NW Overview
NW Overview
NW Overview
Ermiyas 1 Ermiyas 2
Ermiyas 3 Ermiyas 4
Ermiyas 5 Ermiyas 6
1
11/18/2017
Ermiyas 7 Ermiyas 8
Ermiyas 9 Ermiyas 10
Ermiyas 11 Ermiyas 12
2
11/18/2017
Ermiyas 13 Ermiyas 14
3
11/18/2017
Special servers(Cont.)
• Communication server
– Manages communication between own network
and other networks
• Directory service server NETWORK TOPOLOGY
– Manage user login to the network
– Manage resources
– Enable users to access resources in the network
Ermiyas 19 Ermiyas 20
Ermiyas 21 Ermiyas 22
Bus topology
Communication in Bus topology
• Only one computer can send signal on the
network
• Signal is sent to all computers on the network
• The computer for whom the signal is sent
accept the message
• The other computer reject it
• These rejected signal should be stopped
• Both end should be terminated using a
terminator
Ermiyas 23 Ermiyas 24
4
11/18/2017
Ermiyas 25 Ermiyas 26
Ermiyas 27 Ermiyas 28
Ermiyas 29 Ermiyas 30
5
11/18/2017
Ermiyas 31 Ermiyas 32
Ermiyas 33 Ermiyas 34
Ermiyas 35 Ermiyas 36
6
11/18/2017
Ermiyas 37 Ermiyas 38
Ermiyas 39 Ermiyas 40
Ermiyas 41 Ermiyas 42
7
11/18/2017
Ermiyas 43 Ermiyas 44
Ermiyas 45 Ermiyas 46
Ermiyas 47 Ermiyas 48
8
11/18/2017
Ermiyas 49 Ermiyas 50
Ermiyas 51 Ermiyas 52
9
11/18/2017
ST
10BaseT:
10=> 10mb/s transmission rate
Base=>Base band transmission type
T=> cable type
Ermiyas 55 Ermiyas 56
Cabling
UTP cabling wire colors are two
types
Ermiyas 57 Ermiyas 58
Ermiyas 59 Ermiyas 60
10
11/18/2017
Use straight-
straight-through cables for the following
connections: Straight through
• Switch to router
• Switch to PC or server
• Hub to PC or server
Ermiyas 61 Ermiyas 62
Ermiyas 63 Ermiyas 64
Ermiyas 65 Ermiyas 66
11
11/18/2017
Ermiyas 67 Ermiyas 68
Ermiyas 69 Ermiyas 70
Roll over
Ermiyas 71 Ermiyas 72
12
11/18/2017
Ermiyas 73 Ermiyas 74
Wireless
Ermiyas 75 Ermiyas 76
Ermiyas 77 Ermiyas 78
13
11/18/2017
HUBS
REPEATERS
• Is two port (for signal i/o) Hubs are actually multiport repeaters
• It simply give strength for signal • Passive: used only to share the physical media
(It does not boost or clean the signal )
Ermiyas 79 Ermiyas 80
The 5-
5-4-3-2-1 rule requires that the following
Hub guidelines should not be exceeded:
Ermiyas 81 Ermiyas 82
BRIDGE
Ermiyas 83 Ermiyas 84
14
11/18/2017
Filter
BRIDGE
When a bridge receives a frame on the network, the destination • If the destination device is on the same
MAC address is looked up in the bridge table to determine
whether to:- segment as the frame, the bridge will not send
Filter the frame onto other segments. This process
Flood is known as filtering
Copy the frame onto another segment
Ermiyas 85 Ermiyas 86
Ermiyas 87 Ermiyas 88
Ermiyas 89 Ermiyas 90
15
11/18/2017
Ermiyas 91 Ermiyas 92
Cabling
1. stripe the cable 3. Arrange the cables in color order and level the
edges
4. Put the cable in RJ-45
5. Crimp the connector
Ermiyas 93 Ermiyas 94
Ermiyas 95 Ermiyas 96
16
11/18/2017
Ermiyas 97 Ermiyas 98
17
11/18/2017
18
11/18/2017
Some differences of the OSI and TCP/IP models: Wireless Transmission Media
• TCP/IP combines the OSI application, presentation, and • Transmission is not through physical device but
session layers into its application layer. through air
• TCP/IP combines the OSI data link and physical layers • transmission and reception are achieved by
into its network access layer.
• TCP/IP appears simpler because it has fewer layers. means of an antenna
• When the TCP/IP transport layer uses UDP it does not • directional
provide reliable delivery of packets. The transport layer – transmitting antenna puts out focused beam
in the OSI model always does.
– transmitter and receiver must be aligned
• The Internet was developed based on the standards of
the TCP/IP protocols. • omnidirectional
• The OSI model is not generally used to build networks. – signal spreads out in all directions
The OSI model is used as a guide to help students – can be received by many antennas
understand the communication process.
19
11/18/2017
Radio frequency
• Disadvantages: • Is omnidirectional (i.e. transmits signal in all
– Direct line-of sight is important direction)
– Transmission is affected with object obstruction • Can pass signal through walls
– Interference from light source • Characteristics
– The communicating bodies should not necessarily be
in direct line of sight
• It can reach anywhere with in its diameter
– It can pass through walls
• Wireless LANs(WIFI), and Bluetooth is examples
Ermiyas 117 Ermiyas 118
20
11/18/2017
Satellite microwave
• Uses satellite
• Source transmit to Satellite
• The Satellite amplify and retransmit to the Network components
destination
21
11/18/2017
HUB
• Used as a central device in star topology • Use a hub to:
• Doesn’t filter signal – Use different ports to accommodate a variety of
– A data sent through a hub sends to all computer cable types.
• Two types of HUB – Enable central monitoring of network activity and
– Passive Hub traffic.
• Doesn’t amplify signals – Easily change and expand wiring systems.
– Active Hub
• Amplify signals
• Also called multiport repeater
22
11/18/2017
Switch Router
• Multiport bridge - • Connects different networks
• Used as a central device in star topology • It filters signal using the IP address(Not the
• Some times called intelligent hub MAC address)
• Use a switch to: • Used as a gateway to other networks including
– Send a packet directly from the source computer Internet
to the destination computer. • It determine best path
– Provide for a greater rate of data transmission.
23
11/18/2017
24
11/18/2017
CSMA/CA
• CSMA/CD is known as a contention method • Carrier sense multiple access with collision
because computers on the network contend, avoidance
or compete, for an opportunity to send data. • The least popular
• Before transmitting signal, every computer first
• Disadvantage of CSMA/CD transmit its intent to send a signal
– The more number of computer the more collision
• this allows them to avoid collisions.
and collision avoidance, results in slower network
• Disadvantage
– broadcasting the intent to transmit data increases the
amount of traffic on the cable and slows down
network performance.
Ermiyas 149 Ermiyas 150
25
11/18/2017
Introduction to Ethernet
• Is the most popular network standard
• Uses a baseband transmission
Ethernet standards – Baseband systems is a digital signaling
– A single data uses the entire bandwidth
• Have CSMA/CD access method
• Have a transfer speed of 10 or 100 Mbps
• Defined by IEEE 802.3
– IEEE- Institute of electrical and electronics
engineers
Ermiyas 155 Ermiyas 156
26
11/18/2017
27
11/18/2017
Introduction
• It is the direction of data flow between two
linked devices.
Mode of transmission • There are three ways for transmitting data
from one location to another. These are:
– Simplex mode
– Half-Duplex mode
– Full-Duplex mode
28
11/18/2017
Packet switching
• Used in computer networking • The header address also describes the sequence for
• In packet-based networks, the message gets broken reassembly at the destination computer so that the
into small data packets. These packets are sent out packets are put back into the correct order.
from the computer and they travel around the network • One packet also contains details of how many packets
seeking out the most efficient route to travel as circuits should be arriving so that the recipient computer
become available. knows if one packet has failed to turn up.
• Each packet may go a different route from the others. • If a packet fails to arrive, the recipient computer sends
• Each packet is sent with a ‘header address’. This tells it a message back to the computer which originally sent
where its final destination is, so it knows where to go. the data, asking for the missing packet to be resent
29
11/18/2017
Broadcast
Figure 3 Broadcast Network
•
• Broadcasts are found in LAN environments. Broadcasts do not traverse a
WAN unless the Layer 3 edge-routing device is configured with a helper
address (or the like) to direct these
• broadcasts to a specified network address. This Layer 3 routing device acts
as an interface between the local-area network (LAN) and the wide-area
network (WAN).
• NOTE Broadcasts will traverse a WAN if the WAN is bridged.
• NOTE Ethernet is a broadcast environment in which one device transmits
and all other devices see the transmission. Ethernet (broadcast)
operation should not be confused with other LAN or WAN broadcasts,
where the frame addressed to the broadcast address (a broadcast frame)
is copied and forwarded across the network. Figure 2-3 is an example of a
broadcast network.
• Figure 3 Broadcast Network
30
11/18/2017
Introduction
• The OSI Reference model divides the process of data
communication into 7 layers
• Each layers perform a specific task
• In each layer there is a set of protocols involved, or devices
• The seven layers
1. Physical layer
2. Data link layer
3. Network layer
4. Transport layer
5. Session layer
6. Presentation layer
7. Application layer
Application layer
• It is the layer through which users or
application programs access to the network
• It provides the interface for application
programs to access the network
• Includes programs and protocols like
– FTP: File transfer protocol
– SMTP: Simple mail transfer protocol
31
11/18/2017
32
11/18/2017
• Protocols are rules and procedures for way. This is why we have so many different protocols, each one for a specific task.
-Protocols are rules and procedures for communicating. The term "protocol" is used in a variety of contexts. For
communicating
example, diplomats from one country adhere to rules of protocol designed to help them interact smoothly with
diplomats from other countries. Rules of protocol apply in the same way in the computer environment. When
several computers are networked, the rules and technical procedures governing their communication and
• Two computers can communicate with each interaction are called protocols.
-A protocol is the basic mode or language of communication between devices on a network. Just as different
other if
nations communicate in different languages, different protocols have different languages. A protocol is a formal set
of rules and conventions that govern how computers exchange information over a network.
-A set of rules or standards that control data transmission and other interactions between networks, computers,
– They use the same protocol or peripheral devices, and operating systems.
- The same protocol must be used on the sending and receiving devices. It is possible for two devices that use
different protocols to communicate with each other, but a gateway is needed in between. This is unmodified-you
– They use compatible protocols can get the modified version later 2
- Protocols determine the format, timing, sequencing, and error control in data communication.
- Protocols control all aspects of data communication, which include the following:
• How the physical network is built
• How computers connect to the network
• How the data is formatted for transmission
• How that data is sent
• How to deal with errors
Ermiyas 193 Ermiyas 194
33
11/18/2017
TCP VS UDP
TCP UDP
• TCP is connection-oriented • UDP is connectionless
protocol. When a file or protocol. When you a send
message send it will get a data or message, you
delivered unless don't know if it'll get there,
connections fails. If
connection lost, the server it could get lost on the way.
will request the lost part. There may be corruption
There is no corruption while while transferring a
transferring a message. message.
• Reliable • Unreliable
• slower • fast
34
11/18/2017
35
11/18/2017
Network Address
LAN Addressing
• LAN (or any internetwork) addresses identify individual or groups of devices. Addressing
• schemes vary depending on the protocol family and OSI layer.
• Internet Protocol (IP) Addressing - Is a logical addressing that used to assign to the
individual computers
– - One of the most important topics in any discussion of TCP/IP is IP addressing. • Every computer on a network must have a
– - An IP address is a numeric identifier assigned to each machine on an IP network.
–
–
- An IP address is a software address, not a hardware address
- IP addressing was designed to allow a host on one network to communicate with a host on a different
unique address
network, regardless of the type of LANs the hosts are participating in.
MAC Addresses
• Media Access Control (MAC) addresses identify network devices in LANs. MAC
• If two computers have the same address an
• addresses are unique for each LAN interface on a device. MAC addresses are 48 bits in
• length and are expressed as 12 hexadecimal digits. The first six hexadecimal digits, which
address conflict occurs.
• are administered by the IEEE, identify the manufacturer or vendor and comprise the
• organizational unique identifier (OUI). The last six hexadecimal digits comprise the • Two types of network addresses
• interface serial number, or another value administered by the specific vendor. MAC
• addresses are sometimes referred to as burned-in addresses (BIAs) because they are burned – Physical address MAC address
• into read-only memory (ROM) and are copied into random-access memory (RAM) when
• the interface card initializes. – Uses a 48 bits which can be changed to 12 digit hexadecimal
number
– Logical address computer name and IP
Ermiyas 211 Ermiyas 212
36
11/18/2017
Class A Class B
• designed to meet the needs of large networks • was designed for medium-sized networks
• This class will only support 126 networks; but • This class will support 16,384 networks; and
limited to 65,534 hosts per network.
each network can support 16,777,214 hosts.
• The first two octet are the nw portion
• The first octet of the IP address is network • Considering 128.125.1.14
portion and the rest the node portion – 128.1.0.0 is the network address
– 0.0.1.14 is the host address
• Octet 3 and 4 are for nodes
• Used for nw that have b/n 256 and 65,534 nodes
Class C IP classes
• was designed for small networks; thus the number of • Given an IP address, its class can be
hosts per network will be small, however it will determined from the three high order bits
support many more networks total.
• Class A
• The first three octet are the network portion and the
remaining one for node – The first bit is 0
• Considering 192.168.1.12 Network ID
– The network address is 192.168.1.0
– The host address is 0.0.0.12
The 0possible class A24IPbitsranges
(node ID)
IP classes IP classes
• Class B • Class C
– The first two bits are 1 and 0 – The first three bits are 1,1 and 0
1 0 (14 bits) network 16 bits node id 1 1 0 (21 bits) network id 8 bits node id
id
The possible IP range for class B is The possible IP range for class C is
128.0.0.0-191.255.255.255 192.0.0.0- 223.255.255.255
37
11/18/2017
38
11/18/2017
• Explain how end user devices can obtain addresses either statically IP Addressing Structure
through an administrator or dynamically through DHCP • Practice converting decimal to 8-bit binary
128 64 32 16 8 4 2 1
240 = 1 1 1 1 0 0 0 0
Example: 01111001=64+32+16+8+1=121
240=128+64+32+16=11110000
Ermiyas 231 Ermiyas 232
IPv6 IP V4
• The current version of IP is called IPv4
– It is made up of 32 bits(4 Bytes)
– Theoretically it can support around 4.2 billion
addresses(232)
– It is currently becoming occupied(full)
• The limited capacity of IPv4 leads to the
introduction of IPv6
– It uses 128 bits(16 Bytes)
– Supports
340282366920938463463374607607431768211456
(340 Undecillion) or 2128 different addresses
– Example: IPv6 2001:0DB8:0000:2F3B:02AA:00FF:FE28:9C5A
39
11/18/2017
Ping
• Ping allows a user to ping another network IP
address. This can help determine if the
network is able to communicate with the
Network commands network.
• Syntax: Ping ipaddress eg( ping 192.168.1.1)
• Ping domain name
ipconfig hostname
• Ipconfig is a MS-DOS utility that can be used • The hostname command displays the host
to display the network settings currently name of the Windows XP computer currently
assigned and given by a network. This logged into.
command can be utilized to verify a network
connection as well as to verify your network
settings.
• Syntax
– Ipconfig
– Ipconfig/all
40
11/18/2017
Components needed
• A network interface or Local Area Network
(LAN) adapter for each computer. The same
manufacturer and model of network card is
Configuring P2P network preferred.
• Cabling that is supported by the network
cards.
• Device driver for the network card
41
11/18/2017
Subnet Example
Subnet Mask Given the Class B address 190.52.0.0
• Determines which part of an IP address is the network field and which part is Class B Network Network Host Host
the host field
• Follow these steps to determine the subnet mask: Using /24
▫ 1. Express the sub network IP address in binary form. subnet... Network Network Subnet Host
▫ 2. Replace the network and subnet portion of the address with all 1s.
▫ 3. Replace the host portion of the address with all 0s.
▫ 4. Convert the binary expression back to dotted-decimal notation. Internet routers still “see” this net as 190.52.0.0
42
11/18/2017
Subnet Example
Network Network Subnet Host
Techniques to reduce address shortage in IPv4
Subnetting Example
Classless Inter-Domain Routing
128.10.1.1 H1 128.10.1.2 H2
• Eliminates traditional classful IP routing.
• Supports the deployment of arbitrarily sized
Sub-network 128.10.1.0 networks
Internet
• Routing information is advertised with a bit
G mask/prefix length specifies the number of leftmost
contiguous bits in the network portion of each routing table
All traffic entry
to 128.10.0.0
128.10.2.1 H3 128.10.2.2 H4 • Example: 192.168.0.0/21
Net mask 255.255.0.0
Sub-network 128.10.2.0
Subnet
Ermiyas
mask 255.255.255.0 255 Ermiyas 256
NAT Example
Network Address Translation
10.0.0.4
• Each organization- C
single IP address
• Within organization – 3 Reserved ranges
each host with IP 10.0.0.0 – 10.255.255.255 (16,777,216 hosts)
B
unique to the orgn.,
172.16.0.0 – 172.31.255.255/12 (1,048,576
from reserved set of IP hosts)
10.0.0.1
addresses 192.168.0.0 – 192.168.255.255/16 (65,536
hosts) Source
Source Source
NAT Router's
NAT Router's
Computer's Computer's Assigned
Computer IP Address
IP Address Port Port Number
B 10.0.0.2 50 24.2.249.4 2
43
11/18/2017
identification flags flag-offset • ID, flags, flag offset • No option field: Replaced by extension
20
bytes
TTL protocol header checksum • TOS, hlen
• header checksum
header. Result in a fixed length, 40-byte IP
header.
source address
destination address
Changed (3)
options and padding
• total length => payload • No header checksum: Result in fast
IPv4 • protocol => next header
• TTL => hop limit
processing.
vers traffic class flow-label
Added (2) • No fragmentation at intermediate nodes:
payload length next header hop limit
• traffic class Result in fast IP forwarding.
40
bytes
source address • flow label
destination address
Expanded
• address 32 to 128 bits
IPv6
Ermiyas 261 Ermiyas 262
Conclusion
The Address Allocation Process
IPv6 is NEW …
– built on the experiences learned from IPv4 IANA http://www.iana.org/assignments/ipv4-address-space
– new features
– large address space AfriNIC APNIC ARIN LACNIC RIPE
– new efficient header
– autoconfiguration
Georgia Tech
… and OLD
– still IP
– build on a solid base • Allocation policies of RIRs affect pressure on IPv4
– started in 1995, a lot of implementations and address space
tests done
Ermiyas 263 Ermiyas 264
44
11/18/2017
Collision domain
• A collision domain is a physical network
segment where data packets can collide with
Collision domain vs. broadcast
one another when being sent on a shared
domain medium
• Device and number of collision domain
– Hub -> have one collision domain
– Switch and router have many collision domain
• How many collision domain and broadcast • How many collision domain and broadcast
domain does the following have(imagine the domain does the following have(imagine the
central device is switch)
central device is Hub)
• Answer • Answer
– 1 broadcast domain – 5 collision domain
– 1 collision domain – 1 broadcast domain
45
11/18/2017
• How many collision domain and broadcast • How many broadcast domains and collision
domain does the following have(imagine the domains can be created with a 12 port switch
central device is bridge) – Answer
• 12 collision domain
• 1 broadcast domain
• Answer
– 2 collision domain
– 1 broadcast domain
Ermiyas 271 Ermiyas 272
• How many collision domain and broadcast • How many collision domain and broadcast
domain does the following have domain does the following have
• Answer • Answer
– 2 broadcast domain – 2 broadcast domain
– 4 collision domain – 8 collision domain
Network Design
• What two results would occur if the hub were to be Steps to follow in Designing Networks (Organizational Approach)
replaced with a switch that is configured with one Ethernet New Network Establishment:
VLAN? (Choose two.)
A. The number of broadcast domains would remain the 1. Planning/Feasibility study
same. 2. Study Existing Situation
B. The number of collision domains would increase.
C. The number of collision domains would decrease. 3. Rough proposal of the designed network
D. The number of broadcast domains would decrease. 4. Requirements Analysis
E. The number of collision domains would remain the
same. 5. Design
F. The number of broadcast domains would increase. 6. Specification of network items and Procurement (Buying
• Answer: A,B items)
7. Implementation (Installations and Administration)
46
11/18/2017
Design Rule: First and foremost you must understand the Step 2... - Develop LAN Topology
customer. • LAN topology that will satisfy Step 1 requirements
• Star Topology
Design Rule: Find out what availability means to your • Extended Star Topology
customer. • Star topology -
Step 1... - Analyze Network Load Requirements • A LAN topology in which end points on a network are connected to a
• Client/Server applications common central hub/switch by point-to-point links.
• A ring topology that is organized as a star, implements a unidirectional
• Host/terminal applications closed-loop star (star wired ring), instead of point-to-point links.
• Routing protocols Step 3... - Layer 3 Addressing
• Regularly scheduled services, such as file backup • The router divides subnets and networks
• The router structures an internetwork
• Estimate worst-case traffic load during the busiest times for • Logical addressing should be mapped to the physical network
users and during regularly scheduled network services • Develop and document the IP addressing scheme to be used in the
Design Rule: Before developing an internetwork structure and network
provisioning hardware, determine the network traffic load. Step 3... - Setting Up VLAN Implementation
Design Rule: Evaluate applications that cause traffic problems • Group users by department, team, or application
(congestion). • Provide broadcast containment and security
• Routers provide communiocation between VLANs (and security)
• VLAN (Virtual LAN) - Group of devices on a LAN that are configured (using Ethernet Technology
management software) so that they can communicate as if they were Segmentation - Bridging and switching are both used for segmentation
attached to the same wire (media), when in fact they are located on a – Results in multiple collision domains
number of different LAN segments. Because VLANs are based on logical
instead of physical connections, they are extremely flexible. – Still a single broadcast domain
– Stations can get dedicated bandwidth
• What problems are you trying to solve?
• Collision domain (bandwidth domain) - In Ethernet, the network area
• Media contention within which frames that have collided are propagated (everything
– too many devices, all with a high demand for the network segment associated with one port on a bridge or switch). Repeaters and hubs
• Excessive broadcasts propagate collisions; LAN switches, bridges and routers do not.
– client packets looking for services • Broadcast domain - The set of all devices that will receive broadcast
– too many server packets announcing services frames originating from any device within the set. Broadcast domains are
– too many routing table updates typically bounded by routers because routers do not forward broadcast
• Need to transport new payloads frames (everything associated with one port on a router).
– voice and video network services • All broadcasts from any host in the same broadcast domain are visible to
• Need for more bandwidth all other hosts in the same broadcast domain. Broadcasts must be visible
to all hosts in the broadcast domain in order to establish connectivity.
• Overloaded backbone • The scalability of the collision domain depends on total traffic, and the
• Network-layer addressing issues scalability for a broadcast domain depends on total broadcast traffic.
– running out of IP addresses
– need for physically separate subnets
– other issues dependent on the protocols
47
11/18/2017
• Topology - Physical arrangement of network nodes and media • EIA/TIA-568 - Standard that describes the characteristics and applications for various grades
within an enterprise networking structure. of UTP cabling.
• Cable Plant types: • Category 5 (CAT5) cabling - One of five grades of UTP cabling described in the EIA/TIA-568B
standard. Category 5 cabling is used for running CDDI and can transmit data at speeds up to
• Electrical (copper) 100 Mbps.
– coaxial • In a simple star with only one wiring closet, the main distribution facility (MDF) will include
– twisted pair one or more horizontal cross connect (HCC) patch panels. HCC patch cables will be used to
• Fiber-optic connect the Layer 1 'horizontal cabling' with the Layer 2 LAN switch ports. The uplink port of
the LAN switch will be connected to the Ethernet port of the Layer 3 router using 'patch
– multimode cable' also. At this point the end host will have a complete physical connection to the router
– single-mode port. The quantity of horizontal cable run and the size (number of ports) of the HCC patch
• Wiring configurations panels will be determined by the user's requirements.
– Star / Extended Star • Design Hint: Review the user’s requirements to determine what the user expects for the
number of horizontal cable runs to each room that the MDF or IDF will be servicing in its
– Distance limitations catchment area.
• Star Topology using CAT5 (UTP): • Extended Star Topology:
• Specified by EIA/TIA 568 standard • Specified by EIA/TIA standards
• The MDF is the center of the star • Creates multiple catchment areas interconnected with vertical cabling
• The MDF is the Point of Presence (POP) for outside services from • All vertical cabling is connected to the MDF to create a single LAN segment
the WAN provider • Vertical cabling - (Backbone cabling) Cabling that provides interconnections between wiring
closets, wiring closets and the POP, and between buildings that are part of the same LAN.
• Catchment areas - Zone that falls within area that can be served by an internetworking device
such as a hub.
Ermiyas 285 Ermiyas 286
48
11/18/2017
• Layer 3 - Routing
• Implementation of Layer 3 (Network Layer) devices such as routers allow for • Enterprise network - Large and diverse network connecting most
segmentation of the LAN into unique networks both physical and logical. Routers major points in a company or other organization. Differs from a
also allow for connectivity to wide area networks (WANS) such as the Internet. WAN in that it is privately owned and maintained. Enterprise servers
• Routers serve as broadcast firewalls - support all of the users on the network such as E-mail or DNS.
• Routers consolidate for scalable internetworks Work Group servers - support a specific set of users.
• Network protocol addressing and routing provides built-in scaling • Since everyone on the network needs access to the enterprise
• Use Routers to Impose Logical Structure servers, it should be connected to the MDF. This way traffic to these
• One router divides subnets and networks type of services only have to travel to the MDF and will not be
• One router structures an internetwork transmitted across other networks.
• Routers serve as broadcast firewalls • Workgroup - Collection of workstations and servers on a LAN that
• Routers permit greater scalability because they serve as firewalls for broadcasts are designed to communicate and exchange data with one another.
(broadcast domains). With bridges and switches, all unknown addresses must be
flooded out every port. The router also is the central point in the LAN for traffic • The Workgroup servers should be placed in the IDF closest to the
destination of the WAN port. users accessing these applications. By doing this, traffic to these
• File Servers and Traffic Patterns servers will only have to travel network infrastructure to that IDF
• One of the keys to designing a successful network is to understand the data traffic and will not affect other users on that network segment.
network. The Applications (servers) can be categorized into two distinct classes -
(1) 'enterprise servers' and (2) 'workgroup servers'. Within the MDF and IDFs, the
Layer 2 LAN switches must have high speed (100MBps) ports allocated for these
servers.
VLAN
49
11/18/2017
• Routing is used for taking a packet (data) from one device and sending it through
the network to another device on a different network. If your network has no
routers then you are not routing. Routers route traffic to all the networks in your
internetwork. To be able to route packets, a router must know the following :
– Destination address
– Neighbor routers from which it can lean about remote networks
– Possible routes to all remote networks
– The best route to each remote network
• How to maintain and verify routing information
• Before we go on, I would like to define 3 networking terms :
• Convergence: The process required for all routers in an internetwork to update
their routing tables and create a consistent view of the network, using the best
possible paths. No user data is passed during convergence.
• Default Route: A "standard" route entry in a routing table which is used as a first
option. Any packets sent by a device will be sent first to the default route. If that
Thank u!
fails, it will try alternative routes.
• Static Route: A permanent route entered manually into a routing table. This route
will remain in the table, even if the link goes down. It can only be erased manually.
• Dynamic Route: A route entry which is dynamically (automatically) updated as
changes to the network occur. Dynamic routes are basically the opposite to static
routes.
50