network_admin_data

advertisement
Summer Youth Program:
Computer/Network
Architecture and Security
Introduction to Networking
Objectives:
Understand the physical connection that has to
take place for a computer to connect to the
Internet.
Recognize the components that comprise the
computer.
Install and troubleshoot network interface cards
and/or modems.
Use basic testing procedures to test the Internet
connection.
Demonstrate a basic understanding of the use
of web browsers and plug-ins.
Internet Connection Requirements
Internet is the largest data network on earth
Consists of many large and small networks that are
interconnected Individual computers are the sources and
destinations of information through the Internet
Connection to the Internet can be broken down into three parts:
Physical connection
Logical connection
Applications
Computer Basics
Electronic Components
Transistor, Integrated circuit (IC), Resistor, Capacitor,
Connector, and Light emitting diode (LED)
PC Subsystems
Printed circuit board, CD-ROM drive, Central processing unit
(CPU), Floppy drive, Hard drive, Microprocessor, Motherboard,
Bus, Random-access memory (RAM), Read-only memory
(ROM), System unit, Expansion slot, Power supply,
Backplane components
Network interface card (NIC), Video card, Audio card, Parallel
port, Serial port, Mouse port, Power cord
Network Interface Card
A NIC, or LAN adapter, provides network
communication capabilities to and from
a PC
These considerations are important
in the selection of a NIC:
Protocols – Ethernet, Token Ring, or
FDDI
Types of media – Twisted-pair,
coaxial, wireless, or fiber-optic
Type of system bus – PCI or ISA
NIC’s & Modems
A modem, or modulator-demodulator,
has two main functions:
provides the computer with connectivity to
a telephone line
converts data from a digital signal to an analog
signal that is compatible with a standard phone line
A NIC provides a network interface for each host
Situations that require NIC installation include the following:
Installation of a NIC on a PC that does not already have one
Replacement of a malfunctioning or damaged NIC
Upgrade from a 10-Mbps NIC to a 10/100/1000-Mbps NIC
Change to a different type of NIC, such as wireless
Installation of a secondary, or backup, NIC for network security reasons
Internet Connections for Consumers
Requires use of a Modem
Dial-up – slow
Always on High Speed Connections
DSL – Verizon
Cable – Comcast, Charter, Road-Runner
TCP/IP
TCP/IP
The operating system tools must
be used to configure TCP/IP on
a workstation
Testing Connectivity with Ping
Ping is a basic program that verifies a particular IP address exists
and can accept requests.
Ping stands for Packet Internet or Inter-Network Groper.
How can ping be used?
ping 127.0.0.1 - loopback test. It verifies the operation of the
TCP/IP stack and NIC transmit/receive function.
ping host computer IP address - verifies the TCP/IP
address configuration for the local host and connectivity to
the host.
ping default-gateway IP address - verifies whether the
router that connects the local network to other networks can
be reached.
ping remote destination IP address - verifies connectivity
to a remote host.
Information & Testing
NIC MAC Address Verification
http://standards.ieee.org/regauth/oui/index.
shtml
Traceroute Site:
http://www.traceroute.org
Web Browsers and Plug-ins
A Web browser is software that interprets HTML, which is one of
the languages used to code Web page content.
Two of the most popular Web browsers are Internet Explorer
(IE), Netscape Communicator, and FireFox
Plug-ins are applications that work
with the browser to launch the programs
required to view special files:
Flash – Plays multimedia files created by Macromedia Flash
Quicktime – Plays video files created by Apple
Real Player – Plays audio files
IE vs. FireFox
FireFox and all other Mozilla-based products are
generally more secure than IE
Reasons:
It is not integrated with Windows, which helps
prevent viruses and hackers from causing
damage if they somehow manage to compromise
FireFox.
There is no support for VBScript and ActiveX, two
technologies which are the reasons for many IE
security holes.
No spyware/adware software can automatically
install in FireFox just by visiting a web site.
FireFox doesn't use Microsoft's Java VM, which
has a history of more flaws than other Java VMs.
You have complete control over cookies.
Data Networks Creation
Data networks developed as a result of businesses
and governments agencies needing to exchange
electronic information across long distances.
Businesses needed solution to:
How to avoid duplication of equipment and
resources
How to communicate efficiently
How to set up and manage a network
The Creation of Standards
One solution to incompatibility was to
create standards within Local Area
Neworks (LANs)
LANs limitations prompted (Metropolitan
Area Networks) MANs and (Wide Area
Networks) WANs
Data Networks with Respect to
Distances
Networking Devices
Networking Devices:
Repeaters and Hubs
Repeaters
Hubs
Networking Devices:
NICs and Bridges
NICS
Bridges
Networking Devices:
Switches
Switches
Networking Devices - Routers
Routers
Network Topology
Network Topology:
Bus & Star Topology
STAR TOPOLOGY
BUS TOPOLOGY
Network Topology: Ring
Topology
RING TOPOLOGY
Network Topology Cont:
Partial & Full Mesh
Partial Mesh
Full Mesh
MS VISIO
Creating Network Diagrams
MS Visio
Network Example
CONFIDENTIAL
CONFIDENTIAL
Network Diagam
MaxPro
SiliconGraphics
LABORATORIES, INC.
P O WER
Computer Systems
XL
FILE SERVER
SERIES
EMAIL SERVER
3645 Main Street
Critical Alarm
Major Alarm
High Capacity Bandwidth Manager
Minor Alarm
ON
ON
OFF
PS1
10A
OFF
PS1
10A
NEWBRIDGE
A4
ABC
1
GHI
LTR
3
MNO
5
TUV
FUNCTION
REDIAL/PAUSE
1
CODED DIAL
0
RESUME
STOP
START/COPY
#
AUTHENTICATION
SERVER
ALARM
RECEIVE MODE RESOLUTION
9
SYMBOLS
OPER
CARTRIDGE
6
WXY
8
7
DEF
2
JKL
4
PRS
*
TONE
<
2
>
3
PRINTER
RESET
4
5
6
PRINTER
OMNI SWITCH
AV-CLIENT
Designed by:
TELNET CLIENT
Designed by:
MMX ä
MMX ä
Ò
Ò
Ò
Ò
Ò
Microsof t
Esc
F1
P
F2
F3
F4
F5
F6
F7
F8
F9
F10
F11
F12
Print
Scroll
SysRq
Back Space
Scroll
Lock
Pause
Num
Lock
Caps
Lock
R
O
C
E
S
S
O
Ò
Microsof t
Ò
Ò
Windows NT
Ò
Windows 95
Ò
Ò
Windows NT
Ò
Windows 95
R
Esc
Scroll
Lock
F1
P
F2
F3
F4
F5
F6
F7
F8
F9
F10
F11
Break
F12
Print
Scroll
SysRq
Num
Lock
_
*
Back Space
Tab
Scroll
Lock
Pause
Num
Lock
Caps
Lock
O
C
E
S
S
O
R
Scroll
Lock
Break
Num
Lock
_
*
Tab
+
Caps
Lock
+
Caps
Lock
Enter
Shift
Shift
Enter
Shift
Shift
Enter
Ctrl
GCH_v.1.4
7/5/05
R
Alt
Alt
Ctrl
Enter
Ctrl
Alt
Alt
Ctrl
Michigan Tech University’s
CNSA Progam
MS Visio
Network Example #2
Network Diagam
CONFIDENTIAL
CONFIDENTIAL
IP Cloud
UTP-
hopper
ä
Glass-hopper
SY ST EM S, IN C .
Technologies Group, Inc.
Technologies Group, Inc.
LINE OUT
SYNC
LINE IN
LINE OUT
SYNC
SYNC
STATUS
LAN Analyzer
SUPER
STACK
3C9 30 11
10 00Base -SX
Model ISDN 1000PA
ISDN Basic Rate Interface
Protocol Analyzer
Model ISDN 1000PA
ISDN Basic Rate Interface
Protocol Analyzer
LINE IN
STATUS
SYNC
LAN Analyzer
3Com
SUPER
STACK
3C9 30 11
10 00Base -SX
C onsole
3Com
C onsole
10 00Base -SX
10 00Base -SX
10 00Base -SX
10 00Base -SX
S up erSta ck II
S up erSta ck II
Switch 93 00
Switch 93 00
Glass-hopper
Ethernet Switch
Ò
Ò
BLACK BOXÒ
Ethernet Switch
Ò
VGA Splitter 2-Channel
MONITOR T YPE
Ò
VGA Splitter 2-Channel
MONITOR T YPE
POWER
Fiber Splitter
N C X 3E6
Michigan Tech University’s
CNSA Progam
System Status
System Status
BLACK BOXÒ
VGA Splitter 2-Channel
MONITOR T YPE
POWER
Fiber Splitter
Ò
Ò
BLACK BOXÒ
Next Generation Networks
Ò
Ò
BLACK BOXÒ
VGA Splitter 2-Channel
MONITOR T YPE
POWER
N C X 3E6
Next Generation Networks
Ò
VGA Splitter 2-Channel
MONITOR T YPE
Circuit Status
Ethernet Status
POWER
Fiber Splitter
Fiber Splitter
Fiber Splitter
Ò
BLACK BOXÒ
POWER
Circuit Status
Ethernet Status
TELECOM
TELECOM
System Status
ATM Switch
ATM Switch
N C X 3E6
Next Generation Networks
Circuit Status
Ethernet Status
Ò
Ò
BLACK BOXÒ
Ò
VGA Splitter 2-Channel
MONITOR T YPE
Fiber Splitter
SUPER
STACK
3C9 30 11
10 00Base -SX
Ò
BLACK BOXÒ
VGA Splitter 2-Channel
MONITOR T YPE
POWER
TELECOM
ATM Switch
3Com
POWER
Fiber Splitter
SUPER
STACK
3C9 30 11
10 00Base -SX
C onsole
C onsole
10 00Base -SX
10 00Base -SX
10 00Base -SX
10 00Base -SX
S up erSta ck II
S up erSta ck II
Switch 93 00
Switch 93 00
System Status
Ethernet Switch
Ethernet Switch
N C X 3E6
Next Generation Networks
Circuit Status
Ethernet Status
TELECOM
GCH_v.2.7
7/5/05
ATM Switch
3Com
MS Visio
WAN Architecture Example
CONFIDENTIAL
WAN DIAGRAM
CONFIDENTIAL
ABC
2
1
DEF
3
E
N
T
ABC
2
1
DEF
3
GHI
4
E
JKL
5
TUV
8
OPER
0
MNO
6
JKL
5
MNO
6
E
R
N
T
GHI
4
PRS
7
*
PRS
7
E
TUV
8
WXY
9
R
*
WXY
9
OPER
0
#
Ò
#
Ò
Super Key
Message
OPERATE
Hold
Cancel
Forward
OPERATE
Redial
ABC
1
Ò
1
2
5
0
Ò
DEF
3
JKL
SETUP
MNO
5
6
TUV
WXY
8
OPER
MNO
9
TUV
2
GHI
4
PRS
7
6
JKL
8
0
SETUP
3
DEF
ABC
4
GHI
7
PQRS
*
9
#
WXYZ
#
Japan
PBX
New York
Gateway
PORT 1
PORT 1
10/100 ETH
Model
Serial No.
MAC Address
PORT 2
CONSOLE
10/100 ETH
Model
SYN
Serial No.
MAC Address
ALM
PORT 3
PORT 1
PORT 2
PORT 3
PORT 4
SYN
SYN
SYN
ALM
ALM
ALM
ALM
PORT 3
PORT 4
PORT 1
CONSOLE
ETHERNET
PORT 2
PORT 3
PORT 4
SYN
SYN
SYN
SYN
ALM
ALM
ALM
ALM
MODULE EXPANSION SLOT
POWER
CONSOLE
SYN
ALM
PSTN
PORT 4
SYN
PBX
Gateway
PORT 2
MODULE EXPANSION SLOT
ISDN U
TEL1
TEL2
POWER
Router
CONSOLE
ETHERNET
ISDN U
TEL1
TEL2
Router
Data Network
Legend
PSTN (Auto-switch)
Japan to New York
VoIP (On net call)
Japan to New York
POWER
PORT 1
PORT 2
PORT 3
PORT 4
CONSOLE
ETHERNET
ISDN U
TEL1
10/100 ETH
Model
Serial No.
MAC Address
TEL2
CONSOLE
SYN
ALM
PORT 1
PORT 2
PORT 3
PORT 4
SYN
SYN
SYN
SYN
ALM
ALM
ALM
ALM
MODULE EXPANSION SLOT
PSTN (Hop-off call)
Japan to United States,
Domestic long distance call
ABC
2
1
DEF
3
E
N
T
GHI
4
PRS
7
*
JKL
5
TUV
8
OPER
0
MNO
6
E
R
WXY
9
#
Ò
ABC
1
DEF
2
OPERATE
3
Ò
GHI
JKL
4
M NO
5
PRS
6
TUV
7
0
SETUP
WXY
8
OPER
9
#
PSTN
GCH_v.1.2
7/2/05
California
MS Visio
Switch Architecture Example
CONFIDENTIAL
CONFIDENTIAL
SWITCHED ETHERNET NETWORK
Public Internet
Private Intranet
CENTRAL OFFICE
CHASSIS STATUS
TEMPERATURE
Output
Good
FAN
Output
Good
POWER SUPPORT
Output
Good
SYSTEM
Output
Good
Output
Good
Output
Good
LMP
TEST
PBX
PBX
1
2
N
H
B
C
P
8
B
C
P
8
L1
L1
L2
L2
L2
OMNI
SWITCH
4
5
6
H
B
4
1
B
L1
4200
3
4200
S1
S1
S1
S2
S2
S2
S3
1
2
3
4
5
6
7
8
9
10
11
12
Public
T1/E1 TDM
or
ATM Network
BRANCH OFFICE
BRANCH OFFICE
ALARM
ALARM
CONSOLE
CONSOLE
4200
OmniAccess
OmniAccess
1518 IAD
1518 IAD
PBX
ORIGIN
ON Y
X 2
ON Y
X 2
ON Y
SiliconGraphics
SiliconGraphics
SiliconGraphics
SiliconGraphics
SiliconGraphics
SiliconGraphics
ORIGIN
Ethernet Network
2000
ORIGIN
2000
ORIGIN
2000
X 2
SiliconGraphics
SiliconGraphics
SiliconGraphics
2000
ORIGIN
SiliconGraphics
2000
SiliconGraphics
Ethernet Network
ORIGIN
SiliconGraphics
2000
MS Visio
Client Architecture Example
Syrex Network Architecture
CONFIDENTIAL
VLAN_E
CONFIDENTIAL
VLAN_B
R2
S0/0
BB1
S0/2
R1
ISDN
S0/0
Frame
Relay
R4
S0/1
OSPF
S1/1
S0/0
RIP v2
VLAN_A
S0
R6
S0/0
controller
T1 0
VLAN_C
Sw1
R5
Sw2
controller
T1 0
EBGP
R9
BB3
VLAN_D
Legend
Fiber Optic
10/100 Ethernet
ISDN Connection
R7
EIGRP
ATM
ATM 138.10.78.0/
24
R8
ATM Connection
Frame Relay Connection
GCH_ver3.7
6/11/05
Network Protocols
Local-area Networks (LANs)
Wide-area Networks (WANs)
Metropolitan-Area Network (MANs)
Storage-Area Networks (SANS)
Virtual Private Networks (VPNs)
VPN Architectures
Client-Initiated Access VPN
NAS-Initiated Access VPN
Intranet and Extranet VPN
Benefits of VPNs
Importance of Bandwidth
• Why is Bandwidth Important?
• What are Bandwidth’s limitations?
• What is Bandwidth’s effect on network
performance?
Bandwidth Pipe Analogy
Bandwidth Highway Analogy
Bandwidth Measurements
Bandwidth Limitations
Bandwidth Throughput
Digital Transfer Calculation
Cabling
LANs and WANs
LAN Physical Layer
LAN Physical Layer Symbols
Ethernet on a Campus
There are several ways that Ethernet
technologies can be used in a campus
network:
10Mbps can be used at the user level
Clients or servers that require more bandwidth
can use 100-Mbps Ethernet
Fast Ethernet is used as the link between user
and network devices. Fast Ethernet can be used
to connect enterprise servers.
Fast Ethernet or Gigabit Ethernet should be
implemented between backbone devices, based
on affordability.
Connection Media
UTP Implementation
Patch Panels used for
Organization in Wiring
Closets. Sometimes referred
to as punch downs.
UTP Cable
•8 colored wires
•2 twisted pair
UTP Implementation Continued
EIA/TIA T568-A or T568-B
Standards
Note: Only 4 wires
being used for Tx and
Rx
UTP Implementation
Straight-Through and
Cross-Over Comparison
Console Connections
Used to manage a device, such as
switch or router, locally
Uses a DB-9 to RJ45 adapter
Uses Rollover cable
Straight-Through and CrossOver Comparison Continued
Summer Youth Program:
Computer/Network
Architecture and Security
Using Layers to Analyze
Problems
Using Layers to Describe Data
Communication
OSI Model
Layer 1
Layer 2
•Provides reliable transit of data across a physical link
•Provides physical address
•Error correction, best effort delivery.
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
Peer-to-Peer Communication
TCP/IP Model
Encapsulation & Decapsulation
Names for Data at Each
Layer
Network Environments
Peer-to-Peer Networks
All Peers are equal
10 Host max (recommended)
Client/Server Environment
network services are located on a
dedicated computer called a server
Peer-to-Peer vs. Client/Server
Advantages
Advantages of a Peer-to-Peer
Network
Advantages of a
Client/Server Network
Less expensive to
implement
Provides for better
security
Does not require
additional specialized
network administration
software
Easier to administer when
the network is large due
to centralized
administration
Does not require a
dedicated network
administrator
All data can be backed up
on one central location
Peer-to-Peer vs. Client/Server
Disadvantages
Disadvantages of a Peer-toPeer Network
Disadvantages of a
Client/Server Network
Does not scale well to a
large networks and
administration becomes
unmanageable
Requires expensive
specialized network
administrative and
operational software
Each user must be trained
to perform administrative
tasks
Requires expensive, more
powerful hardware for the
server machine
Less secure
Requires a professional
administrator
All machines sharing
resources negatively
impacts performance
Has a single point of
failure. User data is
unavailable if the server
is down
Ethernet Switching
Layer 2 Bridging

What is a Bridge?

What is the Bridging process?
Bridge Types
Bridge Operations
Switches
Switching Table
Latency

What is Latency?

How does it affect a network?
Switch Modes
Store-and-forward switching
Cut-through switching
Fragment-free switching
Collision Domains and
Broadcast Domains
How to reduce the impact of
broadcasts and collisions
on the performance of the
network?
Types of Networks
Data Collisions
When two bits are propagated at the same
time on the same network, a collision will
occur.
Collisions and Collision
Domains
Extended by a hub
and repeater
Segmentation
Breaking Up Collision
Domains Using Segmentation
Segmenting with Bridges
Segmenting with Switches
Segmenting with Routers
Layer 2 Broadcasts
Layer 2 devices must flood all broadcast
and multicast traffic.
The accumulation of broadcast and
multicast traffic from each device in the
network is referred to as broadcast
radiation.
Broadcast Domains
A group of collision domains that are
connected by Layer 2 devices
Controlled at Layer 3 (router)
Routers do not forward broadcasts
Data Flow
Network Segment


If the segment is used in TCP, it would be
defined as a separate piece of the data.
If segment is being used in the context of
physical networking media in a routed
network, it would be seen as one of the parts
or sections of the total network.
Routing Fundamentals
And Subnets
Routable and Routed
Protocols
A routed protocol allows the router to forward data
between nodes on different networks.
In order for a protocol to be routable, it must provide the
ability to assign a network number and a host number to
each individual device.
These protocols also require a network mask in order to
differentiate the two numbers.
The reason that a network mask is used is to allow groups
of sequential IP addresses to be treated as a single unit.
IP as a Routed Protocol
IP is a connectionless,
unreliable, best-effort
delivery protocol.
As information flows
down the layers of the
OSI model; the data is
processed at each layer.
IP accepts whatever data
is passed down to it from
the upper layers.
Packet Propagation and Switching
Within a Router
Packet Propagation and Switching
Within a Router
As a frame is received at a router interface.
The MAC address is checked to see if the frame is
directly addressed to the router interface, or a broadcast.
The frame header and trailer are removed and the
packet is passed up to Layer 3.
The destination IP address is compared to the routing
table to find a match.
The packet is switched to the outgoing interface and
given the proper frame header.
The frame is then transmitted.
Internet Protocol (IP):
Connectionless
The Internet is a gigantic, connectionless network
in which all packet deliveries are handled by IP.
TCP adds Layer 4, connection-oriented reliability
services to IP.
Telephone Calls:
Connection-Oriented
A connection is established between the
sender and the recipient before any data is
transferred.
Anatomy of an IP Packet
While the IP source and destination addresses
are important, the other header fields have
made IP very flexible.
The header fields are the information that is
provided to the upper layer protocols defining
the data in the packet.
Routing Overview
A router is a network layer device that uses one or more
routing metrics to determine the optimal path.
Routing metrics are values used in determining the
advantage of one route over another.
Routing protocols use various combinations of metrics
for determining the best path for data.
Routing Versus Switching

This distinction is routing and switching
use different information in the process of
moving data from source to destination.
Routing Versus Switching
Classes of Network IP
Addresses
Introduction to Subnetting
Host bits must
are reassigned
(or “borrowed”) 3 bits borrowed allows 2 -2 or 6 subnets
as network bits.
The starting
point is always 5 bits borrowed allows 2 -2 or 30 subnets
the leftmost
host bit.
3
5
12 bits borrowed allows 212-2 or 4094 subnets
Reasons for Subnetting
Provides addressing flexibility for the network
administrator.
Each LAN must have its own network or subnetwork
address.
Provides broadcast containment and low-level security
on the LAN.
Provides some security since access to other subnets is
only available through the services of a router.
Establishing the Subnet Mask
Address
Determines which part of an IP address is the network field
and which part is the host field.
Follow these steps to determine the subnet mask:
1. Express the subnetwork IP address in binary form.
2. Replace the network and subnet portion of the
address with all 1s.
3. Replace the host portion of the address with all 0s.
4. Convert the binary expression back to dotted-decimal
notation.
Establishing the Subnet Mask
Address
To determine the number of bits to be used, the network
designer needs to calculate how many hosts the largest
subnetwork requires and the number of subnetworks
needed.
The “slash format” is a shorter way of representing the
subnet mask:
/25 represents the 25 one bits in the subnet mask
255.255.255.128
Establishing the Subnet Mask
Address
Subnetting Class A and B
Networks
The available bits for assignment to the subnet
field in a Class A address is 22 bits while a Class
B address has 14 bits.
Calculating the Subnetwork
With ANDing
ANDing is a binary process by which the router
calculates the subnetwork ID for an incoming packet.
1 AND 1 = 1; 1 AND 0 = 0; 0 AND 0 = 0
The router then uses that information to forward the
packet across the correct interface.
11000000.10101000.0000101 0000
0.010
1
Packet Address
192.168.10.65
Subnet Mask
255.255.255.22 11111111.11111111.11111111.1 0000
4
11
0
Subnetwork
Address
192.168.10.64
11000000.10101000.0000101 0000
0.010
0
Routed Versus Routing
A routed protocol:
Includes any network protocol suite that provides
enough information in its network layer address to
allow a router to forward it to the next device and
ultimately to its destination.
Defines the format and use of the fields within a
packet.
A routing protocol:
Provides processes for sharing route information.
Allows routers to communicate with other routers to
update and maintain the routing tables.
Path Determination
Path determination enables a router to compare the
destination address to the available routes in its routing
table, and to select the best path.
End of Presentation
Download