[go: up one dir, main page]

0% found this document useful (0 votes)
79 views90 pages

Introduction To Networks-1

This document provides an introduction to networking concepts including network components, media types, protocols, and management. It discusses how networks support communication, work, learning and entertainment. Key sections cover data communication systems, network representations, media like copper and fiber cabling, wireless standards, network types (LANs, WANs, MANs), internet access technologies, converged networks, and network security solutions. The OSI and TCP/IP models are examined along with addressing schemes, routing protocols, and device management basics.

Uploaded by

mntesnot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views90 pages

Introduction To Networks-1

This document provides an introduction to networking concepts including network components, media types, protocols, and management. It discusses how networks support communication, work, learning and entertainment. Key sections cover data communication systems, network representations, media like copper and fiber cabling, wireless standards, network types (LANs, WANs, MANs), internet access technologies, converged networks, and network security solutions. The OSI and TCP/IP models are examined along with addressing schemes, routing protocols, and device management basics.

Uploaded by

mntesnot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 90

Introduction to Networks

Networking Today

Networks in Our Past and Daily Lives


Interconnecting our Lives

Networking impacts in our daily lives


 Networks Support the Way We Learn

 Networks Support the Way We Communicate

 Networks Support the Way We Work

 Networks Support the Way We Play


Data communications

Data and Data Communications


Data communications

Data Communication System Components


Data communications

Data Communication Types


Components of a Network
OSI Network Representations
Components of a Network

Network Representations
Components of a Network

Network Media
Twisted Pair Cables
 Unshielded Twisted Pair Cable (UTP)
• most popular
• maximum length 100 m
• prone to noise

Category 1 Voice transmission of traditional telephone


Category 2 For data up to 4 Mbps, 4 pairs full-duplex
Category 3 For data up to 10 Mbps, 4 pairs full-duplex
Category 4 For data up to 16 Mbps, 4 pairs full-duplex
Category 5 For data up to 100 Mbps, 4 pairs full-duplex
Category 6 For data up to 1000 Mbps, 4 pairs full-duplex
Copper Cabling

Unshielded Twisted-Pair (UTP) Cable


Copper Cabling

Shielded Twisted-Pair (STP) Cable


Copper Cabling

Coaxial Cable
Copper Cabling

Cooper Media Safety


UTP Cabling

Properties & UTP Cabling Standards


UTP Cabling

Types of UTP Cable


Straight-through cable
Crossover cable
Rollover cable
UTP Cabling

LAN Cabling Areas


UTP Cabling

Testing UTP Cables


Fiber Optic Cabling

Properties of Fiber Optic Cabling


Fiber Optic Cabling

Fiber Media Cable Design


Fiber Optic Cabling

Types of Fiber Media


Fiber Optic Cabling

Network Fiber Connectors


Fiber Optic Cabling

Testing Fiber Cables


Fiber Optic Cabling

Fiber versus Copper

Implementation issues Copper media Fibre-optic

Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps

Relatively short Relatively High


Distance (1 – 100 meters) (1 – 100,000 meters)

High
Immunity to EMI and RFI Low (Completely immune)

High
Immunity to electrical hazards Low
(Completely immune)

Media and connector costs Lowest Highest

Installation skills required Lowest Highest

Safety precautions Lowest Highest


Network Media

Wireless Media
Wireless Media

802.11 Wi-Fi Standards

Backwards
Standard Maximum Speed Frequency
compatible

802.11a 54 Mbps 5 GHz No

802.11b 11 Mbps 2.4 GHz No

802.11g 54 Mbps 2.4 GHz 802.11b

802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g

1.3 Gbps
802.11ac (1300 Mbps) 2.4 GHz and 5.5 GHz 802.11b/g/n

7 Gbps 2.4 GHz, 5 GHz and 60


802.11ad (7000 Mbps) GHz
802.11b/g/n/ac
Wireless Media

Rules of Network World

30
Wireless Media

Organizations for Standards

31
LANs and WANs

Types of Networks
The two most common types of network infrastructures are:
 Local Area Network (LAN)
 Wide Area Network (WAN).

Other types of networks include:


 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Storage Area Network (SAN)
LANs and WANs

Local Area Networks (LAN)


LANs and WANs

Wide Area Networks (WAN)


LANs, WANs, and Internets

The Internet
The Internet

Intranet and Extranet


LANs, WANs, and Internets

Internet Access Technologies


Connecting to the Internet

Connecting Remote Users to the Internet


Connecting to the Internet

Connecting Businesses to the Internet


Converged Networks

The Converging Network


Converged Networks

Planning for the Future


Reliable Network

Supporting Network Architecture

As networks evolve, we are discovering that there are four basic


characteristics that the underlying architectures need to address in order to
meet user expectations:
 Fault Tolerance *
 Scalability *
 Security *
 Quality of Service *
 Cost
 Speed
 Topology
Reliable Network

Fault Tolerance in Circuit Switched Network


Reliable Network

Packet-Switched Networks
Reliable Network

Scalable Networks
Reliable Network

Providing QoS

Examples of priority decisions for an organization might include:


 Time-sensitive communication - increase priority for services like
telephony or video distribution.
 Non time-sensitive communication - decrease priority for web
page retrieval or email.
 High importance to organization - increase priority for production
control or business transaction data.
 Undesirable communication - decrease priority or block unwanted
activity, like peer-to-peer file sharing or live entertainment
Reliable Network

Providing Network Security


Future of Networking

Network Security
Network Security

Security Threats
The most common external threats to networks include:
 Viruses, worms, and Trojan horses
 Spyware and adware
 Zero-day attacks, also called zero-hour attacks
 Hacker attacks
 Denial of service attacks
 Data interception and theft
 Identity theft
Network Security

Security Solutions
Network security components often include:
 Antivirus and antispyware
 Firewall filtering
 Dedicated firewall systems
 Access control lists (ACL)
 Intrusion prevention systems (IPS)
 Virtual Private Networks (VPNs)
Components of a Network
OSI Reference Model

51
Components of a Network
OSI Reference Model Functions

52
Components of a Network
TCP/IP Model

53
Components of a Network
TCP/IP Protocol Stack

54
Components of a Network
TCP/IP Data Encapsulations

55
Components of a Network
Data De-Encapsulations

56
Components of a Network
IP Addressing

57
Components of a Network
IP Address Classifications

58
Components of a Network
Special IP Addresses

59
Components of a Network
Private IP Address

60
Classful Addressing

Classful Network Addressing


Classful Addressing

Classful Subnet Masks


Class A

Class B

Class C
Classful Addressing

Classful Routing Protocol Example


Classful Addressing

Classful Addressing Waste


CIDR

Classless Inter-Domain Routing


CIDR

CIDR and Route Summarization


CIDR

Static Routing CIDR Example


CIDR

Classless Routing Protocol Example


VLSM

Fixed Length Subnet Masking


VLSM

Variable Length Subnet Masking


VLSM

VLSM in Action
VLSM allows the use of different masks for each subnet:
 After a network address is subnetted, those subnets can be
further subnetted.
 VLSM is simply subnetting a subnet. VLSM can be thought
of as sub-subnetting.
 Individual host addresses are assigned from the addresses
of "sub-subnets".
VLSM

Subnetting Subnets
VLSM

VLSM Example
Configure IPv4 Summary Routes

Route Summarization
Route summarization, also known as route aggregation, is the
process of advertising a contiguous set of addresses as a single
address with a less-specific, shorter subnet mask:
 CIDR is a form of route summarization and is synonymous
with the term supernetting.
 CIDR ignores the limitation of classful boundaries, and
allows summarization with masks that are smaller than that
of the default classful mask.
 This type of summarization helps reduce the number of
entries in routing updates and lowers the number of entries
in local routing tables.
Configure IPv4 Summary Routes

Calculate a Summary Route


Managing Devices

In-Band vs. Out-of-Band Management


• In-Band requires, at least, one interface to be connected and
operational and use of Telnet, SSH, or HTTP to access device.
• Out-of-Band requires direct connection to console or AUX port and
Terminal Emulation client to access device.
Managing Devices

Basic Router CLI commands

Basic router configuration


includes:
 Hostname
 Passwords (console,
Telnet/SSH, and privileged
mode)
 Interface IP addresses
 Enabling a routing protocol
Managing Devices

Basic Router show Commands


 show ip protocols – Displays information about routing protocol
configured.
 show ip route – Displays routing table information.
 show ip ospf neighbor – Displays information about OSPF neighbors.
 show ip interfaces – Displays detailed information about interfaces.
 show ip interface brief – Displays all interfaces with IP addressing ,
interface, and line protocol status.
 show cdp neighbors – Displays information about all directly
connected Cisco devices.
Managing Devices

Basic Switch CLI Commands


 Hostname
 Passwords
 In-Band access requires the
Switch to have an IP address
(assigned to VLAN 1).
 Save configuration – copy
running-config startup-
config command.
 To clear switch – erase
startup-config, and then
reload.
 To erase VLAN information –
delete flash:vlan.dat.
Managing Devices

Basic Switch Show Commands


 show port-security – Displays any ports with security enabled.
 show port-security address – Displays all secure MAC addresses.
 show interfaces – Displays detailed information about interfaces.
 show mac-address-table – Displays all MAC addresses the switch has
learned.
 show cdp neighbors – Displays all directly connected Cisco devices.
Managing Cisco IOS Images

TFTP Servers as a Backup Location


• Cisco IOS Software images and configuration files can be stored on a
central TFTP server.
• It is good practice to keep a backup copy of the Cisco IOS software
image.
• Using a network TFTP server allows image and configuration uploads and
downloads over the network.
Managing Cisco IOS Images

Creating Cisco IOS Image Backup


To create a backup of the Cisco IOS image to a TFTP server, perform the
following three steps:
Step 1. Ensure that there is access to the network TFTP server. Ping the TFTP
server to test connectivity.
Step 2. Verify that the TFTP server has sufficient disk space to accommodate
the Cisco IOS Software image. Use the show flash0: command
on the router to determine the size of the Cisco IOS image file.
Step 3. Copy the image to the TFTP server using the copy source-url
destination-url command.
Managing Cisco IOS Images

Copying a System IOS Image


Follow these steps to upgrade the software on the Cisco router:
Step 1. Select a Cisco IOS image file that meets the requirements in terms of
platform, features, and software. Download the file from
http://www.cisco.com and transfer it to the TFTP server.
Step 2. Verify connectivity to the TFTP server. Ping the TFTP server from the
router.
Step 3. Ensure that there is sufficient flash space on the router that is being
upgraded. The amount of free flash can be verified using the show
flash0: command.
Step 4. Copy the IOS image file from the TFTP server to the router using
the copy tftp: flash0 command. After issuing this
command with specified source and destination URLs, the user is
prompted for the remote host’s IP address, source filename, and
destination filename. The transfer of the file then begins.
Managing network Devices

Managing Network Devices - SNMP

SNMP Versions

This software release supports these SNMP versions:


•  SNMPv1—The Simple Network Management
Protocol, a Full Internet Standard, defined in RFC 1157.

•  SNMPv2C replaces the Party-based Administrative


and Security Framework of SNMPv2Classic with the
community-string-based Administrative Framework of
SNMPv2C while retaining the bulk retrieval and
improved error handling of SNMPv2Classic

•  SNMPv3—Version 3 of the SNMP is an interoperable


standards-based protocol defined in RFCs 2273 to 2275.
SNMPv3 provides secure access to devices by
authenticating and encrypting packets over the network .
Managing network Devices

Managing Network Devices - SNMP


This example shows how to permit any SNMP manager to access all objects with read-
only permission using the community string public. The switch also sends VTP traps to
the hosts 192.180.1.111 and 192.180.1.33 using SNMPv1 and to the host 192.180.1.27
using SNMPv2C. The community string publicis sent with the traps.

Switch(config)# snmp-server community public


Switch(config)# snmp-server enable traps vtp
Switch(config)# snmp-server host 192.180.1.27 version 2c public
Switch(config)# snmp-server host 192.180.1.111 version 1 public
Switch(config)# snmp-server host 192.180.1.33 public

To display SNMP input and output statistics, including the number of illegal community
string entries, errors, and requested variables,

use the show snmp privileged EXEC command


Managing network Devices

Managing Network Devices - NetFlow


NetFlow is a Cisco IOS application that provides statistics on packets flowing through
routers. NetFlow is primarily used for network accounting and identifies flows of packets
coming in and going out of an interface.

The beauty of NetFlow is that it does not involve any additional protocol setup between
network devices or hosts. NetFlow is completely transparent to the existing network
devices, hosts, and applications. NetFlow can be enabled individually on some network
devices like routers and switches, without having to enable it on all devices in the network.
Managing network Devices

Managing Network Devices - NetFlow


R1(config)#interface FastEthernet0/0
R1(config-if)#ip flow ingress
R1(config-if)#ip flow egress
R1(config-if)#exit
R1(config)#ip flow-e
R1(config)#ip flow-export destination 192.168.1.2 9996
R1(config)#ip flow-export version 9
R1(config)#end
R1# 
The above configuration assumes that a NetFlow collector is available at IP address 192.168.1.2 and
is listening at UDP port number 9996. The Cisco default port number on which NetFlow collectors
listen for NetFlow packets is 9996. The verification of NetFlow can come directly from analyzing
data collected on the NetFlow collector.

However, you may also verify NetFlow operation using relevant show commands on the NetFlow
router itself.
R1#show ip flow interface
FastEthernet0/0
ip flow ingress
ip flow egress 
Password Recovery

Password Recovery
Password Recovery

Password Recovery
Using Ctrl+Break option.we suggest using Windows/Hyperterminal for practice.
Q&A

You might also like