0% found this document useful (0 votes)
3 views36 pages

Unit 1

The document provides an overview of networking basics, including communication models, networking devices, and protocols such as TCP/IP, HTTP, and SMTP. It explains the OSI and TCP/IP models, detailing the functions of each layer and the roles of devices like switches, routers, and firewalls. Additionally, it covers virtualization technologies, NAT, DHCP, DNS, and the differences between IPv4 and IPv6.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views36 pages

Unit 1

The document provides an overview of networking basics, including communication models, networking devices, and protocols such as TCP/IP, HTTP, and SMTP. It explains the OSI and TCP/IP models, detailing the functions of each layer and the roles of devices like switches, routers, and firewalls. Additionally, it covers virtualization technologies, NAT, DHCP, DNS, and the differences between IPv4 and IPv6.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

1

Network Basics
Agenda 2

❖ Basics of networking ❖ NameSpace


❖ Network communication models ❖ NAT
❖ Networking Devices
❖ TCP/IP
■ Switches
❖ HTTP/HTTPS
■ Routers
❖ FTP
■ Firewalls
❖ SMTP
■ Load Balancers
❖ SNMP
❖ Virtualization
■ Virtual CPU
■ Virtual Memory
■ Virtual Networking
■ Network Virtualization
Abbreviations/ Acronyms 3

❖ NAT Network Address Translation


❖ SNAT Source Network Address Translation
❖ DNAT Destination Network Address Translation
❖ TCP Transmission Control Protocol
❖ OSI Open Systems Interconnection
❖ HTTP HyperText Transfer Protocol
❖ SMTP Simple Mail Transfer Protocol
❖ SNMP Simple Network Management Protocol
❖ DHCP Dynamic Host Configuration Protocol
❖ DNS Domain Name System
❖ ARP Address Resolution Protocol
❖ NFV Network Functions Virtualization
Introduction to Networking
Introduction 5

❖ A computer network is a set of computers


● Sharing resources located on or provided by network nodes.
● Uses standardized communication protocols over digital interconnections to
communicate with each other.
Network communication models 6

❖ Network communication models define how data is transmitted and received


between devices in a network.
❖ The two main models are:
7
OSI Model 8

❖ The OSI (Open Systems Interconnection) Model is a set of rules that explains
how different computer systems communicate over a network.
❖ OSI Model was developed by the International Organization for Standardization
(ISO).
❖ The OSI Model consists of 7 layers and each layer has specific functions and
responsibilities.
Physical Layer / Data Link Layer 9

Physical Layer Data Link Layer


❖ The physical layer contains ❖ The data link layer is responsible for
information in the form of bits. the node-to-node delivery of the
❖ Physical Layer is responsible for message. The main function of this
transmitting individual bits from layer is to make sure data transfer is
one node to the next. error-free from one node to another,
❖ When receiving data, this layer over the physical layer.
will get the signal received and ❖ Packet in the Data Link layer is
convert it into 0s and 1s and send referred to as Frame. Switches and
them to the Data Link layer, Bridges are common Data Link Layer
which will put the frame back devices.
together.
Network Layer / Transport Layer 10

Network Layer Transport Layer


❖ The network layer works for the ❖ The transport layer provides services
transmission of data from one to the application layer and takes
host to the other located in services from the network layer.
different networks. ❖ The data in the transport layer is
❖ The sender and receiver’s IP referred to as Segments.
address are placed in the header ❖ It is responsible for the end-to-end
by the network layer. delivery of the complete message.
❖ Segment in the Network layer is
referred to as Packet.
Session Layer / Presentation Layer 11

Session Layer Presentation Layer


❖ Session Layer in the OSI Model is ❖ The presentation layer is also called
responsible for the establishment the Translation layer.
of connections, management of ❖ The data from the application layer is
connections, terminations of extracted here and manipulated as per
sessions between two devices. the required format to transmit over
❖ It also provides authentication the network.
and security.
Application Layer 12

❖ At the very top of the OSI Reference Model stack of layers, we find the Application
layer which is implemented by the network applications.
❖ These applications produce the data to be transferred over the network.
❖ This layer also serves as a window for the application services to access the network
and for displaying the received information to the user.
❖ Protocols used in the Application layer are SMTP, FTP, DNS, etc.
TCP/IP Model 13

❖ The TCP/IP model is a fundamental framework for computer networking.


❖ It stands for Transmission Control Protocol/Internet Protocol, which are the core
protocols of the Internet.
❖ This model defines how data is transmitted over networks, ensuring reliable
communication between devices.
❖ It consists of four layers:
Network Access Layer / Internet Layer 14

Network Access Layer Internet Layer

❖ The Network Access Layer ❖ This layer parallels the


represents a collection of functions of OSI’s Network
applications that require layer.
network communication. ❖ It defines the protocols which
❖ This layer is responsible for are responsible for the logical
generating data and initiating transmission of data over the
connection requests. entire network.
Networking Device - Switches 15

❖ Switches connect hosts that belong to the same layer-2 network


❖ It enable forwarding of the packet received on one port (input) to another port
(output)
❖ It forward the traffic based on the destination Ethernet address
Routers 16

❖ Routers enable communication between two nodes on different layer-3


networks that are not directly connected to each other.
❖ Routers operate at layer-3 in the networking model. They route the traffic based
on the destination IP address in the packet header
Firewalls 17

❖ Firewalls are used to regulate traffic to and from a host or a network.


❖ A firewall can be either a specialized device connecting two networks or a
software-based filtering mechanism implemented on an operating system.
❖ Firewalls are used to restrict traffic to a host based on the rules defined on the
host. They can filter packets based on several criteria such as source IP address,
destination IP address, port numbers, connection state, and so on.
❖ It is primarily used to protect the hosts from unauthorized access and malicious
attacks.
❖ Linux-based operating systems implement firewalls through iptables.
Load Balancer 18

❖ Load balancers can be software-based or hardware-based devices that allow


traffic to evenly be distributed across several servers.
❖ By distributing the traffic across multiple servers, it avoids overload of a single
server thereby preventing a single point of failure in the product.
❖ It further improves the performance, network throughput, and response time of
the servers
Virtual Switches 19

❖ A Virtual Switch (vSwitch) is a software-based switch that operates within a


virtualized environment (e.g., VMware, Hyper-V)
❖ It allows virtual machines (VMs) to communicate with each other and with
physical networks.
Virtualization 20

❖ Virtualization is a technology that allows you to create multiple virtual


instances of computing resources (like servers, storage, and networks) on a
single physical machine.
❖ It helps in optimizing hardware usage, improving scalability, and reducing costs.
Virtual CPU / Virtual Memory / Virtual Network 21

vCPU vRAM vNIC


A Virtual CPU is a logical Virtual Memory is the RAM A Virtual Network is a
processor assigned to a allocated to a VM from the software-based network
virtual machine (VM). It is a host machine’s physical interface that connects a VM
portion of the physical CPU RAM. The VM’s OS sees it as to the network. It acts like a
(processor) that the dedicated memory, even physical network card (NIC)
hypervisor (like Proxmox, though it's managed by the but is managed by the
VMware, or KVM) allocates hypervisor. hypervisor.
to a VM.
Namespaces 22

❖ A namespace is a way of scoping a particular set of identifiers. the same


identifier can be used multiple times in different namespaces.
❖ A network namespace has its own routing table and set of iptables.
❖ OpenStack Networking uses its feature of providing overlapping IP addresses in
different virtual networks
NFV 23

❖ Technology that replaces traditional hardware-based network appliances (like


routers, firewalls, and load balancers) with virtualized software-based network
functions running on standard servers.
NAT 24

❖ Network Address Translation (NAT) is a process for modifying the source or


destination addresses in the headers of an IP packet while the packet is in transit.
❖ In general, the sender and receiver applications are not aware that the IP packets
are being manipulated.
❖ NAT is often implemented by routers
❖ There are multiple variations of NAT, and here we describe three kinds
commonly found in OpenStack deployments
● SNAT - Source Network Address Translation
● DNAT - Destination Network Address Translation
● One to One NAT
SNAT 25

❖ When the router receives a packet with the matching IP address and port, it
translates these back to the private IP address and port, and forwards the packet
along.
❖ NAT router modifies ports as well as IP addresses, its referred as Port Address
Translation (PAT).
❖ OpenStack uses SNAT to enable applications running inside of instances to
connect out to the public Internet
DNAT 26

❖ Modifies the IP address of the destination in IP packet headers.


❖ OpenStack uses DNAT to route packets from instances to the
OpenStack metadata service.
❖ Applications running inside of instances access the OpenStack
metadata service by making HTTP GET requests to a web server with
IP address 169.254.169.254.
❖ OpenStack uses DNAT to change the destination IP of these packets
so they reach the network interface that a metadata service is
listening on
One-to-one NAT 27

❖ In one-to-one NAT, the NAT router maintains a one-to-one mapping


between private IP addresses and public IP addresses.
❖ OpenStack uses one-to-one NAT to implement floating IP addresses.
FTP 28

❖ It is a standard network protocol used for transferring files between a


client and a server over a computer network.
❖ It operates on a client-server model and establishes separate control and
data connections to facilitate file transfers.
SMTP 29

❖ Simple Mail Transfer mechanism (SMTP) is a mechanism for exchanging


email messages between servers.
❖ It is an essential component of the email communication process and
operates at the application layer of the TCP/IP protocol stack.
❖ SMTP is a protocol for transmitting and receiving email messages.
SNMP 30

❖ Simple Network Management Protocol (SNMP) is a widely used protocol for


network management that provides a standardized framework for monitoring
and managing network devices such as routers, switches, servers,
printers,firewalls, and load balancer.
❖ It operates within the application layer of the Internet protocol suite and
allows network administrators to manage network performance, find and
solve network problems, and plan for network growth.
IPV4 vs IPV6 31

IPV4 IPV6

Address Size 32 - bit address length 128 - bit address length

Address Format Numeric Dotted Decimal Alphanumeric


Notation Hexadecimal Notation
10.0.0.1
2001:0000:3238:DFE1:0
063:0000:0000:FEFB

Prefix Notation 255.255.255.0/24 /64

Deployed 1981 1998


Supports DHCP or Manual Supports Auto
Configuration Configuration

Classes IPv4’s IP addresses are IPv6 does not have any


divided into five different classes of the IP address.
classes. Class A , Class B,
Class C, Class D , Class E.
DHCP 32

❖ Hosts connected to a network use the Dynamic Host Configuration Protocol


(DHCP) to dynamically obtain IP addresses
❖ A DHCP server hands out the IP addresses to network hosts, which are the
DHCP clients
❖ OpenStack uses a third-party program called dnsmasq to implement the
DHCP server
DNS 33

❖ The Domain Name System (DNS) turns domain names into IP addresses,
which browsers use to load internet pages.
❖ Every device connected to the internet has its own IP address, which is used
by other devices to locate the device.
❖ DNS servers make it possible for people to input normal words into their
browsers, without having to keep track of the IP address for every website.
Subnets & ARP 34

❖ Subnets are a logical partition of an IP network into multiple, smaller network


segments.
❖ A subnet mask is a four-octet number which is used to identify the network
portion from the 32-bit IP address.
❖ There are two syntaxes for expressing a netmask:
● dotted quad - (255.255.255.0)
● classless inter-domain routing (CIDR) - ( 10.10.10.0/24)
❖ The Address Resolution Protocol (ARP) bridges the gap between Ethernet and IP
by mapping IP addresses into MAC addresses.
❖ ARP assumes that all machines that are in the same subnet are on the same local
network.
QUESTION’S
THANK YOU

You might also like