0% found this document useful (0 votes)
21 views14 pages

Lecture 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views14 pages

Lecture 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 14

LECTURE 1

Network is 2+ devices
Host/ end device is a device that can
communicate independently in the
network(send/receive) an has an IP
address
A host can be called a client or a server, it
depends on the software in it
Servers provide information to end
devices
Each client has a corresponding server
Clint-server architecture a client is always
a client and a server is always a server

C-S is used when you went to control


everything from one device
+
Centralized, secure, scalable
-
single point of failure, complex, costly,
requires planning

Peer to peer architecture role is not


fixed(device can be a client or a server)
+
Easy to set up, less complex, lower cost,
used for simple tasks
-
Not centralized administration, Not as
secure, Not scalable, Slower performance

Devices that can not connect directly to


the network are called auxiliary
devices(not hosts)(printer connected by
usb to the computer)

Main network components:


-End devices(clients)
-Intermediary devices(switch, router,
firewalls) maintain information, notify
about errors
-Media(cable(coper, fiber)/wireless)
Interface - special type of port
Logical port is in the software, physical is
in the hardware
LAN- local area network
WAN- wide area network
MAN- Metropolitan Area network
SAN- storage area network
PAN- personal area network
LAN is faster then WAN
LAN is private, WAN can be
private(internet) or public(Internet)
External threat is from outside(Internet),
internal threat is from the device, which is
already inside the network
The networks needs multiple layers of
security

NVRAM is a RAM that doesn’t delete files


itself, you have to do it yourself
Shell-Kernel(software)-Hardware

GUI- opp system


CLI - console opp
To administrate devices you need to
connect to console port (COM on PCs)
Router/switch> is a user mode(read
only mode)
Router/switch# is a privileged mode
enable(command to switch to privilege
mode)
Terminal(command to change to global
configuration)
Vlan 1 (logic interface)
?- help
Copy running-config(RAM) startup-
config(NVRAM) to back up the run
configuration (write memory)
Erase startup-config
1. Change hostname
2. Set password
3. Encrypt passwords

LECTURE 2
IP - is a unique identifier for a port(32
bits(4 bytes) in binary IPv4, 128 bits in
IPv6)
192.168.1-network identifier.1-host id
IPv6: 16bits:16bits:16bits:16bits
Higher layer- people
Lower layer - devices
MAC- media access control(physical
address)
IP- geographical adress

LECTURE 3
Application(7)
Presentation(6)
Session(5)
Transport(4)
Network(3)(L3)
Data link(2)(L2)
Physical(1)(L1)
PDU:
Data(7-5) - Segment(4) - Packet(3) -
Frame(2) - Bits(1)
Encapsulation 7-1
Decapsulation 1-7
Encoding is converting bits to the needed
format
In digital bandwidth there is less noise and
distortion
Latency is the amount of time needed to
pass the route
Overhead are added headers to the actual
data
Crosstalk is when cables create
interference for each other
UTP - unshielded twisted pair
STP - shielded twisted pair
Straight-through cable is for same
standards
Crossover cable is for different standards

LECTURE 4
SMF - single-mode fiber
MMF - multimode fiber
Multimode-orange cable
Single-mode - yellow cable
Wireless connection drawbacks:
Coverage area
Interference
Security
Shared medium
IEEE 802.11 - Wi-Fi (WLAN standard)
IEEE 802.15 - Bluetooth (WPAN standard)
IEEE 802.16 - WiMAX
IEEE 802.15.4 - Zigbee
IEEE 802.3 - Ethernet
WLAN needs Wireless access point and
Wireless NIC adapter

Data link is responsible for between


end-device network interface cards
Data link performs error detection and
rejects corrupted frames
Framing is done at the MAC sub-layer
MAC - media access control
WAN topologies
Point-to-Point A———B
Hub and spoke A
|
C —— Hub ——B
|
D
Mesh A
/ \
B ——C
Extended star is a topology in which more
than one switch is used(Switches are
connected)
Half-duplex - rather send or receive
Full-duplex - sand and receive at the
same time
WLAN uses half-duplex
Ethernet uses full-duplex(TX, RX)

LECTURE 5

Data-link
Error detection function
1.MAC sublayer
2. LLC sublayer(logical link control)
First 24 bits of MAC address is
OUI(Organizationally unique identifier)
Last 24 bits of MAC Vendor
assigned(serial number)
Unicast - MAC of destination
Multicast - 01-00-5E
Broadcast - FF-FF-FF-FF-FF-FF

Store-and-forward switching(slow but


reliable)
Cut-through switching(fast but not reliable)

LECTURE 6
Layer 3 - added network header
Minimum size of IPv4 network header is
20 bytes
Fragmentation - when a big packet needs
to be divided into smaller packets
On each routers the packet loses 1
live(255 maximum) (TTL- time to live)
(128/64 normally)
Protocol part of packet(TCP/UDP)
Translation(public <-> private)
Minimum size of IPv6 network header is
40 bytes
IPv6 has an extension header(EH)
EH provides optional network layer
information, fragmentation, security,
mobility, etc
EH is placed between IPv6 header and
the payload
Default Gateway is also called a last
resort route
netstat -r routing table
Ip route <address of second network>
<subnet mask for second network>
<address of the interface>
Directly connected routes- C(.0), L(.1)
Remote routes - O, D
Default routes - S*
Administrative distance
The lower the AD is, the more trusted the
source is
LECTURE 7
Domain -> DNS -> IP -> MAC
ARP - address resolution protocol (IPv4)
- ARP request - Broadcast message
- ARP reply -returns IP and corresponding
MAC

NB - Neighbor discovery(IPv6)
-NS - neighbor solicitation (request) -
Multicast message (IPv6 has no
broadcast)
-NA - neighbor advertising (response)
Neighbor cache is the same a ARP table

Router blocks broadcast messages


To get a MAC from another network a PC
has to send a request to Default
Gateway(usually router)
ARP table has a timer
The first packet in PING is lost because it
is an ARP request

BIA - burnt in address

LECTURE 8
255.255.255.255 - can reach other
networks
192.168.10.255 - can only reach
192.168.10.0 network
Private address ranges:
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31-255.255
192.168.0.0 - 192.168.255.255
NAT - Network Address Translation
(translates private to public addresses)
APIPA - Automatic Private IP Addressing
Classes of IPs
A class: 0 - 127 (for big networks)
B class: 128 - 191 (for medium size
networks)
C class: 192 - 223 (for small networks)
D class: 224 - 239 (for multicast
purpouses)
E class: 240- 255 (experimental use)
LECTURE 9
VLSM - Variable Link Subnet Mask
VLSM = CIDR - Classless Inter-domain
Routing
Classful subnets are full octet masks /8,
/16, /24
Dual stack is using both IPv4 and IPv6
Tunneling is connecting IPv4 with IPv6
network
Translation(NAT64) - translating traffic
from IPv4 to IPv6 and vice versa
Hextet is a group of 4 bits in hexadecimal
Leading 0s can be omitted
0000:0000:0000 = ::
All-nodes multicast is the same as
broadcast in IPv4
GUA - global Unicast Address(same as
public IPv4)
LLA - Local Link Address
Link Local Addresses are only valid in the
place where they were assigned(you can’t
ping them from other devices)
Anycast is configured on devices with
same IPv6 address

LECTURE 10
ULA’s range is fc00:/7 - fdff::/7
1 GUA exists only in one device
Stateless - Interface ID is generated
automatically
Stateful - the host assigns the Interface ID
itself
RS - router solicitation message a request
for an IPv6 address
RA - router advertisement (response)
ff02::1(All-node multicast) = IPv4
broadcast
Ff02::2 - a multicast to all routers
To add a router to the router multicast
group -> ipv6 unicast-routing
ICMP - a feedback(ping)
DAD - duplicate address detection

LECTURE 11
TCP - Transmission Control Protocol
UDP - User Datagram Protocol
IPv4 header 20 bytes
IPv6 header 40 bytes
Multiplexing makes it possible for different
ports to work at the same time
Three- way handshake - to establish the
connection
Two two-way handshake - to end the
connection session
LECTURE 12
Segments in UDP are datagrams
A record stores IPv4 records
AAAA record stores IPv6 addresses
NS - name server record
MX - mail record
LECTURE 13
AAA - Authorization, Authentication,
Accounting
Main malware - virus, worm, horse
Backups must be stored in different
places

You might also like