Network Training
Network Training
What is a Network?
• Or this?
• Sharing hardware or software
• E.g. print document
WA USA
Student N
Computer
7 Centre
3) Metropolitan Area Network (MAN)
• A network that uses short-range telecommunication links
to connect 2 or more LANs/computers housed in
different places far apart.
• Distributors, Franchises
Company B
• Examples:
• Extranet – Connecting different
companies together.
MAN Company C
Company A
8
4) Personal Area Network (PAN)
PAN is a computer network used
for communication among computerized devices,
including cellphones and personal digital assistants
through Bluetooth or Infrared technologies. PAN
is setup in low distance range.
9
5) Peer-to-Peer Networks
• Peer-to-peer network is also called workgroup
• No hierarchy among computers all are equal
• No administrator responsible for the network
Peer-to-peer
10
Topology ― 3 basic types
• How so many computers are connected together?
Bus Topology Ring
Topology
Star Topology
Hub
11
Repeater
Generic connecting devices that direct data packets to all devices connected to the hub,
regardless of whether the data package is destined for the device. This makes them
inefficient devices and can create performance bottleneck on busy networks.
Does not perform any processing on the data that it forwards nor does it perform
error checking
Also called multiport repeater
Active Hubs Passive Hubs
SINGLE COLLISION
DOMAIN SINGLE
BROADCAST DOMAIN
Advantages of Repeaters and Hubs
Can extend a network’s total distance
Do not seriously affect network performance
Certain repeaters can connect networks using distinct physical media
Disadvantages of Repeaters and Hubs
Inability to reduce network traffic
Incapable of network segmentation
Inability to connect networks with different data frame type
Wireless Access
Points
Provide cell-based areas where wireless clients such as laptops and handheld devices can
connect to the network by associating with the access point
In most respects, may function exactly like a hub
Operates at the Physical and Data Link layers of the OSI model
Wireless Standards and Organizations
Wireless Network Components
1. Ad Hoc Mode 2. Infrastructure Mode
Wireless clients can connect and Wireless clients attach wirelessly to
communicate directly with each an access point
other Involves the access point wired
There is no access point back into a switch
Wireless Network Components
3. Basic Service Set (BSS) 4. Extended Service Set (ESS)
When a single access point Involve multiple access points
is available in connected to various switches
infrastructure in the network
mode Allows users to roam around the
building and remain connected to
the WLAN as well as the LAN
and WAN
Wireless Connectivity
Access points typically broadcast their network
name
The Service Set Identifier (SSID) is the
network name
When wireless clients are powered on, they
begin
scanning the airspace for available access
points
They detect the broadcasted SSID of the
various access points in the area
Attempt to associate with the one that
has the
highest signal level and the lowest error
rate
Wireless Connectivity
If the system is open, the client is accepted by
the
access point and begins communications
When SSID is not broadcasted
• Wireless clients must already be
configured with the correct SSID
The client will send out a probe request
with:
• Configured SSID
• Access point with that SSID configured
will allow the client to associate
Wireless Security Measures
While security is always necessary in WLANs due to
the broadcast nature of the medium
• These devices are not designed to handle the
most complex and highest levels of security
The most important reason to implement security on
your WLAN at home
• Others in your neighborhood do not use
your bandwidth for free
Workspace situations call for security that not
only
requires the client device to authenticate
• But that also prompts the device user to
enter a username and password
802.1x is used at the physical layer to block
ports
The Extensible Authentication Protocol (EAP)
is used at
layer 2 to transfer the authentication frames
Wireless Security Protocols
Advantages/Disadvantages of WAPs
ADVANTAGES
• Provide the ability to work anywhere within range of your access points
• Extends the range of your network without running additional wires
DISADVANTAGES
Introduces serious security concerns
802.11 provides much less bandwidth than wired devices
Many situations exist where 802.11 will not function well due to serious
interference from various sources
Bridge
sOperate at the Data Link layer of the OSI model
Filter traffic between network segments by examining the destination MAC address
• Based on the destination MAC address, the bridge either forwards or discards
the frame
Reduce network traffic by keeping local traffic on the local segment
Transparent Bridges
• Also called learning bridges
• Because they build a table of
MAC addresses as they
receive frames
• They “learn” which addresses are on which
segments
• The bridge uses the source MAC
addresses to determine which addresses
are on which segments
• By determining a frame’s origin,
the bridge knows where to send
frame in the future
• Ethernet networks mainly use
transparent bridges
Source Routing
Bridges
• Rely on the source of the frame transmission to provide the routing information
• The source computer determines the best path by sending out explorer frames
• The source includes the routing information returned by its explorer frames in the frame sent
across the network
• The bridge uses this information to build its table
Translation
Bridges
Increase the available bandwidth to individual nodes because fewer nodes share a
collision domain
Reduce collisions
Some bridges connect networks using different media types and architectures
Disadvantages of Bridges
Broadcast storm
When two or more stations engage in the transmission of excessive broadcast
traffic
Switche
s
• Operate at the Data Link layer of the OSI
model
• Increase network performance by reducing
the number of frames transmitted to the
rest of the network
• Switch opens a virtual circuit between the
source and the destination
• Prevents communications between just two
computers from being broadcast to every
computer on the network or segment
Called microsegmentation
Switche
s
• When two machines have a virtual circuit
• They do not have to share the bandwidth
with any other computers
• Multiple virtual circuits can be in use at the
same time, each with its own full
bandwidth
Called “switched bandwidth”
• When machines must share a wire and
compete for available bandwidth with other
machines, they experience contention
Advantages of Bridges
Switches increase available network bandwidth
Switches reduce the workload on individual computers
Switches increase network performance
Networks that include switches experience fewer frame collisions because switches create collision
domains for each connection (a process called microsegmentation)
Switches connect directly to workstations
Disadvantages of Bridges
IP ADDRESS
• Logical address when TCP/IP is used on an internetwork
• Routers use the IP address to route packets to the correct network segment
Advantages of Routers
• Can connect different network architectures, such as Ethernet and Token Ring
• Can choose the best path across an internetwork using dynamic routing techniques
• Reduce network traffic by creating collision domains
• Reduce network traffic by creating broadcast domains
Disadvantages of Routers
• Routers work only with routable network protocols; most but not all protocols are routable
• Routers are more expensive than other devices
● Objective
● Topology
● Types of
topologies
● Conclusion
● Reference
Objectives
Server
Hub
Compuert
Compuert
Compuetr
Compuetr
Advantages of Star Topology
14
• 17
● In a ring topology, each computer is connected directly to the
next computer in line, forming a circle of cable.
Compuetr
Compuetr
Compuetr
Compuetr Compuetr
Token Passing
• 19
● Token passing a method of sending data in a ring topology
C om pu
te r
C om pu C om pu
te r te r
C om pu
C om pu te r
te r
Advantages of Mesh Topology
25
● Because
of the dedicated link, no traffic between
computers.
● Failure
of one node computer not affect rest of the
network.
● Hybrid Star
● Star Bus
The star bus topology combine the bus and the star,
linking several star hubs together with bus trunks. If one
computer fails, the hub can detect the fault and
isolate the computer.
Com
reput Com
reput
Com
reput
Com
reput
Com
reput Com
reput
Com
reput
Com
reput
Com
reput Com
reput
Variations of the Major Topologies
31
●Hybrid Topologies
32
IP
Address
Reasons for Subnetting
Large networks need to be segmented into smaller sub-
networks, creating smaller groups of devices and services
in order to:
Control traffic by containing broadcast traffic within subnetwork
Reduce overall network traffic and improve network performance
Subnetting - process of segmenting a network into multiple
smaller network spaces called subnetworks or Subnets.
Subnet 0
Network 192.168.1.0-127/25
Subnet 1
Network 192.168.1.128-255/25
Subnetting based on Host Requirements
n = # borrowed bits
h = # bits available in host address
Example: Creating 8 Subnets
Borrowing 3 bits to Create 8 Subnets. 23 = 8 subnets
Example: Creating 8 Subnets ( contd. )
Set Up Subnets
200.200.200.10
128.16.32.13
• What is the Subnet Mask?
• What are the Network Addresses?
• What is the Broadcast Domain * Needs 500 Subnets
• What IP Addresses are available?
Example – 2
175.116.23.13/21
1. What is the Subnet Mask?
2. What are the Network Addresses?
3. What is the Broadcast Domain
4. What IP Addresses are available?
5. Subnet:
• At least 500 host/subnet
6. 175.116.200.15?
7. ?
8. ?
9. ?
10. ?
a) Switching (MAC Address Table)
• The MAC address table is where the switch stores information about the other
Ethernet interfaces to which it is connected on a network. The table enables the
switch to send outgoing data (Ethernet frames) on the specific port required to
reach its destination, instead of broadcasting the data on all ports (flooding).
Broadcasting, ARP
• ARP broadcasts a request packet to all the machines on the LAN and asks if any
of the machines are using that particular IP address. When a machine
recognizes the IP address as its own, it sends a reply so ARP can update the
cache for future reference and proceed with the communication.
b) VLAN - Trunk Port
• What Is a VLAN?
• A virtual local area network (VLAN) is a logical grouping of ports which is
independent of location. A single VLAN (and the nodes connected in a single
VLAN) will behave in the same way as if it was a separate Layer 3 network.
Trunk Port
• A trunk port is a specific type of port on a network switch that allows data to flow
across a network node for multiple virtual local area networks or VLANs. Think of
the trunk port as a “bundle” of individual branches or capillaries in a telecom
network connection.
Layer 2 switching
• Layer 2 switching (or Data Link layer switching) is the process of using devices’
MAC addresses to decide where to forward frames. Switches and bridges are used
for Layer 2 switching. They break up one large collision domain into multiple
smaller ones.
Spanning Tree Protocol
• Spanning Tree Protocol (STP) is a Layer 2 network protocol used to prevent
looping within a network topology. STP was created to avoid the problems that
arise when computers exchange data on a local area network (LAN) that
contains redundant paths.
Layer 3 Network (L3 Network)
• Layer 3 is the network layer and its protocol is the Internet Protocol or IP.
Devices in an IP network are identified by an IP address, which can be
dynamically assigned and may change over time.
a) Routing
• Static routing is a form of routing that occurs when a router uses a manually-
configured routing entry, rather than information from dynamic routing traffic.
Dynamic Routing
• A routing protocol specifies how routers communicate with each other to distribute
information that enables them to select paths between nodes on a computer
network.
Distance Vector
• The term distance vector refers to the fact that the protocol manipulates vectors
(arrays) of distances to other nodes in the network. The distance vector
algorithm was the original ARPANET routing algorithm and was implemented
more widely in local area networks with the Routing Information Protocol
(RIP).
Link state protocol
• Link state protocols use characteristics of the route such as speed and cost as well
as current congestion to determine the best path, which is typically computed by
the Dijkstra algorithm. Link state routers are updated from all the routers in the
entire network by passing information from router to nearest router.
Routing Information Protocol
• The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing
packets of data so that they can travel across networks and arrive at the correct
destination. Data traversing the Internet is divided into smaller pieces, called
packets. IP information is attached to each packet, and this information helps
routers to send packets to the right place. Every device or domain that connects to
the Internet is assigned an IP address, and as packets are directed to the IP address
attached to them, data arrives where it is needed.
What is Tunnel
• Tunneling is the process by which VPN packets reach their intended destination,
which is typically a private network. Many VPNs use the IPsec protocol suite.
IPsec is a group of protocols that run directly on top of IP at the network layer.
GRE Tunnel
• A secure sockets layer VPN (SSL VPN) enables individual users to access an
organization's network, client-server applications, and internal network utilities
and directories without the need for specialized software.
Part 1: Introduction to Networking
What is a Network?
Why Networking?
Transmission Media
LAN, WAN, MAN, PAN
Network Topologies
• Bus, Star, Ring, Mesh
Part 2: Switching
Introduction to Switches
Advantages and Disadvantages of
Switches
Switch Operations
Wireless Access Points
Huawei Switch Configuration
• <Quidway> system-view
• [Quidway] sysname Switch
• [Switch] vlan batch 10 20 30
• [Switch] interface GigabitEthernet 0/0/1
• [Switch-GigabitEthernet0/0/1] port link-
type access
• [Switch-GigabitEthernet0/0/1] port default
vlan 10
• [Switch-GigabitEthernet0/0/1] quit
• [Switch] interface GigabitEthernet 0/0/2
Part 3: VLANs
What is a VLAN?
Benefits of VLANs
VLAN Configuration
Huawei VLAN Configuration
• <Quidway> system-view
• [Quidway] sysname VLAN_Switch
• [VLAN_Switch] vlan batch 10 20 30
• [VLAN_Switch] interface GigabitEthernet
0/0/1
• [VLAN_Switch-GigabitEthernet0/0/1] port
link-type access
• [VLAN_Switch-GigabitEthernet0/0/1] port
default vlan 10
• [VLAN_Switch-GigabitEthernet0/0/1] quit
Part 4: Routing
Introduction to Routers
Advantages and Disadvantages of
Routers
Router Operations
Basic Routing Configuration
Huawei Router Configuration
• <Huawei> system-view
• [Huawei] sysname Router
• [Router] interface GigabitEthernet 0/0/0
• [Router-GigabitEthernet0/0/0] ip address
192.168.1.1 255.255.255.0
• [Router-GigabitEthernet0/0/0] quit
• [Router] interface GigabitEthernet 0/0/1
• [Router-GigabitEthernet0/0/1] ip address
10.0.0.1 255.255.255.0
• [Router-GigabitEthernet0/0/1] quit