Introduction To Networks-1
Introduction To Networks-1
Networking Today
Network Representations
Components of a Network
Network Media
Twisted Pair Cables
Unshielded Twisted Pair Cable (UTP)
• most popular
• maximum length 100 m
• prone to noise
Coaxial Cable
Copper Cabling
High
Immunity to EMI and RFI Low (Completely immune)
High
Immunity to electrical hazards Low
(Completely immune)
Wireless Media
Wireless Media
Backwards
Standard Maximum Speed Frequency
compatible
1.3 Gbps
802.11ac (1300 Mbps) 2.4 GHz and 5.5 GHz 802.11b/g/n
30
Wireless Media
31
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
Local Area Network (LAN)
Wide Area Network (WAN).
The Internet
The Internet
Packet-Switched Networks
Reliable Network
Scalable Networks
Reliable Network
Providing QoS
Network Security
Network Security
Security Threats
The most common external threats to networks include:
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service attacks
Data interception and theft
Identity theft
Network Security
Security Solutions
Network security components often include:
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)
Components of a Network
OSI Reference Model
51
Components of a Network
OSI Reference Model Functions
52
Components of a Network
TCP/IP Model
53
Components of a Network
TCP/IP Protocol Stack
54
Components of a Network
TCP/IP Data Encapsulations
55
Components of a Network
Data De-Encapsulations
56
Components of a Network
IP Addressing
57
Components of a Network
IP Address Classifications
58
Components of a Network
Special IP Addresses
59
Components of a Network
Private IP Address
60
Classful Addressing
Class B
Class C
Classful Addressing
VLSM in Action
VLSM allows the use of different masks for each subnet:
After a network address is subnetted, those subnets can be
further subnetted.
VLSM is simply subnetting a subnet. VLSM can be thought
of as sub-subnetting.
Individual host addresses are assigned from the addresses
of "sub-subnets".
VLSM
Subnetting Subnets
VLSM
VLSM Example
Configure IPv4 Summary Routes
Route Summarization
Route summarization, also known as route aggregation, is the
process of advertising a contiguous set of addresses as a single
address with a less-specific, shorter subnet mask:
CIDR is a form of route summarization and is synonymous
with the term supernetting.
CIDR ignores the limitation of classful boundaries, and
allows summarization with masks that are smaller than that
of the default classful mask.
This type of summarization helps reduce the number of
entries in routing updates and lowers the number of entries
in local routing tables.
Configure IPv4 Summary Routes
SNMP Versions
To display SNMP input and output statistics, including the number of illegal community
string entries, errors, and requested variables,
The beauty of NetFlow is that it does not involve any additional protocol setup between
network devices or hosts. NetFlow is completely transparent to the existing network
devices, hosts, and applications. NetFlow can be enabled individually on some network
devices like routers and switches, without having to enable it on all devices in the network.
Managing network Devices
However, you may also verify NetFlow operation using relevant show commands on the NetFlow
router itself.
R1#show ip flow interface
FastEthernet0/0
ip flow ingress
ip flow egress
Password Recovery
Password Recovery
Password Recovery
Password Recovery
Using Ctrl+Break option.we suggest using Windows/Hyperterminal for practice.
Q&A