Chapter - 2 Fundamental Network Concept
Chapter - 2 Fundamental Network Concept
Fundamental Network
Concepts
Outline
It specifies:
o Format of messages
o Meaning of messages
o Rules for exchange
o Procedure for handling problems
Cont..
o Packet duplicated
Defined early
Refer https://www.imperva.com/learn/application-security/osi-model/
Protocol Stacks
Layers and Packet Headers
Each layer
o Prepends header to outgoing data unit
Side A Side B
White Green -------------- White Green
Green -------------- Green
White Orange -------------- White Orange
Blue -------------- Blue
White Blue -------------- White Blue
Orange -------------- Orange
White Brown -------------- White Brown
Brown -------------- Brown
Cont..
Side A Side B
White Green -------------- White Orange
Green -------------- Orange
White Orange -------------- White Green
Blue -------------- Blue
White Blue -------------- White Blue
Orange -------------- Green
White Brown -------------- White Brown
Brown -------------- Brown
Cont..
All commands are assigned a privilege level, from 0 to 15, and can
only be accessed by users with the necessary privilege.
o The user can enter privileged EXEC mode by typing enable key
word from the User EXEC mode.
Cont..
Cannot be modified
IP Addressing
Devised for use on large networks
IP addresses have a hierarchical structure and do provide
logical groupings
IP address identifies both a network and a host
Private IP Address
the address your network router assigns to your device.
ℎ = 2𝑛−2 𝑛 = 2𝑛
Refer: https://youtu.be/vcArZIAmnYQ
Subnetting
A subnet is a logical division of an IP network.
It is the process of dividing a network into two or more
networks.
Reasons for subnetting:
To match the physical layout of the organization
To match the administration structure of the organization
To plan for future growth
To reduce network traffic
Network Addressing
IP addresses identify both the network and the host
The division between the two is not specific to a certain number of
octets
Host Portion
• Subnet Address: all 0’s
• First Host: all 0’s and a 1 in rightmost bit
• Last Host: all 1’s and a 0 in rightmost bit
• Broadcast: all 1’s
Subnetting Steps
Determine the subnet identifiers (IP addresses):
Write the last masking octet as a binary number
Determine the binary places of the last masking digit
Calculate the subnets:
Began with the major network number (subnet zero) and
increment by the considering the bit and its respective
place value.
Stop counting when you reach the value of the mask
Determine the valid ranges for your hosts on each subnet
Take the ranges between each subnet identifier
Remove the broadcast address for each subnet
Subnetting Formulas
You should memorize these two formulas:
𝟐𝒏 = number of usable subnets (where n is the number of
bits borrowed)
= number of usable hosts per subnet (Where x is the
𝟐𝑛−2
number of bits remaining in the host field after borrowing)
Subnetting Exercises
1. A service provider has given you the Class C network range
200.50.10.0. Your company must break the network into 8
separate subnets.
a) Determine the subnets with their mask after subnetting
b) Determine the broadcast address
c) Determine the number of hosts your subnets support
d) Determine the valid host address range
All subnets have equal number of hosts. Subnets have variable number of hosts.
All subnets use same subnet mask. Subnets use different subnet masks.
Collision Domain:
A collision domain is, as the name implies, a part of a network
where packet collisions can occur.
A collision occurs when two devices send a packet at the same
time on the shared network segment.
The packets collide and both devices must send the packets
again, which reduces network efficiency.
Collisions are often in a hub environment, because each port
on a hub is in the same collision domain. By contrast, each port
on a bridge, a switch or a router is in a separate collision
domain.
Cont..
VLAN Benefits:
Security
Cost reduction
Better performance
Shrink broadcast domains
Improved IT staff efficiency
Simpler project and application management
Configuring VLAN
By default, all ports on a switch are in the VLAN 1. We can
verify that by typing the show vlan command from the IOS
enable mode of a switch:
Two steps are required to create a VLAN and assign a switch
port to the VLAN:
1. create a VLAN using the vlan NUMBER global mode command
2. assign a port to the VLAN by using two interface subcommands.
• The first command is the switchport mode access command.
This command specifies that the interface is an access interface.
• The second command is the switchport access vlan
NUMBER command. This command assigns the interface to a VLAN.
Cont..
Inter VLAN Communication
Each VLAN has its own subnet and broadcast domain, which
means that frames broadcast onto the network are only
switched between the ports within the same VLAN.
For inter-VLAN communication, a layer 3 device (usually a
router) is needed.
This layer 3 device needs to have an IP address in each
subnet (VLAN) and have a connected route to each of those
subnets.
The hosts in each subnet can use the router's IP addresses as
their default gateway.
Cont..
Three options are available for routing between VLANs:
1. Use a router, with one router LAN interface connected
to the switch for each and every VLAN.
Since you need one Ethernet interface on your router to
connect to each VLAN, this option is not really scalable
and rarely used today.
Cont..
2. Use one router interface with trunking enabled. This
option is called Router On A Stick (ROAS) and allows all
VLANs to communicate through a single interface.
Along with ping and traceroute, useful commands to verify static routes include:
show ip route
show ip route static
show ip route [NETWORK]
Routing Algorithm: Dynamic Routing
Network protocol adjusts automatically for topology or
traffic changes
A routing protocol can dynamically choose a different route if
a link goes down, so this type of routing is fault-tolerant.
Dynamic routing protocols are used by routers to share
information about the reachability and status of remote
networks.
Dynamic routing protocols perform several activities,
including the following:
o Network discovery
o Updating and maintaining routing tables
Cont..
There are several dynamic routing protocols for IP. Here
are some of the more common dynamic routing
protocols for routing IP packets:
o RIP (Routing Information Protocol)
o IGRP (Interior Gateway Routing Protocol)
o EIGRP (Enhanced Interior Gateway Routing Protocol)
o OSPF (Open Shortest Path First)
o IS-IS (Intermediate System–to–Intermediate System)
o BGP (Border Gateway Protocol)