0% found this document useful (0 votes)
112 views31 pages

Basic Networking

This document provides an overview of networking concepts including: 1. What networking is and its uses. It discusses computer networking allowing interconnected devices to exchange data and share resources using communication protocols. 2. Types of networks including local area networks (LANs) which connect devices within a single building and wide area networks (WANs) for long-distance communication between multiple locations. 3. Key network devices and components like switches, routers, firewalls, and their functions in directing traffic flow and routing information. The document then discusses specific networking topics in more detail over several pages including IP addressing, private IP addresses, static vs dynamic routing, routing protocols, and VLANs.

Uploaded by

VANI RAVI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views31 pages

Basic Networking

This document provides an overview of networking concepts including: 1. What networking is and its uses. It discusses computer networking allowing interconnected devices to exchange data and share resources using communication protocols. 2. Types of networks including local area networks (LANs) which connect devices within a single building and wide area networks (WANs) for long-distance communication between multiple locations. 3. Key network devices and components like switches, routers, firewalls, and their functions in directing traffic flow and routing information. The document then discusses specific networking topics in more detail over several pages including IP addressing, private IP addresses, static vs dynamic routing, routing protocols, and VLANs.

Uploaded by

VANI RAVI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

Basic of Networking 1

Agenda : Presenter

• What is Networking and uses • Cholayya


• Ip address Space • Ravinder Kumar
• Definition of Lan/wan
• Information on network
Devices/Connector/Interfaces
• Traffic Flow
• Routing Information
• Some test cases
Fundamentals of Networking.

Computer networking refers to interconnected computing devices that can exchange data and share
resources with each other. These networked devices use a system of rules, called communications
protocols, to transmit information over physical or wireless technologies.

• A LAN is an interconnected system limited in size and geography. It typically connects


Local area computers and devices within a single office or building. It is used by small companies
or as a test network for small-scale prototyping
network (LAN)
• An enterprise network spanning buildings, cities, and even countries, is called a wide
Wide area area network (WAN). While local area networks are used to transmit data at higher
speeds within close proximity, WANs are set up for long-distance communication that is
networks (WAN) secure and dependable.
Legend of Network 3

Cabling

Connectors

Switch

Router

Firewalls

Public Domain/Remote
Location
Switch 4

Switch is a telecommunication device grouped as


one of computer network components. Switch is
like a Hub but built in with advanced features. It
uses physical device addresses in each incoming
messages so that it can deliver the message to the
right destination or port
Router 5

A router is a special type of computer. It has the same basic components as a standard
desktop PC. However, routers are designed to perform some very specific functions.
Just as computers need operating systems to run software applications, routers need the
Internetwork Operating System software (IOS) to run configuration files. These
configuration files contain the instructions and parameters that control the flow of
traffic in and out of the routers. The many parts of a router are shown in right side .

Router have all capabilities Like Packet forwarding. Routers can regenerate signals,
concentrate multiple connections, convert data transmission formats, and manage data
transfers. They can also connect to a WAN, which allows them to connect LANs that
are separated by great distances.
Interfaces 6

Types of interfaces:
Interfaces have the • Ethernet
following characteristics • Fast Ethernet
and functions: • Serial
• Connect router to network for • Token ring
frame entry and exit • ISDN BRI
• Can be on the motherboard or • Loopback
on a separate module • Console
• Aux
External Components of a 2600 Router 7
Computer/Terminal Console Connection 8
LANs 9
WANs 10
The OSI Reference Model 11

Flow of OSI Layer


open system interconnect

Physical

Data Link

Network

Transport

Session

Presentation

Application
Network and Host Addressing 5

Using the IP address of the destination network, a router can deliver a packet
to the correct network.

When the packet arrives at a router connected to the destination network, the
router uses the IP address to locate the particular computer connected to that
network.

Ip address space is divided in to Three Ranges

1. Class A- To fulfill Big organization host requirement


2. Class B - To fulfill Mid Level Organization host requirement
3. Class C- To fulfill small host requirement
4. Class D- Only for R&D (not for Public uses)
Address Class Prefixes 13
Private IP Addresses 14

Private IP addresses are another solution to the problem of the impending exhaustion of public IP addresses. As
mentioned, public networks require hosts to have unique IP addresses.

However, private networks that are not connected to the Internet may use any host addresses, as long as each host
within the private network is unique.
Static and Dynamic Routing
1. In static routing, routing tables are manually updated, while in dynamic routing, tables are
automatically updated.
2. The static routing is best for small network implementation and star topologies. It is not as
good for any other topologies. Whereas dynamic routing is best for a large network
implementation.
Routing Protocols 17

Routing protocols includes the following:

processes for sharing route information allows


routers to communicate with other routers to
update and maintain the routing tables

Examples of routing protocols that support the IP


routed protocol are:

RIP, IGRP,

OSPF, BGP,

and EIGRP.
Administrative Distances 18
Traffic Flow – Vice Versa

Gateway Distribution Access


Internet Cloud Firewall Core switches End users
Router switches Switches

Highly Sensitive Low sensitive Trusted Area


Industries recommended Architecture
 Approach
The Core layer: Backbone
 The core layer is literally the core of the network. At the top of
the hierarchy, the core layer is responsible for transporting large
amounts of traffic both reliably and quickly.
 The Distribution Layer: Routing
 The distribution layer is sometimes referred to as the workgroup
layer and is the communication point between the access layer
and the core
 The Access Layer: Switching
 The access layer controls user and workgroup access to
internetwork resources. The access layer is sometimes referred
to as the desktop layer.
The Access Layer 21

The access layer is the entry point for user workstations and servers to the network. In a campus LAN the
device used at the access layer can be a switch or a hub.

Access layer functions also include MAC layer filtering and micro segmentation. Layer 2 switches are used in
the access layer.
The Distribution Layer 22
The distribution layer of the network is between the access and core layers. Networks are segmented into broadcast
domains by this layer. Policies can be applied, and access control lists can filter packets.

The distribution layer isolates network problems to the workgroups in which they occur. The distribution layer also
prevents these problems from affecting the core layer. Switches in this layer operate at Layer 2 and Layer 3.

• Catalyst 5000 family


• Catalyst 6000 family
The Core Layer 23
The core layer is a high-speed switching backbone.

This layer of the network design should not perform any packet manipulation. Packet manipulation, such
as access list filtering, would slow down the process.

Providing a core infrastructure with redundant alternate paths gives stability to the network in the event of
a single device failure.

The core can be designed to use Layer 3 switching.

•Nexus 9k Family
•Catalyst 45+ onwards family
Firewall
A firewall is a network device or software for controlling network security and access
rules.
Firewalls are inserted in connections between secure internal networks and potentially
insecure external networks such as the Internet.
Firewalls are typically configured to reject access requests from unrecognized sources
while allowing actions from recognized ones.
The vital role firewalls play in network security grows in parallel with the constant
increase in cyber attacks
Switches 25

MAC Table : is a hardware identifier that uniquely identifies each device
on a network. Primarily, the manufacturer assigns it. They are often found on a
device's network interface controller (NIC) card
Arp Table : Address Resolution Protocol (ARP) is a protocol or procedure that
connects an ever-changing Internet Protocol (IP) address to a fixed physical machine
address, also known as a media access control (MAC) address, in a local-area network
(LAN)
VLANs 26

VLAN implementation combines Layer 2 switching and Layer 3 routing


technologies to limit both collision domains and broadcast domains.

VLANs can also be used to provide security by creating the VLAN groups
according to function and by using routers to communicate between VLANs.

A physical port association is used to implement VLAN assignment.

Communication between VLANs can occur only through the router.

This limits the size of the broadcast domains and uses the router to determine
whether one VLAN can talk to another VLAN.

NOTE: This is the only way a switch can break up a broadcast domain!
Setting up VLAN Implementation 27
10

A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN, a telecommuter can access the network of the
company headquarters through the Internet by building a secure tunnel between the telecommuter’s PC and a VPN router in the headquarters.
Mixing Public and Private IP Addresses 29

Private IP addresses can be intermixed, as shown in the graphic, with public IP addresses .This will conserve the
number of addresses used for internal connections. Connecting a network using private addresses to the Internet
requires translation of the private addresses to public addresses. This translation process is referred to as Network
Address Translation (NAT).
Question and Answer

12:15 to 12:30
15 Minutes
End of slide

You might also like