Professional Documents
Culture Documents
Basics
1
Networks
What’s Network?
Why We Need Networks?
2
Network+; First Step to the
Net World
Microsoft: MCSE2003, MCITP2008, MCSE2012
MCSE2003 - MCSE2003 R2
MCITP2008 - MCITP2008 R2
MCSE2012
Cisco
Linux
3
Microsoft:
MCITP:
MCITP Windows 7 Configuration (70-680)
MCITP Active Directory Configuration (70-640)
MCITP Network Infrastructure Configuration (70-642)
MCITP Application Infrastructure Configuration (70-643)
MCITP Enterprise Administration Configuration (70-647)
MCSE:
Installing and Configuring Windows Server 2012 (70-410)
Administering Windows Server 2012 (70-411)
Configuring Advance Windows Server 2012 Services (70-412)
Design and Implementing a Server Infrastructure (70-413)
Implementing and Advanced Server Infrastructure (70-414)
4
Network+; First Step to the
Net World
Cisco:
CCNA:
ICND1 (100-101)
CCNA (200-120)
ICND2 (200-101)
CCNP:
CCNP Route (642-902)
CCNP Switch (642-813)
CCNP T-Shoot (642-832)
5
Network+; First Step to the
Net World
Linux:
LPI 1 (101)
LPI 2 (102)
6
Network History
First Local Net created by Xerox and called PARC
Ethernet (Ethernet I) (Palo Alto Research Center)
Next versions improved by DEC and Intel and called
DIX Ethernet
7
Internet History
1950s: ARPA (Advanced Research Project Agency)
1962: ARPA Net
1982: TCP/IP
1986: NSF Net (First Backbone)
1993: InterNic (Internet Information Center)
1995: VBNS (VeryHighSpeed Backbone Network
System)
8
Internet History
1990s: Web (CERN: Tim Berners-Lee)
(Center Europeen de Recherche Nucleaire = European
Nuclear Research Center)
9
Network Types
LAN
WAN
MAN
PAN
10
Network Types
11
Network Connection Concepts
Internet
Intranet
Extranet
12
Network Connection Concepts
Segment
Backbone
13
Network Connection Concepts
Client/Server Networks
Point-to-Point Networks
14
Network Connection Concepts
Unicast Address
Broadcast Address
Multicast Address
15
Responsible Organizations for
Network Protocol Standards
IEEE (Institute of Electrical and Electronic Engineers )
IEEE802.x
16
Responsible Organizations for
Network Protocol Standards
TIA/EIA (Telecommunicational Industry Association
/Electronic Industries Alliance)
Physical Layer
17
Network Models
18
OSI Model
19
PDU
APDU
PPDU
SPDU
Segment
Packet
Frame
Bit
20
Same-Layer Interaction &
Adjacent-Layer Interaction
Concept Description
Same-layer interaction on The two computers use a
different computers protocol to communicate with
the same layer on another
computer.
21
TCP/IP Model
TCP/IP
Application
Transport
Internet
Network Access
(Host-to-Network)
22
OSI vs TCP/IP
OSI TCP/IP
Application
Presentation Application
Session
Transport Transport
Network Internet
24
Hybrid Model
Hybrid Model
Application
Transport
Network
Data Link
Physical
25
OSI Layer and Their Functions
Layer7: Application
Provide an Interface Between Communication Software's in
two Separate Computer
Authentication
26
OSI Layer and Their Functions
Layer6: Presentation
Negotiate & Define Data Format
Encryption
Compression
27
OSI Layer and Their Functions
Layer5: Session
Defines How to Start, Control, and End Conversations
Control and Management Bidirectional Messages
28
OSI Layer and Their Functions
Layer4: Transport
Error Control
Flow Control
End to End Connection
Segmentation and Order a Large Data
Multiplexing
Connection Establishment & Termination
29
OSI Layer and Their Functions
Layer3: Network
Logical Addressing
Routing
Path Determination
30
OSI Layer and Their Functions
Layer2: Data Link
Define Header and Trailer Format
Define FCS Field
Error Detection
31
OSI Layer and Their Functions
Layer1: Physical
Refers to Medium Standards from Other Organizations
32
OSI Layer and Their Functions
Layer Name Protocols and Devices
Specifications
Application, Telnet, HTTP, FTP, Firewall, Intrusion
Presentation, SMTP, POP3, VoIP, Detection System
Session (Layers 5–7) SNMP
Transport (Layer 4) TCP, UDP
Network (Layer 3) IP Router
Data link (Layer 2) Ethernet (IEEE 802.3), LAN Switch, Wireless
HDLC, Frame Relay, Access Point, Cable
PPP Modem, DSL Modem
Physical (Layer 1) RJ-45, EIA/TIA-232, LAN hub, Repeater,
V.35, Ethernet (IEEE Cables
802.3)
33
A Way to Memorize
OSI:
All People Seem To Need Data Processing (Layers 7 to 1)
TCP/IP:
ATIN (Layer 4 to 1)
34
Physical
Layer
35
Cable Topologies
Bus
Ring
Star
Mesh
36
Bus Topology
37
Ring Topologies
38
Mesh Topologies
39
Star Topologies
40
Cable Types
Twisted Pair:
UTP (Unshielded Twisted Pair)
STP (shielded Twisted Pair)
Coaxial
Fiber Optic
41
UTP Cable
42
STP Cable
43
Most Common Types of Ethernet
44
Coaxial Cable
45
Coaxial Cable
(Original Ethernet Standards)
46
Fiber Optic Cable
47
UTP Categories
Category Bandwidth
Cat1 0.4 MHz
Cat2 Token Ring
Cat3 16MHz
Cat4 20MHz
Cat5 100MHz
Cat5e 100MHz
Cat6 250MHz
Cat6e 250MHz (500MHz according to some)
Cat6a 500MHz
Cat7 600MHz
Cat7a 1000MHz
Cat8 1200MHz 48
Ethernet UTP Cabling
(Unshielded Twisted Pair)
Straight Through
Cross Over
Roll Over
49
UTP Cabling Standards
TIA/EIA 568A :
TIA/EIA568B:
50
UTP Cabling Standard Colors
Green/White Green
Orange/White Orange
Blue/White Blue
Brown/White Brown
51
TIA/EIA 568A
52
TIA/EIA 568B
53
Straight Through (1)
54
Straight Through (2)
55
Cross Over
56
Roll Over
57
Roll Over
58
Device Connections
PC to PC: C
Switch to Switch: C
Router to Router: C
PC to Switch: S
Switch to Router: S
PC to Router: C
59
Device Connections
PC Hub/Switch
Cross
Router Hub/Switch
Straight
60
RJ45 Socket
61
Required Devices for Cabling
62
Transmission Methods
Simplex
Half Duplex
Full Duplex
63
CSMA/CD Algorithm
A device that wants to send a frame, waits until the
LAN is silent -in other words, no frames are currently
being sent- before attempting to send an electrical signal
If a collision still occurs, the devices that caused the
collision wait a random amount of time and then try again
64
CSMA/CD Algorithm
65
Back Off
After a collision occurs and all stations allow the cable to
become idle (each waits the full interface spacing), then the
stations that collided must wait an additional and potentially
progressively longer period of time before attempting to
retransmit the collided frame
The waiting period is intentionally designed to be random
so that two stations do not delay for the same amount of time
before retransmitting, which would result in more collisions
66
CSMA/CD Algorithm
Using Full Duplex cause disable CSMA/CD algorithm
67
Repeater
A repeater is a network device used to regenerate a signal
Repeaters regenerate analog or digital signals distorted by
transmission loss due to attenuation
A repeater does not perform intelligent routing
68
The 4 Repeater Rule
69
Hub
72
WAN Connections
CSU/DSU:
DCE:
DTE:
Clock Rating:
Serial Interface:
Leased Line:
73
WAN Cabling Standards
74
Building a WAN Link in a LAB
75
Data Link
Layer
76
Ethernet Addressing
IEEE 802.3 Committee (MAC Committee) worked on
Ethernet Addressing
MAC address is 48 bits in length and expressed as
twelve hexadecimal digits
MAC addresses are sometimes referred to as burned-in
addresses (BIA) because they are burned into read-only
memory (ROM) and are copied into random-access
memory (RAM) when the NIC initializes
77
Ethernet Addressing
Two format to show MAC address:
Six Octet, Each one 8 bits:00-27-19-EC-97-35
Or
Three Parts, Each one 16 bits: 0000.0C12.3456
78
Ethernet Addressing
79
LAN Addressing Terminology
Term Description
MAC Media Access Control. 802.3 (Ethernet) defines the MAC
sublayer of IEEE Ethernet
Ethernet Address- Other names often used instead of MAC address. These
NIC-LAN terms describe the 6-byte address of the LAN interface card
Unicast Address A term for a MAC that represents a single LAN interface
Broadcast Address An address that means “all devices that reside on this LAN
right now.” (FFFF.FFFF.FFFF)
Multicast Address On Ethernet, a multicast address implies some subset of all
devices currently on the Ethernet LAN (0100.5exx.xxxx)
80
LAN Header Format
DIX
Preamble Destination Source Type Data & Pad FCS
8 6 6 2 46-1500 4
IEEE 802.3
Preamble SFD Destination Source Length/ Data & Pad FCS
7 1 6 6 Type 2 46-1500 4
81
Encapsulation
It’s a way for data framing
This protocol works on layer 2
82
Encapsulation Types
HDLC (High Level Data-Link Control):
Cisco Proprietary
83
Ethernet LAN
Switching
Concepts
84
Historical Progression: HUB
85
Historical Progression: Bridge
86
Historical Progression: Switch
87
Switching Logic
The IEEE defines three general categories of Ethernet
MAC addresses:
Unicast Addresses: MAC addresses that identify a single
LAN interface card
Broadcast Addresses: A frame sent with a destination address
of the broadcast address (FFFF.FFFF.FFFF) implies that all
devices on the LAN should receive and process the frame
Multicast Addresses: Multicast MAC addresses are used to
allow a dynamic subset of devices on a LAN to communicate
88
Switching Logic
Switches do three main job:
Deciding when to forward a frame or when to filter (not
forward) a frame, based on the destination MAC address
Learning MAC addresses by examining the source MAC
address of each frame received by the bridge
Creating a (Layer 2) loop-free environment with other bridges
by using Spanning Tree Protocol (STP)
89
Decision Making
90
Decision Making
91
Learning MAC Addresses
Switches build the address table by listening to incoming
frames and examining the source MAC address in the frame
If a frame enters the switch and the source MAC address is
not in the MAC address table, the switch creates an entry in
the table
92
Flooding Frames
When there is no matching entry in the table, switches
forward the frame out all interfaces (except the incoming
interface)
Switches forward these unknown unicast frames (frames
whose destination MAC addresses are not yet in the bridging
table) out all other interfaces, with the hope that the unknown
device will be on some other Ethernet segment and will reply,
allowing the switch to build a correct entry in the address table
93
Attention
All these words are the same:
MAC Address Table = Switching Table = Bridging Table
= Content Address Table
94
Internal Processing on Cisco
Switches
Switching Description
Method
Store-and- The switch fully receives all bits in the frame (store)
forward before forwarding the frame (forward). This allows the
switch to check the FCS before forwarding the frame
Cut-through The switch forwards the frame as soon as it can. This
reduces latency but does not allow the witch to discard
frames that fail the FCS check
Fragment-free The switch forwards the frame after receiving the first
64 bytes of the frame, thereby avoiding forwarding
frames that were errored due to a collision
95
Collision Domains
96
Broadcast Domains
A Broadcast Domain is a set of NICs for which a broadcast
frame sent by one NIC is received by all other NICs in the
same broadcast domain
97
Virtual LAN
98
What IEEE 802.1d Does
99
Three Classes of Problems
Caused by Not Using STP
Problem Description
Broadcast Storm The forwarding of a frame repeatedly on the same links,
consuming significant parts of the links’ capacities
MAC Table Instability The continual updating of a switch’s MAC address table with
incorrect entries, in reaction to looping frames, resulting in
frames being sent to the wrong locations
Multiple Frame A side effect of looping frames in which multiple copies of one
Transmission frame are delivered to the intended host, confusing the host
100
What IEEE 802.1d Does
Prevent loop in layer 2 Switches
Its enabled by default in Cisco Switches
Switches information multicast by BPDU messages
STP block all ports that play a roll in loop
If Network changes, SPT will decide again about blocking
port
For determining which port should be block, an election will
be occurred
101
Campus LAN Design
Terminology
102
Network
Layer
103
IP Address
IP Address is a unique address that identify a device
on the network
IP Address is 32 bits
4 Octet, Each one 8 bits:
Example: 160.5.73.2
104
IP Classes
105
IP Packet/Header
106
IP Addresses
Class A:
Network: 128
Host: 16,771,216 (256*256*256)
Class B:
Network: 16,384 (64*256)
Host: 65,536 (256*256)
Class C:
Network: 2,097,152 (32*256*256)
Host: 256
107
IP Addresses
108
Network and Host Parts and
Default Masks
Class of Size of Network Part Size of Host Part Default Mask for
Address of Address in Bits of Address in Bits Each Class of
Network
A 8 24 255.0.0.0
B 16 16 255.255.0.0
C 24 8 255.255.255.0
109
Network and Host Parts
11
0
Network and Host Parts
111
Network and Host Parts
112
RFC 1918 Private Address Space
113
IP Configuration
114
Why We Use Subnetting?
115
3 Math Operations for Subnetting
116
Memorize
255 127 63 31 15 7 3 1
1 0 0 0 0 0 0 0 128
1 1 0 0 0 0 0 0 192
1 1 1 0 0 0 0 0 224
1 1 1 1 0 0 0 0 240
1 1 1 1 1 0 0 0 248
1 1 1 1 1 1 0 0 252
1 1 1 1 1 1 1 0 254
1 1 1 1 1 1 1 1 255
117
Classful and Classless Subnetting
118
Address Formats When
Subnetting is Used
119
Analyzing Subnet Mask
Number of Network Bits: Always defined by Class A, B, C
Number of Host Bits: Always defined as the number of
binary 0s in the mask
Number of Subnet Bits: Two Ways:
32 - (Network Size + Host Size)
24 - (Host Size) or 16 - (Host Size) or 8 - (Host Size)
H
Number of Host Per Subnet: 2 - 2
S
Number of Subnets: 2
120
Exercise
8.1.4.5 /8
130.34.21.7 /16
200.23.1.77 /24
8.1.4.5 /18
102.4.102.1 / 21
130.4.102.1 /22
199.1.1.100 /27
199.1.1.100 /30
121
ICMP (Internet Control
Messaging Protocol)
Ping
Tracert
Traceroute
122
Ping
123
ARP
(Address Resolution Protocol)
ARP is a layer3 protocol for finding MAC address
from IP address
124
RARP
125
ARP
126
DHCP (Dynamic Host
Configuration Protocol)
127
DHCP
128
Routing
Routing Protocols
Routed Protocols
129
Types of Routing Protocols
130
Static Routing Protocol
Static Route
Default Route
131
Dynamic Routing Protocols
132
Fundamentals
of Transport
Layer
133
Main Layer4 Protocols
134
Main Layer4 Concepts
Connection Oriented
Connection Less
135
TCP Header
136
UDP Header
137
Popular Applications and Their Well-
Known Port Numbers
Port Number Protocol Application
20 TCP FTP Data
21 TCP FTP Control
22 TCP SSH
23 TCP Telnet
25 TCP SMTP
53 TCP, UDP DNS
67, 68 UDP DHCP
69 UDP TFTP
80 TCP HTTP (WWW)
110 TCP POP3
161 UDP SNMP
443 TCP SSL
16384 - 32767 UDP RTP Based Voice & Video 138
QOS
Bandwidth
Delay
Jitter
Loss
139
Application
Layer
Protocols
140
Main Application Layer Protocols
Telnet
SSH
SMTP (Simple Mail Transfer Protocol: Send)
POP3 (Post Office Protocol v.3: Receive)
IMAP (Internet Message Access Protocol: Receive)
HTTP
HTTPS
141
Main Application Layer Protocols
DNS
FTP
TFTP (Trivial File Transfer Protocol)
SNMP (Simple Network Management Protocol)
142
DNS
143
DNS
144
VM Ware
145
Packet Tracer
146
GNS3
147
Main
Concepts
148
Main Concepts in Network
Client OS
Server OS
149
Main Concepts in Network
Workgroup
Domain
150
Main Concepts in Network
Permission
Share Permission
NTFS Permission
Effective Permission
151
Main Concepts in Network
Simple Sharing
Advanced Sharing
152
Main Concepts in Network
Switching
Routing
153
Main Concepts in Network
IP
Subnet Mask
Wild Card Mask
Gateway
154
Main Concepts in Network
Policy
Group Policy
155
Main Concepts in Network
SID:
New SID
Sysprep
156
Main Concepts in Network
Access Point (AP)
Switch
157
Main Concepts in Network
AAA:
Authentication
Authorization
Accounting
158
Main Concepts in Network
Disk Types:
Basic:
Default Mode
For OS installation
Dynamic:
Has more features like Span, RAID (Redundant Array of
Independent Disks)
160
Disk Management: RAID
(Redundant Array of Independent Disks)
What is RAID?
Types of RAID:
Hardware RAID
Software RAID
RAID Goals:
Fault Tolerance
Performance
161
Main Concepts in Network
RAID:
RAID 0
RAID 1
RAID 5
RAID 6
RAID 0+1 or 1+0
162
Main Concepts in Network
Clustering
Scalability
High Availability
Load Balancing
163
Main Concepts in Network
Clean Installation
Upgrade
Migrate
Windows Easy Transfer
164
Main Concepts in Network
Role
Feature
Server Roles
165
Main Concepts in Network
Firewall Types:
Host Base Firewall
Software firewalls on OS
166
Main Concepts in Network
Firewall Profiles:
Home or Work (Private) Network Location Setting
Public Network Location Setting
Domain Network Location Setting
167
Main Concepts in Network
Inbound Traffic:
Outbound Traffic:
168
Main Concepts in Network
Backup
Full
Incremental
Differential
Copy (Mirror)
Restore
169
Main Concepts in Network
Backup Tools:
Microsoft Backup Tools
Norton Ghost
Acronis
Backup exeC
170
Main Concepts in Network
Hot Standby
Cold Standby
171
Main Concepts in Network
Design
Configuration
Trouble Shooting
172
Main Concepts in Network
RADIUS
Kerberos
173
Main Concepts in Network
Remote Desktop
Remote Assistant
Terminal Service
174
Main Concepts in Network
Internet Connection Sharing
175
Main Concepts in Network
Software Restriction
AppLocker
176
Main Concepts in Network
Users
Groups
17
7
Main Concepts in Network
EFS
BitLocker
178
Trouble Shooting
Layer 1:
Check devices position: Turn On / Off
Check connection between devices
Check cable: Straight / Cross
. . .
179
Trouble Shooting
Layer 2:
Check TCP/IP Stack:
ping 127.0.0.1
Check Network Adapter
180
Trouble Shooting
Layer 3:
ipconfig/all Command
ping Command
tracert Command
181
IPV6
182
Why We Need IPV6?
183
IPV6 Advantages
184
IPV6 Addressing and
Summarization Rules
2001:0db8:0012:0000:0000:0000:1234:56ab
2001:db8:12:0:0:0:1234:56ab
2001:db8:12::1234:56ab
2001:0000:0000:0db8:0012:0000:0000:56ab
2001::0db8:0012::56ab
2001::0db8:0012:0:0:56ab
185
Kinds of Addressing
Unicast:
Global Unicast: 2000::/3 (001)
Site Local: FEC0::/10 (Similar to A, B, C Private Addresses)
Unique Local: FD00::/8 (Private-EUI64 )
Link Local: FE80::/10 (APIPA-Non Routable)
Multicast: FF00::/8
Anycast
186
Common Multicast Addresses
187
Some Reserved Addresses
::1 127.0.0.1
:: 0.0.0.0
3FFF:FFFF::/32
2001:0DB8::/32
2002::/16
188
IPv6 Address
Configuration Options
Static or Option Portion Configured
Dynamic or Learned
Static Do not use EUI-64 Entire 128-bit address
189
NAT
190
NAT and PAT
Network Address Translation
Port Address Translation
191
NAT and PAT
192
NAT and PAT
Inside Local
Inside Global
Outside Local
Outside Global
193
NAT and PAT
200.1.1.1
194
Types of NAT
Static NAT
Dynamic NAT
PAT
195
Wireless
196
197
Organizations That Set or
Influence WLAN Standards
Organization Standardization Role
199
Encoding Classes and IEEE
Standard WLANs
Name of Encoding Class What It Is Used By
200
WLAN Modes and Names
201
Wireless LAN Security
202
WLAN Security Standards
203
Troubleshooting Wireless
Networks
Check Signaling
Check Wireless AP to work correctly
Check technology: b, a, g, n
“b” and “g” technologies are not compatible with “a”
204
205