Basic Networking
Basic Networking
Agenda : Presenter
Computer networking refers to interconnected computing devices that can exchange data and share
resources with each other. These networked devices use a system of rules, called communications
protocols, to transmit information over physical or wireless technologies.
Cabling
Connectors
Switch
Router
Firewalls
Public Domain/Remote
Location
Switch 4
A router is a special type of computer. It has the same basic components as a standard
desktop PC. However, routers are designed to perform some very specific functions.
Just as computers need operating systems to run software applications, routers need the
Internetwork Operating System software (IOS) to run configuration files. These
configuration files contain the instructions and parameters that control the flow of
traffic in and out of the routers. The many parts of a router are shown in right side .
Router have all capabilities Like Packet forwarding. Routers can regenerate signals,
concentrate multiple connections, convert data transmission formats, and manage data
transfers. They can also connect to a WAN, which allows them to connect LANs that
are separated by great distances.
Interfaces 6
Types of interfaces:
Interfaces have the • Ethernet
following characteristics • Fast Ethernet
and functions: • Serial
• Connect router to network for • Token ring
frame entry and exit • ISDN BRI
• Can be on the motherboard or • Loopback
on a separate module • Console
• Aux
External Components of a 2600 Router 7
Computer/Terminal Console Connection 8
LANs 9
WANs 10
The OSI Reference Model 11
Physical
Data Link
Network
Transport
Session
Presentation
Application
Network and Host Addressing 5
Using the IP address of the destination network, a router can deliver a packet
to the correct network.
When the packet arrives at a router connected to the destination network, the
router uses the IP address to locate the particular computer connected to that
network.
Private IP addresses are another solution to the problem of the impending exhaustion of public IP addresses. As
mentioned, public networks require hosts to have unique IP addresses.
However, private networks that are not connected to the Internet may use any host addresses, as long as each host
within the private network is unique.
Static and Dynamic Routing
1. In static routing, routing tables are manually updated, while in dynamic routing, tables are
automatically updated.
2. The static routing is best for small network implementation and star topologies. It is not as
good for any other topologies. Whereas dynamic routing is best for a large network
implementation.
Routing Protocols 17
RIP, IGRP,
OSPF, BGP,
and EIGRP.
Administrative Distances 18
Traffic Flow – Vice Versa
The access layer is the entry point for user workstations and servers to the network. In a campus LAN the
device used at the access layer can be a switch or a hub.
Access layer functions also include MAC layer filtering and micro segmentation. Layer 2 switches are used in
the access layer.
The Distribution Layer 22
The distribution layer of the network is between the access and core layers. Networks are segmented into broadcast
domains by this layer. Policies can be applied, and access control lists can filter packets.
The distribution layer isolates network problems to the workgroups in which they occur. The distribution layer also
prevents these problems from affecting the core layer. Switches in this layer operate at Layer 2 and Layer 3.
This layer of the network design should not perform any packet manipulation. Packet manipulation, such
as access list filtering, would slow down the process.
Providing a core infrastructure with redundant alternate paths gives stability to the network in the event of
a single device failure.
•Nexus 9k Family
•Catalyst 45+ onwards family
Firewall
A firewall is a network device or software for controlling network security and access
rules.
Firewalls are inserted in connections between secure internal networks and potentially
insecure external networks such as the Internet.
Firewalls are typically configured to reject access requests from unrecognized sources
while allowing actions from recognized ones.
The vital role firewalls play in network security grows in parallel with the constant
increase in cyber attacks
Switches 25
MAC Table : is a hardware identifier that uniquely identifies each device
on a network. Primarily, the manufacturer assigns it. They are often found on a
device's network interface controller (NIC) card
Arp Table : Address Resolution Protocol (ARP) is a protocol or procedure that
connects an ever-changing Internet Protocol (IP) address to a fixed physical machine
address, also known as a media access control (MAC) address, in a local-area network
(LAN)
VLANs 26
VLANs can also be used to provide security by creating the VLAN groups
according to function and by using routers to communicate between VLANs.
This limits the size of the broadcast domains and uses the router to determine
whether one VLAN can talk to another VLAN.
NOTE: This is the only way a switch can break up a broadcast domain!
Setting up VLAN Implementation 27
10
A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN, a telecommuter can access the network of the
company headquarters through the Internet by building a secure tunnel between the telecommuter’s PC and a VPN router in the headquarters.
Mixing Public and Private IP Addresses 29
Private IP addresses can be intermixed, as shown in the graphic, with public IP addresses .This will conserve the
number of addresses used for internal connections. Connecting a network using private addresses to the Internet
requires translation of the private addresses to public addresses. This translation process is referred to as Network
Address Translation (NAT).
Question and Answer
12:15 to 12:30
15 Minutes
End of slide