Network Architecture

GCH_ver3.76/11/05

Network ProtocolsNetwork Protocols

Local-area Networks (LANs)Local-area Networks (LANs)

Wide-area Networks (WANs)Wide-area Networks (WANs)

MetropolitanMetropolitan--Area Network (MANs)Area Network (MANs)

StorageStorage--Area Networks (SANS)Area Networks (SANS)

Virtual Private Networks (VPNVirtual Private Networks (VPNss))

VPN ArchitecturesVPN Architectures

Client-Initiated Access VPN

NAS-Initiated Access VPN

Intranet and Extranet VPNIntranet and Extranet VPN

Benefits of VPNsBenefits of VPNs

Importance of BandwidthImportance of Bandwidth

• Why is Bandwidth Important?

• What are Bandwidth’s limitations?

• What is Bandwidth’s effect on network performance?

Bandwidth Pipe AnalogyBandwidth Pipe Analogy

Bandwidth Highway AnalogyBandwidth Highway Analogy

Bandwidth MeasurementsBandwidth Measurements

Bandwidth LimitationsBandwidth Limitations

Bandwidth ThroughputBandwidth Throughput

Digital Transfer CalculationDigital Transfer Calculation

CablingCablingLANs and WANsLANs and WANs

LAN Physical LayerLAN Physical Layer

LAN Physical Layer LAN Physical Layer SymbolsSymbols

Ethernet on a CampusEthernet on a CampusThere are several ways that Ethernet There are several ways that Ethernet technologies can be used in a campus technologies can be used in a campus network: network:

10Mbps can be used at the user level10Mbps can be used at the user levelClients or servers that require more bandwidth Clients or servers that require more bandwidth can use 100-Mbps Ethernetcan use 100-Mbps EthernetFast Ethernet is used as the link between user Fast Ethernet is used as the link between user and network devices. Fast Ethernet can be used and network devices. Fast Ethernet can be used to connect enterprise servers. to connect enterprise servers. Fast Ethernet or Gigabit Ethernet should be Fast Ethernet or Gigabit Ethernet should be implemented between backbone devices, based implemented between backbone devices, based on affordability. on affordability.

Connection MediaConnection Media

UTP ImplementationUTP Implementation

Patch Panels used for Organization in Wiring Closets. Sometimes referred to as punch downs.

UTP Cable •8 colored wires•2 twisted pair

UTP Implementation ContinuedUTP Implementation Continued

Note: Only 4 wires being used for Tx and

Rx

EIA/TIA T568-A or T568-B Standards

UTP ImplementationUTP Implementation

Straight-Through and Straight-Through and Cross-Over ComparisonCross-Over Comparison

Console ConnectionsConsole Connections Used to manage a device, such as Used to manage a device, such as

switch or router, locallyswitch or router, locally Uses a DB-9 to RJ45 adapterUses a DB-9 to RJ45 adapter Uses Rollover cableUses Rollover cable

Straight-Through and Cross-Straight-Through and Cross-Over Comparison ContinuedOver Comparison Continued

Summer Youth Program: Summer Youth Program: Computer/Network Computer/Network Architecture and SecurityArchitecture and Security

Using Layers to Analyze Using Layers to Analyze ProblemsProblems

Using Layers to Describe Data Using Layers to Describe Data CommunicationCommunication

OSI Model OSI Model

Layer 1Layer 1

Layer 2 Layer 2

•Provides reliable transit of data across a physical link

•Provides physical address

•Error correction, best effort delivery.

Layer 3Layer 3

Layer 4Layer 4

Layer 5 Layer 5

Layer 6Layer 6

Layer 7 Layer 7

Peer-to-Peer CommunicationPeer-to-Peer Communication

TCP/IP Model TCP/IP Model

Encapsulation & DecapsulationEncapsulation & Decapsulation

Names for Data at Each Names for Data at Each Layer Layer

Network EnvironmentsNetwork Environments

Peer-to-Peer NetworksPeer-to-Peer Networks

All Peers are equalAll Peers are equal

10 Host max (recommended)10 Host max (recommended)

Client/Server EnvironmentClient/Server Environment

network services are located on a network services are located on a dedicated computer called a serverdedicated computer called a server

Peer-to-Peer vs. Client/ServerPeer-to-Peer vs. Client/ServerAdvantagesAdvantages

Advantages of a Peer-to-Peer Advantages of a Peer-to-Peer NetworkNetwork

Advantages of a Advantages of a Client/Server NetworkClient/Server Network

Less expensive to Less expensive to implementimplement

Provides for better Provides for better securitysecurity

Does not require Does not require additional specialized additional specialized network administration network administration softwaresoftware

Easier to administer when Easier to administer when the network is large due the network is large due to centralized to centralized administrationadministration

Does not require a Does not require a dedicated network dedicated network administratoradministrator

All data can be backed up All data can be backed up on one central locationon one central location

Peer-to-Peer vs. Client/ServerPeer-to-Peer vs. Client/ServerDisadvantagesDisadvantages

Disadvantages of a Peer-to-Disadvantages of a Peer-to-Peer NetworkPeer Network

Disadvantages of a Disadvantages of a Client/Server NetworkClient/Server Network

Does not scale well to a Does not scale well to a large networks and large networks and administration becomes administration becomes unmanageableunmanageable

Requires expensive Requires expensive specialized network specialized network administrative and administrative and operational softwareoperational software

Each user must be trained Each user must be trained to perform administrative to perform administrative taskstasks

Requires expensive, more Requires expensive, more powerful hardware for the powerful hardware for the server machineserver machine

Less secureLess secure Requires a professional Requires a professional administratoradministrator

All machines sharing All machines sharing resources negatively resources negatively impacts performanceimpacts performance

Has a single point of Has a single point of failure. User data is failure. User data is unavailable if the server unavailable if the server is downis down

Ethernet SwitchingEthernet Switching

Layer 2 BridgingLayer 2 Bridging

What is a Bridge? What is a Bridge?

What is the Bridging process?What is the Bridging process?

Bridge TypesBridge Types

Bridge OperationsBridge Operations

SwitchesSwitches

Switching TableSwitching Table

LatencyLatency

What is Latency?What is Latency?

How does it affect a network?How does it affect a network?

Switch ModesSwitch Modes

Store-and-forward Store-and-forward switchingswitching

Cut-through switching Cut-through switching

Fragment-free switchingFragment-free switching

Collision Domains and Collision Domains and Broadcast DomainsBroadcast Domains

How to reduce the impact of broadcasts and collisions on the performance of the network?

Types of NetworksTypes of Networks

Data CollisionsData Collisions

When two bits are propagated at the same time on the same network, a collision will occur.

Collisions and Collision Collisions and Collision DomainsDomainsExtended by a huband repeater

SegmentationSegmentation

Breaking Up Collision Breaking Up Collision Domains Using SegmentationDomains Using Segmentation

Segmenting with BridgesSegmenting with Bridges

Segmenting with SwitchesSegmenting with Switches

Segmenting with RoutersSegmenting with Routers

Layer 2 BroadcastsLayer 2 Broadcasts

Layer 2 devices must flood all broadcast Layer 2 devices must flood all broadcast and multicast traffic. and multicast traffic.

The accumulation of broadcast and The accumulation of broadcast and multicast traffic from each device in the multicast traffic from each device in the network is referred to as broadcast network is referred to as broadcast radiation.radiation.

Broadcast DomainsBroadcast Domains

A group of collision domains that are A group of collision domains that are connected by Layer 2 devicesconnected by Layer 2 devices

Controlled at Layer 3 (router)Controlled at Layer 3 (router) Routers do not forward broadcastsRouters do not forward broadcasts

Data FlowData Flow

Network SegmentNetwork Segment If the segment is used in TCP, it would be If the segment is used in TCP, it would be

defined as a separate piece of the data. defined as a separate piece of the data. If segment is being used in the context of If segment is being used in the context of

physical networking media in a routed physical networking media in a routed network, it would be seen as one of the parts network, it would be seen as one of the parts or sections of the total network.or sections of the total network.

Routing Fundamentals Routing Fundamentals And SubnetsAnd Subnets

Routable and Routed Routable and Routed ProtocolsProtocols

A routed protocol allows the router to forward data A routed protocol allows the router to forward data between nodes on different networks. between nodes on different networks.

In order for a protocol to be routable, it must provide the In order for a protocol to be routable, it must provide the ability to assign a network number and a host number to ability to assign a network number and a host number to each individual device. each individual device.

These protocols also require a network mask in order to These protocols also require a network mask in order to differentiate the two numbers. differentiate the two numbers.

The reason that a network mask is used is to allow groups The reason that a network mask is used is to allow groups of sequential IP addresses to be treated as a single unit. of sequential IP addresses to be treated as a single unit.

IP as a Routed Protocol IP as a Routed Protocol IP is a connectionless, IP is a connectionless, unreliable, best-effort unreliable, best-effort delivery protocol. delivery protocol.

As information flows As information flows down the layers of the down the layers of the OSI modelOSI model;; the data is the data is processed at each layer.processed at each layer.

IP accepts whatever data IP accepts whatever data is passed down to it from is passed down to it from the upper layers. the upper layers.

Packet Propagation and Switching Packet Propagation and Switching Within a RouterWithin a Router

Packet Propagation and Switching Packet Propagation and Switching Within a RouterWithin a Router

As a frame is received at a router interface. As a frame is received at a router interface. The MAC address is checked to see if the frame is The MAC address is checked to see if the frame is directly addressed to the router interface, or a broadcast. directly addressed to the router interface, or a broadcast. The frame header and trailer are removed and the The frame header and trailer are removed and the packet is passed up to Layer 3. packet is passed up to Layer 3. The destination IP address is compared to the routing The destination IP address is compared to the routing table to find a match.table to find a match.The packet is switched to the outgoing interface and The packet is switched to the outgoing interface and given the proper frame header.given the proper frame header.The frame is then transmitted. The frame is then transmitted.

Internet Protocol (IP): Internet Protocol (IP): Connectionless Connectionless

The Internet is a gigantic, connectionless network The Internet is a gigantic, connectionless network in which all packet deliveries are handled by IP. in which all packet deliveries are handled by IP. TCP adds Layer 4, connection-oriented reliability TCP adds Layer 4, connection-oriented reliability

services to IP. services to IP.

A connection is established between the sender and the recipient before any data is transferred.

Telephone Calls: Telephone Calls: Connection-OrientedConnection-Oriented

Anatomy of an IP Packet Anatomy of an IP Packet While the IP source and destination addresses While the IP source and destination addresses are important, the other header fields have are important, the other header fields have made IP very flexible. made IP very flexible. The header fields are the information that is The header fields are the information that is provided to the upper layer protocols defining provided to the upper layer protocols defining the data in the packet. the data in the packet.

Routing OverviewRouting OverviewA router is a network layer device that uses one or more A router is a network layer device that uses one or more routing metrics to determine the optimal path.routing metrics to determine the optimal path.Routing metrics are values used in determining the Routing metrics are values used in determining the advantage of one route over another.advantage of one route over another.Routing protocols use various combinations of metrics Routing protocols use various combinations of metrics for determining the best path for data. for determining the best path for data.

Routing Versus SwitchingRouting Versus Switching This distinction is routing and switching This distinction is routing and switching

use different information in the process of use different information in the process of moving data from source to destination. moving data from source to destination.

Routing Versus SwitchingRouting Versus Switching

Classes of Network IP Classes of Network IP AddressesAddresses

Introduction to SubnettingIntroduction to Subnetting Host bits must Host bits must

are reassigned are reassigned (or “borrowed”) (or “borrowed”) as network bits. as network bits.

The starting The starting point is always point is always the leftmost the leftmost host bit. host bit.

3 bits borrowed allows 23-2 or 6 subnets

5 bits borrowed allows 25-2 or 30 subnets

12 bits borrowed allows 212-2 or 4094 subnets

Reasons for SubnettingReasons for SubnettingProvides addressing flexibility for the network Provides addressing flexibility for the network administrator.administrator.

Each LAN must have its own network or subnetwork Each LAN must have its own network or subnetwork address.address.

Provides broadcast containment and low-level security Provides broadcast containment and low-level security on the LAN. on the LAN.

Provides some security since access to other subnets is Provides some security since access to other subnets is only available through the services of a router. only available through the services of a router.

Establishing the Subnet Mask Establishing the Subnet Mask AddressAddress

Determines which part of an IP address is the network field Determines which part of an IP address is the network field and which part is the host fieldand which part is the host field..

Follow these steps to determine the subnet mask:Follow these steps to determine the subnet mask:

1. Express the subnetwork IP address in binary form.1. Express the subnetwork IP address in binary form.

2. Replace the network and subnet portion of the 2. Replace the network and subnet portion of the address with all 1s.address with all 1s.

3. Replace the host portion of the address with all 0s.3. Replace the host portion of the address with all 0s.

4. Convert the binary expression back to dotted-decimal 4. Convert the binary expression back to dotted-decimal notation.notation.

Establishing the Subnet Mask Establishing the Subnet Mask AddressAddress

To determine the number of bits to be used, the network To determine the number of bits to be used, the network designer needs to calculate how many hosts the largest designer needs to calculate how many hosts the largest subnetwork requires and the number of subnetworks subnetwork requires and the number of subnetworks needed. needed. The “slash format” is a shorter way of representing the The “slash format” is a shorter way of representing the subnet mask:subnet mask:

/25 represents the 25 one bits in the subnet mask /25 represents the 25 one bits in the subnet mask 255.255.255.128255.255.255.128

Establishing the Subnet Mask Establishing the Subnet Mask AddressAddress

Subnetting Class A and B Subnetting Class A and B NetworksNetworks

The available bits for assignment to the subnet The available bits for assignment to the subnet field in a Class A address is 22 bits while a field in a Class A address is 22 bits while a Class B address has 14 bits. Class B address has 14 bits.

Calculating the Subnetwork Calculating the Subnetwork With ANDingWith ANDing

ANDing is a binary process by which the router ANDing is a binary process by which the router calculates the subnetwork ID for an incoming packet. calculates the subnetwork ID for an incoming packet.

1 AND 1 = 1; 1 AND 0 = 0; 0 AND 0 = 01 AND 1 = 1; 1 AND 0 = 0; 0 AND 0 = 0

The router then uses that information to forward the The router then uses that information to forward the packet across the correct interface. packet across the correct interface.

Packet AddressPacket Address 192.168.10.65192.168.10.6511000000.10101000.00001011000000.10101000.00001010.01010.010

0000000011

Subnet MaskSubnet Mask255.255.255.22255.255.255.2244

11111111.11111111.11111111111111.11111111.11111111.11111.111

0000000000

Subnetwork Subnetwork AddressAddress

192.168.10.64192.168.10.6411000000.10101000.00001011000000.10101000.00001010.01010.010

0000000000

Routed Versus RoutingRouted Versus RoutingA routed protocol: A routed protocol:

Includes any network protocol suite that provides Includes any network protocol suite that provides enough information in its network layer address to enough information in its network layer address to allow a router to forward it to the next device and allow a router to forward it to the next device and ultimately to its destination. ultimately to its destination. Defines the format and use of the fields within a Defines the format and use of the fields within a packet. packet.

A routing protocol: A routing protocol: Provides processes for sharing route information.Provides processes for sharing route information.Allows routers to communicate with other routers to Allows routers to communicate with other routers to update and maintain the routing tables.update and maintain the routing tables.

Path DeterminationPath DeterminationPath determination enables a router to compare the Path determination enables a router to compare the destination address to the available routes in its routing destination address to the available routes in its routing table, and to select the best path. table, and to select the best path.

End of PresentationEnd of Presentation

top related