Networking I

advertisement
Computer Networks I
By: Ing. Hector M Lugo-Cordero, MS
What is a network?
• Collection of computers interconnected to
share resources
• A network does not mean Internet access
• Exposes security issues
OSI Model Layers
•
•
•
•
•
•
•
Physical (repeaters/hubs): signals
Data Link (bridges/switches): frame
Network (routers/L3switches): packet
Transport: segment
Session
Presentation
Application: data
Signals
•
•
•
•
•
•
•
•
Duplex
Bandwidth
Throughput
Delay/Latency
Cyclic Redundancy Check
Manchester
Orthogonal Frequency Division Multiplexing
Spectrum Analyzer
Parameters
• Duplex: communication channel direction
– Half-duplex: communication can flow in one direction at a given
time
– Full-duplex: communication can flow in both directions at the
same time
• Bandwidth: theoretical capacity of the
communication channel
• Throughput: actual capacity of the communication
channel
• Delay/Latency: the time that takes the network to
deliver a packet from source to destination
CRC
• Detects the presence of errors so that a
retransmission can be asked for
• Ethernet uses a fixed polynomial for the
CRC computation known as CRC32
– x32 + x26 + x23 + x22 + x16 + x12 + x11 + x10 + x8
+ x7 + x5 + x4 + x2 + x + 1
Manchester
OFDM
Spectrum Analyzer
• Allows to study signals
– Frequency domain
– SNR measures
Physical Layer
• Signals are sent through the chosen
medium
• Fiber Optic
• Unshielded Twisted Pair (UTP)
• Wireless
• Hubs
Hubs
• Work the physical layer
• Built with pure hardware
• Amplify the signal and retransmit it to all
ports except the one that sent the data
• Expand collision domain and broadcast
domain
UTP Fabrication
• Straight cable: used to communicate
different devices
• Cross-over cable: used to communicate
devices of the same nature
– PC and Routers are the exception
• Rollover cable: used to communicate with
the devices using the console
UTP Fabrication
SRC
Straight
Cross-over
Rollover
1
1
3
8
2
2
6
7
3
3
1
6
4
4
4
5
5
5
5
4
6
6
2
3
7
7
7
2
8
8
8
1
Data Link Layer
• Translates bits to signals and schedules the
access to the medium
• Composed of two sub-layers
– Logical Link Control (LLC – IEEE 802.2)
– Medium Access Control (MAC)
• IEEE 802.3 – Ethernet
• IEEE 802.11 – Wireless
• IEEE 802.15 – Bluetooth
• Switches work at this layer with MAC address
MAC Addresses
• Identifies uniquely a node in the network
• This address should be private (unknown
to other users, but not nodes)
• 48 bit number
– MM:MM:MM:SS:SS:SS (hex)
• M is manufacturer’s id
• S is serial number
Switches
• Able to create virtual circuit
• Break collision domains but enlarge the
broadcast domains
• Have more intelligence than hubs
• Can create network segments for privacy
• Ports can be access or trunk
Virtual Local Area Networks (VLAN)
• Segmentation of the network
• Breaks broadcasts domains
• Needs a router for different vlan
communications
• Increase in security
Spanning Tree Protocol (STP)
• Creates a spanning tree of the switches
topology
• Breaks loops to prevent broadcast storms
• Should be always enabled
Switch Configuration (Cisco)
• Connect rollover cable from
serial in PC to console at
the switch
• Open hyper terminal
connection with 9600 baud,
data bits 8, parity none,
stop bits 1, flow control
none
• Tipically known as: 96008N1
Switch Configuration (Cisco)
• This steps erase everything to factory
defaults
• SW>enable #enter from user to privileged
• SW#show running-config
• delete vlan.dat
• erase startup-config
• reload
Switch Configuration (Cisco)
•
•
•
•
•
•
•
•
•
•
•
This steps configure the ports of the switch
SW#configure terminal
SW(config)#interface FastEthernet 0/0
SW(config-if)#switchport mode access
SW(config-if)#switchport access vlan 10
SW(config-if)#exit
#end goes to begin
SW(config)#interface range FastEthernet 0/0-15
SW(config-if)#switchport mode access
SW(config-if)#switchport access vlan 20
SW(config-if)#end
SW#
Switch Configuration (Cisco)
• This steps configure a trunk (multi vlans)
• SW(config-if)#switport mode trunk
• SW(config-if)#switport trunk allowed vlan
add 10
• SW(config-if)#switport trunk allowed vlan
add 20
Switch Configuration (Cisco)
• This steps configure port security
• SW(config-if)#switchport port-security
maximum 1
• SW(config-if)#switchport port-security
violation shutdown
• SW(config-if)#switchport port-security
mac-address 001f.453a.1234
Switch Configuration (Linksys)
File: /etc/config/network
#### VLAN configuration
config switch eth0
option vlan0 "0 1 2 3 5*"
option vlan1 "4 5"
Wireless Networking
• Channels allowed by the FCC (default 6)
• Authentication and association
– WEP
– WPA
• Add-Hoc vs Infrastructure
Infrastructure Networks
• Access networks are wired LAN with
access points
• Nodes connect to access points to access
the wired distribution system
• A bridge from IEEE802.11 to IEEE802.3 is
needed
Ad-Hoc Networks
•
•
•
•
•
Interconnected fully wireless
Multi-hop network
Nodes can either be client or server
Extend the range of normal WLAN
Can reach places were wires can’t
Setting a Wireless Access Network
• What you need
– Access point (IEEE802.11 to IEEE802.3 bridge)
– Wireless internet card
– The right technology
•
•
•
•
IEEE802.11a
IEEE802.11b
IEEE802.11g
IEEE802.11n
• Security
–
–
–
–
IEEE802.11i
WPA
No SSID broadcast
MAC filtering
Wireless Configuration (Linksys)
File: /etc/config/wireless
config wifi-device wl0
option type broadcom
option channel
'6'
option disabled
'0'
config wifi-iface
option device wl0
option network
'wlan'
option mode 'adhoc'
option ssid 'OLSR'
option encryption none
option hidden
'0'
Download