Ch1-2-3 Introduction To TCP-IP Networking
Ch1-2-3 Introduction To TCP-IP Networking
Networking
Instructor Materials
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
What is IP Network?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Physical Components of a Network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
End Devices
An end device is where a message originates from or where it is received. Data originates with an
end device, flows through the network, and arrives at an end device.
- Computer
- Mobile
- IP CAM
- IP Phone
- Printers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Intermediary Network Devices
An intermediary device interconnects end devices. Examples include switches, wireless
access points, routers, and firewalls.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Network Icons
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Switches
https://www.cisco.com/c/en/us/products/switches/index.ht
ml#~products
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Routers
https://www.cisco.com/c/en/us/products/routers/index.html#~products
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Firewalls/ NGFW / IPS
https://www.cisco.com/c/en/us/products/security/firewalls/index.html#~w
hy-cisco
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Firewalls/ WAF / IPS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Access Point
https://www.cisco.com/c/en/us/products/wireless/index.html#~products
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
WLC – Wireless LAN Controller
https://www.cisco.com/c/en/us/products/wireless/index.html#~products
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
WLC – Wireless LAN Controller
- Physical
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
WLC – Wireless LAN Controller
- Cloud
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Network Media
Communication across a network is carried through a medium which allows a message to
travel from source to destination.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Network Topologies :
How components are connected
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Topology Diagrams
Point to Point : Ring by IBM:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Topology Diagrams
Mesh : Bus:
a lot of network cards One Card for each Computer
One send all receive
A lot of collision (Network) and interference
(communication)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Topology Diagrams
Star :
evolutions of intermediate Devices ( Hub , bridge , then
switches )
Hub : can’t understand MAC address and IP address
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Network Model
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Network Model
Network model consist of layers
• What is a layer ?
it’s a function that can be done either by S/W or H/W
• Why layered ?
cause all Functions are sequential
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Network Model
OSI Model
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Network Model
OSI Model vs TCP/IP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Data Encapsulation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Data De-Encapsulation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Peer to Peer Communications
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Peer to Peer Communications
Encapsulating and De-Encapsulation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Peer to Peer Communications
Encapsulating and De-Encapsulation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Ch.2 Fundamentals of Ethernet
LANs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
An Overview of LAN
Most enterprise computer networks can be separated into two general types
of technology: local-area networks (LANs) and wide-area networks (WANs).
LANs typically connect nearby devices: devices in the same room, in the
same building, or in a campus of buildings.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
LAN Components
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Small LAN vs Enterprise LAN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Networks of Many Sizes
• Small Home Networks – connect a few
computers to each other and the Internet
• Small Office/Home Office – enables
computer within a home or remote office
to connect to a corporate network
Small Home SOHO • Medium to Large Networks – many
locations with hundreds or thousands of
interconnected computers
• World Wide Networks – connects
hundreds of millions of computers world-
wide – such as the internet
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Common Types of Networks
LANs and WANs (cont.)
A LAN is a network infrastructure that spans A WAN is a network infrastructure that spans
a small geographical area. a wide geographical area.
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or Typically administered by one or more service
individual. providers.
Provide high-speed bandwidth to internal Typically provide slower speed links between LANs.
devices.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Physical Layer = Layer1
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Physical Layer = Layer 1
Physical Layer
Layer 1 devices
Cables Cards Connectors
Hub, repeater (its regenerate the signal),
SFPs
CSU/DSU
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Ethernet Connection Media
- Copper
- Fiber
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Ethernet Connection Media
- Copper
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Types of Ethernet LAN
Wave2 : up
to 2.5 G
1G
- Ethernet 1970s : 10Mbps
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Ethernet Connection Media
- Copper Cable with Wires Inside
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Ethernet Connection Media
- Copper Cable with Wires Inside
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Ethernet Connection Media
- RJ-45 Connector and Jack
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Ethernet Connection Media
- Optical Fiber
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Ethernet Connection Media
- Fiber Connection Types
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
SC-SC MM Patch Cord LC-LC SM Patch Cord ST-LC MM Patch Cord ST-SC SM Patch Cord
A yellow jacket is for single-mode fiber cables and orange (or aqua) for multimode fiber
cables.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Ethernet Connection Media
- Fiber : 10G SFP+
- Copper : 1G SFP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Hub
- Hubs are “dumb” devices that pass anything
received on one connection to all other connections
(flood).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Data Link Layer = Layer2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Data-Link Layer = Layer 2
Layer 2 Device
MAC Address MAC Frame Bridge , Switch
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
IEEE 802 LAN/MAN Data Link Sublayers
IEEE 802 LAN/MAN standards are specific to
the type of network (Ethernet, WLAN, WPAN,
etc).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Purpose of the Data Link Layer
IEEE 802 LAN/MAN Data Link Sublayers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Ethernet Frame Structure
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Ethernet Addressing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Ethernet Addressing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Type of Destination MAC
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Type of Destination MAC (cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Hub disadvantages
- Half Duplex mode:
https://www.youtube.com/watch?v=LMR
SS7ZYM50&t=202s
- collision domain:
https://www.youtube.com/watch?v=iKn0
GzF5-IU&t=132s
. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Half and Full Duplex Communication
Half-duplex communication
• Only allows one device to send or receive at a time on a shared medium.
• Used on WLANs and legacy bus topologies with Ethernet hubs.
Full-duplex communication
• Allows both devices to simultaneously transmit and receive on a shared medium.
• Ethernet switches operate in full-duplex mode.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Half and Full Duplex Communication
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Half and Full Duplex Communication
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Half and Full Duplex Communication
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Half and Full Duplex Communication
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Half and Full Duplex Communication
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
Access Control Methods
Contention-based access
All nodes operating in half-duplex, competing for use of the medium. Examples are:
• Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy
bus-topology Ethernet.
• Carrier sense multiple access with collision avoidance (CSMA/CA) as used on
Wireless LANs.
Controlled access
• Deterministic access where each node has its own time on the medium.
• Used on legacy networks such as Token Ring and ARCNET.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Contention-Based Access – CSMA/CD
CSMA/CD
• Used by legacy Ethernet LANs ( hub).
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision detection process to govern when a device can send and what
happens if multiple devices send at the same time.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
Contention-Based Access – CSMA/CA
CSMA/CA
• Used by IEEE 802.11 WLANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision avoidance process to govern when a device can send and what
happens if multiple devices send at the same time.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
Need For Switches
A collision domain: the part of a network
where packet collisions can occur. A collision
occurs when two devices send a packet at
the same time on the shared network
segment.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Switches Functions and Operations
LAN Switch Function:
- Cut through
- Store and forward
- Adaptive cut through / Fragment free Switching
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
Switches Functions and Operations (Learning)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
Switches Functions and Operations (Learning)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
Switches Functions and Operations (Forwarding)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
Switches Functions and Operations (Forwarding)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
Switches Functions and Operations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80
Switches Functions and Operations
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
Switches Functions and Operations
MAC table : store in RAM for 5 minutes by default
CAM - Content Addressable Memory, referring to the memory used for the
MAC address table.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
Layer 2 and Layer 3 ( Multilayer ) Switches
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
fixed Switches , Modular Switches and Stackable Switches
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
fixed Switches , Modular Switches and Stackable Switches
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
Chapter 3: Fundamentals of WANs
and IP Routing
why are WANs Needed?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
WAN Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
WAN Traffic
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
WAN Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
WAN Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
WAN Link Options
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
WAN Layer2 Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93
Common Types of Networks
WAN Connections
- DSL card (Digital Subscriber Line) : up to 7Km Public WAN
- X.25
- Frame Relay
- HDLC up to 15000Km
- MPLS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
The Converging Network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95
Internet Connections
The Converging Network (Cont.)
Converged data networks carry
multiple services on one link including:
• data
• voice
• video
Converged networks can deliver data,
voice, and video over the same
network infrastructure. The network
infrastructure uses the same set of
rules and standards.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96
Reliable Network
Network Architecture
Network Architecture refers to the
technologies that support the infrastructure
that moves data across the network.
There are four basic characteristics that the
underlying architectures need to address to
meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97
Reliable Network
Fault Tolerance
A fault tolerant network limits the impact of
a failure by limiting the number of affected
devices. Multiple paths are required for
fault tolerance.
Reliable networks provide redundancy by
implementing a packet switched network:
• Packet switching splits traffic into
packets that are routed over a network.
• Each packet could theoretically take a
different path to the destination.
This is not possible with circuit-switched
networks which establish dedicated
circuits.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
Reliable Network
Scalability
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
Reliable Network
Quality of Service
Voice and live video transmissions
require higher expectations for those
services being delivered.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100
Reliable Network There are two main types of network
Network Security security that must be addressed:
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to
the devices
• Information Security
• Protection of the information or data
transmitted over the network
Three goals of network security:
• Confidentiality – only intended
recipients can read the data
• Integrity – assurance that the data
has not be altered with during
transmission
• Availability – assurance of timely and
reliable access to data for authorized
users© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101
Network Security
Security Threats • Network security is an integral
part of networking regardless of
the size of the network.
• The network security that is
implemented must take into
account the environment while
securing the data, but still
allowing for quality of service that
is expected of the network.
• Securing a network involves
many protocols, technologies,
devices, tools, and techniques in
order to secure data and mitigate
threats.
• Threat vectors might be external
or internal.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102
Network Security
External Threats:
Security Threats (Cont.)
• Viruses, worms, and Trojan
horses
• Spyware and adware
• Zero-day attacks
• Threat Actor attacks
• Denial of service attacks
• Data interception and theft
• Identity theft
Internal Threats:
• lost or stolen devices
• accidental misuse by employees
• malicious employees
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103
Network Security
Security Solutions
Security must be implemented in multiple
layers using more than one security solution.
Network security components for home or
small office network:
• Antivirus and antispyware software
should be installed on end devices.
• Firewall filtering used to block
unauthorized access to the network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104
Network Security
Security Solutions (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105