Uploaded by 4th

NETWORKING

advertisement
●
Intranet is a term used to refer to a private connection of LANs and WANs that belongs
to an organization. An intranet is designed to be accessible only by the organization's
members, employees, or others with authorization.
●
Powerline networking adds the ability to connect a device to the network using an
adapter wherever there is an electrical outlet. Uses existing electrical wiring to send
data. It does not replace physical cabling, but can add functionality in places where
wireless access points cannot be used or cannot reach devices.
●
Network security includes protecting the confidentiality of data that is on the network. In
this case, because confidential data has been made available to unauthorized users.
●
DSL - is always on, high bandwidth, connection that runs over telephone lines.
●
CABLE - uses the same coaxial cable that carries television signals into homes to
provide internet access.
●
Dialup - telephone is much slower than DSL or cable, but is the least expensive option
for users because it can use any telephone line and a simple modem.
●
Satellite - requires a clear line of sight and is affected by trees and other obstructions.
●
Criteria for choosing a network medium:
●
○
Distance
○
Environment
○
Amount of data
○
Speed
○
Cost of the cable/medium
Video conferencing and voice calls - utilizes real time audio and video communications.
Examples of data traffic that cannot buffer.
○
QoS - will ensure an uninterrupted user experience.
●
Minimum requirements for home networks - setting up a firewall, antiviruses, etc.
●
Passwords - can be used to restrict access to the VTY and console interfaces.
●
Layer 2 switch - there is a switch virtual interface (SVI) that provides a means for
remotely managing the device.
●
RAM - stores data that is used by the device to support network operations. The running
configuration is stored in RAM. This memory is considered volatile memory because
data is lost during a power cycle.
●
Flash Memory - a type of nonvolatile memory that erases data in units called blocks and
rewrites data at the byte level.
●
SSH - encrypted
●
Telnet - plaintext
●
SSH and Telnet - used to connect devices over the network, both are used in-band.
●
PuTTY and Terra Term - can be used to make both SSH AND Telnet connections.
●
VLANs - a logical overlay network that groups together a subset of devices that share a
physical LAN, isolating the traffic for each group.
●
Show ip interface brief - command used to display a brief synopsis of the condition of the
device interfaces.
●
Ipconfig command - used to verify TCP/IP properties on a host.
●
Ping - command used to verify layer 3 connectivity
●
Traceroute command - is used to trace the network path of packets from source to
destination
●
Flow control - allows for this by ensuring that data is not sent too fast.
●
EIA - organization standard related to electrical wiring, connectors, and the 19 inch racks
used to mount networking equipment.
●
IPv4 address - uniquely identifies an end device on the network
●
Subnet mask - determines the network address portion and host portion for an IPv4
address
●
Default gateway - the ip address of the router interface used for communicating with
hosts in another network.
●
DNS server - the IP address of the Domain Name System server.
●
DHCP server - not configured manually on end devices. It will be provided by a DHCP
server when an end device requests an IP address.
●
Response timeout - if a computer makes a request and does not hear a response within
an amount of time, the computer assumes that no answer is coming and reacts
accordingly.
●
HTTP - governs the way that a web server and client interact
●
TCP - manages individual conversations between web servers and clients
●
IP - is responsible for delivery across the best path to the destination
●
Ethernet - takes the packet from IP and formats it for transmission
●
MAC address - physical address in the data link layer
●
IP address - logical address
●
Network protocols - are implemented in hardware, or software, or both. They interact
with each other within different layers of a protocol network.
●
Protocol Types
○ Network Communications Protocols - enables one or more devices to
communicate over one or more networks. Examples of protocols include: IP,
Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and
many more.
○ Network Security Protocols - provides authentication, data integrity, and
encryption. Examples include Secure Shell (SSH), Secure Sockets Layer (SSL),
and Transport Layer Security (TLS).
○ Routing Protocols - enables routers to exchange routing and path information.
Examples include Open Shortest Path First (OSPF) and Border Gateway
Protocol (BGP).
○ Service Discovery Protocols - used for the automatic detection of devices or
services. Examples of service discovery protocols include Dynamic Host
Configuration Protocol (DHCP) which discovers services for IP address
allocation, and Domain Name System (DNS) which is used to perform name-toIP address translation.
●
Protocol Functions
○ Addressing - This identifies the sender and the receiver of the message.
Addressing protocols include Ethernet, IPv4, IPv6.
○ Reliability - Provides guaranteed delivery mechanisms in case messages are lost
or corrupted. TCP provides this function.
○ Flow control - maintains an efficient rate of flow of data between two
communicating devices. TCP provides flow control services.
○ Sequencing - Uniquely labels each segment of data. This is useful if the data
segments are lost, delayed or received out-of-order. TCP provides sequencing
services.
○ Error detection - used to detect if data became corrupted during transmission.
○ Application interface - This function contains information used for process-toprocess communications between network applications. For example, when
accessing a web page, HTTP or HTTPS protocols are used to communicate
between the client and server web processes.
Internet Standards
Electronic and Communications Standards
OSI Model Layer
TCP/IP Model Layer
●
An IP packet contains:
●
●
○ Source IP address
○ Destination IP address
Bandwidth - capacity of a medium to carry data.
Bandwidth quality is determined by:
● Latency - amount of time for data to travel from one given point to another.
● Throughput - the measure of transfer of bits across the media over a period of
time.
○ Influenced by: amount of traffic, type of traffic, latency caused by
intermediary network devices.
● Goodput - measure of usable data transferred over a period of time.
●
Copper cabling:
○ Most common type of cabling
○ Easy to install
○ Inexpensive
○ Limited by distance and signal interference
●
Types of copper cabling:
○ Unshielded Twisted-Pair (UTP)
■ Most common
■ Terminated with RJ-45 connectors
■ Consists of 4 pairs of color coded wires
■ Twisted pairs protect from signal interference (EMI, RFI, Crosstalk)
○ Shielded Twisted-Pair (STP)
■ More expensive than UTP
■ Better protection against signal interference using shielding techniques
and special connectors
■ Braided or foil shield
○ Coaxial Cable
■ Copper conductor to transmit signals
■ Plastic insulation
■ Copper braid/Metallic foil shield
■ Attaches antennas to wireless devices
■ Can be bundles with fiber-optic wiring for two-way transmission
■ Terminates with BNC, N type and F type connectors
T568A and T568B Standards
Cable Types and Standards
●
IEEE - oversees wireless lan standards
MODULE 4 (canvas)
●
An Ethernet mac address consists of 48-bit binary value expressed using 12
hexadecimal values
●
●
●
●
●
●
Ethernet mac address is 6 bytes in length
All MAC addresses are unique to the ethernet device/interface.
All vendors that sell ethernet devices must register with the IEEE to obtain a unique 6
code identifier called the OUI.
Address Resolution Protocol (ARP) - determines the destination mac address
associated with an IPv6 address known as Neighbor Discovery (ND)
Broadcast MAC address - FF-FF-FF-FF-FF-FF
Ethernet is defined by data link layer and physical layer protocols
Ethernet and the OSI Model
●
●
MAC sublayer - responsible for data encapsulation and accessing media. Provides data
link layer addressing and is integrated with various physical layer technologies.
Examples of this sublayer are 802.3. 802.11, or 802.15
LLC sublayer - communicates between the networking software at the upper layers and
the device hardware at the lower layers. It places information in the frame that identifies
which network layer protocol is being used for the frame. This allows multiple Layer 3
protocols such as IPv4 and IPv6 to use the same network interface and media.
●
IEEE 802.3 data encapsulation includes the following:
○ Ethernet frame - This is the internal structure of the Ethernet frame.
○ Ethernet Addressing - The Ethernet frame includes both a source and destination
MAC address to deliver the Ethernet frame from Ethernet NIC to Ethernet NIC on
the same LAN.
○ Ethernet Error detection - The Ethernet frame includes a frame check sequence
(FCS) trailer used for error detection.
Ethernet Frame
●
●
Preamble and Start Frame Delimiter Fields
○ The Preamble (7 bytes) and Start Frame Delimiter or SFD (1 byte) fields are
used for synchronization between the sending and receiving devices.
○ These first eight bytes of the frame are used to get the attention of the receiving
nodes.
○ Essentially, the first few bytes tell the receivers to prepare to receive a new
frame.
Destination MAC Address Field
○ This 6-byte field is the identifier for the intended recipient.
○
●
●
●
●
●
●
●
This address is used by Layer 2 to assist devices in determining if a frame is
addressed to them.
○ The address in the frame is compared to the MAC addresses in devices until
there is a match.
○ Can be a unicast, multicast, or broadcast address.
Source MAC Address Field
○ Identifies the originating NIC or interface of the frame.
Type / Length
○ Identifies the upper layer protocol encapsulated in the Ethernet frame.
○ Common values are in hexadecimal, 0x800 for IPv4, 0x86DD for IPv6 and 0x806
for ARP
○ You may also see this field referred to as EtherType.
Data Field
○ This field contains the encapsulated data from a higher layer, which is a generic
IPv4 packet.
○ All frames must be at least 64 bytes long.
○ If a small packet is encapsulated, additional bits called a pad are used to
increase the size of the frame to this minimum size.
Frame CHeck Sequence
○ The FCS field is used to detect errors in a frame.
○ It uses a cyclic redundancy check (CRC)
○ The sending device includes the results of a CRC in the FCS field of the frame.
○ The receiving device receives the frame and generates a CRC to look for errors.
IPv4 addresses - represented in decimal and binary
IPv6 addresses - represented in hexadecimal
Ethernet MAC address
○ is a 48-bit address expressed using 12 hexadecimal digits.
○ All vendors that sell Ethernet devices must register with the IEEE to obtain a
unique 6 hexadecimal code called the Organizationally Unique Identifier (OUI)
○ A mac address must:
■ Use its assigned OUI as the first 6 hexadecimal digits
■ Assign a unique value in the last 6 hexadecimal digits
Ethernet MAC address
Types of switching
Variants of cut-through switching:
Memory buffering methods
●
Two of the most basic settings on a switch
○ bandwidth/speed
○ Duplex
■ Duplex and bandwidth settings should match between devices
●
●
Full duplex - both ends of the connection can send and receive simultaneously
Half duplex - only one end of the connection can send at a time
Example of duplex mismatch
●
Auto-MDIX - a feature that detects ethernet cable type
●
Minimum and Maximum size of an ethernet frame
○ 1518 bytes (Maximum)
○ 64 bytes (Minimum)
Network Layer Protocols
●
Addressing end devices
●
●
●
○ Must be configured with a unique IP address for identification on the network
Encapsulation
○ The network layer encapsulates the protocol data unit (PDU) from the transport
layer into a packet.
○ Adds IP header information
■ Source address
■ Destination address
○ Process performed by the source of the IP packet
Routing
○ Service to direct the packets to a destination host on another network.
○ To travel to other networks, the packet must be processed by a router.
○ A packet may cross many routers before reaching the destination
○ Each router crossed before reaching the destination is called a “hop”
De-encapsulation
○ When the packet arrives at the network layer of the destination host, the host
checks the IP header of the packet. If the destination IP address within the
header matches its own IP address, the IP header is removed from the packet.
After the packet is de-encapsulated by the network layer, the resulting Layer 4
PDU is passed up to the appropriate service at the transport layer. The deencapsulation process is performed by the destination host of the IP packet.\
Basic characteristics of IP:
Fields in the IPv4 packet header
Limitations of IPv4
Improvements of IPv6
Fields that determine packet lifespan
● IPv4
○ Time To Live (TTL)
● IPv6
○ Hop Limit
● Both are the same, but use different names. The TTL/Hop Limit is reduced by one for
each time a packet traverses a layer 3 device (switch or router)
●
IPv4 and IPv6 address space comparison
○ IPv4 - 4 billion addresses
○
IPv6 - 340 undecillion addresses
IPv6 packet header
A host can send packets to:
Whether a packet is destined for a local host or a remote host is determined by the source end
device. The source end device determines whether the destination IP address is on the same
network that the source device itself is on. The method of determination varies by IP version:
●
Default gateway - is the network device (router or layer 3 switch) that can route traffic to
other networks. If a network is a room, the default gateway is a door.
A router can learn about remote networks in one of two ways:
● Manually (Static routing) - remote networks are manually entered into the route table
using static routes.
○ Route entries that are manually configured
○ The static route includes the remote network address and the IP address of the
next hop router.
○ If there is a change in the network topology, the static route is not automatically
updated and must be manually reconfigured.
○ Static routes are appropriate for small networks with few or no redundant links.
●
Dynamically (Dynamic routing) - automatically learned using a dynamic routing protocol
○ Automatically share routing information with other routers
○ Compensates for any changes in the network topology.
○ Protocols include OSPF, and Enhanced Interior Gateway Routing Protocol
(EIGRP).
○ More
Routing table acronyms via Show IP route:
1.
2.
3.
4.
5.
6.
7.
8.
9.
LLC - Logical Link Control
MAC - Media Access Control
IP - Internet Protocol
OSI - Open Systems Interconnection
FCS - Frame Check Sequence
ARP - Address Resolution Protocol
PDU - Protocol Data Unit
TCP - Transmission Control Protocol
SLAAC - Stateless Address Auto-Configuration
10. AUTO-MDIX - Media Dependent Interface
11. MTU - Maximum Transmission Unit
12. CSMA/CD - Carrier Sense Multiple Access/Collision Detection
13. CRC - Cyclic Redundancy Check
14. OUI - Organizationally Unique Identifier
15. TTL - Time To Live
16. CAM - Content Addressable Memory
Download