Network Slides
Network Slides
Network Slides
Network?
• Computer networks and the sharing of electronic data encourage the use
of
standard policies and procedures.
• Computer networks provide backup and recovery support for our data,
i.e., redundancy.
It’s Purpose
• Gives us a guide to understanding how networks operate.
00:21:70:6f:06:f2 00-21-70-6F-06-F2
• Physical
o Cabling, Connectors, Equipment, etc.
• Logical
o Network Access Method, i.e., Carrier Sense Multiple Access
(CSMA)
Physical vs. Logical
Topologies
Physical topologies describe the placement of network devices
and how they are physically connected.
Circuit-Level Firewalls
• 2nd Generation
• Monitors Valid/Invalid TCP Sessions
DB-25
• 25-pin connection previously
commonly
used for serial printer connections.
TIA/EIA 568A & 568B Wiring
• Standards
Industry-standard that specifies the
pin arrangement for RJ-45
connectors.
• Two Standards:
• 568A & 568B
• 568B is newer and the recommended
standard.
• Either can be used.
• Why are standards important?
o Lower Costs
o Increase Interoperability
o Easier Maintenance
Straight-Through & Crossover
Cables
Straight-Through Cable Crossover Cable
• Connecting “Unlike” • Connecting “Like”
Devices Devices
o Computer to Switch o Router to Router
o Switch to Router o Computer to Computer
Which Twisted Pairs Are Used?
Ethernet & Fast Ethernet Gigabit & 10 Gigabit Ethernet
Cat 3 and Cat 5 Cat 5e & Faster
Only Green and Orange Pairs All Four Pairs Used:
Used: • Supports bi-directional data transmission
• Pins 1, 2, 3, and 6 on each pair of wires.
o One P air to Transmit Data (TX)
o One P air to Receive Data (RX)
The
• Plenum
The plenum is the open space above the ceiling or below a raised floor.
• A “plenum space” is the part of a building that enables air circulation by
providing pathways for heated/air-conditioned and return airflows at a
higher pressure than normal.
• All network cabling placed in the plenum should be “plenum-rated.”
Non-Plenum-Rated & Fire
• Hazard
Non-plenum cable or polyvinyl chloride
(PVC) cable is often much less expensive
than plenum-rated cable.
• When PVC burns or smolders, it releases
toxic fumes into the air (Hydrochloric
Acid and Dioxin).
• The plenum air return would
unknowingly circulate toxic air
throughout an office.
• Sprinkler systems typically can’t access
the
plenum area.
• Building codes often require Plenum
Rated cable installed through any
plenum space.
Plenum-Rated
• Cables
Plenum-rated cables have a special insulation that has low
smoke,
low flame and non-toxic characteristics.
• Coated with nonflammable materials that minimize toxic fumes:
o Teflon
o Fluorinated ethylene polymer (FEP)
o Low-Smoke PVC
Fiber Optic
• Cabling
Glass or plastic fiber that carries light (photons)
o High Bandwidth: Photons travel faster than electrons.
o Long Distances: Less attenuation.
o Immune to Electromagnetic Interference (EMI)
o Doesn’t Emanate Signals
• Two Types
o Multi-mode Fiber (MMF)
• Shorter Distances (LAN / Building-to-Building)
• Up to 2 Kilometers
o Single-mode Fiber (SMF)
• More expensive than multi-mode
• Longer Distances (WAN / Across Town)
• Up to 200 Kilometers
Distance Requirements
• Electrical signals degrade relatively quickly (100 meters)
• Fiber can transmit over long distances
If a computer knows a device’s IP address but not its MAC address, it’ll send a
broadcast
message to all devices on the LAN asking which device is assigned that MAC address.
The Internet Protocol
• An OSI Layer (IP)
3 protocol that defines routing and logical addressing of
packets
that allow data to traverse WANs and the Internet.
• It specifies the formatting of packets and the logical addressing schema
o IP addresses: IPv4 and IPv6
• Its job is to connect different OSI Layer 2 (switched) networks together.
• Provides end-to-end connectivity from one Layer 2 network to another via
routers.
The Internet Protocol
• (IP)
It’s connectionless and, therefore, unreliable (similar to UDP).
o No continued connection.
• Each packet sent is independent of each other packet.
o TCP and other protocols provide a means to reassemble them
properly.
o Packets don’t always follow the same path to their destination.
o They’re sent via the most efficient route.
• Doesn’t provide any error recovery or sequencing functionality.
o That’s the job of other protocols.
Internet Control Message Protocol
• (ICMP)
OSI Layer 3 Internet Protocol (IP) companion “error reporting” protocol
within
the TCP/IP suite of protocols.
• Just like IP, it’s connectionless.
• Used to generate error messages to the source IP address when
network issues prevent the delivery of a packet.
• Typically used by routers to report packet delivery issues, and,
most importantly, it can report errors but not correct them.
• Commonly used by IT administrators to troubleshoot network
connections with command-line utilities, including ping, pathping, and
traceroute.
• For IPv6, it is also used for:
o Neighbor Solicitation and Advertisement Messages (Similar to ARP)
o Router Solicitation and Advertisement Messages
(Some) ICMP Message Types
• Echo Request, Echo Reply: Tests destination accessibility and status. A host sends an
Echo Request and listens for a corresponding Echo Reply. Commonly done using the
ping command.
• Destination Unreachable: Sent by a router when it can’t deliver an IP packet.
• Source Quench: Sent by a host or router if it’s receiving too much data than it can
handle.
The message requests that the source reduces its rate of data transmission.
• Redirect Message: Sent by a router if it receives a packet that should have been sent
to a different router. The message includes the IP address to which future packets
should be sent and is used to optimize the routing.
• Time Exceeded: Sent by a router if a packet has reached the maximum limit of
routers through which it can travel.
• Router Advertisement, Router Solicitation (IPv6): Allow hosts to discover the existence
of routers. Routers periodically multicast their IP addresses via Router Advertisement
messages. Hosts may also request a router IP address by broadcasting a Router
Solicitation message, then wait for a router to reply with a Router Advertisement.
Understanding Protocols, Ports, and
Sockets
Protocols
• Computers communicate with each other with network
protocols.
• Protocols are rules governing how machines exchange data
and enable effective communication.
• In an operating system (OS), a protocol runs as a process or
service.
Ports
• Ports are logical constructs that bind a unique port number to
a protocol process or service.
Sockets
• Sockets are a combination of an IP address and a port number,
for example, 192.168.1.1:80.
Why We Need Ports and
• Sockets
Computers require ports because of network
application multitasking.
• Because a computer may have only one IP
address, it needs ports to differentiate network
protocols and services running on it.
• TCP/IP has 65,536 ports available
Dynamic Ports 49,152 – 65,535 Not registered and used for any purpose.
Protocols & Port
Numbers
Service, Protocol, or Application Port Number(s) TCP or UDP
FTP (File Transfer Protocol) 20, 21 TCP
Telnet 23 TCP
• A Microsoft protocol that allows users to remotely connect to, view, and
control acomputer from a Windows
remote
desktop.
• Built into the M icrosoft operating system.
• Uses TCP port 3389 by default
Application Layer File Transfer
• Protocols
File Transfer P rotocol (FTP)
• Secure File Transfer Protocol
(SFTP)
• Trivial File Transfer P rotocol
(TFTP )
File Transfer Protocol
(FTP)
Ports: 20, 21
Protocol: TCP
Transport Layer
• HTTP over Secure Socket Layer (SSL) or Transport Layer Security (TLS)
• A secure version of HTTP that utilizes SSL/TLS to encrypts HTTP
content
• Utilizes Public Key Infrastructure (PKI)
• Uses TCP Port 443 by default
Understanding IPv4
• Addresses
An IP Address is a logical address used in order to uniquely identify a
device on an IP network.
• It’s a Network Layer Address
• There are Two Versions:
o IP version 4 (IPv4)
o IP version 6 (IPv6)
• This lesson focuses on IPv4, and we’ll discuss IPv6 later in the course.
IPv4 Address
• Anatomy
Made up of 32 binary bits, which can be divided into a network portion
and a
host portion with the help of a subnet mask.
o The 32 binary bits are broken into four octets (1 octet = 8 bits).
o Each octet is converted to decimal and separated by a period (dot).
o For this reason, an IP address is said to be expressed in dotted decimal format.
IPv4 Address
Anatomy
Remember This
128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255
What is the binary 11111111 in
decimal?
128 64 32 16 8 4 2 1
Binary 1 1 1 1 1 1 1 1
Decimal 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255 Decimal
Start adding the numbers from left to right until you achieve the decimal
amount you are looking for!
What’s 202 in
binary?
128 64 32 16 8 4 2 1
Binary 1 1 0 0 1 0 1 0 = 11001010
Decimal 128 + 64 + 0 + 0 + 8 + 0 + 2 + 0 = 202 Decimal
Start adding the numbers from left to right until you achieve the decimal
amount you are looking for!
What’s 54 in
binary?
128 64 32 16 8 4 2 1
Binary 0 0 1 1 0 1 1 0 = 00110110
Decimal 0 + 0 + 32 + 16 + 0 + 4 + 2 + 0 = 54 Decimal
Start adding the numbers from left to right until you achieve the decimal
amount you are looking for!
IP Address Conversion
Process
192. 168. 32. 4 Dotted Decimal
CONVERSION CHART
128 + 64 + 32 + 16 + 8 + 4 + 2 + 1
128 64 32 16 8 4 2 1
Binary 1 1 1 1 0 0 0 0 =
Decimal 128 + 64 + 32 + 16 + 0 + 0 + 0 + 0 = 240 Decimal
128 64 32 16 8 4 2 1
Binary 1 0 0 1 1 0 0 1 =
Decimal 128 + 0 + 0 + 16 + 8 + 0 + 0 + 1 = 153 Decimal
128 64 32 16 8 4 2 1
Binary 0 1 1 0 1 0 1 1 =
Decimal 0 + 64 + 32 + 0 + 8 + 0 + 2 + 1 = 107 Decimal
128 64 32 16 8 4 2 1
Binary 1 0 1 1 0 0 1 1 =
Decimal 128 + 0 + 32 + 16 + 0 + 0 + 2 + 1 = 179 Decimal
128 64 32 16 8 4 2 1
Binary 1 1 1 1 0 0 0 0 = 11110000 Binary
Decimal 128 + 64 + 32 + 16 + 0 + 0 + 0 + 0 =
Binary Math Worksheet ANSWER KEY
128 64 32 16 8 4 2 1
Binary 1 0 1 0 0 0 1 1 = 10100011 Binary
Decimal 128 + 0 + 32 + 0 + 0 + 0 + 2 + 1 =
7. CONVERT 94 TO BINARY
128 64 32 16 8 4 2 1
Binary 0 1 0 1 1 1 1 0 = 01011110 Binary
Decimal 0 + 64 + 0 + 16 + 8 + 4 + 2 + 0 =
128 64 32 16 8 4 2 1
Binary 1 1 1 0 0 0 0 1 = 11100001 Binary
Decimal 128 + 64 + 32 + 0 + 0 + 0 + 0 + 1 =
192.168.98.18
192 = 11000000
168 = 10101000
98 = 01100010
18 = 00010010
01000010.11010010.11000110.11000101
01000010 = 66
11010010 = 210
11000110 = 198
11000101 = 197
CONVERSION CHART
128 + 64 + 32 + 16 + 8 + 4 + 2 + 1
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
Binary Math Worksheet
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
7. CONVERT 94 TO BINARY
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
128 64 32 16 8 4 2 1
Binary =
Decimal + + + + + + + =
192.168.98.18
01000010.11010010.11000110.11000101
IPv4 Address Classes
(Simplified)
Class Network Bits Host Bits Address Range
A 8 24 1.0.0.0 – 126.255.255.255
B 16 16 128.0.0.0 – 191.255.255.255
C 24 8 192.0.0.0 – 223.255.255.255
Network and Host
Bits
IPv4 Address Classes
(Detailed)
Leading Network Remaining Number of Hosts Per Default
Class
Bits Bits Bits Networks Network Subnet Mask
• IP Address: 9.10.40.15
• Subnet Mask: 255.0.0.0
• IP Address: 135.240.110.100
• Subnet Mask: 255.255.0.0
• IP Address: 196.200.10.5
• Subnet Mask: 255.255.255.0
CIDR Notation
• CIDR: Classless Inter-Domain Routing
o A methodology for subnetting
o “Slash” Notation tells you how many bits are associated with the Subnet
Mask
21 = 2 22 = 4 23 = 8 24 = 16
25 = 32 26 = 64 27 = 128 28 = 256
Host Bits Left 2y Addresses per Subnet (2y) Hosts per Subnet (2y – 2)
1 21 2 0
2 22 4 2
3 23 8 6
4 24 16 14
5 25 32 30
6 26 64 62
7 27 128 126
8 28 256 254
9 29 512 510
10 210 1,024 1,022
11 211 2,048 2,046
12 212 4,096 4,094
Subnetting Reference Material
21
= 2 29
= 512
= 4 = 1,024
22 = 8 210 = 2,048
= 16 = 4,096
23 211
= 32 = 8,192
24 = 64 212 = 16,384
= 128 = 32,768
25 = 256 213 = 65,536
26 214
DEFAULT
7 SUBNET MASK
2 215
2Class
8 Format Default216
Subnet Mask
A network.host.host.host 255.0.0.0
B network.network.host.host 255.255.0.0
C network.network.network.host 255.255.255.0
128 64 32 16 8 4 2 1
1 1 1 1 1 1 1 1
Subnetting Reference Material
Binary Decimal
00000000 0
10000000 128
11000000 192
11100000 224
11110000 240
11111000 248
11111100 252
Binary (N.N.N.H) Decimal CIDR # Subnets (2x) Block Size (2y) # Hosts (2y - 2)
N.N.N.00000000 255.255.255.0 /24 20 = 1 28 = 256 28 – 2 = 254
N.N.N.10000000 255.255.255.128 /25 21 = 2 27 = 128 27 – 2 = 126
N.N.N.11000000 255.255.255.192 /26 22 = 4 26 = 64 26 – 2 = 62
N.N.N.11100000 255.255.255.224 /27 23 = 8 25 = 32 25 – 2 = 30
N.N.N.11110000 255.255.255.240 /28 24 = 16 24 = 16 24 – 2 = 14
N.N.N.11111000 255.255.255.248 /29 25 = 32 23 = 8 23 – 2 = 6
N.N.N.11111100 255.255.255.252 /30 26 = 64 22 = 4 22 – 2 = 2
Binary (N.N.H.H) Decimal CIDR # Subnets (2x) Block Size (2y) # Hosts (2y - 2)
N.N.00000000.00000000 255.255.0.0 /16 2 =1
0
2 = 65,536
16
216 – 2 = 65,534
N.N.10000000.00000000 255.255.128.0 /17 21 = 2 215 = 32,768 215 – 2 = 32,766
N.N.11000000.00000000 255.255.192.0 /18 22 = 4 214 = 16,384 214 – 2 = 16,382
N.N.11100000.00000000 255.255.224.0 /19 23 = 8 213 = 8,192 213 – 2 = 8,190
N.N.11110000.00000000 255.255.240.0 /20 24 = 16 212 = 4,096 212 – 2 = 4,094
N.N.11111000.00000000 255.255.248.0 /21 25 = 32 211 = 2,048 211 – 2 = 2,046
N.N.11111100.00000000 255.255.252.0 /22 26 = 64 210 = 1,024 210 – 2 = 1,022
N.N.11111110.00000000 255.255.254.0 /23 27 = 128 29 = 512 29 – 2 = 510
N.N.11111111.00000000 255.255.255.0 /24 28 = 256 28 = 256 28 – 2 = 254
N.N.11111111.10000000 255.255.255.128 /25 29 = 512 27 = 128 27 – 2 = 126
N.N.11111111.11000000 255.255.255.192 /26 210 = 1,024 26 = 64 26 – 2 = 62
N.N.11111111.11100000 255.255.255.224 /27 211 = 2,048 25 = 32 25 – 2 = 30
N.N.11111111.11110000 255.255.255.240 /28 212 = 4,096 24 = 16 24 – 2 = 14
N.N.11111111.11111000 255.255.255.248 /29 213 = 8,192 23 = 8 23 – 2 = 6
N.N.11111111.11111100 255.255.255.252 /30 214 = 16,384 22 = 4 22 – 2 = 2
Subnetting Reference Material
Binary (N.H.H.H) Decimal CIDR # Subnets (2x) Block Size (2y) # Hosts (2y - 2)
N.00000000.00000000.00000000 255.0.0.0 /8 20 = 1 222 = 16,777,216 222 – 2 = 16,777,214
N.10000000.00000000.00000000 255.128.0.0 /9 21 = 2 223 = 8,388,608 223 – 2 = 8,388,606
N.11000000.00000000.00000000 255.192.0.0 /10 22 = 4 222 = 4,194,304 222 – 2 = 4,194,302
N.11100000.00000000.00000000 255.224.0.0 /11 23 = 8 221 = 2,097,152 221 – 2 = 2,097,150
N.11110000.00000000.00000000 255.240.0.0 /12 24 = 16 220 = 1,048,576 220 – 2 = 1,048,574
N.11111000.00000000.00000000 255.248.0.0 /13 25 = 32 219 = 524,288 219 – 2 = 524,286
N.11111100.00000000.00000000 255.252.0.0 /14 26 = 64 218 = 262,144 218 – 2 = 262,142
N.11111110.00000000.00000000 255.254.0.0 /15 27 = 128 217 = 131,072 217 – 2 = 131,070
N.11111111.00000000.00000000 255.255.0.0 /16 28 = 256 216 = 65,536 216 – 2 = 65,534
N.11111111.10000000.00000000 255.255.128.0 /17 29 = 512 215 = 32,768 215 – 2 = 32,766
N.11111111.11000000.00000000 255.255.192.0 /18 210 = 1,024 214 = 16,384 214 – 2 = 16,382
N.11111111.11100000.00000000 255.255.224.0 /19 211 = 2,048 213 = 8,192 213 – 2 = 8,190
N.11111111.11110000.00000000 255.255.240.0 /20 212 = 4,096 212 = 4,096 212 – 2 = 4,094
N.11111111.11111000.00000000 255.255.248.0 /21 213 = 8,192 211 = 2,048 211 – 2 = 2,046
N.11111111.11111100.00000000 255.255.252.0 /22 214 = 16,384 210 = 1,024 210 – 2 = 1,022
N.11111111.11111110.00000000 255.255.254.0 /23 215 = 32,768 29 = 512 29 – 2 = 510
N.11111111.11111111.00000000 255.255.255.0 /24 216 = 65,536 28 = 256 28 – 2 = 254
N.11111111.11111111.10000000 255.255.255.128 /25 217 = 131,072 27 = 128 27 – 2 = 126
N.11111111.11111111.11000000 255.255.255.192 /26 218 = 262,144 26 = 64 26 – 2 = 62
N.11111111.11111111.11100000 255.255.255.224 /27 219 = 524,288 25 = 32 25 – 2 = 30
N.11111111.11111111.11110000 255.255.255.240 /28 220 = 1,048,576 24 = 16 24 – 2 = 14
N.11111111.11111111.11111000 255.255.255.248 /29 221 = 2,097,152 23 = 8 23 – 2 = 6
N.11111111.11111111.11111100 255.255.255.252 /30 222 = 4,194,304 22 = 4 22 – 2 = 2
Subnetting a Class C Network
#1
Details & Requirements
You’ve been assigned a 192.168.1.0/24 Class C network, and
you need to create two subnets from it. Subnet #1 #2
How many host bit do we need to borrow? Network Address 192.168.1.0 192.168.1.128
1 host bit, 2 = 2 Subnets
1