Week 1 Network Fundamentals
Week 1 Network Fundamentals
Week 1 Network Fundamentals
1
Course Contents:
1.0 Basics of Networking
Router
Switch PC1
4
Local area networks (LAN)
Set of devices connected with the same location (office/building)
5
Wide Area Network (WAN)
Set of devices connected in two or more different locations. Two or more LAN.)
6
Metro-politan Area Network (MAN)
Set of devices connected in city limits
7
Personal area network (PAN)
two or more computer systems within 4 to 6 meters.
8
Campus Area network (CAN)
A campus network, campus area network, corporate area network or CAN is a
computer network made up of an interconnection of local area networks (LANs) within
a limited geographical area..
9
Physical Components of Networks
o Servers
o Laptops
Hosts o Desktops
o Tablets
o Smartphones
10
o Hubs
o Access Points
o Routers
Network Infrastructure Device
o Firewalls
Copyright © Netmetric-solutions.com
11
Communication Media / Cables
12
oUnshielded Twisted Pair (UTP)
• Categories of UTP Cable
13
o UTP Cable Connector
RJ-45 connector
14
o Coaxial Cable
15
o Rollover Cable
A rollover cable is a network cable that
connects a computer terminal to a network
router’s console port. It is also referred to as a
Cisco console cable and is normally flat and
light blue so as to distinguish it from other
network cable types.
16
Broadcast Domain
• A broadcast domain is a collection of devices that receive broadcast
traffic from each other.
• Switches will forward broadcast traffic to all interfaces, except the one
where it originated from.
• A lot of broadcast traffic might impact your network performance so
reducing the size of the broadcast domain is something to consider.
• Routers do not forward broadcast traffic, they break broadcast
domains.
• VLANs on switches also allow you to break broadcast domains.
Collision Domain
5 Redirect
8 Echo
11 Time Exceeded
When a router forwards a packet, it always decrements the hop limit by one. Remember, the hop limit makes sure that a packet does not
endlessly travel through a network. If a router receives a packet with a hop limit of one and decrements the limit to zero, it discards the
packet, generates a Time Exceeded message with a code value of zero, and sends this message back to the source host. This error can
indicate a routing loop or the fact that the sender’s initial hop limit is too low.
42 Extended Echo Request
ICMP Error Code
Type 3
Code Description
0 Net Unreachable
1 Host Unreachable
2 Protocol Unreachable
3 Port Unreachable
4 Fragmentation Needed and Don't Fragment was Set
5 Source Route Failed
6 Destination Network Unknown
7 Destination Host Unknown
Traceroute
• What is traceroute?
• Traceroute is a command that runs tools used for network diagnostics. These tools trace the
paths data packets take from their source to their destinations, allowing administrators to
better resolve connectivity issues. On a Windows machine, this command is called tracert;
on Linux and Mac, it’s called traceroute. Traceroute and tracert largely function in the same
way—they map the route data takes from one point in a network to a specific IP server.
When data is transmitted between two points, it must “hop” through several devices, like
switches and routers. Traceroute maps each hop, provides the details and round-trip time
(RTT).
• While ping can tell you if there is a problem, traceroute can help you pinpoint where the
problem exists. For an example of how you might use traceroute, imagine you’re visiting a
website and its pages are taking a long time to load. In this instance, you can use traceroute
to determine where the longest delays are occurring to get to the route of the issue.
Working of Traceroute
• How traceroute works ?
• Before running a traceroute command, you should understand a
network mechanism called “time to live” (TTL). TTL limits how long
data can “live” in an IP network. Every packet of data is assigned a TTL
value. Every time a data packet reaches a hop, the TTL value is
decreased by one.
Working of Traceroute
• How traceroute works ?
• Another key element to understand is “round-trip time” (RTT).
Traceroute ensures each hop on the way to a destination device drops
a packet and sends back an ICMP error message. This means
traceroute can measure the duration of time between when the data
is sent and when the ICMP message is received back for each hop—
giving you the RTT value for each hop.
Working of Traceroute
• How traceroute works ?
• let’s say you run a traceroute and specify a maximum of 30 hops. Traceroute will send
packets with a TTL of one to the destination server. The first network device the data
passes through will decrease the TTL to the value of zero, and a message informing you
the packets were dropped is sent. This gives you the RTT for hop number one.
• From there, the data packets are sent to the destination server with a TTL of two. As the
packets pass through the first hop, the TTL decreases to one. When they pass through
the second hop, it decreases to zero. The message is sent again. This gives you the RTT
for hop number two.
• This process will repeat until the data packets either reach the destination device or it
reaches the maximum number of hops. By the end of this test, you will know the
number of hops to the destination device, the RTT length for each hop, and the device
name and IP address for each hop.
o Wireless LANs
WLAN Stands for "Wireless Local Area
Network." A WLAN, or wireless LAN, is a
network that allows devices to connect and
communicate wirelessly. Unlike a traditional
wired LAN, in which devices communicate over
Ethernet cables, devices on a WLAN
communicate via Wi-Fi.
59
Network/Topology Diagrams
60
Topologies – Logical and Physical
o Logical Topology
• What the network looks like to the end-device
o Physical Topology
• How the network is actually cabled
61
Putting it all together
oAccess Layer
62
oDistribution-Layer
63
o Core Layer
64
o The Collapsed Core Design
65
Describe the impact of infrastructure components in an
enterprise network
66
Firewalls
o Inline systems that enforce an access control policy between
various network segments defined as security zones
• Can be software or hardware
67
o Cisco’s current line of Firewalls;
68
• Firepower
69
How do Firewalls impact the network?
70
WiFi Componenets in Enterprise Networks
71
A variety of options for Access Points
o Indoor
o Outdoor
72
o WiFi NICs
o Controllers
• Standalone
• Modularized/Integrated
• Can control different maximum quantities of APs
73
Impacts of WiFi Components on Enterprise Networks
o Reduced cost of implementing wired cabling.
o Many devices don’t even support Wired LAN connections
(i.e. tablets, smartphones, etc.)
o Allow for roaming
o Can become overloaded with traffic causing latency or even
the inability to connect to the network.
o Typically recommended to pair with security…which can
bring its own problems.
o Can make troubleshooting more difficult.
74
Router IOS Feature & Initialization steps
Router Initialization Steps.
1. POST
2. loading Bootstrap program from ROM into RAM.
3. Loading IOS image from flash into RAM.
4. Loading Configuration file NVRAM into RAM.
• CPU
•Executes operating system instructions
• RAM
•running copy of configuration file.
•routing table
•ARP cache
• Read-only memory (ROM)
•POST used when router is powered up.
•Router’s bootstrap program
•Scaled down version of operating system IOS
• Non-volatile RAM (NVRAM)
•Stores startup configuration. (including IP addresses, Routing
protocol)
• Flash memory - Contains the operating system (Cisco IOS)
Router Bootup Process
Bootup Process
• Similar to the console connection, this method does not require any networking
services
• The AUX port can also be used locally, like the console port.
• Generally, the only time the AUX port is used locally instead of the console port is
when there are problems using the console port
Telnet and SSH
• Unlike the console connection, Telnet sessions require active networking services on
the device.
• A host with a Telnet client can access the z sessions running on the Cisco device.
• The Secure Shell (SSH) protocol is a more secure method for remote device access.
• SSH client software is not provided by default on all computer operating systems.
Setup mode
end
exit
User EXEC Mode
Router# sh inter
Same as
• The naming convention for the different Cisco IOS releases contains three
parts:
•The platform on which the image runs
•The special features supported in the image
•Where the image runs and whether it has been zipped or
compressed
show version Command
IOS version
Router up
time
System image file
Last restart & location
method
- beside the configuration register you can use the boot system
command to force booting location.
114
What is a PROTOCOL
o Rules of operation
116
Upper layer
o Application
o Presentation
o Session
Lower layer
o Transport
o Network
o Data link
o Physical
117
Application Layer
118
Presentation Layer
o Performs compression, encryption within an application
119
Session Layer
o Dialog Control
120
Transport Layer
o Segmentation
o Examples: TCP/UDP
121
o Well-known ports
• Ranges from 0 to 1023
• Port numbers used by well-known services
• Examples: HTTP(80), HTTPS(443), DNS(53), FTP(20,21),
TELNET(23), etc.
o Registered ports
• Reserved for the applications
• Ranges from 1024 to 65535
122
o Identifying services
• TCP
• Connection oriented
• Reliable
• Protocol number 6
• UDP
• Connectionless
• Unreliable
• Protocol number 17
123
Network Layer
o Logical Addressing
124
o Network Layer Terminology
Routed protocol
• Protocols that are used for identification
• IP, IPX, AppleTalk
Routing protocol
• Protocols that determine best paths for the routed protocols
• EIGRP, OSPF, etc
125
Data Link Layer
o Media-Access Control
o Link-Layer Addressing
126
Physical Layer
o Electrical signals carried over the physical layer
• Repeaters
127
PDUs
o Protocol Data Unit
• The final, structured data unit created by an OSI Layer
o PDUs created at one layer are meant to be read by the same layer on
receiving device
128
Encapsulation / Decapsulation
129
PDU Transportation & Recognition
130
131
IPv4, UDP and TCP
132
Internet Protocol (IP) version 4
o Resides at OSI Layer-3 (Network Layer)
o IPv4 Header Format
133
A datagram of 3000 bytes (20 B of IP Header and 2980 B of IP payload reached at router and must be
forwarded to a link with MTU of 500 B. How many fragments will be generated and also write MF, offset,
Total length value for all.
20|2980 arrives on a Router
Router has a maximum of 500 B (20 B Header + 480 B Data)
P7 P6 P5 P4 P3 P2 P1
100+20 480+20 480+20 480+20 480+20 480+20
480+20
More Fragment
0 1 1 1 1 1 1
Offset (Fragment is represented in a scale of 8), 480/8
360 300 240 180 120 60 0
To find out how many data is there ahead of Packet7
360*8 = 2880 +100 bytes = 2980 bytes
o 32-bit addressing system
135
o IPv4 Communication Types
• Unicast
• Multicast
• Broadcast
136
DNS
o Domain Name Service
137
DNS | Domain Name System
140
DHCP
• Client / Server
141
DHCP|Dynamic Host Configuration Protocol
o Operates in application layer
o Provides dynamic method of leasing an IP
address to a host
o Uses UDP ports 67 (client to server) and 68
(server to client)
o Router can be used as a DHCP server for a
small networks where a dedicated DHCP
server is not available
142
DHCP Process
143
Configuration
• Router(config)# service dhcp
• Router(config)# ip dhcp pool <pool-name>
• Router(config-dhcp)# network < network-id>
• Router(config-dhcp)# default-router <default gateway>
• Router(config-dhcp)# dns-server <dns-server address>
• Router(config-dhcp)# lease <duration>
• Router(config-dhcp)# end
o Configuring exclude list
• Router(config)# ip dhcp excluded-address
<start-ip> <end-ip>
144
o DHCP Relay Agent
145
OSI Transport Layer - UDP
o Predominant protocols used at Layer-4
o TCP (Transmission Control Protocol)
o UDP (User Datagram Protocol)
o UDP
• Connectionless
146
OSI Transport Layer - TCP
o Transmission Control Protocol
• Connection-oriented
147
TCP History
o Developed by Stanford University in
1970’s
o Originally TCP and IP were part of the
same standard called TCP
o TCP was de-coupled from IP to stay
consistent with a layered approach to
networking
148
Connection-Oriented
o TCP verifies existence of peer prior to data
exchange
o TCP peers negotiate parameters used to control
data exchange
o TCP data is exchanged reliably using sequence
numbers, acknowledgements, flow-control,
and retransmissions
o TCP can gracefully inform peer of the need to
close a connection.
149
TCP – 3 Way Handshake
Step 1 (SYN) : In the first step, client wants to establish
a connection with server, so it sends a segment with
SYN(Synchronize Sequence Number) which informs
server that client is likely to start communication and
with what sequence number it starts segments with
150
DoD’s Model of TCP/IP
o The DoD model is a
condensed version
of the OSI model and
only has four layers.
151
o Process Application Layer
Defines protocols for node-to-node application communication and also controls
user interface specifications. Consists of a set of services that provide
ubiquitous access to all types of networks. Applications utilize the services to
communicate with other devices and remote applications
o Host-to-Host layer
This layer shields the upper layers from the process of sending data. Also
provides an end-to-end connection between two devices during communication
by performing sequencing, acknowledgments, checksums, and flow control.
Applications using services at this layer can use two different protocols: TCP
and UDP
o Internet layer
The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains addressing
information and some control information that enables packets to be routed.
o Network access layer
The Network Access Layer monitors the data exchange between the host and the
network. Oversees MAC addressing and defines protocols for the physical transmission
of data
152
o IPv4
153
Binary and Decimal
154
Converting Between Decimal Numbers and Binary
155
Range of IPv4 address
156
IP Address Classification
157
Types of communication
In an IPv4 network, the hosts can communicate one of three different ways
1. Unicast
2. Broadcast
3. Multicast
158
Unicast Transmission
The process of sending a packet from one host to an individual host.
159
Broadcast Transmission
The process of sending a packet from one host to all hosts in the network
160
Multicast Transmission
• The process of sending a packet from one host to a selected group of hosts,
possibly in different networks.
161
Network & Host portions
IP address is divided into Network & Host Portion
CLASS A N.H.H.H
CLASS B N.N.H.H
CLASS C N.N.N.H
162
Class C-Range N.N.N.H 192.168.1.X X= 0 - 255
First three portions has to be same in order to be in the same network.
192.168.1.0
192.168.1.1
192.168.1.2
192.168.1…
…………….
…………….
…………….
192.168.1.253
192.168.1.254
192.168.1.255
163
Class B-Range N.N.H.H 172.16.X.X X= 0 - 255
First two portions has to be same in order to be in the same network .
164
Class A-Range N.H.H.H 10.X.X.X X= 0 - 255
First one portions has to be same in order to be in the same network.
165
Number of hosts address in each class
166
Network address broadcast address host address
167
Network address broadcast address host address continued…
168
Subnet Mask
o Helps identify network and host portion of network
o Default subnet masks:
• Class A: 255.0.0.0 or /8
• Class B: 255.255.0.0 or /16
• Class C: 255.255.255.0 or /24
169
IPv4 Addresses: Public & Private
170
Public IP Private IP
Used on public network( INTERNET) Used with the LAN or within the organization
Recognized on Internet Not recognized on internet
Registered Unregistered IP
171
Where do Public IP Addresses Come From?
172
IPv4 Addresses: Private
173
IPv4 Addresses: Public
174
IPv4 Addresses: Reserved
• 0.0.0.0
o Loopback
• 127.anything
o APIPA
169.254.anything
175
IPv4 Addressing; Configuration and Verification
176
IP addressing – Router Configuration
o Verification
177
What’s my IP?
178
IPv4 Subnetting
o A subnet is a sub-network of a network that falls
within the class A, B or C range.
179
180
181
182
183
184
185
186
187
188
189
CIDR
190
191
CIDR Exercises
/8
/9
/24
/25
/27
/30
192
Prefix address (Classless Inter-Domain Routing)
• Method that ISPs use to allocate a number of addresses to a company, a home – a customer.
• They provide address in certain block size example 192.168.10.32/28.
• / Notation means how many bits are turned on (1s).
Class-C CIDR
Example: 200.10.10.0/27
Example: 172.10.0.0/18
Example: 170.20.0.0/25
201
VLSM
202
Requirements of Hosts
Site-A: 100 Site-B: 20 Site-C: 40 and Site-C: 10
Lets arrange it as the largest number of requirement first
203
Requirements of Hosts
204
Requirements of Hosts
205
Requirements of Hosts
206
192.168.1.192 – 223 /27
207
208
209
210
VLSM Example-1
192.16.10.0/24
F0/0 F0/0
S0/1 S0/1
S0/0 S0/0
S0/0
S0/0
S0/1 S0/1
F0/0 F0/0
VLSM Example-1
32 B 192.16.10.0/27 —NA
192.16.10.31/27 ----BR
32 C 192.16.10.32/27 —NA
192.16.10.63/27 ---BR
16 A 192.16.10.64/28 —NA
192.16.10.79/28 ---BR
8 D 192.16.10.80/28 —NA
192.16.10.87/28 ---BR
E 192.16.10.88/30 —NA
4 192.16.10.91/30 ---BR
F 192.16.10.92/30 —NA
4 192.16.10.95/30 --BR
G 192.16.10.96/30 —NA
4 192.16.10.99/30 ---BR
4 H 192.16.10.100/30 —NA
192.16.10.103/30 —BR
VLSM Example-2
192.16.10.0/24
F0/2
F0/1
S0/2 S0/2
F0/0
S0/0 S0/1 F0/0
S0/0
S0/1
F0/1
F0/0
F0/1 F0/0
VLSM Example-2
192.16.10.0/24
Network Hosts Block Size Prefix Subnet
A 30 32 /27 255.255.255.224
B 10 16 /28 255.255.255.240
C 12 16 /28 255.255.255.240
D 2 4 /30 255.255.255.252
E 2 4 /30 255.255.255.252
F 2 4 /30 255.255.255.252
G 12 16 /28 255.255.255.240
H 60 64 /26 255.255.255.192
I 14 16 /28 255.255.255.240
J 60 64 /26 255.255.255.192
K 8 16 /28 255.255.255.240
VLSM Example-2
64 H 192.16.10.0/26 —NA
192.16.10.63/26 ----BR
64 J 192.16.10.64/26 —NA
192.16.10.127/26 ---BR
32 A 192.16.10.128/27 —NA
192.16.10.159/27 ---BR
16 B 192.16.10.160/28 —NA
192.16.10.175/28 ---BR
C 192.16.10.176/28 —NA
16 192.16.10.191/28 ---BR
G 192.16.10.192/28 —NA
16 192.16.10.207/28 --BR
I 192.16.10.208/28 —NA
16 192.16.10.223/28 ---BR
K 192.16.10.224/28 —NA
16 192.16.10.239/28 —BR
D 192.16.10.240/30 —NA
4 192.16.10.243/30 —BR
4 E 192.16.10.244/30 —NA
192.16.10.247/30 —BR
4 F 192.16.10.248/30 —NA
192.16.10.251/30 —BR
IPv4 Summarization
o Process of combining multiple subnetworks into a single
network advertisement.
217
Summarization Example
Let’s say we want to create the most optimal summary for the following 4 networks:
219
o Introduction to IPv6
220
o Introduction to IPv6
• 128-bit addressing system
• Example: 2001:0000:0000:0000:0000:0001:1230:000A
221
Hexadecimal to Decimal and Binary
222
IPv6 Address Structure
An IPv6 address is made of 128 bits divided into
eight 16-bits blocks. Each block is then converted
into 4-digit Hexadecimal numbers separated by
colon symbols.
2 0 0 1
2001:0000:3238:DFE1:0063:0000:0000:FEFB
223
Shortening IPv6 Addresses
o If two of more blocks contain consecutive zeroes, omit them all and replace
with double colon sign ::
•Original: 2041:0000:140F:0000:0000:0000:875B:131B
•Short: 2041:0000:140F::875B:131B
•Shorter: 2041:0:140F::875B:131B
224
Shortening IPv6 Addresses: Practice Exercise
225
IPv4 and IPv6 Header
226
IPv6: Interface-IDs
o Interface Identifier
227
Conversion of EUI-64 ID into IPv6 Interface Identifier
To convert EUI-64 ID into IPv6 Interface Identifier, the most significant 7th bit of EUI-64 ID
is complemented. For example:
228
IPv6 Addresses type
229
IPv6 Addresses type
o Unicast
• Global Unicast
The global unicast IPv6 addresses are similar to IPv4 public addresses.
These addresses can be used on the Internet.
3 bits set to 001; ex: 2000::/3
• Unique Local
Unique local addresses work like the IPv4 private addresses.
You can use these addresses on your own network if you don’t intend
to connect to the Internet or if you plan to use IPv6 NAT.
Always begin with “FC00::/7”
o Link-Local
• Assigned automatically as an IPv6 host comes online
• Similar to the 169.254.x.x address of IPv4
• Always begin with “FE80::/10”
• Last 64 bits is the 48-bit MAC address with “FFFE”
inserted in the middle
230
o Multicast Address
• FF00::/8
• As long as the first 8-bits take the form of 1111 1111, that’s a
multicast address
• IPv6 nodes listen to several IPv6 Multicast Groups by default
o Anycast
• Two-or-more nodes using the same IPv6 address
• Used for load-balancing
• Any unicast address that you use on more than one device is suddenly
an anycast address.
231
o Loopback
• Written as ::1
• Also known as localhost
• Similar to the IPv4 127.0.0.1addresses
• Can be used to verify the IPv6 stack functionality
127 Zeros 1
0000 0000 0000 0000:0000 0000 0000 0000:0000 0000 0000 0000:0000 0000 0000 0000:
0000 0000 0000 0000:0000 0000 0000 0000:0000 0000 0000 0001
0000:0000:0000:0000:0000:0000:0000:0001
::1
232