0% found this document useful (0 votes)
22 views147 pages

Network Training

Uploaded by

Faizan Siddiqui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views147 pages

Network Training

Uploaded by

Faizan Siddiqui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 147

Introduction to Networking

What is a Network?

A network consists of 2 or more computers


connected together, and they can communicate and
share resources (e.g. information)
• It is composed of two main aspects:
o Physical Connection (wires, cables, wireless media)
o Logical Connection (data transporting across the physical
media)
Why Networking?
• Sharing information — i.e. data communication

• Do you prefer these?

• Or this?
• Sharing hardware or software
• E.g. print document

• Centralize administration and support


• E.g. Internet-based, so everyone can access the same
administrative or support application from their PCs
Transmission Media
• Two main categories:
1. Guided ― wires, cables
2. Unguided ― wireless transmission, e.g. radio,
microwave, infrared, sound, sonar
• Three types of guided media here:
1. Twisted-Pair cables:
2. Coaxial cables
3. Fiber-optic cables
1) LAN
• Local Area Network (LAN)
• Small network, short distance
• A room, a floor, a building
• Limited by no. of
computers and distance
covered
• Usually one kind of
technology throughout
the LAN
• Serve a department
within an organization
• Examples:
2) Wide Area Network (WAN)
• A network that uses long-range telecommunication links
to connect 2 or more LANs/computers housed in different
places far apart.

• Towns, states, countries Your home


• Examples:
• Network of our Campus
• Internet

WA USA

Student N
Computer
7 Centre
3) Metropolitan Area Network (MAN)
• A network that uses short-range telecommunication links
to connect 2 or more LANs/computers housed in
different places far apart.
• Distributors, Franchises

Company B
• Examples:
• Extranet – Connecting different
companies together.

MAN Company C

Company A

8
4) Personal Area Network (PAN)
PAN is a computer network used
for communication among computerized devices,
including cellphones and personal digital assistants
through Bluetooth or Infrared technologies. PAN
is setup in low distance range.

9
5) Peer-to-Peer Networks
• Peer-to-peer network is also called workgroup
• No hierarchy among computers  all are equal
• No administrator responsible for the network

Peer-to-peer

10
Topology ― 3 basic types
• How so many computers are connected together?
Bus Topology Ring
Topology

Star Topology

Hub

11
Repeater

 Work against attenuation by repeating received signals on a network usually by cleaning


or regenerating the digital transmission in the process
 Forwards every frame and without any filtering capability
 C onnects two segment s overcoming transmission limitations of the transmission media
Hubs

 Generic connecting devices that direct data packets to all devices connected to the hub,
regardless of whether the data package is destined for the device. This makes them
inefficient devices and can create performance bottleneck on busy networks.
 Does not perform any processing on the data that it forwards nor does it perform
error checking
 Also called multiport repeater
Active Hubs Passive Hubs

Resembles passive hubs but with Simply combines signals of a


Function electronic components for signal network
regeneration and amplification segment
Endpoint Distance Distance between hubs can be increased Reduces cabling distance by half
Noise Amplification Amplification of noise along with the signal No noise amplification
Cost More expensive Cheaper
Hub Operations

SINGLE COLLISION
DOMAIN SINGLE
BROADCAST DOMAIN
Advantages of Repeaters and Hubs
 Can extend a network’s total distance
 Do not seriously affect network performance
 Certain repeaters can connect networks using distinct physical media
Disadvantages of Repeaters and Hubs
 Inability to reduce network traffic
 Incapable of network segmentation
 Inability to connect networks with different data frame type
Wireless Access
Points
 Provide cell-based areas where wireless clients such as laptops and handheld devices can
connect to the network by associating with the access point
 In most respects, may function exactly like a hub
 Operates at the Physical and Data Link layers of the OSI model
Wireless Standards and Organizations
Wireless Network Components
1. Ad Hoc Mode 2. Infrastructure Mode
 Wireless clients can connect and  Wireless clients attach wirelessly to
communicate directly with each an access point
other  Involves the access point wired
 There is no access point back into a switch
Wireless Network Components
3. Basic Service Set (BSS) 4. Extended Service Set (ESS)
 When a single access point  Involve multiple access points
is available in connected to various switches
infrastructure in the network
mode  Allows users to roam around the
building and remain connected to
the WLAN as well as the LAN
and WAN
Wireless Connectivity
 Access points typically broadcast their network
name
 The Service Set Identifier (SSID) is the
network name
 When wireless clients are powered on, they
begin
scanning the airspace for available access
points
 They detect the broadcasted SSID of the
various access points in the area
 Attempt to associate with the one that
has the
highest signal level and the lowest error
rate
Wireless Connectivity
 If the system is open, the client is accepted by
the
access point and begins communications
 When SSID is not broadcasted
• Wireless clients must already be
configured with the correct SSID
 The client will send out a probe request
with:
• Configured SSID
• Access point with that SSID configured
will allow the client to associate
Wireless Security Measures
 While security is always necessary in WLANs due to
the broadcast nature of the medium
• These devices are not designed to handle the
most complex and highest levels of security
 The most important reason to implement security on
your WLAN at home
• Others in your neighborhood do not use
your bandwidth for free
 Workspace situations call for security that not
only
requires the client device to authenticate
• But that also prompts the device user to
enter a username and password
 802.1x is used at the physical layer to block
ports
 The Extensible Authentication Protocol (EAP)
is used at
layer 2 to transfer the authentication frames
Wireless Security Protocols
Advantages/Disadvantages of WAPs
ADVANTAGES
• Provide the ability to work anywhere within range of your access points
• Extends the range of your network without running additional wires

DISADVANTAGES
 Introduces serious security concerns
 802.11 provides much less bandwidth than wired devices
 Many situations exist where 802.11 will not function well due to serious
interference from various sources
Bridge
sOperate at the Data Link layer of the OSI model
 Filter traffic between network segments by examining the destination MAC address
• Based on the destination MAC address, the bridge either forwards or discards
the frame
 Reduce network traffic by keeping local traffic on the local segment
Transparent Bridges
• Also called learning bridges
• Because they build a table of
MAC addresses as they
receive frames
• They “learn” which addresses are on which
segments
• The bridge uses the source MAC
addresses to determine which addresses
are on which segments
• By determining a frame’s origin,
the bridge knows where to send
frame in the future
• Ethernet networks mainly use
transparent bridges
Source Routing
Bridges
• Rely on the source of the frame transmission to provide the routing information
• The source computer determines the best path by sending out explorer frames

• The source includes the routing information returned by its explorer frames in the frame sent
across the network
• The bridge uses this information to build its table
Translation
Bridges

• Can connect networks with different


architectures, such as Ethernet and Token
Ring
• These bridges appear as:
• Transparent bridges to an Ethernet host
• Source-routing bridges to a Token Ring
host
Advantages of Bridges
 Can extend a network by acting as a repeater
 Can reduce network traffic on a segment by subdividing network communications

 Increase the available bandwidth to individual nodes because fewer nodes share a
collision domain
 Reduce collisions
 Some bridges connect networks using different media types and architectures
Disadvantages of Bridges

• Slower than repeaters and hubs


• Extra processing by viewing MAC addresses
• Forward broadcast frames indiscriminately, so they do not filter broadcast traffic
• More expensive than repeaters and hubs

Broadcast storm
When two or more stations engage in the transmission of excessive broadcast
traffic
Switche
s
• Operate at the Data Link layer of the OSI
model
• Increase network performance by reducing
the number of frames transmitted to the
rest of the network
• Switch opens a virtual circuit between the
source and the destination
• Prevents communications between just two
computers from being broadcast to every
computer on the network or segment
Called microsegmentation
Switche
s
• When two machines have a virtual circuit
• They do not have to share the bandwidth
with any other computers
• Multiple virtual circuits can be in use at the
same time, each with its own full
bandwidth
Called “switched bandwidth”
• When machines must share a wire and
compete for available bandwidth with other
machines, they experience contention
Advantages of Bridges
 Switches increase available network bandwidth
 Switches reduce the workload on individual computers
 Switches increase network performance

 Networks that include switches experience fewer frame collisions because switches create collision
domains for each connection (a process called microsegmentation)
 Switches connect directly to workstations
Disadvantages of Bridges

• Switches are significantly more expensive than bridges


• Network connectivity problems can be difficult to trace through a switch
• Broadcast traffic may be troublesome
Routers
• Operate at the Network layer of the OSI
model
• Provide filtering and network traffic control
on LANs and WANs
• Can connect multiple segments and multiple
networks
• Similar to switches and bridges in that they
segment a network and filter traffic
• Routers use the logical address
Physical Address vs Logical
Address
MAC ADDRESS
• Found at the Data Link layer of the OSI model
• Used by bridges and switches to make forwarding decisions within a network
or
subnetwork

IP ADDRESS
• Logical address when TCP/IP is used on an internetwork
• Routers use the IP address to route packets to the correct network segment
Advantages of Routers
• Can connect different network architectures, such as Ethernet and Token Ring
• Can choose the best path across an internetwork using dynamic routing techniques
• Reduce network traffic by creating collision domains
• Reduce network traffic by creating broadcast domains
Disadvantages of Routers
• Routers work only with routable network protocols; most but not all protocols are routable
• Routers are more expensive than other devices

• Dynamic router communications (inter-router communication) cause additional network


overhead, which results in less bandwidth for user data
• Routers are slower than other devices because they must analyze a data
transmission from
the Physical through the Network layer
Gateway
s
• Usually a combination of hardware and
software
• Translates between different protocol suites

• Has the most negative effect on


network performance
• Packets must be rebuilt not just at the
lower levels but at the very upper levels
• So that actual data content can be
converted into a format the
destination can process
• Creates the most latency
Network Topologies
CONTENTS

● Objective
● Topology
● Types of
topologies
● Conclusion
● Reference
Objectives

● Different types of topologies;

● Their advantages & disadvantages

● How to choose an appropriate topologies


in different situations.
What is a Topology?
● “The way in which the connections
4
are made among
all the computers is called the topology of the
network”.

● Network topology specifically refers to the


physical layout of the network, specially the
location of the computers and how the cable is
run between them.

● The most common topologies are


 Bus
 Star
 Ring
 Mesh.
Bus Topology
5

● The bus topology is the simplest and


most common.

● It is often used when a network installation


is small, simple, or temporary.

● It is a Passive topology. This means that


computers on the bus only listen for data being
sent, they are not responsible for moving the data
from one computer to the next.
BUS Topology
6

Comerput Comerput Comerput

Comerput Comerput Comerput


Bus Topology
7

● Inan active topology network, the computers


regenerate signals and are responsible for
moving the data through the network.

● Ona bus network, all the computer are


connected to a single cable.

● When one computer sends a signal using the


cable, all the computers on the network receive
the information, but only one (Addressee) accepts
it. The rest disregard the message.
Advantages of Bus
8

● The bus is simple, reliable in very small


network, and easy to use.

● The bus requires the least amount of cable to


connect the computers together and is
therefore less expensive than other cabling
arrangements.

● Failure of one node does not affect the rest


of network.
Disadvantages of Bus
9

● Heavy network traffic can slow a


bus considerably.

● A break in the cable or lake of proper


termination can bring the network
down.

● It is difficult to troubleshoot a bus.


Appropriateness
10

● The network is small

● The network will not be frequently


reconfigured

● The least expensive solution is required

● The network is not expected to grow much


Star Topology
11

● In a star topology, each device has a


dedicated point to point link only to central
controller, usually called a hub/server/host.

● Each computer on a star network


communicates with a central hub that resends
the message appropriate computer (s)

● The hub can be active or passive.

● An active hub regenerate the electrical signal


and sends it to all the computers connected to it.
Star Topology
12

● This type of hub is often called a multi


port repeater.

● Active hub require electrical power to run.

●A passive hub, such as wiring panels, merely acts


as a connection point and does not amplify or
regenerate the signal.

●Passive hubs do not require electrical power to


run.
Star Topology
13

Server
Hub

Compuert

Compuert

Compuetr
Compuetr
Advantages of Star Topology
14

● It is easy to modify and add new computers to a


star network
● During adding/deleting a node network can
function normally.
● When the capacity of the central hub is exceeded, it
can be replaced with one that has a larger number
of ports to plug lines into.
● Provide for centralised monitoring and
management of the network.
● Single computer failure do not necessarily bring
down the whole star network.
Disadvantages of Star Topology
15

● If the central hub fails, the whole network fails


to operate.

● It cost more to cable a star network.

● Require dedicated server


Appropriateness
16

● It must be easy to add or remove


client computer.

● It must be easy to troubleshoot.

● The network is large.

● The network is expected to grow in


the future.
Ring Topology

• 17
● In a ring topology, each computer is connected directly to the
next computer in line, forming a circle of cable.

● It uses token to pass the information from one computer


to another.

● Every computer is connected to the next compute in the ring,


and each retransmit what it receives from the previous
computer.

● The message flow around the ring in one direction.

● Ring is an active topology.

 There is no termination because there is no end to the ring


Ring Topology
18

Compuetr

Compuetr
Compuetr

Compuetr Compuetr
Token Passing
• 19
● Token passing a method of sending data in a ring topology

● A small packet, called the token passed around the ring


to each computer in turn

● If a computer has information to send, it modifies the


token, adds address information and the data and sends
it down the ring.

● The information travels around the ring until it


either reaches its destination or returns to the
sender.

● A token can circle a ring 200 meters in diameter at


about 10,000 times a second.
Advantages of Ring Topology
20

● All the computers have equal access to


the network.

● Even with many users, network performance


is even

● Allows error checking, and acknowledgement.


Disadvantages of Ring Topology
21

● Failure of one computer can affect


the whole network.

● It is difficult to troubleshoot the


ring network.

● Adding or removing computers


disturbs the network.
Appropriateness
22

● The network must operate reasonably


under a heavy load

● A higher-speed network is required.

● The network will not be frequently


reconfigured.
Mesh Topology
23

● In a mesh topology, every devices has a


dedicated point to point link to every other
device.

● A fully connected mesh network therefore


has n(n-1)/2 physical channels to link n
devices.

● To accommodate that many links, every device


on the network must have n-1 input/output ports.
Mesh Topology
24

C om pu
te r

C om pu C om pu
te r te r

C om pu
C om pu te r
te r
Advantages of Mesh Topology
25

● Because
of the dedicated link, no traffic between
computers.

● Failure
of one node computer not affect rest of the
network.

● Becauseof the dedicated link privacy and security


are guaranteed

● Point to point links make fault identification and


fault isolation easy.
Disadvantages of Mesh Topology
26

● Due to the amount of cabling and number


of input output ports, it is expensive.

● Large space is require to run the cables.


Variations of the Major Topologies
27

● Hybrid Star

A star network can be extended by placing


another star hub where a computer might
otherwise go, allowing several more
computers or hubs to be connected to that
hub.
28
Variations of the Major Topologies
29

● Star Bus

 The star bus topology combine the bus and the star,
linking several star hubs together with bus trunks. If one
computer fails, the hub can detect the fault and
isolate the computer.

 If a hub fails, computers connected to it will not be


able to communicate, and the bus network will be
broken into two segments that can not reach each
other.
Star Bus
30

Hub Hub Hub

Com
reput Com
reput
Com
reput
Com
reput
Com
reput Com
reput
Com
reput

Com
reput

Com
reput Com
reput
Variations of the Major Topologies
31

●Hybrid Topologies

 Often a network combines several topologies as


subnet works linked together is a large topology.

 For instance one department of business may have


decided to use a bus topology while another department
has a ring.

 The two can be connected to each other a central


controller in a star topology

 When two or more topologies are connected together


it forms a hybrid topology
Hybrid star

32

Department of future studies University of kerala


IP Addressing and
Subnetting
IP Addressing
 An IP address is a 32-bit sequence of 1s and 0s.

• To make the IP address easier to use, the


address is usually written as four decimal
numbers separated by periods (dotted
decimal format).
IPV4 and IPV6
Decimal and Binary Conversion
IP V4 Addressing
Two Parts: Network and Host
 To define the network and host portions of an address, a
devices use a separate 32-bit pattern called a subnet mask
 The subnet mask does not actually contain the network or
host portion of an IPv4 address, it just says where to look
for network Part in a given IPv4 address
Bit-wise AND Operation

1 AND 1 = 1 AND 0 = 0 AND 1 = 0 AND 0 =


1 0 0 0
Reserved IP Addresses
1. Certain host addresses are reserved and cannot be assigned to devices
on a network.
2. An IP address that has binary 0s in all host bit positions is reserved for
the network address.
3. An IP address that has binary 1s in all host bit positions is reserved for
the broadcast address.
Network Address
Broadcast Address
Practice Problem
 You have the IP address
 176.89.21.201 Find the followings:
 i) the subnet mask,
 ii) network address
 iii) broadcast address
 iv) first host address and last host
 address of given IP.
v) Determine the no. of usable host
Public and Private IP
Addresses
 No two machines that connect to a public network can have the same IP
address because public IP addresses are global and standardized.
 Assigned by the Internet Assigned Numbers Authority (IANA).
 Private networks that are not connected to the Internet may use any
host addresses, as long as each host within the private network is
 unique.
Connecting a network using private addresses to the Internet requires
translation of the private addresses to public addresses using
Network Address Translation (NAT).
Connection between Private and
Public IP Address
Public and Private IP Addresses
(contd.)
 Private IP addresses can be intermixed with public IP addresses. This
will conserve the number of addresses used for internal connections.
Public Vs Private IP Addressess
Introduction to Subnetting
 To create a subnet address, a network administrator
borrows bits from the host field and designates them
as the subnet field.

IP
Address
Reasons for Subnetting
Large networks need to be segmented into smaller sub-
networks, creating smaller groups of devices and services
in order to:
 Control traffic by containing broadcast traffic within subnetwork
 Reduce overall network traffic and improve network performance
Subnetting - process of segmenting a network into multiple
smaller network spaces called subnetworks or Subnets.

Communication Between Subnets


 A router is necessary for devices on different networks and subnets to
communicate.
 Each router interface must have an IPv4 host address that belongs to
the network or subnet that the router interface is connected to.
 Devices on a network and subnet use the router interface attached to
their LAN as their default gateway.
Practice Problem
• You have the IP address 176.89.21.201, this network is

subnetted by 9 bits.
• Find the followings:

i) the subnet mask, network address, broadcast address, first host
 address and last host address of given IP.
ii) Determine the no. of subnet and no. of usable host per subnet.
 iii) Determine the available IP range of subnet number 126
iv) To which subnet and host number the following IP belong to:
176.89.201.101


Examining Prefix (Slash Notation)
Subnets in Use

Subnet 0
Network 192.168.1.0-127/25

Subnet 1
Network 192.168.1.128-255/25
Subnetting based on Host Requirements

There are two considerations when planning subnets:


 Number of Subnets required
 Number of Host addresses required
Formula to determine number of useable hosts
2^n-2
•2^n (where n is the number of host bits remaining) is used to
calculate the number of hosts
•-2 Subnetwork ID and broadcast address cannot be used on
each subnet
Magic Formulas
Number of Usable Subnets Number of Usable
Hosts/Subnet
2=n 1
20
2h-n – 2
21 = 2 28-0- 2 = 256 - 2 = 254
22
=4 28-1- 2 = 128 - 2 = 126
23 = 8 28-2- 2 = 64 - 2 = 62
28-3- 2 = 32 - 2 = 30

n = # borrowed bits
h = # bits available in host address
Example: Creating 8 Subnets
 Borrowing 3 bits to Create 8 Subnets. 23 = 8 subnets
Example: Creating 8 Subnets ( contd. )
Set Up Subnets

200.200.200.10

• What is the Subnet Mask?


• What are the Network Addresses?
• What is the Broadcast Domain 5 Subnets
• What IP Addresses are available?
Example – 1

128.16.32.13
• What is the Subnet Mask?
• What are the Network Addresses?
• What is the Broadcast Domain * Needs 500 Subnets
• What IP Addresses are available?
Example – 2

175.116.23.13/21
1. What is the Subnet Mask?
2. What are the Network Addresses?
3. What is the Broadcast Domain
4. What IP Addresses are available?
5. Subnet:
• At least 500 host/subnet
6. 175.116.200.15?
7. ?
8. ?
9. ?
10. ?
a) Switching (MAC Address Table)

• The MAC address table is where the switch stores information about the other
Ethernet interfaces to which it is connected on a network. The table enables the
switch to send outgoing data (Ethernet frames) on the specific port required to
reach its destination, instead of broadcasting the data on all ports (flooding).
Broadcasting, ARP

• ARP broadcasts a request packet to all the machines on the LAN and asks if any
of the machines are using that particular IP address. When a machine
recognizes the IP address as its own, it sends a reply so ARP can update the
cache for future reference and proceed with the communication.
b) VLAN - Trunk Port

• What Is a VLAN?
• A virtual local area network (VLAN) is a logical grouping of ports which is
independent of location. A single VLAN (and the nodes connected in a single
VLAN) will behave in the same way as if it was a separate Layer 3 network.
Trunk Port

• A trunk port is a specific type of port on a network switch that allows data to flow
across a network node for multiple virtual local area networks or VLANs. Think of
the trunk port as a “bundle” of individual branches or capillaries in a telecom
network connection.
Layer 2 switching

• Layer 2 switching (or Data Link layer switching) is the process of using devices’
MAC addresses to decide where to forward frames. Switches and bridges are used
for Layer 2 switching. They break up one large collision domain into multiple
smaller ones.
Spanning Tree Protocol
• Spanning Tree Protocol (STP) is a Layer 2 network protocol used to prevent
looping within a network topology. STP was created to avoid the problems that
arise when computers exchange data on a local area network (LAN) that
contains redundant paths.
Layer 3 Network (L3 Network)

• Layer 3 is the network layer and its protocol is the Internet Protocol or IP.
Devices in an IP network are identified by an IP address, which can be
dynamically assigned and may change over time.
a) Routing

• Routing is the process of path selection in any network. A computer network is


made of many machines, called nodes, and paths or links that connect those
nodes. Communication between two nodes in an interconnected network can
take place through many different paths.
Routing Table

• A routing table, or routing information base (RIB), is a data table stored in a


router or a network host that lists the routes to particular network destinations,
and in some cases, metrics (distances) associated with those routes.
Forwarding table

• A forwarding table, on the other hand, is usually a machine-coded internal table


that contains the routes actually used by the device to reach destinations. In most
cases, the routing table holds more information than is distilled into the forwarding
table.
Static Routing

• Static routing is a form of routing that occurs when a router uses a manually-
configured routing entry, rather than information from dynamic routing traffic.
Dynamic Routing

• Dynamic routing is a mechanism through which routing information is


exchanged between routers to determine the optimal path between network
devices. A routing protocol is used to identify and announce network paths.
Router metrics

• Router metrics are configuration values used by a router to make routing


decisions. A metric is typically one of many fields in a routing table. Router
metrics help the router choose the best route among multiple feasible routes to a
destination. The route will go in the direction of the gateway with the lowest
metric.
Administrative distance

• Administrative distance is the first criterion that a router uses to determine


which routing protocol to use if two protocols provide route information for the
same destination. Administrative distance is a measure of the trustworthiness of
the source of the routing information.
Routing Protocol

• A routing protocol specifies how routers communicate with each other to distribute
information that enables them to select paths between nodes on a computer
network.
Distance Vector

• The term distance vector refers to the fact that the protocol manipulates vectors
(arrays) of distances to other nodes in the network. The distance vector
algorithm was the original ARPANET routing algorithm and was implemented
more widely in local area networks with the Routing Information Protocol
(RIP).
Link state protocol

• Link state protocols use characteristics of the route such as speed and cost as well
as current congestion to determine the best path, which is typically computed by
the Dijkstra algorithm. Link state routers are updated from all the routers in the
entire network by passing information from router to nearest router.
Routing Information Protocol

• Routing Information Protocol (RIP) is a distance-vector routing protocol used


to determine the best path for data to travel through a network.
Open Shortest Path First (OSPF)

• Open Shortest Path First (OSPF) is an IP routing protocol that uses a


mathematical algorithm to calculate the most efficient path to direct traffic on
IP networks.
IP (Internet Protocol)

• The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing
packets of data so that they can travel across networks and arrive at the correct
destination. Data traversing the Internet is divided into smaller pieces, called
packets. IP information is attached to each packet, and this information helps
routers to send packets to the right place. Every device or domain that connects to
the Internet is assigned an IP address, and as packets are directed to the IP address
attached to them, data arrives where it is needed.
What is Tunnel

• Tunneling is the process by which VPN packets reach their intended destination,
which is typically a private network. Many VPNs use the IPsec protocol suite.
IPsec is a group of protocols that run directly on top of IP at the network layer.
GRE Tunnel

• Generic Routing Encapsulation, or GRE, is a protocol for encapsulating data


packets that use one routing protocol inside the packets of another protocol.
"Encapsulating" means wrapping one data packet within another data packet, like
putting a box inside another box. GRE is one way to set up a direct point-to-point
connection across a network, for the purpose of simplifying connections between
separate networks. It works with a variety of network layer protocols.
Virtual Private Network

• A VPN, which stands for virtual private network, establishes a digital


connection between your computer and a remote server owned by a VPN
provider, creating a point-to-point tunnel that encrypts your personal data,
masks your IP address, and lets you sidestep website blocks and firewalls on the
internet.
IPsec-VPN

• In computing, Internet Protocol Security is a secure network protocol suite that


authenticates and encrypts packets of data to provide secure encrypted
communication between two computers over an Internet Protocol network. It is
used in virtual private networks.
SSL-VPN

• A secure sockets layer VPN (SSL VPN) enables individual users to access an
organization's network, client-server applications, and internal network utilities
and directories without the need for specialized software.
Part 1: Introduction to Networking
What is a Network?
Why Networking?
Transmission Media
LAN, WAN, MAN, PAN
Network Topologies
• Bus, Star, Ring, Mesh
Part 2: Switching
Introduction to Switches
Advantages and Disadvantages of
Switches
Switch Operations
Wireless Access Points
Huawei Switch Configuration
• <Quidway> system-view
• [Quidway] sysname Switch
• [Switch] vlan batch 10 20 30
• [Switch] interface GigabitEthernet 0/0/1
• [Switch-GigabitEthernet0/0/1] port link-
type access
• [Switch-GigabitEthernet0/0/1] port default
vlan 10
• [Switch-GigabitEthernet0/0/1] quit
• [Switch] interface GigabitEthernet 0/0/2
Part 3: VLANs
What is a VLAN?
Benefits of VLANs
VLAN Configuration
Huawei VLAN Configuration
• <Quidway> system-view
• [Quidway] sysname VLAN_Switch
• [VLAN_Switch] vlan batch 10 20 30
• [VLAN_Switch] interface GigabitEthernet
0/0/1
• [VLAN_Switch-GigabitEthernet0/0/1] port
link-type access
• [VLAN_Switch-GigabitEthernet0/0/1] port
default vlan 10
• [VLAN_Switch-GigabitEthernet0/0/1] quit
Part 4: Routing
Introduction to Routers
Advantages and Disadvantages of
Routers
Router Operations
Basic Routing Configuration
Huawei Router Configuration
• <Huawei> system-view
• [Huawei] sysname Router
• [Router] interface GigabitEthernet 0/0/0
• [Router-GigabitEthernet0/0/0] ip address
192.168.1.1 255.255.255.0
• [Router-GigabitEthernet0/0/0] quit
• [Router] interface GigabitEthernet 0/0/1
• [Router-GigabitEthernet0/0/1] ip address
10.0.0.1 255.255.255.0
• [Router-GigabitEthernet0/0/1] quit

You might also like