0% found this document useful (0 votes)
19 views27 pages

NDC ch1

The document provides an overview of network device configuration, detailing the OSI model layers and their functions, including physical, data link, network, transport, session, presentation, and application layers. It also discusses various network devices such as hubs, switches, routers, and the importance of configuration management, VLANs, and VPNs. Additionally, it covers specific protocols and their roles in network communication and management.

Uploaded by

momkoo440
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views27 pages

NDC ch1

The document provides an overview of network device configuration, detailing the OSI model layers and their functions, including physical, data link, network, transport, session, presentation, and application layers. It also discusses various network devices such as hubs, switches, routers, and the importance of configuration management, VLANs, and VPNs. Additionally, it covers specific protocols and their roles in network communication and management.

Uploaded by

momkoo440
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Collage of Engineering and Technology

Department of Information Technology

Network Device and Configuration


_____________________________________
Chapter 1:
Device Configuration

By: Hirpa G. (MSc)


Febr, 2025
Outline
Configuration Wizard.
View VLANs by device and port.
Automatic Discovery and
Configuration Manager.
Wireless Mobility configuration
menu
Device Schedules
VPN Policy Manager
Element Manager.
CLI Configuration Manager.
1.1 Configuration Wizard
While the configuration wizard is an easy way to display complex
configuration options, it does rely on the user having a basic
understanding of the software component.
Network Devices
Computer networking devices are units that mediate data in a
computer network and are also called network equipment.
OSI Model
The OSI Model (Open Systems Interconnection Model) is a conceptual
framework used to describe the functions of a networking system.
Advantages:
• Network communication is broken into smaller, more manageable
parts.
• Allows different types of network hardware and software to
communicate with each other.
• All layers are independent and changes does not affect other layers.
• Easier to understand network communication.
Why layered communication?
• To reduce complexity of communication task
OSI model
LAYER 1: PHYSICAL LAYER
The lowest layer of the OSI Model is concerned
with electrically or optically transmitting raw
unstructured data bits across the network from the
physical layer of the sending device to the physical
layer of the receiving device.
It can include specifications such as voltages, pin
layout, cabling, and radio frequencies. At the
physical layer, one might find “physical” resources
such as network hubs, cabling, repeaters, network
adapters or modems.
• Define physical characteristics of network. E.g. wires, connector,
voltages, data rates, Asynchronous, Synchronous Transmission.
• Handles bit stream or binary transmission.
• Used to maintain, activate and deactivate physical link.
• For Receiver it reassembles bits and send to upper layer for
frames.
LAYER 2: DATA LINK
At the data link layer, directly connected nodes are used to perform
node-to-node data transfer where data is packaged into frames. The
data link layer also corrects errors that may have occurred at the
physical layer.
The data link layer encompasses two sub-layers of its own. The first,
media access control (MAC), provides flow control and multiplexing
for device transmissions over a network. The second, the logical link
control (LLC), provides flow and error control over the physical
medium as well as identifies line protocols
Sub layers of Layer 2
√ Logical link layer (LLC)
Used for communication with upper layers
Error correction
Flow control

√ Media Access Control (MAC)


Access to physical medium
Header and trailer
Trailer: The trailer typically includes a frame check sequence
LAYER 3: NETWORK
The network layer is responsible for receiving frames from the data
link layer, and delivering them to their intended destinations among
based on the addresses contained inside the frame.
The network layer finds the destination by using logical addresses,
such as IP (internet protocol).
At this layer, routers are a crucial component used to quite literally
route information where it needs to go between networks.
• Defines source to destination delivery of packets across NWs.
• Defines logical addressing and best path determination.
• Treat each packet independently
• Defines how routing works and how routes are learned
• Converts frames to packets
• Routed protocols ( encapsulate data into packets) and Routing
protocols (create routing tables) work on this layer
• Examples of Routed protocols are: IP, IPX, AppleTalk and Routing
protocols are OSPF, IGRP/EIGRP, RIP, BGP
• Routers operate at Layer 3.
LAYER 4: TRANSPORT
The transport layer manages the delivery and error checking of data
packets. It regulates the size, sequencing, and ultimately the
transfer of data between systems and hosts. One of the most
common examples of the transport layer is TCP or the Transmission
Control Protocol.
 It regulates information flow to ensure process-to- process
connectivity between host applications reliably and accurately
 Adds service point address or Port address
 Segmentation & Re-assembly: SEGMENTS data from sending
node and reassembles data on receiving node
 Flow control / Error control at Source to destination level
 Connection oriented transport service ensures that data is
delivered error free, in sequence with no losses or duplications
 Establishes, maintains and terminates virtual circuits
 Connection oriented / Connectionless: (TCP/UDP)
LAYER 5: SESSION
The session layer controls the conversations between different
computers. A session or connection between machines is set up and
managed at layer 5. Session layer services also include
authentication and reconnections.
 The session layer defines how to start, control and end
conversations (called sessions) between applications
 Establishes dialog control between the two computers in a
session, regulating which side transmits, plus when and how long
it transmits (Full duplex)
 Synchronization: Allows processes to add check points. E.g.
Insert check point at every 100 page of 2000 page file to ensure
that each 100-page unit is received & acknowledged
 Transmits Data
LAYER 6: PRESENTATION
The presentation layer formats or translates data for the application
layer based on the syntax or semantics that the application accepts.
Because of this, it at times also called the syntax layer. This layer
can also handle the encryption and decryption required by the
application layer.
 Presentation layer is concerned with the syntax and semantics of
the information exchanged between two systems.
 This layer is primarily responsible for the translation, encryption
and compression of data.
 Defines coding and conversion functions
 This layer also manages security issues by providing services
such as data encryption and data compression
 Examples of these formats and schemes are: MPEG, QuickTime,
ASCII, EBCDIC, GIF, TIFF, JPEG
LAYER 7: APPLICATION
At this layer, both the end user and the application layer interact
directly with the software application. This layer sees network
services provided to end-user applications such as a web browser or
Office 365. The application layer identifies communication partners,
resource availability, and synchronizes communication.
 The application layer is responsible for providing services to the
user
 Closest to the user and provides user interface
 Establishes the availability of intended communication partners
 Examples of Application layer protocols are: Telnet, SMTP, FTP,
SNMP
Data Encapsulation
Data Encapsulation is the process of adding a
header to wrap/envelop the data that flows down
the OSI model. The 5 Steps of Data
Encapsulation are:
The Application, Presentation and Session layers create
DATA from users’ input.
The Transport layer converts the DATA to SEGMENTS
The NW layer converts the Segments to Packets
(datagram)
The Data Link layer converts the PACKETS to FRAMES
The Physical layer converts the FRAMES to BITS
Some of application layer protocols and their
functions
Simple Mail Transfer Protocol (SMTP)
 Governs the transmission of mail messages and attachments
 SMTP is used in the case of outgoing messages
 More powerful protocols such as POP3 and IMAP4 are needed
and available to manage incoming messages
 POP3(Post Office Protocol version 3) is the older protocol
 IMAP4(Internet Mail Access Protocol version 4) is the more
advanced protocol
Telnet:
It allows a user on a remote client machine, called the Telnet client, to
access the resources of another machine, the Telnet server, in order to
access a command-line interface.
File Transfer Protocol (FTP)
 File Transfer Protocol (FTP) actually lets us transfer files, and it
can accomplish this between any two machines using it.
 FTP’s functions are limited to listing and manipulating
directories, typing file contents, and copying files between hosts
Cont’d
Simple Network Management Protocol (SNMP)
Simple Network Management Protocol (SNMP) collects and
manipulates valuable network information.
Hypertext Transfer Protocol (HTTP)
It’s used to manage communications between web browsers and web
servers and opens the right resource when you click a link, wherever
that resource may actually reside.
Hypertext Transfer Protocol Secure (HTTPS)
Hypertext Transfer Protocol Secure (HTTPS) is also known as Secure
Hypertext Transfer Protocol. It uses Secure Sockets Layer (SSL).
Domain Name Service (DNS)
Domain Name Service (DNS)resolves hostnames—specifically, Internet
names, such as www.wcu.edu.et
Dynamic Host Configuration Protocol (DHCP)
 Dynamic Host Configuration Protocol (DHCP)assigns IP
addresses to hosts dynamically.
 It allows for easier administration and works well in small to very
large network environments.
Some of Transport layer protocols and
their functions
TCP (Transmission Control Protocol)
 TCP: takes large blocks of information from an application and
breaks them into segments.
 It is Connection oriented means that a virtual connection is
established before any user data is transferred. (handshake)
User Datagram Protocol (UDP)
 UDP does not sequence the segments and does not care about
the order in which the segments arrive at the destination.
 UDP just sends the segments off and forgets about them.
Cont’d
Network device
Hub
 Hubs connect computers together in a star topology network.
 They increase the chances for collisions.
 Hubs operate in the physical layer.
Bridge
In telecommunication networks, a bridge is a product that connects a
local area network (LAN) to another local area network that uses the
same protocol.
Repeater
A repeater is an electronic device that receives a signal and
retransmits it at a higher level and/or higher power, or onto the other
side of an obstruction, so that the signal can cover longer distances
without degradation
Modem
Modem (from modulator-demodulator) is a device that turns the digital
1s and 0s of a personal computer into sounds that can be transmitted
over the telephone lines
NIC (Network Interface Card)
Cont’d
Switch
• A switch when compared to bridge has multiple ports. Switches can
perform error checking before forwarding data
• Switches can support both layer 2 (based on MAC Address) and
layer 3 (Based on IP address) depending on the type of switch
Routers
• A router, like a switch forwards packets based on address.
• Usually, routers use the IP address to forward packets, which allows
the network to go across different protocols.
• Routers forward packets based on software while a switch (Layer 3
for example) forwards using hardware called ASIC (Application
Specific Integrated Circuits).
• Routers support different WAN technologies but switches do not.
• Besides, wireless routers have access point built in.
• The most common home use for routers is to share a broadband
internet connection.
• As the router has a public IP address which is shared with the
network, when data comes through the router, it is forwarded to the
correct computer
1.2. View VLANs by Device
and Port
VLANs are assigned to individual switch ports.
Ports can be statically assigned to a single VLAN or
dynamically assigned to a single VLAN.
All ports are assigned to VLAN 1 by default
Ports are active only if they are assigned to VLANs
that exist on the switch.
Static port assignments are performed by the
administrator and do not change unless modified
by the administrator, whether the VLAN exists on
the switch or not.
Dynamic VLANs are assigned to a port based on
the MAC address of the device plugged into a port.
Dynamic VLAN configuration requires a VLAN
Membership Policy Server (VMPS) client, server,
Cont’d
1.3. Configuration Manager

Configuration management is a process closely


linked to change management, which is also called
configuration control.
Any system that needs to be controlled closely and
run with good reliability, maintainability and
performance benefits greatly from configuration
management
Configuration management can extend life, reduce
cost, reduce risk, and even correct defects
1.5. Device Schedules
In order to take a backup of your device
configurations, you need to first discover your
devices using Network Configuration Manager. The
tool also allows you to add devices in bulk.
Once the devices are discovered, you can proceed
to scheduling network backups.
In order to take a backup of your device
configurations, you need to first discover your
devices using Network Configuration Manager
1.6. VPN Policy Manager
A virtual private network (VPN) is a private data network
connection that makes use of the public telecommunications
infrastructure, maintaining privacy through the use of a
tunneling protocol and security procedures.
Using a virtual private network involves maintaining privacy
through the use of authorization, authentication, and
encryption controls that encrypt da ta before sending it
through the public network and decrypting it at the receiving
end.
Overview of how it Works
• Two connections – one is made to the Internet and the second
is made to the VPN.
• Datagrams – contains data, destination and source
information.
• Firewalls – VPNs allow authorized users to pass through the
firewalls.
• Protocols – protocols create the VPN tunnels.
Cont’d
VPN Gateway and Tunnels
A VPN gateway is a network device that provides encryption
and authentication service to a multitude of hosts that connect
to it. There are two types of endpoint VPN tunnels:
1. Computer to gateway
For remote access: generally set up for a remote user to
connect A corporate LAN
2. Gateway to Gateway
This is a typical enterprise-to-enterprise configuration. The two
gateways communicate with each other
1.7. Element Manager
Importance of Managing Network Devices
• Configuration Management
• Performance Management
• Fault Management
Common ways to analyze the configuration,
Performance and Faults on a Cisco Device
• CLI (Command Line Interface)
• SNMP (Simple Network Management Protocol)
• CiscoView
Using SNMP and CiscoView:
• A user can define a VTP domain,
• Configure devices as VTP servers, clients, or transparent
devices in the domain,
• Create VLANs within the domain,
• Assign ports to a VLAN, and view the ports assigned to a
Cont’d
Thank You

You might also like