26
What is a Network ? What is a Network ? A network is a collection of computers and A network is a collection of computers and devices connected by communications devices connected by communications channels that facilitates communications channels that facilitates communications among users and allows users to share among users and allows users to share resources with other users. resources with other users. The connectivity can be wired or wireless. The connectivity can be wired or wireless. Networks are built with a mix of computer Networks are built with a mix of computer hardware and computer software. hardware and computer software.

Networking in college

Embed Size (px)

Citation preview

Page 1: Networking in college

What is a Network ?What is a Network ?

A network is a collection of computers and A network is a collection of computers and devices connected by communications channels devices connected by communications channels that facilitates communications among users and that facilitates communications among users and allows users to share resources with other users. allows users to share resources with other users.

The connectivity can be wired or wireless.The connectivity can be wired or wireless. Networks are built with a mix of computer Networks are built with a mix of computer

hardware and computer software.hardware and computer software.

Page 2: Networking in college

Network ClassificationNetwork Classification

By Range:-By Range:- Local Area Network ( LAN )Local Area Network ( LAN ) Metropolitan Area Network ( MAN )Metropolitan Area Network ( MAN ) Wide Area Network ( WAN )Wide Area Network ( WAN ) Personal Area Network ( PAN )Personal Area Network ( PAN )

By Functional Relationship:-By Functional Relationship:- Client-ServerClient-Server Peer to PeerPeer to Peer

By Network Topology:-By Network Topology:- Bus NetworksBus Networks Star NetworksStar Networks Ring NetworksRing Networks

Page 3: Networking in college

RoutingRouting Routing (or routeing) is the process of Routing (or routeing) is the process of

selecting paths in a network along which selecting paths in a network along which to send network traffic.to send network traffic.

primarily with routing in electronic data primarily with routing in electronic data networks using packet networks using packet switching technology.switching technology.

Routing process usually directs Routing process usually directs forwarding of packets on the basis forwarding of packets on the basis of routing tables which maintain a of routing tables which maintain a record of the routes to various network record of the routes to various network destinations. destinations.

Page 4: Networking in college

Classification of RoutingClassification of Routing

Based on the route telling scheme to the Based on the route telling scheme to the routerrouter

Static RoutingStatic Routing Routing tables are manually configured.Routing tables are manually configured. The advantage of this routing type is maximum The advantage of this routing type is maximum

computing resources are saved but are computing resources are saved but are conditioned. conditioned.

Dynamic RoutingDynamic Routing Routing tables are constructed automatically, Routing tables are constructed automatically,

based on information carried by routing protocols.based on information carried by routing protocols. Dynamic routing dominates the Internet because Dynamic routing dominates the Internet because

it allows the network to act nearly autonomous in it allows the network to act nearly autonomous in avoiding network failures and blockages.avoiding network failures and blockages.

Page 5: Networking in college

Dynamic RoutingDynamic Routing

Distance VectorDistance Vector This approach assigns a number, the cost, to each of This approach assigns a number, the cost, to each of

the links between each node in the network. the links between each node in the network. Nodes will send information from point A to point B via Nodes will send information from point A to point B via

the path that results in the lowest total cost.the path that results in the lowest total cost.

Link State Link State Each node uses as its fundamental data a map of the Each node uses as its fundamental data a map of the

network in the form of a graph.network in the form of a graph. Each router then independently determines the least-Each router then independently determines the least-

cost path from itself to every other node using a cost path from itself to every other node using a standard shortest path algorithm such as Dijkstra's standard shortest path algorithm such as Dijkstra's algorithm.algorithm.

The result is a tree which The result is a tree which serves to construct the serves to construct the routing table, which specifies the best next hop to get routing table, which specifies the best next hop to get from the current node to any other node. from the current node to any other node.

Page 6: Networking in college

Major Routing ProtocolsMajor Routing Protocols

Routing Information Protocol ( RIP )Routing Information Protocol ( RIP ) Open Shortest Path First ( OSPF)Open Shortest Path First ( OSPF) External Interior Gateway Routing External Interior Gateway Routing

Protocol Protocol

( EIGRP )( EIGRP )

Page 7: Networking in college

RIPRIPRandom Facts:-Random Facts:-

Is a Dynamic Routing ProtocolIs a Dynamic Routing Protocol Uses Distance Vector Routing algorithmUses Distance Vector Routing algorithm RIP updates are used as keep alives and are RIP updates are used as keep alives and are

periodicperiodic Routing table is sent as updates Routing table is sent as updates Hello Timer is 30 secondsHello Timer is 30 seconds Dead(flush) Timer is 240 seconds i.e. 8 consecutive Dead(flush) Timer is 240 seconds i.e. 8 consecutive

packetspackets Updates are UDP based and uses destination port Updates are UDP based and uses destination port

no. 520no. 520 Hop Count is used as the metricHop Count is used as the metric RIP v1 does not support subnettingRIP v1 does not support subnetting RIP v2 supports subnettingRIP v2 supports subnetting

Page 8: Networking in college

OSPFOSPF

Random Facts:-Random Facts:- Is a Link State Routing ProtocolIs a Link State Routing Protocol OSPF Hello Packets are used as keep alivesOSPF Hello Packets are used as keep alives Hello Timer is 10 secondsHello Timer is 10 seconds Dead Timers is 40 seconds i.e. 4 consecutive Hello Dead Timers is 40 seconds i.e. 4 consecutive Hello

PacketsPackets Information of networks is sent only during Information of networks is sent only during

neighbourship establishmentneighbourship establishment Metric = cost = 100/Bandwidth in MbpsMetric = cost = 100/Bandwidth in Mbps Linked State Database(LSD) is formed from the Link Linked State Database(LSD) is formed from the Link

State Updates(LSU), from which graph of whole State Updates(LSU), from which graph of whole network is created network is created

Auto-summarization is OFF by defaultAuto-summarization is OFF by default

Page 9: Networking in college

Access ListsAccess Lists Is a group of permit/deny statementsIs a group of permit/deny statements The list is scanned from top to bottom--in the exact The list is scanned from top to bottom--in the exact

order that it was entered for a pattern that matches order that it was entered for a pattern that matches the incoming packetthe incoming packet

Can use a mask, which is like a wild card, to Can use a mask, which is like a wild card, to determine how much of an IP source or destination determine how much of an IP source or destination address to apply to the pattern match address to apply to the pattern match

To make a change, we have to re-enter the entire list To make a change, we have to re-enter the entire list Any packet not processed by the list is dropped by Any packet not processed by the list is dropped by

default.default. Is associated with an interface of the router, where Is associated with an interface of the router, where

we want to filter the traffic.we want to filter the traffic. Can be INBOUND i.e. applied for incoming traffic or Can be INBOUND i.e. applied for incoming traffic or

OUTBOUND i.e. applied for outgoing traffic of an OUTBOUND i.e. applied for outgoing traffic of an interfaceinterface

Page 10: Networking in college

Types of Access ListTypes of Access List

StandardStandard Operates on the Network Layer (Layer 3)of the OSI Operates on the Network Layer (Layer 3)of the OSI

modelmodel Used to block/permit networks from reaching other Used to block/permit networks from reaching other

networks based on the source ip addresses and masknetworks based on the source ip addresses and mask Uses Access List range from 1 to 99Uses Access List range from 1 to 99

ExtendedExtended Operates on both Layer 3 and Layer 4 of OSI modelOperates on both Layer 3 and Layer 4 of OSI model Allow us to filter traffic not only by network address Allow us to filter traffic not only by network address

but also by the type of traffic that is being sent or but also by the type of traffic that is being sent or received and also on the basis of source as well as received and also on the basis of source as well as destination ip addresses and maskdestination ip addresses and mask

Uses Access List Range from 100 to 199Uses Access List Range from 100 to 199

Page 11: Networking in college

Domain Name Domain Name System( DNS)System( DNS)

Standard technology for managing the names Standard technology for managing the names of Web sites and other Internet domain of Web sites and other Internet domain

DNS serverDNS server is any computer registered to join  is any computer registered to join the Domain Name System the Domain Name System

DNS server runs special-purpose networking DNS server runs special-purpose networking software, features a public ip address, and software, features a public ip address, and contains a database of network names and contains a database of network names and addresses for other Internet hostsaddresses for other Internet hosts

DNS servers are organized in a hierarchy DNS servers are organized in a hierarchy At the top level of the hierarchy, so-called root At the top level of the hierarchy, so-called root

servers store the complete database of Internet servers store the complete database of Internet domain names and their corresponding IP domain names and their corresponding IP addresses addresses

DNS networking is based on DNS networking is based on the client/serrver architecture the client/serrver architecture

Page 12: Networking in college

Case Study: College Case Study: College NetworkNetwork

Page 13: Networking in college

Certain Facts:-Certain Facts:-The concepts of networking used to demonstrate and configure The concepts of networking used to demonstrate and configure

the networks are as follows:-the networks are as follows:- Routing ProtocolsRouting Protocols

Link State Routing Protocol ( OSPF )Link State Routing Protocol ( OSPF ) Distance Vector Routing Protocol ( RIP )Distance Vector Routing Protocol ( RIP )

Access-ListsAccess-Lists StandardStandard ExtendedExtended

Domain Name SystemDomain Name System

The elements of networks used in the configuration are as The elements of networks used in the configuration are as follows:-follows:-

Routers ( Cisco 2811)Routers ( Cisco 2811) Switches ( Cisco 2960 24 TT )Switches ( Cisco 2960 24 TT ) Network CablesNetwork Cables

Serial cablesSerial cables Straight Ethernet CablesStraight Ethernet Cables Crossover Ethernet CablesCrossover Ethernet Cables

ServersServers

Page 14: Networking in college

Constraints on the Constraints on the Network:- Network:-

The DNS server is located in another The DNS server is located in another Autonomous System. We have to make Autonomous System. We have to make sure that all users in the college sure that all users in the college network get access to the DNS server.network get access to the DNS server.

Perform sufficient configuration at Perform sufficient configuration at appropriate places so that only the appropriate places so that only the users in Department 1 get access to the users in Department 1 get access to the College web server.College web server.

Enable internet access for all the clients Enable internet access for all the clients except PC5 and PC6 in Department 2except PC5 and PC6 in Department 2

Page 15: Networking in college

Explanation: College Explanation: College NetworkNetwork

The college network comprises an The college network comprises an autonomous system which uses OSPF autonomous system which uses OSPF which is a Link State Routing Protocol.which is a Link State Routing Protocol.

There are 2 routers used in the network.There are 2 routers used in the network. 10.0.0.0/8 network is used for connecting 10.0.0.0/8 network is used for connecting

computers of department 1, thus using computers of department 1, thus using class A private addresses.class A private addresses.

192.168.21.0/24 network is used for 192.168.21.0/24 network is used for connecting computers of department 2, connecting computers of department 2, thus using class C private addresses.thus using class C private addresses.

The College Server uses 22.0.0.0/8 networkThe College Server uses 22.0.0.0/8 network

Page 16: Networking in college

OSPF Network OSPF Network Topology:-Topology:-

Page 17: Networking in college

Configuration of OSPF on Configuration of OSPF on RoutersRouters

To turn ON OSPF process globally on a To turn ON OSPF process globally on a routerrouter

Select the interfaces(networks) which we Select the interfaces(networks) which we want to advertisewant to advertise

Router# configure terminalRouter# configure terminal

Router(conf)# router OSPF <process id> Router(conf)# router OSPF <process id>

Router 1(conf-router)# network 10.0.0.0 Router 1(conf-router)# network 10.0.0.0 0.255.255.255 area 00.255.255.255 area 0

10.0.0.0 – The network which we want to advertise and enable routing on.0.255.255.255 – Wild Card Mask, allowing certain ip addresses to be advertised.Area 0 – The area ID, identifying all the machines in an area.

Page 18: Networking in college

Routes at the College Routes at the College RouterRouter

The result of ‘show ip route’ command on The result of ‘show ip route’ command on College Router is:-College Router is:-

R2#show ip routeO 10.0.0.0/8 [110/65] via 20.0.0.1, 00:58:11, Serial0/1/1C 20.0.0.0/8 is directly connected, Serial0/1/1C 22.0.0.0/8 is directly connected, FastEthernet0/0C 23.0.0.0/8 is directly connected, Serial0/1/0O 30.0.0.0/8 [110/65] via 23.0.0.2, 00:58:11, Serial0/1/0O E2 34.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0O E2 35.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0O E2 45.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0O E2 56.0.0.0/8 [110/20] via 23.0.0.2, 00:58:11, Serial0/1/0C 192.168.21.0/24 is directly connected, FastEthernet0/1O*E2 0.0.0.0/0 [110/1] via 23.0.0.2, 00:58:11, Serial0/1/0

Page 19: Networking in college

RIP Network TopologyRIP Network Topology (used (used

by the ISP) by the ISP)

Page 20: Networking in college

Configuration of RIP on Configuration of RIP on RoutersRouters

To turn ON RIP process globally on a To turn ON RIP process globally on a routerrouter

Select the interfaces(networks) which we Select the interfaces(networks) which we want to advertisewant to advertise

Router4# configure terminalRouter4# configure terminal

Router4(conf)# router RIPRouter4(conf)# router RIP

Router 4(conf-router)# network 34.0.0.0Router 4(conf-router)# network 34.0.0.0

Router 4(conf-router)# network 45.0.0.0Router 4(conf-router)# network 45.0.0.0

10.0.0.0 – The network which we want to advertise and enable routing on.

Page 21: Networking in college

Routes at the ISP RouterRoutes at the ISP RouterThe result of ‘show ip route’ command on an The result of ‘show ip route’ command on an

ISP Router is:-ISP Router is:-R4#show ip routeR 10.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0R 20.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0R 22.0.0.0/8 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0R 23.0.0.0/8 [120/2] via 34.0.0.1, 00:00:24, Serial0/1/1R 30.0.0.0/8 [120/2] via 34.0.0.1, 00:00:24, Serial0/1/1C 34.0.0.0/8 is directly connected, Serial0/1/1C 45.0.0.0/8 is directly connected, Serial0/0/0R 56.0.0.0/8 [120/1] via 45.0.0.1, 00:00:00, Serial0/0/0R 192.168.21.0/24 [120/2] via 34.0.0.1, 00:00:29, Serial0/1/1 [120/2] via 45.0.0.1, 00:00:00, Serial0/0/0

R* 0.0.0.0/0 [120/1] via 45.0.0.1, 00:00:00, Serial0/0/0

Page 22: Networking in college

The TCP/IP configuration of The TCP/IP configuration of computers:-computers:-

Page 23: Networking in college

Entries in the DNS Entries in the DNS Server:-Server:-

Page 24: Networking in college

Entries of Access Lists:-Entries of Access Lists:- Access List 100 used for applying the second constraintAccess List 100 used for applying the second constraint

R2#show ip access-lists 100Extended IP access list 100 deny tcp host 192.168.21.50 host 60.0.0.60 deny tcp host 192.168.21.60 host 60.0.0.60 deny tcp host 192.168.21.60 host 70.0.0.70 deny tcp host 192.168.21.50 host 70.0.0.70 permit ip any any

Access List 101 used for applying the third constraintAccess List 101 used for applying the third constraint

R2#show ip access-lists 101Extended IP access list 101 permit ip 10.0.0.0 0.255.255.255 host 22.0.0.2 deny ip any any

Page 25: Networking in college

Different parts of an Different parts of an Access ListAccess List

deny tcp host 192.168.21.50 host 60.0.0.60

Deny – Specifies the permission whether to permit/deny the accessTcp – This specifies the type of traffic we want to permit/deny

The type of traffic we can control is:-IP – Represents all the traffic flowing on the internet.TCP – Represents only the packets which use Transmission Control ProtocolUDP - Represents only the packets which use the User Datagram ProtocolICMP - Represents only the packets which use Internet Control Message ProtocolHost 192.168.21.50 – This section specifies the source machine we want to control access toHost 60.0.0.60 - This section specifies the destination machine we want to control access toInstead, if we want to control the access to all the machines, we do it by writing ‘any’ like:-Permit ip any any

Page 26: Networking in college

Thank You!!!Thank You!!!