Exploring Networks
Exploring Networks
Module 1
Exploring the Network
Interface configuration
Network management and monitoring
Quality of service (QoS)
Routing
Security
Switching
Module 2
Network Protocols and Communications
1
Exploring The Networks
2
Exploring The Networks
The packet header carries information in its first few bytes to mark
where the packet begins and to identify the type of information it carries.
3
Exploring The Networks
The packet trailer indicates to a receiving device that it has reached the
end of the packet. It often contains an error-check value that the
receiving device can use to confirm it has received the full packet.
4
Exploring The Networks
DSL – DSL stands for Digital Subscriber Line and DSL brings a
connection into your home through telephone lines and a DSL line
can carry both data and voice signals and the data part of the line is
continuously connected. In DSL you are able to use the Internet and
make phone calls simultaneously.
FTTH – Fiber to the home (FTTH) uses optical fiber from a central
Office (CO) directly to individual buildings and it provides high-speed
Internet access among all access networks. It ensures high initial
investment but lesser future investment and it is the most expensive
and most future-proof option amongst all these access networks.
5
Exploring The Networks
6
Exploring The Networks
Data Link Layer: Packets are framed and sent to the next device.
Each layer adds specific information to ensure the data reaches its
destination correctly, and these steps are reversed upon arrival.
7
Exploring The Networks
Step 1: Luffy interacts with e-mail application like Gmail, outlook, etc.
Writes his email to send. (This happens in Layer 7: Application layer)
Step 5: Addressing of packets is done in order to find the best route for
transfer. (This happens in Layer 3: Network Layer)
8
Exploring The Networks
Step 6: Data packets are encapsulated into frames, then MAC address
is added for local devices and then it checks for error using error
detection. (This happens in Layer 2: Data Link Layer)
The lowest layer of the OSI reference model is the physical layer. It is
responsible for the actual physical connection between the devices.
The physical layer contains information in the form of bits. It is
responsible for transmitting individual bits from one node to the next.
When receiving data, this layer will get the signal received and convert
it into 0s and 1s and send them to the Data Link layer, which will put
the frame back together.
Bit Rate Control: The Physical layer also defines the transmission
rate i.e. the number of bits sent per second.
Physical Topologies: Physical layer specifies how the different,
devices/nodes are arranged in a network i.e. bus, star, or mesh
topology.
Transmission Mode: Physical layer also defines how the data flows
between the two connected devices. The various transmission
modes possible are Simplex, half-duplex and full-duplex.
9
Exploring The Networks
The data link layer is responsible for the node-to-node delivery of the
message. The main function of this layer is to make sure data transfer
is error-free from one node to another, over the physical layer. When a
packet arrives in a network, it is the responsibility of the DLL to transmit
it to the Host using its MAC address.
Error Control: The data link layer provides the mechanism of error
control in which it detects and retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else
the data may get corrupted thus, flow control coordinates the amount
of data that can be sent before receiving an acknowledgment.
The network layer works for the transmission of data from one host to
the other located in different networks. It also takes care of packet
routing i.e. selection of the shortest path to transmit the packet, from
the number of routes available. The sender & receiver’s IP addresses
are placed in the header by the network layer.
10
Exploring The Networks
The transport layer provides services to the application layer and takes
services from the network layer. The data in the transport layer is
referred to as Segments. It is responsible for the end-to-end delivery of
the complete message. The transport layer also provides the
acknowledgment of the successful data transmission and re-transmits
the data if an error is found.
11
Exploring The Networks
Example
The presentation layer is also called the Translation layer. The data
from the application layer is extracted here and manipulated as per the
required format to transmit over the network.
12
Exploring The Networks
and the decrypted data is known as plain text. A key value is used
for encrypting as well as decrypting data.
At the very top of the OSI Reference Model stack of layers, we find the
Application layer which is implemented by the network applications.
These applications produce the data to be transferred over the network.
This layer also serves as a window for the application services to
access the network and for displaying the received information to the
user.
Slow Adoption: When it was introduced, the OSI Model was not
quickly adopted by the industry, which preferred the simpler and
already-established TCP/IP model.
Overhead: Each layer in the OSI Model adds its own set of rules
and operations, which can make the process more time-consuming
and less efficient.
Module 3
Ethernet
What is Ethernet?
14
Exploring The Networks
History of Ethernet
15
Exploring The Networks
16
Exploring The Networks
Advantages of Ethernet
Disadvantages of Ethernet
17
Exploring The Networks
ARP Issues:
18
Exploring The Networks
ARP spoofing
A hacker sends fake ARP packets that link an attacker's MAC address
with an IP of a computer already on the LAN. This can have
unfavorable effects on an enterprise, including stealing sensitive
information, man-in-the-middle attacks, denial-of-service attacks, and
session hijacking.
ARP poisoning
After a successful ARP spoofing, a hacker changes the company's ARP
table, so it contains falsified MAC maps.
Network congestion
ARP requests are broadcast messages, which can contribute to
network congestion in large networks.
LAN switches, or local area network switches, are typically used to link
locations on a company's internal LAN. It also is referred to as an
Ethernet switch or a data switch.
19
Exploring The Networks
There are various protocols used in the network layer. Each protocol is
used for a different task
IP (Internet Protocol)
20
Exploring The Networks
ARP is used to convert the logical address ie. IP address into physical
address ie. MAC address. While communicating with other nodes, it is
necessary to know the MAC address or physical address of the
destination node. If any of the node in a network wants to know the
physical address of another node in the same network, the host then
sends an ARP query packet. This ARP query packet consists of IP
address and MAC address of source host and only the IP address of
destination host. This ARP packet is then received to every node
present in the network.
RARP
Every user on the network has two distinct addresses: their MAC
(physical) address and their IP (logical) address.
Software assigns the IP address, and the hardware then builds the
MAC address into the device.
Using both its physical address and Ethernet broadcast address, the
client transmits a RARP request. In response, the server gives the
client its IP address.
ICMP
21
Exploring The Networks
What is IPv4?
Parts of IPv4
Host Part: The host part uniquely identifies the machine on your
network. This part of the IPv4 address is assigned to every host.
For each host on the network, the network part is the same,
however, the host half must vary.
Characteristics of IPv4
IPv4 could be a numeric address, and its bits are separated by a dot.
The number of header fields is twelve and the length of the header
field is twenty.
Advantages of IPv4
Limitations of IPv4
23
Exploring The Networks
What is IPv6?
This new IP address version is being deployed to fulfil the need for
more Internet addresses. With 128-bit address space, it allows 340
undecillion unique address space.
IPv6 support a theoretical maximum of 340, 282, 366, 920, 938, 463,
463, 374, 607, 431, 768, 211, 456. To keep it straightforward, we will
never run out of IP addresses again.
IPv6 vs IPv4
This new IP address version is being deployed to fulfil the need for
more Internet addresses. With 128-bit address space, it allows 340
undecillion unique address space.
24
Exploring The Networks
IPv6 support a theoretical maximum of 340, 282, 366, 920, 938, 463,
463, 374, 607, 431, 768, 211, 456. To keep it straightforward, we will
never run out of IP addresses again.
IPv6 IPv4
Now that we know about what is IPv6 address let’s take a look at its
different types.
25
Exploring The Networks
Advantages
Routing efficiency
Reliability
Most importantly it’s the final solution for growing nodes in Global-
network.
Disadvantages
26
Exploring The Networks
27